SlideShare a Scribd company logo
1 of 6
Download to read offline
Available online at https://www.ijasrd.org/
International Journal of Advanced Scientific
Research & Development
Vol. 06, Iss. 02, Ver. I, Feb’ 2019, pp. 14 – 19
Cite this article as: Madhumitha, M., & Harikrishnan, M., “Priority Based Spectrum Sensing and Security System using
Radio Cognitive Network”. International Journal of Advanced Scientific Research & Development (IJASRD), 06 (02/I), 2019,
pp. 14 – 19. https://doi.org/10.26836/ijasrd/2019/v6/i2/60203.
* Corresponding Author: M. Madhumitha, madhumithamuniasamy2@gmail.com
e-ISSN: 2395-6089
p-ISSN: 2394-8906
PRIORITY BASED SPECTRUM SENSING AND SECURITY
SYSTEM USING RADIO COGNITIVE NETWORK
M. Madhumitha1* and M. Harikrishnan2
1 PG student, Department of Computer Science and Engineering, A.R.J College of Engineering and
Technology, Mannargudi, Thiruvarur – 614 403, Tamil Nadu.
2 Asst. Professor, Department of Computer Science and Engineering, A.R.J College of Engineering
and Technology, Mannargudi, Thiruvarur – 614 403, Tamil Nadu.
ARTICLE INFO
Article History:
Received: 09 Feb 2019;
Received in revised form:
22 Feb 2019;
Accepted: 22 Feb 2019;
Published online: 10 Mar 2019.
Key words:
Cognitive Radio,
Primary User,
Spectrum Sensing,
Spectrum Sharing,
Security System,
Secondary User.
ABSTRACT
Today increasing demand for the radio spectrum access due to
many new wireless networks such Bluetooth, share it and so on.
The radio spectrum is the part of the Electromagnetic spectrum
with frequencies from 3 KHz to 300 GHz and these are
generally used in Telecommunication. Existing method tells
that in a Cognitive Radio network, secondary users can access
unused licensed spectrum bands. The Collaborative spectrum
sensing has been used for the sensing reports from Secondary
User’s are sent to one or more decision making authorities to
produce more reliable decisions on the spectrum usage.
However, in the presence of misbehaving or malicious secondary
users, the integrity of the reports sent by SUs needs to be
assessed to avoid interference with Primary User’s. Our
proposed is an efficiently accessing the spectrum sharing among
primary users and secondary users. In this project, they
consider a cognitive radio with the primary and secondary links.
By using Cognitive Radio, the unlicensed spectrum uses the
licensed channel for data transmission. The proposed Channel
Side Information at the cognitive radio network is generally
used to maintain which primary user channels are ideal and
arranged them in a priority based queue. The proposed system
uses the Spectrum Sharing algorithm which calculates the load
of the information which transfers. It provides a power
minimization allocation approach, low power consumption.
Result show that the both spectrum sensing and data
transmission/receiving functions.
Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
Madhumitha and Harikrishnan (2019)
15 Volume 06, Issue 02, Version I, Feb’ 2019
INTRODUCTION
Energy-efficient wireless communications have great ecological and economic
benefits and are becoming more and more important in future wireless systems. Recently,
an EE technique was introduced to cognitive radio systems for resource allocation. This
motivates the concept of spectrum reuse that allows secondary users to utilize the radio
spectrum licensed to the primary users when the spectrum is temporarily not being utilized.
The key technology behind spectrum reuse is cognitive radio ,which consists of three
essential components: (1) spectrum sensing: The SUs are required to sense and monitor the
radio spectrum environment within their operating range to detect the frequency bands
that are not occupied by PU; (2) Dynamic spectrum management: cognitive radio networks
are required to dynamically select the best available bands for communications; and (3)
Adaptive communication: a cognitive radio device can configure its transmission parameters
to opportunistically make best use of the ever-changing available spectrum. In this
