DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K

Size: px
Start display at page:

Download "DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K"

Transcription

1 Volume 119 No , ISSN: (on-line version) url: DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH J. Avila, V.Padmapriya, Thenmozhi.K Department of ECE, School of EEE, SASTRA Deemed University, Thanjavur *Corresponding author: Abstract: Wireless Communication has evolved to fulfill the all-time needs of the current generation. Its widespread usage in almost all the areas has eventually led to spectral inadequacy. Cognitive Radio (CR) has emerged as a successful solution to over the spectral utilization issues. Like any other wireless technique CR also is often subjected to attacks by selfish users. In this manuscript, the security threats in the physical layer of the cognitive radio namely the Primary User Emulation Attack (PUEA) is taken into consideration and the solution to overcome the same has been proposed. Keywords: Cognitive Radio, OFDM, PUEA, Helper Node, OMNeT++, NED, Authentication 1. Introduction Communication plays an imperative role in today s scenario. From the antiquated telegraphy to the modern day cellphones, the evolution of this field has been progressing at a swift pace. One such innovation is the concept of Cognitive Radio. Optimum spectrum utilization is achieved by using the spectrum left by the licensed primary users for unlicensed secondary users whenever it is not in use. Thereby the spectrum management is done effectively. Any wireless system is vulnerable to attacks and the same is applicable to cognitive radio networks. These attacks affect the dynamic spectrum accessing. Hence this paper offer a solution to the threat faced by cognitive and launch a secure connection. Many researchers have proposed various methods to overcome this attack. Some of them are, the aforementioned method makes use of the distance ratio test and the distance difference test in [2]. An algorithm for fast spectrum sensing is given in [1] which deals with the discrete wavelet packet transform based energy detector. In [3], a Primary user emulation attack has been analyzed using dedicated sensor networks. A transmitter location based scheme has been proposed in [4]. Fenton s approximation and markov s inequality based Primary user emulation attack have been performed in [5]. Four dimension continuous Markov chain model to combat PUEA has been proposed in [6]. PU, secondary user, selfish misbehavior secondary user and misbehavior secondary user are the four parameters considered to combat PUEA. Eigen value based PUEA mitigating method has been discussed in [7]. Time Synched link signature scheme to mitigate PUEA has been proposed in [8]. In [9] temporal link signature scheme has been offered to establish link between transmitter and receiver thereby PUEA could be mitigated. Any change in the transmitter location or emulator claiming as transmitter is identified. 513

2 In this paper Helper node based authentication scheme has been proposed. The authentication is achieved with the aid of authentication tag generated by the Helper node. Only the information with the authentication tag is accepted by the cognitive radio [10] and other information are rejected. 2. Materials and Methods The various windows used in this study are outlined here. The signals are chosen in such a way that the spectral leakage occurs and does not occur respectively. Finally, the spectral and SNR analysis is performed with various windows and the results are analyzed for a relative study in the next section. 2.1 Helper Node The tag is generated by the Helper node. Helper node is nothing but the node very close to the primary user and it is trust-worthy. The CR requests the helper node to sense the existence of primary user. On accepting the request the Helper node in turn looks for the availability of the PU. In the absence of the PU it transmits that information to the CR. Absence of PU condition is preferred in order to avoid interference between PU and Helper node [7]. OFDM is chosen as the system model for the Helper node and it is shown in Figure 1. The tag generated is embedded in the parity bits of the error control codes. Error control codes are the extra bits added to the message bit to combat the channel noise. The parity bits which are meant to combat the noise are XORed with tag bits INPUT CONVOLUTION FOURIER TRANSFORM BPSK/QPSK/QAM Figure 1. Transmitter diagram of helper node Spectrum Sensing There are many spectrum sensing schemes available to detect the existence of primary user. In this paper energy detection based spectrum sensing has been considered to find the spectrum holes. The block diagram of energy detector is as shown in Figure 2. The primary user signal is received, filtered and moved on to Fast Fourier Transform (FFT) block. The output of FFT is fed to windowing function block. This is done in order to reduce the side lobs. The out of this block is integrated and the energy of the primary user signal is compared with the predefined threshold. If the signal exceeds the threshold then it is decided that the primary user is present and the spectrum is not vacant. If the signal falls below the threshold then it is concluded that the spectrum is free. The decision Hypothesis is S(t) = u(t) : 514

