TITLE

Typical Set Cognitive Sensing

AUTHOR(S)
Souihli, Oussama; Ohtsuki, Tomoaki
PUB. DATE
January 2011
SOURCE
ISRN Communications & Networking;2011, Special section p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In cognitive radio (CR) cooperative sensing schemes, wireless sensor nodes deployed in the network sense the licensed spectrum and send their local sensing decisions to a fusion center (FC) that makes a global decision on whether to allow the unlicensed user transmit on the licensed spectrum, based on a decision (fusion) rule. k-out-of-N is widely used in the literature owing to its practical simplicity. Regrettably, it exhibits a tradeoff between the achievable probabilities of false alarm and miss detection, which could have consequent effects on the performance of CR. In this paper, based on the notion of typical sequences, we propose a novel fusion rule in which the false alarm and miss detection probabilities can be simultaneously made as small as desired (asymptotically zero as the number of sensors goes to infinity).
ACCESSION #
65920969

 

Related Articles

  • On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies. Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe // Sensors (14248220);May2016, Vol. 16 Issue 5, p643 

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload...

  • On Optimal Antijamming Strategies in Sensor Networks. Yanmin Zhu; Yuan Jiang // International Journal of Distributed Sensor Networks;2012, p1 

    Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In...

  • Metadata behind the Interoperability of Wireless Sensor Networks. Ballari, Daniela; Wachowicz, Monica; Callejo, Miguel Angel Manso // Sensors (14248220);2009, Vol. 9 Issue 5, p3635 

    Wireless Sensor Networks (WSNs) produce changes of status that are frequent, dynamic and unpredictable, and cannot be represented using a linear cause-effect approach. Consequently, a new approach is needed to handle these changes in order to support dynamic interoperability. Our approach is to...

  • A Survey of Child Tracking Techniques in Wireless Sensor Network. Rozyyev, Azat; Hasbullah, Halabi; Subhan, Fazli // International Journal of Research & Reviews in Computer Science;Dec2010, Vol. 1 Issue 4, p59 

    Recent advances in telecommunication technology have led to the rapid development of sensor networks. The sensor networks have become part of everyday lives for people. There are many applications that have been developed using these networks. Each application consists of several components,...

  • A Novel Approach to use Nano-Sensor in WSN Applications.  // International Journal of Computer Applications;Jan2011, Vol. 14, p31 

    The article presents a study which examines the use of nanosensor in wireless sensor network (WSN) applications. The study investigates the proposed work through the combination of wireless sensor network and wireless nanosensor network including the sensing unit with the nanosensors for extra...

  • Software Defined Radio. Powell, John // Mobile Radio Technology;Nov2003, Vol. 21 Issue 11, p36 

    Focuses on software defined radio (SDR) as the possible solution to address the interoperability issue among public officers. Best long-term interoperability solutions promised by SDR; Significant technical challenges faced by the technology; Specific characteristics of each category of...

  • New Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network. Panwar, Avant; Kumar, Manoj; Kumar, Sajendra // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p24 

    The salient features of WSN like use of wireless radio communication, collaborative nature and deployment in the open environment exposes it to many security threats. Since WSN has tight limitations on the power consumption, transmission and computation the complex cryptographic algorithms can't...

  • Improving Accuracy for Range-Based Localization in Multiple Target Wireless Sensor Networks. Rodríguez, Oscar; Ohtsuki, Tomoaki // ISRN Communications & Networking;2011, Special section p1 

    We introduce a system for multiple target range-based localization systems, such as those based on time-of-arrival (TOA) and received signal strength indicator (RSSI) for distance measurement estimations. In order to improve the accuracy of the location estimation for all target nodes, our...

  • Interworking Architectures in Heterogeneous Wireless Networks: An Algorithmic Overview. Atayero, Aderemi A.; Adegoke, Elijah I. // International Journal of Computer Applications;6/15/2012, Vol. 48, p38 

    The scarce availability of spectrum and the proliferation of smartphones, social networking applications, online gaming etc., mobile network operators (MNOs) are faced with an exponential growth in packet switched data requirements on their networks. Haven invested in legacy systems (such as...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics