Impact of the primary user on the secondary user blocking probability in cognitive radio sensor networks

被引:3
|
作者
Hassani, Mohammad Mehdi [1 ]
Berangi, Reza [1 ]
机构
[1] Islamic Azad Univ, Ayatollah Amoli Branch, Dept Comp Engn, Amol, Iran
关键词
Transport protocol; cognitive radio network; wireless sensor network; secondary user blocking probability; discrete-time Markov chain; TRANSPORT PROTOCOL;
D O I
10.3906/elk-1706-292
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing usage of wireless sensor network technologies, their unlicensed bands become overcrowded. To address this challenge, cognitive radio technology with the dynamic spectrum access policy has merged with Wireless Sensor Network to overcome spectrum underutilization. The Cognitive Radio Sensor Network (CRSN) has emerged as a promising solution to overcome spectrum scarcity in a resource-constrained wireless sensor network. In CRSN, TCP has to cope with a new type of packet loss due to the primary users (PU) arrival, known here as a secondary user (SU) blocking loss. In this paper SU blocking loss is modelled by a discrete-time Markov chain. The experimental results are verified using the NS2.
引用
收藏
页码:2081 / 2092
页数:12
相关论文
共 50 条
  • [1] AN ANALYTICAL MODEL TO CALCULATE BLOCKING PROBABILITY OF SECONDARY USER IN COGNITIVE RADIO SENSOR NETWORKS
    Hassani, Mohammad Mehdi
    Berangi, Reza
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (02): : 3 - 12
  • [2] Impact of the Primary User's Power Allocation on the Performance of the Secondary User in Cognitive Radio Networks
    Xu, Ding
    Feng, Zhiyong
    Zhang, Ping
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (02) : 668 - 672
  • [3] Impact of Secondary User Block on the TCP Throughput in Cognitive Radio Sensor Networks
    Mohammad Mehdi Hassani
    Reza Berangi
    Wireless Personal Communications, 2019, 109 : 2221 - 2238
  • [4] Impact of Secondary User Block on the TCP Throughput in Cognitive Radio Sensor Networks
    Hassani, Mohammad Mehdi
    Berangi, Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) : 2221 - 2238
  • [5] Temporal Evaluation of Secondary User Interference to Primary User in Cognitive Radio Networks
    Mohamad, M. H.
    Sali, A.
    Ibrahim, Nur S.
    Hashim, Fazirulhisyam
    Nordin, Rosdiadee
    2015 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2015, : 565 - 570
  • [6] Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users
    Wang, Huaxia
    Yao, Yu-Dong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) : 4577 - 4588
  • [7] Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection
    Qin, Mian
    Yang, Shouyi
    Deng, Hao
    Lee, Moon Ho
    IEEE ACCESS, 2018, 6 : 32624 - 32636
  • [8] Identifying Malicious Secondary User Presence Within Primary User Range in Cognitive Radio Networks
    Brinda, V
    Bhuvaneshwari, M.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (03) : 2687 - 2699
  • [9] Identifying Malicious Secondary User Presence Within Primary User Range in Cognitive Radio Networks
    V. Brinda
    M. Bhuvaneshwari
    Wireless Personal Communications, 2022, 122 : 2687 - 2699
  • [10] Impact of Secondary User Interference on Primary Network in Cognitive Radio Systems
    Kachroo, Amit
    Ekin, Sabit
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,