Spectrum sensing and occupancy prediction for cognitive machine-to-machine wireless networks
Internet of Things
G420 Networks and Communications
MetadataShow full item record
AbstractThe rapid growth of the Internet of Things (IoT) introduces an additional challenge to the existing spectrum under-utilisation problem as large scale deployments of thousands devices are expected to require wireless connectivity. Dynamic Spectrum Access (DSA) has been proposed as a means of improving the spectrum utilisation of wireless systems. Based on the Cognitive Radio (CR) paradigm, DSA enables unlicensed spectrum users to sense their spectral environment and adapt their operational parameters to opportunistically access any temporally unoccupied bands without causing interference to the primary spectrum users. In the same context, CR inspired Machine-to-Machine (M2M) communications have recently been proposed as a potential solution to the spectrum utilisation problem, which has been driven by the ever increasing number of interconnected devices. M2M communications introduce new challenges for CR in terms of operational environments and design requirements. With spectrum sensing being the key function for CR, this thesis investigates the performance of spectrum sensing and proposes novel sensing approaches and models to address the sensing problem for cognitive M2M deployments. In this thesis, the behaviour of Energy Detection (ED) spectrum sensing for cognitive M2M nodes is modelled using the two-wave with dffi use power fading model. This channel model can describe a variety of realistic fading conditions including worse than Rayleigh scenarios that are expected to occur within the operational environments of cognitive M2M communication systems. The results suggest that ED based spectrum sensing fails to meet the sensing requirements over worse than Rayleigh conditions and consequently requires the signal-to-noise ratio (SNR) to be increased by up to 137%. However, by employing appropriate diversity and node cooperation techniques, the sensing performance can be improved by up to 11.5dB in terms of the required SNR. These results are particularly useful in analysing the eff ects of severe fading in cognitive M2M systems and thus they can be used to design effi cient CR transceivers and to quantify the trade-o s between detection performance and energy e fficiency. A novel predictive spectrum sensing scheme that exploits historical data of past sensing events to predict channel occupancy is proposed and analysed. This approach allows CR terminals to sense only the channels that are predicted to be unoccupied rather than the whole band of interest. Based on this approach, a spectrum occupancy predictor is developed and experimentally validated. The proposed scheme achieves a prediction accuracy of up to 93% which in turn can lead to up to 84% reduction of the spectrum sensing cost. Furthermore, a novel probabilistic model for describing the channel availability in both the vertical and horizontal polarisations is developed. The proposed model is validated based on a measurement campaign for operational scenarios where CR terminals may change their polarisation during their operation. A Gaussian approximation is used to model the empirical channel availability data with more than 95% confi dence bounds. The proposed model can be used as a means of improving spectrum sensing performance by using statistical knowledge on the primary users occupancy pattern.
CitationChatziantoniou, E. (2014) 'Spectrum Sensing and Occupancy Prediction for Cognitive Machine-to-Machine Wireless Networks'. PhD thesis. University of Bedfordshire.
PublisherUniversity of Bedfordshire
TypeThesis or dissertation
DescriptionA thesis submitted to the University of Bedfordshire, in partial fulfil ment of the requirements for the degree of Doctor of Philosophy (PhD)
The following license files are associated with this item:
Showing items related by title, author, creator and subject.