3 u(t) + n(t) : S(t) is the signal received by the cognitive radio. is null hypothesis which means that only noise is present in the channel. indicates the existence of primary user and noise in the channel. 2.2 Tag Generation Figure 1. Energy detection based spectrum sensing There are many ways to generate the tag. Pseudo Noise sequences, Chaotic sequences etc., can be utilized as authentication tag. Algorithms like AES, DES can also be used to generate the authentication tag. But it is not advisable to utilize them because they are meant to provide security for bulk data transfer. In this case it is only the PU absent information that has to be transmitted from the Helper node to the cognitive radio. Hence any light weight algorithm can be used to generate the authentication tag. 2.3 OMNET Tool The proposed method is explained with the aid of simulated results using OMNET++ tool. OMNET++ is a modular/component based simulation software. In OMNET++ the modules are programmed using C++ and these modules are assembled by the compiler using a high level language called NED. It is the use of this NED language that makes OMNET++ a user friendly software. The user can simply program the modules in a known language (C++) and the compiler assembles them. 3. Simulation Results and Discussion In the graphical view there is one primary transmitter, one primary receiver and three cognitive users. In Figure 3a the cognitive users are sensing the availability of the free holes by receiving the signal from the primary user (PU). Figure 3b shows that PU signal is received by all cognitive users and it is compared with the threshold. Since the received signal exceeds the threshold it is declared that the PU is present. 515

4 Figure 3a and 3b. Cognitive Radio sensing the Primary User Figure 4a shows the inclusion of malicious user in the wireless environment. Malicious users are selfish users who wish to access the free spectrum on their own and block other cognitive users from accessing the free spectrum. In the absence of the primary user they block the cognitive radio by transmitting a duplicate signal imitating the primary user signal. The cognitive radio on receiving the duplicate signal compares it with the threshold. It exceeds the threshold and the cognitive radio makes a decision that the primary user is present. Actually the primary user is absent and the spectrum is free. Figure 4b shows that the cognitive user 3 is checking the availability of the free spectrum. Figure 4a and 4b. Inclusion of Malicious User in the Cognitive Radio environment Figure 5a shows that the malicious user collects the information about the primary user and in the absence of primary user, mimics it. It conveys the message to the cognitive user 3 that the spectrum is not free which is given in figure 5b. Figure 5a and 5b. Malicious User mimicking the Primary User 516

5 Figure 6a shows the insertion of the Helper node amid the PU and the cognitive radio to overcome the primary user emulation attack. The cognitive requests the Helper node to find the availability of the free spectrum. If the spectrum is free it transmits the information to the cognitive users. Figure 6b shows that CR3 is requesting the Helper node. The Helper node senses that the spectrum is free and sends the information along with the authentication tag (M in this case) to the CR3. Figure 6a and 6b. Helper Node to combat the Primary User Emulation Attack Figure 7 shows that the authentication tag is received by CR3, malicious user and the primary receiver. The malicious user and the primary receiver cannot decode the message without the knowledge of the key. Hence privacy is maintained Figure 7. Data Transfer with Authentication Tag 4. Conclusion The security threats in a cognitive network have been addressed by considering the authentication tag generated and transmitted to the cognitive radio from the Helper node. This scheme is resistance to PUEA which is one the important in the physical layer of the cognitive radio. Eliminating the attacks enables the cognitive radio to make the correct decision about the availability of the free spectrum and occupy it. Hence dynamic spectrum access has been efficiently achieved. References [1] Youngwoo Youn, Hyoungsuk Jeon, Hoiyoon Jung, Hyuckjae Lee. Discrete Wavelet Packet Transform based Energy Detector for Cognitive Radios. IEEE 65th vehicular TecHelper Nodeology conference 2007; Doi: /VETECS

6 [2] Ruiliang Chen,Jung-Min Park, Reed.J.H. Defense against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE Selected Areas in Communications 2008; 26(1):25-37.Doi: /JSAC [3] Jin Z, Anand, S,Subbalakshmi, A.Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. IEEE International Conference on communications 2009;1-5.Doi: /ICC [4] Lu KaiWang, Ke HaiZhou,Yang Jie, Zhang LiangJun. Research of PUE attack based on location.ieee 11th International Conference on Signal Processing (ICSP) 2012; Doi: /ICoSP [5] Anand,S, Jin,Z, K.P.Subbalakshmi.An Analytical Model For Priamry user emulation Attack in cognitive radio networks.ieee symposium on New Frontiers in Dynamic spectrum Access Networks 2008;1-6.Doi: /DYSPAN [6]. WANG Shan-shan, LUO Xing-guo and LI Bai-nan, Primary User Emulation Attacks Analysis for Cognitive Radio Networks Communication, TELKOMNIKA, Vol. 11, No. 7, pp ,2013. [7].Deepa Das and Sumita Das, Eigenvalue Detection Based Method to Mitigate PUEA in Cognitive Radio Networks, IEEE International Conference on Advanced Networks and Telecommunication Systems,pp.1-6, [8].Yao Liu and Peng Ning, Enhanced Wireless Channel Authentication Using Time-Synched Link Signature, Proceedings IEEE INFOCOM,pp ,2012. [9].Neal Patwari and Sneha K. Kasera, Robust Location Distinction using Temporal Link Signatures, IEEE Transactions on Mobile Computing,Vol.10,No.3,pp ,2010. [10].V.P.Charulatha, J.GeethaRamani, Dr.K.Geetha, SPECTRAL PRECODING TECHNIQUES FOR COGNITIVE RADIO SYSTEMS TO IMPROVE International Journal of Innovations in Scientific and Engineering Research (IJISER),vol1no4,pp ,2014 SPECTRUMUTILIZATION [11] Fatty.M.Salem, Maged.H.Ibrahim, Ihab.A.Ali, I.I.Ibrahi.Matched-Filter-based Spectrum Sensing for Secure Cognitive Radio Network Communications. International Journal of Computer Applications 2014;87(18):41-46.Doi /

7 519

8 520

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO

WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO S.Raghave #1, R.Saravanan *2, R.Muthaiah #3 School of Computing, SASTRA University, Thanjavur-613402, India #1 raga.vanaj@gmail.com *2

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

A Primary User Authentication System for Mobile Cognitive Radio Networks

A Primary User Authentication System for Mobile Cognitive Radio Networks A Primary User Authentication System for Mobile Cognitive Radio Networks (Invited Paper) Swathi Chandrashekar and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona, Tucson,

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

Primary User Emulation Attack Analysis on Cognitive Radio

Primary User Emulation Attack Analysis on Cognitive Radio Indian Journal of Science and Technology, Vol 9(14), DOI: 10.17485/ijst/016/v9i14/8743, April 016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Primary User Emulation Attack Analysis on Cognitive

More information

Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band

Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band 1 D.Muthukumaran, 2 S.Omkumar 1 Research Scholar, 2 Associate Professor, ECE Department, SCSVMV University, Kanchipuram ABSTRACT One

More information

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

More information

Abstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding.

Abstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding. Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Amandeep Kaur Virk, Ajay K Sharma Computer Science and Engineering Department, Dr. B.R Ambedkar National Institute of Technology,

More information

[Panday* et al., 5(5): May, 2016] ISSN: IC Value: 3.00 Impact Factor: 3.785

[Panday* et al., 5(5): May, 2016] ISSN: IC Value: 3.00 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE OF WAVELET PACKET BASED SPECTRUM SENSING IN COGNITIVE RADIO FOR DIFFERENT WAVELET FAMILIES Saloni Pandya *, Prof.

