IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 611 A FRAMEWORK FOR DATA TRAFFIC IN COGNITIVE RADIO NET- WORKS USING TRUSTED TOKEN ANALYZER SCHEME Nikitha Lee Joy1 , Sangeetha Senthilkumar2 , S.Sathyaraj3 1 PG Student, Oxford Engineering College, Trichy 2 Assistant Professor, Oxford Engineering College, Trichy 3 Assistant Professor, Oxford Engineering College, Trichy Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra- dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys- tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man- agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cognitive radio is a recent novel approach for the realization of intelligent and sophisticated wireless systems. Software Defined Radio, a recent development in wireless technology, promise to address some of the major limitations like ineffi- cient utilization and management of the radio frequency (RF) in both licensed and unlicensed spectrum band experienced by legacy wireless communication system. A radio that is able to reliably sense the spectral environment over a wide band- width, detect the presence/absence of legacy users and use the spectrum only if communication does not interfere with any primary user is called a cognitive radio. The seminal paper of J. Mitola [8] introduced the concept of cognitive radio. Ian F. Akyildiz et al. [1] defines cognitive radio as: “A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it oper- ates”. Cognitive radio networks are composed of cognitive radio devices. An interconnected set of cognitive radio devices that share information is defined as a cognitive radio networks. (CRN).Cognitive radio networks (CRN) are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access (DSA) techniques. Cognitive Radio Networks aim at performing the cognitive operations such as sensing the spectrum, managing available resources, and making user-independent, intelligent decisions based on cooperation of multiple cognitive nodes. CR networks however impose unique challenges because of the high fluctuation in the available spectrum as well as the diverse quality-of-service (QoS) requirements of various ap- plications and secondary users. To address these challenges, first, CR networks are required to determine which portions of the spectrum are available, called spectrum sensing [2], [10]. Furthermore, how to coordinate multiple CR users to share the spectrum band, called spectrum sharing, is another important issue in CR networks [6], [16].Secondary users have to vacate the channel for the primary user, when they arrive, called spectrum mobility is another aspect of CRN.Fig.1shows the dynamic spectrum management framework [2]. Spectrum de- cision in CRN refers to the ability of the secondary users to select the best available spectrum band to satisfy the user‟s quality of service requirements. Quality of Service for the sec- ondary users involves data traffic management. Fig 1: Dynamic Spectrum Management Framework
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 612 To improve spectrum efficiency in cognitive radio networks, many operations such as sharing data in cooperative spectrum sensing, broadcasting spectrum-aware routing information, and coordinating spectrum access rely on control message are exchanged on a common control channel. Thus, a reliable and „„always on‟‟ control channel is unavoidable in CRN. 2. RELATED WORKS 2.1 Spectrum Decision For spectrum allocation, a global optimization scheme is de- veloped based on graph theory [17]. Distributed spectrum al- location based on local bargaining is proposed in [4], where CR users negotiate spectrum assignment within local self- organized groups. In [20], a dynamic channel selection scheme is developed for delay-sensitive applications based on a priority queuing analysis and a decentralized learning algo- rithm. 2.2 QoS Management /Data Traffic Management QoS support in CR systems is critical to ensure its success in consumer wireless market .In contrast to traditional wireless communication networks, one of the major challenges faced in cognitive radio networks is the interruptions from primary users. The service of packets in cognitive radio network has to be interrupted when primary users emerges. Usually, the emergence of primary user is assumed to be stationary., Such an assumption may not be true in practical means, since the traffic pattern of primary users could be time variant. [9] Spe- cifies transient analysis of data traffic in cognitive radio net- works. A time-varying service capacity is discussed in [12] to widen the application. The problem of designing effective routing solutions for multi-hop CRNs, which is a focal issue to fully unleash the potentials of the cognitive networking paradigm, is focused in [25]. 