2021 International Conference on Information Science and Communications Technologies (ICISCT) 2021
DOI: 10.1109/icisct52966.2021.9670105
|View full text |Cite
|
Sign up to set email alerts
|

CRN and 5G based IoT: Applications, Challenges and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The policy ๐œ‹(๐‘ ) is defined as a deterministic mapping of observation from S T to A T , such that: A T = ๐œ‡(S T ). The algorithm updates the policy function iteratively using the following equation: (3) ๐‘„(S T , A T ) = ๐‘…(S T , A T ) + ๐›พ ๐‘„ (S T+1 , ๐œ‡(S T+1 )) , where S T+1 is the next state, and ๐œ‡(S T+1 ) is the next action A T taken by the agent Ag in state S T+1 . The agent uses the actor-critic method to estimate the optimal policy, where the actor estimates the policy function and the critic estimates the Q-value function.…”
Section: Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The policy ๐œ‹(๐‘ ) is defined as a deterministic mapping of observation from S T to A T , such that: A T = ๐œ‡(S T ). The algorithm updates the policy function iteratively using the following equation: (3) ๐‘„(S T , A T ) = ๐‘…(S T , A T ) + ๐›พ ๐‘„ (S T+1 , ๐œ‡(S T+1 )) , where S T+1 is the next state, and ๐œ‡(S T+1 ) is the next action A T taken by the agent Ag in state S T+1 . The agent uses the actor-critic method to estimate the optimal policy, where the actor estimates the policy function and the critic estimates the Q-value function.…”
Section: Proposed Systemmentioning
confidence: 99%
“…However, the increased number of devices and the need for higher data rates require efficient utilization of the spectrum resources [2]. Cognitive Radio Network (CRN) can address these challenges by dynamically allocating and managing the spectrum resources to IoT devices based on their requirements and availability [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…Nonrepudiation: Communicating parties in the CRN infrastructure do not want the receiver to deny receiving a message (destination nonrepudiation), and the sender to deny sending a message (source destination). Cryptology can be deployed to ensure, for example, that a CRN cannot deny it has received a request for a spectrum from PUs and SUs, and a CRN cannot deny a message received from a BS [19].…”
Section: Security In Crnmentioning
confidence: 99%
“…To make effective use of wasted spectrums, cognitive radio networks (CRNs) have received more research and development [ [1] , [2] , [3] ]. Sorted by network access priority, CRNs mainly include two types of users: primary users (PUs) and secondary users (SUs) [ 4 , 5 ]. Cognitive radio (CR) can minimize the interference ratio between the two types of users in an effective way to make better use of the available spectrums [ 6 ].…”
Section: Introductionmentioning
confidence: 99%