A Study on Quantitative Parameters of Spectrum Handoff in Cognitive Radio Networks
نویسندگان
چکیده
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the absence of the primary user and they should vacate the channel once the primary user re-enters and continue their communication on another available channel and this process in the cognitive radio is known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption caused due to the channel occupied by secondary users and maintains a good quality of service. In order to achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied extensively because they play a vital role in the spectrum handoff process moreover the impact of these parameters in various handoff methods can be used to predict the effectiveness of the system.
منابع مشابه
Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملSpectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants
The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...
متن کاملSecure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملDecentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost
Due to the spectrum varying nature of cognitive radio networks, secondary users are required to perform spectrum handoffs when the spectrum is occupied by primary users, which will lead to a handoff delay. In this paper, based on the multi-armed bandit framework of medium access in decentralized cognitive radio networks, we investigate blind spectrum selection problem of secondary users whose s...
متن کاملAttack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017