3. PROPOSED SYSTEM 3.1 System Model Primary radio nodes are the legacy users and they can access their respective licensed bands without any restriction. Indeed, PR nodes have the highest priority to access the channels and should not be interrupted by the CR nodes. We consider an OSS environment, where secondary users equipped with CRs are operating over N orthogonal frequency channels that are licensed to legacy(primary) users. One of the nodes is considered as head node or server. It involves the trusted token analyzer scheme and location verification schemes. Fig 2: General Framework In cognitive radio network each spectrum band is characte- rized based on local observations and on statistical informa- tion of the primary networks which is normally called PU ac- tivities. The selection of the most appropriate spectrum band is the next step in spectrum decision, based on the spectrum band characterization. Thirdly, a CR should be able to reconfigure its transceiver parameters to support communication within the selected spectrum band. Once the spectrum decision is made, and a particular spectrum is chosen for secondary data transmission, the rendezvous process is initiated. Link establishment in distributed cognitive radio networks requires the communicating nodes to be rendezvous to exchange control Figure 2 specifies the general frame work for CR transmis- sion. Geo-location database contains the information like the channel condition, capacity of the channel etc. The primary user activity is monitored in spectrum sensing along with the sensing of unused or under-utilized spectrum. Based on these information the spectrum decision is made which involves the spectrum characterization and also the quality of the service and users quality requirement are monitored here. Based on the decision the channel is selected for CR transmission.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 613 Fig 3: Trusted Token Analyzer 3.2 Probabilistic Location Verification Location verification is an effective defense against attacks which take advantage of a lack, or compromise, of location information in the spectrum sensing. Beacon nodes[ Fig 3] will perform the spectrum observation. Beacon nodes will collect all the local information and the availability of the spectrum holes. Beacon nodes will hand over these local ob- servations to the head node. Head node involves probabilistic location verification scheme which will in turn locate the loca- tion of the spectrum holes. The location of the identified spec- trum hole is indeed verified in probabilistic location verifica- tion against fake spectrum hole information. 3.3 Trusted Token Analyzer Scheme The general architecture for traffic management [fig 2] in- volves a server with trusted token analyzer, Attack resistant location estimation and location verification. Fig 3 gives the specific view of the trusted token analyzer scheme. Token bucket algorithm is used for generating tokens. The bucket represents a rate-limiting function of the policer on the inter- face input or output traffic .Each token in the bucket represents a “credit” for some number of bits, and tokens in the bucket are “cashed in” for the ability to receive or transmit traffic that conforms to a rate limit configured for the policer. The token arrival rate is the fixed bits-per-second rate at which tokens are added to the token bucket, but only up to the speci- fied depth of the bucket. Tokens are added based on the in- formation from the quality monitoring and the primary user activity monitoring. If both are satisfied a token is added into the bucket. The token bucket depth defines the capacity of the bucket in bytes.CR transmission takes place only when there are sufficient tokens are available in the bucket, thus control- ling or policing the traffic. When the sender needs to send a packet to the receiver, it will confirm the server for the availability of enough tokens. If enough tokens are available then the sender will send the packet. If the packet is received by any intermediate node, then it will analyze the location reference and it will again confirm the traffic conditions to the server and will then for- ward the packet to the destination. Once the packet is received by the intended receiver, it can view the message by opening the packet. 4. CONCLUSIONS Spectrum Sensing is performed to identify the spectrum avail- ability. Each CR performs spectrum sensing to identify the available spectrum bands and the spectrum decision process selects from these available bands for opportunistic use. A framework proposed here is an effective way of managing the secondary user data transmission by keeping track of the pri- mary user activity and also the QoS requirement of the sec- ondary users. The QoS requirement for secondary users is managed by using trusted token analyzer. Trusted token ana- lyzer manages the users by controlling the user data traffic. FUTURE WORK Cognitive Radio Network is a vast field to study. QoS re- quirement monitoring for the secondary user is one of the pa- rameter we are going to focus in future. Also the primary user emulation attack is another consideration. REFERENCES [1]. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohan- ty,“Next generation /dynamicspectrum access/cognitive radio wireless networks: a survey,” Computer Networks: The Inter- national Journal of Computer and Telecommunications Net- working, vol. 50 , Issue 13, pp. 2127 – 2159, 2006. [2]. D. Cabric, S.M. Mishra, and R.W. Brodersen, “Implemen- tation Issues in Spectrum Sensing for Cognitive Radios,” Proc. IEEE Asilomar Conf. Signals, Systems and Computers, pp. 772-776, Nov. 2004. [3]. M.T Masonta, M. Mzyece, N.Ntlatlapa, “Spectrum Deci- sion in Cognitive Radio Networks: A Survey” IEEE Commu- nications Surveys and Tutorials, vol. 15, no. 3, pp. 1088-1107 [4]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005. [5]. Jarkko Paavola, “ Operational Challenges for Emerging
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 614 Cognitive Radio Technologies -Wireless Devices Utilizing TV White Spaces”, Proceeding of the 10th Conference of FRUCT Association [6]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [7]. T. Chen, H. Zhang, G.M. Maggio, and I. Chlamtac, “CogMesh: A Cluster-Based Cognitive Radio Network,” Proc. IEEE Second Symp.New Frontiers in Dynamic Spectrum Access Networks (DySPAN),pp. 168-178, Apr. 2007 [8]. J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communica- tions, vol. 6, no. 4, pp. 13–18, 1999. [9]. Husheng Li, Ju Bin Song, and Zhu Han; “Transient Anal- ysis of Data Traffic in Cognitive Radio Networks: A Non- Equilibrium Statistical Mechanics Approach” ; IEEE Transac- tions On Wireless Communications, Vol. 12, No. 9, Septem- ber 2013 [10]. M. Gandetto and C. Regazzoni, “Spectrum Sensing: A Distributed Approach for Cognitive Terminals,” IEEE J. Se- lected Areas in Comm., vol. 25, no. 3, pp. 546-557, Apr. 2007. [11]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005 [12]. C.-S. Chang and J.A. Thomas, “Effective bandwidth in high-speed digital networks”, IEEE Journal on Selected Areas in Communications, Vol. 13, NO 6, August 1995 [13]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [14]. F. Borgonovo, M. Cesana, and L. Fratta, “Throughput and delay bounds for cognitive transmissions,” Advances Ad hoc Netw., pp. 179–190, Aug. 2008.. [15]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks(DySPAN ‟05), pp. 269-278, Nov. 2005. [16]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005 [17]. C. Peng, H. Zheng, and B.Y. Zhao, “Utilization and Fairness in Spectrum Assignment for Opportunistic Spectrum Access,” ACM Mobile Networks and Applications, vol. 11, no. 4, pp. 555-576, Aug. 2006. [18]. G. Ganesan, Y.G. Li, Cooperative spectrum sensing in cognitive radio networks, in: Proc. IEEE DySPAN 2005, No- vember 2005, pp. 137–143. [19]. D. Cabric, et. al., A Cognitive Radio Approach for Usage of Virtual Unlicensed Spectrum. In proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [20]. H. Shiang and M. Schaar, “Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applica- tions over Cognitive Radio Networks,” IEEE Trans. Multime- dia, vol. 5,no. 10, pp. 896-909, Aug. 2008. [21]. T. Harrold, R. Cepeda, and M. Beach, “Long-term mea- surements of spectrum occupancy characteristics,” in Proceed- ings of the IEEE DySPAN Conference, 2011, pp. 83–89. [22]. B. Canberk, I. F. Akyildiz, and S. Oktug, “Primary user activity modeling using first-difference filter clustering and correlation in cognitive radio networks,” IEEE/ACM Transac- tions on Networking, vol. 19, no. 1, pp. 170–183, Feb. 2011. [23]. Y.-C. Kuo, “Quorum-based power-saving multicast pro- tocols in the asynchronous ad-hoc network,” Computer Net- works, vol. 54, pp.1911–1922, 2010 [24]. D. Cabric, S.M. Mishra, D. Willkomm, R. Brodersen, A.Wolisz, “A Cognitive radio approach for usage of virtual unlicensed spectrum”, in: Proc. 14th IST Mobile and Wireless Communications Summit, June 2005. [25]. L. Cao, H. Zheng, Distributed spectrum allocation via localVbargaining, in: Proc. IEEE Sensor and Ad Hoc Com- municationsVand Networks (SECON) 2005, September 2005, pp.475–486. [26]. W.-Y. Lee and I. F. Akyildiz, “A spectrum decision framework for cognitive radio networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 161–174, Feb. 2011. [27]. J. Riihijarvi, P. Mahonene, M. Wellens, and M. Gordziel, “Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields,” in Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mo- bile Radio Communications, Cannes, Sep. 15–18 2008. [28]. D. Cabric, S.M. Mishra, R.W. Brodersen, “Implementa- tion issues in spectrum sensing for cognitive radios”, in: Proc. 38th Asilomar Conference on Signals, Systems and Comput- ers 2004, November 2004, pp. 772–776. [29]. M. Hoyhtya, S. Pollin, and A. Mammela, “Improving the performance of cognitive radios through classification, learn- ing, and predictive channel selection,” Advances in Electron- ics and Telecommunications, vol. 2, no. 4, pp. 28–38, Dec. 2011. [30]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005. [31]. C. Ghosh, S. Pagadarai, D. Agrawal, and A. Wyglinski, “A framework for statistical wireless spectrum occupancy modeling,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 38–44, Jan. 2010 [32]. E.Z Tragos, S.Zeadally, A.G. Fragkiadakis, V. A.Siris, “Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey” , IEEE Communications Surveys & Tutorials, Accepted For Publication 1 [33].http://www.channelpartnersonline.com/blogs/peertopeer/ 2014/01/spectrum-sharing-drives-mobile-market-growth.aspx [34].http://www.gonzalovazquezvilar.eu/cognitiveradio.htm [35]. Cognitive Radio Networks: From Theory to Practice By Ahmed Khattab, Dmitri Perkins, Magdy Bayoumi [36]. M. Cesana,F. Cuomo, E.Ekici ; “Routing in cognitive radio networks: Challenges and solutions” Ad Hoc Netwoks ELSEVIER Volume 9, Issue 3, May 2011.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 615 [37]. A. A. Daoud, M. Alanyali, and D. Starobinski, “Second- ary pricing of spectrum in cellular CDMA networks,” in Proc. IEEE Int. Symposium for New Frontiers in DySPAN, Dublin, Ireland, Apr. 17–20 2007 [38]. Norfolk State University Norfolk VA 23504 in@nsu.edu Ma Liangping ; Shen Chi Xin, Chunsheng Dept. of Computer Science. "Path-Centric Channel Assignment in Cognitive Ra- dio Wireless Networks ". 2007. [39]. A. Ghasemi, E.S. Sousa, Collaborative spectrum sensing for opportunistic access in fading environment, in: Proc. IEEE DySPAN 2005, November 2005, pp. 131–136.

A framework for data traffic in cognitive radio net works using trusted token analyzer scheme

  • 1.
    IJRET: International Journalof Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 611 A FRAMEWORK FOR DATA TRAFFIC IN COGNITIVE RADIO NET- WORKS USING TRUSTED TOKEN ANALYZER SCHEME Nikitha Lee Joy1 , Sangeetha Senthilkumar2 , S.Sathyaraj3 1 PG Student, Oxford Engineering College, Trichy 2 Assistant Professor, Oxford Engineering College, Trichy 3 Assistant Professor, Oxford Engineering College, Trichy Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra- dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys- tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man- agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cognitive radio is a recent novel approach for the realization of intelligent and sophisticated wireless systems. Software Defined Radio, a recent development in wireless technology, promise to address some of the major limitations like ineffi- cient utilization and management of the radio frequency (RF) in both licensed and unlicensed spectrum band experienced by legacy wireless communication system. A radio that is able to reliably sense the spectral environment over a wide band- width, detect the presence/absence of legacy users and use the spectrum only if communication does not interfere with any primary user is called a cognitive radio. The seminal paper of J. Mitola [8] introduced the concept of cognitive radio. Ian F. Akyildiz et al. [1] defines cognitive radio as: “A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it oper- ates”. Cognitive radio networks are composed of cognitive radio devices. An interconnected set of cognitive radio devices that share information is defined as a cognitive radio networks. (CRN).Cognitive radio networks (CRN) are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access (DSA) techniques. Cognitive Radio Networks aim at performing the cognitive operations such as sensing the spectrum, managing available resources, and making user-independent, intelligent decisions based on cooperation of multiple cognitive nodes. CR networks however impose unique challenges because of the high fluctuation in the available spectrum as well as the diverse quality-of-service (QoS) requirements of various ap- plications and secondary users. To address these challenges, first, CR networks are required to determine which portions of the spectrum are available, called spectrum sensing [2], [10]. Furthermore, how to coordinate multiple CR users to share the spectrum band, called spectrum sharing, is another important issue in CR networks [6], [16].Secondary users have to vacate the channel for the primary user, when they arrive, called spectrum mobility is another aspect of CRN.Fig.1shows the dynamic spectrum management framework [2]. Spectrum de- cision in CRN refers to the ability of the secondary users to select the best available spectrum band to satisfy the user‟s quality of service requirements. Quality of Service for the sec- ondary users involves data traffic management. Fig 1: Dynamic Spectrum Management Framework
  • 2.
