An Effectual Hybrid Relay Selection Approach for Improving Security and Reliability Trade Off in Cognitive Radio Network

by Anjali Khokhar*, Dr. Jitender Khurana,

- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540

Volume 15, Issue No. 3, May 2018, Pages 11 - 16 (6)

Published by: Ignited Minds Journals


ABSTRACT

The cognitive network is the main research area for the forthcoming wireless technology and is most effectual solution to stable the spectrum insufficiency and recover the utilization of the spectrum. However, there are various open challenges and random atmosphere of CRNs, where unlicensed users which are secondary users can feel free to use the channels that are not occupied by the licensed users which are primary users. So this paper shows that the enhancement of the security using signal and multiple relay selections to increase the security and reliability in cognitive radio networks. In this paper the hybrid Decode amplify and forward (DAF) approach is used by using Huffman coding. The whole arrangement is done in MATLAB environment. It is noticed form the result and discussions that our proposed approach is able to achieve less bit error rate and high capacity to reduce the vulnerabilities in cognitive radio networks (CRN).

KEYWORD

cognitive radio network, security, reliability, trade off, relay selection, hybrid approach, stability, spectrum insufficiency, utilization, unlicensed users, licensed users, signal selection, multiple relay selection, Decode Amplify and Forward, Huffman coding, MATLAB environment, bit error rate, capacity, vulnerabilities

1. INTRODUCTION

Growing demands of the technologies and business have determined wireless technology regeneration and progressed in a speedy way. In future, the inadequateresources of the spectrumopposes with the increasing demands of the business (Jiang, et. al., 2016). The Federal Communications Commission reports and records discussedthat presently spectrum shortage is basically dueto the unproductive and inflexible regulations moderatelythan the corporealdeficiency of the availability of the spectrum (Zhong & Zhang, 2016). Newly, the CRN (Cognitive radio networks)has brought to the front position to resolve thebattleamong limited supply of the spectrum anddemand from wirelessapplications enhancements and facilities. The CRN networks are definedas efficient wireless network retainingexpertiseto attain the data of its working (Ng & Lo, 2016).

Fig 1: Generalized block diagram

However, CRNs work in an open and random access networks environment. Spectrum sensing technologies are used for sensing channel (unoccupied channel) that cannot used by primary users. Cognitive users (the terms “secondary users” and “cognitive users” are used mutually unless explicitly mentioned) have flexible and convenient channel access mode, which greatly improves the efficiency of spectrum utilization, and effectively solves the lack of spectrum problem (Zhao, et. al., 2016). The security of cognitive radio network has been uniting growing attentions. Because various unidentified wireless devices are allowed to hopefully access the licensed spectrum in the architecture of cognitive radio, cognitive radio systems are vulnerable to spiteful attacks. Besides, CRNs not only look all the

related to unique cognitive characteristics, such as primary user repeat attack, falsifying data, denial of service attack etc. (Alageli, et. al., 2016) (Zou, et. al., 2015) At present, the research on network security has gradually become one of the warm topics of cognitive radio networks. Therefore, it is necessary to survey the research status of security techniques for cognitive radio network.

Fig 2: Cognitive Radio Scenario

2. SECURITY ISSUES AND CHALLENGES IN COGNITIVE NETWORK

The existence of malicious nodes is a great menace for improving the capacity, which can be classified into two basictypes (Chen & Baram, 2016) passive attacks and active attacks. ■ An active attack corresponds to the situationin which a malicious user intentionallydisrupts the system. ■ A passive attack corresponds to the situationin which a malicious user attempts tointerpret source information without injectingany information or trying to modify theinformation; i.e., passive attackers listen tothe transmission without modifying it (Rombouts, et. al., 2016). The overall goal is to ensure the network security and enhance the network capacity with less bit error rate (Akyildi, et. al., 2016). The rest sections discussed the significant literature review, proposed system methodology with various result simulations for increasing the capacity, reliability and security of the cognitive networks.