proposed system, it uses Cognitive radio automatically detects available channels in
wireless spectrum, then accordingly changes its transmission or reception parameters to
allow more concurrent wireless communications in a given spectrum band. Here the
Channel side information (CSI) at the CR which stores the information about the spectrum
holes and status of the Primary User’s. By using this method, it avoids the enormous
radiations by decreasing the number of base stations within a small range and it also
energy efficiency one. The advantage of the proposed system are as follows, Reduces the
radiation affects, Provide a power minimization allocation, Increase the energy efficiency in
spectrum sensing cognitive radio systems, Provide the extremely low power consumption
CR wireless sensor, It provides efficiency of data transmission, Reduces traffic, Avoid
Malicious secondary user’s(MSUs). This system uses the Spectrum Sharing algorithm
which stores the status of the ideal primary spectrum in a queue based priority. So that the
if anyone of the ideal primary user has come online then it switches to the other ideal
primary spectrum. Spectrum mobility: Process by which a cognitive-radio user changes its
frequency of operation. Cognitive-radio networks aim to use the spectrum in a dynamic
manner by allowing radio terminals to operate in the best available frequency band,
maintaining seamless communication requirements during transitions to better spectrum.
Spectrum sharing: Spectrum sharing cognitive radio networks allows cognitive radio users
to share the spectrum bands of the licensed-band users. However, the cognitive radio users
have to restrict their transmit power so that the interference caused to the licensed-band
users is kept below a certain threshold. Sensing-based Spectrum sharing: In sensing-based
spectrum sharing cognitive radio networks, cognitive radio users first listen to the spectrum
allocated to the licensed users to detect the state of the licensed users. Based on the
detection results, cognitive radio users decide their transmission strategies.
RELATED WORK
The existing system uses the Cognitive Radio network where secondary users can
access unused licensed spectrum bands. An important activity in a CRN is to monitor the
unused spectrum and to allocate the spectrum holes. Collaborative spectrum sensing (CSS)
has been proposed in which sensing reports from Secondary User’s are sent to one or more
decision making authorities to produce more reliable decisions on the state of the spectrum
Priority Based Spectrum Sensing and Security System using Radio Cognitive Network
Volume 06, Issue 02, Version I, Feb’ 2019 16
usage. However, in the presence of misbehaving or malicious Secondary User’s (MSUs), the
integrity of the data will lost. The disadvantages of existing system are as follows,
Interference Occur in Unlicensed Secondary Network. Unaware of Secondary User Selection
for Licensed Bandwidth., Delay in Data Transmission, High power consumption, Lack of
energy efficiency, Traffic occurs during accessing the spectrum holes.
PROPOSED SYSTEM
Cognitive radio network detects available channels in wireless spectrum, then
accordingly changes its transmission or reception parameters to allow more concurrent
wireless communications in a given spectrum band at one location. In this paper, we
minimize the power which brings energy efficiency enhancement to the cognitive radio
network for both schemes of spectrum sharing and sensing over fading environments.
Cognitive Radio network the data transmission between honest secondary users and
(HSUs) and secondary user base station (SUBS). We explore the significance of providing
extra channel side information (CSI) at the secondary transmitters under spectrum sharing
for single and multiple links. Then, having the extra CSIs at the secondary transmitter can
be very difficult, reduce these extra CSIs and derive new expressions for corresponding
transmission power at the secondary transmitter. The imperfect side information about
cross channels for single secondary link is also investigated. The proposed system uses the
Spectrum sharing algorithm which detects the ideal primary spectrum and also it allots the
ideal spectrum to the secondary users. By using this, we can speed up the transmission
compared to the secondary network. This system reduces the radiation affects. Provide a
power minimization allocation. Increase the energy efficiency in spectrum sensing cognitive
radio systems. Provide the extremely low power consumption CR wireless sensor. It
provides throughput efficiency of data transmission. Reduces traffic. Avoid Malicious
Secondary User’s (MSUs)
Figure – 1: System Overview
Primary
Network
Primary
Network
Transmission
Secondary
Network
Secondary
Network
Transmission
Cognitive
Radio
Primary
Network
Secondary
Network
Transmission Spectrum
Sensing
SYSTEM MODEL
The proposed system model consists of series steps for allotting the ideal spectrum to
the secondary users and to transmit the data using maximum and minimum frequency
ranges.
User module allows the users to choose which file to be transferred to the
destination. Here the user selects the file which is to be transferred to the destination. The
Madhumitha and Harikrishnan (2019)
17 Volume 06, Issue 02, Version I, Feb’ 2019
user generally sent the information to the destination. So in this module, they select which
data to be shared.
Transferring through primary spectrum module allows to transfer that file to the
destination using primary medium which means the sender should paid to access the
spectrum holes. Normally by using this we can transfer the file as fast.
Transferring through the secondary spectrum module allows to transfer that file to
the destination using secondary spectrum which means the user should access the free
networks such as Wi-Fi, Bluetooth, Share-It etc. Compared to the primary spectrum the
speed is low.
Transferring through the cognitive radio network module allows to transfer the file
to the destination using cognitive medium which means it allots the unused primary
spectrum holes to the secondary users. By using this, the secondary user can share the file
as fast as compared to the secondary medium. The output of this system differentiates the
speed of the transferring.
Using 2.4 GHz module shows the low frequency range of the Wi-Fi network
It shows how the file transferred between the systems.
Using 5 GHz module shows the maximum frequency range of the Wi-Fi network. It
also shows how the file transferred between the systems.
CONCLUSION
Cognitive radio which allots the ideal primary spectrum to the secondary users. So
that the efficiency of transferring the data will be high when compared to the secondary
spectrum. It shows the efficiency between the primary, secondary and cognitive spectrum.
By using the cognitive spectrum we can makes use of the available base stations for using
the high speed data transfer. There is no delay in data transmission. The energy obtained
for this system is also low when compared to the other networks. The number of base
stations usage also low so that the radiation causes disease will be reduced. The proposed
scheme presented spectrum sensing in an effective manner.
FUTURE ENHANCEMENT
In future they will investigate the performance of our algorithm for large mesh
networks. The search for breakthrough radio technologies that can scale to meet future
demands both in terms of spectrum efficiency and application performance.
REFERENCES
[1] Bidwai, S., "Cognitive Radio, Wireless Communication Tutorial". Retreived from
https://cognitive-radio-tech.blogspot.com/2014/09/wirelless-tutorial-cognitive-
radio.html.
[2] Chan, Y-T., Tsui, W-Y., So, H-C., & Ching, P-C., (2006) “Time-of-arrival based
localization under NLOS conditions,” in Proc. IEEE Trans. Veh. Technol., 55 (1), pp.
17 - 24, doi: https://doi.org/10.1109/TVT.2005.861207.
[3] Cognitive Radio. Retreived from https://en.wikipedia.org/wiki/Cognitive_radio.
