Skip to main content

Cognitive Radio Network Technologies and Applications

  • Chapter
  • First Online:
Emerging Wireless Communication and Network Technologies
  • 1098 Accesses

Abstract

Mobile devices are advancing every day, creating a need for higher bandwidth. Because both the bandwidth and spectrums are limited, maximizing the utilization of a spectrum is a target for next-generation technologies. Government agencies lease different spectrums to different mobile operators, resulting in the underutilization of spectrums in some areas. For some operators, limited licensed spectrums are insufficient, and using others’ unused spectrums becomes necessary. The unlicensed usage of others’ spectrums is possible if the licensed users are not using the spectrum, and this gives rise to the idea of cognitive radio networks (CRNs). In CRN architecture, each user must determine the status of a spectrum before using it. In this chapter, we present the complete architecture of CRN, and we additionally discuss other scenarios including the applications of the CRN. After the Federal Communications Commission (FCC) declared the 5 GHz band unlicensed, Wi-Fi, LTE, and other wireless technologies became willing to access the band, leading to a competition for the spectrums. Because of this, ensuring that the spectrum is fairly shared among different technologies is quite challenging. While other works on DSRC and Wi-Fi sharing exist, in this chapter, we discuss LTE and Wi-Fi sharing specifically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Yoshimachi and Y. Manabe, “A new AODV route discovery protocol to achieve fair routing for mobile ad hoc networks,” in 2016 6th International Conference on Information Communication and Management (ICICM), Oct 2016, pp. 222–226.

    Google Scholar 

  2. M. Zareei, E. M. Mohamed, M. H. Anisi, C. V. Rosales, K. Tsukamoto, and M. K. Khan, “On-demand hybrid routing for cognitive radio ad-hoc network,” IEEE Access, vol. 4, pp. 8294–8302, 2016.

    Google Scholar 

  3. R. Abdelrassoul, E. Fathy, and M. S. Zaghloul, “Comparative study of spectrum sensing for cognitive radio system using energy detection over different channels,” in 2016 World Symposium on Computer Applications Research (WSCAR), Mar 2016.

    Google Scholar 

  4. I. F. Akyildiz, W. y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 40–48, Apr 2008.

    Google Scholar 

  5. A. Wisniewska, “Spectrum sharing in cognitive radio networks: A survey,” 2014.

    Google Scholar 

  6. K. Kim, I. A. Akbar, K. K. Bae, J. S. Um, C. M. Spooner, and J. H. Reed, “Cyclostationary approaches to signal detection and classification in cognitive radio,” in 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Apr 2007.

    Google Scholar 

  7. N. Muchandi and R. Khanai, “Cognitive radio spectrum sensing: A survey,” in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Mar 2016.

    Google Scholar 

  8. S. Sinha, S. Mehfiiz, and S. Urooj, “Energy detection of unknown signals over rayleigh fading channel,” in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Feb 2014.

    Google Scholar 

  9. S. K. Rashed, R. Shahbazian, and S. A. Ghorashi, “Spectrum decision in cognitive radio networks using multi-armed bandit,” in 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), Oct 2015.

    Google Scholar 

  10. J. Martyna, “Green power control in underlaying cognitive radio networks,” in 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Nov 2016.

    Google Scholar 

  11. H. W. Kuhn, “The hungarian method for the assignment problem,” Naval Research Logistics Quarterly, vol. 2, 1955.

    Google Scholar 

  12. Y. Zhang, “Spectrum handoff in cognitive radio networks: Opportunistic and negotiated situations,” in 2009 IEEE International Conference on Communications, Jun 2009.

    Google Scholar 

  13. D. M. Alias and R. G. K, “Cognitive radio networks: A survey,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Mar 2016.

    Google Scholar 

  14. I. Christian, S. Moh, I. Chung, and J. Lee, “Spectrum mobility in cognitive radio networks,” IEEE Communications Magazine, vol. 50, no. 6, Jun 2012.

    Google Scholar 

  15. I. A. Akbar and W. H. Tranter, “Dynamic spectrum allocation in cognitive radio using hidden Markov models: Poisson distributed case,” in Proceedings 2007 IEEE SoutheastCon, March 2007.

    Google Scholar 

  16. C. H. Park, S. W. Kim, S. M. Lim, and M. S. Song, “Hmm based channel status predictor for cognitive radio,” in 2007 Asia-Pacific Microwave Conference, Dec 2007.

    Google Scholar 

  17. Z. Chen and R. C. Qiu, “Prediction of channel state for cognitive radio using higher-order hidden Markov model,” in Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), Mar 2010.

