• Title/Summary/Keyword: Primary Users

Search Result 651, Processing Time 0.025 seconds

PERFORMANCE ANALYSIS OF COGNITIVE NETWORK WITH PRIMARY AND SECONDARY CHANNELS

  • Lee, Yutae
    • East Asian mathematical journal
    • /
    • v.29 no.1
    • /
    • pp.101-107
    • /
    • 2013
  • We consider a cognitive network with a primary and a secondary channel. Primary users have higher priority on the usage of the primary channel, and secondary users are allowed to opportunistically access the primary channel at times when the channel is not occupied by primary users. The secondary channel is dedicated only to secondary users. An analytical model is presented to obtain the performance of an opportunistic spectrum access using both the primary and secondary channels, and is validated by simulations.

Opportunistic Relaying Based Spectrum Leasing for Cognitive Radio Networks

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun;Koo, In-Soo
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.50-55
    • /
    • 2011
  • Spectrum leasing for cognitive radio (CR) networks is an effective way to improve the spectrum utilization. This paper presents an opportunistic relaying based spectrum leasing for CR networks where the primary users lease their frequency band to the cognitive users. The cognitive users act as relays for the primary users to improve the channel capacity, and this improved capacity is used for the transmission of secondary users' data. We show that the cognitive users can use a significant portion of the communication resource of primary networks while maintaining a fixed target data rate for the primary users. Moreover, the primary network is also benefited by the cooperating cognitive users in terms of outage probability. Information theoretic analysis and simulation results are presented to evaluate the performances of both primary and cognitive networks.

An Integrated Game Theoretical Approach for Primary and Secondary Users Spectrum Sharing in Cognitive Radio Networks

  • Kim, Jong-Gyu;Nguyen, Khanh-Huy;Lee, Jung-Tae;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1549-1558
    • /
    • 2011
  • In this paper, we address the problem of bandwidth sharing among multiple primary users and multiple secondary users in a cognitive radio network. In cognitive radio networks, effective spectrum assignment for primary and secondary users is a challenge due to the available broad range of radio frequency spectrum as well as the requisition of harmonious coexistence of both users. To handle this problem, firstly, Bertrand game model is used to analyze a spectrum pricing in which multiple primary users emulate with each other to acquire maximal profit. After that, we employ Cournot game to model the spectrum sharing of secondary users to obtain optimal profit for each user also. Simulation results show that our scheme obtains optimal solution at Nash equilibrium.

RawPEACH: Multiband CSMA/CA-Based Cognitive Radio Networks

  • Chong, Jo-Woon;Sung, Young-Chul;Sung, Dan-Keun
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.175-186
    • /
    • 2009
  • A new medium access control (MAC) scheme embedding physical channels into multiband carrier sense multiple access/collision avoidance (CSMA/CA) networks is proposed to provide strict quality of service (QoS) guarantee to high priority users. In the proposed scheme, two priority classes of users, primary and secondary users, are supported. For primary users physical channels are provided to ensure strict QoS, whereas secondary users are provided with best-effort service using CSMA/CA modified for multiband operation. The performance of the proposed MAC scheme is investigated using a new multiband CSMA/CA Markov chain model capturing the primary user activity and the operation of secondary users in multiple bands. The throughput of secondary users is obtained as a function of the primary user activity and other CSMA/CA parameters. It is shown that the new MAC scheme yields larger throughput than the conventional single-band CSMA/CA when both schemes use the same bandwidth.

An Efficient Admission Control Algorithm to Keep Connections of Secondary Users in Cognitive Radio Systems (인지 무선 시스템에서 이차 사용자의 다자 수용 및 연결 유지를 위한 효율적인 알고리즘에 대한 연구)

  • Ha, Seong-Cheol;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.464-468
    • /
    • 2007
  • In cognitive radio systems, secondary users, unlicensed users, can use primary users' spectrum to increase spectrum efficiency. At that time, the systems must satisfy primary users' QoS. When secondary users use cognitive radio systems, secondary users communication can be terminated, because of satisfying primary users' QoS. However, secondary users' communication terminating is not good for both secondary users and whole systems. So, cognitive radio systems need an efficient algorithm for secondary users of admission control and keeping connections. In this paper, we present an algorithm which consist of two part, admission control and connections control.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

