Professional Documents
Culture Documents
Figure 5.1 provides a taxonomy of security threats to CR networks. Note that this
taxonomy focuses on “active” threats unique to CR networks. Passive threats, such
as eavesdropping, and threats also applicable to non-CR networks, such as jamming,
are not included in the taxonomy. Figure 5.1 categorizes the threats into two broad
categories: spectrum access–related security threats and radio software security
threats. The former can be further classified into two subcategories: threats to
incumbent coexistence and threats to self-coexistence.
It specifies the air interface for a wireless regional area network (WRAN)
that uses fallow segments of the UHF/VHF TV bands between 54 and 862
MHz.
Ensuring the congruous coexistence of 802.22 networks (i.e., self-
coexistence) is of paramount importance.
In 802.22, the self-coexistence problem is exacerbated by the fact that a
base station’s (BS) coverage range may be as large as 100 km.
It is quite possible for a number of 802.22 cells to have overlapping
coverage areas.
If nonexclusive sharing is not feasible, then an 802.22WRAN needs to
acquire spectrum resources through exclusive spectrum sharing, viz. the
on-demand spectrum contention (ODSC) protocol.
ODSC Protocol
The ODSC process enables a cell to acquire better channels or more
channels to support the quality of service of the admitted workloads.
A Base Station(BS) collects neighboring cells’ spectrum utilization
information by receiving inter-cell control messages. These control
messages, called inter-cell beacons, are used by BSs to exchange spectrum
utilization information.
Although inter-cell beacons play a crucial role in self-coexistence, they are
not protected by 802.22’s security sub-layer.
In other words, inter-cell beacons are vulnerable to unauthorized
modification, forgery, or replay.
economic context within which they perform the required negotiation and decision-
making tasks.
Also, that access technologies such as OFDMA will play an important role in
enabling our micro-auction mechanisms. These technologies support dynamic
bandwidth availability and permit grouping, subdividing, and pooling of pieces of the
spectrum into neatly packaged spectrum channels. The marketplace differs
significantly from conventional FCC-style spectrum auctions in three aspects:
For linear demand curves, the revenue is a quadratic function of price, with a
unique maximum at p i = bi / 2.
Dividing the pricing models into two types: uniform and discriminatory pricing.
1. uniform pricing- the auctioneer chooses a single clearing price p for all the
winners.
Advanced Topics in Cognitive Radio 5.11
This property ensures that the auctioneer has incentive to set up the auction.
TRUST- A double spectrum auction framework that achieves the four required
properties:
Spectrum reuse,
Truthfulness,
Individual rationality, and
Budget balance.
Conventional double auction designs (VCG and McAfee) achieve truthfulness but
do not consider spectrum reusability.
VERITAS- on the other hand, addresses only single-sided buyer-only auctions
and loses the truthfulness when directly extended to double auctions.
Table 5.1. Comparisons of Double Auction Designs
VCG ⨉ ⨉
McAfee ⨉
VERITAS ⨉
extension
RUST
TRUST breaks the barrier between spectrum reuse and truthfulness in double
spectrum auctions. It enables spectrum reuse by applying a spectrum allocation
algorithm to form buyer groups.
Advanced Topics in Cognitive Radio 5.13
A current-day communication system used for public safety lack support for
multimedia applications as it comes with low-budget mass-market cell phones. One
of the reasons behind this is that it is not sensible from an economic perspective to
permanently reserve the large bandwidths required for such applications.
Cognitive radio, however, is able to acquire this spectrum on-the-fly only when it
is needed. Furthermore, backwards compatibility is very important in the field of
professional radio systems because of the large investments in a relatively small
market. Therefore, many incompatible standards and new broadband services are
main drivers for investigating how cognitive radio can be applied in this field.
5.6.1. REQUIREMENTS
The next-generation communication system for public safety will have very
extensive requirements. These requirements are studied and specified by
commissions such as SAFECOM in the United States and Project MESA in Europe.
5.6.3. RELIABILITY
For emergency networks, reliability is an important issue. There are two kinds of
reliability: robustness and security.
(i) Robustness is the ability of a system to avoid total failure despite unforeseen
conditions or partial damage.
A public safety communication system should always be available,
especially during large disasters.
The network should have wide coverage in the whole service area,
including special coverage locations like tunnels.
Advanced Topics in Cognitive Radio 5.15
5.6.4. BROADBAND
In an emergency situation a picture could say more than a thousand words. Video
is even more powerful in providing a clear impression of a complicated situation,
hence there is a huge demand for multimedia. Furthermore, the next-generation
public safety communication equipment will provide advanced features, like sensors
for biomedical and environmental signals.
5.6.5. PAGING
In paging communication short, predetermined text messages are sent to
mobile devices that are very important for public safety applications.
Paging is even more important than voice communication, used for
instance, to alarm firefighters, etc.,
The advantage of such predefined messages is that they convey a lot of
meaning in very few data bits.
The general meaning of a cognitive radio is a smart device that does all kinds of
useful things for its owner, based on sensory input and machine learning.
In a more specific meaning, it is a radio that can opportunistically use white space
in licensed bands without causing interference. Due to the special requirements of
public safety networks, there are several benefits of cognitive radio technology.
C. Enabling Broadband
In case of an emergency, public safety networks are heavily used, and
there is demand for more capacity.
Implementing the whole network would be very costly.
A different approach would be to use cognitive radio to sense for empty
frequency bands (white space) and use it as a secondary user to set up an
auxiliary communication network.
The relatively large bandwidths required for broadband communication
could be provided by secondary spectrum usage.
5.8.1. TETRA
TETRA was formerly known as trans-European trunked radio and standardized
by ETSI in 1995. TETRA was specifically designed for use by government agencies,
emergency services (police forces, fire departments, ambulance), rail transportation
staff, transport services, and the military.
Handhelds can communicate in direct mode operation (DMO), in which they
work similar to a walkie-talkie, or in trunked radio mode operation (TMO) - TETRA
base station infrastructure is used. DMO allows direct communications in situations
where network coverage has been lost.
TETRA system supports several types of data communication:
1. Status messages,
2. Short data services,
5.18 Cognitive Radio
5.8.2. C2000
TETRA is only a standard, and manufacturers make only generic base stations and
handsets that implement the standard. The public safety communication network in
The Netherlands is called C2000. It consists of three components:
■ T2000
A TETRA-based network for voice and low-rate data communication, uses the
frequency band 380 - 385 MHz for uplink and 390 - 395 MHz for downlink
communication.
The network is designed for at least 95% outdoor coverage.
It uses both direct mode and trucked radio mode.
For special coverage locations, like tunnels and stadiums, the system has
additional low-power base stations.
To facilitate helicopters and airplanes, a separate overlay network, TETRA
AGA (air-ground-air services) was constructed.
In this overlay network the distance of the base stations is increased to
83 km.
■ P2000
Paging is a very important communication application in public safety,
where short predetermined texts are transmitted and displayed on pager
devices.
Ex: used as alarm for firefighters.
C2000 uses a different network for paging, based on the FLEX protocol in
the 169.650 MHz band.
Advanced Topics in Cognitive Radio 5.19
■ M2000
M2000 is a software system used in the public safety answering point
(PSAP).
A PSAP is a call center responsible for answering calls to an emergency
telephone number for police, firefighting, and ambulance services.
M2000 helps to identify the scale of the emergency and which resources
should be allocated to the emergency.
It act as an info/help desk in talk groups and also monitors it and also used
for network management and network planning.
The C2000 network fulfills all important public safety requirements but lacks
support for multimedia/broadband Internet communication. In the frequency band in
which C2000 operates, the inflexible and fragmented licensing scheme made it
difficult to find more static allocated spectrum. On the other hand, a huge amount of
this spectrum always is temporarily unused. But traditional radio equipment lacks the
technology to find this free spectrum, and there is not yet a legal system that allows
ad hoc secondary usage.
The requirements for the next-generation system include features that require
broadband communication. Cognitive radio may in the future provide a means to find
the required bandwidth.
Public Safety and emergency response is another area in which cognitive
radio has gained a lot of attention.
For years public safety agencies have desperately needed additional
spectrum allocation to ease frequency congestion and enhance
interoperability.
These particular problems can be mitigated through the use of cognitive
radio technology.
For emergency and public-service providers, a major part of this concept is
spectrum sharing, which can help in maintaining call priority and response
5.20 Cognitive Radio
in which R is the bit rate, B is the bandwidth, and K is the cluster size.
