The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an Data-Forwarding based multiple-channel selection scheme for CRMBR (Cognitive Radio Mobility Based Routing Protocol) [1] in CR enabled Mobile Ad Hoc Networks (CRMANET). Meanwhile in the new scheme, nodes along the route do not send ACKs in MAC layer for acknowledging successful transmission between two neighbors. Instead, the CR function allows the previous hop to understand...
This paper proposes a cross-layer wireless routing protocol called REAR (Radio Environment Adaptive Routing Protocol), which operates with Cognitive Radio (CR) Mobile Ad Hoc Networks (CRMANET). Unlike conventional on-demand routing protocols for ad hoc networks, the design of REAR allows nodes along the route to adjust the next hop according to real-time radio environment conditions during the transmission...
This paper proposes an enhanced scheme based on Associativity-Based Multicast Routing (ABAM) for Cognitive Radio Mobile Ad Hoc Networks (CR MANET) to further improve the stability of the multicast tree. After carefully studying the original ABAM design, the enhanced scheme is proposed from two aspects. One is in the tree formation phase, while the other is for node mobility handling. Both the original...
This paper proposes an adaptive packet aggregation scheme with QoS awareness in CR (Cognitive Radio) enabled Mobile Ad Hoc Networks (CRMANET). Instead of directly introducing the aggregation scheme from the 802.11n standard into CRMANET, the proposed adaptive scheme inherits the design advantages from the work given in [1] in regard to packet scheduling to further utilize each sub-channel before every...
This paper proposes a cross layer routing protocol called CRMBR (Cognitive Radio Mobility Based Routing Protocol.), which operates with Cognitive Radio (CR) Mobile Ad Hoc Networks. In the near future, with the rapid development of hardware and chipset functionality, devices with CR capability will offer promising opportunities within future mobile networks. The new routing protocol exploits the transfer...
This paper proposes a cross layer routing protocol which operates with Cognitive Radio (CR) Mobile Ad Hoc Networks. In the near future, with the rapid development of hardware and chipset functionality, devices with CR capability will offer promising opportunities within future mobile networks. The new routing protocol exploits the transfer of CR performance data from the Physical/MAC layers up to...
This paper proposes a cross layer routing protocol which operates with Cognitive Radio (CR) Ad Hoc Networks. The new routing protocol exploits the passage of CR performance information from the Physical/MAC layers up to Network layer as contributing factors within the route selection algorithms. The performance of the proposed protocol is investigated via simulations and the results confirm its favorable...
This paper proposes an improved QoS scheduling scheme, called the Modified Proportional Fairness with Multi-Hop (MPF-MH) algorithm for Cognitive Radio Mobile Ad Hoc Networks (CR MANET). Within the context of multi-channel MAC enabled networks, mobile nodes can experience simultaneous transmission across multiple channels. Benefiting from the proposed cross layer design, the real-time channel conditions...
The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries of network layers. In this paper, we design cross-layer attack strategies that can largely increase the attackers' power or reducing their risk of being detected. As a case study,...
When the crypto-period is expired or the key is compromised, trusted third party (TTP) broadcasts the materials of key update. The method cannot guarantee that all the nodes access to key materials in time if nodes work on different spectrums in cognitive radio networks. This paper presents a new algorithm based on the logistic model (KULCR) which reduces the demand for network synchronization and...
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum sensing schemes, secondary users are often assumed to be trustworthy. In practice, however, cognitive radio nodes can be compromised. Compromised secondary users can report false detection results and significantly degrade...
Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of primary users. In current collaborative sensing schemes, all collaborative secondary users are assumed to be honest. As a consequence, the system is vulnerable to attacks in which malicious secondary users report false detection results. In this paper, we investigate how to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.