Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

2017

Wireless Networks

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Next Generation Wireless Communications: Cognitive Radio, Adnan Quadri, Naima Kaabouch Mar 2017

Next Generation Wireless Communications: Cognitive Radio, Adnan Quadri, Naima Kaabouch

ADNAN QUADRI

Wireless networks and information traffic have grown exponentially over the last decade. Consequently, an increase in demand of radio frequency bandwidth has resulted. Recent studies have shown that with the current fixed spectrum allocation, there are spectrum holes that are not utilized all the time by the licensed users while other frequency channels, such as Wi-Fi, are heavily used. To efficiently utilize the radio spectrum, cognitive radio stands to be a promising solution as it will be reconfigurable, self-aware and efficient. This research aims to develop techniques that will allow a cognitive radio system to enhance the radio’s decision-making capabilities …


Secure Cloud Controlled Software Defined Radio Network For Bandwidth Allocation, Isaac J. Cushman Jan 2017

Secure Cloud Controlled Software Defined Radio Network For Bandwidth Allocation, Isaac J. Cushman

Electronic Theses and Dissertations

The purpose of this research is to investigate the impact of mobility of wireless devices for opportunistic spectrum access and communications using National Instrument Universal Software Radio Peripherals devices. The overall system utilizes software defined radio networks for frequency allocation, cloud connectivity to maintain up-to-date information, and moving target defense as a security mechanism. Each USRP device sends its geolocation to query the spectrum database for idle channels. The cloud cluster was designed for complex data storage and allocation using a smart load balancer to offer ultra-security to users. This project also explores the advantages of data protection and security …