首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. Our objective in this paper is to analyze the security issues of the main recent developments and architectures of cognitive radio networks. We present vulnerabilities inherent to those systems, identify novel types of abuse, classify attacks, and analyze their impact on the operation of cognitive radio‐based systems. Moreover, we discuss and propose security solutions to mitigate such threats. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

2.
本文介绍了一种新型的纠错码,称之为“之型码”。之型码可以形成非常简捷的软输入/软输出译码规则,我们在Max-Log-MAP(MLM)译码方法的基础上提出了一种译码规则,这一译码规则的计算复杂度为每次迭代计算单位信息比特大约需要20次加法运算操作。在仿真实验中,我们用最优译码器和更简捷的次最优译码器进行译码时,其性能在误比特率为10^-5处分别距香农理论极限仅0.9dB和1.4dBH。此外,上述码字与2维turbo码相比具有更低的误码基底值(error floor)。  相似文献   

3.
In this paper, a cluster‐based two‐phase coordination scheme for cooperative cognitive radio networks is proposed considering both spectrum efficiency and network fairness. Specifically, candidate secondary users (SUs) are first selected by a partner selection algorithm to enter the two‐phase cooperation with primary users (PUs). In phase I, the selected SUs cooperate with PUs to acquire a fraction of time slot as a reward. In phase II, all SUs including the unselected ones share the available spectrum resources in local clusters; each of which is managed by a cluster head who participated in the cooperation in phase I. To improve the total network utility of both PUs and SUs, the maximum weighted bipartite matching is adopted in partner selection. To further improve the network performance and communication reliability, network coding is exploited during the spectrum sharing within the cluster. Simulation results demonstrate that, with the proposed cluster‐based coordination scheme, not only the PUs' transmission performance is improved, but also SUs achieve spectrum access opportunities. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

4.
Routing in a cognitive radio network operating in a dynamic environment is a complex decision problem. Diversity in the number of available spectrum bands and their stability, in addition to the secondary users' heterogeneities, affect the consequence of the routing decision. We use a decision theory framework to model the problem of routing under uncertainties involved in a cognitive radio network. A utility function is designed to capture the effect of spectrum measurement, fluctuation of bandwidth availability, and path quality. A node cognitively decides its best candidate among its neighbors by utilizing a decision tree. Each branch of the tree is quantified by the utility function and a posterior probability distribution that predicts the suitability of available neighbors. In decision tree cognitive routing (DTCR), nodes learn their operational environment and adapt their decision‐making accordingly. We compared our scheme with the optimal performance in a highly dynamic environment and local coordination‐based routing and spectrum assignment protocol [1]. Our results show that the DTCR tends to perform near optimum. It easily adapts to environmental dynamics. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

5.
为了提高认知无线网络主用户通信与次用户通信的和速率,提出了一种新的协同通信方案.该方案中主用户通过机会选择次用户是否协同自身数据传输、允许通信的次用户通过匹配最佳可用信道来最大化认知无线网络的和速率.通过建模将该和速率最大化问题表示为一个组合优化问题,进一步将问题转化为了一个等价的标准指派问题,从而提出了基于匈牙利算法的协同通信方案.仿真结果表明,所提方案显著提高了主次用户的和速率.  相似文献   

6.
认知无线电网络中基于信任的安全路由模型   总被引:1,自引:0,他引:1  
针对认知无线电网络中路由受到的选择性转发攻击,提出一种基于信任的安全路由模型。通过监视节点的数据转发行为,构建节点的信任以识别恶意节点。基于路由选择必须同频谱分配紧密结合的特点,在路由发现阶段,请求信息中封装节点的可用频谱机会并避免发送给恶意节点。在路由选择阶段,利用节点信任构建可用路径信任,结合延时度量进行路由决定。同时,根据节点的信任划分对其服务请求采取不同的响应,对非可信节点的恶意行为采取更严厉的惩罚,从而激励节点在路由中的合作。仿真结果及分析表明,在选择性转发攻击下,该模型较已有模型在网络吞吐率、端到端延迟方面都有较好的表现。  相似文献   

7.
This paper presents a study on multicast communications in cognitive radio networks (CRNs)using directional antennas. The objective is to maximize the throughput of the CRN. The spectrum is divided into multiple channels and licensed to the primary network. While the CRN is accessing the spectrum, the interference power is carefully controlled to avoid impacting the operation of the primary network. The mathematical model is presented and subsequently formulated as a mixed integer non‐linear programming (MINLP) problem, which is non‐deterministic polynomial‐time hard. Therefore, a greedy algorithm is designed to approximate the optimal performance. The MINLP problem is then relaxed and an upper bound is developed. Simulation results are presented to compare the performance of the greedy algorithm and the upper bound, which demonstrates the efficacy of the greedy algorithm as well as the tightness of the upper bound. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

