Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is...
详细信息
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is the first standard based on CR is developed to increase the efficiency of TV bands. However the physical layer security of IEEE 802.22 has been studied rarely. In this paper, we propose a scheme to sense the specific primary user for dealing with Primary User Emulation (PUE) Attack which is a possible threat to wireless security. According to ATSC digital TV which is one of the important PUs, we estimate the accuracies of pilot and symbol rate as RF fingerprint (RFF), and Support Vector Data Description (SVDD) is introduced to sense the fine differences of RFF to distinguish PUE attacker from PU. The simulation results show that the proposed scheme is feasible to verify the PUE attacker at a relative high SNR level.
Aiming at the modulation recognition problem of mixed signal set {BPSK, QPSK, BPSK-FM, QPSK-FM} with unknown parameters, this paper proposes a modulation recognition algorithm based on two-fold PLL (phase locked loop)...
详细信息
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting...
详细信息
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting in spectrum handoff. A joint spectrum handoff delay and link maintenance optimization problem for spectrum handoff is formulated in this paper. A binary shuffled frog leaping algorithm (SFLA) based algorithm is proposed to solve this problem. Simulations show that the proposed algorithm performs far better than random target channel visiting scheme. It can obtain solutions with low handoff delay and low probability of handoff failure which are very close to the optimal solutions.
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ...
详细信息
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, band edges detection and clustering, for modulated wideband converter (MWC) based cognitive radio system at sub-Nyquist rate is proposed. Simulations show that with a sub-Nyquist sampling rate, the proposed spectrum sensing procedure can locate spectrum holes correctly.
Since the advancement of mobile communicationtechnology, traditional industries are gradually transforming and upgrading, which leads to problems such as insufficient computing resources and excessive energy consumpt...
详细信息
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi...
详细信息
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivity. This paper proposes distributed consensus algorithms for decision fusion based cooperative spectrum sensing. Both theoretical analysis and simulations are performed to show the convergence property of the algorithms. Results show that the proposed algorithms can realize central OR, AND, and M-out-of-n decision fusion rules by locally exchanging information among each radio and its adjacent neighbors in a distributed way.
The military strategic guideline under the new situation points out that the base point of future war preparation is to win the informationized war mainly from the direction of unmanned cluster. Routing protocol is an...
详细信息
As the space environment of information transmission becomes more and more complex, the accuracy of communication becomes a new challenge. In order to study the anti-jamming performance of code shift keying (CSK), thi...
详细信息
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign...
详细信息
A method of time difference of arrival (TDOA) location for shortwave signal source by four receiving stations is introduced. The precision of time difference and the Geometric Dilution of Precision (GDOP) of TDOA loca...
详细信息
暂无评论