2020
DOI: 10.3390/electronics9061004
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Cooperative Sensing over Time-Correlated Rayleigh Channels in Vehicular Environments

Abstract: Spectrum starvation is a key challenge for wireless services and applications in vehicular networks with serious negative implications for traffic safety and transportation efficiency. As a promising solution, cognitive radio (CR) allows CR-enabled vehicles to access the spectrum holes of primary users (PUs) in an opportunistic manner, but requires a robust sensing mechanism to provide adequate protection for PUs. However, highly dynamic environments make spectrum sensing an increasingly difficult problem. For… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 34 publications
(49 reference statements)
0
2
0
Order By: Relevance
“…Consequently, imply that on-road systems usually require several devices to spread out. As a result, information is scattered and cooperation between devices [13] and between vehicles [14] becomes critical. In these cases, systems are no longer oriented to precisely recognize vehicles but are closer to recognising their behaviour.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, imply that on-road systems usually require several devices to spread out. As a result, information is scattered and cooperation between devices [13] and between vehicles [14] becomes critical. In these cases, systems are no longer oriented to precisely recognize vehicles but are closer to recognising their behaviour.…”
Section: Introductionmentioning
confidence: 99%
“…This article offers an in‐deep review to understand the main metrics required to develop an efficient, secure, and cost effective network. We reviewed and analyzed the different security concerns per key enabler technologies, including massive MIMO, mmWaves communication, small cells, full duplex communication, D2D communication, M2M communication, V2X communication, MEC, SDN, NFV, heterogeneous networks, network slicing, cloud RAN, ultra‐dense network, energy efficiency, and spectrum sharing 28,29,47,50‐60 . Second, the three aspects of security are presented namely security, privacy, and trust.…”
Section: Introductionmentioning
confidence: 99%
“…We reviewed and analyzed the different security concerns per key enabler technologies, including massive MIMO, mmWaves communication, small cells, full duplex communication, D2D communication, M2M communication, V2X communication, MEC, SDN, NFV, heterogeneous networks, network slicing, cloud RAN, ultra-dense network, energy efficiency, and spectrum sharing. 28,29,47,[50][51][52][53][54][55][56][57][58][59][60] Second, the three aspects of security are presented namely security, privacy, and trust. We analyzed the different security threats targeting the xG wireless network including jamming attacks, DoS attacks, eavesdropping attacks.…”
Section: Introductionmentioning
confidence: 99%