8.
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter–receiver link(s). However, CRs must form a cognitive radio network (CRN) so that the messages can be forwarded from source to destination, on top of a number of opportunistic links from co‐existing multi‐radio systems. Unfortunately, appropriate routing in CRN of coexisting multi‐radio systems remains an open problem. We explore the fundamental behaviors of CR links to conclude three major challenges, and thus decompose general CRN into cognitive radio relay network (CRRN), CR uplink relay network, CR downlink relay network, and tunneling (or core) network. Due to extremely dynamic nature of CR links, traditional routing to maintain end‐to‐end routing table for ad hoc networks is not feasible. We locally build up one‐step forward table at each CR to proceed based on spectrum sensing to determine trend of paths from source to destination, while primary systems (PSs) follow original ways to forward packets like tunneling. From simulations over ad hoc with infrastructure network topology and random network topology, we demonstrate such simple routing concept known as CRN local on‐demand (CLOD) routing to be realistic at reasonable routing delay to route packets through. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

9.
In this paper, a new practical dirty paper coding scheme and its extension is proposed for interference mitigation of a single TV broadcast station in uplink and downlink of a cognitive radio network using both a single secondary user (SU) and multiple SU scenarios. In the single SU scenario, which is called interference cognitive radio channel, derived simulation results show that the transmission rate of the SU archives the capacity of an AWGN channel with the cost of a 2.5 dB extra signal‐to‐noise ratio. In the sequel, the proposed scheme is extended to a multiple SU scenario using direct sequence spread spectrum technique in both uplink and downlink considering a TV band. Derived simulation results show that the number of supportable SUs in our proposed scheme increases to a fully loaded scenario of the same multiuser direct sequence spread spectrum system. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
Compressive sensing is an emerging technique in cognitive radio systems, through which sub‐Nyquist sampling rates can be achieved without loss of significant information. In collaborative spectrum sensing networks with multiple secondary users, the problem is to find a reliable and fast sensing method and to secure communication between members of the same network. The method proposed in this paper provides both quick and reliable detection through compressive sensing and security through the use of deterministic chaotic sensing matrices. Deterministic matrices have an advantage over random ones since they are easier to generate and store. Moreover, it is much easier to verify whether a deterministic matrix satisfies the conditions for compressive sensing compared with random matrices, which is what makes them an interesting area of research in compressive sensing. Also, it would be a great advantage if the sensing matrices also provide inherent security, which is the motivation for using chaotic matrices in this paper, since any slight changes in the chaotic parameters result in highly uncorrelated chaotic sequences, hence entirely different sensing matrices. This makes it impossible to reconstruct the signal without proper knowledge of the parameters used to generate the sensing matrix. They can also be easily regenerated by knowing the correct initial values and parameters. Additionally, new modifications are proposed to the existing structures of chaotic matrices. The performance of chaotic sensing matrices for both existing and modified structures is compared with that of random sensing matrices.  相似文献   

11.
The cognitive radio (CR) technology appears as an attractive solution to effectively allocate the radio spectrum among the licensed and unlicensed users. With the CR technology the unlicensed users take the responsibility of dynamically sensing and accessing any unused channels (frequency bands) in the spectrum allocated to the licensed users. As spectrum sensing consumes considerable energy, predictive methods for inferring the availability of spectrum holes can reduce energy consumption of the unlicensed users to only sense those channels which are predicted to be idle. Prediction‐based channel sensing also helps to improve the spectrum utilization (SU) for the unlicensed users. In this paper, we demonstrate the advantages of channel status prediction to the spectrum sensing operation in terms of improving the SU and saving the sensing energy. We design the channel status predictor using two different adaptive schemes, i.e., a neural network based on multilayer perceptron (MLP) and the hidden Markov model (HMM). The advantage of the proposed channel status prediction schemes is that these schemes do not require a priori knowledge of the statistics of channel usage. Performance analysis of the two channel status prediction schemes is performed and the accuracy of the two prediction schemes is investigated. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

12.
In this paper, a new channel allocation and re‐location scheme is proposed for cognitive radio users to efficiently utilize available spectrums. We also present a multiple‐dimension Markov analytical chain to evaluate the performance of this scheme. Both analytical results and simulation results demonstrate that the new scheme can enhance the radio system performance significantly in terms of blocking probability, dropping probability, and throughput of second users. The proposed scheme can work as a non‐server‐based channel allocation, which has practical values in real engineering design. Copyright ©2011 John Wiley & Sons, Ltd.  相似文献   

13.
Numerous research articles exist for backbone formation in wireless networks; however, they cannot be applied straightforward in cognitive radio network (CRN) due to its peculiar characteristics. Since virtual backbone has many advantages such as reduced routing overhead, dynamic maintenance, and fast convergence speed, we intend to propose a backbone formation protocol in CRN. In this paper, we propose a tree‐based backbone formation protocol along with its maintenance. Our protocol is based on non‐iterative approach, thus leading towards limited message overhead and faster convergence speed. The proposed algorithm first forms the tree by maintaining the parent‐child relationship, and second, the parent nodes are connected together to form the virtual backbone. In the end, we evaluate the performance our protocol through extensive simulations.  相似文献   

14.
In this paper,we present a non-transferable utility coalition graph game(NTU-CGG) based resource allocation scheme with relay selection for a downlink orthogonal frequency division multiplexing(OFDMA) based cognitive radio networks to maximize both system throughput and system fairness.In this algorithm,with the assistance of others SUs,SUs with less available channels to improve their throughput and fairness by forming a directed tree graph according to spectrum availability and traffic demands of SUs.So this scheme can effectively exploit both space and frequency diversity of the system.Performance results show that,NTU-CGG significantly improves system fairness level while not reducing the throughput comparing with other existing algorithms.  相似文献   

15.
The degree distribution has a great influence on the performance of Luby transform (LT) codes.Based on the link maintain model of cognitive radio system,the novel degree distribution of LT codes was obtained by using the THOA (two-layer hierarchical optimization algorithm) to combine the IPD (improved poisson distribution) which achieved high decoding success rate with low overhead and the robust soliton distribution (RSD) which achieved high decoding success rate with high overhead.Simulation results show that the proposed method with application to link maintenance in cognitive radio system can improve the reliability and efficiency of secondary communication.  相似文献   

16.
Cognitive radio network (CRN) is an emerging technology that can increase the utilization of spectrum underutilized by primary users (PUs). In the literature, most exiting investigations on CRNs have focused on how secondary users (SUs) can coexist harmlessly with the PUs. Despite the importance of such a coexistence issue, it is also crucial to investigate the coexistence of SUs because (i) the PUs usually rarely use the licensed spectrum and (ii) the advantages of CRN will significantly increase the number of SUs in the future. To address this challenging issue, we propose, in this paper, an optimal randomized spectrum access scheme, whose main ideas include the following: (i) an SU shares its sensing results with neighboring SUs and (ii) with the regional sensing results, an SU will access available channels with a non‐uniform probability distribution. We first formulate a multichannel optimal randomized multiple access (MC‐ORMA) problem that aims to maximize the throughput of the CRN; we then develop efficient distributed algorithms to solve the MC‐ORMA problem; we derive the closed‐form value of collision probability for each SU; and finally, we conduct extensive numerical experiments and compare our theoretical analysis with simulation results to demonstrate the advantages of our scheme. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

17.
Networking cognitive radios and nodes from primary system (PS) results in a heterogeneous coexisting multi‐radio wireless network, so that significant network throughput gain can be achieved. However, by investigating cognitive radio network (CRN) architecture, the links in CRNs are unlikely to support complete security check due to link dynamics, opportunistic availability, and uni‐directional in available time window. We therefore introduce trusted cognitive radio networking (TCRN) concept to facilitate network functions such as association in dynamic spectrum access and routing. First of all, we explore the mathematical framework for trust in CRNs. We then show successful association of node to CRN based on the mathematical structure of trust from statistical decision theory. Furthermore, we modify the machine‐learning algorithm to update the trust measure for each node, and develop rules of thumbs to facilitate TCRN with learning capability, based on numerical simulations. Trusted CRN can greatly alleviate heterogeneous challenge for CRN operation. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

18.
一种在Rayleigh信道中计算级联码性能的理论方法   总被引:3,自引:0,他引:3  
本文结合单级编码的性能与信道调制特性,提出一种从理论上计算级联码在Rayleigh信道误比特率的方法。将计算机仿真需要做的繁琐工作瞬间完成,节省了大量的人力和机时。由此方法得到的计算结果显示出级联码优异的性能,将为级联码的研究提供有力的帮助。  相似文献   

19.
In this paper, we discussed the issues of QoS multicast routing in cognitive radio ad hoc networks. The problem of our concern was: given a cognitive radio ad hoc network and a QoS multicast request, how to find a multicast tree so that the total bandwidth consumption of the multicast is minimized while the QoS requirements are met. We proposed two methods to solve it. One is a two‐phase method. In this method, we first employed a minimal spanning tree‐based algorithm to construct a multicast tree and then proposed a slot assignment algorithm to assign timeslots to the tree links such that the bandwidth consumption of the tree is minimized. The other is an integrated method that considers the multicast routing together with the slot assignment. Extensive simulations were conducted to show the performance of our proposed methods. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

20.
In this paper, a novel spectrum‐sensing scheme, called adaptive dual‐radio spectrum‐sensing scheme (ADRSS), is proposed for cognitive radio networks. In ADRSS, each secondary user (SU) is equipped with a dual radio. During the data transmission, with the received signal‐to‐noise ratio of primary user (PU) signal, the SU transmitter (SUT) and the SU receiver (SUR) are selected adaptively to sense one channel by one radio while communicating with each other by the other one. The sensing results of the SUR are sent to the SUT through feedback channels (e.g., ACK). After that, with the sensing results from the SUT or the SUR, the SUT can decide whether the channel switching should be carried out. The theoretical analysis and simulation results indicate that the normalized channel efficiency, defined as the expected ratio of time duration without interference to PUs in data transmission to the whole frame length, can be improved while satisfying the interference constraint to PUs. After that, an enhanced ADRSS is designed by integrating ADRSS with cooperative spectrum sensing, and the performance of ADRSS under imperfect feedback channel is also discussed. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号