ABSTRACT
Cognitive Radio (CR) is an emerging radio mechanism that dynamically adjusts its radio parameters, so as to utilize the unused spectrum bands (spectrum holes) to overcome the spectrum shortage problem. The wireless devices are increasing enormously and leading to the problem of spectrum shortage. In CR, the available free spectrum is allocated to unlicensed users (Secondary Users) but not by disrupting the communications of licensed users (Primary Users). Hence, it is essential to distinguish the signals of Primary Users (PUs) from that of Secondary Users (SUs) at physical layer, without understanding the data in the signal. In this paper we proposed an algorithm to authenticate PUs at physical layer in Cognitive Radio Network (CRN), using signal properties like Angle of Arrival (AoA) and its distance. The proposed algorithm is simulated in Matlab and its performance is evaluated and is found to be efficient in simulated environment.
- Čabrić, D., Mishra, S. M., Willkomm, D., Brodersen, R., & Wolisz, A. (2005, June). A cognitive radio approach for usage of virtual unlicensed spectrum. In Proc. of 14th IST mobile wireless communications summit, 1--4.Google Scholar
- Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691--1708. Google ScholarDigital Library
- Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio networks. Communications Magazine, IEEE, 46(4), 40--48. Google ScholarDigital Library
- Kim, H. S. (2011). Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications, 34(4), 1160--1167. Google ScholarDigital Library
- Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387--1398. Google ScholarDigital Library
- Akan, O. B., Karli, O., & Ergul, O. (2009). Cognitive radio sensor networks.Network, IEEE, 23(4), 34--40. Google ScholarDigital Library
- Zhu, L., & Mao, H. (2010, December). Research on authentication mechanism of cognitive radio networks based on certification authority. In Computational Intelligence and Software Engineering (CiSE), 2010 International Conference,1--5. IEEE.Google Scholar
- Liu, Y., Ning, P., & Dai, H. (2010, May). Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Security and Privacy (SP), 2010 IEEE Symposium, 286--301, IEEE. Google ScholarDigital Library
- Bhattacharjee, S., Rajkumari, R., & Marchang, N. (2014) Cognitive Radio Networks Security Threats and Attacks: A Review, Journal of Computer Applications, ICICT, 16--19.Google Scholar
- Srbinovska, M., Dimcev, V., Gavrovski, C., & Kokolanski, Z. (2011). Localization Techniques in Wireless Sensor Networks using Measurement of Received Signal Strength Indicator.Google Scholar
- Godara, L. C. (1997). Application of antenna arrays to mobile communications. II. Beam-forming and direction-of-arrival considerations. Proceedings of the IEEE,85(8), 1195--1245.Google ScholarCross Ref
Index Terms
- Primary User Authentication in Cognitive Radio Network using Signal Properties
Recommendations
Power trading in cognitive radio networks
Cognitive radio technology has been proposed to improve spectrum utilization by sharing the frequency spectrum bands between licensed and unlicensed users, called primary users (PUs) and secondary users (SUs), respectively. The main objective of the SUs ...
Synthetic aperture radar construction of spectrum map for cognitive radio networking
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferenceTo network cognitive radios that require spectrum sensing to identify transmission opportunities emerges as a critical technology to facilitate spectrum efficient wireless communications. We propose to apply synthetic aperture radar technology to ...
Routing Management Algorithm Based on Spectrum Trading and Spectrum Competition in Cognitive Radio Networks
BWCCA '12: Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and ApplicationsTraditionally in routing approaches, each node allows a maximum load through the selected route. The existing routing approaches in cognitive radio networks (CRN) do not take into account spectrum trading as well as spectrum competition among licensed ...
Comments