Academic Journals Database
Disseminating quality controlled scientific knowledge

Authentication of Primary User in Cognitive Radio

ADD TO MY LIST
 
Author(s): Mr. Sudesh Gupta | Prof. Rajesh Nema | Prof. Puran Gour

Journal: International Journal of Advanced Computer Research
ISSN 2249-7277

Volume: 2;
Issue: 1;
Start page: 86;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: CR | CRN | FCC | CCC | Primary User (PU)

ABSTRACT
Cognitive Radio (CR) or soft ware defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU) can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.
Affiliate Program      Why do you need a reservation system?