Cognitive Radio Network (CRN) provides effective capabilities for resource allocation with the valuable spectrum resources in the network. It provides the effective allocation of resources to the unlicensed users or Secondary Users (SUs) to access the spectrum those are unused by the licensed users or Primary Users (Pus). This paper develops an Optimal Relay Selection scheme with the spectrum-sharing scheme in CRN. The proposed Cross-Layer Spider Swarm Shiftingis implemented in CRN for the optimal relay selection with Spider Swarm Optimization (SSO). The shortest path is estimated with the data shifting model for the data transmission path in the CRN. This study examines a cognitive relay network (CRN) with interference restrictions imposed by a mobile end user (MU). Half-duplex communication is used in the proposed system model between a single primary user (PU) and a single secondary user (SU). Between the SU source and SU destination, an amplify and forward (AF) relaying mechanism is also used. While other nodes (SU Source, SU relays, and PU) are supposed to be immobile in this scenario, the mobile end user (SU destination) is assumed to travel at high vehicle speeds. The suggested method achieves variety by placing a selection combiner at the SU destination and dynamically selecting the optimal relay for transmission based on the greatest signal-to-noise (SNR) ratio. The performance of the proposed Cross-Layer Spider Swarm Shifting model is compared with the Spectrum Sharing Optimization with QoS Guarantee (SSO-QG). The comparative analysis expressed that the proposed Cross-Layer Spider Swarm Shifting model delay is reduced by 15% compared with SSO-QG. Additionally, the proposed Cross-Layer Spider Swarm Shiftingexhibits the improved network performance of ~25% higher throughput compared with SSO-QG.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
IMPROVED Q-REINFORCEMENT LEARNING BASED OPTIMAL CHANNEL SELECTION IN COGNITIV...IJCNCJournal
Cognitive Radio Networks are an emerging technology in for wireless communication. With increasing
number of wireless devices in wireless communication, there is a shortage of spectrum. Also, due to the
static allocation of channels in wireless networks, there is a scarcity of spectrum underutilization. For
efficient spectrum utilization, secondary users dynamically select the free channel of primary users for the
transmission of packets. In this work, the performance of routing in a cognitive radio network is improved
by the decision of optimal channel selection. The aim of this work is to maximize the throughput and
reduce the end-to-end delay. Therefore, an Improved Q-Reinforcement learning algorithm is proposed for
the optimal channel selection during the packet routing between source and destination. The performance
of this work is compared with the existing routing protocols. It is simulated in network simulator-2 (NS2)
with Cognitive Radio Cognitive Network (CRCN) simulation. After performance evaluation, it is observed
that the proposed work performs better than existing work with respect to packet delivery ratio,
throughput, delay, jitter, control overhead, call blocking probability, packet dropping ratio, good put and
normalized routing overhead.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
IMPROVED Q-REINFORCEMENT LEARNING BASED OPTIMAL CHANNEL SELECTION IN COGNITIV...IJCNCJournal
Cognitive Radio Networks are an emerging technology in for wireless communication. With increasing
number of wireless devices in wireless communication, there is a shortage of spectrum. Also, due to the
static allocation of channels in wireless networks, there is a scarcity of spectrum underutilization. For
efficient spectrum utilization, secondary users dynamically select the free channel of primary users for the
transmission of packets. In this work, the performance of routing in a cognitive radio network is improved
by the decision of optimal channel selection. The aim of this work is to maximize the throughput and
reduce the end-to-end delay. Therefore, an Improved Q-Reinforcement learning algorithm is proposed for
the optimal channel selection during the packet routing between source and destination. The performance
of this work is compared with the existing routing protocols. It is simulated in network simulator-2 (NS2)
with Cognitive Radio Cognitive Network (CRCN) simulation. After performance evaluation, it is observed
that the proposed work performs better than existing work with respect to packet delivery ratio,
throughput, delay, jitter, control overhead, call blocking probability, packet dropping ratio, good put and
normalized routing overhead.
Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitiv...IJCNCJournal
Cognitive Radio Networks are an emerging technology in for wireless communication. With increasing number of wireless devices in wireless communication, there is a shortage of spectrum. Also, due to the static allocation of channels in wireless networks, there is a scarcity of spectrum underutilization. For efficient spectrum utilization, secondary users dynamically select the free channel of primary users for the transmission of packets. In this work, the performance of routing in a cognitive radio network is improved by the decision of optimal channel selection. The aim of this work is to maximize the throughput and reduce the end-to-end delay. Therefore, an Improved Q-Reinforcement learning algorithm is proposed for the optimal channel selection during the packet routing between source and destination. The performance of this work is compared with the existing routing protocols. It is simulated in network simulator-2 (NS2) with Cognitive Radio Cognitive Network (CRCN) simulation. After performance evaluation, it is observed that the proposed work performs better than existing work with respect to packet delivery ratio, throughput, delay, jitter, control overhead, call blocking probability, packet dropping ratio, good put and normalized routing overhead
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
The coupling of multiple protocol layers for a Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network, enables better interaction, coordination, and joint optimization of different protocols in achieving remarkable performance improvements. In this paper, network, and medium access control (MAC) layer functionalities are cross-layered by developing the joint strategy of routing and effective spectrum sensing and Dynamic Channel Selection (DCS) using the Reinforcement Learning (RL) algorithm. In an industrial ad-hoc scenario, the network layer utilizes the sensed spectrum and selected channel by MAC layer for next-hop routing. MAC layer utilizes the lowest known transmission delay of a channel for a single hop as computed by the network layer, which improves the MAC channel selection operation. The applied RLbased technique (Q learning) enables the CR Secondary Users (SUs) to sense, learn, and make the optimal decision on their environment of operations. The proposed RLCLD schemes improve the SU network performance up to 30% as compared to conventional methods.
