Impact of the primary user on the secondary user blocking probability in cognitive radio sensor networks

被引:3
|
作者
Hassani, Mohammad Mehdi [1 ]
Berangi, Reza [1 ]
机构
[1] Islamic Azad Univ, Ayatollah Amoli Branch, Dept Comp Engn, Amol, Iran
关键词
Transport protocol; cognitive radio network; wireless sensor network; secondary user blocking probability; discrete-time Markov chain; TRANSPORT PROTOCOL;
D O I
10.3906/elk-1706-292
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing usage of wireless sensor network technologies, their unlicensed bands become overcrowded. To address this challenge, cognitive radio technology with the dynamic spectrum access policy has merged with Wireless Sensor Network to overcome spectrum underutilization. The Cognitive Radio Sensor Network (CRSN) has emerged as a promising solution to overcome spectrum scarcity in a resource-constrained wireless sensor network. In CRSN, TCP has to cope with a new type of packet loss due to the primary users (PU) arrival, known here as a secondary user (SU) blocking loss. In this paper SU blocking loss is modelled by a discrete-time Markov chain. The experimental results are verified using the NS2.
引用
收藏
页码:2081 / 2092
页数:12
相关论文
共 50 条
  • [41] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [42] A Primary User Emulation Attack Detection Scheme in Cognitive Radio Network with Mobile Secondary User
    Li, Yongcheng
    Han, Changdong
    Wang, Manxi
    Chen, Huifang
    Xie, Lei
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1076 - 1081
  • [43] Binary Inference for Primary User Separation in Cognitive Radio Networks
    Huy Nguyen
    Zheng, Guanbo
    Zheng, Rong
    Han, Zhu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (04) : 1532 - 1542
  • [44] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Yazdi, Seyed Abdolazim Vaziri
    Ghazvini, Mahdieh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2261 - 2277
  • [45] Detecting Primary User Emulation Attack in Cognitive Radio Networks
    Pu, Di
    Shi, Yuan
    Ilyashenko, Andrei V.
    Wyglinski, Alexander M.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [46] Secondary User Selection in Energy Constrained Cognitive Sensor Networks
    Khan, Suraj
    Arif, Wasim
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2153 - 2157
  • [47] A Novel Secondary User Assisted Relay Mechanism in Cognitive Radio Networks with Multiple Primary Users
    He, Song
    Jiang, Lingge
    He, Chen
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1254 - 1259
  • [48] PERFORMANCE ANALYSIS AND OPTIMIZATION FOR COGNITIVE RADIO NETWORKS WITH A FINITE PRIMARY USER BUFFER AND A PROBABILITY RETURNING SCHEME
    Zhao, Yuan
    Yue, Wuyi
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2020, 16 (03) : 1119 - 1134
  • [49] Impact of Harvesting and Scanning Powers on Secondary User Utility in Spectrum Leasing Cognitive Radio Networks
    El-Dien, Heba A. Tag
    Zaki, Rokaia M.
    2017 34TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2017, : 170 - 177
  • [50] Throughput of a cooperative energy harvesting secondary user in cognitive radio networks
    El Shafie, Ahmed
    Khattab, Tamer
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2016, 27 (10): : 1365 - 1379