Priority Based Spectrum Sensing and Security System using Radio Cognitive Network
Volume 06, Issue 02, Version I, Feb’ 2019 18
[4] Cognitive Radio. Retreived from
https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wik
i/Cognitive_radio.html.
[5] Ding, G., Wu, Q., Yao, Y-D., Wang, J., & Chen, Y., (2013) "Kernel-Based Learning for
Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations,
Example Applications, and Future Directions". in Proc. IEEE Signal Processing
Magazine, 30 (4), pp. 126 - 136, doi: https://doi.org/10.1109/MSP.2013.2251071.
[6] Elakkiya, S., & Aruna, P., (2017) "Creation of 802.11 Wireless Network using CRN".
International Journal for Research in Applied Science & Engineering Technology
(IJRASET), 5 (III), pp. 844 - 851.
[7] Fox, D., Burgardy, W., Dellaert, F., & Thrun, S., (1999) "Monte Carlo Localization:
Efficient Position Estimation for Mobile Robots". in Proc. of the Sixteenth National
Conference on Artificial Intelligence and Eleventh Conference on Innovative
Applications of Artificial Intelligence (AAAI-99), July 18-22, 1999, Orlando, Florida,
USA.
[8] Gustafsson, F., & Gunnarsson, F., (2003) “Positioning using time-difference of arrival
measurements,” in Proc. 2003 IEEE International Conference on Acoustics, Speech,
and Signal Processing, 2003. Proceedings. (ICASSP '03), 6, pp. 553 - 556, doi:
https://doi.org/10.1109/ICASSP.2003.1201741.
[9] Hema, A., Visalatchy, S., Mallika, C., & Ilakkiya, N., (2017) "A Survey Paper on Cloud
Computing Security and Outsourcing Data Mining in Cloud Platform". International
Journal of Advanced Scientific Research & Development (IJASRD), 4 (11/II), pp. 75 –
78, doi: https://doi.org/10.26836/ijasrd/2017/v4/i11/41115.
[10] Kalaikanni, K., Nivetha, G., Elakia, R., Anandraj, P., & Aravindan, S., (2016)
"Framework for Securing and Enhancing the File Access Availability in Wireless
Network". International Journal of Advanced Scientific Research & Development
(IJASRD), 3 (1/II), pp. 148 - 154.
[11] Li, M., & Liu, Y., (2007) “Rendered Path: Range-Free Localization in Anisotropic Sensor
Networks with Holes,” in Proc. ACM MobiCom 07, Sept. 2007.
[12] Liu, C., Wu, K., & He, T., (2004) "Sensor localization with Ring Overlapping based on
Comparison of Received Signal Strength Indicator". in Proc. 2004 IEEE
International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat.
No.04EX975), pp. 516 – 518, doi: https://doi.org/10.1109/MAHSS.2004.1392193.
[13] Maheswari, A., Sanjana, R., Sowmiya, S., Shenai, S., & Prabhakaran, G., (2016) "An
Efficient Cloud Security System Using Double Secret Key Decryption Process for
Secure Cloud Environments". International Journal of Advanced Scientific Research
& Development (IJASRD), 3 (1/II), pp. 134 - 139.
[14] Rong, P., & Sichitiu, M. L., (2006) "Angle of Arrival Localization for Wireless Sensor
Networks". in Proc. 2006 3rd Annual IEEE Communications Society on Sensor and
Ad Hoc Communications and Networks, doi:
https://doi.org/10.1109/SAHCN.2006.288442.
[15] Wang, H. H., & Yao, Y-D., (2018) "Primary User Boundary Detection in Cognitive
Radio Networks: Estimated Secondary User Locations and Impact of Malicious
Secondary Users". in Proc. IEEE Transactions on Vehicular Technology, 67 (5), pp.
4577 - 4588, doi: https://doi.org/10.1109/TVT.2018.2796024.
Madhumitha and Harikrishnan (2019)
19 Volume 06, Issue 02, Version I, Feb’ 2019
[16] Yang, Y., Liu, Y., Zhang, Q., & Ni, L., (2010) “Cooperative boundary detection for
spectrum sensing using dedicated wireless sensor networks”. in Proc. INFOCOM'10
Proceedings of the 29th conference on Information communications, pp. 1298 - 1306.
ISBN: 978-1-4244-5836-3.
[17] Yucek, T., & Arslan, H., (2009) “A survey of spectrum sensing algorithms for cognitive
radio applications”. in Proc. IEEE Communications Surveys & Tutorials, 11 (1), pp.
116 - 130, doi: https://doi.org/10.1109/SURV.2009.090109.
[18] Zhang, Z., Wu, Q., & Wang, J., (2012) "Energy-Efficient Power Allocation Strategy in
Cognitive Relay Networks". Radioengineering, 21 (3), pp. 809 - 814.