    IJRET: International Journalof Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 612 To improve spectrum efficiency in cognitive radio networks, many operations such as sharing data in cooperative spectrum sensing, broadcasting spectrum-aware routing information, and coordinating spectrum access rely on control message are exchanged on a common control channel. Thus, a reliable and „„always on‟‟ control channel is unavoidable in CRN. 2. RELATED WORKS 2.1 Spectrum Decision For spectrum allocation, a global optimization scheme is de- veloped based on graph theory [17]. Distributed spectrum al- location based on local bargaining is proposed in [4], where CR users negotiate spectrum assignment within local self- organized groups. In [20], a dynamic channel selection scheme is developed for delay-sensitive applications based on a priority queuing analysis and a decentralized learning algo- rithm. 2.2 QoS Management /Data Traffic Management QoS support in CR systems is critical to ensure its success in consumer wireless market .In contrast to traditional wireless communication networks, one of the major challenges faced in cognitive radio networks is the interruptions from primary users. The service of packets in cognitive radio network has to be interrupted when primary users emerges. Usually, the emergence of primary user is assumed to be stationary., Such an assumption may not be true in practical means, since the traffic pattern of primary users could be time variant. [9] Spe- cifies transient analysis of data traffic in cognitive radio net- works. A time-varying service capacity is discussed in [12] to widen the application. The problem of designing effective routing solutions for multi-hop CRNs, which is a focal issue to fully unleash the potentials of the cognitive networking paradigm, is focused in [25]. 3. PROPOSED SYSTEM 3.1 System Model Primary radio nodes are the legacy users and they can access their respective licensed bands without any restriction. Indeed, PR nodes have the highest priority to access the channels and should not be interrupted by the CR nodes. We consider an OSS environment, where secondary users equipped with CRs are operating over N orthogonal frequency channels that are licensed to legacy(primary) users. One of the nodes is considered as head node or server. It involves the trusted token analyzer scheme and location verification schemes. Fig 2: General Framework In cognitive radio network each spectrum band is characte- rized based on local observations and on statistical informa- tion of the primary networks which is normally called PU ac- tivities. The selection of the most appropriate spectrum band is the next step in spectrum decision, based on the spectrum band characterization. Thirdly, a CR should be able to reconfigure its transceiver parameters to support communication within the selected spectrum band. Once the spectrum decision is made, and a particular spectrum is chosen for secondary data transmission, the rendezvous process is initiated. Link establishment in distributed cognitive radio networks requires the communicating nodes to be rendezvous to exchange control Figure 2 specifies the general frame work for CR transmis- sion. Geo-location database contains the information like the channel condition, capacity of the channel etc. The primary user activity is monitored in spectrum sensing along with the sensing of unused or under-utilized spectrum. Based on these information the spectrum decision is made which involves the spectrum characterization and also the quality of the service and users quality requirement are monitored here. Based on the decision the channel is selected for CR transmission.
  • 3.
