4.7 Review

Spectrum handoff in cognitive radio networks: A classification and comprehensive survey

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 61, Issue -, Pages 161-188

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2015.10.008

Keywords

Cognitive radio; CR network; Spectrum handoff; Spectrum handoff; Schemes; Spectrum management framework

Ask authors/readers for more resources

The rapid progression in wireless networking has raised the demand of extra spectrum bands. The current fixed spectrum allocation policy used by the government agencies is unable to accommodate the growing demand of the wireless networks. The research in cognitive radio networks is envisaged to solve the problem of spectrum scarcity and inefficiency in spectrum usage. Hence, cognitive radio networks are providing high attention to wireless community which allows the dynamic use of the underutilized spectrum. The dynamic use of the available unutilized spectrum can be done by spectrum handoff. An extensive work has been carried out in the field of spectrum handoff for cognitive radio networks to fulfill the growing demand of extra spectrum. At present, there is no standardization, detailed classification and comprehensive survey exist for spectrum handoff schemes. This paper presents a detailed classification and comprehensive survey of existing spectrum handoff schemes for cognitive radio networks. The spectrum handoff schemes are classified into various categories which provide an overview of the active research initiatives in the area of spectrum handoff. On the synthesis of available spectrum handoff schemes, various research issues and challenges are also presented which require the attention of the researchers. (C) 2015 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

A comprehensive survey on machine learning approaches for dynamic spectrum access in cognitive radio networks

Amandeep Kaur, Krishan Kumar

Summary: Due to the growing demand for wireless communication networking, the radio spectrum has become overcrowded. Cognitive Radio (CR) technology is considered a promising solution to address spectrum scarcity by dynamically and efficiently utilizing unused spectrum bands. However, selecting the optimal network remains a challenge for CR networks. Intelligent spectrum management techniques are needed for dynamic spectrum management in CR networks.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2022)

Article Sociology

What can the Chinese experience of empire tell us about the Belt and Road Initiative?

Krishan Kumar

Summary: This article argues that one of the best ways to understand China's Belt and Road Initiative is to see it in the context of China's two-thousand-year history as an empire. By examining the characteristics of the Chinese Empire and the tribute system, the article aims to shed some light on the intentions behind the initiative proposed by Chinese leadership.

THEORY AND SOCIETY (2022)

Article Computer Science, Information Systems

Imperfect CSI Based Intelligent Dynamic Spectrum Management Using Cooperative Reinforcement Learning Framework in Cognitive Radio Networks

Amandeep Kaur, Krishan Kumar

Summary: This paper investigates the issue of efficient utilization of wireless spectrum and proposes a resource allocation scheme based on multi-agent reinforcement learning. The scheme integrates machine learning and cognitive radio technology while benefiting from cloud computing support to improve performance.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Engineering, Electrical & Electronic

Group mobility assisted network selection framework in 5G vehicular cognitive radio networks

Mani Shekhar Gupta, Krishan Kumar

Summary: The heterogeneity nature of networks and group mobility are important characteristics that need to be studied in 5G vehicular cognitive radio networks. A novel network selection technique is proposed to overcome congestion caused by group mobility and improve network throughput.

PHYSICAL COMMUNICATION (2022)

Article Computer Science, Information Systems

AFSOS: An Auction Framework and Stackelberg Game Oriented Optimal Network's Resource Selection Technique in Cognitive Radio Networks

Mani Shekhar Gupta, Krishan Kumar

Summary: This paper proposes a technique for achieving optimal resource selection in CR networks, which addresses the issue of spectrum scarcity through an auction framework and Stackelberg game.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Review Computer Science, Interdisciplinary Applications

Augmented Reality: A Comprehensive Review

Shaveta Dargan, Shally Bansal, Munish Kumar, Ajay Mittal, Krishan Kumar

Summary: Augmented Reality (AR) is a technology that modifies the perception of real-world images by overlaying digital data on them. It has diverse applications in various fields and is distinct from virtual reality.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2023)

Article Computer Science, Information Systems

COVID-19: Social distancing monitoring using faster-RCNN and YOLOv3 algorithms

Umang Ahuja, Sunil Singh, Munish Kumar, Krishan Kumar, Monika Sachdeva

Summary: This paper proposes a deep learning-based technique for automating the task of monitoring social distancing using surveillance cameras. The authors compared the performance of two object detection models and found that YOLOv3 demonstrated efficient performance.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Review Computer Science, Interdisciplinary Applications

Self-supervised Learning: A Succinct Review

Veenu Rani, Syed Tufael Nabi, Munish Kumar, Ajay Mittal, Krishan Kumar

Summary: Machine learning has made significant advances in image processing. Supervised learning relies on labeled data, while unsupervised learning learns from unlabeled data. Self-supervised learning is a type of unsupervised learning that enhances computer vision tasks. This review article provides an in-depth exploration of self-supervised learning and its applications, discussing terms, learning types, and challenges encountered in the process.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2023)