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
The coupling of multiple protocol layers for a Cognitive Radio-based Industrial Internet of Ad-hoc Sensor
Network, enables better interaction, coordination, and joint optimization of different protocols in achieving
remarkable performance improvements. In this paper, network, and medium access control (MAC) layer
functionalities are cross-layered by developing the joint strategy of routing and effective spectrum sensing
and Dynamic Channel Selection (DCS) using the Reinforcement Learning (RL) algorithm. In an industrial
ad-hoc scenario, the network layer utilizes the sensed spectrum and selected channel by MAC layer for
next-hop routing. MAC layer utilizes the lowest known transmission delay of a channel for a single hop as
computed by the network layer, which improves the MAC channel selection operation. The applied RLbased technique (Q learning) enables the CR Secondary Users (SUs) to sense, learn, and make the optimal
decision on their environment of operations. The proposed RLCLD schemes improve the SU network
performance up to 30% as compared to conventional methods.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
Q-LEARNING BASED ROUTING PROTOCOL TO ENHANCE NETWORK LIFETIME IN WSNSIJCNCJournal
In resource constraint Wireless Sensor Networks (WSNs), enhancement of network lifetime has been one of the significantly challenging issues for the researchers. Researchers have been exploiting machine learning techniques, in particular reinforcement learning, to achieve efficient solutions in the domain of WSN. The objective of this paper is to apply Q-learning, a reinforcement learning technique, to enhance the lifetime of the network, by developing distributed routing protocols. Q-learning is an attractive choice for routing due to its low computational requirements and additional memory demands. To facilitate an agent running at each node to take an optimal action, the approach considers node’s residual energy, hop length to sink and transmission power. The parameters, residual energy and hop length, are used to calculate the Q-value, which in turn is used to decide the optimal next-hop for routing. The proposed protocols’ performance is evaluated through NS3 simulations, and compared with AODV protocol in terms of network lifetime, throughput and end-to-end delay.
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
Wireless Sensor Networks has been widely used for monitoring and control applications in our daily life
due to its appealing characteristic like low cost, power efficient, easy to implement in many areas such as
war zone, medical monitoring optimization and so on. However, Wireless Sensor Networks (WSN) requires
a new routing algorithm for health monitoring. In this paper, an efficient routing model called Local
Search and Enhanced Betweenness Routing (LS-EBR) in WSN to improve routing efficiency by increasing
sensor nodes coverage and minimizing the time for routing is presented. The LS-EBR model in WSN for
health monitoring uses enhanced betweenness routing that measures energy consumption of the
neighboring nodes in a local search manner. First, a novel Local Search model that does not require
global information about the entire network and in turn divert routing from sensor nodes that are more
frequently used is used. The aim is to reduce the time for routing. Second, an Enhanced Betweenness
Routing model that not only considers routing overhead but also considers the remaining energy of sensor
node into account to ensure higher number of sensor nodes to be monitored, thus achieving much higher
coverage is designed. Finally, working together with the above Local Search and Enhanced Betweenness
Routing by applying Enhanced Betweenness Routing algorithm, reduces the average energy consumed.
Simulation results showed that the proposed routing model has advantages over opportunistic routing with
respect to coverage and improving routing efficiency by reducing time for routing in wireless sensor
networks.
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an indispensable technology. A mobile sink may be required for some applications in the sensor field, where incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual backbone network enables data collection from members of the frame and delivers it to the mobile sink. The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy consumption by 30% and delay by 9% as compared with static sink scenario.
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an
indispensable technology. A mobile sink may be required for some applications in the sensor field, where
incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and
packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend
network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a
virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual
backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual
backbone network enables data collection from members of the frame and delivers it to the mobile sink.
The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy
consumption by 30% and delay by 9% as compared with static sink scenario.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
More Related Content
Similar to Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network
Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitiv...IJCNCJournal
Cognitive Radio Networks are an emerging technology in for wireless communication. With increasing number of wireless devices in wireless communication, there is a shortage of spectrum. Also, due to the static allocation of channels in wireless networks, there is a scarcity of spectrum underutilization. For efficient spectrum utilization, secondary users dynamically select the free channel of primary users for the transmission of packets. In this work, the performance of routing in a cognitive radio network is improved by the decision of optimal channel selection. The aim of this work is to maximize the throughput and reduce the end-to-end delay. Therefore, an Improved Q-Reinforcement learning algorithm is proposed for the optimal channel selection during the packet routing between source and destination. The performance of this work is compared with the existing routing protocols. It is simulated in network simulator-2 (NS2) with Cognitive Radio Cognitive Network (CRCN) simulation. After performance evaluation, it is observed that the proposed work performs better than existing work with respect to packet delivery ratio, throughput, delay, jitter, control overhead, call blocking probability, packet dropping ratio, good put and normalized routing overhead
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
The coupling of multiple protocol layers for a Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network, enables better interaction, coordination, and joint optimization of different protocols in achieving remarkable performance improvements. In this paper, network, and medium access control (MAC) layer functionalities are cross-layered by developing the joint strategy of routing and effective spectrum sensing and Dynamic Channel Selection (DCS) using the Reinforcement Learning (RL) algorithm. In an industrial ad-hoc scenario, the network layer utilizes the sensed spectrum and selected channel by MAC layer for next-hop routing. MAC layer utilizes the lowest known transmission delay of a channel for a single hop as computed by the network layer, which improves the MAC channel selection operation. The applied RLbased technique (Q learning) enables the CR Secondary Users (SUs) to sense, learn, and make the optimal decision on their environment of operations. The proposed RLCLD schemes improve the SU network performance up to 30% as compared to conventional methods.
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
The coupling of multiple protocol layers for a Cognitive Radio-based Industrial Internet of Ad-hoc Sensor
Network, enables better interaction, coordination, and joint optimization of different protocols in achieving
remarkable performance improvements. In this paper, network, and medium access control (MAC) layer
functionalities are cross-layered by developing the joint strategy of routing and effective spectrum sensing
and Dynamic Channel Selection (DCS) using the Reinforcement Learning (RL) algorithm. In an industrial
ad-hoc scenario, the network layer utilizes the sensed spectrum and selected channel by MAC layer for
next-hop routing. MAC layer utilizes the lowest known transmission delay of a channel for a single hop as
computed by the network layer, which improves the MAC channel selection operation. The applied RLbased technique (Q learning) enables the CR Secondary Users (SUs) to sense, learn, and make the optimal
decision on their environment of operations. The proposed RLCLD schemes improve the SU network
performance up to 30% as compared to conventional methods.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
Q-LEARNING BASED ROUTING PROTOCOL TO ENHANCE NETWORK LIFETIME IN WSNSIJCNCJournal
In resource constraint Wireless Sensor Networks (WSNs), enhancement of network lifetime has been one of the significantly challenging issues for the researchers. Researchers have been exploiting machine learning techniques, in particular reinforcement learning, to achieve efficient solutions in the domain of WSN. The objective of this paper is to apply Q-learning, a reinforcement learning technique, to enhance the lifetime of the network, by developing distributed routing protocols. Q-learning is an attractive choice for routing due to its low computational requirements and additional memory demands. To facilitate an agent running at each node to take an optimal action, the approach considers node’s residual energy, hop length to sink and transmission power. The parameters, residual energy and hop length, are used to calculate the Q-value, which in turn is used to decide the optimal next-hop for routing. The proposed protocols’ performance is evaluated through NS3 simulations, and compared with AODV protocol in terms of network lifetime, throughput and end-to-end delay.
