2019
DOI: 10.1109/access.2019.2937582
|View full text |Cite
|
Sign up to set email alerts
|

Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things

Abstract: Next-generation mobile communication networks promise the support for vast number of IoT devices with strong demand for spectrum access. The cater for the continuous growth of IoT applications, one of the challenges to mobile communication network providers is to allow dynamic spectrum access to a gigantic number of densely distributed and low-power IoT networks. In this paper, a novel dynamic spectrum access method is proposed based on spectrum trading for distributed IoT devices. The notion of access benefit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…Authors proposed dynamic spectrum access and allocation method based on trading for cognitive Internet of Things network in [36]. The proposed work architecture includes four layers: the information sensing layer, network connection layer, cognitive layer and service layer.…”
Section: Schemes For Spectrum Sensing and Accessmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors proposed dynamic spectrum access and allocation method based on trading for cognitive Internet of Things network in [36]. The proposed work architecture includes four layers: the information sensing layer, network connection layer, cognitive layer and service layer.…”
Section: Schemes For Spectrum Sensing and Accessmentioning
confidence: 99%
“…• The trust value of the vehicles in the network was computed by the fusion center by incorporating the TOPSIS Beamforming in ultra-dense network Reinforcement learning algorithm Insecure beamforming [31] Secure Beamforming Power allocation policy Insufficient beamforming security [32] Interference less Beamforming Bi-LSTM Inaccurate CSI [33] Multiuser Beamforming Deep Neural Network High Attack Threats Spectrum Sensing and Access [34] Dynamic spectrum access Proactive and reactive techniques Poor spectrum access [35] Spectrum allocation Deep reinforcement algorithm High spectrum allocation latency [36] Dynamic spectrum access and allocation QAM modulation and Lagrange method Low performance of spectrum allocation [37] QoS aware spectrum access ANN algorithm Poor spectrum access efficiency [38] Detection of false sensing Dempster-Shafer theory Partially overcome the malicious SUs method; however, it faced difficulties in maintaining the consistency of the decision.…”
Section: Problem Statementmentioning
confidence: 99%
“…The IoT has been the subject of significant research interest in recent years [94]. It connects a tremendous number of physical devices (or "things") around the world that are capable of collecting and sharing data over the Internet [95].…”
Section: Ddos Defense Systems Based On ML Techniques In Iot Enviromentioning
confidence: 99%
“…Proportional fairness and max-min fairness schemes are implemented and compared in terms of total utility, average SINR, and fairness index. A trading-based spectrum optimization strategy is introduced in [27], in which IoT users try to optimize their access to the spectrum by ensuring that then spectrum price will not exceed the access benefits. A multi-objective optimization algorithm is presented in [28] for spectrum allocation cognitive radio-based IoT, aiming to maximize both end-to-end throughput and spectrum utilization.…”
Section: Introductionmentioning
confidence: 99%