SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 611
A FRAMEWORK FOR DATA TRAFFIC IN COGNITIVE RADIO NET-
WORKS USING TRUSTED TOKEN ANALYZER SCHEME
Nikitha Lee Joy1
, Sangeetha Senthilkumar2
, S.Sathyaraj3
1
PG Student, Oxford Engineering College, Trichy
2
Assistant Professor, Oxford Engineering College, Trichy
3
Assistant Professor, Oxford Engineering College, Trichy
Abstract
A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-
dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or
unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-
tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum
Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-
agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of
the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission
coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework
which will support the secondary user data transmission while considering the primary user activity and QoS requirement.
Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cognitive radio is a recent novel approach for the realization
of intelligent and sophisticated wireless systems. Software
Defined Radio, a recent development in wireless technology,
promise to address some of the major limitations like ineffi-
cient utilization and management of the radio frequency (RF)
in both licensed and unlicensed spectrum band experienced
by legacy wireless communication system. A radio that is able
to reliably sense the spectral environment over a wide band-
width, detect the presence/absence of legacy users and use the
spectrum only if communication does not interfere with any
primary user is called a cognitive radio. The seminal paper of
J. Mitola [8] introduced the concept of cognitive radio. Ian F.
Akyildiz et al. [1] defines cognitive radio as: “A Cognitive
Radio is a radio that can change its transmitter parameters
based on interaction with the environment in which it oper-
ates”.
Cognitive radio networks are composed of cognitive radio
devices. An interconnected set of cognitive radio devices that
share information is defined as a cognitive radio networks.
(CRN).Cognitive radio networks (CRN) are envisioned to
provide high bandwidth to mobile users via heterogeneous
wireless architectures and dynamic spectrum access (DSA)
techniques. Cognitive Radio Networks aim at performing the
cognitive operations such as sensing the spectrum, managing
available resources, and making user-independent, intelligent
decisions based on cooperation of multiple cognitive nodes.
CR networks however impose unique challenges because of
the high fluctuation in the available spectrum as well as the
diverse quality-of-service (QoS) requirements of various ap-
plications and secondary users. To address these challenges,
first, CR networks are required to determine which portions of
the spectrum are available, called spectrum sensing [2], [10].
Furthermore, how to coordinate multiple CR users to share the
spectrum band, called spectrum sharing, is another important
issue in CR networks [6], [16].Secondary users have to vacate
the channel for the primary user, when they arrive, called
spectrum mobility is another aspect of CRN.Fig.1shows the
dynamic spectrum management framework [2]. Spectrum de-
cision in CRN refers to the ability of the secondary users to
select the best available spectrum band to satisfy the user‟s
quality of service requirements. Quality of Service for the sec-
ondary users involves data traffic management.
Fig 1: Dynamic Spectrum Management Framework
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 612
To improve spectrum efficiency in cognitive radio networks,
many operations such as sharing data in cooperative spectrum
sensing, broadcasting spectrum-aware routing information,
and coordinating spectrum access rely on control message are
exchanged on a common control channel. Thus, a reliable and
„„always on‟‟ control channel is unavoidable in CRN.
2. RELATED WORKS
2.1 Spectrum Decision
For spectrum allocation, a global optimization scheme is de-
veloped based on graph theory [17]. Distributed spectrum al-
location based on local bargaining is proposed in [4], where
CR users negotiate spectrum assignment within local self-
organized groups. In [20], a dynamic channel selection
scheme is developed for delay-sensitive applications based on
a priority queuing analysis and a decentralized learning algo-
rithm.
2.2 QoS Management /Data Traffic Management
QoS support in CR systems is critical to ensure its success in
consumer wireless market .In contrast to traditional wireless
communication networks, one of the major challenges faced in
cognitive radio networks is the interruptions from primary
users. The service of packets in cognitive radio network has to
be interrupted when primary users emerges. Usually, the
emergence of primary user is assumed to be stationary., Such
an assumption may not be true in practical means, since the
traffic pattern of primary users could be time variant. [9] Spe-
cifies transient analysis of data traffic in cognitive radio net-
works.
A time-varying service capacity is discussed in [12] to widen
the application. The problem of designing effective routing
solutions for multi-hop CRNs, which is a focal issue to fully
unleash the potentials of the cognitive networking paradigm, is
focused in [25].
3. PROPOSED SYSTEM
3.1 System Model
Primary radio nodes are the legacy users and they can access
their respective licensed bands without any restriction. Indeed,
PR nodes have the highest priority to access the channels and
should not be interrupted by the CR nodes.
We consider an OSS environment, where secondary users
equipped with CRs are operating over N orthogonal frequency
channels that are licensed to legacy(primary) users. One of the
nodes is considered as head node or server. It involves the
trusted token analyzer scheme and location verification
schemes.
Fig 2: General Framework
In cognitive radio network each spectrum band is characte-
rized based on local observations and on statistical informa-
tion of the primary networks which is normally called PU ac-
tivities. The selection of the most appropriate spectrum band is
the next step in spectrum decision, based on the spectrum band
characterization. Thirdly, a CR should be able to reconfigure
its transceiver parameters to support communication within
the selected spectrum band.
Once the spectrum decision is made, and a particular spectrum
is chosen for secondary data transmission, the rendezvous
process is initiated. Link establishment in distributed cognitive
radio networks requires the communicating nodes to be
rendezvous to exchange control
Figure 2 specifies the general frame work for CR transmis-
sion. Geo-location database contains the information like the
channel condition, capacity of the channel etc. The primary
user activity is monitored in spectrum sensing along with the
sensing of unused or under-utilized spectrum. Based on these
information the spectrum decision is made which involves the
spectrum characterization and also the quality of the service
and users quality requirement are monitored here. Based on
the decision the channel is selected for CR transmission.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 613
Fig 3: Trusted Token Analyzer
3.2 Probabilistic Location Verification
Location verification is an effective defense against attacks
which take advantage of a lack, or compromise, of location
information in the spectrum sensing. Beacon nodes[ Fig 3]
will perform the spectrum observation. Beacon nodes will
collect all the local information and the availability of the
spectrum holes. Beacon nodes will hand over these local ob-
servations to the head node. Head node involves probabilistic
location verification scheme which will in turn locate the loca-
tion of the spectrum holes. The location of the identified spec-
trum hole is indeed verified in probabilistic location verifica-
tion against fake spectrum hole information.
3.3 Trusted Token Analyzer Scheme
The general architecture for traffic management [fig 2] in-
volves a server with trusted token analyzer, Attack resistant
location estimation and location verification. Fig 3 gives the
specific view of the trusted token analyzer scheme. Token
bucket algorithm is used for generating tokens. The bucket
represents a rate-limiting function of the policer on the inter-
face input or output traffic .Each token in the bucket
represents a “credit” for some number of bits, and tokens in
the bucket are “cashed in” for the ability to receive or transmit
traffic that conforms to a rate limit configured for the policer.
The token arrival rate is the fixed bits-per-second rate at which
tokens are added to the token bucket, but only up to the speci-
fied depth of the bucket. Tokens are added based on the in-
formation from the quality monitoring and the primary user
activity monitoring. If both are satisfied a token is added into
the bucket. The token bucket depth defines the capacity of the
bucket in bytes.CR transmission takes place only when there
are sufficient tokens are available in the bucket, thus control-
ling or policing the traffic.
When the sender needs to send a packet to the receiver, it will
confirm the server for the availability of enough tokens. If
enough tokens are available then the sender will send the
packet. If the packet is received by any intermediate node,
then it will analyze the location reference and it will again
confirm the traffic conditions to the server and will then for-
ward the packet to the destination. Once the packet is received
by the intended receiver, it can view the message by opening
the packet.
4. CONCLUSIONS
Spectrum Sensing is performed to identify the spectrum avail-
ability. Each CR performs spectrum sensing to identify the
available spectrum bands and the spectrum decision process
selects from these available bands for opportunistic use. A
framework proposed here is an effective way of managing the
secondary user data transmission by keeping track of the pri-
mary user activity and also the QoS requirement of the sec-
ondary users. The QoS requirement for secondary users is
managed by using trusted token analyzer. Trusted token ana-
lyzer manages the users by controlling the user data traffic.
FUTURE WORK
Cognitive Radio Network is a vast field to study. QoS re-
quirement monitoring for the secondary user is one of the pa-
rameter we are going to focus in future. Also the primary user
emulation attack is another consideration.
REFERENCES
[1]. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohan-
ty,“Next generation /dynamicspectrum access/cognitive radio
wireless networks: a survey,” Computer Networks: The Inter-
national Journal of Computer and Telecommunications Net-
working, vol. 50 , Issue 13, pp. 2127 – 2159, 2006.
[2]. D. Cabric, S.M. Mishra, and R.W. Brodersen, “Implemen-
tation Issues in Spectrum Sensing for Cognitive Radios,” Proc.
IEEE Asilomar Conf. Signals, Systems and Computers, pp.
772-776, Nov. 2004.
[3]. M.T Masonta, M. Mzyece, N.Ntlatlapa, “Spectrum Deci-
sion in Cognitive Radio Networks: A Survey” IEEE Commu-
nications Surveys and Tutorials, vol. 15, no. 3, pp. 1088-1107
[4]. L. Cao and H. Zheng, “Distributed Spectrum Allocation
via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm.
and Networks (SECON), pp. 475-486, Sept. 2005.
[5]. Jarkko Paavola, “ Operational Challenges for Emerging
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 614
Cognitive Radio Technologies -Wireless Devices Utilizing TV
White Spaces”, Proceeding of the 10th Conference of FRUCT
Association
[6]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for
Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol.
25, no. 3, pp. 517-528, Apr. 2007.
[7]. T. Chen, H. Zhang, G.M. Maggio, and I. Chlamtac,
“CogMesh: A Cluster-Based Cognitive Radio Network,” Proc.
IEEE Second Symp.New Frontiers in Dynamic Spectrum
Access Networks (DySPAN),pp. 168-178, Apr. 2007
[8]. J. Mitola and G. Q. Maguire, “Cognitive radio: Making
software radios more personal,” IEEE Personal Communica-
tions, vol. 6, no. 4, pp. 13–18, 1999.
[9]. Husheng Li, Ju Bin Song, and Zhu Han; “Transient Anal-
ysis of Data Traffic in Cognitive Radio Networks: A Non-
Equilibrium Statistical Mechanics Approach” ; IEEE Transac-
tions On Wireless Communications, Vol. 12, No. 9, Septem-
ber 2013
[10]. M. Gandetto and C. Regazzoni, “Spectrum Sensing: A
Distributed Approach for Cognitive Terminals,” IEEE J. Se-
lected Areas in Comm., vol. 25, no. 3, pp. 546-557, Apr. 2007.
[11]. L. Cao and H. Zheng, “Distributed Spectrum Allocation
via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm.
and Networks (SECON), pp. 475-486, Sept. 2005
[12]. C.-S. Chang and J.A. Thomas, “Effective bandwidth in
high-speed digital networks”, IEEE Journal on Selected Areas
in Communications, Vol. 13, NO 6, August 1995
[13]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for
Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol.
25, no. 3, pp. 517-528, Apr. 2007.
[14]. F. Borgonovo, M. Cesana, and L. Fratta, “Throughput
and delay bounds for cognitive transmissions,” Advances Ad
hoc Netw., pp. 179–190, Aug. 2008..
[15]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks(DySPAN ‟05), pp. 269-278, Nov. 2005.
[16]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks (DySPAN ‟05), pp. 269-278, Nov. 2005
[17]. C. Peng, H. Zheng, and B.Y. Zhao, “Utilization and
Fairness in Spectrum Assignment for Opportunistic Spectrum
Access,” ACM Mobile Networks and Applications, vol. 11,
no. 4, pp. 555-576, Aug. 2006.
[18]. G. Ganesan, Y.G. Li, Cooperative spectrum sensing in
cognitive radio networks, in: Proc. IEEE DySPAN 2005, No-
vember 2005, pp. 137–143.
[19]. D. Cabric, et. al., A Cognitive Radio Approach for Usage
of Virtual Unlicensed Spectrum. In proc. of 14th IST Mobile
Wireless Communications Summit, Dresden, Germany, June
2005.
[20]. H. Shiang and M. Schaar, “Queuing-Based Dynamic
Channel Selection for Heterogeneous Multimedia Applica-
tions over Cognitive Radio Networks,” IEEE Trans. Multime-
dia, vol. 5,no. 10, pp. 896-909, Aug. 2008.
[21]. T. Harrold, R. Cepeda, and M. Beach, “Long-term mea-
surements of spectrum occupancy characteristics,” in Proceed-
ings of the IEEE DySPAN Conference, 2011, pp. 83–89.
[22]. B. Canberk, I. F. Akyildiz, and S. Oktug, “Primary user
activity modeling using first-difference filter clustering and
correlation in cognitive radio networks,” IEEE/ACM Transac-
tions on Networking, vol. 19, no. 1, pp. 170–183, Feb. 2011.
[23]. Y.-C. Kuo, “Quorum-based power-saving multicast pro-
tocols in the asynchronous ad-hoc network,” Computer Net-
works, vol. 54, pp.1911–1922, 2010
[24]. D. Cabric, S.M. Mishra, D. Willkomm, R. Brodersen,
A.Wolisz, “A Cognitive radio approach for usage of virtual
unlicensed spectrum”, in: Proc. 14th IST Mobile and Wireless
Communications Summit, June 2005.
[25]. L. Cao, H. Zheng, Distributed spectrum allocation via
localVbargaining, in: Proc. IEEE Sensor and Ad Hoc Com-
municationsVand Networks (SECON) 2005, September 2005,
pp.475–486.
[26]. W.-Y. Lee and I. F. Akyildiz, “A spectrum decision
framework for cognitive radio networks,” IEEE Transactions
on Mobile Computing, vol. 10, no. 2, pp. 161–174, Feb. 2011.
[27]. J. Riihijarvi, P. Mahonene, M. Wellens, and M. Gordziel,
“Characterization and modelling of spectrum for dynamic
spectrum access with spatial statistics and random fields,” in
Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mo-
bile Radio Communications, Cannes, Sep.
15–18 2008.
[28]. D. Cabric, S.M. Mishra, R.W. Brodersen, “Implementa-
tion issues in spectrum sensing for cognitive radios”, in: Proc.
38th Asilomar Conference on Signals, Systems and Comput-
ers 2004, November 2004, pp. 772–776.
[29]. M. Hoyhtya, S. Pollin, and A. Mammela, “Improving the
performance of cognitive radios through classification, learn-
ing, and predictive channel selection,” Advances in Electron-
ics and Telecommunications, vol. 2, no. 4, pp. 28–38, Dec.
2011.
[30]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation
Spectrum Etiquette for Cognitive Radio Networks,” Proc. First
IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access
Networks (DySPAN ‟05), pp. 269-278, Nov. 2005.
[31]. C. Ghosh, S. Pagadarai, D. Agrawal, and A. Wyglinski,
“A framework for statistical wireless spectrum occupancy
modeling,” IEEE Transactions on Wireless Communications,
vol. 9, no. 1, pp. 38–44, Jan. 2010
[32]. E.Z Tragos, S.Zeadally, A.G. Fragkiadakis, V. A.Siris,
“Spectrum Assignment in Cognitive Radio Networks: A
Comprehensive Survey” , IEEE Communications Surveys &
Tutorials, Accepted For Publication 1
[33].http://www.channelpartnersonline.com/blogs/peertopeer/
2014/01/spectrum-sharing-drives-mobile-market-growth.aspx
[34].http://www.gonzalovazquezvilar.eu/cognitiveradio.htm
[35]. Cognitive Radio Networks: From Theory to Practice
By Ahmed Khattab, Dmitri Perkins, Magdy Bayoumi
[36]. M. Cesana,F. Cuomo, E.Ekici ; “Routing in cognitive
radio networks: Challenges and solutions” Ad Hoc Netwoks
ELSEVIER Volume 9, Issue 3, May 2011.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 615
[37]. A. A. Daoud, M. Alanyali, and D. Starobinski, “Second-
ary pricing of spectrum in cellular CDMA networks,” in Proc.
IEEE Int. Symposium for New Frontiers in DySPAN, Dublin,
Ireland, Apr. 17–20 2007
[38]. Norfolk State University Norfolk VA 23504 in@nsu.edu
Ma Liangping ; Shen Chi Xin, Chunsheng Dept. of Computer
Science. "Path-Centric Channel Assignment in Cognitive Ra-
dio Wireless Networks ". 2007.
[39]. A. Ghasemi, E.S. Sousa, Collaborative spectrum sensing
for opportunistic access in fading environment, in: Proc. IEEE
DySPAN 2005, November 2005, pp. 131–136.

More Related Content

What's hot

Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...ijmnct
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNEswar Publications
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through theijngnjournal
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radioijngnjournal
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 

What's hot (18)

Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 
Kd3118761881
Kd3118761881Kd3118761881
Kd3118761881
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
C0941017
C0941017C0941017
C0941017
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile network
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network Environment
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 
B0470208027
B0470208027B0470208027
B0470208027
 

Viewers also liked

Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingOptimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingFabrizio Granelli
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopADVA
 
Multi Channel Protocols In Cognitive Radio Networks
Multi Channel Protocols In  Cognitive Radio NetworksMulti Channel Protocols In  Cognitive Radio Networks
Multi Channel Protocols In Cognitive Radio NetworksMuhammad Mustafa
 
Optical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiersOptical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifierseSAT Journals
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5GHavar Bathaee
 
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING) DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)vijay223225
 
DWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsDWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsCPqD
 
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]APNIC
 
Autonomic nervous system Physiology
Autonomic nervous system PhysiologyAutonomic nervous system Physiology
Autonomic nervous system PhysiologyRaghu Veer
 

Viewers also liked (17)

Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingOptimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum Workshop
 
CHOKI
CHOKICHOKI
CHOKI
 
Dwdm
DwdmDwdm
Dwdm
 
Multi Channel Protocols In Cognitive Radio Networks
Multi Channel Protocols In  Cognitive Radio NetworksMulti Channel Protocols In  Cognitive Radio Networks
Multi Channel Protocols In Cognitive Radio Networks
 
Dwdm good
Dwdm goodDwdm good
Dwdm good
 
Optical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiersOptical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiers
 
Optical Networking & DWDM
Optical Networking & DWDMOptical Networking & DWDM
Optical Networking & DWDM
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5G
 
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING) DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 
CWDM vs DWDM Technology
CWDM vs DWDM TechnologyCWDM vs DWDM Technology
CWDM vs DWDM Technology
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
DWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsDWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access Systems
 
Cognitiveradio
CognitiveradioCognitiveradio
Cognitiveradio
 
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
 
Autonomic nervous system Physiology
Autonomic nervous system PhysiologyAutonomic nervous system Physiology
Autonomic nervous system Physiology
 

Similar to A framework for data traffic in cognitive radio net works using trusted token analyzer scheme

A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyijngnjournal
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
 
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
 
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIO
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIOMETHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIO
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIOIRJET Journal
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkIRJET Journal
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...rahulmonikasharma
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 

Similar to A framework for data traffic in cognitive radio net works using trusted token analyzer scheme (20)

A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
 
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
 
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIO
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIOMETHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIO
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIO
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio Network
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
G010433745
G010433745G010433745
G010433745
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

A framework for data traffic in cognitive radio net works using trusted token analyzer scheme