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
Wireless Sensor Networks has been widely used for monitoring and control applications in our daily life
due to its appealing characteristic like low cost, power efficient, easy to implement in many areas such as
war zone, medical monitoring optimization and so on. However, Wireless Sensor Networks (WSN) requires
a new routing algorithm for health monitoring. In this paper, an efficient routing model called Local
Search and Enhanced Betweenness Routing (LS-EBR) in WSN to improve routing efficiency by increasing
sensor nodes coverage and minimizing the time for routing is presented. The LS-EBR model in WSN for
health monitoring uses enhanced betweenness routing that measures energy consumption of the
neighboring nodes in a local search manner. First, a novel Local Search model that does not require
global information about the entire network and in turn divert routing from sensor nodes that are more
frequently used is used. The aim is to reduce the time for routing. Second, an Enhanced Betweenness
Routing model that not only considers routing overhead but also considers the remaining energy of sensor
node into account to ensure higher number of sensor nodes to be monitored, thus achieving much higher
coverage is designed. Finally, working together with the above Local Search and Enhanced Betweenness
Routing by applying Enhanced Betweenness Routing algorithm, reduces the average energy consumed.
Simulation results showed that the proposed routing model has advantages over opportunistic routing with
respect to coverage and improving routing efficiency by reducing time for routing in wireless sensor
networks.
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an indispensable technology. A mobile sink may be required for some applications in the sensor field, where incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual backbone network enables data collection from members of the frame and delivers it to the mobile sink. The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy consumption by 30% and delay by 9% as compared with static sink scenario.
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an
indispensable technology. A mobile sink may be required for some applications in the sensor field, where
incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and
packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend
network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a
virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual
backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual
backbone network enables data collection from members of the frame and delivers it to the mobile sink.
The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy
consumption by 30% and delay by 9% as compared with static sink scenario.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Similar to Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network
1. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
DOI: 10.5121/ijcnc.2023.15607 149
RANDOM RELAY SELECTION BASED HEURISTIC
OPTIMIZATION MODEL FOR THE SCHEDULING
AND EFFECTIVE RESOURCE ALLOCATION IN THE
COGNITIVE RADIO NETWORK
Aravindkumaran.S1 *, Dr.Saraswady.D2
1Research scholar, Department of Electronics and communication engineering,
Puducherry Technological University, Puducherry, India.
2Professor, Department of Electronics and communication engineering, Puducherry
Technological University, Puducherry, India.
ABSTRACT
Cognitive Radio Network (CRN) provides effective capabilities for resource allocation with the valuable
spectrum resources in the network. It provides the effective allocation of resources to the unlicensed users
or Secondary Users (SUs) to access the spectrum those are unused by the licensed users or Primary Users
(Pus). This paper develops an Optimal Relay Selection scheme with the spectrum-sharing scheme in CRN.
The proposed Cross-Layer Spider Swarm Shiftingis implemented in CRN for the optimal relay selection
with Spider Swarm Optimization (SSO). The shortest path is estimated with the data shifting model for the
data transmission path in the CRN. This study examines a cognitive relay network (CRN) with interference
restrictions imposed by a mobile end user (MU). Half-duplex communication is used in the proposed
system model between a single primary user (PU) and a single secondary user (SU). Between the SU
source and SU destination, an amplify and forward (AF) relaying mechanism is also used. While other
nodes (SU Source, SU relays, and PU) are supposed to be immobile in this scenario, the mobile end user
(SU destination) is assumed to travel at high vehicle speeds. The suggested method achieves variety by
placing a selection combiner at the SU destination and dynamically selecting the optimal relay for
transmission based on the greatest signal-to-noise (SNR) ratio. The performance of the proposed Cross-
Layer Spider Swarm Shifting model is compared with the Spectrum Sharing Optimization with QoS
Guarantee (SSO-QG). The comparative analysis expressed that the proposed Cross-Layer Spider Swarm
Shifting model delay is reduced by 15% compared with SSO-QG. Additionally, the proposed Cross-Layer
Spider Swarm Shiftingexhibits the improved network performance of ~25% higher throughput compared
with SSO-QG.
KEYWORDS
Cognitive Radio Network (CRN), Cross-layer, Spider swarm optimization, Data shifting, Spatio-
constraints
1. INTRODUCTION
Cognitive Radio Networks (CRN) perform learning and communication with the neighboring
environment to recognize and access the space in the spectrum to reduce the frequency of
occurrence [1]. CR is defined as the “intelligent radio network technology for the variation in the
transmitter parameters those vary dynamically based on operating environment for the self-
mobility behaviour to achieve environmental awareness and transfer in parameters”. In the case
of signal processing, CR is considered the smart wireless communication system those acquires
knowledge from the environment with the use of artificial intelligence technology [2]. CR
2. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
150
comprises the statistical properties computed based on the signal variation in wireless systems
based on the real-time change in operational parameters [3]. Like radio technology, CR uses
cognitive intelligence for the real time environment for the effective utilization of available
spectrum through modification in the factor and decision-making process. The CR comprises of
the precondition of the available spectrum effectively with the categorization of primary (PUs)
(authorized users) and secondary users (SU) (unauthorized users). To estimate the openness in
the spectrum idle spectrum is sensed based on the periodic estimation of user identity [4]. The SU
utilizes the available frequency band without affecting on the PUs communication.
In CRN routing and scheduling is considered as the challenging task that computes the diversity
of the channel availability and data rates [5]. The conventional scheduling and routing schemes in
CRN exhibit the some limitations with the weighted max-min fair scheduler those impact on the
window size, central scheduler and exchange of information from the central scheduler between
each user, issues related to fairness, minimized throughput, increase in maintenance cost and so
on [6]. Due to reduced channel availability, the throughput of the network is minimized. The
CRN routing process is efficient with minimized time and energy utilization with the appropriate
resource scheduling schemes [7]. Conventionally, CRN resource allocation techniques increase
the consumption of power and reduce interference [8]. The unused spectrum or holes are replaced
with the integration of PUs with the SUs. The number of relay nodes or SUs increases the
performance of the secondary network with reduced performance characteristics [9]. The
spectrum sharing technique is implemented for the effective distribution of spectrum between
secondary users with appropriate usage of cost. The selection of effective channels through
spectrum sharing relies on the secondary users in CRN to compute the detection of effective
spectrum [10].
Research Contribution and motivation:
Cognitive radio improves SE through controlling spectrum use. Additionally, as compared to the
conventional one-way relaying, two-way relaying boosts SE. Together with CD, these two
methods greatly improve the SE. To increase the security of the secondary user network, we take
into account single and multiple relay selection strategies. Analysis reveals that while employing
a single relay, secondary transmitter(ST) and secondary destination (SD) merely selects the best
secondary relay for secondary transmission. However, if we choose numerous secondary relays,
the secondary signal is sent to the destination through multiple secondary relays. We calculate the
transmission intercept probability and outrage probability for both relay selection systems using
spectrum sensing. The relay selection strategies are mathematically analysed using RT, and direct
transmission is offered for comparison. According to the aforementioned situation, the reliability
of spectrum sensing is raised or the likelihood of a false alarm is decreased by utilising a filter
and forward relay transmission. As a result, both relay selection techniques' RTs have increased.
2. RELATED WORKS
Cross-layer design comprises of the optimized design model with the concept of waterfall in
Open System Interconnection (OSI) reference model provides the interconnection between the
protocol layers to provides the interdependences between layers and adaptability for the
information exchange between layers [11]. The cross layer interactions provides the appropriate
increase in the efficiency of the network and Quality of Service (QoS). In network wireless
technology cross-layer design is considered as the effective network model for the transmission
of information through physical medium those are significant over the time [12]. The information
exchange between the layers is computed based on the optimized throughput of the network state.
The examination expressed that energy consumption with cross-layer model is less effective [13].
The implementation of the cross-layer design is considered as the effective method to increase
3. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
151
the performance of the mobile ad hoc network. The performance of the network is computed
based on the consideration of different parameters such as reliability, delay, throughput, and
energy efficiency [14]. The effective spectrum and sharing between users are performed with the
physical layer and the spectrum decision process is performed in the network layer. The
implementation of the spectrum mobility with the appropriate channel switching is performed
with the physical layer-based spectrum sensing model for the allocation of resources in link layer
and routing in network layer [15]. For the purpose of managing interference in underlay CRNs,
many signal processing approaches, including spread spectrum, power regulation, and
beamforming, have been investigated [16]. Power control controls interference in the power
domain, whereas spread spectrum manages interference in the code domain. Beamforming uses
the spatial degrees of freedom (DoF) that numerous antennas give to guide secondary signals in
specific directions and keep main users free from interference. Beamforming is more appealing in
practise compared to the other two approaches since it is good at reducing interference. Given its
potential, beamforming has been investigated in underlay CRNs to pursue a variety of goals,
including enhancing the security against eavesdroppers [19], maximising the data rate of
secondary users [18], and improving the energy efficiency of secondary transmissions [17].
Research Gap:
The networking and productivity of CRN are constrained owing to the degree of allowed
interference to either the PUs or even among the SUs themselves, which is another significant
issue that makes RA problems in CRN particularly difficult. The most severe impediment to
maximising resourcefulness and usefulness in CRN is likely the restriction on SUs' gearbox
caused by the degree of permitted interference to PUs. For the reasons listed above, it is essential
to conduct in-depth research on the foundation and guiding principles for implementing/adapting
the existing methodologies for RA in other wireless communications to CRN. Such investigations
will assist to characterise and examine its workability as well as determine its suitability of
application or purpose. This literature assessment demonstrates that much work has already been
done in this area, but that much more work is still needed to fill up the research gaps. Therefore,
knowing optimisation is essential to comprehending RA challenges in CRN and devising
solutions. Essentially, optimisation may be investigated and used as a crucial strategy for
resolving RA issues in CRN. As a well-developed analytical technique addressing a wide range
of issues, optimisation is widely employed in a variety of scientific disciplines, including
operations research, engineering, corporate finance, and economics. In optimisation, there is
typically a goal that has to be accomplished, such as maximising or minimising one or more
entities. This goal is always reflected in the objective function. Then, when working to
accomplish the goal, there are some restricting factors that must be taken into account.
Constraints must be broken during problem-solving; otherwise, any solutions that may be found
are null and void. The choice variables are generally often the last element of an optimisation
issue.
In CRN, MAC layer comprises of sharing of spectrum, selection of relay, sharing of resources
and scheduling is performed. In other hand, network layer performs the routing with the effective
management of spectrum through network and MAC layer. Hence, in this paper presented an
effective routing and scheduling scheme for the selection of relay to improve cross-layer design
is presented. The cross layer design comprises of MAC layer rules forwarded to the network
layer in the sender side. The Spider Swarm based optimization model is implemented for the
optimal path selection and routing. The packets within the network are presented with dynamic
packet shifting model to increase the throughput and reduce delay. The proposed CLSSS model
comprises of the cross-layer design for the computation of path in the network. The optimal paths
are estimated with the SSO with the data shifting process.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
152
This paper is organized as : section II discuss existing technique based on CRN spectrum sharing.
Section III provides the existing works on the resource allocation in CRN. Section IV provides
the architecture of the proposed CLSSS model and simulation results are presented in Section V
and overall conclusion is presented in Section VI.
3. MATERIALS AND METHODS
3.1. System Architecture: RSPSO
The proposed Cross-Layer Spider Swarm Shifting (CLSSS) comprises of the 4 modules such as
CRN, decision manager, optimization module and rule-based modules is illustrated in the figure
1. Within CRN modules it comprises of two modules those are relay selection and spectrum
allocation modules. The SUs designed to support the PUs in the network and Sus are designed to
offer effective relay selection with a selection of efficient network relay. The relay in the network
are computed based on the effective relay selection algorithm for the decision-making process.
The process comprises of spatio temporal constraints, co-ordination communication model for
the rule based decision management process for the Optimization process using SSO model. All
data process is controlled by the decision manager with the proposed CLSSS. The CLSSS
perform sharing of spectrum through dynamic allocation of resources between PUs and SUs. The
CLSSS model derive the optimal decision-making process with dynamic packet shifting
integrated with the Spider Swarm Optimization module formed rules.
Figure 1: Overall Architecture of CLSSS
The dynamic shifting is implemented based on the framed rules applied over the spider warm
optimization module, spatio-temporal management and communication-based on agent.
The decision manager stores those rules and manipulate the process for the dynamic packet
switching. Moreover, with the spatio-temporal analysis integrated with SSO perform module
amplification and random relay forwarding and selection for the secondary network. The CLSS
improves the QoS based on the prearranged values computed for the spectrum for the decision
manager request for the allocation of resources to the PUs. The primary network comprises of the
unused spectrum those integrates the Secondary network with spider swarm optimization. The
network throughput is increased by the presented algorithm model.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
153
3.2. System Modelling
The path for data transmission between PUs and SUs estimated with CLSSS model is presented
in figure 2. With the implementation of secondary network cooperative relay is estimated for the
spectrum efficiency estimation and data rate computation. In CRN available spectrum band
channels are allocated between the primary and secondary users. The frequency bands or holes
for PUs are applied over the relay nodes those dataset are computed with spider swarm
optimization. The developed CLSSS model compute the communication in relay nodes with the
estimation of data rate. Secondary network comprises of the one source node denoted as A and
the destination node in the network is denoted as B. The nodes have the M relay denoted as
{𝑅1, 𝑅2, … … , 𝑅𝑀}. The CLSSS compute chain gain with the estimation of link between source to
relay node and destination is denoted as 𝐶𝐺𝐴𝑖 and 𝐶𝐺𝑅𝐵𝑖 respectively. Those relay nodes are
measured with the CLSSS model performance based on consideration of the two cooperation
model such as Spatio-temporal factor and Amlify and Forward (AF). With the increase in node
relay the network throughput decreases. To overcome the issue spatio-temporal packet shifting is
implemented to achieve optimal data packet forwarding with application of spatio-temporal
constraints.
Figure 2: Data Transmission between PUs and SUs
3.3. Optimal Relay Selection
With the proposed CLSSS model optimal relay is selected through spatiotemporal relay selection
constraints model. It comprises of the ideal secondary user for the signal transmission for the
relay selection in the signal. The relay selection algorithm provides the effective relay selection
scheme with the spatio-temporal constraints based on the Signal to Noise Ratio (SNR) with the
selection of relay in CRN. Based on the computed SNR values the frames are estimated for the
relay to transmit the signal transmission between transmission to the destination node. The node
capable to act as the relay is represented as in equation (1) to equation (3)
𝑍𝑆𝑅𝑖 = √𝑤𝑠𝐶𝐻𝑆𝑅𝑖𝑦𝑠 + 𝑛𝑆𝑅𝑖, 𝑖 = 1,2, … … . , 𝑀 (1)
𝑍𝑅,𝐷 = 𝛼𝐶𝐻𝑅,𝐷𝑧𝑆𝑅𝑖 + 𝑛𝑅,𝐷 (2)
𝑍𝑅,𝐷 = 𝛼√𝑊
𝑠𝐶𝐻𝑅,𝐷𝐶𝐻𝑆𝑅𝑖𝑦𝑠 + 𝛼𝐶𝐻𝑅,𝐷𝑛𝑆𝑅𝑖 + 𝑛𝑅,𝐷 (3)
6. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
154
In the above equation the transmitted signal resource node is defined as RS which involved in
construction of signal to every receiver. The link in the destination node comprises of the
received relay noise with the source relay comprises of the additive Gaussian noise. The
pertaining transmission power with Source A subjected to interference of PUs. The relay
amplification factor is indicated as and the relay node power and amplification factor to satisfy
the succeeding condition presented in equation (4)
𝛼 = √
𝑊𝑠
(|𝐶𝐻𝑆𝑅𝑖|2𝑊𝑠+𝑁𝑜)
(4)
In above equation (4), the average noise power for each channel in secondary network is
presented as 𝑁𝑜. Based on the consideration of equation (1) to equation (3) the SNR of the
destination node in trails are computed as in equation (5) to equation (7)
𝜂𝑆𝑅𝑖 =
𝑊𝑠|𝐶𝐻𝑆𝑅𝑖|2
(𝑁𝑜)
(5)
𝜂𝑅𝐷 =
𝑊𝑠|𝐶𝐻𝑅𝑖𝐷|2
(𝑁𝑜)
(6)
𝜂𝑅,𝐷
∆𝐹
=
𝑊𝑠|𝐶𝐻𝑆𝑅𝑖|2|𝐶𝐻𝑅𝑖𝐷|2𝛼2
𝛼2|𝐶𝐻𝑅𝑖𝐷|2+𝑁𝑜+𝑁𝑜
(7)
The equivalent SNR 𝜂𝑅,𝐷
∆𝐹
is computed using equation (6) and (7), the resultant equation is
presented in (8)
𝜂𝑅,𝐷
∆𝐹
=
𝜂𝑆𝑅𝑖.𝜂𝑅𝐷
𝜂𝑆𝑅𝑖+ 𝜂𝑅𝐷+1
(8)
The signal to noise ratio is computed for the relay nodes with the varying coefficient of channel
fading. Consequently, the prerequisite values are computed based on the SNR threshold
valuesthose lies between A and B and the set of relay node constructed is denoted as 𝑈(𝑅). The
receiver SNR value for the ith SNR for the relay node and threshold is presented in equation (9)
𝜂𝑆𝑅𝑖 =
𝑊𝑠|𝐶𝐻𝑆𝑅𝑖|2
(𝑁𝑜)≥𝜂𝑡ℎ
𝑓𝑜𝑟 𝑖 = 1,2, … . . , 𝑀 (9)
In case true node relay it is included in the set or eliminated. Upon the computation of similar
process for the all-nodes new sets are computed using the equation (10)
𝑈(𝑅) = {(𝑅𝑖|𝜂𝑆𝑅𝑖 ≥ 𝜂𝑡ℎ)}, 𝑖 = 1,2, … . . , 𝑀 (10)
The process of relay selection is performed for the different channel sender and receiver nodes.