The fraction R/B can be considered as the link spectral efficiency and is linked to
the Shannon formula, C = B . log2(1 + SNR) [b/s],. So, the link capacity increases if
the SNR is increased.
In a spatial reuse system, as in our example, the SNR is interference limited and
1
SNR 6 (3 K)/2 applies. In this formula the SNR depends on K and the path loss
exponent γ . A higher value of both parameters results in a higher SNR and hence a
higher link capacity. However, increasing K also decreases the system spectral
efficiency. So, it is up to the system designer to choose these parameters in an
optimal way. For example, the GSM system has a system efficiency of 0.17, and for
the WiMAX (IEEE 802.16) system this value increased to 1.2, which makes the
system spectral efficiency seven times higher compared to GSM.
From, the value of SNR one can derive that it is beneficial for the system spectral
efficiency to use a high frequency, as high frequencies have a higher path loss. This
is true to get the maximum system spectral efficiency. However, for mobile
communication, there is also a power constraint, especially for the uplink to the base
station. From this perspective, it is beneficial to use frequencies below the 1 GHz.
The latter requirement is more important for our application than higher
spectral efficiency.
(a) Why Is the 400 MHz to 1 GHz Band Optimal for Mobile Communication?
Below the 240 MHz, the antenna is too large for mobile communication
(i.e., larger than 30 cm).
One well-known trick to make an antenna shorter is to roll it up, but this
makes it too selective for only one narrow-frequency band.
Frequencies from 240 to about 400 MHz are used by military
communication and the frequency range from 1 to 1.4 GHz is in use by
aeronautical radio navigation and radio astronomy.
5.22 Cognitive Radio
Therefore, these bands also are not suitable for cognitive radio.
Frequencies below 1 GHz have less indoor penetration loss, less body loss,
and bend better around obstacles (less shadowing) compared to
frequencies above 1.4 GHz.
The indoor penetration loss and body loss for DAB band III (225 MHz)
and the L band (1465 MHz) are reported.
Band III had 3.5 dB less indoor penetration loss and 10 dB less body loss
compared to the L band.
So, frequencies from 400 MHz to 1 GHz, from a power budget point of
view, are the optimal frequencies.
5.9.4. Anti-jamming
An important requirement of public safety networks is resistance to jamming.
Jamming is the intentional use of a strong radio signal, for instance by terrorists, in
an attempt to disrupt communication.
The traditional way of coping with jamming is to use some form of spread
spectrum. In a spread-spectrum signal, the signal energy is spread over a much wider
bandwidth than the original signal. Since jammers usually have narrowband signals,
they disturb only a relatively small part of the signal. There are two well-known
spreading techniques: direct-sequence spread spectrum (DSSS) and frequency
hopping (FH).
In DSSS the signal is multiplied with a pseudorandom spreading code,
which is also known at the receiver.
In a cognitive radio, we have an accurate map of available white space, so
we could hop from white space to white space.
Usually, a jammer lacks this information, which would make jamming
difficult.
Cognitive radio provides inherently some robustness against a simple
jammer that works on a fixed frequency.
On the other hand, a cognitive radio network may be extra vulnerable to a
“smart” jammer that follows its target signal.
If such a smart jammer is used against a cognitive radio network, the
network is required to continuously change its frequency.
Advanced Topics in Cognitive Radio 5.23
C. Applications of IoT
IoT applications are expected to equip billions of everyday objects with
connectivity and intelligence. It is already being deployed extensively, in various
domains, namely:
Wearable’s
Smart Home Applications
Health Care
Smart Cities
Agriculture
Industrial Automation
D. IOT-Industrial Automation
This is one of the fields where both faster developments, as well as the
quality of products, are the critical factors for a higher Return on
Investment.
With IoT Applications, one could even re-engineer products and their
packaging to deliver better performance in both cost and customer
experience.
IoT here can prove to be game changing with solutions for all the
following domains in its arsenal.
Factory Digitalization
Product flow Monitoring
Inventory Management
Safety and Security
Quality Control
Packaging optimization
Logistics and Supply Chain Optimization
Recent research and technology trends are shifting toward IoT and CRNs.
However, we think that the things-oriented, Internet-oriented, and semantic-oriented
5.26 Cognitive Radio
versions of IoT are meaningless if IoT objects are not equipped with cognitive radio
capability. Equipping IoT objects with CR capability has lead to a new research
dimension of CR-based IoT.
Fig. 5.4. CR-based IoT framework with three levels: the virtual objects level,
composite virtual objects (CVOs) level, and consumer level.
Raw data is fused, cleaned, classified into clusters according to its features,
stored, and analyzed for its conversion into useful form.
The contextual data processing can produce large overhead.
An adaptive and cognitive context-aware framework based on social IoT
(SIoT) reduces this overhead, where SIoT is autonomous and proactive as
it is based on the social relationships among objects.
Advanced Topics in Cognitive Radio 5.29
n =1 m =1
This property ensures that the auctioneer has incentive to set up the auction.
27. Define IOT.
"The IoT integrates the interconnectedness of human culture -- our 'things' --
with the interconnectedness of our digital information system -- 'the internet.'
That's the IoT”.
28. List the applications of IoT.
Wearable’s
Smart Home Applications
Health Care
Smart Cities
Agriculture
Industrial Automation
29. List the benefits of CR-IoT.
It enables an efficient spectrum utilization;
It improves accessibility to various networks and Services;
5.36 Cognitive Radio
(b) Explain about the cognitive radio framework, justify how the cognitive
radio network be self-aware.
Ans: Refer Section No.1.8 Page No.1.12
12. (a) Discuss about the hardware architecture of SDR.
Ans: Refer Section No.2.5.1 Page No.2.12
[OR]
(b) How cognitive radio functions are mapped to the components of a wireless
PDA within the envisioned architecture? Explain.
Ans: Refer Section No.2.4 Page No.2.8
13. (a) Explain about the trade-offs associated with spectrum sensing techniques.
Ans: Refer Section No.3.4 Page No.3.16
[OR]
(b) Explain about the spectrum sharing models of dynamic spectrum access.
Ans: Refer Section No.3.5 Page No.3.20
14. (a) Discuss the operation of CSMA/CA scheme with its workflow operation.
Ans: Refer Section No.4.5.4 Page No.4.9
MQ.4 Cognitive Radio
[OR]
(b) Discuss the potential benefits and motivations for integrating IoT with CR.
Ans: Refer Section No.5.11 Page No.5.25
16. (a) The SCA provides a method of defining the requirements for each
application in XML, Justify this statement.
Ans: Refer Section No.1.8 Page No.1.12
[OR]
(b) Explain how the design Philosophies in software architecture was utilized to
prove the compatibility and interoperability of SDR.
Ans: Refer Section No.2.5.2.1 Page No.2.22
Model Question Papers MQ.5
data falsification (SSDF) attacks. In which, incorrect spectrum sensing data are
reported to the fusion center, which can affect the accuracy of the sensing
decision.
(b) Explain the architecture of SDR with neat diagrams and its implications?
Ans: Refer Section No.1.3 Page No.1.4
12. (a) With a neat diagram, explain the simplified cognition cycle.
Ans: Refer Section No.2.3 Page No.2.3
[OR]
(b) Explain about the IEEE 802.22 MAC and Physical layer structures.
Ans: Refer Section No.2.6.2 & 2.6.3 Page No.2.27 & 2.28
13. (a) Explain about the need for dynamic spectrum access.
Ans: Refer Section No.3.1 Page No.3.1
[OR]
(b) Discuss about the energy detection technique. Also explain about its feature
under fading and non-zero mean case.
Ans: Refer Section No.3.3.1 Page No.3.8
14. (a) Discuss about the classification of MAC schemes, with neat architecture.
Ans: Refer Section No.4.5 Page No.4.4
[OR]
(b) Explain, how routing was encountered in CRN. Also explain about its
features in CRN differ from conventional wireless networks.
Ans: Refer Section No.4.7 Page No.4.19
15. (a) (i) Discuss the security threats related to Cognitive Radio networks in
detail.
Ans: Refer Section No.5.2 Page No.5.2
MQ.8 Cognitive Radio
(ii) Discuss about the PUE attack and its classification with detailed
explanation.
Ans: Refer Section No.5.4.1 Page No.5.5
[OR]
16. (a) Explain about the Cognitive radio architecture which is applicable for next
generation networks with neat diagram.
Ans: Refer Section No.3.6 Page No.3.26
[OR]
(b) Explain how IOT can be integrated with CR network, Justify your answer.
Ans: Refer Section No.5.11 Page No.5.25