scispace - formally typeset
Search or ask a question
Topic

Cognitive network

About: Cognitive network is a research topic. Over the lifetime, 4213 publications have been published within this topic receiving 107093 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents the authors' recent work in this area, which includes a centralized cognitive medium access control (MAC) protocol, a distributed cognitive MAC protocol, and a specially designed routing protocol for cognitive M2M networks.
Abstract: Machine-to-machine (M2M) communications enables networked devices to exchange information among each other as well as with business application servers and therefore creates what is known as the Internet-of-Things (IoT). The research community has a consensus for the need of a standardized protocol stack for M2M communications. On the other hand, cognitive radio technology is very promising for M2M communications due to a number of factors. It is expected that cognitive M2M communications will be indispensable in order to realize the vision of IoT. However cognitive M2M communications requires a cognitive radio-enabled protocol stack in addition to the fundamental requirements of energy efficiency, reliability, and Internet connectivity. The main objective of this paper is to provide the state of the art in cognitive M2M communications from a protocol stack perspective. This paper covers the emerging standardization efforts and the latest developments on protocols for cognitive M2M networks. In addition, this paper also presents the authors’ recent work in this area, which includes a centralized cognitive medium access control (MAC) protocol, a distributed cognitive MAC protocol, and a specially designed routing protocol for cognitive M2M networks. These protocols explicitly account for the peculiarities of cognitive radio environments. Performance evaluation demonstrates that the proposed protocols not only ensure protection to the primary users (PUs) but also fulfil the utility requirements of the secondary M2M networks.

310 citations

Journal ArticleDOI
TL;DR: Bounds for the interference and the outage probability are derived, and it is shown how to use a Poisson cluster process to model the interference in this kind of network.
Abstract: Consider a cognitive radio network with two types of users: primary users (PUs) and cognitive users (CUs), whose locations follow two independent Poisson point processes. The cognitive users follow the policy that a cognitive transmitter is active only when it is outside the primary user exclusion regions. We found that under this setup the active cognitive users form a point process called the Poisson hole process. Due to the interaction between the primary users and the cognitive users through exclusion regions, an exact calculation of the interference and the outage probability seems unfeasible. Instead, two different approaches are taken to tackle this problem. First, bounds for the interference (in the form of Laplace transforms) and the outage probability are derived, and second, it is shown how to use a Poisson cluster process to model the interference in this kind of network. Furthermore, the bipolar network model with different exclusion region settings is analyzed.

310 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed SCH-SpecPSO outperforms 75% more than state of art mobile social networks by optimizing various handover issues.

308 citations

Journal ArticleDOI
TL;DR: Simulations testify the effectiveness of the proposed cooperative sensing approach in multi-hop CR networks and a decentralized consensus optimization algorithm is derived to attain high sensing performance at a reasonable computational cost and power overhead.
Abstract: In wideband cognitive radio (CR) networks, spectrum sensing is an essential task for enabling dynamic spectrum sharing, but entails several major technical challenges: very high sampling rates required for wideband processing, limited power and computing resources per CR, frequency-selective wireless fading, and interference due to signal leakage from other coexisting CRs. In this paper, a cooperative approach to wideband spectrum sensing is developed to overcome these challenges. To effectively reduce the data acquisition costs, a compressive sampling mechanism is utilized which exploits the signal sparsity induced by network spectrum under-utilization. To collect spatial diversity against wireless fading, multiple CRs collaborate during the sensing task by enforcing consensus among local spectral estimates; accordingly, a decentralized consensus optimization algorithm is derived to attain high sensing performance at a reasonable computational cost and power overhead. To identify spurious spectral estimates due to interfering CRs, the orthogonality between the spectrum of primary users and that of CRs is imposed as constraints for consensus optimization during distributed collaborative sensing. These decentralized techniques are developed for both cases of with and without channel knowledge. Simulations testify the effectiveness of the proposed cooperative sensing approach in multi-hop CR networks.

297 citations

Book ChapterDOI
30 May 1996
TL;DR: The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Abstract: Rather than searching for the holy grail of steganography, this paper presents the basis for development of a tool kit for creating and exploiting hidden channels within the standard design of network communications protocols. The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem. Descriptions of typical hidden channel design for each layer of the Open Systems Interconnect (OSI) network model are given. Methods of hiding and detection probabilities are summarized. Denying Bob and Alice the ability to communicate electronically may be the only absolute solution.

296 citations


Network Information
Related Topics (5)
Wireless network
122.5K papers, 2.1M citations
90% related
Network packet
159.7K papers, 2.2M citations
88% related
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Wireless
133.4K papers, 1.9M citations
87% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202317
202234
202175
2020104
2019121
2018134