A Spectrum Access with User Cooperation in Heterogeneous Cognitive Radio Networks

Cognitive radio system consists of multiple wireless accesses that cover overlapping area, and cognitive terminals that use one or more of the wireless accesses simultaneously. In cognitive radio systems, secondary users can share the spectrum with the primary user as long as the quality of service (QoS) of the primary system is guaranteed. However, the system throughput of the cognitive system will be limited when the QoS requirement is stringent. We had proposed the architecture of the cognitive radio system, the inter-system handover protocols and packet format designed to achieve fast handover among the radio systems.

[1]  H. Anandakumar,et al.  Handover based spectrum allocation in cognitive radio networks , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[2]  Suzan Bayhan,et al.  Satellite Assisted Spectrum Agility Concept , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Didem Gözüpek,et al.  A novel handover protocol to prevent hidden node problem in satellite assisted cognitive radio networks , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[4]  Yin Zhang,et al.  A general model of wireless interference , 2007, MobiCom '07.

[5]  Qingqi Pei,et al.  A Trust Value-Based Spectrum Allocation Algorithm in CWSNs , 2013, Int. J. Distributed Sens. Networks.

[6]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[7]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[8]  K. Umamaheswari,et al.  Energy Efficient Network Selection using 802.16g based GSM Technology , 2014, J. Comput. Sci..

[9]  Sherali Zeadally,et al.  Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey , 2013, IEEE Communications Surveys & Tutorials.

[10]  M. Sivakumar,et al.  An effective group formation in the cloud based on Ring signature , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[11]  Hyunsung Kim Privacy Preserving Security Framework for Cognitive Radio Networks , 2013 .

[12]  K. Mythili,et al.  Trust management approach for secure and privacy data access in cloud computing , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[13]  H. Anandakumar,et al.  Hierarchical cost effective leach for heterogeneous wireless sensor networks , 2015, 2015 International Conference on Advanced Computing and Communication Systems.

[14]  S. Divya,et al.  An improved spectral efficiency of WiMAX using 802.16G based technology , 2015, 2015 International Conference on Advanced Computing and Communication Systems.

[15]  Yanghee Choi,et al.  Understanding interference and carrier sensing in wireless mesh networks , 2009, IEEE Communications Magazine.