Prioritized Secondary User Access Control in Cognitive Radio Networks

Huaxia Wang, Yu Dong Yao, Shengliang Peng

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

In cognitive radio networks, a secondary user access control (SUAC) technique has been utilized to improve network management and system security, in which a jamming signal is injected to degrade the spectrum sensing performance of unauthorized secondary users. In the meantime, it ensures reliable spectrum sensing performance for authorized secondary users (A-SUs). In order to introduce spectrum access priorities among A-SUs, a prioritized SUAC (P-SUAC) technique is investigated in this paper. A projection-based jamming cancellation method is considered, where the singular value decomposition operation is applied in computing prioritized projection operators. An orthogonal frequency-division multiplexing technique is considered as a transmission model, and the energy detection method is used for secondary user spectrum sensing. Simulation results illustrate the effectiveness of the proposed P-SUAC method in providing the A-SUs with different access priorities.

Original languageEnglish
Pages (from-to)11007-11016
Number of pages10
JournalIEEE Access
Volume6
DOIs
StatePublished - 28 Feb 2018

Keywords

  • Cognitive radio (CR)
  • access control
  • jamming
  • prioritized access control
  • spectrum sensing

Fingerprint

Dive into the research topics of 'Prioritized Secondary User Access Control in Cognitive Radio Networks'. Together they form a unique fingerprint.

Cite this