Authenticated spectrum sharing for secondary users in cognitive radio networks
|dc.contributor.editor||Jiongpan Zhou, Yoshiaki Nemoto and Shuo-Yen Li|
|dc.identifier.citation||Parvin, S. and Han, S. and Tian, B. and Xie, M. 2010. Authenticated spectrum sharing for secondary users in cognitive radio networks, in Zhou, J. and Nemoto, Y. and Li, S-Y. (ed), 2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2010), Sep 24 2010, pp. 509-513. Beijing, China: IEEE.|
Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Now-a-days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose stochastic approach to show the free spectrum availability for SUs in CRNs. To evaluate the proposed approaches, we have modeled and analyzed steady state availability depending on Markov model for free spectrum by adopting QoS characteristics in cognitive radio networks.
|dc.subject||secondary user (SU)|
|dc.subject||primary user (PU)|
|dc.title||Authenticated spectrum sharing for secondary users in cognitive radio networks|
|dcterms.source.title||Proceedings of the 2nd IEEE international conference on network infrastructure and digital content (IC-NIDC 2010)|
|dcterms.source.series||Proceedings of the 2nd IEEE international conference on network infrastructure and digital content (IC-NIDC 2010)|
|dcterms.source.conference||2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2010)|
|dcterms.source.conference-start-date||Sep 24 2010|
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Digital Ecosystems and Business Intelligence Institute (DEBII)|