Currently, the radio spectrum is statically allocated and divided between licensed and unlicensed frequencies. Due to this inflexible policy, some frequency bands are growing in scarcity, while large portions of the entire radio spectrum remain unused independently of time and location. Cognitive Radio is a recent network paradigm that aims a more flexible and efficient usage of the radio spectrum. Basically, it allows wireless devices to opportunistically access portions of the entire radio spectrum without causing any harmful interference to licensed users. The present document surveys the literature on Cognitive Radio. It aims to provide a comprehensive and self-contained description of this research topic area, mainly focusing on communication protocols, spectrum decision issues, and future research directions. It is a tutorial in nature and consequently does not require any previous knowledge about Cognitive Radio. Readers are only required to have some general background on wireless data networks. Emphasis is put on Cognitive Radio genesis, issues that must be addressed, related technologies, standardization efforts, the state of the art, and future research directions according to the vision of the authors.
A novel, flexible and scalable parallel LDPC decoding approach for the WiMAX wireless broadband standard (IEEE 802.16e) in the multicore Cell broadband engine architecture is proposed. A multicodeword LDPC decoder performing the simultaneous decoding of 96 codewords is presented. The coded data rate achieved a range of 72-80 Mbit/s, which compares well with VLSI-based decoders and is superior to the maximum coded data rate required by the WiMAX standard performing in worst case conditions. The 8-bit precision arithmetic adopted shows additional advantages over traditional 6-bit precision dedicated VLSI-based solutions, allowing better error floors and BER performance.
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www.intechopen.com HQG ZKLOH 6JG /KP5WO #NIQTKVJO /5# 7KH 06$ >*XLOORXG HW DO @ LV D VLPSOLILFDWLRQ RI WKH ZHOONQRZQ 63$ LQ WKH ORJDULWKPLF GRPDLQ ,W LV DOVR EDVHG RQ WKH LQWHQVLYH EHOLHI SURSDJDWLRQ EHWZHHQ QRGHV FRQQHFWHG DV LQGLFDWHG E\ WKH 7DQQHU JUDSK HGJHV EXW WKDW XVHV RQO\ FRPSDULVRQ DQG DGGLWLRQ RSHUDWLRQV %HLQJ RQH RI WKH PRVW HIILFLHQW DOJRULWKPV XVHG IRU /'3& GHFRGLQJ >/LX HW DO 6HR HW DO @ HYHQ VR WKH 06$ VWLOO UHTXLUHV LQWHQVLYH SURFHVVLQJ /HW XV GHQRWH WKH ORJOLNHOLKRRG UDWLR //5 RI D UDQGRP YDULDEOH DV /[ OQ S[ S[ $OVR FRQVLGHULQJ WKH PHVVDJH SURSDJDWLRQ IURP QRGHV &1 P WR %1 Q DQG YLFHYHUVD WKH VHW RI ELWV WKDW SDUWLFLSDWH LQ FKHFN HTXDWLRQ P ZLWK ELW Q H[FOXGHG LV UHSUHVHQWHG E\ 1P?Q DQG VLPLODUO\ WKH VHW RI FKHFN HTXDWLRQV LQ ZKLFK ELW T/ T GDWD IRU LWHUDWLRQ L 2QFH DJDLQ PD[LPXP GDWD UHXVH LV DFKLHYHG EXW WKLV WLPH DPRQJ GDWD EHORQJLQJ WR WKH VDPH FROXPQ RI WKH + PDWUL[ DV GHSLFWHG LQ ILJXUHV DQG E 7KH FRPSXWDWLRQ LV SHUIRUPHG LQ WKH 63( IRU D SUHGHILQHG QXPEHU RI LWHUDWLRQV 2QH RI WKH SXUSRVHV RI WKLV ZRUN LV WR DVVHVV WKH SHUIRUPDQFH RI WKH SURSRVHG VROXWLRQV LQ WHUPV RI WKURXJKSXW 3XUVXLQJ WKLV JRDO ZH GHFLGHG WR GHYHORS D VROXWLRQ ZKHUH WKH QXPEHU RI LWHUDWLRQV LV IL[H...
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of CR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in the context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary user emulation attacks. We also address solutions and research challenges still required to address such threats. Our discussion aims at being complete and self-contained, while also targeting readers with no specific background on this important topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear vision of security threats and countermeasures in the context of primary user detection in CR.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.