3. PROPOSED WORK

The proposed work deals with hybrid relay selection scheme in cognitive radio network based on single and used for the relay selection. As the signal receive strength and signal to noise ratio is high for the particular cognitive node then the multiple relay is selected as the routing node for sending packets from the single user to the destination. The route also consists of the less path delays for the increasing the security and reliability issues. Path loss deals with the decrease in power density or we can say the attenuation of the electromagnetic tendency as it broadcasts over space. Path loss is very big concern in the study and strategy of the link stability of a cognitive system. We have considered two distorted environment where the scenario is taken place for the result evaluations. The very first is the AWGN (additive white Gaussian noise) and the second one is the Ricien fading channel which is having a big concern in the producing the distortion and reducing these distortions is the main task for the high security and reliabilities. Path loss is expressed in decibels. The path loss can be evaluated as PL = 10t × log10 (d) + C Where PL is the path loss, t is the exponent for path loss, d is the distance among the source and destination, regularly measured in meters, and C is system losses (Kohn, et. al., 2014) (Saleem & Rehmani, 2016)

Fig 3: Proposed Methodology Flow diagram Algorithmic Flow Steps:

Step 1: Initially the user locations are evaluated and then the deployment the secondary users is taken place.

Anjali Khokhar1* Dr. Jitender Khurana2

Step 3: Distances among the cognitive radios are evaluated to achieve the high signal strength to achieve routing in the cognitive radios Step 4: The hybrid approach for decode forward and amplitude and forward approach is achieved to obtain high security and reliability tradeoffs Step 5: The evaluations from each end of the channel such as from relay to the base station, from mobile station to the base station is taken place Step 6: The performance is evaluated in terms bit error rate, channel capacity and outage probability.

4. RESULT AND DISCUSSIONS

The whole scenario is done in MATLAB 2016a. We have used MATLAB because this is efficient computing tools to achieve high end analysis in an effectual manner.

Fig 4 (a): Single relay selection Network Fig 4(b): Multiple Relay Selection Network

The Fig 4(a) shows the single relay cognitive radio network and 4(b) shows the multiple relay selected network in which secondary users is deployed with cognitive radios. These cognitive radios are mobile in nature which deals with the dynamic topology which is one of the significant tasks in terms of the stability of the network and also high signal strength.

Fig 5: Bit Error Rate (Single relay)

The fig 5 shows the bit error rate in additive white Gaussian noise fading channel which shows that the network is able to achieve less bit error rates as the signal to noise ratio increases.

Fig 6: Channel capacity (Single relay)

The fig. 6 shows the channel capacity over fading channel in case of signal relay selection and shows that the information is reliably broadcasted over a fading communication channel.

Fig 7: Outage Probability (Single relay)

The fig. 7 shows the outage probability in case of single relay selection which deals with the probability distribution that the rate of the information is not supported which shows the network reliability. It is one of the main concerns in the cognitive radio. This parameter must be long lasting for the stabilization of the working of the network. It deals with the probability that the channel rate information is not long lasting. Outage probability is well known with the capability that the stability rate will become less than the threshold rate.

Fig 8: Bit Error Rate (Multiple relay)

The fig. 8 shows the bit error rate for multiple relay selections and shows that our proposed approach is able to achieve less bit errors which must be low for high reliabilities

Fig 9: Channel Capacity (Multiple Relay)

The fig. 9 shows the channel capacity over fading channel for multiple relay selections and shows that the proposed system is able to achieve high channel capacity than the single relay scenario and is able to achieve high capacity of information to transmit from source to the destination.

Anjali Khokhar1* Dr. Jitender Khurana2

Fig 10: Outage Probability (Multiple Relay)

The fig. 10 shows the outage probability in case of multiple relay selection which shows that our system is able to achieve less outage probability in case of multiple relays and is able to handle the information transmissions in longer times with less error rate probabilities.

Table 1: Performance Evaluations over fading channel Table 2: Bit error rate comparison Table 3: Outage Probability comparison

From table 1, 2, 3 shows that the performance evaluation between the single and multiple relay selection approaches and also the performance comparison among the various approaches that the bit error rates and outage probabilities. Also the multiple relay selection is performing better as the communication traffic is able to manage by multiple relays in efficient manner.

5. CONCLUSION

This paper deals with the hybrid decoding and amplification approach for the single and multiple relay selection approached to increase the SRT of the communication system. From the above result and discussions we can notice that the proposed developed scheme is able to meet all the factors and is well efficient to increase the system efficiency with less error rate probabilities and high capacity to carry information at large distances.

6. REFERENCES

B. Zhong, Z. Zhang (2016). "Opportunistic two-way full-duplex relay selection in underlay cognitive networks", IEEE Systems Journal, pp. 1-19. D. Jiang, X. Ying, Y. Han, Z. Lv (2016). "Collaborative multi-hop routing in cognitive wireless networks", Wireless personal communications, no. 2, pp. 901-923. D. Jiang, Z. Xu, Z.Lv (2016). "A multicast delivery approach with minimum energy consumption for wireless multi-hop networks", Telecommunication systems 62, no. 4, pp. 771-782. D. W. K. Ng, E. S. Lo (2016). R. Schober, "Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer", IEEE transactions on vehicular technology 65, no. 5,pp: 3166-3184. I.F. Akyildi, W.Y. Lee, M. C. Vuran, S. Mohanty (2016). "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey", Computer networks 50, no. 13, pp. 2127-2159. J. Ding, Q. Yang, J. Yang (2016). "Secrecy outage probability of minimum relay selection in multiple eavesdroppers DF cognitive radio networks", In Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd, pp: 1-5. IEEE, 2016 J.M. Shine, P. G. Bissett, P. T. Bell, O. Koyejo, J. H. Balsters, K. J. Gorgolewski, C. A. Moodie, R. A.

no. 2, pp. 544-554. M. Alageli, A. Ikhlef, J. Chambers (2016). "Relay selection for asynchronous AF relay networks with frequency selective channels", In Signal Processing Advances in Wireless Communications (SPAWC), 2016 IEEE 17th International Workshop on, pp. 1-5. IEEE, 2016. N. Kohn, S.B. Eickhoff, M. Scheller, A. R. Laird, P. T. Fox, U. Habel (2014). "Neural network of cognitive emotion regulation—an ALE meta-analysis and MACM analysis",Neuroimage 87, pp. 345-355. N. Zhao, F. R. Yu, H. Sun, M. Li. (2016). "Adaptive power allocation schemes for spectrum sharing in interference-alignment-based cognitive radio networks", IEEE transactions on vehicular technology 65, no. 5, pp. 3700-3714. P. Bahl, R. Chandra, T. Moscibroda, G. S. H. Narlanka, Y. Wu, Y. Yuan (2014). "Media access control (MAC) protocol for cognitive wireless networks", U.S. Patent, issued. P.G.S. Velmurugan, S. J. Thiruvengadam (2014). "Bit error rate analysis of PLNC based cognitive radio relay systems in multi-source multi-destination scenario",India Conference (INDICON), IEEE, pp: 1-6. IEEE. S.A.R.B Rombouts, F. Barkhof, R. Goekoop, C. J. Stam, P. Scheltens (2016). "Altered resting state networks in mild cognitive impairment and mild Alzheimer's disease: an fMRI study", Human brain mapping 26, no. 4, pp. 231-239. X. Hong, J. Wang, C. X. Wang, J. Shi (2014). "Cognitive radio in 5G: a perspective on energy-spectral efficiency trade-off ", IEEE Communications Magazine 52, no. 7, pp: 46-53. Y. Chen, T. Z. Baram (2016). "Toward understanding how early-life stress reprograms cognitive and emotional brain networks", Neuropsycho pharmacology, no. 1, pp. 197. Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, T. Q. Duong (2016). "Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model", IEEE Transactions on Communications 64, no. 1, pp: 329-342. Transactions on Vehicular Technology 65, no. 12, pp. 10152-10157. Y. Saleem, M. H. Rehmani (2016). "Primary radio user activity models for cognitive radio networks: A survey", Journal of Network and Computer Applications 43, pp. 1-16. Y. Zou, B. Champagne, W. Zhu, L. Hanzo (2015). "Relay-selection improves the security-reliability trade-off in cognitive radio systems," IEEE Transactions on Communications 63, no. 1 pp. 215-228.

Corresponding Author Anjali Khokhar*

Research Scholar, Department of Electronics and Communication Engineering, Baba Mastnath University Rohtak, Haryana, India