The packet delivery ratio of the node set are presented in equation (11)
𝑉(𝑅) = {(𝑅𝑖|max(𝜂𝑅,𝐷))}, 𝑖 = 1,2, … . . , 𝑀 (11)
Algorithm 1:Resource Allocation with CLSSS
1. Compute the received signal ith relay node noise with spatio-temporal computation.
2. Estimate the node solution based on the threshold of the relay nodes
3. Compute the link between the nodes towards the destination for the channel data
transmission with highest noise ratio.
4. Select the relay node in the network
5. Compute the relay link between sender to receiver using the equation (10)
6. Perform the spatitemporal constraints in the channel link
7. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
155
7. Identify the best relay link in the network
With the consideration of above equation (10) and (11) the best effective possible relay link are
computed between sources to destination node. The best relay link estimated is presented in
equation (12)
𝑅𝑏𝑒𝑠𝑡 = {𝑉(𝑅) ∩ 𝑈(𝑅)} (12)
Figure 3: Process in CLSSS
The proposed CLSSS model process is presented in figure 3 with the estimation of relay node in
the candidate node, optimal and best.
3.4. Spectrum Sharing with Spider Swarm Optimization
The proposed CLSSS model comprises of the secondary links count of N or the primary relay
link denoted as S for the mathematical modelling. With the primary channel data were
transmitted through the network relay links. Based on the similar characteristics estimation relay
link is estimated for the primary and relay channel. The primary link in the network provides the
assigned exclusive primary channel for the relay link within the network. The channel
interference and capacity is computed with the utilization of the utilized spectrum as stated in
equation (13)
𝛾𝑗 =
𝑊/𝑠𝑙𝑑(𝑗)𝑚
∑
𝑊
𝑟𝑠𝑑(𝑙,𝑗)𝑚+
𝑊
𝑝𝑠𝑑(𝑖,𝑗)𝑚
𝑙−∅
, 1 ≤ 𝑗 ≤ 𝑀 (13)
8. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
156
As in figure 4 the Signal to Noise Ratio (SINR) is computed for the computation of primary and
secondary links. The secondary receiver SINR is represented as 𝛾𝑗, the transmitter power value is
denoted as 𝑊 and attenuation factor is denoted as 𝑚. The distance between the computed signal
to noise ratio is denoted as 𝑠𝑙𝑑(𝑗)𝑚
, 𝑟𝑠𝑑(𝑙, 𝑗)𝑚
and𝑝𝑠𝑑(𝑖, 𝑗)𝑚
.
The ith primary receiver signal to noise ratio is presented in equation (14)
𝛾𝑗 =
𝑊/𝑝𝑙𝑑(𝑖)𝑚
∑
𝑊
𝑠𝑝𝑑(𝑙,𝑖)𝑚
𝑙−∅
, 1 ≤ 𝑗 ≤ 𝑀 (14)
Figure 4: Calculation of SINR
Based on the subsequent constraints spectrum sharing is performed based on the condition
presented in equation (15) and equation (16)
𝛾𝑖 ≥ 𝛾𝐿, 1 ≤ 𝑖 ≤ 𝑁 (15)
𝛾𝑗 ≥ 𝛾𝐿, 1 ≤ 𝑗 ≤ 𝑀 (16)
The primary link and relay link channel capacity is denoted as 𝐶𝑖 and 𝐶𝑗 as represented in
equation (17) and (18)
𝐶𝑖 = 𝐵𝑊𝑙𝑜𝑔2(1 + 𝛾𝑖) (17)
𝐶𝑗 = 𝐵𝑊𝑙𝑜𝑔2(1 + 𝛾𝑗) (18)
In above equation (17) and (18) primary channel bandwidth is represented as 𝐵𝑊 and the system
general format is presented in equation (19)
𝑀𝑎𝑥 ∑ 𝑐𝑗𝑦𝑗
𝑀
𝑗=1 + ∑ 𝑐𝑖
𝑁
𝑖=1 (19)
Where, 𝑐𝑖 > 0, 𝑐𝑗 > 0, which can be simplified as in equation (20)
𝑦𝑗 ∈ {0,1}, 1 ≤ 𝑗 ≤ 𝑀 (20)
Based on the equation (18) applying the constrains the optimal path within the network is
estimated. The proposed CLSSS model uses the SSO integrated with the temporal constraints.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
157
Based on the developed model the particle velocity and position are computed and updated as in
equation (21) and equation (22)
𝑣𝑖𝑑(𝑡 + 1) = 𝜔𝑉𝑖𝑑(𝑡) + 𝑐1𝑟1(𝑝𝑏𝑒𝑠𝑡(𝑡) − 𝑦𝑖𝑑(𝑡)) + 𝑐2𝑟2(𝑔𝑏𝑒𝑠𝑡 (𝑡) − 𝑦𝑖𝑑(𝑡))
(21)
𝑦𝑖𝑑(𝑡 + 1) = 𝑦𝑖𝑑(𝑡) + 𝑣𝑖𝑑(𝑡 + 1) (22)
In the above equation (21) and (22) the inertia weight are represented as 𝜔 the cognitive
coefficient are denoted as 𝑐1 and social coefficient are denoted as 𝑐2 the random values are
presented as 𝑟1 and 𝑟2 between the range of 0 and 1. 𝑝𝑏𝑒𝑠𝑡 old best position of node and present &
global best position of node is represented as 𝑔𝑏𝑒𝑠𝑡 . The matrices for the particles are computed
based on the dimensions S M with consideration of matrices. The population size is represented
as 𝑆 and relay links of the node is presented as 𝑁. The primary and secondary links in channel are
computed as p' best and y'. The relationship between the primary and secondary channel are
presented in figure 5.
Figure 5: Flowchart of CLSSS
4. RESULTS AND DISCUSSION
The proposed CLSSS model is implemented in the network simulator NS2. The simulation is
performed for the mobile nodes in the region coverage of 1000 m × 1000 m with the standard
distance of 1 Km for the total simulation time of 100 seconds. The node mobility for the
movement is considered in the range of 10 m/sec to 50 m/sec. Every node in the network exhibits
the equal transmission range of 250 meters. The node count is varies between 50 – 100 nodes.
The node transmission power is stated as 0.660W and receiving power of nodes are defined as
0.395W with the initial energy level of 100J. The parameters incorporated in the simulation
model for the relay selection and packet shifting is presented in table 1.
