By Topic

Authenticated spectrum sharing for secondary users in cognitive radio networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Sazia Parvin ; Digital Ecosystems & Business Intelligence Institute, Curtin University of Technology, Perth, Australia ; Song Han ; Biming Tian ; Miao Xie

Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Now-a-days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose stochastic approach to show the free spectrum availability for SUs in CRNs. To evaluate the proposed approaches, we have modeled and analyzed steady state availability depending on Markov model for free spectrum by adopting QoS characteristics in cognitive radio networks.

Published in:

2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content

Date of Conference:

24-26 Sept. 2010