Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/452454
Title: Secure frameworks for cognitive radio networks
Researcher: Mahesh Kumar N
Guide(s): Siddesh G K
Keywords: Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2020
Abstract: Wireless communication driven by the generations of communication technologies, newlinei.e., 1G to 5G, IoT, and sensor networks is the rapidly growing industry in the newlineCommunication sector. This has helped in all fields of human endeavor. SaaS, Autonomous newlinecars, Telemedicine, Video conferencing, the concept of work from home are some of the newlineexamples where Wireless technology plays a crucial role. This has resulted in an newlineexponential increase in the number of devices and the use of sensors.There is ever increasing demand for Spectrum (Bandwidth) allotted by the Federal Communications Commission (FCC) in America and other regulatory agencies in different newlineparts of the globe. Due to ever-increasing demand for spectrum by various industries newlineincluding defence the cost of spectrum is increasing at an alarming pace. This has forced the industry to invent new ways of utilizing spectrum efficiently and effectively, resulting in new methods of modulation, dynamic allocation of spectrum and other spectrum efficient technologies. newlineSpectrum utilization ratio (peak to slack hour ratio) of major users like newlinetelecommunication, television, and Internet of Things (IoT s) are very high. This newlinemeasurement gave a clue to the industry that they have to find out techniques of utilizing newlinethe costly spectrum in slack hours and also during an unutilized time in peak hours. The newlineconcept of secondary users evolved due to the above reason. Cognitive Radio Network is newlinethe key technology that can be used by secondary users. CR technology enables to share spectrum in order to use underutilized frequency bands termed as white spaces or spectrum holes. Secondary users can also be called as unlicensed users, they will sense the availability of free spectrum and other parameters of communication to utilize the unused spectrum. Unlicensed users can use the unutilized spectrum without causing any conflict or disturbance to licensed subscribers. This resulted in access to unknown and unpredictable access to the licensed spectrum.
Pagination: 
URI: http://hdl.handle.net/10603/452454
Appears in Departments:Dayananda Sagar College of Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.61 kBAdobe PDFView/Open
02_preliminary pages.pdf422.17 kBAdobe PDFView/Open
03_abstract.pdf62.99 kBAdobe PDFView/Open
04_table of contents.pdf95.55 kBAdobe PDFView/Open
05 _list of abbreviations & symbols.pdf175.52 kBAdobe PDFView/Open
06 _list of figures.pdf112.54 kBAdobe PDFView/Open
07 _list of tables.pdf68.8 kBAdobe PDFView/Open
08_chapter 1.pdf291.48 kBAdobe PDFView/Open
09_chapter 2.pdf139.64 kBAdobe PDFView/Open
10_chapter 3.pdf276.83 kBAdobe PDFView/Open
11_chapter 4.pdf647.3 kBAdobe PDFView/Open
12_chapter 5.pdf396.1 kBAdobe PDFView/Open
13_chapter 6.pdf293.7 kBAdobe PDFView/Open
14_chapter 7.pdf342.11 kBAdobe PDFView/Open
16_bibliography.pdf135.19 kBAdobe PDFView/Open
80_recommendation.pdf90.71 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: