Network Surveillance Based Data Transference in Cognitive Radio Network with the Comparison of Diffe

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING PROTOCOLS G.ELANAGAI1

C.JAYASRI2

1PG

Scholar, Dept. of ECE Professor, Dept. of ECE AVC College of Engineering , Mannampandal, Mayiladuthurai. 2Assistant

---------------------------------------------------------------------***--------------------------------------------------------------------and Hybrid routing Protocols. The below figure 1.1 shows the basic cognition cycle [13]. model is a challenging task. There are many traditional

Abstract - Creation of Energy-Efficient Cognitive Radio

methods which are highly energy efficient, but it does not bother about network security. Hence in this paper we are comparing different wireless routing protocols and find best protocol to create energy efficient Cognitive Radio network (CRN) model having attacker nodes in it. Finally energy consumption comparison graph was generated between those routing protocols and finds the efficient model i.e. the creation of energy efficient CRN model. Key Words: Network Security,Energy Efficiency,Cognitive radio (CR), X Graph

1. INTRODUCTION Cognitive radio is a Software-defined radio that can able to access unused radio spectrum holes efficiently. The definition adopted by Federal Communications Commission (FCC):“Cognitive radio: A radio or system that senses its operational electromagnetic environment and can dynamically and autonomously adjust its radio operating parameters to modify system operation, such as maximize throughput, mitigate interference, facilitate interoperability, access secondary markets.” Cognitive radio (CR) techniques provide the capability of detecting spectrum holes and sharing the spectrum in an opportunistic manner. DSA techniques can select the best available channel from the spectrum pool for CR devices to operate [4]. More specifically, CR enables secondary users (SUs) to perform a series of operations as follows: 1) spectrum sensing to predict what spectrum is available and recognize the presence of the primary user (PU) when a PU reoccupies the licensed channel; 2) spectrum management to select the best available channel from the spectrum pool for special services; 3) spectrum sharing to coordinate access to all available channels with other SUs; and 4) spectrum mobility to vacate the channel as soon as possible when a PU is detected [4]. Spectrum sensing is one of the most important components in the cognition cycle .Routing protocols plays an important role to choose an efficient CRN model. Hence in this paper we are going to compare the reactive, Proactive

© 2017, IRJET

|

Impact Factor value: 5.181

2. WIRELESS ROUTING PROTOCOLS Wireless Routing protocols

Reactive

Eg: AODV, DSR

Proactive

Hybrid

Eg: DSDV, OLSR

Figure 2.1 Routing Protocols Classification

|

ISO 9001:2008 Certified Journal

|

Page 1949


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.