An Oligopoly Spectrum Pricing with Behavior of Primary Users for Cognitive Radio Networks

  • Lee, Suchul;Lim, Sangsoon;Lee, Jun-Rak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1192-1207
    • /
    • 2014
  • Dynamic spectrum sharing is a key technology to improve spectrum utilization in wireless networks. The elastic spectrum management provides a new opportunity for licensed primary users and unlicensed secondary users to efficiently utilize the scarce wireless resource. In this paper, we present a game-theoretic framework for dynamic spectrum allocation where the primary users rent the unutilized spectrum to the secondary users for a monetary profit. In reality, due to the ON-OFF behavior of the primary user, the quantity of spectrum that can be opportunistically shared by the secondary users is limited. We model this situation with the renewal theory and formulate the spectrum pricing scheme with the Bertrand game, taking into account the scarcity of the spectrum. By the Nash-equilibrium pricing scheme, each player in the game continually converges to a strategy that maximizes its own profit. We also investigate the impact of several properties, including channel quality and spectrum substitutability. Based on the equilibrium analysis, we finally propose a decentralized algorithm that leads the primary users to the Nash-equilibrium, called DST. The stability of the proposed algorithm in terms of convergence to the Nash equilibrium is also studied.

A Communication Protocol Based on Safety Zone for Solving Hidden Node Problem in Cognitive Radio Networks (Cognitive Radio 네트워크에서 Hidden Node 문제 해결을 위한 Safety Zone 기반의 통신 프로토콜)

  • Jeong, Pil-Jung;Shin, Yo-An;Lee, Won-Cheol;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.8-15
    • /
    • 2008
  • Cognitive radio technology enables to share the spectrum dedicated to primary users. In CR network, it is of primary concern to protect the primary users. Thus, it is required to periodically sense the spectrums occupied by primary users and adapt the communication parameters used by CR users to protect the primary users. However, it is inevitable to experience the hidden node problem due to the primary users, that are not detected by spectrum sensing. To perfectly protect the primary users, it is essential to address the hidden node problem in CR network. In this paper, we propose a new approach to handle the hidden node problem and evaluate the performance of proposed scheme.

Spectrum Usage Forecasting Model for Cognitive Radio Networks

  • Yang, Wei;Jing, Xiaojun;Huang, Hai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1489-1503
    • /
    • 2018
  • Spectrum reuse has attracted much concern of researchers and scientists, however, the dynamic spectrum access is challenging, since an individual secondary user usually just has limited sensing abilities. One key insight is that spectrum usage forecasting among secondary users, this inspiration enables users to obtain more informed spectrum opportunities. Therefore, spectrum usage forecasting is vital to cognitive radio networks (CRNs). With this insight, a spectrum usage forecasting model for the occurrence of primary users prediction is derived in this paper. The proposed model is based on auto regressive enhanced primary user emergence reasoning (AR-PUER), which combines linear prediction and primary user emergence reasoning. Historical samples are selected to train the spectrum usage forecasting model in order to capture the current distinction pattern of primary users. The proposed scheme does not require the knowledge of signal or of noise power. To verify the performance of proposed spectrum usage forecasting model, we apply it to the data during the past two months, and then compare it with some other sensing techniques. The simulation results demonstrate that the spectrum usage forecasting model is effective and generates the most accurate prediction of primary users occasion in several cases.

Cognitive Radio Based Spectrum Sharing: Evaluating Channel Availability via Traffic Pattern Prediction

  • Li, Xiukui;Zekavat, Seyed A. (Reza)
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.104-114
    • /
    • 2009
  • In this paper, a technique is proposed that enables secondary users to evaluate channel availability in cognitive radio networks. Here, secondary users estimate the utilization of channels via predicting the traffic pattern of primary user, and select a proper channel for radio transmission. The proposed technique reduces the channel switching rate of secondary users (the rate of switching from one channel to another) and the interference on primary users, while maintaining a reasonable call blocking rate of secondary users.