    IJRET: International Journalof Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 613 Fig 3: Trusted Token Analyzer 3.2 Probabilistic Location Verification Location verification is an effective defense against attacks which take advantage of a lack, or compromise, of location information in the spectrum sensing. Beacon nodes[ Fig 3] will perform the spectrum observation. Beacon nodes will collect all the local information and the availability of the spectrum holes. Beacon nodes will hand over these local ob- servations to the head node. Head node involves probabilistic location verification scheme which will in turn locate the loca- tion of the spectrum holes. The location of the identified spec- trum hole is indeed verified in probabilistic location verifica- tion against fake spectrum hole information. 3.3 Trusted Token Analyzer Scheme The general architecture for traffic management [fig 2] in- volves a server with trusted token analyzer, Attack resistant location estimation and location verification. Fig 3 gives the specific view of the trusted token analyzer scheme. Token bucket algorithm is used for generating tokens. The bucket represents a rate-limiting function of the policer on the inter- face input or output traffic .Each token in the bucket represents a “credit” for some number of bits, and tokens in the bucket are “cashed in” for the ability to receive or transmit traffic that conforms to a rate limit configured for the policer. The token arrival rate is the fixed bits-per-second rate at which tokens are added to the token bucket, but only up to the speci- fied depth of the bucket. Tokens are added based on the in- formation from the quality monitoring and the primary user activity monitoring. If both are satisfied a token is added into the bucket. The token bucket depth defines the capacity of the bucket in bytes.CR transmission takes place only when there are sufficient tokens are available in the bucket, thus control- ling or policing the traffic. When the sender needs to send a packet to the receiver, it will confirm the server for the availability of enough tokens. If enough tokens are available then the sender will send the packet. If the packet is received by any intermediate node, then it will analyze the location reference and it will again confirm the traffic conditions to the server and will then for- ward the packet to the destination. Once the packet is received by the intended receiver, it can view the message by opening the packet. 4. CONCLUSIONS Spectrum Sensing is performed to identify the spectrum avail- ability. Each CR performs spectrum sensing to identify the available spectrum bands and the spectrum decision process selects from these available bands for opportunistic use. A framework proposed here is an effective way of managing the secondary user data transmission by keeping track of the pri- mary user activity and also the QoS requirement of the sec- ondary users. The QoS requirement for secondary users is managed by using trusted token analyzer. Trusted token ana- lyzer manages the users by controlling the user data traffic. FUTURE WORK Cognitive Radio Network is a vast field to study. QoS re- quirement monitoring for the secondary user is one of the pa- rameter we are going to focus in future. Also the primary user emulation attack is another consideration. REFERENCES [1]. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohan- ty,“Next generation /dynamicspectrum access/cognitive radio wireless networks: a survey,” Computer Networks: The Inter- national Journal of Computer and Telecommunications Net- working, vol. 50 , Issue 13, pp. 2127 – 2159, 2006. [2]. D. Cabric, S.M. Mishra, and R.W. Brodersen, “Implemen- tation Issues in Spectrum Sensing for Cognitive Radios,” Proc. IEEE Asilomar Conf. Signals, Systems and Computers, pp. 772-776, Nov. 2004. [3]. M.T Masonta, M. Mzyece, N.Ntlatlapa, “Spectrum Deci- sion in Cognitive Radio Networks: A Survey” IEEE Commu- nications Surveys and Tutorials, vol. 15, no. 3, pp. 1088-1107 [4]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005. [5]. Jarkko Paavola, “ Operational Challenges for Emerging
  • 4.
    IJRET: International Journalof Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 614 Cognitive Radio Technologies -Wireless Devices Utilizing TV White Spaces”, Proceeding of the 10th Conference of FRUCT Association [6]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [7]. T. Chen, H. Zhang, G.M. Maggio, and I. Chlamtac, “CogMesh: A Cluster-Based Cognitive Radio Network,” Proc. IEEE Second Symp.New Frontiers in Dynamic Spectrum Access Networks (DySPAN),pp. 168-178, Apr. 2007 [8]. J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communica- tions, vol. 6, no. 4, pp. 13–18, 1999. [9]. Husheng Li, Ju Bin Song, and Zhu Han; “Transient Anal- ysis of Data Traffic in Cognitive Radio Networks: A Non- Equilibrium Statistical Mechanics Approach” ; IEEE Transac- tions On Wireless Communications, Vol. 12, No. 9, Septem- ber 2013 [10]. M. Gandetto and C. Regazzoni, “Spectrum Sensing: A Distributed Approach for Cognitive Terminals,” IEEE J. Se- lected Areas in Comm., vol. 25, no. 3, pp. 546-557, Apr. 2007. [11]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005 [12]. C.-S. Chang and J.A. Thomas, “Effective bandwidth in high-speed digital networks”, IEEE Journal on Selected Areas in Communications, Vol. 13, NO 6, August 1995 [13]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [14]. F. Borgonovo, M. Cesana, and L. Fratta, “Throughput and delay bounds for cognitive transmissions,” Advances Ad hoc Netw., pp. 179–190, Aug. 2008.. [15]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks(DySPAN ‟05), pp. 269-278, Nov. 2005. [16]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005 [17]. C. Peng, H. Zheng, and B.Y. Zhao, “Utilization and Fairness in Spectrum Assignment for Opportunistic Spectrum Access,” ACM Mobile Networks and Applications, vol. 11, no. 4, pp. 555-576, Aug. 2006. [18]. G. Ganesan, Y.G. Li, Cooperative spectrum sensing in cognitive radio networks, in: Proc. IEEE DySPAN 2005, No- vember 2005, pp. 137–143. [19]. D. Cabric, et. al., A Cognitive Radio Approach for Usage of Virtual Unlicensed Spectrum. In proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [20]. H. Shiang and M. Schaar, “Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applica- tions over Cognitive Radio Networks,” IEEE Trans. Multime- dia, vol. 5,no. 10, pp. 896-909, Aug. 2008. [21]. T. Harrold, R. Cepeda, and M. Beach, “Long-term mea- surements of spectrum occupancy characteristics,” in Proceed- ings of the IEEE DySPAN Conference, 2011, pp. 83–89. [22]. B. Canberk, I. F. Akyildiz, and S. Oktug, “Primary user activity modeling using first-difference filter clustering and correlation in cognitive radio networks,” IEEE/ACM Transac- tions on Networking, vol. 19, no. 1, pp. 170–183, Feb. 2011. [23]. Y.-C. Kuo, “Quorum-based power-saving multicast pro- tocols in the asynchronous ad-hoc network,” Computer Net- works, vol. 54, pp.1911–1922, 2010 [24]. D. Cabric, S.M. Mishra, D. Willkomm, R. Brodersen, A.Wolisz, “A Cognitive radio approach for usage of virtual unlicensed spectrum”, in: Proc. 14th IST Mobile and Wireless Communications Summit, June 2005. [25]. L. Cao, H. Zheng, Distributed spectrum allocation via localVbargaining, in: Proc. IEEE Sensor and Ad Hoc Com- municationsVand Networks (SECON) 2005, September 2005, pp.475–486. [26]. W.-Y. Lee and I. F. Akyildiz, “A spectrum decision framework for cognitive radio networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 161–174, Feb. 2011. [27]. J. Riihijarvi, P. Mahonene, M. Wellens, and M. Gordziel, “Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields,” in Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mo- bile Radio Communications, Cannes, Sep. 15–18 2008. [28]. D. Cabric, S.M. Mishra, R.W. Brodersen, “Implementa- tion issues in spectrum sensing for cognitive radios”, in: Proc. 38th Asilomar Conference on Signals, Systems and Comput- ers 2004, November 2004, pp. 772–776. [29]. M. Hoyhtya, S. Pollin, and A. Mammela, “Improving the performance of cognitive radios through classification, learn- ing, and predictive channel selection,” Advances in Electron- ics and Telecommunications, vol. 2, no. 4, pp. 28–38, Dec. 2011. [30]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005. [31]. C. Ghosh, S. Pagadarai, D. Agrawal, and A. Wyglinski, “A framework for statistical wireless spectrum occupancy modeling,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 38–44, Jan. 2010 [32]. E.Z Tragos, S.Zeadally, A.G. Fragkiadakis, V. A.Siris, “Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey” , IEEE Communications Surveys & Tutorials, Accepted For Publication 1 [33].http://www.channelpartnersonline.com/blogs/peertopeer/ 2014/01/spectrum-sharing-drives-mobile-market-growth.aspx [34].http://www.gonzalovazquezvilar.eu/cognitiveradio.htm [35]. Cognitive Radio Networks: From Theory to Practice By Ahmed Khattab, Dmitri Perkins, Magdy Bayoumi [36]. M. Cesana,F. Cuomo, E.Ekici ; “Routing in cognitive radio networks: Challenges and solutions” Ad Hoc Netwoks ELSEVIER Volume 9, Issue 3, May 2011.
  • 5.
    IJRET: International Journalof Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 615 [37]. A. A. Daoud, M. Alanyali, and D. Starobinski, “Second- ary pricing of spectrum in cellular CDMA networks,” in Proc. IEEE Int. Symposium for New Frontiers in DySPAN, Dublin, Ireland, Apr. 17–20 2007 [38]. Norfolk State University Norfolk VA 23504 in@nsu.edu Ma Liangping ; Shen Chi Xin, Chunsheng Dept. of Computer Science. "Path-Centric Channel Assignment in Cognitive Ra- dio Wireless Networks ". 2007. [39]. A. Ghasemi, E.S. Sousa, Collaborative spectrum sensing for opportunistic access in fading environment, in: Proc. IEEE DySPAN 2005, November 2005, pp. 131–136.