Table 1: Simulation Setting of CLSSS
Parameter Value
Number of Nodes 100
10. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
158
Initial Energy (J) 100
Communication Area 1000 × 1000 m
MAC layer 802.11
Time for Simulation (s) 100
Antenna Omni Antenna
Range of Transmission(m) 250
Size of Packets (KB) 512
Power for Transmission (W) 0.660
Power of Reception (W) 0.395
The secondary network incorporated node for the relay selection with the consideration of 10
relay to establish the link of 5 with the primary and secondary users. The links in relay varies
from 2 -`10 with the increment of 2 in the spectrum channel for the relay selection through
primary links with the optimization using spider swarm. Through the consideration of the data
rate input is provided for the demanding channel for the primary links.
Performance Based on Data Rate
The performance is evaluated with the CLSSS model based on the consideration of average data
rate. With the consideration of data rate relay link number are computed with the proposed
CLSSS model 10 relay links are considered. For increase in data rate number of requesting link
also increased. The relay links are computed based on the primary links controlled with the value
of . The primary channel are assigned with 6 channel for the multimedia data transmission with
the secondary network.
Table 2: Average Data Rate
Relay Links Data Rate (kbps)
= 6dB = 8dB = 10dB = 12dB = 14dB
2 100 500 1000 1500 2100
4 200 700 1100 1700 2300
6 350 900 1300 1900 2700
8 400 1100 1600 2100 3100
10 500 1200 1900 2200 3300
Figure 6: Average Data Rate
11. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
159
The figure 6 and table-2 illustrated the number of channel increases relay link of data rate . For
channel 2 the user receives the data rate of 2.8Mbps for the increase channel to access higher data
rate. The data rate received by the channel 6 is measured as 6.8Mbps. The Table 3 and figure 7
provides the examination of data rare for the varying number of channel. The conducted
communication traffic for the multimedia data is computed for the 15 – 35 channels. The figure 7
illustrate that the increase in data rate increases the channel and reaches the maximal channel
value of 35 with the higher data rate of 10 bits/second for the channel 35. Therefore, it is
observed that number of channels effectively process and transmit the multimedia data.
Table 3: Comparison of Channel Vs Data Rate
Number of Channels/nodes Date Rate (Mbps) Delay (ms)
20 3 7.1
40 4.1 7.6
60 6 8.2
80 8 8.4
100 11.3 8.8
s
Figure 7: Comparison of Data Rate
Performance Based on Nodes
The performance of proposed CLSSS metrices are evaluated based on the varying number of
node. The performance of CLSSS model is compared with the existing Spectrum Sharing
Optimization model to provided guaranteed QoS.
Table 4: Comparison of Delay
Number of nodes Delay (ms)
SSO-QG CLSSS
20 15 7.1
40 16.3 7.6
60 18 8.2
80 16.6 8.4
100 12.2 8.8
12. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
160
Figure 8: Comparison of Delay
The figure 8 and Table 4 illustrates the analysis of delay with the proposed CLSSS the
performance of scheme is minimized the delay value of 15% compared with SSO-QG. The
process of data shifting is performed for the data forwarding with the minimizes the error rate and
increases the packet forwarding capacity effectively. Additionally, the CLSSS model increases
the spectrum sharing capability with the reduced transmission delay. The standard energy model
is utilized for the energy consumption. The figure 9and Table 5 provides the representation of
energy consumption for the CLSSS model than the existing techniques.
Table 5: Comparison of Energy Consumption
Figure 9: Comparison of Energy Consumption
Number of nodes Energy Consumption (J)
SSO-QG CLSSS
20 3.3 1.2
40 4.7 1.9
60 5.8 2.2
80 5.6 2.4
100 5.7 2.7
13. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
161
The figure 9 provides the energy consumption of the proposed CLSSS model is 13% minimal
compared with the existing SSO-QG model. As the proposed CLSSS model comprises of the
intelligent agents for effective communication with the SSO model. The figure 10 illustrates the
comparative examination of throughput and delivery ration for the varying number of nodes.
Table 6: Comparison of Metrices
Number of Nodes Throughput (kbps) Packet Delivery Ratio Overhead
SSO-QG CLSSS SSO-QG CLSSS SSO-QG CLSSS
20 2100 6400 0.6 0.88 17 7
40 4200 6700 0.67 0.93 22 12
60 4200 10000 0.78 0.96 27 15
80 4100 12000 0.84 0.97 26 16
100 6000 15000 0.9 0.99 29 17
Figure 10: Comparison of Throughput
Figure 11: Comparison of packet Delivery Ratio
14. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
162
Figure 12: Comparison of Overhead
Through analysis of figure 10 and Table 6 illustrated that network throughput increases by 25%
with the CLSSS compared with the SSO-QG. With the proposed CLSSS model SSO is utilized
for the network estimation based on global position. The global position is evaluated based on
near relay link for channel selection in primary link. The simulation analysis expressed that
proposed CLSSS model increases the throughput. The comparative analysis is performed for the
packet delivery ratio to the existing technique.
In figure 12 stated that packet delivery ratio of CLSSS model is increases with 10% compared
with existing SSO-QG model. With the CLSSS model SSO identifies the optimal route with the
shortest distance. In the figure 11 it is observed that overhead rate is minimized with the proposed
CLSSS model by 10% compared with existing SSO-QG. The reduction is overhead is reduced by
the relay node performance operations.
Research limitation:
We take into account an underlying CRN with two active primary users and two active secondary
users. The main users set up time-division duplex (TDD) mode bidirectional communications. In
the main network, traffic moves steadily and consistently in both directions. In order to use the
same spectrum for their own communications, the secondary users wish to do so. To do this, the
secondary transmitter uses beamforming to pre-cancel the interference it generates for the
primary receiver, while the secondary receiver uses IC to detect the signal. Simply put, the
secondary users bear the whole cost of cancelling out cross-network interference, while the prime
users are completely unaware of their data transmissions.
5. CONCLUSION
CRN comprises of the heterogeneous wireless architecture for the dynamic spectrum access to
achieve the effective utilization of higher bandwidth. With effective resource allocation CRN
offers the valuable spectrum utilization of the network resources. For the suggested system
model, the signal-to-noise ratio and outage probability are examined under various scenarios in
order to explore the impact of numerous key agents that affect the system's performance. The
OPs are assessed specifically under various numbers of SU relays, various numbers of the fading
severity parameter of channels, various numbers of PU locations, and various speeds of the
mobile end user. The simulation results are also given in order to validate the analytical results.
Overall, the results demonstrated that the performance of the system may be enhanced by using a
15. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
163
cooperative communication strategy using cognitive radio networks. Additionally, a variety of
variables, including channel fading, the number of SU relays, the fading severity parameter, the
PU location, and the speed of the mobile end user, might influence how well cooperative
spectrum sharing networks operate with mobile end users. These elements are seen to be essential
for service providers to consider while designing their networks. These crucial elements must be
considered in the design and implementation of a functional mobile network. The performance is
comparatively examined with SSO-QG stated that the proposed CLSSS scheme achieves the
~15% reduced delay. Through analysis concluded that CLSSS model effectively improves the
overall performance with increases throughput of ~25% then the conventional techniques. The
examination confirmed that proposed CLSSS model performance is effective for relay selection
and resource allocation in CRN.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
REFERENCES
[1] Uthansakul, P., & Ahmad Khan, A. (2019). On the energy efficiency of millimeter wave massive
MIMO based on hybrid architecture. Energies, 12(11), 2227.
[2] Ganesh, D., Kumar, T. P., & Kumar, M. S. (2021). Optimised Levenshtein centroid cross‐layer
defence for multi‐hop cognitive radio networks. IET Communications, 15(2), 245-256.
[3] Uthansakul, P., & Khan, A. A. (2019). Enhancing the energy efficiency of mmWave massive MIMO
by modifying the RF circuit configuration. Energies, 12(22), 4356.
[4] Kumar, N. K. S., Prathipa, R., PS, U. P., & Subha, T. D. (2022, August). Performance Investigation
on Cross Layered Routing Protocol in Cognitive Radio Networks (CRN). In 2022 3rd International
Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 1683-1688). IEEE.
[5] Ganesh, D., Kumar, T. P., & Kumar, M. S. (2020). A Dynamic and adaptive learning mechanism to
reduce cross layer attacks in cogntive networks. Materials Today: Proceedings.
[6] Gupta, N., &Dhurandher, S. K. (2020). Cross‐layer perspective for channel assignment in cognitive
radio networks: A survey. International Journal of Communication Systems, 33(5), e4261.
[7] Chatterjee, S., & De, S. (2022). QoE-Aware Cross-Layer Adaptation for D2D Video Communication
in Cooperative Cognitive Radio Networks. IEEE Systems Journal.
[8] Kakkavas, G., Tsitseklis, K., Karyotis, V., &Papavassiliou, S. (2020). A software defined radio cross-
layer resource allocation approach for cognitive radio networks: From theory to practice. IEEE
Transactions on Cognitive Communications and Networking, 6(2), 740-755.
[9] Uthansakul, P., Ahmad Khan, A., Uthansakul, M., & Duangmanee, P. (2018). Energy efficient design
of massive MIMO based on closely spaced antennas: Mutual coupling effect. Energies, 11(8), 2029.
[10] Hashmi, S. U., Hussain, M., Arshad, S. N., Inayat, K., & Hwang, S. O. (2021). Energy efficient cross
layer time synchronisation in cognitive radio networks. International Journal of Internet Technology
and Secured Transactions, 11(4), 329-340.
[11] Rajpoot, V., & Tripathi, V. S. (2022). Cross-layer design based hybrid MAC protocol for cognitive
radio network. Physical Communication, 50, 101524.
[12] Ahmad Khan, A., Uthansakul, P., Duangmanee, P., & Uthansakul, M. (2018). Energy efficient design
of massive MIMO by considering the effects of nonlinear amplifiers. Energies, 11(5), 1045.
[13] Jagannath, J., Jagannath, A., Henney, J., Gwin, T., Kane, Z., Biswas, N., &Drozd, A. (2022). Design
of fieldable cross-layer optimized network using embedded software defined radios: Survey and
novel architecture with field trials. Computer Networks, 209, 108917.
[14] Bhattacharjee, S., Acharya, T., & Bhattacharya, U. (2020). Energy-efficient multicasting in hybrid
cognitive small cell networks: A cross-layer approach. IEEE/ACM Transactions on Networking,
28(1), 262-274.
[15] Khan, A. A., Uthansakul, P., & Uthansakul, M. (2017). Energy efficient design of massive MIMO by
incorporating with mutual coupling. Int. J. Comm. Antenna Prop, 7, 198-207.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.6, November 2023
164
[16] Suriya, M., & Sumithra, M. G. (2022, March). Overview of spectrum sharing and dynamic spectrum
allocation schemes in cognitive radio networks. In 2022 8th International Conference on Advanced
Computing and Communication Systems (ICACCS) (Vol. 1, pp. 934-937). IEEE.
[17] Agrawal, S. K., Samant, A., & Yadav, S. K. (2022). Spectrum sensing in cognitive radio networks
and metacognition for dynamic spectrum sharing between radar and communication system: A
review. Physical Communication, 101673.
[18] Sultan, K. (2023). Computational-Intelligence-Based Spectrum-Sharing Scheme for NOMA-Based
Cognitive Radio Networks. Applied Sciences, 13(12), 7144.
[19] Sharma, M., & Sarma, N. (2022). Utility Aware Cooperative Spectrum Sharing in Overlay Cognitive
Radio Networks. International Journal of Wireless Information Networks, 1-18.
AUHTORS
Aravindkumaran S received his B.Tech degree in Electronics and communication
engineering from Rajiv Gandhi College of Engineering and Technology, Puducherry, India,
in 2015 and his M.Tech degree in Electronics and Communication Engineering from Sri
Manakula vinayagar Engineering College, Puducherry, India, in 2017. He is now working
towards his Ph.D in the Department of Electronics and Communication Engineering,
Puducherry Technological University, Puducherry, India. His research interests are in the areas like
Cognitive radio networks, Cross-layer routing.
D.Saraswady received her B.Tech and M.Tech degrees from Puducherry Technological
University Erstwhile Pondicherry Engineering College, Pondicherry University,
Puducherry, India, in 1993 and 1996, respectively, and her Ph.D degree from Anna
University, Tamilnadu, India, in 2006. She is currently serving as a professor in the
Department of Electronics and Communication Engineering, Puducherry Technological
University, Puducherry, India. Her research interest includes image processing, cognitive
radio networks, wireless ad hoc networks, and enhancement of MIMO systems.