Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks

To improve spectrum efficiency, cognitive radio (CR) is designed to allow unlicensed (secondary) users to utilize the licensed spectrum when it is not used by the licensed (primary) users. Because of the dynamic nature of cognitive radio network, the resource allocation targeting at best system performance becomes more and more important. In this paper, a proposal aiming at improving the energy efficiency for cognitive radio networks and at the same time keeping an optimal system performance, is provided. On one hand, the secondary users aim to accurately sense the spectrum availability which costs them in terms of energy. On the other hand higher sensing accuracy is required to minimize the interference with primary users. An optimal balance between these contradicting goals is required. In this work, we simulate the eigenvalue ratio based detector to evaluate the relation between sensing accuracy and energy consumption. A sensing-transmission structure of secondary user in CR networks is introduced and the channel access method is simulated to analyze the normalized throughput.

[1]  Mohamed-Slim Alouini,et al.  Collaborative spectrum sensing based on upper bound on joint PDF of extreme eigenvalues , 2011, 2011 19th European Signal Processing Conference.

[2]  M. Imran,et al.  Geometric Mean Detector for Spectrum Sensing , 2011 .

[3]  S Maleki,et al.  Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks , 2011, IEEE Sensors Journal.

[4]  Olav Tirkkonen,et al.  Spectrum sensing with Gaussian approximated eigenvalue ratio based detection , 2010, 2010 7th International Symposium on Wireless Communication Systems.

[5]  R. Umarani,et al.  Data Security in Local Area Network Based on Fast Encryption Algorithm , 2010, CNSA.

[6]  Russell Jones,et al.  Network security in two-year colleges , 2010 .

[7]  Geoffrey Ye Li,et al.  Energy-Efficient Transmission in Cognitive Radio Networks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[8]  Namdeo V. Kalyankar,et al.  Penetration Testing: A Roadmap to Network Security , 2009, ArXiv.

[9]  Tim Kindberg,et al.  Authenticating Public Wireless Networks with Physical Evidence , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[10]  Raheem A. Beyah,et al.  Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC , 2009, SecureComm.

[11]  Bo Yan,et al.  Robust Detection of Unauthorized Wireless Access Points , 2009, Mob. Networks Appl..

[12]  Sudhir Aggarwal,et al.  Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[13]  Hyuk Lim,et al.  Secure Framework for Multipath Multimedia Streaming over Wireless Ad Hoc Network , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[14]  Roberto Garello,et al.  Cooperative spectrum sensing based on the limiting eigenvalue ratio distribution in wishart matrices , 2009, IEEE Communications Letters.

[15]  Damon McCoy,et al.  Mitigating Evil Twin Attacks in 802.11 , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[16]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.

[17]  Tim Jordon,et al.  Hacking: Digital Media and Technological Determinism , 2008 .

[18]  Yonghong Zeng,et al.  Eigenvalue-based spectrum sensing algorithms for cognitive radio , 2008, IEEE Transactions on Communications.

[19]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[20]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.

[21]  Volker Roth,et al.  Simple and effective defense against evil twin access points , 2008, WiSec '08.

[22]  Stephen Flowers,et al.  Harnessing the hackers: The emergence and exploitation of Outlaw Innovation , 2008 .

[23]  Raheem A. Beyah,et al.  A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[24]  Yiyang Pei,et al.  Sensing-Throughput Tradeoff in Cognitive Radio Networks: How Frequently Should Spectrum Sensing be Carried Out? , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[25]  Sachin Shetty,et al.  Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[26]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[27]  Tae-Hyung Kim,et al.  Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks , 2006, Inscrypt.

[28]  George Kurtz,et al.  Hacking Exposed , 2005 .

[29]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[30]  Raheem A. Beyah,et al.  Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[31]  Tristan Henderson,et al.  The changing usage of a mature campus-wide wireless network , 2004, MobiCom '04.

[32]  Katerina J. Argyraki,et al.  Scalable network-layer defense against internet bandwidth-flooding attacks , 2003, TNET.

[33]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[34]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[35]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[36]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[37]  Kjell Jørgen Hole,et al.  Open Wireless Networks on University Campuses , 2008, IEEE Security & Privacy.

[38]  Jack McCullough,et al.  Caution! Wireless Networking: Preventing a Data Disaster , 2004 .

[39]  Stefan Savage,et al.  Denial-of-Service Attacks : Real Vulnerabilities and Practical Solutions , 2003 .

[40]  Ivan Marsic,et al.  Fuzzy Reasoning for Wireless Awareness , 2001, Int. J. Wirel. Inf. Networks.

[41]  William Stallings,et al.  Data and Computer Communications , 1985 .

[42]  Cuihong Wu,et al.  2010 2nd International Conference on Industrial and Information Systems the Problems in Campus Network Information Security and Its Solutions , 2022 .