Primary User Localization in Cognitive Radio Networks Using Sectorized Antennas

被引:0
|
作者
Werner, Janis [1 ]
Wang, Jun [2 ]
Hakkarainen, Aki [1 ]
Valkama, Mikko [1 ]
Cabric, Danijela [2 ]
机构
[1] Tampere Univ Technol, Dept Commun Engn, POB 553, FI-33101 Tampere, Finland
[2] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
基金
美国国家科学基金会;
关键词
LOCATION; PARAMETERS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information about primary user (PU) location can enable several key capabilities in cognitive radio (CR) networks. In this paper we consider PU localization using received-signal-strength (RSS) and direction-of-arrival (DoA) estimates from sectorized antenna. Abstracting from practical antenna types, we define a sectorized antenna as an antenna that can be set to different operating modes, each of which resulting in a selectivity of those signals that arrive from within a certain, continuous range of angles, i.e. a sector. We propose a low complexity algorithm, the MaxE algorithm, that provides coarse RSS and DoA estimates, and derive the asymptotic bounds for its root mean square error (RMSE) as a function of the antenna parameters. We then propose a modified Stansfield algorithm with a novel RSS-based weighting scheme based on the Stansfield DoA fusion method, which obtains PU location estimates from measurements of the MaxE algorithm. The modified Stansfield algorithm improves the accuracy of the Stansfield algorithm with equal weights. Simulation results studying the impact of various system parameters, such as number of sectors, number of samples and signal-to-noise ratio, on the DoA/RSS estimation and localization accuracy are presented to provide design guidelines for localization systems based on sectorized antennas.
引用
收藏
页码:155 / 161
页数:7
相关论文
共 50 条
  • [41] Robust Cooperative Primary User Detection in Malicious Cognitive Radio Networks
    As-Sayid-Ahmad, Loqman
    Mansour, Nour
    Dahlhaus, Dirk
    2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, : 65 - 71
  • [42] Analysis of the Impact of Primary User Switching Strategies in Cognitive Radio Networks
    Salameh, O. I.
    De Turck, K.
    De Vuyst, S.
    Wittevrongel, S.
    Bruneel, H.
    IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 927 - 932
  • [43] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [44] Should primary user be given preemptive priority in cognitive radio networks?
    Zhu, Sheng
    Wang, Jinting
    COMPUTER COMMUNICATIONS, 2018, 132 : 65 - 73
  • [45] On Physical Layer Security for Cognitive Radio Networks with Primary User Interference
    Sibomana, Louis
    Hung Tran
    Zepernick, Hans-Juergen
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 281 - 286
  • [46] A Mitigation Strategy for Primary User Emulation Attacks in Cognitive Radio Networks
    Harini, S. V. Vidhya
    Aruna, T.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [47] Effective Capacity in Cognitive Radio Networks with Relay and Primary User Emulator
    Luyong Zhang
    Yijie Yang
    Xuan Li
    Jinhua Chen
    Yunbing Chi
    中国通信, 2019, 16 (11) : 130 - 145
  • [48] Mitigating Smart Primary User Emulation Attackers in Cognitive Radio Networks
    Taggu, Amar
    Marchang, Ningrinla
    2019 4TH TECHNOLOGY INNOVATION MANAGEMENT AND ENGINEERING SCIENCE INTERNATIONAL CONFERENCE (TIMES-ICON), 2019,
  • [49] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2016, 30 (06): : 62 - 69
  • [50] Improved Detection of Primary User Emulation Attacks in Cognitive Radio Networks
    Jin, Fan
    Varadharajan, Vijay
    Tupakula, Udaya
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 274 - 279