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Ahmed Alahmadi, Tianlong Song, Tongtong Li Department of Electrical & Computer Engineering Michigan State University,

More information

Cognitive Ultra Wideband Radio

Cognitive Ultra Wideband Radio Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir

More information

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M. Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.E, 2 1 Department of Computer Science and Engineering, Nehru Institute

More information

Nagina Zarin, Imran Khan and Sadaqat Jan

Nagina Zarin, Imran Khan and Sadaqat Jan Relay Based Cooperative Spectrum Sensing in Cognitive Radio Networks over Nakagami Fading Channels Nagina Zarin, Imran Khan and Sadaqat Jan University of Engineering and Technology, Mardan Campus, Khyber

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio ISSN: 2319-7463, Vol. 5 Issue 4, Aril-216 Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio Mudasir Ah Wani 1, Gagandeep Singh 2 1 M.Tech Student, Department

More information

Adaptive Threshold for Energy Detector Based on Discrete Wavelet Packet Transform

Adaptive Threshold for Energy Detector Based on Discrete Wavelet Packet Transform for Energy Detector Based on Discrete Wavelet Pacet Transform Zhiin Qin Beiing University of Posts and Telecommunications Queen Mary University of London Beiing, China qinzhiin@gmail.com Nan Wang, Yue

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Recent Advances in Cognitive Radios

Recent Advances in Cognitive Radios Page 1 of 8 Recent Advances in Cognitive Radios Harit Mehta, harit.mehta@go.wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download Abstract Recent advances in the field of wireless have

More information

Spectral - Energy Efficiency and Trust-Aware Scheme for Cognitive Radio Networks

Spectral - Energy Efficiency and Trust-Aware Scheme for Cognitive Radio Networks Spectral - Energy Efficiency and Trust-Aware Scheme for Cognitive Radio Networks K.Sathya 1, B.K.Anu Preethi 2, V.Vijayaraghavan 3, M.Laavanya 4 PG Student, Dept. of ECE, Info Institute of Engineering,

More information

Cyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users

Cyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users Cyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users Nazar Radhi 1, Kahtan Aziz 2, Rafed Sabbar Abbas 3, Hamed AL-Raweshidy 4 1,3,4 Wireless Network & Communication Centre,

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing Open Access Journal Journal of Sustainable Research in Engineering Vol. 3 (2) 2016, 47-52 Journal homepage: http://sri.jkuat.ac.ke/ojs/index.php/sri Fuzzy Logic Based Smart User Selection for Spectrum

More information

Effect of Time Bandwidth Product on Cooperative Communication

Effect of Time Bandwidth Product on Cooperative Communication Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to

More information

Selfish Attack Detection in Cognitive Ad-Hoc Network

Selfish Attack Detection in Cognitive Ad-Hoc Network Selfish Attack Detection in Cognitive Ad-Hoc Network Mr. Nilesh Rajendra Chougule Student, KIT s College of Engineering, Kolhapur nilesh_chougule18@yahoo.com Dr.Y.M.PATIL Professor, KIT s college of Engineering,

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Cognitive Radio Techniques

Cognitive Radio Techniques Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction

More information

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO Ms.Sakthi Mahaalaxmi.M UG Scholar, Department of Information Technology, Ms.Sabitha Jenifer.A UG Scholar, Department of Information Technology,

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

COGNITIVE RADIO NETWORKS IS THE NEXT STEP IN COMMUNICATION TECHNOLOGY

COGNITIVE RADIO NETWORKS IS THE NEXT STEP IN COMMUNICATION TECHNOLOGY Computer Modelling and New Technologies, 2012, vol. 16, no. 3, 63 67 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia COGNITIVE RADIO NETWORKS IS THE NEXT STEP IN COMMUNICATION

