• 제목/요약/키워드: PHY-layer sensing

검색결과 3건 처리시간 0.014초

인지 무선 네트워크에서 시스템 비용함수를 이용한 적응적 센싱주기 (Sensing Period Adaptation using the Cost Function in the Cognitive Radio Networks)

  • 고상;박형근
    • 전기학회논문지
    • /
    • 제61권2호
    • /
    • pp.321-323
    • /
    • 2012
  • Cognitive radio has been recently proposed to dynamically access unused-spectrum. Since the spectrum availability for opportunistic access is determined by spectrum sensing, sensing is identified as one of the most crucial issues of cognitive radio networks. The PHY-layer sensing, as a part of spectrum sensing in cognitive radio, concerns the sensing mechanism to determine channel to be sensed and to access. One of the important issues in the PHY-layer sensing control is to find an available sensing period and trade-off between spectrum sensing and data transmission. In this paper, we show the relationship between spectrum sensing and data transmission according to the sensing period. We analyze and propose the new scheme to evaluate optimal sensing period.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Adaptive Cross-Layer Resource Optimization in Heterogeneous Wireless Networks with Multi-Homing User Equipments

  • Wu, Weihua;Yang, Qinghai;Li, Bingbing;Kwak, Kyung Sup
    • Journal of Communications and Networks
    • /
    • 제18권5호
    • /
    • pp.784-795
    • /
    • 2016
  • In this paper, we investigate the resource allocation problem in time-varying heterogeneous wireless networks (HetNet) with multi-homing user equipments (UE). The stochastic optimization model is employed to maximize the network utility, which is defined as the difference between the HetNet's throughput and the total energy consumption cost. In harmony with the hierarchical architecture of HetNet, the problem of stochastic optimization of resource allocation is decomposed into two subproblems by the Lyapunov optimization theory, associated with the flow control in transport layer and the power allocation in physical (PHY) layer, respectively. For avoiding the signaling overhead, outdated dynamic information, and scalability issues, the distributed resource allocation method is developed for solving the two subproblems based on the primal-dual decomposition theory. After that, the adaptive resource allocation algorithm is developed to accommodate the timevarying wireless network only according to the current network state information, i.e. the queue state information (QSI) at radio access networks (RAN) and the channel state information (CSI) of RANs-UE links. The tradeoff between network utility and delay is derived, where the increase of delay is approximately linear in V and the increase of network utility is at the speed of 1/V with a control parameter V. Extensive simulations are presented to show the effectiveness of our proposed scheme.