Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication 2008
DOI: 10.1145/1352793.1352818
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive radio network architecture

Abstract: Cognitive radios shall form cognitive radio network (CRN) to complete the packets delivery. As cognitive radio network is a general multihop wireless heterogeneous network, trust becomes a critical factor for network layer functions and network operation. We explore and develop the mathematical framework of trust in CRN, to further develop trusted routing with relevant explorations on network layer and above functions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(43 citation statements)
references
References 19 publications
0
42
0
1
Order By: Relevance
“…This forces SU to stop using frequency band and it is vacated. The another PUE attack is Induced PUE attack, in this attack the attacker advertises the high frequency signals [12] so that SU fails to identify the presence of PU. In co-ordinated PUE attack, many malicious nodes will co-ordinate with each other to launch attacks on different channels so that as many as CRN's become disrupted.…”
Section: Primary User Emulation Attackmentioning
confidence: 99%
“…This forces SU to stop using frequency band and it is vacated. The another PUE attack is Induced PUE attack, in this attack the attacker advertises the high frequency signals [12] so that SU fails to identify the presence of PU. In co-ordinated PUE attack, many malicious nodes will co-ordinate with each other to launch attacks on different channels so that as many as CRN's become disrupted.…”
Section: Primary User Emulation Attackmentioning
confidence: 99%
“…Transmit power control is a feature that enables a device to dynamically switch between several transmission power levels according to environment status such as path loss, interference value, SNR thresholds, link data rate etc. It allows transmission at the allowable limits when necessary, but reduces the transmitter power to a lower level to allow greater sharing of spectrum when higher power operation is not necessary [17,18]. The transmissions techniques can be classified into two types: overlay and underlay approach.…”
Section: Dynamic Spectrum Management Andmentioning
confidence: 99%
“…Security management is needed in the radio to provide trust worthy communication. Due to the heterogeneity of Cognitive Radio Networks, routing and topology information at network nodes will get complex [17][18]. Good mobility and connection management can help neighborhood discovery and detect available service, which help cognitive radios to select route and networks.…”
Section: Fig 8: Cognitive Radio Architecturementioning
confidence: 99%
“…In terms of architecture, the most common architectural categorisation described in the literature classifies CRN as either centralised (infrastructure based), distributed (ad hoc based) or mesh architectures [7][8][9][10]. Another important description of the primary-secondary network architecture in CRN is based on the interference agreements between the two networks.…”
Section: Introductionmentioning
confidence: 99%