    Google Scholar 

  18. J. Li, Z. Feng, Z. Feng, and P. Zhang, “A survey of security issues in cognitive radio networks,” China Communications, vol. 12, no. 3, Mar 2015.

    Google Scholar 

  19. G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Godor, and M. Street, “Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead,” IEEE Communications Surveys Tutorials, vol. 14, no. 2, Second 2012.

    Google Scholar 

  20. R. K. Sharma and D. B. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 2, Secondquarter 2015.

    Google Scholar 

  21. D. Salam, A. Taggu, and N. Marchang, “An effective emitter-source localisation-based puea detection mechanism in cognitive radio networks,” in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept 2016.

    Google Scholar 

  22. Z. Ma, W. Chen, K. B. Letaief, and Z. Cao, “A semi range-based iterative localization algorithm for cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 2, Feb 2010.

    Google Scholar 

  23. Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in 2009 IEEE International Conference on Communications, June 2009.

    Google Scholar 

  24. Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Rez, “Modeling primary user emulation attacks and defenses in cognitive radio networks,” in 2009 IEEE 28th International Performance Computing and Communications Conference, Dec 2009.

    Google Scholar 

  25. R. Chen, J. M. Park, and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, Jan 2008.

    Google Scholar 

  26. S. Nath, N. Marchang, and A. Taggu, “Mitigating SSDF attack using k-medoids clustering in cognitive radio networks,” in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2015.

    Google Scholar 

  27. K. Rina, S. Nath, N. Marchang, and A. Taggu, “Can clustering be used to detect intrusion during spectrum sensing in cognitive radio networks?” IEEE Systems Journal, vol. PP, no. 99, 2017.

    Google Scholar 

  28. S. Bhattacharjee, R. Keitangnao, and N. Marchang, “Association rule mining for detection of colluding SSDF attack in cognitive radio networks,” in 2016 International Conference on Computer Communication and Informatics (ICCCI), Jan 2016.

    Google Scholar 

  29. F. Zeng, J. Li, J. Xu, and J. Zhong, “A trust-based cooperative spectrum sensing scheme against SSDF attack in CRNS,” in 2016 IEEE Trustcom/BigDataSE/ISPA, Aug 2016.

    Google Scholar 

  30. R. Chen, J. M. Park, and K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Apr 2008.

    Google Scholar 

  31. T. Bansal, B. Chen, and P. Sinha, “Fastprobe: Malicious user detection in cognitive radio networks through active transmissions,” in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Apr 2014.

    Google Scholar 

  32. S. Anand, Z. Jin, and K. P. Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks,” in 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Oct 2008.

    Google Scholar 

  33. Y. Liu, P. Ning, and H. Dai, “Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” in 2010 IEEE Symposium on Security and Privacy, May 2010.

    Google Scholar 

  34. C. Chen, H. Cheng, and Y. D. Yao, “Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack,” IEEE Transactions on Wireless Communications, vol. 10, no. 7, July 2011.

    Google Scholar 

  35. S. R. Group, “The prospect of LTE and Wi-Fi sharing unlicensed spectrum: Good fences make good neighbors,” February 2015.

    Google Scholar 

  36. FCC, “Revision of part 15 of the commissions rules to permit unlicensed national information infrastructure (U-NII) devices in the 5 GHz band,” February 2013.

    Google Scholar 

  37. H.R.821, “Wi-Fi innovation act,” https://www.congress.gov/bill/114th-congress/house-bill/821.

  38. A. M. Cavalcante, E. Almeida, R. D. Vieira, S. Choudhury, E. Tuomaala, K. Doppler, F. Chaves, R. C. D. Paiva, and F. Abinader, “Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands,” in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Jun 2013.

    Google Scholar 

  39. D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” in Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM.New York, NY, USA: ACM, 2013.

    Google Scholar 

  40. J.-M. J. P. Gaurang Naik, Jinshan Liu, “Coexistence of dedicated short range communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance,” in IEEE International Conference on Computer Communications, June 2017.

    Google Scholar 

Download references

Acknowledgements

This research was supported in part by NSF grants CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, and CNS 1439672. We would also like to express our gratitude to the people who provided support, comments, information, proofreading, and formatting.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rajorshi Biswas or Jie Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Biswas, R., Wu, J. (2018). Cognitive Radio Network Technologies and Applications. In: Arya, K., Bhadoria, R., Chaudhari, N. (eds) Emerging Wireless Communication and Network Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-0396-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0396-8_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0395-1

  • Online ISBN: 978-981-13-0396-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics