共查询到20条相似文献,搜索用时 15 毫秒
1.
认知无线电及其原始用户检测 总被引:4,自引:0,他引:4
认知无线电系统必须能够及时检测到原始用户的工作状态以避免形成相互干扰,论文主要讨论用于频谱感知的信号检测理论。大部分人工合成的信号都可以看成是循环平稳随机过程,利用谱相关函数可以有效地检测这些信号,文中主要考虑用循环谱密度监测原始用户的可行性。此外,文章还对认知无线电中的协作检测法做了分析。 相似文献
2.
This paper investigates the performance of the primary user in a multiuser cognitive radio environment. Using spectrum sharing method, multiple cognitive users compete to share a channel dedicated to the primary user in order to transmit their data to a common receiver unit. Only one cognitive user is scheduled to share the channel, and to do so, its transmit power should not increase the primary user’s outage probability above a certain limit. The average bit error rate and the average channel capacity of the primary user are derived in this setup for different cognitive scheduling schemes. The performance measures of the primary user are found to depend on the cognitive user’s scheduling criterion and on the parameters of the communication environment. 相似文献
3.
4.
基于SVDD的认知无线电网络仿冒主用户检测技术 总被引:2,自引:0,他引:2
为了解决传统主用户感知技术无法检测认知无线电网络中的仿冒主用户(PUE)攻击问题,提出了一种基于支持向量数据描述(SVDD)的 PUE 检测方法.该方法将 PUE 攻击检测建模为一个数据不平衡的单类分类问题,采用高效的 SVDD 算法,在对 PUE 攻击一无所知的情况下,仅利用认知无线电网络中的合法用户数据训练单类分类器.将待测样本输入训练后的分类器即可实现 PUE 攻击检测.理论分析和仿真结果表明,利用该方法进行 PUE 攻击检测,可以获得较低的虚警率和漏检率. 相似文献
5.
In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the spectrum. In other words, the primary users have higher priority over the secondary users. In this paper, backlog and delay distribution bounds for both primary users and secondary users are obtained. The analysis is based on stochastic network calculus, for which, stochastic service curves are first derived for both primary users and secondary users, and the network calculus independent case analysis approach is used to find the distribution bounds. Numerical results and simulation results are also presented and discussed. 相似文献
6.
Soheil Shamaee Mahsa Shiri Mohammad Ebrahim Sabaei Masoud 《Wireless Personal Communications》2018,101(1):465-490
Wireless Personal Communications - Designing an efficient routing protocol for cognitive radio networks is critical due to the dynamic behavior of the primary users. Based on empirical studies, the... 相似文献
7.
Wireless Personal Communications - In this paper we investigate three channel allocation algorithms for multi-channel cognitive radio networks: SNR-based allocation (SA), queue-based allocation... 相似文献
8.
协作频谱感知的认知无线电网络中,已有研究表明增加参与协作频谱感知的次用户数量能够提高感知性能,进而提高信道吞吐量。然而,由于信道容量的限制,不断增加参与协作感知的次用户数量并不会使信道吞吐量无限提高,反而会使次用户平均可获得的吞吐量不断降低。针对上述问题,该文以次用户平均吞吐量为优化目标,证明多信道条件下,对于任意给定的融合参数,次用户的平均吞吐量是感知时间的凸函数,并提出交叉迭代算法进行2维优化。仿真结果表明,当信噪比为-10 dB时,次用户使用交叉迭代算法获得的平均吞吐量较已有算法可提高20%以上。 相似文献
9.
A novel cooperative spectrum sensing or- der which utilizes inactive Secondary users (SUs) efficiently based on maximum throughput has been proposed in Cog- nitive radio networks (CRNs). In order to predict the states of Primary users (PUs), we build the PU's traffic pattern as a Continuous-time Markov chain (CTMC) pro- cess. CRNs obtain the maximum throughput while SUs sense the licensed channels with the optimal order. The numerical simulation results show that the proposed or- der based on spectrum sensing scheme can achieve larger channel utilization and lower sensing overhead as compared with the spectrum sensing scheme without using the opti- mal order sensing. After considering the report overhead of SUs, the optimal number of inactive SUs for the maxi- mum throughput can be found. 相似文献
10.
认知无线电PUE攻击下次用户性能分析 总被引:2,自引:0,他引:2
随着认知无线电网络(CRN)技术的不断发展,安全问题日益受到重视.模仿主用户(PUE)是一种典型的易于实现且对 CRN 影响巨大的攻击行为,根据产生原因、目的和过程的差异,可以分为恶意不端次用户PUE和自私不端次用户PUE两类攻击.已有文献大多针对前者进行了分析,而对后者分析极少.这里重点对两者进行了区分,提出了四维连续时间马尔科夫链分析模型,详细分析了自私不端次用户 PUE攻击对正常次用户通信性能的影响,并对比了几类典型的PUE攻击检测技术.通过仿真结果可以看出:PUE攻击检测技术引入自私不端次用户检测机制极为必要,可以有效改进检测效果. 相似文献
11.
针对认知无线电系统中传统的功率限制约束无法保证主用户延时问题,本文提出了一种新的主用户有效容量约束模型,使认知无线电系统在满足认知用户共享频谱需求的同时,使主用户在延时约束下稳定传输。并基于该模型进一步推导了 Rayleigh 衰落环境下认知用户遍历容量下界性能。数值仿真结果显示了提出的约束模型能够保证主用户传输的同时提升认知用户的传输容量。 相似文献
12.
Taskeen Nadkar Vinay Thumar S. N. Merchant U. B. Desai 《Wireless Personal Communications》2014,74(1):167-187
This work is directed towards a symbiotic architecture called cognitive relaying with frequency incentive for multiple primary users (CRFI-M). The rationale of CRFI-M is that the primary users (PUs) of a cognitive radio (CR) network, with weak transmission links, seek cooperation from the secondary user (SU) nodes in their vicinity to achieve as much throughput as they can get from their direct links. In return they reward the SUs with incentive frequency bands for their own communication. Each PU has its own distinct bandwidth of operation; however, when relaying through the SU network it can also use the bandwidth of the other PUs to enhance its throughput. Furthermore, the incentive frequency bands may be offered as a complete band-set or interleaved bands. Cross-layer optimization problems are formulated for each of these variants of the CRFI-M paradigm in a multi-hop multi-channel SU network. The frequency incentive that should be awarded to the SUs by each PU is analyzed by means of a utility-based decision-making process, and its efficient utilization is proposed. To make the CRFI-M scheme practically realizable, a MAC scheduling protocol is described. Simulation results are furnished to demonstrate the proof of concept. 相似文献
13.
In cooperative cognitive radio networks (CCRNs), a licensed primary-user (PU) is allowed to leverage several unlicensed secondary-users (SUs) to relay its traffic. In this paper, a staged dynamic spectrum allocation (DSA) scheme is proposed for CCRNs. In the first stage, the network is uncongested. A simple pricing based DSA scheme is proposed for the PUs to lease their idled frequency bands to the SUs. And, hence, the initial quality of service (QoS) demands (in terms of the minimum rate requirements) of the PUs and the SUs are both satisfied through direct transmission on the allocated frequency bands. In the second stage, the network reaches the full-loaded situation. Therefore, a cooperative relaying based DSA scheme is proposed to stimulate the PUs to split more extra frequency bands to fulfill the increased QoS demands of the SUs, on condition that the QoS of the PUs are well maintained. By applying the cooperative bargaining game theory in the proposed cooperative relaying based DSA, on the one hand, the SUs can get fairness rate-rewards from the PUs according to the level of contribution that they can make to compensate the PUs for the rate-losses. Hence, the increased QoS demands of the SUs can be accommodated in short term. On the other hand, the PUs could retain the SUs successfully to obtain the long-term revenue, on condition that their QoS constraints are still satisfied. Finally, the analysis results of the proposed bargaining game theoretic DSA scheme (in the second stage) are testified through computer simulations. 相似文献
14.
15.
16.
干扰对齐(IA)是一种新兴的干扰管理技术,被广泛的应用于认知无线电(CR)网络之中,以期消除认知用户(CU)对授权用户(AU)的干扰。然而干扰对齐技术带来了授权用户接收信干噪比(SINR)的下降,使得授权用户的传输速率受到影响。在低信噪比下,授权用户性能无法保证。本文创新性地提出了两种算法设计授权用户预编码滤波器,优化其传输速率,极大地提高了授权用户的性能。同时,为了提高认知用户的性能,本文给出了认知用户的干扰抑制滤波器的优化方案,最大化认知用户的和速率。仿真结果表明,这两种算法都能在一定程度上提高授权用户的传输速率,同时认知用户的传输速率也得以保证。 相似文献
17.
Ruiliang Chen Jung-Min Park Reed J.H. 《Selected Areas in Communications, IEEE Journal on》2008,26(1):25-37
Cognitive radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs and its operational aspects are being investigated actively. However, the security aspects of spectrum sensing have garnered little attention. In this paper, we identify a threat to spectrum sensing, which we call the primary user emulation (PUE) attack. In this attack, an adversary's CR transmits signals whose characteristics emulate those of incumbent signals. The highly flexible, software-based air interface of CRs makes such an attack possible. Our investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users. To counter this threat, we propose a transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics. To estimate the location of the signal transmitter, LocDef employs a non-interactive localization scheme. Our security analysis and simulation results suggest that LocDef is effective in identifying PUE attacks under certain conditions. 相似文献
18.
Abdallah K. Farraj 《Wireless Personal Communications》2013,71(2):975-985
This article investigates how the performance of the primary user is affected by the presence of a spectrum-sharing cognitive user. The performance under both cooperative and non-cooperative cognitive schemes is considered. Primary user’s transmission rate, average channel capacity, and average bit error rate are considered as the performance measures. Moreover, the performance is compared with that of a wireless user in a Rayleigh channel, and the gain in performance is found. In addition, a process on how the primary user can accommodate a cognitive user without sacrificing its own performance is explained. Results of this work indicate that the primary user experiences a very close performance in both non-cooperative cognitive and Rayleigh environments. However, the primary user enjoys a pronounced better performance in the cooperative cognitive mode. 相似文献
19.
Hoang Anh Tuan Liang Ying-Chang Islam Md Habibul 《Mobile Computing, IEEE Transactions on》2010,9(3):348-360
We consider a point-to-multipoint cognitive radio network that shares a set of channels with a primary network. Within the cognitive radio network, a base station controls and supports a set of fixed-location wireless subscribers. The objective is to maximize the throughput of the cognitive network while not affecting the performance of primary users. Both downlink and uplink transmission scenarios in the cognitive network are considered. For both scenarios, we propose two-phase mixed distributed/centralized control algorithms that require minimal cooperation between cognitive and primary devices. In the first phase, a distributed power updating process is employed at the cognitive and primary nodes to maximize the coverage of the cognitive network while always maintaining the constrained signal to interference plus noise ratio of primary transmissions. In the second phase, centralized channel assignment is carried out within the cognitive network to maximize its throughput. Numerical results are obtained for the behaviors and performance of our proposed algorithms. 相似文献
20.
Cognitive radio requires that a secondary user (SU) stops its transmission as soon as possible upon the arrival of a primary user (PU). In this paper, we propose a novel approach to quickly detect PUs while an SU transmission is in progress. The proposed method requires an SU transmitter to use OFDM to insert periodic zero-energy intervals in a selected subcarrier and to detect energy during each interval for PU detection. The length and periodicity of these intervals determine the performance of PU detection. We also discuss how to determine the energy detection threshold. 相似文献