Abstract
Mobile devices are advancing every day, creating a need for higher bandwidth. Because both the bandwidth and spectrums are limited, maximizing the utilization of a spectrum is a target for next-generation technologies. Government agencies lease different spectrums to different mobile operators, resulting in the underutilization of spectrums in some areas. For some operators, limited licensed spectrums are insufficient, and using others’ unused spectrums becomes necessary. The unlicensed usage of others’ spectrums is possible if the licensed users are not using the spectrum, and this gives rise to the idea of cognitive radio networks (CRNs). In CRN architecture, each user must determine the status of a spectrum before using it. In this chapter, we present the complete architecture of CRN, and we additionally discuss other scenarios including the applications of the CRN. After the Federal Communications Commission (FCC) declared the 5 GHz band unlicensed, Wi-Fi, LTE, and other wireless technologies became willing to access the band, leading to a competition for the spectrums. Because of this, ensuring that the spectrum is fairly shared among different technologies is quite challenging. While other works on DSRC and Wi-Fi sharing exist, in this chapter, we discuss LTE and Wi-Fi sharing specifically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Yoshimachi and Y. Manabe, “A new AODV route discovery protocol to achieve fair routing for mobile ad hoc networks,” in 2016 6th International Conference on Information Communication and Management (ICICM), Oct 2016, pp. 222–226.
M. Zareei, E. M. Mohamed, M. H. Anisi, C. V. Rosales, K. Tsukamoto, and M. K. Khan, “On-demand hybrid routing for cognitive radio ad-hoc network,” IEEE Access, vol. 4, pp. 8294–8302, 2016.
R. Abdelrassoul, E. Fathy, and M. S. Zaghloul, “Comparative study of spectrum sensing for cognitive radio system using energy detection over different channels,” in 2016 World Symposium on Computer Applications Research (WSCAR), Mar 2016.
I. F. Akyildiz, W. y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 40–48, Apr 2008.
A. Wisniewska, “Spectrum sharing in cognitive radio networks: A survey,” 2014.
K. Kim, I. A. Akbar, K. K. Bae, J. S. Um, C. M. Spooner, and J. H. Reed, “Cyclostationary approaches to signal detection and classification in cognitive radio,” in 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Apr 2007.
N. Muchandi and R. Khanai, “Cognitive radio spectrum sensing: A survey,” in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Mar 2016.
S. Sinha, S. Mehfiiz, and S. Urooj, “Energy detection of unknown signals over rayleigh fading channel,” in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Feb 2014.
S. K. Rashed, R. Shahbazian, and S. A. Ghorashi, “Spectrum decision in cognitive radio networks using multi-armed bandit,” in 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), Oct 2015.
J. Martyna, “Green power control in underlaying cognitive radio networks,” in 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Nov 2016.
H. W. Kuhn, “The hungarian method for the assignment problem,” Naval Research Logistics Quarterly, vol. 2, 1955.
Y. Zhang, “Spectrum handoff in cognitive radio networks: Opportunistic and negotiated situations,” in 2009 IEEE International Conference on Communications, Jun 2009.
D. M. Alias and R. G. K, “Cognitive radio networks: A survey,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Mar 2016.
I. Christian, S. Moh, I. Chung, and J. Lee, “Spectrum mobility in cognitive radio networks,” IEEE Communications Magazine, vol. 50, no. 6, Jun 2012.
I. A. Akbar and W. H. Tranter, “Dynamic spectrum allocation in cognitive radio using hidden Markov models: Poisson distributed case,” in Proceedings 2007 IEEE SoutheastCon, March 2007.
C. H. Park, S. W. Kim, S. M. Lim, and M. S. Song, “Hmm based channel status predictor for cognitive radio,” in 2007 Asia-Pacific Microwave Conference, Dec 2007.
Z. Chen and R. C. Qiu, “Prediction of channel state for cognitive radio using higher-order hidden Markov model,” in Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), Mar 2010.
