Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31176
An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos


The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Meanwhile, the licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disabled and cloud platform is enabled.

Keywords: Cognitive Radio Networks, cloud platforms, GEtype Distribution, Performance Vs Security

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2253


[1] Ian F.Akyildiz, W. Lee, Mehmet C. Vuran, &S. Mohanty, "A Survey on Spectrum Management in Cognitive Radio Networks," In Communication Magazine of IEEE (Vol. 46, pp. 40-48), 2008.
[2] E. Hossain, D. Niyato, & Z. Han,"Dynamic Spectrum Access and Management in Cognitive Radio Networks," Cambridge University Press, 2009.
[3] AndreaGodsmith, "Wireless Communications," Cambridge University Press, 2005.
[4] Ministry of Defence, "UK Defence Spectrum Management A Consultation on: An Implementation Plan for Reform," 2008.(Online Accessed on 03/08/2013 at: a/file/35937/dsm_consultation_report.pdf).
[5] Notice of proposed rulemaking and order (ET docket no. 03-322): Facilitating opportunities for flexible and reliable spectrum use employing cognitive radio technologies. Technical report, Federal Communications Commission (Online Accessed on 10/08/2013 at
[6] A.M.Wyglinkski, M. Nekovee, Y.T.Hou, "Cognitive Radio Communications and Networks Principle and Practice," Elsevier Inc, 2010.
[7] Ian F. Akylidiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty, "Next generation/dynamic spectrum access / cognitive radio wireless networks: A survey,"Computer Networks, Elsevier Inc, 2006.
[8] T.R.Yusuf, "Performance Modelling and Analysis of Secondary Users in Cognitive Radio Network," Dissertation in Department of Computing, University of Bradford, 2011.
[9] Zhu Han, Rongfei Fan, and Hai Jiang,"Replacement of Spectrum Sensing in Cognitive Radio," Wireless Communication, IEEE Transactions (Vol. 8, Issue. 6), 2009.
[10] Mark A. McHenry, Peter A. Tenhula, Dan McCloskey, Dennis A. Roberson, and Cynthia S. Hood,"Chicago Spectrum Occupancy Measurements and Analysis and a Long-term Studies Proposal," 2005.(Online Accessed on 10/08/2013 at ChicagoSpectrum-McHenry-Session-I-1.pdf)
[11] Atta ur Rehman Khan, M. Othman, S. A. Madani,"A Survey of Mobile Cloud Computing Application Models," Communications Surveys & Tutorial, IEEE (Vol. PP, Issue. 99),2013.
[12] B. P. Rimal, E. Choi, and Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems," INC, IMS, and IDC. Fifth International Joint Conference, IEEE (PP. 44-51), 2009.
[13] Hiren Patel, Dhiren Patel, J. Chaudhari, Sachin Patel, and K. Prajapati,"Tradeoffs between Performance and Security of Cryptographic Primitives Used in Storage as a Service for Cloud Computing," Proceedings of the CUBE International Information Technology Conference (PP. 557-560), 2012.
[14] Torry Harris, "Cloud Computing - an Overview”. (Online Accessed on 15/10/2013 at: Overview.pdf)
[15] Y. B. Reddy, "Security Issues and Threats in Cognitive Radio Networks,” The Ninth Advanced International Conference on Telecommunications. IARIA, 2013.
[16] Wassim El-Hajj, H. Safa, and M. Guizani,"Survey of Security Issues in Cognitive Radio Networks, 2011. (Online Accessed on 20/08/2013 at:
[17] J. Mitola III and G. Q. Maguire,"Cognitive Radio: Making Software Radios More Personal," Personal Communications, IEEE (Vol. 6, PP. 13-18), 1999.
[18] Shie-Yuan Wang, Po-Fan Wang, and Pi-Yang Chen,"Optimizing The Cloud Platform Performance for Supporting Large-Scale Cognitive Radio Networks," Wireless Communications and Networking Conference, IEEE, 2012.
[19] Guzlan Miskeen, "Tutorials on: Discrete Event Simulation (DES) of Queueuing Network Models (QNMs)," Session 2. Department of Computing, University of Bradford, 2013.
[20] Danda B. Rawat, Sachin Shetty, and Khurram Raza, "Secure Radio Resouce Management in Cloud Computing Based Cognitive Radio Networks," International Conference on Parallel Processing Workshops, IEEE, 2012.
[21] Junu Shrestha, Avinash Sunkara, and Balaji Thirunavukkarasu,"Security in Cognitive Radio. Dissertation in Department of General Engineering," San Jose State University, 2010.
[22] N. Xiong, W. Han, and A. Vandenberg,"Green Cloud Computing Schemes Based on Networks: A Survey," IET Communications., 2011.
[23] Judith Hurwitz, Robin Bloor Marcia Kaufman, and Fern Halper,"Cloud Computing for Dummies," Wiley Publishing, 2010.
[24] Nikos Antonopoulos and Lee Gillam"Cloud Computing: Principles," Systems and Applications (Computer Communications and Networks), Springer, 2010.