Article Telecommunications

Deep Recurrent Reinforcement Learning-Based Distributed Dynamic Spectrum Access in Multichannel Wireless Networks With Imperfect Feedback

Amandeep Kaur, Jaismin Thakur, Mukul Thakur, Krishan Kumar, Arun Prakash, Rajeev Tripathi

Summary: This paper investigates Dynamic Spectrum Access (DSA) paradigm with imperfect feedback for multiuser wireless network. It aims to design a distributed Deep Reinforcement Learning (DRL) based scheme with an objective of maximizing network utility. The proposed scheme exhibits robustness against the detrimental effects of the imperfect feedback.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2023)

Article Telecommunications

Deep Learning-Based Joint NOMA Signal Detection and Power Allocation in Cognitive Radio Networks

Ashok Kumar, Krishan Kumar

Summary: The article introduces a technique that uses deep learning for signal detection and power allocation. By optimizing the solution, it achieves the desired outcome without the need for channel estimation. The experimental results validate the superiority of this method and evaluate its robustness compared to existing approaches.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2022)

Article Computer Science, Information Systems

Worddeepnet: handwritten gurumukhi word recognition using convolutional neural network

Harmandeep Kaur, Shally Bansal, Munish Kumar, Ajay Mittal, Krishan Kumar

Summary: Deep learning models are used to recognize offline handwritten Gurumukhi words with a holistic approach. Three characteristics of word pictures are extracted and used to train a Convolutional Neural Network (CNN). The trained CNN's performance is assessed using five performance measures. The proposed model achieves high accuracy rates surpassing existing state-of-the-art systems.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

End-to-end residual learning-based deep neural network model deployment for human activity recognition

Alok Negi, Krishan Kumar

Summary: A novel automatic system for identifying human activity on the UTKinect dataset is implemented in this study using Residual learning-based Network ResNet-50 and transfer learning. The experimental results demonstrate excellent generalization capability with a high accuracy of 98.60% and a loss score of 0.02.

INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL (2023)

Article Multidisciplinary Sciences

DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system

Meenakshi Mittal, Krishan Kumar, Sunny Behal

Summary: The existing research in network security has used publicly available emulated datasets for validating defense mechanisms. However, the suitability and relevance of these datasets for DDoS defense remain an issue. This paper presents a DDoS-Testbed and an emulation-based dataset for DDoS attacks at the Application and Transport layer. The generated dataset contains a mixture of legitimate traffic, flash traffic, and various DDoS attacks, which can be helpful for validating new DDoS defense mechanisms.

PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY (2023)

Article Computer Science, Information Systems

Energy Efficient Clustering and Resource Allocation Strategy for Ultra-Dense Networks: A Machine Learning Framework

Nidhi Sharma, Krishan Kumar

Summary: The ultra-dense network structure of 5G with dense femto-cells deployment is seen as a solution to the increasing demand for cellular services. An efficient two-stage cluster-based resource allocation scheme is proposed to overcome interferences and achieve efficient resource allocation. It includes a dynamic clustering algorithm and a cloud-based multi-agent reinforcement learning algorithm to improve energy efficiency with a guarantee of quality of service (QoS).

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Telecommunications

Imperfect CSI-Based Resource Management in Cognitive IoT Networks: A Deep Recurrent Reinforcement Learning Framework

Amandeep Kaur, Krishan Kumar, Arun Prakash, Rajeev Tripathi

Summary: In this paper, the authors focus on the resource management optimization problem in IoT systems. They transform it into a Markov Decision Process and propose a Deep Recurrent Reinforcement Learning scheme to solve it. The scheme considers energy-efficiency and deals with partial observability from limited information. They introduce a cooperative framework and a Gated Recurrent Unit layer to improve the resource allocation policy. Extensive simulations demonstrate the superior performance of the proposed scheme in terms of convergence speed and reward, while also highlighting the importance of robust and intelligent design to maintain users' QoS.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2023)

Article Computer Science, Hardware & Architecture

A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems

Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain

Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A flexible algorithm to offload DAG applications for edge computing

Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa

Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad

Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning

Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao

Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

End-to-end active queue management with Named-Data Networking

Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio

Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

HADES: An NFV solution for energy-efficient placement and resource allocation in infrastructures

Angel Canete, Mercedes Amor, Lidia Fuentes

Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station

Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar

Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks

Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier

Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning

Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan

Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A fast coordination approach for large-scale drone swarm

Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo

Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks

Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang

Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Review Computer Science, Hardware & Architecture

Comprehensive review on congestion detection, alleviation, and control for IoT networks

P. Anitha, H. S. Vimala, J. Shreyas

Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Enabling containerized Central Unit live migration in 5G radio access network: An experimental study

Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli

Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi

Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things

Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy

Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)