More information

Iterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems

Iterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems , 2009, 5, 351-356 doi:10.4236/ijcns.2009.25038 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Iterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems Zhongpeng WANG

More information

Performance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding Technique

Performance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding Technique e-issn 2455 1392 Volume 2 Issue 6, June 2016 pp. 190 197 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Performance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding

More information

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0

More information

UNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM

UNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM UNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM 1 Drakshayini M N, 2 Dr. Arun Vikas Singh 1 drakshayini@tjohngroup.com, 2 arunsingh@tjohngroup.com

More information

CycloStationary Detection for Cognitive Radio with Multiple Receivers

CycloStationary Detection for Cognitive Radio with Multiple Receivers CycloStationary Detection for Cognitive Radio with Multiple Receivers Rajarshi Mahapatra, Krusheel M. Satyam Computer Services Ltd. Bangalore, India rajarshim@gmail.com munnangi_krusheel@satyam.com Abstract

More information

Demonstration of Real-time Spectrum Sensing for Cognitive Radio

Demonstration of Real-time Spectrum Sensing for Cognitive Radio Demonstration of Real-time Spectrum Sensing for Cognitive Radio (Zhe Chen, Nan Guo, and Robert C. Qiu) Presenter: Zhe Chen Wireless Networking Systems Laboratory Department of Electrical and Computer Engineering

More information

ENERGY DETECTION BASED SPECTRUM SENSING FOR COGNITIVE RADIO

ENERGY DETECTION BASED SPECTRUM SENSING FOR COGNITIVE RADIO ENERGY DETECTION BASED SPECTRUM SENSING FOR COGNITIVE RADIO M.Lakshmi #1, R.Saravanan *2, R.Muthaiah #3 School of Computing, SASTRA University, Thanjavur-613402, India #1 mlakshmi.s15@gmail.com *2 saravanan_r@ict.sastra.edu

More information

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

Performance Evaluation of Wi-Fi and WiMAX Spectrum Sensing on Rayleigh and Rician Fading Channels

Performance Evaluation of Wi-Fi and WiMAX Spectrum Sensing on Rayleigh and Rician Fading Channels International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 8 (August 2014), PP.27-31 Performance Evaluation of Wi-Fi and WiMAX Spectrum

More information

An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio

An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio International Journal of Engineering Research and Development e-issn: 78-067X, p-issn: 78-800X, www.ijerd.com Volume 11, Issue 04 (April 015), PP.66-71 An Optimized Energy Detection Scheme For Spectrum

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network

More information

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and

More information

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods

More information

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio 5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy

More information

Study of Turbo Coded OFDM over Fading Channel

Study of Turbo Coded OFDM over Fading Channel International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel

More information

Performance Evaluation of Energy Detector for Cognitive Radio Network

Performance Evaluation of Energy Detector for Cognitive Radio Network IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive

More information

Cognitive Radio Spectrum Access with Prioritized Secondary Users

Cognitive Radio Spectrum Access with Prioritized Secondary Users Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access

More information

Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios F. Richard Yu and Minyi Huang, Carleton University Helen Tang, Defense R&D Canada Abstract Cognitive

More information

Volume 5, Issue 9, September 2017 International Journal of Advance Research in Computer Science and Management Studies.

Volume 5, Issue 9, September 2017 International Journal of Advance Research in Computer Science and Management Studies. ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 9, September 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article

More information

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information

More information

Resource Allocation for Delay Minimization for Cognitive Radio using M-QAM, AWGN Model

Resource Allocation for Delay Minimization for Cognitive Radio using M-QAM, AWGN Model ISSN: 2454-2377, Resource Allocation for Delay Minimization for Cognitive Radio using M-QAM, AWGN Model Sonu Dabas 1 & Amanpreet Kaur 2 1 Student, EECE Department, The North Cap University, Gurugram, India

More information

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY G. Mukesh 1, K. Santhosh Kumar 2 1 Assistant Professor, ECE Dept., Sphoorthy Engineering College, Hyderabad 2 Assistant Professor,

More information

IMPROVED QR AIDED DETECTION UNDER CHANNEL ESTIMATION ERROR CONDITION

IMPROVED QR AIDED DETECTION UNDER CHANNEL ESTIMATION ERROR CONDITION IMPROVED QR AIDED DETECTION UNDER CHANNEL ESTIMATION ERROR CONDITION Jigyasha Shrivastava, Sanjay Khadagade, and Sumit Gupta Department of Electronics and Communications Engineering, Oriental College of

More information

Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence

Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence Marjan Mazrooei sebdani, M. Javad Omidi Department of Electrical and Computer

More information

Efficient CFO Compensation Method in Uplink OFDMA for Mobile WiMax

Efficient CFO Compensation Method in Uplink OFDMA for Mobile WiMax 140 J. ICT Res. Appl., Vol. 10, No. 2, 2016, 140-152 Efficient CFO Compensation Method in Uplink OFDMA for Mobile WiMax Lakshmanan Muthukaruppan 1,*, Parthasharathi Mallick 2, Nithyanandan Lakshmanan 3

More information

Spectrum sensing+puea mitigation=>effective E-health management.

Spectrum sensing+puea mitigation=>effective E-health management. Biomedical Research 2018; 29 (8): 1664-1671 ISSN 0970-938X www.biomedres.info Spectrum sensing+puea mitigation=>effective E-health management. Avila Jayapalan 1*, Prem Savarinathan 2, Venkateswarya Udayakumar

More information

Chapter 6. Agile Transmission Techniques

Chapter 6. Agile Transmission Techniques Chapter 6 Agile Transmission Techniques 1 Outline Introduction Wireless Transmission for DSA Non Contiguous OFDM (NC-OFDM) NC-OFDM based CR: Challenges and Solutions Chapter 6 Summary 2 Outline Introduction

More information

Energy Detection Technique in Cognitive Radio System

Energy Detection Technique in Cognitive Radio System International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Amr Shehab Amin 37-20200 Abdelrahman Taha 31-2796 Yahia Mobasher 28-11691 Mohamed Yasser

More information

Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla

Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla JCDM College of Engineering Sirsa, Haryana, India Abstract: One of the most challenging issues in cognitive radio systems

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Analysis of Different Spectrum Sensing Techniques in Cognitive Radio Network

Analysis of Different Spectrum Sensing Techniques in Cognitive Radio Network Analysis of Different Spectrum Sensing Techniques in Cognitive Radio Network Priya Geete 1 Megha Motta 2 Ph. D, Research Scholar, Suresh Gyan Vihar University, Jaipur, India Acropolis Technical Campus,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Performance Comparison of Channel Estimation Technique using Power Delay Profile for MIMO OFDM

Performance Comparison of Channel Estimation Technique using Power Delay Profile for MIMO OFDM Performance Comparison of Channel Estimation Technique using Power Delay Profile for MIMO OFDM 1 Shamili Ch, 2 Subba Rao.P 1 PG Student, SRKR Engineering College, Bhimavaram, INDIA 2 Professor, SRKR Engineering

More information

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of

More information

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,

More information

Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks

Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks Manuscript Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks Mahdi Mir, Department of Electrical Engineering, Ferdowsi University of Mashhad,

More information

Performance Analysis of n Wireless LAN Physical Layer

Performance Analysis of n Wireless LAN Physical Layer 120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN

More information

Optimized BPSK and QAM Techniques for OFDM Systems

Optimized BPSK and QAM Techniques for OFDM Systems I J C T A, 9(6), 2016, pp. 2759-2766 International Science Press ISSN: 0974-5572 Optimized BPSK and QAM Techniques for OFDM Systems Manikandan J.* and M. Manikandan** ABSTRACT A modulation is a process

More information

Performance Study of A Non-Blind Algorithm for Smart Antenna System

Performance Study of A Non-Blind Algorithm for Smart Antenna System International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 4 (2012), pp. 447-455 International Research Publication House http://www.irphouse.com Performance Study

More information

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering,

More information

Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems K. Jagan Mohan, K. Suresh & J. Durga Rao Dept. of E.C.E, Chaitanya Engineering College, Vishakapatnam, India

More information

Physical Layer Frame Structure in 4G LTE/LTE-A Downlink based on LTE System Toolbox

Physical Layer Frame Structure in 4G LTE/LTE-A Downlink based on LTE System Toolbox IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 1, Issue 3, Ver. IV (May - Jun.215), PP 12-16 www.iosrjournals.org Physical Layer Frame

More information

Spectrum Sensing by Scattering Operators in Cognitive Radio

Spectrum Sensing by Scattering Operators in Cognitive Radio 45, Issue 1 (2018) 13-19 Journal of Advanced Research in Applied Mechanics Journal homepage: www.akademiabaru.com/aram.html ISSN: 2289-7895 Spectrum Sensing by Scattering Operators in Cognitive Radio Open

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Sumathra T 1, Nagaraja N S 2, Shreeganesh Kedilaya B 3 Department of E&C, Srinivas School of Engineering, Mukka, Mangalore Abstract-

More information

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users Nadia Adem, Bechir Hamdaoui, and Attila Yavuz School of Electrical Engineering and Computer Science Oregon State University,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks

Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks G.Sirisha 1, D.Tejaswi 2, K.Priyanka 3 Assistant Professor, Department of Electronics and Communications Engineering, Shri Vishnu Engineering

More information

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER

More information

Creation of Wireless Network using CRN

Creation of Wireless Network using CRN Creation of 802.11 Wireless Network using CRN S. Elakkiya 1, P. Aruna 2 1,2 Department of Software Engineering, Periyar Maniammai University Abstract: A network is a collection of wireless node hosts forming

More information

Different Spectrum Sensing Techniques For IEEE (WRAN)

Different Spectrum Sensing Techniques For IEEE (WRAN) IJSRD National Conference on Technological Advancement and Automatization in Engineering January 2016 ISSN:2321-0613 Different Spectrum Sensing Techniques For IEEE 802.22(WRAN) Niyati Sohni 1 Akansha Bhargava

More information

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

Algorithm to Improve the Performance of OFDM based WLAN Systems

Algorithm to Improve the Performance of OFDM based WLAN Systems International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 27-31 Algorithm to Improve the Performance of OFDM based WLAN Systems D. Sreenivasa Rao 1, M. Kanti Kiran

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

BER Analysis for MC-CDMA

BER Analysis for MC-CDMA BER Analysis for MC-CDMA Nisha Yadav 1, Vikash Yadav 2 1,2 Institute of Technology and Sciences (Bhiwani), Haryana, India Abstract: As demand for higher data rates is continuously rising, there is always

More information

Various Sensing Techniques in Cognitive Radio Networks: A Review

Various Sensing Techniques in Cognitive Radio Networks: A Review , pp.145-154 http://dx.doi.org/10.14257/ijgdc.2016.9.1.15 Various Sensing Techniques in Cognitive Radio Networks: A Review Jyotshana Kanti 1 and Geetam Singh Tomar 2 1 Department of Computer Science Engineering,

More information

Suppression of Side-Lobes in Orthogonal Frequency Division Multiplexing based Cognitive Radio System

Suppression of Side-Lobes in Orthogonal Frequency Division Multiplexing based Cognitive Radio System Suppression of Side-Lobes in Orthogonal Frequency Division Multiplexing based Cognitive Radio System Muhammad Zahid 1, Muhammad Aamir 2, Atif Elahi 2, Sheroz Khan 3 1 MS Candidate, Department of Electronic

More information