J. Li, Z. Feng, Z. Feng, and P. Zhang, “A survey of security issues in cognitive radio networks,” China Communications, vol. 12, no. 3, Mar 2015.
G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Godor, and M. Street, “Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead,” IEEE Communications Surveys Tutorials, vol. 14, no. 2, Second 2012.
R. K. Sharma and D. B. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 2, Secondquarter 2015.
D. Salam, A. Taggu, and N. Marchang, “An effective emitter-source localisation-based puea detection mechanism in cognitive radio networks,” in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept 2016.
Z. Ma, W. Chen, K. B. Letaief, and Z. Cao, “A semi range-based iterative localization algorithm for cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 2, Feb 2010.
Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in 2009 IEEE International Conference on Communications, June 2009.
Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Rez, “Modeling primary user emulation attacks and defenses in cognitive radio networks,” in 2009 IEEE 28th International Performance Computing and Communications Conference, Dec 2009.
R. Chen, J. M. Park, and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, Jan 2008.
S. Nath, N. Marchang, and A. Taggu, “Mitigating SSDF attack using k-medoids clustering in cognitive radio networks,” in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2015.
K. Rina, S. Nath, N. Marchang, and A. Taggu, “Can clustering be used to detect intrusion during spectrum sensing in cognitive radio networks?” IEEE Systems Journal, vol. PP, no. 99, 2017.
S. Bhattacharjee, R. Keitangnao, and N. Marchang, “Association rule mining for detection of colluding SSDF attack in cognitive radio networks,” in 2016 International Conference on Computer Communication and Informatics (ICCCI), Jan 2016.
F. Zeng, J. Li, J. Xu, and J. Zhong, “A trust-based cooperative spectrum sensing scheme against SSDF attack in CRNS,” in 2016 IEEE Trustcom/BigDataSE/ISPA, Aug 2016.
R. Chen, J. M. Park, and K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Apr 2008.
T. Bansal, B. Chen, and P. Sinha, “Fastprobe: Malicious user detection in cognitive radio networks through active transmissions,” in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Apr 2014.
S. Anand, Z. Jin, and K. P. Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks,” in 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Oct 2008.
Y. Liu, P. Ning, and H. Dai, “Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” in 2010 IEEE Symposium on Security and Privacy, May 2010.
C. Chen, H. Cheng, and Y. D. Yao, “Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack,” IEEE Transactions on Wireless Communications, vol. 10, no. 7, July 2011.
S. R. Group, “The prospect of LTE and Wi-Fi sharing unlicensed spectrum: Good fences make good neighbors,” February 2015.
FCC, “Revision of part 15 of the commissions rules to permit unlicensed national information infrastructure (U-NII) devices in the 5 GHz band,” February 2013.
H.R.821, “Wi-Fi innovation act,” https://www.congress.gov/bill/114th-congress/house-bill/821.
A. M. Cavalcante, E. Almeida, R. D. Vieira, S. Choudhury, E. Tuomaala, K. Doppler, F. Chaves, R. C. D. Paiva, and F. Abinader, “Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands,” in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Jun 2013.
D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” in Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM.New York, NY, USA: ACM, 2013.
J.-M. J. P. Gaurang Naik, Jinshan Liu, “Coexistence of dedicated short range communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance,” in IEEE International Conference on Computer Communications, June 2017.
Acknowledgements
This research was supported in part by NSF grants CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, and CNS 1439672. We would also like to express our gratitude to the people who provided support, comments, information, proofreading, and formatting.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Biswas, R., Wu, J. (2018). Cognitive Radio Network Technologies and Applications. In: Arya, K., Bhadoria, R., Chaudhari, N. (eds) Emerging Wireless Communication and Network Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-0396-8_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-0396-8_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0395-1
Online ISBN: 978-981-13-0396-8
eBook Packages: Computer ScienceComputer Science (R0)