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 611 A FRAMEWORK FOR DATA TRAFFIC IN COGNITIVE RADIO NET- WORKS USING TRUSTED TOKEN ANALYZER SCHEME Nikitha Lee Joy1 , Sangeetha Senthilkumar2 , S.Sathyaraj3 1 PG Student, Oxford Engineering College, Trichy 2 Assistant Professor, Oxford Engineering College, Trichy 3 Assistant Professor, Oxford Engineering College, Trichy Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra- dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys- tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man- agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cognitive radio is a recent novel approach for the realization of intelligent and sophisticated wireless systems. Software Defined Radio, a recent development in wireless technology, promise to address some of the major limitations like ineffi- cient utilization and management of the radio frequency (RF) in both licensed and unlicensed spectrum band experienced by legacy wireless communication system. A radio that is able to reliably sense the spectral environment over a wide band- width, detect the presence/absence of legacy users and use the spectrum only if communication does not interfere with any primary user is called a cognitive radio. The seminal paper of J. Mitola [8] introduced the concept of cognitive radio. Ian F. Akyildiz et al. [1] defines cognitive radio as: “A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it oper- ates”. Cognitive radio networks are composed of cognitive radio devices. An interconnected set of cognitive radio devices that share information is defined as a cognitive radio networks. (CRN).Cognitive radio networks (CRN) are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access (DSA) techniques. Cognitive Radio Networks aim at performing the cognitive operations such as sensing the spectrum, managing available resources, and making user-independent, intelligent decisions based on cooperation of multiple cognitive nodes. CR networks however impose unique challenges because of the high fluctuation in the available spectrum as well as the diverse quality-of-service (QoS) requirements of various ap- plications and secondary users. To address these challenges, first, CR networks are required to determine which portions of the spectrum are available, called spectrum sensing [2], [10]. Furthermore, how to coordinate multiple CR users to share the spectrum band, called spectrum sharing, is another important issue in CR networks [6], [16].Secondary users have to vacate the channel for the primary user, when they arrive, called spectrum mobility is another aspect of CRN.Fig.1shows the dynamic spectrum management framework [2]. Spectrum de- cision in CRN refers to the ability of the secondary users to select the best available spectrum band to satisfy the user‟s quality of service requirements. Quality of Service for the sec- ondary users involves data traffic management. Fig 1: Dynamic Spectrum Management Framework
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 612 To improve spectrum efficiency in cognitive radio networks, many operations such as sharing data in cooperative spectrum sensing, broadcasting spectrum-aware routing information, and coordinating spectrum access rely on control message are exchanged on a common control channel. Thus, a reliable and „„always on‟‟ control channel is unavoidable in CRN. 2. RELATED WORKS 2.1 Spectrum Decision For spectrum allocation, a global optimization scheme is de- veloped based on graph theory [17]. Distributed spectrum al- location based on local bargaining is proposed in [4], where CR users negotiate spectrum assignment within local self- organized groups. In [20], a dynamic channel selection scheme is developed for delay-sensitive applications based on a priority queuing analysis and a decentralized learning algo- rithm. 2.2 QoS Management /Data Traffic Management QoS support in CR systems is critical to ensure its success in consumer wireless market .In contrast to traditional wireless communication networks, one of the major challenges faced in cognitive radio networks is the interruptions from primary users. The service of packets in cognitive radio network has to be interrupted when primary users emerges. Usually, the emergence of primary user is assumed to be stationary., Such an assumption may not be true in practical means, since the traffic pattern of primary users could be time variant. [9] Spe- cifies transient analysis of data traffic in cognitive radio net- works. A time-varying service capacity is discussed in [12] to widen the application. The problem of designing effective routing solutions for multi-hop CRNs, which is a focal issue to fully unleash the potentials of the cognitive networking paradigm, is focused in [25]. 3. PROPOSED SYSTEM 3.1 System Model Primary radio nodes are the legacy users and they can access their respective licensed bands without any restriction. Indeed, PR nodes have the highest priority to access the channels and should not be interrupted by the CR nodes. We consider an OSS environment, where secondary users equipped with CRs are operating over N orthogonal frequency channels that are licensed to legacy(primary) users. One of the nodes is considered as head node or server. It involves the trusted token analyzer scheme and location verification schemes. Fig 2: General Framework In cognitive radio network each spectrum band is characte- rized based on local observations and on statistical informa- tion of the primary networks which is normally called PU ac- tivities. The selection of the most appropriate spectrum band is the next step in spectrum decision, based on the spectrum band characterization. Thirdly, a CR should be able to reconfigure its transceiver parameters to support communication within the selected spectrum band. Once the spectrum decision is made, and a particular spectrum is chosen for secondary data transmission, the rendezvous process is initiated. Link establishment in distributed cognitive radio networks requires the communicating nodes to be rendezvous to exchange control Figure 2 specifies the general frame work for CR transmis- sion. Geo-location database contains the information like the channel condition, capacity of the channel etc. The primary user activity is monitored in spectrum sensing along with the sensing of unused or under-utilized spectrum. Based on these information the spectrum decision is made which involves the spectrum characterization and also the quality of the service and users quality requirement are monitored here. Based on the decision the channel is selected for CR transmission.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 613 Fig 3: Trusted Token Analyzer 3.2 Probabilistic Location Verification Location verification is an effective defense against attacks which take advantage of a lack, or compromise, of location information in the spectrum sensing. Beacon nodes[ Fig 3] will perform the spectrum observation. Beacon nodes will collect all the local information and the availability of the spectrum holes. Beacon nodes will hand over these local ob- servations to the head node. Head node involves probabilistic location verification scheme which will in turn locate the loca- tion of the spectrum holes. The location of the identified spec- trum hole is indeed verified in probabilistic location verifica- tion against fake spectrum hole information. 3.3 Trusted Token Analyzer Scheme The general architecture for traffic management [fig 2] in- volves a server with trusted token analyzer, Attack resistant location estimation and location verification. Fig 3 gives the specific view of the trusted token analyzer scheme. Token bucket algorithm is used for generating tokens. The bucket represents a rate-limiting function of the policer on the inter- face input or output traffic .Each token in the bucket represents a “credit” for some number of bits, and tokens in the bucket are “cashed in” for the ability to receive or transmit traffic that conforms to a rate limit configured for the policer. The token arrival rate is the fixed bits-per-second rate at which tokens are added to the token bucket, but only up to the speci- fied depth of the bucket. Tokens are added based on the in- formation from the quality monitoring and the primary user activity monitoring. If both are satisfied a token is added into the bucket. The token bucket depth defines the capacity of the bucket in bytes.CR transmission takes place only when there are sufficient tokens are available in the bucket, thus control- ling or policing the traffic. When the sender needs to send a packet to the receiver, it will confirm the server for the availability of enough tokens. If enough tokens are available then the sender will send the packet. If the packet is received by any intermediate node, then it will analyze the location reference and it will again confirm the traffic conditions to the server and will then for- ward the packet to the destination. Once the packet is received by the intended receiver, it can view the message by opening the packet. 4. CONCLUSIONS Spectrum Sensing is performed to identify the spectrum avail- ability. Each CR performs spectrum sensing to identify the available spectrum bands and the spectrum decision process selects from these available bands for opportunistic use. A framework proposed here is an effective way of managing the secondary user data transmission by keeping track of the pri- mary user activity and also the QoS requirement of the sec- ondary users. The QoS requirement for secondary users is managed by using trusted token analyzer. Trusted token ana- lyzer manages the users by controlling the user data traffic. FUTURE WORK Cognitive Radio Network is a vast field to study. QoS re- quirement monitoring for the secondary user is one of the pa- rameter we are going to focus in future. Also the primary user emulation attack is another consideration. REFERENCES [1]. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohan- ty,“Next generation /dynamicspectrum access/cognitive radio wireless networks: a survey,” Computer Networks: The Inter- national Journal of Computer and Telecommunications Net- working, vol. 50 , Issue 13, pp. 2127 – 2159, 2006. [2]. D. Cabric, S.M. Mishra, and R.W. Brodersen, “Implemen- tation Issues in Spectrum Sensing for Cognitive Radios,” Proc. IEEE Asilomar Conf. Signals, Systems and Computers, pp. 772-776, Nov. 2004. [3]. M.T Masonta, M. Mzyece, N.Ntlatlapa, “Spectrum Deci- sion in Cognitive Radio Networks: A Survey” IEEE Commu- nications Surveys and Tutorials, vol. 15, no. 3, pp. 1088-1107 [4]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005. [5]. Jarkko Paavola, “ Operational Challenges for Emerging
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 614 Cognitive Radio Technologies -Wireless Devices Utilizing TV White Spaces”, Proceeding of the 10th Conference of FRUCT Association [6]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [7]. T. Chen, H. Zhang, G.M. Maggio, and I. Chlamtac, “CogMesh: A Cluster-Based Cognitive Radio Network,” Proc. IEEE Second Symp.New Frontiers in Dynamic Spectrum Access Networks (DySPAN),pp. 168-178, Apr. 2007 [8]. J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communica- tions, vol. 6, no. 4, pp. 13–18, 1999. [9]. Husheng Li, Ju Bin Song, and Zhu Han; “Transient Anal- ysis of Data Traffic in Cognitive Radio Networks: A Non- Equilibrium Statistical Mechanics Approach” ; IEEE Transac- tions On Wireless Communications, Vol. 12, No. 9, Septem- ber 2013 [10]. M. Gandetto and C. Regazzoni, “Spectrum Sensing: A Distributed Approach for Cognitive Terminals,” IEEE J. Se- lected Areas in Comm., vol. 25, no. 3, pp. 546-557, Apr. 2007. [11]. L. Cao and H. Zheng, “Distributed Spectrum Allocation via Local Bargaining,” Proc. IEEE Sensor and Ad Hoc Comm. and Networks (SECON), pp. 475-486, Sept. 2005 [12]. C.-S. Chang and J.A. Thomas, “Effective bandwidth in high-speed digital networks”, IEEE Journal on Selected Areas in Communications, Vol. 13, NO 6, August 1995 [13]. R. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528, Apr. 2007. [14]. F. Borgonovo, M. Cesana, and L. Fratta, “Throughput and delay bounds for cognitive transmissions,” Advances Ad hoc Netw., pp. 179–190, Aug. 2008.. [15]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks(DySPAN ‟05), pp. 269-278, Nov. 2005. [16]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005 [17]. C. Peng, H. Zheng, and B.Y. Zhao, “Utilization and Fairness in Spectrum Assignment for Opportunistic Spectrum Access,” ACM Mobile Networks and Applications, vol. 11, no. 4, pp. 555-576, Aug. 2006. [18]. G. Ganesan, Y.G. Li, Cooperative spectrum sensing in cognitive radio networks, in: Proc. IEEE DySPAN 2005, No- vember 2005, pp. 137–143. [19]. D. Cabric, et. al., A Cognitive Radio Approach for Usage of Virtual Unlicensed Spectrum. In proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [20]. H. Shiang and M. Schaar, “Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applica- tions over Cognitive Radio Networks,” IEEE Trans. Multime- dia, vol. 5,no. 10, pp. 896-909, Aug. 2008. [21]. T. Harrold, R. Cepeda, and M. Beach, “Long-term mea- surements of spectrum occupancy characteristics,” in Proceed- ings of the IEEE DySPAN Conference, 2011, pp. 83–89. [22]. B. Canberk, I. F. Akyildiz, and S. Oktug, “Primary user activity modeling using first-difference filter clustering and correlation in cognitive radio networks,” IEEE/ACM Transac- tions on Networking, vol. 19, no. 1, pp. 170–183, Feb. 2011. [23]. Y.-C. Kuo, “Quorum-based power-saving multicast pro- tocols in the asynchronous ad-hoc network,” Computer Net- works, vol. 54, pp.1911–1922, 2010 [24]. D. Cabric, S.M. Mishra, D. Willkomm, R. Brodersen, A.Wolisz, “A Cognitive radio approach for usage of virtual unlicensed spectrum”, in: Proc. 14th IST Mobile and Wireless Communications Summit, June 2005. [25]. L. Cao, H. Zheng, Distributed spectrum allocation via localVbargaining, in: Proc. IEEE Sensor and Ad Hoc Com- municationsVand Networks (SECON) 2005, September 2005, pp.475–486. [26]. W.-Y. Lee and I. F. Akyildiz, “A spectrum decision framework for cognitive radio networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 161–174, Feb. 2011. [27]. J. Riihijarvi, P. Mahonene, M. Wellens, and M. Gordziel, “Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields,” in Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mo- bile Radio Communications, Cannes, Sep. 15–18 2008. [28]. D. Cabric, S.M. Mishra, R.W. Brodersen, “Implementa- tion issues in spectrum sensing for cognitive radios”, in: Proc. 38th Asilomar Conference on Signals, Systems and Comput- ers 2004, November 2004, pp. 772–776. [29]. M. Hoyhtya, S. Pollin, and A. Mammela, “Improving the performance of cognitive radios through classification, learn- ing, and predictive channel selection,” Advances in Electron- ics and Telecommunications, vol. 2, no. 4, pp. 28–38, Dec. 2011. [30]. N. Nie and C. Comaniciu, “Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks,” Proc. First IEEE Int‟l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN ‟05), pp. 269-278, Nov. 2005. [31]. C. Ghosh, S. Pagadarai, D. Agrawal, and A. Wyglinski, “A framework for statistical wireless spectrum occupancy modeling,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 38–44, Jan. 2010 [32]. E.Z Tragos, S.Zeadally, A.G. Fragkiadakis, V. A.Siris, “Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey” , IEEE Communications Surveys & Tutorials, Accepted For Publication 1 [33].http://www.channelpartnersonline.com/blogs/peertopeer/ 2014/01/spectrum-sharing-drives-mobile-market-growth.aspx [34].http://www.gonzalovazquezvilar.eu/cognitiveradio.htm [35]. Cognitive Radio Networks: From Theory to Practice By Ahmed Khattab, Dmitri Perkins, Magdy Bayoumi [36]. M. Cesana,F. Cuomo, E.Ekici ; “Routing in cognitive radio networks: Challenges and solutions” Ad Hoc Netwoks ELSEVIER Volume 9, Issue 3, May 2011.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 615 [37]. A. A. Daoud, M. Alanyali, and D. Starobinski, “Second- ary pricing of spectrum in cellular CDMA networks,” in Proc. IEEE Int. Symposium for New Frontiers in DySPAN, Dublin, Ireland, Apr. 17–20 2007 [38]. Norfolk State University Norfolk VA 23504 in@nsu.edu Ma Liangping ; Shen Chi Xin, Chunsheng Dept. of Computer Science. "Path-Centric Channel Assignment in Cognitive Ra- dio Wireless Networks ". 2007. [39]. A. Ghasemi, E.S. Sousa, Collaborative spectrum sensing for opportunistic access in fading environment, in: Proc. IEEE DySPAN 2005, November 2005, pp. 131–136.