More Related Content

What's hot

IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...csandit
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd Iaetsd
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor NetworksAarthi Raghavendra
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
 

What's hot (16)

IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Paper 1 2019
Paper 1 2019Paper 1 2019
Paper 1 2019
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
H010434655
H010434655H010434655
H010434655
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
 

Similar to Priority Based Spectrum Sensing and Security System using Radio Cognitive Network

A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyijngnjournal
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET Journal
 
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radioijngnjournal
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Aastha Bhardwaj
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
 
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...cscpconf
 
Cognitive Radio: An Emerging trend for better Spectrum Utilization
Cognitive Radio: An Emerging trend for better Spectrum UtilizationCognitive Radio: An Emerging trend for better Spectrum Utilization
Cognitive Radio: An Emerging trend for better Spectrum UtilizationEditor IJCATR
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Journals
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 

Similar to Priority Based Spectrum Sensing and Security System using Radio Cognitive Network (20)

Ep33852856
Ep33852856Ep33852856
Ep33852856
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
 
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
 
Cognitive Radio: An Emerging trend for better Spectrum Utilization
Cognitive Radio: An Emerging trend for better Spectrum UtilizationCognitive Radio: An Emerging trend for better Spectrum Utilization
Cognitive Radio: An Emerging trend for better Spectrum Utilization
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 

More from IJASRD Journal

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringIJASRD Journal
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...IJASRD Journal
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...IJASRD Journal
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementIJASRD Journal
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...IJASRD Journal
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...IJASRD Journal
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...IJASRD Journal
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste ManagementIJASRD Journal
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIJASRD Journal
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT ArchitectureIJASRD Journal
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmIJASRD Journal
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesIJASRD Journal
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered MulticarrierIJASRD Journal
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...IJASRD Journal
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...IJASRD Journal
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesIJASRD Journal
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll CollectionIJASRD Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionIJASRD Journal
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 

More from IJASRD Journal (20)

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial Engineering
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace Management
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste Management
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT Architecture
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic Algorithm
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered Multicarrier
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll Collection
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC Encryption
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Priority Based Spectrum Sensing and Security System using Radio Cognitive Network

  • 1. Available online at https://www.ijasrd.org/ International Journal of Advanced Scientific Research & Development Vol. 06, Iss. 02, Ver. I, Feb’ 2019, pp. 14 – 19 Cite this article as: Madhumitha, M., & Harikrishnan, M., “Priority Based Spectrum Sensing and Security System using Radio Cognitive Network”. International Journal of Advanced Scientific Research & Development (IJASRD), 06 (02/I), 2019, pp. 14 – 19. https://doi.org/10.26836/ijasrd/2019/v6/i2/60203. * Corresponding Author: M. Madhumitha, madhumithamuniasamy2@gmail.com e-ISSN: 2395-6089 p-ISSN: 2394-8906 PRIORITY BASED SPECTRUM SENSING AND SECURITY SYSTEM USING RADIO COGNITIVE NETWORK M. Madhumitha1* and M. Harikrishnan2 1 PG student, Department of Computer Science and Engineering, A.R.J College of Engineering and Technology, Mannargudi, Thiruvarur – 614 403, Tamil Nadu. 2 Asst. Professor, Department of Computer Science and Engineering, A.R.J College of Engineering and Technology, Mannargudi, Thiruvarur – 614 403, Tamil Nadu. ARTICLE INFO Article History: Received: 09 Feb 2019; Received in revised form: 22 Feb 2019; Accepted: 22 Feb 2019; Published online: 10 Mar 2019. Key words: Cognitive Radio, Primary User, Spectrum Sensing, Spectrum Sharing, Security System, Secondary User. ABSTRACT Today increasing demand for the radio spectrum access due to many new wireless networks such Bluetooth, share it and so on. The radio spectrum is the part of the Electromagnetic spectrum with frequencies from 3 KHz to 300 GHz and these are generally used in Telecommunication. Existing method tells that in a Cognitive Radio network, secondary users can access unused licensed spectrum bands. The Collaborative spectrum sensing has been used for the sensing reports from Secondary User’s are sent to one or more decision making authorities to produce more reliable decisions on the spectrum usage. However, in the presence of misbehaving or malicious secondary users, the integrity of the reports sent by SUs needs to be assessed to avoid interference with Primary User’s. Our proposed is an efficiently accessing the spectrum sharing among primary users and secondary users. In this project, they consider a cognitive radio with the primary and secondary links. By using Cognitive Radio, the unlicensed spectrum uses the licensed channel for data transmission. The proposed Channel Side Information at the cognitive radio network is generally used to maintain which primary user channels are ideal and arranged them in a priority based queue. The proposed system uses the Spectrum Sharing algorithm which calculates the load of the information which transfers. It provides a power minimization allocation approach, low power consumption. Result show that the both spectrum sensing and data transmission/receiving functions. Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2. Madhumitha and Harikrishnan (2019) 15 Volume 06, Issue 02, Version I, Feb’ 2019 INTRODUCTION Energy-efficient wireless communications have great ecological and economic benefits and are becoming more and more important in future wireless systems. Recently, an EE technique was introduced to cognitive radio systems for resource allocation. This motivates the concept of spectrum reuse that allows secondary users to utilize the radio spectrum licensed to the primary users when the spectrum is temporarily not being utilized. The key technology behind spectrum reuse is cognitive radio ,which consists of three essential components: (1) spectrum sensing: The SUs are required to sense and monitor the radio spectrum environment within their operating range to detect the frequency bands that are not occupied by PU; (2) Dynamic spectrum management: cognitive radio networks are required to dynamically select the best available bands for communications; and (3) Adaptive communication: a cognitive radio device can configure its transmission parameters to opportunistically make best use of the ever-changing available spectrum. In this proposed system, it uses Cognitive radio automatically detects available channels in wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band. Here the Channel side information (CSI) at the CR which stores the information about the spectrum holes and status of the Primary User’s. By using this method, it avoids the enormous radiations by decreasing the number of base stations within a small range and it also energy efficiency one. The advantage of the proposed system are as follows, Reduces the radiation affects, Provide a power minimization allocation, Increase the energy efficiency in spectrum sensing cognitive radio systems, Provide the extremely low power consumption CR wireless sensor, It provides efficiency of data transmission, Reduces traffic, Avoid Malicious secondary user’s(MSUs). This system uses the Spectrum Sharing algorithm which stores the status of the ideal primary spectrum in a queue based priority. So that the if anyone of the ideal primary user has come online then it switches to the other ideal primary spectrum. Spectrum mobility: Process by which a cognitive-radio user changes its frequency of operation. Cognitive-radio networks aim to use the spectrum in a dynamic manner by allowing radio terminals to operate in the best available frequency band, maintaining seamless communication requirements during transitions to better spectrum. Spectrum sharing: Spectrum sharing cognitive radio networks allows cognitive radio users to share the spectrum bands of the licensed-band users. However, the cognitive radio users have to restrict their transmit power so that the interference caused to the licensed-band users is kept below a certain threshold. Sensing-based Spectrum sharing: In sensing-based spectrum sharing cognitive radio networks, cognitive radio users first listen to the spectrum allocated to the licensed users to detect the state of the licensed users. Based on the detection results, cognitive radio users decide their transmission strategies. RELATED WORK The existing system uses the Cognitive Radio network where secondary users can access unused licensed spectrum bands. An important activity in a CRN is to monitor the unused spectrum and to allocate the spectrum holes. Collaborative spectrum sensing (CSS) has been proposed in which sensing reports from Secondary User’s are sent to one or more decision making authorities to produce more reliable decisions on the state of the spectrum
  • 3. Priority Based Spectrum Sensing and Security System using Radio Cognitive Network Volume 06, Issue 02, Version I, Feb’ 2019 16 usage. However, in the presence of misbehaving or malicious Secondary User’s (MSUs), the integrity of the data will lost. The disadvantages of existing system are as follows, Interference Occur in Unlicensed Secondary Network. Unaware of Secondary User Selection for Licensed Bandwidth., Delay in Data Transmission, High power consumption, Lack of energy efficiency, Traffic occurs during accessing the spectrum holes. PROPOSED SYSTEM Cognitive radio network detects available channels in wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band at one location. In this paper, we minimize the power which brings energy efficiency enhancement to the cognitive radio network for both schemes of spectrum sharing and sensing over fading environments. Cognitive Radio network the data transmission between honest secondary users and (HSUs) and secondary user base station (SUBS). We explore the significance of providing extra channel side information (CSI) at the secondary transmitters under spectrum sharing for single and multiple links. Then, having the extra CSIs at the secondary transmitter can be very difficult, reduce these extra CSIs and derive new expressions for corresponding transmission power at the secondary transmitter. The imperfect side information about cross channels for single secondary link is also investigated. The proposed system uses the Spectrum sharing algorithm which detects the ideal primary spectrum and also it allots the ideal spectrum to the secondary users. By using this, we can speed up the transmission compared to the secondary network. This system reduces the radiation affects. Provide a power minimization allocation. Increase the energy efficiency in spectrum sensing cognitive radio systems. Provide the extremely low power consumption CR wireless sensor. It provides throughput efficiency of data transmission. Reduces traffic. Avoid Malicious Secondary User’s (MSUs) Figure – 1: System Overview Primary Network Primary Network Transmission Secondary Network Secondary Network Transmission Cognitive Radio Primary Network Secondary Network Transmission Spectrum Sensing SYSTEM MODEL The proposed system model consists of series steps for allotting the ideal spectrum to the secondary users and to transmit the data using maximum and minimum frequency ranges. User module allows the users to choose which file to be transferred to the destination. Here the user selects the file which is to be transferred to the destination. The
  • 4. Madhumitha and Harikrishnan (2019) 17 Volume 06, Issue 02, Version I, Feb’ 2019 user generally sent the information to the destination. So in this module, they select which data to be shared. Transferring through primary spectrum module allows to transfer that file to the destination using primary medium which means the sender should paid to access the spectrum holes. Normally by using this we can transfer the file as fast. Transferring through the secondary spectrum module allows to transfer that file to the destination using secondary spectrum which means the user should access the free networks such as Wi-Fi, Bluetooth, Share-It etc. Compared to the primary spectrum the speed is low. Transferring through the cognitive radio network module allows to transfer the file to the destination using cognitive medium which means it allots the unused primary spectrum holes to the secondary users. By using this, the secondary user can share the file as fast as compared to the secondary medium. The output of this system differentiates the speed of the transferring. Using 2.4 GHz module shows the low frequency range of the Wi-Fi network It shows how the file transferred between the systems. Using 5 GHz module shows the maximum frequency range of the Wi-Fi network. It also shows how the file transferred between the systems. CONCLUSION Cognitive radio which allots the ideal primary spectrum to the secondary users. So that the efficiency of transferring the data will be high when compared to the secondary spectrum. It shows the efficiency between the primary, secondary and cognitive spectrum. By using the cognitive spectrum we can makes use of the available base stations for using the high speed data transfer. There is no delay in data transmission. The energy obtained for this system is also low when compared to the other networks. The number of base stations usage also low so that the radiation causes disease will be reduced. The proposed scheme presented spectrum sensing in an effective manner. FUTURE ENHANCEMENT In future they will investigate the performance of our algorithm for large mesh networks. The search for breakthrough radio technologies that can scale to meet future demands both in terms of spectrum efficiency and application performance. REFERENCES [1] Bidwai, S., "Cognitive Radio, Wireless Communication Tutorial". Retreived from https://cognitive-radio-tech.blogspot.com/2014/09/wirelless-tutorial-cognitive- radio.html. [2] Chan, Y-T., Tsui, W-Y., So, H-C., & Ching, P-C., (2006) “Time-of-arrival based localization under NLOS conditions,” in Proc. IEEE Trans. Veh. Technol., 55 (1), pp. 17 - 24, doi: https://doi.org/10.1109/TVT.2005.861207. [3] Cognitive Radio. Retreived from https://en.wikipedia.org/wiki/Cognitive_radio.
  • 5. Priority Based Spectrum Sensing and Security System using Radio Cognitive Network Volume 06, Issue 02, Version I, Feb’ 2019 18 [4] Cognitive Radio. Retreived from https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wik i/Cognitive_radio.html. [5] Ding, G., Wu, Q., Yao, Y-D., Wang, J., & Chen, Y., (2013) "Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions". in Proc. IEEE Signal Processing Magazine, 30 (4), pp. 126 - 136, doi: https://doi.org/10.1109/MSP.2013.2251071. [6] Elakkiya, S., & Aruna, P., (2017) "Creation of 802.11 Wireless Network using CRN". International Journal for Research in Applied Science & Engineering Technology (IJRASET), 5 (III), pp. 844 - 851. [7] Fox, D., Burgardy, W., Dellaert, F., & Thrun, S., (1999) "Monte Carlo Localization: Efficient Position Estimation for Mobile Robots". in Proc. of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence (AAAI-99), July 18-22, 1999, Orlando, Florida, USA. [8] Gustafsson, F., & Gunnarsson, F., (2003) “Positioning using time-difference of arrival measurements,” in Proc. 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03), 6, pp. 553 - 556, doi: https://doi.org/10.1109/ICASSP.2003.1201741. [9] Hema, A., Visalatchy, S., Mallika, C., & Ilakkiya, N., (2017) "A Survey Paper on Cloud Computing Security and Outsourcing Data Mining in Cloud Platform". International Journal of Advanced Scientific Research & Development (IJASRD), 4 (11/II), pp. 75 – 78, doi: https://doi.org/10.26836/ijasrd/2017/v4/i11/41115. [10] Kalaikanni, K., Nivetha, G., Elakia, R., Anandraj, P., & Aravindan, S., (2016) "Framework for Securing and Enhancing the File Access Availability in Wireless Network". International Journal of Advanced Scientific Research & Development (IJASRD), 3 (1/II), pp. 148 - 154. [11] Li, M., & Liu, Y., (2007) “Rendered Path: Range-Free Localization in Anisotropic Sensor Networks with Holes,” in Proc. ACM MobiCom 07, Sept. 2007. [12] Liu, C., Wu, K., & He, T., (2004) "Sensor localization with Ring Overlapping based on Comparison of Received Signal Strength Indicator". in Proc. 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975), pp. 516 – 518, doi: https://doi.org/10.1109/MAHSS.2004.1392193. [13] Maheswari, A., Sanjana, R., Sowmiya, S., Shenai, S., & Prabhakaran, G., (2016) "An Efficient Cloud Security System Using Double Secret Key Decryption Process for Secure Cloud Environments". International Journal of Advanced Scientific Research & Development (IJASRD), 3 (1/II), pp. 134 - 139. [14] Rong, P., & Sichitiu, M. L., (2006) "Angle of Arrival Localization for Wireless Sensor Networks". in Proc. 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, doi: https://doi.org/10.1109/SAHCN.2006.288442. [15] Wang, H. H., & Yao, Y-D., (2018) "Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users". in Proc. IEEE Transactions on Vehicular Technology, 67 (5), pp. 4577 - 4588, doi: https://doi.org/10.1109/TVT.2018.2796024.
  • 6. Madhumitha and Harikrishnan (2019) 19 Volume 06, Issue 02, Version I, Feb’ 2019 [16] Yang, Y., Liu, Y., Zhang, Q., & Ni, L., (2010) “Cooperative boundary detection for spectrum sensing using dedicated wireless sensor networks”. in Proc. INFOCOM'10 Proceedings of the 29th conference on Information communications, pp. 1298 - 1306. ISBN: 978-1-4244-5836-3. [17] Yucek, T., & Arslan, H., (2009) “A survey of spectrum sensing algorithms for cognitive radio applications”. in Proc. IEEE Communications Surveys & Tutorials, 11 (1), pp. 116 - 130, doi: https://doi.org/10.1109/SURV.2009.090109. [18] Zhang, Z., Wu, Q., & Wang, J., (2012) "Energy-Efficient Power Allocation Strategy in Cognitive Relay Networks". Radioengineering, 21 (3), pp. 809 - 814.