[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (396)

Search Parameters:
Keywords = cognitive radio networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 6560 KiB  
Article
Deep Learning-Based Spectrum Sensing for Cognitive Radio Applications
by Sara E. Abdelbaset, Hossam M. Kasem, Ashraf A. Khalaf, Amr H. Hussein and Ahmed A. Kabeel
Sensors 2024, 24(24), 7907; https://doi.org/10.3390/s24247907 - 11 Dec 2024
Viewed by 319
Abstract
In order for cognitive radios to identify and take advantage of unused frequency bands, spectrum sensing is essential. Conventional techniques for spectrum sensing rely on extracting features from received signals at specific locations. However, convolutional neural networks (CNNs) and recurrent neural networks (RNNs) [...] Read more.
In order for cognitive radios to identify and take advantage of unused frequency bands, spectrum sensing is essential. Conventional techniques for spectrum sensing rely on extracting features from received signals at specific locations. However, convolutional neural networks (CNNs) and recurrent neural networks (RNNs) have recently demonstrated promise in improving the precision and efficacy of spectrum sensing. Our research introduces a groundbreaking approach to spectrum sensing by leveraging convolutional neural networks (CNNs) to significantly advance the precision and effectiveness of identifying unused frequency bands. We treat spectrum sensing as a classification task and train our model with diverse signal types and noise data, enabling unparalleled adaptability to novel signals. Our method surpasses traditional techniques such as the maximum–minimum eigenvalue ratio-based and frequency domain entropy-based methods, showcasing superior performance and adaptability. In particular, our CNN-based approach demonstrates exceptional accuracy, even outperforming established methods when faced with additive white Gaussian noise (AWGN). Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>The proposed network flowchart.</p>
Full article ">Figure 2
<p>This graph shows the accuracy and losses for the number of epochs 10 during the training and validation phases. (<b>a</b>) Accuracy and (<b>b</b>) loss.</p>
Full article ">Figure 3
<p>The accuracy and losses during training and validation phases with the effect of AWGN with No. of epochs 10. (<b>a</b>) Accuracy and (<b>b</b>) loss.</p>
Full article ">Figure 4
<p>The accuracy and losses during training and validation phases with the effect of AWGN with No. of epochs 40. (<b>a</b>) Accuracy and (<b>b</b>) loss.</p>
Full article ">Figure 5
<p>The accuracy and losses during training and validation phases with the effect of AWGN with SNR range (−8 to 30 dB) with No. of epochs 20. (<b>a</b>) Accuracy and (<b>b</b>) loss.</p>
Full article ">Figure 6
<p>The accuracy and losses during training and validation phases with the effect of AWGN with SNR range (−8 to 30 dB) with No. of epochs 32. (<b>a</b>) Accuracy and (<b>b</b>) loss.</p>
Full article ">Figure 7
<p>Detection performance (<b>a</b>) OOK, (<b>b</b>) QPSK.</p>
Full article ">Figure 8
<p>Comparison with traditional methods at pf = 0.15.</p>
Full article ">Figure 9
<p>The predicted accuracy of our proposed model by using flatten layer for various modulation types.</p>
Full article ">Figure 10
<p>The predicted accuracy of our proposed mode by using GAP layer for various modulation types.</p>
Full article ">Figure 10 Cont.
<p>The predicted accuracy of our proposed mode by using GAP layer for various modulation types.</p>
Full article ">Figure 11
<p>Training accuracy of the compared models.</p>
Full article ">Figure 12
<p>Validation accuracy of the compared models.</p>
Full article ">Figure 13
<p>Training loss of the compared models.</p>
Full article ">Figure 14
<p>Validation loss of the compared models.</p>
Full article ">Figure 15
<p>The predicted accuracy of the compared models at SNR from −10 to 20.</p>
Full article ">
14 pages, 2023 KiB  
Article
Channel-Hopping Using Reinforcement Learning for Rendezvous in Asymmetric Cognitive Radio Networks
by Dongsup Jin, Minho Jang, Ji-Woong Jang and Gyuyeol Kong
Appl. Sci. 2024, 14(23), 11369; https://doi.org/10.3390/app142311369 - 5 Dec 2024
Viewed by 454
Abstract
This paper addresses the rendezvous problem in asymmetric cognitive radio networks (CRNs) by proposing a novel reinforcement learning (RL)-based channel-hopping algorithm. Traditional methods like the jump-stay (JS) algorithm, while effective, often struggle with high time-to-rendezvous (TTR) in asymmetric scenarios where secondary users (SUs) [...] Read more.
This paper addresses the rendezvous problem in asymmetric cognitive radio networks (CRNs) by proposing a novel reinforcement learning (RL)-based channel-hopping algorithm. Traditional methods like the jump-stay (JS) algorithm, while effective, often struggle with high time-to-rendezvous (TTR) in asymmetric scenarios where secondary users (SUs) have varying channel availability. Our proposed RL-based algorithm leverages the actor-critic policy gradient method to learn optimal channel selection strategies by dynamically adapting to the environment and minimizing TTR. Extensive simulations demonstrate that the RL-based algorithm significantly reduces the expected TTR (ETTR) compared to the JS algorithm, particularly in asymmetric scenarios where M-sequence-based approaches are less effective. This suggests that RL-based approaches not only offer robustness in asymmetric environments but also provide a promising alternative in more predictable settings. Full article
(This article belongs to the Special Issue Advances in Wireless Sensor Networks and Communication Technology)
Show Figures

Figure 1

Figure 1
<p>Structure of rendezvous.</p>
Full article ">Figure 2
<p>JS hopping sequence for <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> in [<a href="#B6-applsci-14-11369" class="html-bibr">6</a>].</p>
Full article ">Figure 3
<p>Reinforcement learning framework for rendezvous.</p>
Full article ">Figure 4
<p>Actor and critic networks using fully connected layers.</p>
Full article ">Figure 5
<p>Actor and critic networks using transformer.</p>
Full article ">Figure 6
<p>Average rewards over the number of episodes.</p>
Full article ">Figure 7
<p>ETTR for symmetric and asymmetric scenarios.</p>
Full article ">Figure 8
<p>TTR Distributions for asymmetric scenarios.</p>
Full article ">Figure 8 Cont.
<p>TTR Distributions for asymmetric scenarios.</p>
Full article ">Figure 9
<p>Detection pattern example: Ineffective instance.</p>
Full article ">
22 pages, 7085 KiB  
Article
Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz, Gustavo Chica Pedraza and Alexander Aponte Moreno
Future Internet 2024, 16(12), 456; https://doi.org/10.3390/fi16120456 - 4 Dec 2024
Viewed by 301
Abstract
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the [...] Read more.
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the attacker the service as a legitimate user and use the Primary Users’ (PUs) spectrum resources. This problem has been addressed from perspectives like arrival time, position detection, cooperative scenarios, and artificial intelligence techniques (AI). Nevertheless, it has been studied with one PUE attack at once. This paper implements a countermeasure that can be applied when several attacks simultaneously exist in a cooperative network. A deep neural network (DNN) is used with other techniques to determine the PUE’s existence and communicate it with other devices in the cooperative MCRN. An algorithm to detect and share detection information is applied, and the results show that the system can detect multiple PUE attacks with coordination between the secondary users (SUs). Scenarios are implemented on software-defined radio (SDR) with a cognitive protocol to protect the PU. The probability of detection (PD) is measured for some signal-to-noise ratio (SNR) values in the presence of one PUE or more in the network, which shows high detection values above 90% for an SNR of -7dB. A database is also created with the attackers’ data and shared with all the SUs. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

Figure 1
<p>PUE attack scenario (source: own).</p>
Full article ">Figure 2
<p>Model for multiple PUE attack detection.</p>
Full article ">Figure 3
<p>Example of global information shared by a base station.</p>
Full article ">Figure 4
<p>Deep artificial neural network [<a href="#B20-futureinternet-16-00456" class="html-bibr">20</a>].</p>
Full article ">Figure 5
<p>Example of the user’s position in the environment (source: own).</p>
Full article ">Figure 6
<p>Example of energy detection (source: own).</p>
Full article ">Figure 7
<p>SDR test bed platform.</p>
Full article ">Figure 8
<p>Mobile SDR device.</p>
Full article ">Figure 9
<p>Probability of detection vs. probability of false alarm results for AWGN channel (source: own).</p>
Full article ">Figure 10
<p>Probability of detection vs. probability of false alarm for CSS for SNR = −10 dB (source: own).</p>
Full article ">Figure 11
<p>Downlink signal without and with active signal (source: own).</p>
Full article ">Figure 12
<p>Uplink signal without and with active signal (source: own).</p>
Full article ">Figure 13
<p>Available networks with PUE screen in the mobile phone (source: own).</p>
Full article ">Figure 14
<p>Confusion matrix -10 dB (source: author).</p>
Full article ">Figure 15
<p>DNN results depend on the epoch size (source: own).</p>
Full article ">Figure 16
<p>DNN code in Keras and Python (source: own).</p>
Full article ">Figure 17
<p>Probability of detection of a PUE attack (source: own).</p>
Full article ">
24 pages, 1660 KiB  
Article
Performance Study of FSO/THz Dual-Hop System Based on Cognitive Radio and Energy Harvesting System
by Jingwei Lu, Rongpeng Liu, Yawei Wang, Ziyang Wang and Hongzhan Liu
Electronics 2024, 13(23), 4656; https://doi.org/10.3390/electronics13234656 - 26 Nov 2024
Viewed by 416
Abstract
In order to address the problems of low spectrum efficiency in current communication systems and extend the lifetime of energy-constrained relay devices, this paper proposes a novel dual-hop free-space optical (FSO) system that integrates cognitive radio (CR) and energy harvesting (EH). In this [...] Read more.
In order to address the problems of low spectrum efficiency in current communication systems and extend the lifetime of energy-constrained relay devices, this paper proposes a novel dual-hop free-space optical (FSO) system that integrates cognitive radio (CR) and energy harvesting (EH). In this system, the source node communicates with two users at the terminal via FSO and terahertz (THz) hard-switching links, as well as a multi-antenna relay for non-orthogonal multiple access (NOMA). There is another link whose relay acts as both the power beacon (PB) in the EH system and the primary network (PN) in the CR system, achieving the double function of auxiliary transmission. In addition, based on the three possible practical working scenarios of the system, three different transmit powers of the relay are distinguished, thus enabling three different working modes of the system. Closed-form expressions are derived for the interruption outage probability per user for these three operating scenarios, considering the Gamma–Gamma distribution for the FSO link, the αμ distribution for the THz link, and the Rayleigh fading distribution for the radio frequency (RF) link. Finally, the numerical results show that this novel system can be adapted to various real-world scenarios and possesses unique advantages. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

Figure 1
<p>Hard-switched FSO/THz-RF dual-hop NOMA link with CR and EH.</p>
Full article ">Figure 2
<p>The comparison between different beamwidth and jitter standard deviations versus OPs.</p>
Full article ">Figure 3
<p>The comparison between <math display="inline"><semantics> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </semantics></math> link transmission distances and THz frequency cases versus OP. The first row represent <math display="inline"><semantics> <msub> <mi>U</mi> <mn>1</mn> </msub> </semantics></math>, and the second row represent <math display="inline"><semantics> <msub> <mi>U</mi> <mn>2</mn> </msub> </semantics></math>, respectively.</p>
Full article ">Figure 4
<p>SNR versus OP under the comparison between different visibility.</p>
Full article ">Figure 5
<p>SNR versus OP for different turbulence conditions and pointing errors when <math display="inline"><semantics> <mrow> <mi>L</mi> <mi>F</mi> </mrow> </semantics></math> = <math display="inline"><semantics> <mrow> <mi>D</mi> <mi>T</mi> </mrow> </semantics></math> = 350 m among three working scenarios.</p>
Full article ">Figure 6
<p>OP versus <span class="html-italic">N</span> among three working scenarios.</p>
Full article ">Figure 7
<p>OP versus <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>u</mi> </msub> <mn>1</mn> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mi>ξ</mi> </semantics></math> = 1, <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>N</mi> <mn>0</mn> </msub> </mrow> </semantics></math> = 2 dB, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>/</mo> <msub> <mi>P</mi> <mi>B</mi> </msub> </mrow> </semantics></math> =-1.9 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>1</mn> </msub> </mrow> </msub> </semantics></math> = 3 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>2</mn> </msub> </mrow> </msub> </semantics></math> = 5 dB, <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> = 0.77, and <math display="inline"><semantics> <msub> <mi>γ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> = 15 dB.</p>
Full article ">Figure 8
<p>OP versus <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>N</mi> <mn>0</mn> </msub> </mrow> </semantics></math> = 2 dB, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>/</mo> <msub> <mi>P</mi> <mi>B</mi> </msub> </mrow> </semantics></math> = -1.9 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>1</mn> </msub> </mrow> </msub> </semantics></math> = 3 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>2</mn> </msub> </mrow> </msub> </semantics></math> = 5 dB, <math display="inline"><semantics> <mi>α</mi> </semantics></math> = 2.902, <math display="inline"><semantics> <mi>β</mi> </semantics></math> = 2.510, and <math display="inline"><semantics> <msub> <mi>γ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> = 8 dB.</p>
Full article ">Figure 9
<p>OP versus <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>/</mo> <msub> <mi>P</mi> <mi>B</mi> </msub> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>N</mi> <mn>0</mn> </msub> </mrow> </semantics></math> = 2 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>1</mn> </msub> </mrow> </msub> </semantics></math> = 3 dB, <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>R</mi> <mi>n</mi> <msub> <mi>U</mi> <mn>2</mn> </msub> </mrow> </msub> </semantics></math> = 5 dB, <math display="inline"><semantics> <mi>α</mi> </semantics></math>= 2.902, <math display="inline"><semantics> <mi>β</mi> </semantics></math> = 2.510, <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> = 0.77, and <math display="inline"><semantics> <msub> <mi>γ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> = 15 dB.</p>
Full article ">Figure 10
<p>A comparison of the power of the SN network and OP at different <span class="html-italic">I</span>.</p>
Full article ">
20 pages, 1627 KiB  
Article
Dynamic Spectrum Co-Access in Multicarrier-Based Cognitive Radio Using Graph Theory Through Practical Channel
by Ehab F. Badran, Amr A. Bashir, Hassan Nadir Kheirallah and Hania H. Farag
Appl. Sci. 2024, 14(23), 10868; https://doi.org/10.3390/app142310868 - 23 Nov 2024
Viewed by 715
Abstract
In this paper, we propose an underlay cognitive radio (CR) system that includes subscribers, termed secondary users (SUs), which are designed to coexist with the spectrum owners, termed primary users (PUs). The suggested network includes the PUs system and the SUs system. The [...] Read more.
In this paper, we propose an underlay cognitive radio (CR) system that includes subscribers, termed secondary users (SUs), which are designed to coexist with the spectrum owners, termed primary users (PUs). The suggested network includes the PUs system and the SUs system. The coexistence between them is achieved by using a novel dynamic spectrum co-access multicarrier-based cognitive radio (DSCA-MC-CR) technique. The proposal uses a quadrature phase shift keying (QPSK) modulation technique within the orthogonal frequency-division multiplexing (OFDM) scheme that maximizes the system data rate and prevents data inter-symbol interference (ISI). The proposed CR transmitter station (TX) and the CR receiver node (RX) can use an advanced smart antenna system, i.e., a multiple-input and multiple-output (MIMO) system that provides high immunity against channel impairments and provides a high data rate through its different combining techniques. The proposed CR system is applicable to coexist within different existing communication applications like fifth-generation (5G) applications, emergence applications like the Internet of Things (IoT), narrow-band (NB) applications, and wide-band (WB) applications. The coexistence between the PUs system and the SUs system is based on using power donation from the SUs system to improve the quality of the PU signal-to-interference-and-noise ratios (SINRs). The green communication concept achieved in this proposal is compared with similar DSCA proposals from the literature. The simulations of the proposed technique show enhancement in the PUs system throughput and data rate along with the better performance of the SUs system. Full article
Show Figures

Figure 1

Figure 1
<p>Cognitive radio capability characteristics.</p>
Full article ">Figure 2
<p>The classification of the DSA management models. (<b>a</b>) Interweave model (<b>b</b>) Underlay Model (<b>c</b>) Overlay Model.</p>
Full article ">Figure 3
<p>Topology and spectrum representation of model 1. (<b>a</b>) Model 1 topology of the proposed DSCA-MC-CR using OMNeT. (<b>b</b>) Spectrum representation of model 1.</p>
Full article ">Figure 4
<p>Topology and spectrum representation of model 2. (<b>a</b>) Model 2 topology of the proposed DSCA-MC-CR using OMNeT. (<b>b</b>) Spectrum representation of model 2.</p>
Full article ">Figure 5
<p>The block diagram design of the proposed DSCA-MC-CR SU-TX tower.</p>
Full article ">Figure 6
<p>The proposed correlator receiver design of the SU-RX.</p>
Full article ">Figure 7
<p>Simple <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>×</mo> <mi>N</mi> </mrow> </semantics></math> MIMO system diagram.</p>
Full article ">Figure 8
<p>The proposed topology classification using conventional DSP and GSP. (<b>a</b>) The proposed topology using conventional DSP. (<b>b</b>) The proposed topology classification using GSP.</p>
Full article ">Figure 9
<p>BER of the PU and SU in model 1 over AWGN with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>3</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>a</b>) BER of the PU in model 1. (<b>b</b>) BER of the SU in model 1.</p>
Full article ">Figure 10
<p>BER of the PU and SU in model 1 under fading channel with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>3</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>a</b>) BER of the PU in model 1. (<b>b</b>) BER of the SU in model 1.</p>
Full article ">Figure 11
<p>OMNeT proposed network for model 1 with practical medium parameters. (<b>a</b>) OMNeT network of model 1. (<b>b</b>) PU system and SU system in OSA mode.</p>
Full article ">Figure 12
<p><math display="inline"><semantics> <msub> <mrow> <mi>P</mi> <mi>U</mi> </mrow> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mrow> <mi>S</mi> <mi>U</mi> </mrow> <mn>1</mn> </msub> </semantics></math> BER vs. SINR with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <msub> <mrow> <mi>P</mi> <mi>U</mi> </mrow> <mn>1</mn> </msub> </semantics></math> BER vs. SINR with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>b</b>) <math display="inline"><semantics> <msub> <mrow> <mi>S</mi> <mi>U</mi> </mrow> <mn>1</mn> </msub> </semantics></math> BER vs. SINR with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 13
<p>PU and SU capacities using different techniques versus SNR. (<b>a</b>) PU capacity versus SNR. (<b>b</b>) SU capacity versus SNR.</p>
Full article ">Figure 14
<p>PU and SU BERs of model 2 using Gaussian channel with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>3</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>a</b>) PU BER of model 2. (<b>b</b>) SU BER of model 2.</p>
Full article ">Figure 15
<p>PU and SU BERs of model 2 using fading channel with <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>3</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>a</b>) PU BER of model 2. (<b>b</b>) SU BER of model 2.</p>
Full article ">Figure 16
<p>Systems packet interarrival analysis of LTE using the OSA, DSCA, OC-DSA, and DSCA-MC-CR techniques. (<b>a</b>) PU systems packet interarrival analysis of LTE. (<b>b</b>) SU systems packet interarrival analysis of LTE.</p>
Full article ">Figure 17
<p>System packet interarrival analysis for 5G using the OSA, DSCA, OC-DSA, and DSCA-MC-CR techniques. (<b>a</b>) PU system packet interarrival analysis of 5G. (<b>b</b>) SU system packet interarrival analysis of 5G.</p>
Full article ">
30 pages, 1625 KiB  
Article
A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks
by Anatte Rozario, Ehasan Ahmed and Nafees Mansoor
Sensors 2024, 24(19), 6334; https://doi.org/10.3390/s24196334 - 30 Sep 2024
Viewed by 884
Abstract
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters [...] Read more.
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters such as distance, speed, link quality, and energy consumption. A standout feature is the introduction of the Central Node Resolution Factor (CNRF), which enhances routing decisions. Leveraging the Received Signal Strength Indicator (RSSI) enables accurate distance estimation, crucial for effective routing. Moreover, predictive algorithms are integrated to tackle the challenges posed by high mobility scenarios. Security measures include the identification of malicious nodes, while the protocol ensures resilience by managing multiple routes. Furthermore, it addresses route maintenance and handles link failures efficiently, cluster formation, and re-clustering with joining and leaving new nodes along with the predictive algorithm. Simulation results showcase the protocol’s self-comparison under different packet sizes, particularly in terms of end-to-end delay, throughput, packet delivery ratio, and normalized routing load. However, superior performance compared to existing methods, particularly in terms of throughput and packet transmission delay, underscoring its potential for widespread adoption in both defence and civilian UAV applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Various Connectivities of UAVs.</p>
Full article ">Figure 2
<p>Overview of the Proposed Clustering scheme.</p>
Full article ">Figure 3
<p>Scenario of communication between GS and CNs.</p>
Full article ">Figure 4
<p>(<b>a</b>) Bipartite Graph formation by node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>b</b>) Maximum edge Biclique graph of node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>c</b>) Nodes with CNRF value, (<b>d</b>) Proposed cluster-based network.</p>
Full article ">Figure 5
<p>Comparison of End to End Delay for packet sizes of 512 and 1024.</p>
Full article ">Figure 6
<p>Comparison of throughput for packet sizes of 512 and 1024.</p>
Full article ">Figure 7
<p>Comparison of packet delivery ratios for packet sizes of 512 and 1024.</p>
Full article ">Figure 8
<p>Comparison of normalized routing loads for packet sizes of 512 and 1024.</p>
Full article ">Figure 9
<p>Number of Nodes vs. Delay.</p>
Full article ">Figure 10
<p>Number of nodes vs. Throughput.</p>
Full article ">Figure 11
<p>OLSR+GPSR vs. Proposed protocol Overhead.</p>
Full article ">Figure 12
<p>OLSR+GPSR vs. Proposed protocol Throughput.</p>
Full article ">Figure 13
<p>OLSR+GPSR vs. Proposed protocol Packet Delivery Ratio.</p>
Full article ">Figure 14
<p>OLSR+GPSR vs. Proposed protocol End-to-End Delay.</p>
Full article ">
14 pages, 884 KiB  
Article
Secure Cognitive Radio Vehicular Ad Hoc Networks Using Blockchain Technology in Smart Cities
by Fatima Asif, Huma Ghafoor and Insoo Koo
Appl. Sci. 2024, 14(18), 8146; https://doi.org/10.3390/app14188146 - 11 Sep 2024
Viewed by 881
Abstract
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. [...] Read more.
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. To ensure the safety and security of this type of information using blockchain technology, we propose a new cognitive vehicular communication scheme to transfer messages from source to destination. Due to spectrum scarcity in vehicular networks, there needs to be a wireless medium available for every communication link since vehicles require it to communicate. The primary user (PU) makes a public announcement about a free channel to all secondary users nearby and only gives it to authentic vehicles. The authenticity of vehicles is guaranteed by a roadside unit (RSU) that offers secure keys to any vehicle that joins this blockchain network. Those who participate in this network must pay a certain amount and receive rewards for their honesty that exceed the amount spent. To test the performance of various parameters, the proposed scheme utilizes the Ethereum smart contract and compares them to blockchain and non-blockchain methods. Our results show a minimum delivery time of 0.16 s and a minimum overhead of 350 bytes in such a dynamic vehicle environment. Full article
(This article belongs to the Special Issue Transportation in the 21st Century: New Vision on Future Mobility)
Show Figures

Figure 1

Figure 1
<p>Secure CR-VANETs using blockchain.</p>
Full article ">Figure 2
<p>(<b>a</b>) Enabling the contract on ten Ethereum accounts (<b>b</b>). Setting up an account (<b>c</b>). Verification of all registered users. (<b>d</b>) A message sent by the source vehicle (<b>e</b>). Representation of unverified messages sent by any sender (<b>f</b>). The receiver has paid for the message (<b>g</b>). The sender and miner have received their rewards (<b>h</b>). The receiver finally reads the message.</p>
Full article ">Figure 3
<p>Performance comparison of execution time for read function in terms of number of transactions.</p>
Full article ">Figure 4
<p>Performance comparison of execution time for send function in terms of number of transactions.</p>
Full article ">Figure 5
<p>Performance comparison of delivery time in terms of number of miners.</p>
Full article ">Figure 6
<p>Performance comparison of overhead in terms of number of miners.</p>
Full article ">Figure 7
<p>Performance comparison of delivery time when speed is random.</p>
Full article ">Figure 8
<p>Performance comparison of overhead when speed is random.</p>
Full article ">
15 pages, 4276 KiB  
Article
Spectrum Sensing Method Based on STFT-RADN in Cognitive Radio Networks
by Anyi Wang, Tao Zhu and Qifeng Meng
Sensors 2024, 24(17), 5792; https://doi.org/10.3390/s24175792 - 6 Sep 2024
Viewed by 790
Abstract
To address the common issues in traditional convolutional neural network (CNN)-based spectrum sensing algorithms in cognitive radio networks (CRNs), including inadequate signal feature representation, inefficient utilization of feature map information, and limited feature extraction capabilities due to shallow network structures, this paper proposes [...] Read more.
To address the common issues in traditional convolutional neural network (CNN)-based spectrum sensing algorithms in cognitive radio networks (CRNs), including inadequate signal feature representation, inefficient utilization of feature map information, and limited feature extraction capabilities due to shallow network structures, this paper proposes a spectrum sensing algorithm based on a short-time Fourier transform (STFT) and residual attention dense network (RADN). Specifically, the RADN model improves the basic residual block and introduces the convolutional block attention module (CBAM), combining residual connections and dense connections to form a powerful deep feature extraction structure known as residual in dense (RID). This significantly enhances the network’s feature extraction capabilities. By performing STFT on the received signals and normalizing them, the signals are converted into time–frequency spectrograms as network inputs, better capturing signal features. The RADN is trained to extract abstract features from the time–frequency images, and the trained RADN serves as the final classifier for spectrum sensing. Experimental results demonstrate that the STFT-RADN spectrum sensing method significantly improves performance under low signal-to-noise ratio (SNR) conditions compared to traditional deep-learning-based methods. This method not only adapts to various modulation schemes but also exhibits high detection probability and strong robustness. Full article
(This article belongs to the Special Issue Sensors for Enabling Wireless Spectrum Access)
Show Figures

Figure 1

Figure 1
<p>Spectrum sensing framework.</p>
Full article ">Figure 2
<p>(<b>a</b>) Time–frequency image of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>1</mn> </msub> </mrow> </semantics></math>; (<b>b</b>) time–frequency image of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>0</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Convolutional block attention module.</p>
Full article ">Figure 4
<p>Channel attention module.</p>
Full article ">Figure 5
<p>Spatial attention module.</p>
Full article ">Figure 6
<p>(<b>a</b>) Residual block; (<b>b</b>) res-inception attention block.</p>
Full article ">Figure 7
<p>The structure of the dense group.</p>
Full article ">Figure 8
<p>The structure of the RADN.</p>
Full article ">Figure 9
<p>Effect of sampling points.</p>
Full article ">Figure 10
<p>Effect of window function.</p>
Full article ">Figure 11
<p>Effectiveness of STFT.</p>
Full article ">Figure 12
<p>Comparison of detection probability.</p>
Full article ">Figure 13
<p>ROC curves of different algorithms.</p>
Full article ">Figure 14
<p>Performance of different modulation schemes in RADN.</p>
Full article ">
24 pages, 2920 KiB  
Article
Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding
by Yusuf Abdulkadir, Oluyomi Simpson and Yichuang Sun
J. Sens. Actuator Netw. 2024, 13(5), 46; https://doi.org/10.3390/jsan13050046 - 23 Aug 2024
Viewed by 653
Abstract
For a multiuser multiple-input–multiple-output (MIMO) overlay cognitive radio (CR) network, an opportunistic interference alignment (IA) technique has been proposed that allows spectrum sharing between primary users (PUs) and secondary users (SUs) while ensuring zero interference to the PU. The CR system consists of [...] Read more.
For a multiuser multiple-input–multiple-output (MIMO) overlay cognitive radio (CR) network, an opportunistic interference alignment (IA) technique has been proposed that allows spectrum sharing between primary users (PUs) and secondary users (SUs) while ensuring zero interference to the PU. The CR system consists of one PU and K SUs where the PU uses space-time water-filling (ST-WF) algorithm to optimize its transmission and in the process, frees up unused eigenmodes that can be exploited by the SU. The SUs make use of an optimal power allocation algorithm to align their transmitted signals in such a way their interference impairs only the PUs unused eigenmodes. Since the SUs optimal power allocation algorithm turns out to be an optimal beamformer with multiple eigen-beams, this work initially proposes combining the diversity gain property of space-time block codes, the zero-forcing function of IA and beamforming to optimize the SUs transmission rates. This proposed solution requires availability of channel state information (CSI), and to eliminate the need for CSI, this work then combines Differential Space-Time Block Coding (DSTBC) scheme with optimal IA precoders (consisting of beamforming and zero-forcing) to maximize the SUs data rates. Simulation results confirm the accuracy of the proposed solution. Full article
Show Figures

Figure 1

Figure 1
<p>Multiuser CR network model consisting of one PU link and multiple SUs.</p>
Full article ">Figure 2
<p>Average sum rate vs. the SNR at the PUs link for water-filling (SWF and ST-WF) and MEB.</p>
Full article ">Figure 3
<p>Outage probability curves for SWF and ST-WF.</p>
Full article ">Figure 4
<p>(<b>a</b>) Single detection (<b>b</b>) Double detection.</p>
Full article ">Figure 5
<p>Performance comparison of a conventional ED and a double-threshold ED scheme.</p>
Full article ">Figure 6
<p>P<sub>d</sub> vs. SNR with P<sub>f</sub> = <math display="inline"><semantics> <mrow> <mn>0.1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>0.01</mn> </mrow> </semantics></math> using a conventional ED and a double-threshold ED with an <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> scheme.</p>
Full article ">Figure 7
<p>STBC process.</p>
Full article ">Figure 8
<p>SER Curves for coherent STBC and DSTBC–beamforming schemes.</p>
Full article ">Figure 9
<p>Average sum rate (b/s) against SNR (dB) for two SUs.</p>
Full article ">Figure 10
<p>Average sum rate (b/s) against SNR (dB) for two SUs with DSTBC.</p>
Full article ">
15 pages, 467 KiB  
Article
Performance Analysis of a Communication Failure and Repair Mechanism with Classified Primary Users in CRNs
by Yuan Zhao, Qi Lu, Shuangshuang Yuan and Zhisheng Ye
Appl. Sci. 2024, 14(16), 6958; https://doi.org/10.3390/app14166958 - 8 Aug 2024
Viewed by 605
Abstract
Due to the deficiency of radio spectrum resources caused by the progress in technology, cognitive radio networks (CRNs) have made significant progress. CRNs have two types of users, namely, primary users (PUs) and secondary users (SUs). Considering that PUs have a higher priority [...] Read more.
Due to the deficiency of radio spectrum resources caused by the progress in technology, cognitive radio networks (CRNs) have made significant progress. CRNs have two types of users, namely, primary users (PUs) and secondary users (SUs). Considering that PUs have a higher priority and diversified data transmission requirements, this study divides PUs into two levels, namely, PU1s with a higher priority and PU2s with a lower priority. On the other hand, the occurrence of failures is inevitable in CRNs, which affects the data transmission of users. In this paper, combined with an adjustable PU packets transmission rate mechanism, a communication failure and repair mechanism with classified PUs based on the single-channel CRNs is proposed, and different preemption principles are set according to different system states. A queueing model is established and analyzed with a Markov chain, the performance index expressions that need targeted research are listed, numerical experiments are conducted, and the system performance change trends are obtained. The comparison experiment shows that the proposed communication failure and repair mechanism with classified PUs can improve the throughput of PU1 packets and reduce the blocking rate of PU1 packets compared with the conventional communication failure and repair mechanisms with unclassified PUs. Full article
Show Figures

Figure 1

Figure 1
<p>The performance change trends of PU1 packets: (<b>a</b>) the change trend in <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>P</mi> <mn>1</mn> </mrow> </msub> </semantics></math>; (<b>b</b>) the change trend in <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mn>1</mn> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>The performance change trends of PU2 packets: (<b>a</b>) the change trend in <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>P</mi> <mn>2</mn> </mrow> </msub> </semantics></math>; (<b>b</b>) the change trend in <math display="inline"><semantics> <msub> <mi>L</mi> <mrow> <mi>P</mi> <mn>2</mn> </mrow> </msub> </semantics></math>; (<b>c</b>) the change trend in <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mn>2</mn> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>The performance change trends of SU packets: (<b>a</b>) the change trend in <math display="inline"><semantics> <msub> <mi>B</mi> <mi>S</mi> </msub> </semantics></math>; (<b>b</b>) the change trend in <math display="inline"><semantics> <msub> <mi>L</mi> <mi>S</mi> </msub> </semantics></math>; (<b>c</b>) the change trend in <math display="inline"><semantics> <msub> <mi>T</mi> <mi>S</mi> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>Comparison of performance change trends of PU1 packets under the two mechanisms: (<b>a</b>) performance comparison in <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mn>1</mn> </mrow> </msub> </semantics></math>; (<b>b</b>) performance comparison in <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>P</mi> <mn>1</mn> </mrow> </msub> </semantics></math>.</p>
Full article ">
25 pages, 6847 KiB  
Article
Modelling Analysis of Channel Assembling in CRNs Based on Priority Scheduling Strategy with Reserved Queue
by Qianyu Xu, Suoping Li, Jaafar Gaber and Yuzhou Han
Electronics 2024, 13(15), 3051; https://doi.org/10.3390/electronics13153051 - 1 Aug 2024
Viewed by 750
Abstract
In cognitive radio networks, channel assembling allows secondary users (SUs) to expand network capacity and improve spectrum utilization. Scheduling strategies only based on heterogeneous service classification cannot guarantee the delivery priority of vital elastic services in special scenarios such as emergency rescue. Therefore, [...] Read more.
In cognitive radio networks, channel assembling allows secondary users (SUs) to expand network capacity and improve spectrum utilization. Scheduling strategies only based on heterogeneous service classification cannot guarantee the delivery priority of vital elastic services in special scenarios such as emergency rescue. Therefore, a priority scheduling strategy with reserved queue (Ps-rq) is proposed in this work. A static factor is defined to classify SUs into elastic services and real-time services based on message type, while a dynamic factor is defined to differentiate high-priority elastic services based on information validity, message correlation and message size. The high-priority users in the interrupted elastic services are placed in the reserved queue to ensure its services. Accordingly, the scheduling algorithm and the dynamic channel access process is presented. A continuous-time Markov chain analysis is conducted and all possible transition states, trigger events, transition rates and transition conditions of the system starting from a general state are derived. Furthermore, evaluation indexes of system performance are obtained. Study cases and simulation results prove that the proposed strategy can enhance network capacity, reduce blocking probability and forced termination probability for secondary users, and notably enhance the performance of high-priority elastic services. In addition, we analyze the characteristics of Ps-rq through a comprehensive comparison with four other schemes. The experiment proves that the Ps-rq strategy can effectively improve the service quality of the vital elastic services on the basis of providing fair scheduling. Full article
(This article belongs to the Special Issue Ubiquitous Sensor Networks, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>3D priority view of elastic services.</p>
Full article ">Figure 2
<p>Ps-rq strategy.</p>
Full article ">Figure 3
<p>The dynamic channel access process based on the Ps-rq strategy on PU arrival.</p>
Full article ">Figure 4
<p>The transition of the system from the general state x to all reachable states on PU arrival.</p>
Full article ">Figure 5
<p>The transition conditions of the system from the general state <span class="html-italic">x</span> to all reachable states on PU arrival.</p>
Full article ">Figure 6
<p>The transition of the system from the general state <span class="html-italic">x</span> to all reachable states on PU departure.</p>
Full article ">Figure 7
<p>The transition conditions of the system from the general state <span class="html-italic">x</span> to all reachable states on PU departure.</p>
Full article ">Figure 8
<p>The transition of the system from the general state <span class="html-italic">x</span> to all reachable states on SU arrival.</p>
Full article ">Figure 9
<p>The transition conditions of the system from the general state <span class="html-italic">x</span> to all reachable states on SU arrival.</p>
Full article ">Figure 10
<p>The transition of the system from the general state <span class="html-italic">x</span> to all reachable states on SU departure.</p>
Full article ">Figure 11
<p>The transition conditions of the system from the general state <span class="html-italic">x</span> to all reachable states on SU departure.</p>
Full article ">Figure 12
<p>The comparison of model characteristics [<a href="#B9-electronics-13-03051" class="html-bibr">9</a>,<a href="#B12-electronics-13-03051" class="html-bibr">12</a>,<a href="#B18-electronics-13-03051" class="html-bibr">18</a>].</p>
Full article ">Figure 13
<p>(<b>a</b>) Network capacity of <math display="inline"><semantics> <mrow> <mi>S</mi> <msub> <mi>U</mi> <mi>e</mi> </msub> </mrow> </semantics></math>; (<b>b</b>) Network capacity of <math display="inline"><semantics> <mrow> <mi>S</mi> <msub> <mi>U</mi> <mi>r</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 14
<p>Spectrum utilization of SUs.</p>
Full article ">Figure 15
<p>Blocking probability of SUs.</p>
Full article ">Figure 16
<p>Forced termination probability of SUs.</p>
Full article ">Figure 17
<p>Comparison of forced termination probability with and without Ps-rq.</p>
Full article ">Scheme 1
<p>Proportional channel allocation with priority.</p>
Full article ">
20 pages, 968 KiB  
Article
Enhancing Reconfigurable Intelligent Surface-Enabled Cognitive Radio Networks for Sixth Generation and Beyond: Performance Analysis and Parameter Optimization
by Huu Q. Tran and Byung Moo Lee
Sensors 2024, 24(15), 4869; https://doi.org/10.3390/s24154869 - 26 Jul 2024
Viewed by 694
Abstract
In this paper, we propose a novel system integrating reconfigurable intelligent surfaces (RISs) with cognitive radio (CR) technology, presenting a forward-looking solution aligned with the evolving standards of 6G and beyond networks. The proposed RIS-assisted CR networks operate with a base station (BS) [...] Read more.
In this paper, we propose a novel system integrating reconfigurable intelligent surfaces (RISs) with cognitive radio (CR) technology, presenting a forward-looking solution aligned with the evolving standards of 6G and beyond networks. The proposed RIS-assisted CR networks operate with a base station (BS) transmitting signals to two users, the primary user (PU) and secondary user (SU), through direct and reflected signal paths, respectively. Our mathematical analysis focuses on deriving expressions for SU in the RIS-assisted CR system, validated through Monte Carlo simulations. The investigation covers diverse aspects, including the impact of the signal-to-noise ratio (SNR), power allocations, the number of reflected surfaces, and blocklength variations. The results provide nuanced insights into RIS-assisted CR system performance, highlighting its sensitivity to factors like the number of reflectors, fading severity, and correlation coefficient. Careful parameter selection, such as optimizing the configuration of reflectors, is shown to prevent a complete outage, showcasing the system’s robustness. Additionally, the work suggests that the optimization of reflectors configuration can significantly enhance overall system performance, and RIS-assisted CR systems outperform reference schemes. This work contributes a thorough analysis of the proposed system, offering valuable insights for efficient performance evaluation and parameter optimization in RIS-assisted CR networks. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>An illustration of RIS-assisted cognitive networks.</p>
Full article ">Figure 2
<p>Outage probability versus <math display="inline"><semantics> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> </semantics></math> [dB] with different <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mfenced separators="" open="{" close="}"> <mrow> <mn>2</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>6</mn> <mo>,</mo> <mn>8</mn> </mrow> </mfenced> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Comparison of outage probability with different <span class="html-italic">m</span> fading parameters, with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Outage probability versus the maximum available transmit power of the secondary source, with <math display="inline"><semantics> <mrow> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> dB and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Outage probability versus <span class="html-italic">R</span>, with <math display="inline"><semantics> <mrow> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB and <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>I</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 6
<p>A comparison of the results presented in [<a href="#B32-sensors-24-04869" class="html-bibr">32</a>] regarding outage probability, with the parameters <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>6</mn> <mo>,</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>I</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> dB, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Throughput versus transmit SNR at BS <math display="inline"><semantics> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>I</mi> </msub> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math> [dB].</p>
Full article ">Figure 8
<p>Throughput versus <span class="html-italic">R</span> with <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> [dB] and <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>I</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> [dB].</p>
Full article ">Figure 9
<p>Ergodic rate versus <math display="inline"><semantics> <msub> <mover accent="false"> <mi>ρ</mi> <mo stretchy="false">¯</mo> </mover> <mi>S</mi> </msub> </semantics></math>, with <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Ergodic rate versus <math display="inline"><semantics> <msub> <mi>ρ</mi> <mi>I</mi> </msub> </semantics></math>, with <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>The number of meta-surface influences ergodic capacity, with <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>I</mi> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> [dB].</p>
Full article ">Figure 12
<p>System energy efficiency transmit SNR at the BS, with <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mi>S</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> W, <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">
13 pages, 2191 KiB  
Article
A Deep-Learning-Based Method for Spectrum Sensing with Multiple Feature Combination
by Yixuan Zhang and Zhongqiang Luo
Electronics 2024, 13(14), 2705; https://doi.org/10.3390/electronics13142705 - 10 Jul 2024
Cited by 1 | Viewed by 992
Abstract
Cognitive radio networks enable the detection and opportunistic access to an idle spectrum through spectrum-sensing technologies, thus providing services to secondary users. However, at a low signal-to-noise ratio (SNR), existing spectrum-sensing methods, such as energy statistics and cyclostationary detection, tend to fail or [...] Read more.
Cognitive radio networks enable the detection and opportunistic access to an idle spectrum through spectrum-sensing technologies, thus providing services to secondary users. However, at a low signal-to-noise ratio (SNR), existing spectrum-sensing methods, such as energy statistics and cyclostationary detection, tend to fail or become overly complex, limiting their sensing accuracy in complex application scenarios. In recent years, the integration of deep learning with wireless communications has shown significant potential. Utilizing neural networks to learn the statistical characteristics of signals can effectively adapt to the changing communication environment. To enhance spectrum-sensing performance under low-SNR conditions, this paper proposes a deep-learning-based spectrum-sensing method that combines multiple signal features, including energy statistics, power spectrum, cyclostationarity, and I/Q components. The proposed method used these combined features to form a specific matrix, which was then efficiently learned and detected through the designed ‘SenseNet’ network. Experimental results showed that at an SNR of −20 dB, the SenseNet model achieved a 58.8% spectrum-sensing accuracy, which is a 3.3% improvement over the existing convolutional neural network model. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of the deep learning spectrum-sensing algorithm proposed in this paper.</p>
Full article ">Figure 2
<p>Schematic diagram of the extraction process of each feature of the signal sequence.</p>
Full article ">Figure 3
<p>Proposed SenseNet network architecture.</p>
Full article ">Figure 4
<p>Detection performance of some neural network models with different internal structures.</p>
Full article ">Figure 5
<p>(<b>a</b>) Detection performance of SenseNet with QPSK and 8PSK signals. (<b>b</b>) False-alarm probability of SenseNet with QPSK and 8PSK signals.</p>
Full article ">Figure 6
<p>(<b>a</b>) Detection performance of deep learning models with different feature types under QPSK signals. (<b>b</b>) False-alarm probability of deep learning models with different feature types under QPSK signals.</p>
Full article ">
20 pages, 5255 KiB  
Article
Tackling Few-Shot Challenges in Automatic Modulation Recognition: A Multi-Level Comparative Relation Network Combining Class Reconstruction Strategy
by Zhao Ma, Shengliang Fang, Youchen Fan, Shunhu Hou and Zhaojing Xu
Sensors 2024, 24(13), 4421; https://doi.org/10.3390/s24134421 - 8 Jul 2024
Viewed by 844
Abstract
Automatic Modulation Recognition (AMR) is a key technology in the field of cognitive communication, playing a core role in many applications, especially in wireless security issues. Currently, deep learning (DL)-based AMR technology has achieved many research results, greatly promoting the development of AMR [...] Read more.
Automatic Modulation Recognition (AMR) is a key technology in the field of cognitive communication, playing a core role in many applications, especially in wireless security issues. Currently, deep learning (DL)-based AMR technology has achieved many research results, greatly promoting the development of AMR technology. However, the few-shot dilemma faced by DL-based AMR methods greatly limits their application in practical scenarios. Therefore, this paper endeavored to address the challenge of AMR with limited data and proposed a novel meta-learning method, the Multi-Level Comparison Relation Network with Class Reconstruction (MCRN-CR). Firstly, the method designs a structure of a multi-level comparison relation network, which involves embedding functions to output their feature maps hierarchically, comprehensively calculating the relation scores between query samples and support samples to determine the modulation category. Secondly, the embedding function integrates a reconstruction module, leveraging an autoencoder for support sample reconstruction, wherein the encoder serves dual purposes as the embedding mechanism. The training regimen incorporates a meta-learning paradigm, harmoniously combining classification and reconstruction losses to refine the model’s performance. The experimental results on the RadioML2018 dataset show that our designed method can greatly alleviate the small sample problem in AMR and is superior to existing methods. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of measurement space.</p>
Full article ">Figure 2
<p>AMR method based on relational networks.</p>
Full article ">Figure 3
<p>The overall framework diagram of the proposed MCRN-CR.</p>
Full article ">Figure 4
<p>Structure of encoder and decoder.</p>
Full article ">Figure 5
<p>The recognition accuracy of different models at all SNRs.</p>
Full article ">Figure 6
<p>Confusion matrix diagram at the 12 dB SNR.</p>
Full article ">Figure 7
<p>The recognition accuracy of the comparison model at all SNRs.</p>
Full article ">Figure 8
<p>Confusion matrix diagram of the control model at the 12 dB SNR.</p>
Full article ">Figure 9
<p>Recognition accuracy curves of models under different <span class="html-italic">K</span> values.</p>
Full article ">Figure 10
<p>Recognition accuracy curves of models under different <span class="html-italic">C</span> values.</p>
Full article ">
14 pages, 604 KiB  
Article
Performance Analysis of a Cognitive RIS-NOMA in Wireless Sensor Network
by Huynh Thanh Thien, Anh-Tu Le, Bui Vu Minh, Lubos Rejfek and Insoo Koo
Appl. Sci. 2024, 14(13), 5865; https://doi.org/10.3390/app14135865 - 4 Jul 2024
Viewed by 913
Abstract
The reconfigurable intelligent surfaces (RIS) represent a transformative technology in wireless communication, offering a novel approach to managing and enhancing radio signal propagation. By dynamically adjusting their electromagnetic properties, RIS can significantly improve the performance and efficiency of 5G and beyond communication systems. [...] Read more.
The reconfigurable intelligent surfaces (RIS) represent a transformative technology in wireless communication, offering a novel approach to managing and enhancing radio signal propagation. By dynamically adjusting their electromagnetic properties, RIS can significantly improve the performance and efficiency of 5G and beyond communication systems. In this paper, we study a cognitive RIS-aided non-orthogonal multiple access (NOMA) network that serves multiple users and improves spectrum efficiency. Our analysis assumes a secondary network operates under multi-primary user constraints and interference from the primary source. We derive approximation closed-form formulas for outage probability (OP), and system throughput. To obtain further insights, an asymptotic expression for OP is computed by taking into account two power configurations at the source. Additionally, numerical results show the effects of important factors on performance, confirming the accuracy of the theoretical derivation. According to the simulation results, performance by the system under consideration might be improved considerably by combining a RIS and NOMA, particularly when compared to an orthogonal multiple access scheme. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

Figure 1
<p>A cognitive RIS-aided NOMA network.</p>
Full article ">Figure 2
<p>Outage probability versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB from varying the number of reflective elements.</p>
Full article ">Figure 3
<p>Outage probability versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB when varying <math display="inline"><semantics> <msub> <mi>η</mi> <mrow> <mi>t</mi> <mi>h</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>Outage probability versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB when varying the number of primary users.</p>
Full article ">Figure 5
<p>Outage probability versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB when varying <math display="inline"><semantics> <mi>ζ</mi> </semantics></math>.</p>
Full article ">Figure 6
<p>System throughput versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB when varying the number of reflective elements.</p>
Full article ">Figure 7
<p>The system throughput versus <math display="inline"><semantics> <msub> <mi>η</mi> <mi mathvariant="script">S</mi> </msub> </semantics></math> in dB when varying <math display="inline"><semantics> <msub> <mi>η</mi> <mrow> <mi>t</mi> <mi>h</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">
Back to TopTop