Analysis of Secure Cognitive Radio Network with Optimal Resource Management

Authors

  • T. Vijaya Kumar Research Scholar, Department of Electronics and Communication Engineering, VISTAS, Vels University, Chennai, Tamil Nadu, India
  • C. Sharanya Assistant Professor, Department of Electronics and Communication Engineering, VISTAS, Vels University, Chennai, Tamil Nadu, India

DOI:

https://doi.org/10.15379/ijmst.v10i2.3041

Keywords:

Cognitive Radio Network, Primary Users, Secondary Users, Performance enhancement, Security problems, Resource management, Internet of Things, CRN attacks

Abstract

During the last decade, Cognitive Radio Network (CRN) technology has been a significant advance in addressing the ever-increasing spectrum demand. As the number of licensed and unlicensed users in a network rises to complete a certain activity, the information exchange between various types of traffic becomes more complex and difficult. Congestion in CRN is also caused by the conflict among several users for channel access (PUs and SUs). In a very crowded network, many applications perform badly owing to packet collisions and, as a result, packet loss before significant buffer queue building. This circumstance is aggravated by an increase in network users. Congestion control is a vital and essential aspect of the present research issue in communication networks. Several recent reviews in the literature indicate that the congestion issue in the CRN has not been thoroughly studied. Thus, effective and efficient congestion control strategies are sought to optimize network resource usage and management. To prevent congestion, it is crucial for CRN to do research on the creation of an efficient congestion management system. This will improve the network's resource consumption and performance. "Performance improvement via efficient spectrum management through optimum resource management and congestion control in the CRN by mitigating different threats" is the primary target of this project. This research also focused on enhancing performance by addressing security issues in an IoT-based CRN environment. This study provides a comprehensive review of several similar studies and their limitations, which may be used to formulate a new research target.

Downloads

Download data is not yet available.

Downloads

Published

2023-08-06

How to Cite

[1]
T. V. . Kumar and C. . Sharanya, “Analysis of Secure Cognitive Radio Network with Optimal Resource Management”, ijmst, vol. 10, no. 2, pp. 3028-3040, Aug. 2023.