Show simple item record

dc.contributor.authorParvin, Sazia
dc.contributor.authorHan, Song
dc.contributor.authorTian, Biming
dc.contributor.authorXie, Miao
dc.contributor.editorJiongpan Zhou, Yoshiaki Nemoto and Shuo-Yen Li
dc.date.accessioned2017-01-30T12:13:04Z
dc.date.available2017-01-30T12:13:04Z
dc.date.created2011-03-13T20:01:58Z
dc.date.issued2010
dc.identifier.citationParvin, S. and Han, S. and Tian, B. and Xie, M. 2010. Authenticated spectrum sharing for secondary users in cognitive radio networks, in Zhou, J. and Nemoto, Y. and Li, S-Y. (ed), 2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2010), Sep 24 2010, pp. 509-513. Beijing, China: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/19303
dc.identifier.doi10.1109/ICNIDC.2010.5657819
dc.description.abstract

Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Now-a-days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose stochastic approach to show the free spectrum availability for SUs in CRNs. To evaluate the proposed approaches, we have modeled and analyzed steady state availability depending on Markov model for free spectrum by adopting QoS characteristics in cognitive radio networks.

dc.publisherIEEE
dc.subjectsecondary user (SU)
dc.subjectspectrum
dc.subjectTrust
dc.subjectprimary user (PU)
dc.subjectavailability
dc.titleAuthenticated spectrum sharing for secondary users in cognitive radio networks
dc.typeConference Paper
dcterms.source.startPage509
dcterms.source.endPage513
dcterms.source.titleProceedings of the 2nd IEEE international conference on network infrastructure and digital content (IC-NIDC 2010)
dcterms.source.seriesProceedings of the 2nd IEEE international conference on network infrastructure and digital content (IC-NIDC 2010)
dcterms.source.isbn9781424468515
dcterms.source.conference2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2010)
dcterms.source.conference-start-dateSep 24 2010
dcterms.source.conferencelocationBeijing, China
dcterms.source.placeChina
curtin.note

Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentDigital Ecosystems and Business Intelligence Institute (DEBII)
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record