ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Authentication of Primary User in Cognitive Radio

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 3)

Publication Date:

Authors : ; ; ;

Page : 86-90

Keywords : CR; CRN; FCC; CCC; Primary User (PU);

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cognitive Radio (CR) or software defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU) can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

Last modified: 2014-11-21 21:20:21