Advertisement

Cooperative Cognitive Radio Networking

  • Ning Zhang
  • Jon W. Mark
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

As a promising paradigm, cooperative cognitive radio networking has gained prominent attentions in the literature, whereby cooperative networking is leveraged to create a win-win situation for both PUs and SUs. This chapter will first provide a comprehensive survey of existing literature in CCRN to better understand the issues related. Then, the security aspects are discussed, which are of great importance and need to be considered before the widespread deployment of cooperation in CRNs.

Keywords

Outage Probability Network Code Primary System Cooperation Scheme Secondary Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 35.
    J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperative cognitiveradio networks,” in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, 2009.Google Scholar
  2. 36.
    O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 203–213, 2008.CrossRefGoogle Scholar
  3. 37.
    N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Cooperative cognitive radio networking for opportunistic channel access,” in Proceedings of IEEE GLOBECOM, 2013.Google Scholar
  4. 49.
    T. Elkourdi and O. Simeone, “Spectrum leasing via cooperation with multiple primary users,” IEEE Transactions on Vehicular Technology, vol. 61, no. 2, pp. 820–825, 2012.CrossRefGoogle Scholar
  5. 50.
    S. Hua, H. Liu, M. Wu, and S. Panwar, “Exploiting mimo antennas in cooperative cognitive radio networks,” in Proceedings IEEE INFOCOM, Shanghai, China, April, 2011.Google Scholar
  6. 51.
    Y. Han, A. Pandharipande, and S. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 4945–4950, 2009.CrossRefGoogle Scholar
  7. 52.
    Y. Yi, J. Zhang, Q. Zhang, T. Jiang, and J. Zhang, “Cooperative communication-aware spectrum leasing in cognitive radio networks,” in Proceedings of IEEE DySPAN 2010. IEEE, pp. 1–11.Google Scholar
  8. 53.
    N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Risk-aware cooperative spectrum access for multi-channel cognitive radio networks,” in IEEE Journal on Selected Areas in Communications, 2013.Google Scholar
  9. 54.
    I. Stanojev, O. Simeone, U. Spagnolini, Y. Bar-Ness, and R. Pickholtz, “Cooperative arq via auction-based spectrum leasing,” IEEE Transactions on Communications, vol. 58, no. 6, pp. 1843–1856, 2010.CrossRefGoogle Scholar
  10. 55.
    B. Cao, L. Cai, H. Liang, J. W. Mark, Q. Zhang, H. Poor, and W. Zhuang, “Cooperative cognitive radio networking using quadrature signaling,” in Proceedings of IEEE INFOCOM, Orlando, USA, March 2012.Google Scholar
  11. 56.
    B. Cao, Q. Zhang, J. W. Mark, L. X. Cai, and H. V. Poor, “Toward efficient radio spectrum utilization: User cooperation in cognitive radio networking,” IEEE Network, vol. 26, no. 4, pp. 46–52, 2012.CrossRefGoogle Scholar
  12. 57.
    N. Zhang, N. Lu, R. Lu, J. W. Mark, and X. Shen, “Energy-efficient and trust-aware cooperation in cognitive radio networks,” Proceedings of IEEE ICC, 2012.Google Scholar
  13. 58.
    Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative spectrum sharing via controlled amplify-and-forward relaying,” pp. 1–5, 2008.Google Scholar
  14. 59.
    Y. Han, S. Ting, and A. Pandharipande, “Cooperative spectrum sharing protocol with secondary user selection,” IEEE Transactions on Wireless Communications, vol. 9, no. 9, pp. 2914–2923, 2010.CrossRefGoogle Scholar
  15. 60.
    Q. Li, S. H. Ting, A. Pandharipande, and Y. Han, “Cognitive spectrum sharing with two-way relaying systems,” IEEE Transactions on Vehicular Technology, vol. 60, no. 3, pp. 1233–1240, 2011.CrossRefGoogle Scholar
  16. 61.
    Y. Tang and J. W. Mark, “A quadrature signaling based cooperative scheme for cognitive radio networks,” Proceedings of IEEE Goblecom, 2013.Google Scholar
  17. 62.
    N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Towards secure communications in cooperative cognitive radio networks,” in Proceedings of IEEE ICCC, 2013.Google Scholar
  18. 63.
    Q. Li, S. Ting, A. Pandharipande, and M. Motani, “Cooperate-and-access spectrum sharing with arq-based primary systems,” IEEE Transactions on Communications, vol. 60, Issue: 10, pp. 2861– 2871, 2012.CrossRefGoogle Scholar
  19. 65.
    J. C. Li, W. Zhang, A. Nosratinia, and J. Yuan, “Opportunistic spectrum sharing based on exploiting arq retransmission in cognitive radio networks,” pp. 1–5, 2010.Google Scholar
  20. 66.
    D. Chiarotto, O. Simeone, and M. Zorzi, “Spectrum leasing via cooperative opportunistic routing techniques,” IEEE Transactions on Wireless Communications, vol. 10, no. 9, pp. 2960–2970, 2011.CrossRefGoogle Scholar
  21. 67.
    B. Cao, J. W. Mark, and Q. Zhang, “A polarization enabled cooperation framework for cognitive radio networking,” Proceedings of IEEE Goblecom, 2012.Google Scholar
  22. 68.
    J.-H. Wui and D. Kim, “Cognitive relaying systems based on network and superposition coding in multiple access primary channels,” pp. 1–5, 2011.Google Scholar
  23. 69.
    W. Su, J. D. Matyjas, and S. Batalama, “Active cooperation between primary users and cognitive radio users in cognitive ad-hoc networks,” vol. 60, Issue: 4, pp. 1796–1805, 2012.Google Scholar
  24. 70.
    K. Lee, O. Simeone, C. Chae, and J. Kang, “Spectrum leasing via cooperation for enhanced physical-layer secrecy,” in Proc. of IEEE ICC’11, 2011.Google Scholar
  25. 72.
    Y. Wu and K. Liu, “An information secrecy game in cognitive radio networks,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 831–842, 2011.CrossRefGoogle Scholar
  26. 73.
    D. Shila, Y. Cheng, and T. Anjali, “Mitigating selective forwarding attacks with a channel-aware approach in wmns,” IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661–1675, 2010.CrossRefGoogle Scholar
  27. 74.
    H. V. Poor, “Information and inference in the wireless physical layer,” IEEE Wireless Communications, vol. 19, no. 2, pp. 40–47, 2012.CrossRefGoogle Scholar
  28. 75.
    L. Ozarow and A. Wyner, “Wire-tap channel ii,” in Advances in Cryptology. Springer, pp. 33–50, 1985.Google Scholar
  29. 76.
    J. Li, A. Petropulu, and S. Weber, “On cooperative relaying schemes for wireless physical layer security,” IEEE Transactions on Signal Processing, no. 99, pp. 1–1, 2011.Google Scholar
  30. 77.
    M. Gursoy, “Secure communication in the low-snr regime: A characterization of the energy-secrecy tradeoff,” in Proc. of IEEE ISIT’09.Google Scholar
  31. 78.
    L. Dong, Z. Han, A. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875–1888, 2010.CrossRefMathSciNetGoogle Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Ning Zhang
    • 1
  • Jon W. Mark
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations