Improved Spectrum Access Control of. Cognitive Radios based on Primary ARQ Signals

Size: px
Start display at page:

Download "Improved Spectrum Access Control of. Cognitive Radios based on Primary ARQ Signals"

Transcription

1 Improved Spectrum Access Control of 1 Cognitive Radios based on Primary ARQ Signals Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California felap@ucdavis.edu zding@ucdavis.edu liu@cs.ucdavis.edu Abstract Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilization. In this work, we present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme constitutes a non-trivial generalization of the more traditional Listen-Before-Talk (LBT) strategy that merely listens to and yields to primary transmissions regardless of primary receiver responses. Our new method exploits the bi-directional and interactive nature of most wireless communication links to facilitate better opportunistic secondary access while achieving primary receiver protection. By allowing the secondary users to learn from both primary transmissions and the corresponding receiver confirmations, our approach allows secondary cognitive users to exploit critical information that primary receivers regularly send to their transmitters. We show that, by monitoring both primary transmissions and receiver feedback signals, secondary radio access can improve throughput over the traditional LBT while limiting the probability of collision with primary user signals. 1. INTRODUCTION The topic of opportunistic spectrum access for cognitive radios has recently attracted substantial research interest in wireless research community as a new paradigm for overcoming the dilemma of spectrum overcrowding and underutilization due to static spectrum allocation. As pointed by the FCC (of US) in [1], much of the spectrum suitable for wireless communications has been licensed to primary users. In many applications, sporadic channel access by licensed users leads to underutilization

2 2 of their allocated spectra. By allowing secondary users to opportunistically access the bandwidth allocated to but underutilized by primary users, cognitive radio networks have been championed as an enabling new technology to overcome the current spectrum scarcity caused from the traditional static spectrum allocation. A main challenge of opportunistic spectrum access (OSA) is the need to ensure that cognitive users avoid detrimental disruption to licensed user communications when they are active. To achieve such primary user protection, Listen-Before-Talk (LBT) opportunistic spectrum access scheme has been studied extensively with significant progress both in theory and in practice. For example, LBT strategy is shown to protect incumbent TV users during the second FCC experimentation phase [2] over TV bands. Although conceptually simple, LBT exhibits several drawbacks. First, it only senses primary transmission signals. Thus, to protect potential primary receivers, LBT-based cognitive radios must be designed very conservatively and typically needs a listening sensitivity well below 100dBm. Such extreme sensitivity may leave very little room for cognitive access [3]. Second, many robust primary user (PU) systems can withstand some concurrent interference. This robustness to interference provides room for concurrent SU access without disrupting PU communications. LBT does not allow SU access to fully exploit link robustness offered by error protection in such PU systems. Third, LBT does not provide any information regarding the aggregated effect of multiple cognitive transmitters on the primary receivers; hence making distributed cognitive access protocol difficult. To overcome the aforementioned weaknesses of LBT, we advocate a different strategy that incorporates the intrinsic feedback information in typical two-way PU communication links. More specifically, our principle is to exploit data-link-control (DLC) feedback information in PU systems for cognitive access. Because DLC messages carry important information about the quality of the link between the primary sender and its receiver, they reflect the sum interference effect of secondary user transmissions on the primary receiver. By observing such feedback information, secondary users (SUs) can devise more intelligent decisions with respect to spectrum access. As a generalization of Listen-Before-Talk, we develop a new sensing-and-confirmation OSA control algorithm by allowing secondary users to exploit information sensed from both primary transmissions and receiver responses. In particular, beyond the traditional sensing of primary transmitter, the SU also listens to the primary receiver ARQ signals; i.e., ACK/NAK. The successful decoding of an ACK/NAK packet from PU receiver indicates (with high accuracy) the presence of PU transmission, and thus enhances (or confirms) the detection of primary idle/busy state. It is important to note that opportunistic access is not necessary unlicensed. In fact, secondary users may belong to the same legacy as the primary

3 3 ones. For example, in this work the SU transmitter could be a femto base-station in a 4G network, opportunistically serving its user provided that the macro cell users are protected. We, therefore, advocate that secondary users should be allowed to decode encrypted packets such as DLC feedback packets to increase the average system performance. Opportunities to exploit DLC information exist widely in bidirectional digital communication systems. Examples include the 1-bit closed-loop-power-control (CLPC) information in IS-95, the ACK/NAK feedback-packets in WiFi networks, or the CQI feedback in LTE and HSDPA. Also, most standards include feedback control channel to communicate ACK/NAK feedback packets. In the present work, we focus on the ACK/NAK information that primary receivers (PRxs) send to primary transmitters (PTxs) to indicate whether or not the latest data packet was correctly received. The main scope of this work is to show that exploiting DLC information, specifically, ACK/NAK packets from the PRx, can be beneficial to secondary users to achieve improved channel access and, consequently secondary throughput-performance, while preserving primary protection. The work is not limited to a particular wireless network standard or protocol, but applies to systems that fit the descriptions in Section 3. Our scheme can be viewed as a special case of cooperative sensing in which multiple signal observations are used to better detect the presence of spectrum opportunities. In this special case, we are not using multiple cooperative secondary users. Instead, we exploit multiple sources of information received by the same secondary transmitter. Moreover, integrating the detection information from sensing-and-confirmation (SAC) with past observations as well as prior knowledge of primary user characteristics in terms of idle and busy distribution, we present an effective channel access control algorithm that can optimize the utility of spectrum idle periods of the primary users. Our work will be presented as follows. Section 2 details some of the related works in cognitive networks. In Section 3, we describe in detail the system model that underlies the cognitive sensing and channel access of primary user channels. In Section 4, we define our problem formulation and in Section 5 we develop an optimized spectrum access policy based on dynamic programming with information collection through sensing-and-confirmation (SAC). We present simulation results in section 6 to illustrate the performance of the optimized spectrum access policy. Section 7 summarizes the current work and discusses future research directions. 2. RELATED WORKS Existing works on cognitive radio access are mostly based on LBT and, particularly, on spectrum sensing of primary transmissions. Spectrum sensing may involve energy detection and cyclostationary

4 4 feature detection. These sensing schemes are presented, among others, in [4] and [5] respectively. A survey on spectrum sensing for cognitive radios is given by [6]. Distributed spectrum sensing schemes have been studied in [7] and [8]. A fundamental result of spectrum sensing was given in [9], where the authors described the concept of SNR-walls. To overcome such impairment, cooperative spectrum sensing among multiple nodes has been proposed. Among others, [11] demonstrated that the sensitivity-requirement changes under fading channels for spectrum opportunity detection. Also, [12] presented a multi-band joint detection algorithm for cooperative secondary users to mitigate the effect of possibly degraded channel conditions between the primary transmitter and some of the cognitive radios. The authors of [13], among others, tackled the design of optimum sensing time to maximize secondary users throughput under a primary user protection constraint. Different sensing techniques to help secondary users designers to implement the reliable sensors can be found in [14]. It is important to note that both [11] and [14] stress the need for cooperation among SUs to improve detection reliability. For this reason, we consider a special type of cooperation where each secondary transmitter (STx), instead of sharing its observation with the other SUs, collects observations from both the primary transmitter (PTx) and the primary receiver (PRx). This approach enables improved detection of channel vacancies and also makes it possible to more accurately assess STx s interference effect at the PRx, thereby improving the average secondary throughput performance. Since we assume that PRx feedback transmission time is very short compared to PTx data packet duration, channel usage during PRx feedback exchange does not constitute a significant opportunity for the STx. An information theoretic viewpoint for OSA appeared in [15], [16] and [17]. Secondary user policies to maximize primary channel access time have been studied in [18] and [19]. A generalization of those works for optimal single-su channel access with primary exponential or general idle time distributions is presented in [23]. The authors of [24] used a partially observable Markov decision process (POMDP) framework to devise a distributed MAC protocol for cognitive radios. Closely related to our SAC proposal are the works in [25] and [26]. In [25], the authors used a 1-bit CINR (carrier-to-interference plus noise ratio) feedback to optimize an SU power control strategy, whereas [26] proposed to maximize cognitive user data rate by exploiting the primary closed-looppower-control. Finally, in [27] the authors proposed another POMDP framework for dual sensing to utilize the ACK/NAK feedback that SUs can collect from the primary receiver in order to achieve distributed-collective primary receiver protection. There are a number of works assuming prior knowledge of primary busy-idle time duration at the

5 5 STx e.g, in [20], [21] and [22]. Such information can be obtained at STx by observing the primary channel long-enough and by using historic information. The authors of [28] apply a Markov-decision-process framework for devising an optimal opportunistic channel access policy, subject to limits on primary s performance loss. In [29], the authors allow primary H-ARQ feedback exploitation by secondary users to realize overlay opportunistic communications. 3. SYSTEM MODEL 3.1. Cognitive Overlay atop Random Access Networks DATA PACKETS PU Tx FEEDBACK PU Rx SU Rx SU Rx SU TX SU TX Fig. 1. System model Figure 1 illustrates a typical scenario in our study, where a cognitive radio network is overlaid on top of a primary user network that hosts random transmissions of primary subscribers when needed. As shown, a primary transmitter (PTx) and a primary receiver (PRx) communicate by transmitting packets of variable lengths by randomly access their assigned channel. The PRx responds to the packet transmission by feeding back ACK for success and NAK for failure. Our objective is to allow the overlay of secondary users that include secondary transmitters (STx) and secondary receivers (SRx) such that, when the primary pairs are silent, the STx can activate and transmit data packets to their receivers (SRx). More specifically, we consider the case when the primary system consists of a transmitter (PTx) and a receiver (PRx). They communicate through two logically distinct channels (i.e., through TDD or FDD). Figure 3 illustrates a TDD PU channel access in which the data frame from the PTx is followed by an acknowledgment from the PRx via the reverse link. As shown in Figure 2, in the forward channel (FCH), data packets are sent from the primary transmitter to the primary receiver, whereas the reverse channel (RCH) is a feedback channel where DLC packets are sent from PRx to PTx. The primary transmitter gains channel-access at will (whenever a packet is ready for transmission), following an

6 6 ON/OFF traffic pattern with known Idle/Busy-period distributions. We assume the access time to be slotted and that the secondary time slots have the same duration and timing of the primary ones. We associate the slot t to the time interval: [t t s,(t + 1) t s ) and we denote t s as the slot duration. The objective of the secondary transmitter is to maximize its channel access while maintaining the desired PU collision rate. Fig. 2. Distance model for secondary transmitter and primary pair. In this work, we make the following assumptions: A wireless scenario that includes one pair of primary does and one secondary pair. STx has prior knowledge on the primary busy/idle distribution. Primary traffic statistics does not change in the considered time-scale. The PTx is oblivious to secondary activity such that its channel access policy does not consider secondary activity. The STx always has packets to send. STx is allowed to decrypt the feedback-packets from the PRx. The transmission of the ACK/NAK packets from the PRx are short enough not to constitute a significant opportunity for increasing secondary throughput. Primary and secondary time slot synchronization. The STx cannot sense while transmitting. We assume that the SU only attempts to access PU forward channel and always listens to the PU reverse channel. When the SU correctly decoded a feedback packet, it can be used to enhance its detection of the primary transmitter s ON/OFF activity. For simplicity, we apply the following notations P, P 0, P 1, P 2 : PTx transmission power, PTx signal power at the STx, PRx transmission power,

7 7 and STx transmission power, respectively; d 0, g 0 : distance and channel (fading) gain between the PTx and the STx, respectively; d 1, g 1 : distance and channel (fading) gain between the PRx and the PTx, respectively; d 2, g 2 : distance and channel (fading) gain between the PRx and the STx, respectively; δ: path-loss factor, typically between 2 and 5; N 0 : background noise power at the PRx; N s : the number of samples used for the radiometer detector; γ: the likelihood-ratio test threshold; The secondary transmitter applies a sensing-based detection (e.g. energy detection) characterized by: P F = Pr[false alarm], P M = Pr[missed detection]. Note that, for a target probability of missed detection P M, we can calculate the corresponding false-alarm probability P F, through a Neyman-Pearson test. Specifically for Gaussian noise and approximately Gaussian signals, the probability of false alarm and missed-detection P F and P M can be expressed as follows, [10]: γ N 0 P F = Q (1) 2 N 0 N s γ (P 0 +N 0 ) P M = 1 Q. (2) 2 (P 0 +N 0 ) N s where Q( ) is the standard Gaussian integral function while P 0 = P d δ 0. In our algorithm, given a target value of P M, we can derive the corresponding likelihood ratio test γ and the false alarm probability P F. In our work, we assume imperfect STx reception of primary receiver s feedback characterized by: η = Pr[correctly decoding PRx feedback].

8 8 Note that a value of η = 0 means that the STx has no feedback information from the PRx and that its access strategy degenerates to the LBT strategy Primary Transmission Outage Because the essential objective of secondary user access is to minimize its negative impact on primary data transmission, the primary transmission outage probability must be kept low. To quantify the impact of SU access on PU channel quality, we define probabilities ξ 0 = Pr[PRx outage STx not transmitting] ξ 1 = Pr[PRx outage STx transmitting]. Whenever an outage event occurs at the primary receiver, the PRx sends a NAK packet to the primary transmitter. Note that the error (outage) probability at the PRx is based on the detection SNR threshold γ p. Following the exponential path model and the assumption of Rayleigh fading channel with unit variance, the error probability ξ 0 without STx transmission is: Pd δ 1 ξ 0 = P g 1 2 γ p, N 0 γ p N 0 = 1 exp ; Pd δ 1 Similarly, the outage probability when STx is active is: Pd δ 1 ξ 1 = P g 1 2 P 2 d δ 2 g γ p, 2 2 +N 0 = γ p P 1 d δ 1 P 2d δ 2 exp γ pn 0 ; Pd δ 1 (3) (4) Naturally, ξ 0 ξ 1. We note that both ξ 0 and ξ 1 can be estimated by the STx. In particular, we require the secondary transmitter to be able to decode primary receiver s ARQ packets and estimate the values of ξ 0 and ξ 1 over time Cognitive User Utilization of PU Signals In what follows, we detail the stochastic dynamic programming formulation used to devise the optimal channel access policy applied in this paper. Stochastic dynamic programming deals with

9 9 problems where decisions are made in stages. Dynamic programming captures the trade-offs between the instantaneous outcome and future ones. In this work, the objective of the decision-maker (the STx) is to find an optimal decision-selection policy that maximizes the expected reward (13). Note that we make use of the terms action and decision interchangeably. To devise an optimal action-policy at each stage, we consider a discrete-time dynamic-system for which the result of every decision is not fully predictable, but can be estimated through sensing and through collecting DLC feedback information from the PRx. Since we value more the reward from earlier stages than rewards that can be accrued in the future, we define a discount factor 0 < α < 1 that exponentially discounts the rewards collected in the future (see [31] and [32]). Given a policy, that is a set of actions to be performed at every stage of the algorithm, we define the average future-discounted total reward that the STx accrues as the value function associated to the policy in Eq. (15). In this section, we quantify: The per-stage reward function in Eq. (13). The per-stage action set in Eq. (5). The per-stage observation set in Eqs. (7) and (8). The STx value-function in Eq. (15). The optimal policy of Eq. (16) that maximizes Eq. (15). At time slot t, we let the secondary transmitter take the following three potential actions 0, stay idle, with unit cost c 0 a t = S, sense, with unit cost c S (5) T, transmit, with unit cost c T The implicit assumption is that the STx cannot transmit and sense at the same time. Thus, we define the STx action space as A = {0, S, T}. At the start of each time slot t, the secondary transmitter can decide whether or not to sense primary transmitter s activity. Following the forward channel sensing of primary transmission, regardless of the outcome, our secondary transmitter always listens to the reverse channel to over-hear possible primary receiver s DLC signals addressed to the primary transmitter. Our STx can utilize these signals

10 10 Fig. 3. Sequences of primary states, secondary actions and relative observation sets. for sensing confirmation. The probability η of correctly decode PU-PRx s feedbacks is: P 1 d δ 2 η = P g 2 2 > γ s = exp γ sn 0 N 0 P 1 d δ ; (6) where γ s is the SNR threshold for packet reception at the STx. We note that DLC packets are typically easier to decode than data packets. We let there be an adequate CRC to protect the feedback packet. Hence, if the SU correctly decodes the feedback packet, it is accurate and it confirms with certainty that PU is active in the preceding time slot, thereby allowing the secondary user to adapt its policy. Let denote the event that STx did not decode any feedback packet while denotes the complement event. Failure to decode may indicate an idle PTx or a severely degraded channel between the PRx to the STx. After performing action a t A, the STx will collect an observation O(a t ). Clearly, the observation space is action-dependent. For a = S, the observation space is idle (I) or busy (B) followed by the ACK/NAK decoding result: 2 Ω(S) = {I; B} { ; }. (7) On the other hand, the observation space for a = 0 or a = T is limited to the ACK/NAK decoding result: Ω(T) = Ω(0) = { ; }. (8) Figure 3 shows a possible realization of primary channel states and the relative secondary transmitter actions and corresponding observation spaces. Because we have imperfect sensing, the PTx may be sensed as idle but a feedback ACK/NAK may instead be correctly decoded at the end of the time slot, informing the STx that there was a sensing error on the PTx activity. This allows sensing-and-

11 11 confirmation (SAC) to improve the STx s knowledge on the PTx s activity Partially Observable Markov Model In order to determine an optimized action to take at the STx, we apply a partially observable Markov decision framework to devise an optimal opportunistic spectrum access strategy that achieves primary receiver protection in terms of collision probability while maximizing secondary transmitter s channel access opportunities. In particular, define the true state of the forward channel at t as 0 : PTx = B (busy), s t = 1 : PTx = I (idle). (9) Define S = {0;1}. This binary state s t S is partially observable at the cognitive user through PTx sensing and through PRx feedback decoding. Clearly, if the STx is fully aware of s t, then its access strategy can be optimized accordingly to maximize a user defined utility function. However, both PTx s activity sensing and PRx s feedback decoding are imperfect and prone to errors. For this reason, we define σ t = P[s t = 1 STx observations] (10) as the STx s information state on the PTx state s t based on current O(a t ) and past observations. Observations are collected by the STx to estimate the primary channel state [31]. In order to update σ t, the STx collects the observations up to time t 1 in a vector O <t = [O(a 0 ),O(a 1 ),...,O(a t 1 )]. Our access algorithm depends on the state information estimate σ t. Hence, we must determine how the estimate σ t can be updated, given each new observation before a new action a t+1. We outline the development of this optimized access control based on the partially observable Markov process in the next section. 4. ACCESS CONTROL OPTIMIZATION Let us define D I, D B as two discrete random variables representing the number of slots the FCH has been in the idle or the busy state, respectively. In this work, we assume that the secondary

12 12 transmitter knows the probability distribution of the idle and busy durations: P I (k) = P [D I = k], (11) P B (k) = P [D B = k]. (12) Assuming a stationary PU activity distribution, this knowledge can be acquired either directly from the PU hosts or by monitoring PU activities prior to channel access. Note that we are implicitly considering a time-scale during which the primary Busy/Idle distributions do not change. This assumption is reasonable because traffic patterns do not dramatically change, e.g., in cellular systems traffic patterns are normally assumed to stay constant for periods as long as 1 hour. For estimating the duration of a primary idle or busy period upon deployment, the STx senses the forward channel to detect the first idle to busy transition in primary traffic. This kind of transition is easier to detect than a busy-to-idle transition because, in practice, the start of each packet typically contains a preamble and/or a pilot sequence for receiver synchronization. Such preamble has unique characteristics and can be more easily detected by the cognitive radios to detect the beginning of the first busy period upon their deployment. To optimize STx control, we define a reward function for each stage (slot). Recall the STx information state σ t [0,1] and its action a t A. We specify a reward function as c 0, a t = 0, R(σ t,a t ) = c S, a t = S, (13) r T (1 P NAK ) c T P NAK, a t = T. where the probability of P NAK = (1 σ) ξ 1 is an outage, or collision, probability estimate at the PRx. Note that c 0 is a constant cost associated to the feedback packet overhearing in case of idle action; c S is a constant sensing cost; r T is a constant reward that the STx gets after every successful transmission whereas c T is the penalty of collision with a primary transmission. We define an access control policy as a sequence of functions π = {µ 0,...,µ t,...}, in which µ t (σ t ) is the action taken according to the result in σ t µ t : [0,1] A. (14) Let us define τ 0 (t 0 ) as the first forward channel state transition from busy to idle from time t 0. Given

13 13 a policy π, we define the corresponding value function as: V π (σ,t 0,τ 0 (t 0 )) = E π [ + t=t 0 α t r(σ t,a t ) σ t0 = σ ]. (15) The optimized access control policy π is an admissible policy that maximizes the value function (15) via π = argmax{v π (σ,t s,τ 0 (t s ))}. (16) π 5. DYNAMIC PROGRAMMING FOR OPTIMIZING SPECTRUM ACCESS We now present the details of our dynamic programming formulation for optimizing spectrum access PTx Transition Estimation In order to estimate σ t, the secondary transmitter needs to know the number of time slots in the same busy or idle state. For this reason, if, at time t, the STx believes that the PU channel is in state q {0;1}, it uses the past and current observations to estimate the next PU traffic instant τ 1 q (t) that marks the transition from state q to state 1 q. In order to do so, at every time slot, upon performing an action and collecting corresponding observation, our STx uses a maximum a posterior (MAP) estimator to estimate τ 1 q (t). At time t, after collecting the observation O(a t ) corresponding to the action a t A, the STx estimates the transition epoch from state q {0,1} to state 1 q via τ 1 q (t) = argmax {ln(p[o(a t ),O <t τ 1 q (t) = x])+ln(p[τ 1 q (t) = x)}. (17) x>τ q(t 1) Note that there are two possible outcomes of the MAP estimate τ 1 q (t). I) τ q (t 1) < τ 1 q (t) < t: this MAP outcome suggests that the transition from state q to 1 q happened before t. In this case, if the posterior probability associated with the MAP estimation is above a given threshold, the traffic distribution used to determine when the information state σ t changes from P q (k) = P[D q = k] to P 1 q (k) = P[D 1 q = k]. Moreover, the STx will erase the vector O <t and start a new one associated to τ 1 q (t). II) τ 1 q (t) t: this MAP estimate suggests that the PU channel state will stay in state q at time t; Hence, STx discards the estimate τ 1 q (t). When τ 1 q (t) < t, it is still risky to conclude that a PU state transition took place in order to update the distribution associated to the PU channel state. It is in fact important to take into account the reliability of this MAP estimate by evaluating its corresponding posterior probability σ t.

14 Information State Update Consider that, at time t, the STx performed an action a t and collected O(a t ) and O <t. The STx then will use the current and past observations to determine the next PU traffic transition via the MAP estimator of Eq. (17). Since the MAP estimator is not perfect, the STx would exploit the information state σ t to decide the next action to take. Let us assume that, at the end of time slot t, τ 1 q (t) t. In this case (known as case II), the STx assumes the primary forward channel state did not change. Note that the primary traffic transition estimate τ 1 q (t) is discarded and that the STx will conclude that the FCH is in state q, storing the value of τ q (t 1) in τ q (t). In the dynamic programming implementation, we use the following information state approximation: σ t ρ t = E[s t = 1 O(a t 1 ),τ q (t)], t > 0. (18) Note that, in (18), the information of the vector O <t, contained in σ t (10), is carried over by the transition epoch estimate τ q (t). Upon performing action a t A and collecting observation O(a t ), the STx calculates ρ t+1 using two steps: 1) Determining the posterior probability: β t = P[s t = 1 O(a t ),τ q (t)]. (19) In order to find β t, the STx determines first the probabilities v 1 = P[O(a t ) s t = 1], v 0 = P[O(a t ) s t = 0]. (20) The posterior probability (19) is defined as β t = v 1 ρ t v 1 ρ t +v 0 (1 ρ t ). (21) 2) Calculating the information vector ρ t+1. Let K q be the estimate of the number of time slots the PU channel has been in state q {0;1}. Let D q be a random variable denoting the number of time slots in state q. For computational tractability, we assume that since τ q (t), at most one transition may take place. Hence, the

15 15 probability that s t remains in state q at t+1 is P[D q K q +1 D q K q ] = P[D q K q +1]. (22) P[D q K q ] To update the probability estimate that s t+1 = 1, we need to define this probability: K q [ = p(d q = k) 1 P[D ] 1 q K q k+1]. (23) P[D 1 q K q k] k=1 Hence, the updated information vector is ρ t+1 = P[Dq Kq+1] P[D q K q] β t + (1 β t ). (24) For the sake of simplicity, we will simply denote this update procedure by ρ t+1 = UPDATE(O(a t ),ρ t,t,τ q (t)). (25) 5.3. Value Iteration and Policy Decision Based on dynamic programming, we define V(ρ,t,τ q (t)) as the maximum mean discounted value function that the STx can get at time slot t with ρ t = ρ. Without loss of generality, let the latest PU state transition be to state q. From [30], [31] and [32], we have: V(ρ,t,τ q (t)) = max a {0, T, S} V a(ρ,t,τ q (t)), (26) where V 0 (ρ,t,τ q (t)), V S (ρ,t,τ q (t)), V T (ρ,t,τ q (t)) are the value function associated with actions a t = 0, a t = S, and a t = T, respectively. These value functions are defined by where V 0 (ρ,t,τ q (t)) = R(ρ,a t = 0)+α ω Ω(0) V S (ρ,t,τ q (t)) = R(ρ,a t = S)+α ω Ω(S) V T (ρ,t,τ q (t)) = R(ρ,a t = T)+α ω Ω(T) P [O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); P[O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); P[O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); ρ t+1 (ω) = UPDATE(O(a t ) = ω,ρ t = ρ,t,τ q (t))) Note that R(ρ t,a) is the per-stage reward function associated with the action a; τ q (t+1) is the MAP estimate of the PU traffic transition-epoch at time t+1 to state 1 q,

16 16 6. SIMULATION RESULTS We now present test results of our optimized access policy based on SAC. Our test scenario involves a single pair primary nodes and a single pair secondary nodes. Throughout our tests, we set the path loss δ = 4, to account for surface reflections. Additionally, we set P B (k), P I (k) as uniform in [1,10] and [1, 20], respectively. Performance evaluation is in terms of secondary average channel utilization rate (28), and of collision probability at the primary receiver (27). Since our scheme applies sensing-and-confirmation (SAC), we wish to analyze the effect of each detection outcome on secondary performance. For this reason, we took into consideration a scenario such as the one depicted in Fig. 2, where primary transmitter s activity detection performance depends on the distance between the primary and secondary transmitters d 0 ; whereas the probabilities η of correctly decoding a feedback packet from the primary receiver and ξ 1 of outage in case of concurrent primary-secondary transmissions depend on the distance d 2 between the STx and the PRx. As d 0 increases, the PTx activity detection performance by the STx becomes worse either in terms of false alarm or missed detection; as d 2 increases, the feedback decoding probability decreases together with the collision probability ξ 1 at the primary receiver. The collision probability at the primary receiver, P coll, and the secondary average channel utilization rate, (SACUR), are defined as: P coll = SACUR = N t=0 I(a t = T,f t = NAK), N +1 (27) N t=0 I(a t = T,f t NAK), N +1 (28) where f t {ACK, NAK, } is the primary receiver s feedback at time t; N s is the simulation run time and I( ) is the standard indicator function. Note that the above metric counts the effective percentage of time the STx causes a NAK at the PRx. The parameters η, P M and P F directly affect the belief-vector dynamics through the information-state update procedure summarized in Eq. (25). The performance metrics SACUR and P coll are determined by an optimal action-selection policy derived through Eqs. (16) and (26). In particular, a collision is expected by the action of STx a t = T followed by an NAK reception. In our experiments, the performance estimates are averaged over N = 100 time slots. This value is large enough since, as will be shown in Fig. 4, averaging over larger N does not noticeably change our results.

17 N=500 N= SACUR P coll η Fig. 4. SACUR and P coll as functions of η Impact of η. Before checking the effect of d 0 and d 2 on the secondary pair, we show the impact of different values of η for ξ 1 = 0.99, P F = 0.2 and P M = 0.1. Our goal is to show that the probability of correctly decoding PRx feedbacks plays a fundamental role in SUs performance. We expect that, as the value of η grows to one, the SUs take more advantage of the information on FCH activities, thereby improving their throughput while keeping the collision probability low. We also expect that, for high value of η, the SUs performance will be significantly higher than the case with η = 0. We kept the value of ξ 1 as a constant equal to 0.99 to favor a conservative behavior at the STx. The results are shown in Figure 4. Note that we adjusted the collision cost c T, to keep the collision probability at the primary receiver at a nearly-constant level. For constant P coll, the SACUR is a non-decreasing function of η, as expected. Note that our policy for η = 0 is equivalent to a LBT strategy. From the simulation results, we can see that, as long as the probability of correctly decoding a feedback from the primary receiver is reasonably high, sensing-and-confirmation (SAC) significantly outperforms the basic LBT access not taking into account the receiver feedback. These results validate our motivation that PRx feedbacks give confirmation information about the primary channel state and therefore helps improve opportunistic spectrum access.

18 18 The results are shown for both N = 100 and N = 500. From the simulation comparison, N = 100 is a sufficiently large Impact of d ξ 1 =0.6 ξ 1 =0.7 ξ 1 =0.8 ξ 1 = P coll SACUR d 0 [m] Fig. 5. SACUR and P coll as functions of d 0, where η = 0.2. To inspect the effect of primary transmitter s activity detection on the SACUR, we fixed the parameter η to 0.2 and compiled results in Figure 2 for different values of d 0. In this set of simulations, P M is kept at 0.1 while the false alarm rate P F varies as determined by a Neyman-Pearson energy based test as shown in Eqs. (1), (2). This scenario happens when the PU systems impose a constraint on the missed detection probability for protecting primary communications as the secondary energy detector experiences different P F due to different SNR conditions. Figure 5 shows that SU performance varies in terms of SACUR for different P F values. It can be seen that, for high values of ξ 1, the SACUR dramatically decreases as d 0 increases. This effect is due to the fact that, when the estimation of the collision probability is high while the channel conditions between the STx and the PTx do not guarantee a good P F, the STx policy tends to be more conservative.

19 SACUR P coll d 2 [m] Fig. 6. SACUR and P coll as functions of d 2, where d 0 = 875[m] Impact of d 2 To inspect the effect of the distance d 2 between the PRx and the STx, we allowed the feedback decoding probability η, and the outage probability ξ 1 to be determined by (6), and (4) respectively. We let the detection performance be determined by the distance between the PTx and STx: d 0. We expect that, as d 2 increases, the STx experience more spectrum opportunities increasing its throughput. Figure 6 shows the SACUR and collision rate as functions of the distance d 2. This result confirms that the performance of both PRx and STx depend on their mutual interferences. Smallerd 2 allows STx to more accurately estimate the FCH state but also leads to a stronger interference and consequently higher collision probability. As d 2 increases, the SU throughput increases because its effect on the PRx is less detrimental. This result confirms our hypothesis that secondary users opportunistic access is largely improved by our SAC strategy taking into account the primary receiver reception conditions Algorithm comparison Since our scheme collects past observations to employ a MAP estimator for primary transmitter s traffic transitions forecasting, we compared our channel access algorithm to a pure dual-sensing channel access strategy that can be viewed as a special Cooperative-Listen-Before-Talk. We provide dynamic programming results achieved under two different scenarios: the first assuming

20 MAP GENIE CLBT SACUR P coll η Fig. 7. SACUR and P coll comparison: P F = 0.4, P M = 0.4. perfectly known primary channel state transitions; the second when the dynamic programming is carried over through the help of the MAP estimator of Eq. (17). The purpose of this test is owing to the fact that, when the primary state transition epochs are estimated through the MAP estimator of Eq. (17), the value function resulting from the dynamic programming is not optimal. For the same value of the collision probability, we compared the STx throughput of the three schemes. We expect the MAP-based opportunistic channel access not to be worse than the pure dual-sensing algorithm, where the FCH is accessed only based on the current observations from both the primary receiver and transmitter and not on the observation history. This expectation is confirmed by the results of Figure 7, where CLBT stands for Cooperative-Listen-Before-Talk, Genie is the dynamic programming formulation with perfectly known channel transitions, and MAP is the dynamic programming carried over the help of the MAP estimator. It can be seen that the MAP scheme is always better than pure CLBT. For larger η, the MAP channel access outperforms CLBT by up to 50%, since the channel state transition estimations becomes more reliable as the decoding probability increases. 7. CONCLUSIONS In this paper, we introduced a MAP-based opportunistic spectrum access scheme that intelligently exploits the bi-directional nature of most wireless communication systems. We assumed that the primary system follows an ON/OFF traffic pattern and that the SU is able to sense the PU forward

21 21 channel and to detect PU receiver feedbacks. We demonstrated the advantage of listening to the primary receiver feedback to improve SUs performance in terms of opportunistic channel access rate. Moreover, we established a link between our algorithm and cooperative sensing, where we collect at the same node observations relative to the primary transmitter s activity and primary receiver s reception quality. We showed that, by exploiting historic observations, even sub-optimally through the use of a MAP estimator, our new strategy can outperform the traditional cooperative sensing schemes. 8. ACKNOWLEDGMENTS This material is based upon work supported by the National Science Foundation under Grant CNS REFERENCES [1] Federal communications commission: spectrum policy task force report, Federal Communications Commission ET Docket , Nov [2] Federal communications commission: office of engineering and technology releases TV white space phase II test report, Nov [3] Woyach K., Pyapali P., and Sahai A.: Can we incentivize sensing in a light-handed way?, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, Singapore, Apr pp [4] Digham F.F., Alouini M.S., and Simon M.K., On the energy detection of unknown signals over fading channels, IEEE ICC, May 2003 pp [5] Lunden J., Koivunen V., Huttunen A., and Poor H.V.: Spectrum sensing in cognitive radios based on multiple cyclic frequencies, IEEE CrownCom, USA, Orlando FL, Aug pp [6] Yücek T., and Arslan H.: A survey of spectrum sensing algorithms for cognitive radios, IEEE Comm. surv. and tut., 11, (1), 2009 pp [7] Tsitsiklis J.N.: Decentralized detection, Adv.in Statistical Signal Processing, 2, [8] da Silva C.R.C.M., Choi B., and K. Kim: Distributed spectrum sensing for cognitive radio systems, ITA Workshop, USA, San Diego CA, Feb pp [9] Tandra R., and Sahai A.: Fundamental limits on detection in low SNR under noise uncertainty, IEEE WirelessCom Symp. on Emerging Networks, Technologies and Standards, USA, Hawaii, June 2005, pp [10] Tandra R., Sahai A., SNR Walls for Signal Detection, IEEE Journal of Selected Topics in Signal Processing, 2, (1), 2008, pp [11] Mishra S.M., Sahai A., and Brodersen R.W., Cooperative sensing among cognitive radios, IEEE ICC, Turkey, Istanbul, June 2006 pp [12] Quan Z., Cui S., Sayed A.H., Poor H.V., Optimal multiband joint detection for spectrum sensing in cognitive radios, IEEE Transactions on Signal Processing, 57, (3), 2009 pp [13] Liang Y.C., Zeng Y., Peh E.C.Y., and Hoang A.T., Sensing-Throughput Tradeoff for Cognitive Radio Networks, IEEE Transactions on Wireless Communications, 7, (4), Apr. 2008

22 22 [14] Cabric D., Mishra S.M., and Brodersen R.W.: Implementation Issues in Spectrum Sensing for Cognitive Radios, Asylomar Conf. on Signals, Systems and Computers, USA, Monterey CA, Nov. 2004, pp [15] Devroye N., Mitran P., and Tarokh V.: Achievable rates in cognitive radio channels, IEEE Trans. on Information Theory, 52, (5), May 2006, pp [16] Simeone O., Bar-Ness Y., and Spagnolini U.: Stable throughput of cognitive radios with and without relaying capability, IEEE trans. on Communications, 55, (12), Dec. 2007, pp [17] Devroye N., Mitran P., and Tarokh V.: Cognitive multiple access networks, International Symposium on Information Theory, Australia, Adelaide, SA, Sep pp [18] Huang S., Liu X., and Ding Z.: Opportunistic spectrum access in cognitive radio networks, IEEE INFOCOM, USA, Phoenix AZ, April 2008 pp [19] Huang S., Liu X., and Ding Z.: Optimization of transmission strategies for opportunistic access in cognitive radio networks, UC Davis report, April 2008 [20] Zhao Q., Geirhofer S., Tong L., Sadler B.M.: Optimal Dynamic Spectrum Access via Periodic Channel Sensing, IEEE Conf. on Wir. Comm. and Networking, China, Kowloon, Mar pp [21] Zhao Q., Tong L., and Swami A.: Decentralized Cognitive MAC for Dynamic Spectrum Access, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Baltimore MD, Nov pp [22] Geirhofer S., Tong L., and Sadler B.M.: A measurement-based model for dynamic spectrum access, IEEE MILCOM, USA, Washington DC, Oct. 2006, pp. 1-7 [23] Jung E., and Liu X.: Opportunistic spectrum access in heterogeneous user environments, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Chicago IL, Oct. 2008, pp [24] Zhao Q., Tong L., Swami A., and Chen Y.: Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework, IEEE Journal Selected Areas in Communications, 2007, 25, (3), pp [25] Huang S., Liu X., and Ding Z.: Optimal Sensing-Transmission Structure for Dynamic Spectrum Access, IEEE INFOCOM, Brasil, Rio de Janeiro, Apr., 2009 pp [26] Zhang R., and Liang Y.C.: Exploiting hidden power feedbacks in cognitive radio networks, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Chicago IL, Oct. 2008, pp. 1-5 [27] Lapiccirella F.E., Huang S., Liu X., and Ding Z.: Feedback-based access and power control for distributed multiuser cognitive networks, Info. Theo. and Appl. Work., USA, San Diego CA, Feb. 2009, pp [28] Levorato M., Mitra U., and Zorzi M.: Cognitive Interference Management in Retransmission-Based Wireless Networks, Allerton conf. on Comm. Cont. and Comp., USA, Monticello IL, Sep. 2009, pp [29] Levorato M., Mitra U., and Zorzi M.: Cooperation and Coordination in Cognitive Networks with Packet Retransmission, Info. Theo. Work., Italy, Taormina, Oct. 2009, pp [30] Bellman R.: Dynamic programming, (Princeton University Press, 1957) [31] Bertsekas D.P.: Dynamic programming and optimal control, (Athena scientific, 1995) [32] Ross S.: Introduction to Stochastic Dynamic Programming, (Academic press, 1983)

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks A Quality of Service aware Spectrum Decision for Cognitive Radio Networks 1 Gagandeep Singh, 2 Kishore V. Krishnan Corresponding author* Kishore V. Krishnan, Assistant Professor (Senior) School of Electronics

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California Davis Davis, CA 95616, USA Email: senhua@ece.ucdavis.edu

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Ahmed El Shafie and Tamer Khattab Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt. Electrical

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN

More information

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio 5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy

More information

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0

More information

Cooperation and Coordination in Cognitive Networks with Packet Retransmission

Cooperation and Coordination in Cognitive Networks with Packet Retransmission Cooperation and Coordination in Cognitive Networks with Packet Retransmission Marco Levorato, Osvaldo Simeone, Urbashi Mitra, Michele Zorzi Dept. of Information Engineering, University of Padova, via Gradenigo

More information

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks APSIPA ASC Xi an Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks Zhiqiang Wang, Tao Jiang and Daiming Qu Huazhong University of Science and Technology, Wuhan E-mail: Tao.Jiang@ieee.org,

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Cognitive Radio: a (biased) overview

Cognitive Radio: a (biased) overview cmurthy@ece.iisc.ernet.in Dept. of ECE, IISc Apr. 10th, 2008 Outline Introduction Definition Features & Classification Some Fun 1 Introduction to Cognitive Radio What is CR? The Cognition Cycle On a Lighter

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Effect of Time Bandwidth Product on Cooperative Communication

Effect of Time Bandwidth Product on Cooperative Communication Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

Power Allocation with Random Removal Scheme in Cognitive Radio System

Power Allocation with Random Removal Scheme in Cognitive Radio System , July 6-8, 2011, London, U.K. Power Allocation with Random Removal Scheme in Cognitive Radio System Deepti Kakkar, Arun khosla and Moin Uddin Abstract--Wireless communication services have been increasing

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,

More information

Cooperative communication with regenerative relays for cognitive radio networks

Cooperative communication with regenerative relays for cognitive radio networks 1 Cooperative communication with regenerative relays for cognitive radio networks Tuan Do and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University

More information

Cognitive Ultra Wideband Radio

Cognitive Ultra Wideband Radio Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Internet of Things Cognitive Radio Technologies

Internet of Things Cognitive Radio Technologies Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Energy Detection Technique in Cognitive Radio System

Energy Detection Technique in Cognitive Radio System International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal

More information

Cognitive Radio: Smart Use of Radio Spectrum

Cognitive Radio: Smart Use of Radio Spectrum Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel

Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel Yamini Verma, Yashwant Dhiwar 2 and Sandeep Mishra 3 Assistant Professor, (ETC Department), PCEM, Bhilai-3,

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

More information

Performance Evaluation of Energy Detector for Cognitive Radio Network

Performance Evaluation of Energy Detector for Cognitive Radio Network IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Two-Phase Concurrent Sensing and Transmission Scheme for Full Duplex Cognitive Radio

Two-Phase Concurrent Sensing and Transmission Scheme for Full Duplex Cognitive Radio wo-phase Concurrent Sensing and ransmission Scheme for Full Duplex Cognitive Radio Shree Krishna Sharma, adilo Endeshaw Bogale, Long Bao Le, Symeon Chatzinotas, Xianbin Wang,Björn Ottersten Sn - securityandtrust.lu,

More information

Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding

Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding 1 Zaheer Khan, Janne Lehtomäki, Simon Scott, Zhu Han, Marwan Krunz, and Alan Marshall Abstract Channel bonding (CB)

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS NCC 2009, January 6-8, IIT Guwahati 204 Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of

More information

A Brief Review of Cognitive Radio and SEAMCAT Software Tool

A Brief Review of Cognitive Radio and SEAMCAT Software Tool 163 A Brief Review of Cognitive Radio and SEAMCAT Software Tool Amandeep Singh Bhandari 1, Mandeep Singh 2, Sandeep Kaur 3 1 Department of Electronics and Communication, Punjabi university Patiala, India

More information

Secondary Transmission Profile for a Single-band Cognitive Interference Channel

Secondary Transmission Profile for a Single-band Cognitive Interference Channel Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

arxiv: v1 [cs.it] 24 Aug 2010

arxiv: v1 [cs.it] 24 Aug 2010 Cognitive Radio Transmission Strategies for Primary Erasure Channels Ahmed El-Samadony, Mohammed Nafie and Ahmed Sultan Wireless Intelligent Networks Center (WINC) Nile University, Cairo, Egypt Email:

More information

Evaluation of spectrum opportunities in the GSM band

Evaluation of spectrum opportunities in the GSM band 21 European Wireless Conference Evaluation of spectrum opportunities in the GSM band Andrea Carniani #1, Lorenza Giupponi 2, Roberto Verdone #3 # DEIS - University of Bologna, viale Risorgimento, 2 4136,

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Resource Management in QoS-Aware Wireless Cellular Networks

Resource Management in QoS-Aware Wireless Cellular Networks Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless

More information

Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks

Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networs D.Teguig ((2, B.Scheers (, and V.Le Nir ( Royal Military Academy Department CISS ( Polytechnic Military School-Algiers-Algeria

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands

Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands Cognitive Medium Access: A Protocol for Enhancing Coexistence in Bands Stefan Geirhofer and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 4853 Email: {sg355, lt35}@cornell.edu

More information

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,

More information

OFDM Based Spectrum Sensing In Time Varying Channel

OFDM Based Spectrum Sensing In Time Varying Channel International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 3, Issue 4(April 2014), PP.50-55 OFDM Based Spectrum Sensing In Time Varying Channel

More information

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,

More information

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY 1 MOHAMMAD RIAZ AHMED, 1 MD.RUMEN AHMED, 1 MD.RUHUL AMIN ROBIN, 1 MD.ASADUZZAMAN, 2 MD.MAHBUB

More information

Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks

Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan, Halim Yanikomeroglu, and John S. Thompson Broadband

More information

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University of Rhode

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

Random access on graphs: Capture-or tree evaluation

Random access on graphs: Capture-or tree evaluation Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels

Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Marov Channels Xin Li, Qianchuan Zhao, Xiaohong Guan Center for Intelligent and Networed System Department of Automation and TNLIST

More information

Interference Model for Cognitive Coexistence in Cellular Systems

Interference Model for Cognitive Coexistence in Cellular Systems Interference Model for Cognitive Coexistence in Cellular Systems Theodoros Kamakaris, Didem Kivanc-Tureli and Uf Tureli Wireless Network Security Center Stevens Institute of Technology Hoboken, NJ, USA

More information

Cognitive Radio Techniques for GSM Band

Cognitive Radio Techniques for GSM Band Cognitive Radio Techniques for GSM Band Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of Technology Madras Email: {baiju,davidk}@iitm.ac.in Abstract Cognitive

More information

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of

More information

Transmitter Power Control For Fixed and Mobile Cognitive Radio Adhoc Networks

Transmitter Power Control For Fixed and Mobile Cognitive Radio Adhoc Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 4, Ver. I (Jul.-Aug. 2017), PP 14-20 www.iosrjournals.org Transmitter Power Control

More information

Bayesian Approach for Spectrum Sensing in Cognitive Radio

Bayesian Approach for Spectrum Sensing in Cognitive Radio 6th International Conference on Recent Trends in Engineering & Technology (ICRTET - 2018) Bayesian Approach for Spectrum Sensing in Cognitive Radio Mr. Anant R. More 1, Dr. Wankhede Vishal A. 2, Dr. M.S.G.

More information

Cognitive Radio network with Dirty Paper Coding for Concurrent access of spectrum by Primary and Secondary users

Cognitive Radio network with Dirty Paper Coding for Concurrent access of spectrum by Primary and Secondary users Research Journal of Engineering Sciences ISSN 2278 9472 Cognitive Radio network with Dirty Paper Coding for Concurrent access of spectrum by Primary and Secondary users Acharya Nashib 1, Adhikari Nanda

More information

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks Spectrum Sensing Data Transmission Tradeoff in Cognitive Radio Networks Yulong Zou Yu-Dong Yao Electrical Computer Engineering Department Stevens Institute of Technology, Hoboken 73, USA Email: Yulong.Zou,

More information

Cooperative Compressed Sensing for Decentralized Networks

Cooperative Compressed Sensing for Decentralized Networks Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is

More information

Performance of OFDM-Based Cognitive Radio

Performance of OFDM-Based Cognitive Radio International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 4 ǁ April. 2013 ǁ PP.51-57 Performance of OFDM-Based Cognitive Radio Geethu.T.George

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

SPECTRUM resources are scarce and fixed spectrum allocation

SPECTRUM resources are scarce and fixed spectrum allocation Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,

More information

OPPORTUNISTIC spectrum access (OSA), first envisioned

OPPORTUNISTIC spectrum access (OSA), first envisioned IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2053 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Student Member,

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information

Adaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks

Adaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks Adaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks Bechir Hamdaoui School of EECS, Oregon State University E-mail: hamdaoui@eecs.oregonstate.edu Abstract Studies showed that

More information

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing Open Access Journal Journal of Sustainable Research in Engineering Vol. 3 (2) 2016, 47-52 Journal homepage: http://sri.jkuat.ac.ke/ojs/index.php/sri Fuzzy Logic Based Smart User Selection for Spectrum

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks 1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO Ms.Sakthi Mahaalaxmi.M UG Scholar, Department of Information Technology, Ms.Sabitha Jenifer.A UG Scholar, Department of Information Technology,

More information

Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic

Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic MEE10:68 Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic Jhang Shih Yu This thesis is presented as part of Degree of Master of Science in Electrical Engineering September 2010 Main supervisor:

More information

arxiv: v2 [cs.it] 29 Mar 2014

arxiv: v2 [cs.it] 29 Mar 2014 1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink

More information

Low-Complexity Approaches to Spectrum Opportunity Tracking

Low-Complexity Approaches to Spectrum Opportunity Tracking Low-Complexity Approaches to Spectrum Opportunity Tracking (Invited Paper) Qing Zhao University of California Davis, CA 95616 Email: qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern

More information

Performance Comparison of the Standard Transmitter Energy Detector and an Enhanced Energy Detector Techniques

Performance Comparison of the Standard Transmitter Energy Detector and an Enhanced Energy Detector Techniques International Journal of Networks and Communications 2016, 6(3): 39-48 DOI: 10.5923/j.ijnc.20160603.01 Performance Comparison of the Standard Transmitter Energy Detector and an Enhanced Energy Detector

More information

Pareto Optimization for Uplink NOMA Power Control

Pareto Optimization for Uplink NOMA Power Control Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio ISSN: 2319-7463, Vol. 5 Issue 4, Aril-216 Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio Mudasir Ah Wani 1, Gagandeep Singh 2 1 M.Tech Student, Department

More information

Cooperative Diversity Routing in Wireless Networks

Cooperative Diversity Routing in Wireless Networks Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information