Application of optimization methods for resource allocation in cognitive radio-supported vehicular networksEze, Joy Chinedu (University of BedfordshireUniversity of Bedfordshire, 2021-07)The highly anticipated era of vehicular communication networks which is also an integral aspect of Intelligent Transportation Systems (ITS) will undeniably improve transport safety and significantly reduce road accidents. To promote the communication of mobile vehicles, US FCC officially allocated a meagre 75 MHz spectrum in the 5.9 GHz band to enable vehicular communication. Cognitive Radio Networks (CRNs) are adaptive, intelligent and reconfigurable wireless communications systems with CR technologies capable of learning from their surroundings and deciding their operations based on the learning. The application of CR technology to vehicular networks in order to increase the spectrum resource opportunities is studied in this research. Applying CR technology to vehicular networks is crucial especially when the officially allocated 75 MHz spectrum in 5.9 GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of Internet of vehicles (IoVs), which is also known as vehicular ad hoc networks (VANETs). We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR assisted vehicles to make opportunistic usage of licensed spectrum bands on the highways and developed a novel co-operative three-state spectrum sensing and allocation solution which makes CR vehicular SUs aware of additional spectrum resources opportunities on their current and future positions. Furthermore, a novel Adaptive CR Enabled Vehicular NETwork (ACRAVNET) framework is proposed to ensure high spectrum sensing efficiency and provide quality of service (QoS) support. To avoid heavy overhead usually incurred during spectrum sensing, we developed a novel CR adaptive spectrum sensing (CRASS) scheme that can reduce the spectrum sensing cost and improve sensing performance effectively. We also applied the concept of Nash Bargaining Solution (NBS) to guarantee fairness in spectral resources allocation and proposed a generalized non-symmetric NBS (GNNBS) to perform a non-symmetric cognitive inter-cell spectrum allocation in the proposed ACRAVNET framework. Both the simulation and theoretical analysis have demonstrated that our solution can significantly improve the performance of a cooperative spectrum sensing and sharing schemes and provide vehicles with additional spectrum opportunities with zero interference against the PUs activities. Additionally, the problem of joint optimal subcarrier and transmission power allocation with QoS support for enhanced packet transmission over a cognitive radio-enabled IoVs network system is also considered in this research study. To tackle the problem, a novel Symmetric Nash bargaining solution (SNBS) based wireless radio resource scheduling scheme in orthogonal frequency division multiple access (OFDMA) CR enabled IoVs network systems is proposed. The objective of the optimization model applied in this study is to maximize the overall system throughput of the CR enabled IoVs system without harmful interference to transmissions of the shared channels’ licensed owners (or primary users (PUs)), guarantee the proportional fairness and minimum data-rate requirement of each CR vehicular secondary user (CRV-SU) and efficient transmission power allocation amongst CRV-SUs. To avoid the iterative processes associated with searching the optimal solution numerically through iterative programming methods, this study developed a low-complexity algorithm. Theoretical analysis and simulation results demonstrate that under similar conditions, the proposed solutions outperform the reference scheduler schemes.
Spatial diversity for wireless LANsBrito, Rodrigo; Allen, Ben; Dohler, Mischa; Aghvami, A.Hamid; University of Bristol (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2004-05)Wireless local area networks (W-LAN) are widely used as a means of providing broadband access for high-speed wireless data services. The maximization of the system performance independent of the transceiver technology and the operating environment is of utmost importance to the hotspot system designer. This paper reports on the performance of single input and multiple output (SIMO) W-LAN systems and shows that a circular array topology located at the access point provides the best performance improvement compared to other candidate technologies when operating in an indoor office environment.
Cross-validation based man-in-the-middle attack protectionCui, Xiaofei (University of Bedfordshire, 2017-03)In recent years, computer network has widely used in almost all areas of our social life. It has been profoundly changing the way of our living. However, various network attacks have become an increasingly problem at the same time. In local area networks, Man-in-the-Middle attack, as one kind of ARP attack, is the most common attack. This research implemented a cross-validation based Man-in-the-Middle attack protection method (CVP). This approach enables a host to check whether another host that responds the initialising host with an ARP reply packet is genuine. It then allows the ARP cache table of the initialising hosts to be updated with the MAC address and IP address pairs of the genuine host and to place the MAC address of inauthentic hosts into a blacklist. This research introduced ARP and ICMP firstly, including the structure of ARP and ICMP packets, and their workflows. Secondly, this research discussed the types of ARP attacks and the existing ARP attacks protection methods, including their principles, applicable environment, advantages and disadvantages. Then, this research proposed and implemented a cross-validation based Man-in-the-Middle attack protection method. Simulations and experiments were performed to examine the effect of CVP method. The results show the effectiveness of the proposed cross-validation based method in protecting network from Man-in-the-Middle attack. Compared with the existing Man-in-the-Middle attack protection methods, CVP requires no extra devices and administration, leading to more secure local area networks and low cost. It also has made a “tabu” to attackers. That is, it places the MAC address of attackers into a blacklist. So they will be identified immediately if they try to attack the network again.