Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/452454
Title: | Secure frameworks for cognitive radio networks |
Researcher: | Mahesh Kumar N |
Guide(s): | Siddesh G K |
Keywords: | Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2020 |
Abstract: | Wireless communication driven by the generations of communication technologies, newlinei.e., 1G to 5G, IoT, and sensor networks is the rapidly growing industry in the newlineCommunication sector. This has helped in all fields of human endeavor. SaaS, Autonomous newlinecars, Telemedicine, Video conferencing, the concept of work from home are some of the newlineexamples where Wireless technology plays a crucial role. This has resulted in an newlineexponential increase in the number of devices and the use of sensors.There is ever increasing demand for Spectrum (Bandwidth) allotted by the Federal Communications Commission (FCC) in America and other regulatory agencies in different newlineparts of the globe. Due to ever-increasing demand for spectrum by various industries newlineincluding defence the cost of spectrum is increasing at an alarming pace. This has forced the industry to invent new ways of utilizing spectrum efficiently and effectively, resulting in new methods of modulation, dynamic allocation of spectrum and other spectrum efficient technologies. newlineSpectrum utilization ratio (peak to slack hour ratio) of major users like newlinetelecommunication, television, and Internet of Things (IoT s) are very high. This newlinemeasurement gave a clue to the industry that they have to find out techniques of utilizing newlinethe costly spectrum in slack hours and also during an unutilized time in peak hours. The newlineconcept of secondary users evolved due to the above reason. Cognitive Radio Network is newlinethe key technology that can be used by secondary users. CR technology enables to share spectrum in order to use underutilized frequency bands termed as white spaces or spectrum holes. Secondary users can also be called as unlicensed users, they will sense the availability of free spectrum and other parameters of communication to utilize the unused spectrum. Unlicensed users can use the unutilized spectrum without causing any conflict or disturbance to licensed subscribers. This resulted in access to unknown and unpredictable access to the licensed spectrum. |
Pagination: | |
URI: | http://hdl.handle.net/10603/452454 |
Appears in Departments: | Dayananda Sagar College of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.61 kB | Adobe PDF | View/Open |
02_preliminary pages.pdf | 422.17 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 62.99 kB | Adobe PDF | View/Open | |
04_table of contents.pdf | 95.55 kB | Adobe PDF | View/Open | |
05 _list of abbreviations & symbols.pdf | 175.52 kB | Adobe PDF | View/Open | |
06 _list of figures.pdf | 112.54 kB | Adobe PDF | View/Open | |
07 _list of tables.pdf | 68.8 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 291.48 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 139.64 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 276.83 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 647.3 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 396.1 kB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 293.7 kB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 342.11 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 135.19 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 90.71 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: