The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background: Cognitive Radio Networks (CRN), one of the emerging technologies in the wireless communication domain, is primarily used for spectrum sensing and proper allocation of the unused licensed bands to the Secondary Users (SU) without producing any intervention to the Primary user (PU) in a dynamic manner. However, security to the physical layer becomes a major problem here. Security pressures in a cognitive radio network are taken into consideration. Method: The performance of the Primary User Emulation Attack (PUEA) from the Neyman-Pearson criterion’s perspective has been analysed. In addition, the work also proposes an enhanced interference elimination method to diminish the interference between the cognitive users and others operating in the same wireless environment. Result: The results are plotted using MATLAB. Simulation results show improved interference cancellation between the cognitive user and primary user. Application: Data transfer to remote places utilizing the spectrum that remains idle or underutilized.

Keywords

Cognitive Radio, Enhanced Interference Cancellation, Neyman-Pearson Criterion, PUEA.
User