Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment

Similar documents
Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

A Two-Layer Coalitional Game among Rational Cognitive Radio Users

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

/13/$ IEEE

Energy-Efficient Random Access for Machine- to-machine (M2M) Communications

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks

Chapter 10. User Cooperative Communications

Cognitive Radio Network Setup without a Common Control Channel

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

Cognitive Radio Spectrum Access with Prioritized Secondary Users

SPECTRUM resources are scarce and fixed spectrum allocation

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems

Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels

Cognitive Radios Games: Overview and Perspectives

Analysis of cognitive radio networks with imperfect sensing

Internet of Things Cognitive Radio Technologies

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

Wireless Communication

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR

Two-Phase Concurrent Sensing and Transmission Scheme for Full Duplex Cognitive Radio

LTE in Unlicensed Spectrum

Cooperative Spectrum Sensing in Cognitive Radio

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Delay Based Scheduling For Cognitive Radio Networks

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

OFDM Based Spectrum Sensing In Time Varying Channel

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks

Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic

CogLEACH: A Spectrum Aware Clustering Protocol for Cognitive Radio Sensor Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Adaptive Quorum-based Channel-hopping Distributed Coordination Scheme for Cognitive Radio Networks

Spectrum Sensing for Wireless Communication Networks

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks

ILFCS: an intelligent learning fuzzy-based channel selection framework for cognitive radio networks

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks

Medium Access Control Protocol for WBANS

Nagina Zarin, Imran Khan and Sadaqat Jan

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Fig.1channel model of multiuser ss OSTBC system

Opportunistic Spectrum Scheduling for Mobile Cognitive Radio Networks in White Space

Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel

Cognitive Cellular Systems in China Challenges, Solutions and Testbed

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

Partial overlapping channels are not damaging

Spectrum Sensing Brief Overview of the Research at WINLAB

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

Analysis of Distributed Dynamic Spectrum Access Scheme in Cognitive Radios

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels

Some Cross-Layer Design and Performance Issues in Cognitive Radio Networks

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications

Channel selection for IEEE based wireless LANs using 2.4 GHz band

On the Coexistence of Overlapping BSSs in WLANs

Forced Spectrum Access Termination Probability Analysis Under Restricted Channel Handoff

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Analysis and optimization of Centralized Sequential Channel Sensing in Cognitive Radio Networks

OPPORTUNISTIC spectrum access (OSA), first envisioned

PRIMARY USER BEHAVIOR ESTIMATION AND CHANNEL ASSIGNMENT FOR DYNAMIC SPECTRUM ACCESS IN ENERGY-CONSTRAINED COGNITIVE RADIO SENSOR NETWORKS

arxiv: v1 [cs.it] 21 Feb 2015

PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

Competitive Distributed Spectrum Access in QoS-Constrained Cognitive Radio Networks

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization

Cognitive Radio Enabling Opportunistic Spectrum Access (OSA): Challenges and Modelling Approaches

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Full-Duplex Cognitive Radio: A New Design Paradigm for Enhancing Spectrum Usage

Channel Sensing Order in Multi-user Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY

Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel Cognitive Radio Networks

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 5, MAY

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

ENERGY EFFICIENT CHANNEL SELECTION FRAMEWORK FOR COGNITIVE RADIO WIRELESS SENSOR NETWORKS

Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 (WowKiVS 2009)

Random Access Protocols for Collaborative Spectrum Sensing in Multi-Band Cognitive Radio Networks

Transcription:

Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon, Korea. 2 DMC R&D Center, Samsung Electronics, Suwon, Korea. * Corresponding author. Tel.: +82-31-290-7149; email: tjlee@skku.edu Manuscript submitted October 10, 2014; accepted April 25, 2015. doi: 10.17706/ijcce.2015.4.5.327-335 Abstract: Cognitive radio MAC protocols have been proposed to efficiently utilize radio resources under the assumption that radio spectrum can be perfectly sensed. However, due to dynamic and agile radio aracteristics, secondary users may imperfectly detect whether the radio resources are occupied or not. In this paper, we study how the imperfect sensing environment affects cognitive radio systems. The sensing errors, i.e., misdetection and false alarm, result in interference to the primary users and decrease the transmission opportunities of secondary users. We formulate the number of sensed idle annels for different sensing meanisms and the throughput of the multi-annel cognitive MAC protocol with the misdetection and the false alarm probabilities. Simulations are also conducted to verify the analysis. According to the results, the imperfect sensing should be considered as a critical factor when the cognitive MAC protocols are designed due to the influence on primary users and secondary users transmissions. Key words: Cognitive radio, MAC protocols, ad-hoc networks, multi-annel, imperfect sensing. 1. Introduction There are some CR MAC protocols in [1] [6], whose sensing methods are implicitly based on energy detection. Those protocols have been proposed emphasizing how SUs can efficiently utilize the licensed spectrum without inference to PUs. Lim et al. in [1] propose a self-seduling multi-annel cognitive radio MAC (SMC-MAC) protocol, whi allows multiple SUs to transmit data simultaneously through the sensed idle annels by two cooperative annel sensing algorithms, i.e., fixed annel sensing (FCS) and adaptive annel sensing (), and by slotted contention meanism to exange annel request information among SUs. Zhao et al. in [2] propose a decentralized cognitive radio MAC protocol based on the framework of partially observable Markov decision processes (POMDPs) to reduce the complexity of the optimal annel sensing and access. They assume multiple antennas to detect the status of licensed annels targeting the favorable sensing ability for the opportunistic frequency spectrum use. Su et al. in [3] and [4] propose the opportunistic multi-annel MAC protocols based on cross layer cooperation whi integrates the spectrum sensing tenique at the physical layer with the packet seduling meanism at the MAC layer for wireless ad-hoc networks. It requires two transceivers for control annel and data annels. A hardware-constrained cognitive MAC (HC-MAC) protocol [5] is proposed to reduce the computational complexity by approximating the optimal stopping rule for efficient spectrum sensing and access decision. 327 Volume 4, umber 5, September 2015

The authors in [6] propose a MAC protocol based on a game-theoretic approa. It considers selfish cognitive radio devices with multiple radios and the simultaneous transmissions at different frequencies (annels) to efficiently coordinate and use the available annels. Aforementioned MAC protocols assume that SUs can perfectly sense the radio spectrum. There, however, may be misdetection and the false alarm in sensing due to wireless radio aracteristics. Wang et al. in [7] propose annel assignment algorithms: a heuristic and a greedy centralized seme, using the information that SUs report to the secondary base station, to increase the number of available annels for multi-annel cognitive radio networks since the sensing performance in terms of misdetection and false alarm probabilities affects the overall system performance. Wong et al. in [8] design cognitive multi-annel MAC protocols with perfect and imperfect sensing, whi enable SUs to opportunistically access available idle annels that a dedicated device reports to them. In this paper, we consider the impact of imperfect sensing in a multi-annel cognitive radio ad-hoc network. We study the cognitive radio multi-annel MAC protocol in ad-hoc networks when sensing errors, i.e., the misdetection and false alarm, happen. The MAC protocol in [1] is considered as the multi-annel cognitive radio MAC and we study how annel sensing results by two sensing algorithms, i.e., FCS and, are affected by misdetection and false alarm. Then we formulate the analytical model for the throughput of the multi-annel cognitive radio MAC protocol under imperfect sensing. 2. System Model and MAC Protocol Description In this section, we describe the system model, imperfect sensing including both misdetection and false alarm and the CR multi-annel MAC protocol. 2.1. System Model We consider a multi-annel system where primary users and secondary users share radio resources under the imperfect sensing environment with two probabilities: misdetection and false alarm. For a primary user traffic model [1], all licensed annels have the same utilization according to the PUs traffic load, and there are orthogonal annels. An SU network is a single hop cognitive radio network with SUs under a primary user network. The SU network is an Ad-Hoc network whi allows a node to communicate directly with another node within the transmission coverage. 2.2. Imperfect Sensing We consider the imperfect sensing environment with the misdetection probability and the false alarm probability. According to [8], the detection probability and the false alarm probability are considered under the energy detection meanism. is the probability that an occupied primary annel is declared to be correctly occupied and is the probability that a vacant primary annel is declared to be occupied. So the misdetection probability = 1, the probability that an occupied primary annel is declared to be vacant. The misdetection and false alarm cause the interference to PUs and the lost transmission opportunity of SUs, respectively. In [8], the relationship between the sensing period of a annel,, with the probability of false alarm,, for a given detection probability, 1, in the energy detector is given as follows. p = Q + Q p + T, (1) 1 ( 2γ 1 (1 ) γ ) fa cycle where ( ) is the complementary distribution function of the standard Gaussian distribution, is the received signal-to-noise ratio of the primary user measured at the secondary users s receiver of interest, 328 Volume 4, umber 5, September 2015

under the hypothesis that the primary user is active, and is a cycle time. Fig. 1. A cycle structure of CR multi-annel MAC protocol. 2.3. MAC Protocol Description In the SMC-MAC protocol [1], SUs can use one common control annel and up to primary annels for data transmission. A cycle time ( ) consists of four intervals: CR-Idle ( ), Sensing-Sharing (SS) ( ), Contention ( ) and Transmission ( ) as shown in Fig. 1. The CR-Idle interval is a constant time to indicate the beginning of a new cycle. The Sensing-Sharing interval, during whi SUs sense the primary annels and exange the sensing results on whether primary annels are idle or busy, is composed of SS-slots ea with three subslots. The first subslot is designed for sensing and the other two subslots are for sharing of the sensing result by tone signals. The contention interval consists of contention-slots, whi enables SUs to compete with one another to reserve the sensed idle annels to be used to transmit their data frames during the transmission period. After contention, successful SUs can transmit data frames in parallel on self-seduled idle annels during the transmission period. All SUs are assumed to be synronized to cycle times, whi is similar as in [5]. A new SU entering a secondary network listens to a control annel for the (= contention slots) contention interval to overhear CR-RTS and CR-CTS messages among other SUs in the network. The duration field in the messages indicates the data transmission time ( ). This allows a new SU to know the end of data transmission in the current cycle. After the transmission time in the current cycle, the SU can synronize to the next cycle. 3. Analysis In this section, we analyze the performance of the multi-annel cognitive MAC protocol [1] under the imperfect sensing condition. The throughput of the MAC protocol under the imperfect sensing environment is formulated from the statistics of primary user annels [9], the number of sensed idle annels and the number of successful SUs. We define the aracteristics of the licensed annels as follows. The probability ( ) that the number of idle annels is among licensed annels is yi yi p ( y ) = (1 α) α, 0 y, Yi i i (2) y i where is the primary users traffic load. The probability ( ) that the number of busy annels is among licensed annels. yb yb p ( y ) = α (1 α), 0 y. Yb b b (3) y b We need to aracterize the licensed annels that imperfect sensing affects. First of all, we define the probability that a annel state anges from idle (I) / busy (B) state to busy (B) /Idle (I) state by imperfect 329 Volume 4, umber 5, September 2015

sensing. There are four types of the probabilities,!,! #$ %& ', (,! ($ ),!,( #) ', (,( () %& ) whi are the probabilities with $ %& idle annels without false alarm, $ idle annels with miss detection, ) busy annels with false alarm and ) %& busy annels without miss detection, respectively. Let and be the probability of false alarm and that of miss detection, respectively. The probability that there are $ %& idle annels without false alarm among idle annels annels is yi inofa yi inofa pi I ( inofa yi ), = (1 pfa) pfa, 0 inofa y i. (4) i nofa Then, the probability!,! ($ %& ) is given as follows, p ( i ) = p ( i y ) p ( y ), 0 i y. (5) I, I nofa I, I nofa i Yi i nofa i yi Let * %& be the number of idle annels without false alarm. Then the average number of idle annels without false alarm is y i E[ I ] = i p ( i y ) p ( y ). (6) nofa nofa I, I nofa i Yi i yi inofa Let * be the number of idle annels with misdetection. Then the probability that there are $ busy annels but sensed as idle annels among busy annels by miss detection is y ( ) i (1 ) p i y = p p i, 0 i y. b B, I b b i (7) From (7), (,! ($ ) is given as p ( i ) = p ( i y ) p ( y ) B, I. B, I b Y b (8) b y b Then the average number of idle annels with misdetection is y b E[ I ] = i p ( i y ) p ( y ). (9) B, I b Yb b yb i Under the imperfect sensing condition, we denote the annels that can be sensed as idle by * +. They include * %&, idle annels without false alarm, and *, idle annels with misdetection. Then the probability!,($ + ) that $ + annels sensed as idle is i p ( i ) = p ( i ) p ( i i ), 0 i. (10) I I, I nofa B, I nofa i nofa 330 Volume 4, umber 5, September 2015

From (5) and (7), the average number of sensed idle annels is i I I, I nofa B, I nofa (11) i i inofa E[ I ] = i p ( i ) = i p ( i ) p ( i i ). 3.1. Channel Sensing We analyze the annel sensing meanism in this section to formulate the average number of sensed idle annels under the imperfect sensing environment according to [1]. According to the algorithm [1], ea SU senses - annels (.h -.h 1 ) randomly until it finds 2 + idle annels (0 2 +.h ). Let 4 + be the number of sensed idle annels by an SU. Then the conditional probability 5,(2 + $ + ) that the number of sensed idle annels 4 + = 2 + given $ + idle annels is as follows. p ( x i ) = X Ch x max x 1 Chmax r 1 r = x x 1 Ch max ( i i) ( i j) i j= 0 Ch k 1 max ( k) x 1 r x 1 ( i i) ( i j) i j r 1 k x 1 ( k),0 x < Ch, x = Ch idle idle (12) From (10) and (12), the average of 4 + sensed idle annels by an SU is i E[ X ] = x p ( x i ) p ( i ) I. (13) i x X The probability that an idle annel is sensed by an SU among the total idle annels is found as Average umber of Sensed Idle Channels by an SU E[ X ] γ = =. Average umber of Idle Channels E[ I ] (14) Since SUs independently select and sense the licensed annels, the probability 7,(8 + ) that an idle annel is sensed by 8 + SUs among SUs is derived as su u su u p ( u ) γ (1 γ ) 0 u U =,. su u (15) χ Then, the probability 9 :;< that an idle annel is sensed by at least one SU is derived as = 1 (1 γ ).Let = + be the number of sensed idle annels by su SUs given total * + idle annels. Then the conditional probability >,(? + $ + ) that? + idle annels are sensed by SUs given $ + idle annels following in (10) is derived as: i w i w p ( w i ) χ (1 χ ) 0 w i W =,. w (16) 331 Volume 4, umber 5, September 2015

So, the average number of sensed idle annels by SUs is derived from (10) and (16). i E[ W ] = w p ( w i ) p ( i ) W I. (17) i w 3.2. Contention Suppose that ea SU randomly ooses a contention slot among slots in the contention interval. If a slot is selected by a single SU among SUs, the slot is successful. Let @ be the number of successful slots and < (A) be the probability that A slots are successful, then M s M s p ( s) = ( p ) (1 p ) 0 s M S,, succ succ s (18) where p CDEE is the probability that a contention slot is selected by an SU and = F (1 F) H IJKL, F = L M [1]. From (18), the average number of successful contention slots is 3.3. Throughput M E[ S] = s p ( s). (19) S s= 0 We, first, derive the transmission time per data annel denoted by (see Fig. 1) [1], T = T ( T + T + T ),where is the cycle time, is the idle time, is the sensing-sharing tr cycle idle ss ct time, and is the contention time. The throughput of total sensed idle annels with the meanism :;< is denoted by h & as follows. ( ) Th = E[min( S Ch, W )] T R / T. (20) total idle tr cycle + Let :;< be Z min( S Ch W + =, ),and the pmf of :;< is idle p ( z ) = F ( z ) F ( z 1), 0 < z (21) Z Z Z + where, OPQR (0) = S, OPQR (0). The mean of T :;< is E[ Z ] = z p ( z ). (22) Z z We also need to find the throughput of sensed idle annels affected by misdetection. The probability that :;< + the number of idle annels affected by misdetection is among :;< is z z z z p ( z z ) = ν (1 ν ), 0 z Z z, (23) z 332 Volume 4, umber 5, September 2015

where F = U[! WX] U[! Z,] :;< from (9) and (11). The mean of is as follows, Then, the throughput by misdetection is z = Z Z z z (24) E[ Z ] z p ( z z ) p ( z ). Th = ( E[ Z ] T R) / T. (25) tr cycle Using (20) and (25), we can obtain the actual throughput of without misdetection Th = Th Th. (26) real total 4. Simulation In this section, we present simulation results and the performance of the cognitive MAC protocol under the imperfect sensing environment. We also verify the analysis with the simulation. Table 1 summarizes the parameters for an SU network under the imperfect sensing environment to evaluate the performance of the cognitive multiannel MAC protocol. The basic parameters for an SU network are employed from IEEE 802.11a [10]. is given as asifstime + 2 aslottime and is aslottime (= 3 aslottime). is aslottime. A contention slot time consists of CR-RTS transmission time, CR-SIFS and CR-CTS transmission time. When the CR-RTS and CR-CTS are transmitted, they are converted to the physical layer convergence procedure (PLCP) protocol data units (PPDUs) including a PLCP preamble and a PLCP header. So, the transmission time of CR-RTS/CR-CTS is 24A, and CR-SIFS is 16 \A (= asifstime). Table 1. Simulation Parameters Parameter Value Parameter Value Main annel Simulation Time 1,000,000 cycles umber of Contention Slots () 10 slots Assistant annel Data Rate (R) 54 Mbps umber of SUs ( ) 2 20 SUs 20 annels CR-SIFS Time (asifstime) 16 \A Traffic load of PUs () 0.0 1.0 Slot Time (aslottime) 9 \A.h 1 2 5 annels PLCP Preamble 16 \A.h 2 annels PLCP Header 4 \A Misdetection Probability ( ) 0.1 0.3 CR-RTS 24 \A False Alarm Probability ( ) 0.1 CR-CTS 24 \A Fig. 2(a) shows the analysis and simulation results of the multi-annel cognitive MAC protocol under the imperfect sensing environment when.1,.1, = 10, = 1A,.h = 2 and.h 1 = 5, and they are compared with those under the perfect sensing environment. The throughputs of FCS are greater than those of because an SU in FCS senses more annels. The throughputs under the imperfect sensing condition is lower than those under the perfect sensing condition since SUs lose the transmission opportunities due to the affected idle annels by misdetection. For example, when.4, the real throughputs of FCS and under the imperfect sensing condition are 365.39 Mbps and352.01 Mbps, respectively, and those of FCS and under the perfect sensing condition are 394.83 Mbps and 380.20 Mbps, respectively. The throughputs of for analysis and simulation are closely mated with ea other as indicated in Fig. 2(a), whi verifies our analysis. 333 Volume 4, umber 5, September 2015

(a) (b) Fig. 2. Comparison of the average throughputs in the perfect sensing and the imperfect sensing environment. The impact of the size of the contention slots on the throughputs is shown in Fig. 2(b) As the number of SUs varies from 6 to 20, the average throughputs are presented with parameters:.5, = 10, = 1s,.h = 2,.h 1 = 5,.1 and.1. The throughputs are shown to be maximized when fg =M and then to start to decrease around <7 = since the limited number of contention slots causes more collisions. For instance, the maximum throughputs of FCS and with imperfect sensing are 350.5 Mbps and 339.52 Mbps at <7 = 10, and then decrease to 291.29 Mbps and 290.38 Mbps, at <7 = 18, respectively. Besides, the throughputs with the imperfect sensing condition are compared with those with the perfect sensing case. The former is lower than the latter since imperfect sensing causes the interference to PUs and the loss of the SUs access opportunities to the available licensed annels. 5. Conclusion In this paper, we have considered the multi-annel cognitive MAC protocols under the imperfect sensing environment with misdetection and false alarm relaxing the tight assumption that annels are sensed perfectly without errors. The throughput of the MAC protocol with imperfect sensing is formulated in terms of the number of sensed idle annels considering the false alarm probability and the misdetection probability whi may cause the interference to the PUs and decrease the transmission opportunities of SUs. We then have evaluated the performance of the protocol by extensive simulations. From the evaluation, the imperfect sensing conditions su as misdetection and false alarm need to be considered as a critical factor when CR MAC protocols are designed to reduce interference to PUs and to improve the performance of SUs. Acknowledgment This work was supported by the ational Resear Foundation of Korea (RF) grant funded by the Korean government (MSIP) (2014R1A5A1011478). References [1] Lim, S., & Lee, T.-J. (2011). A self-seduling multi-annel cognitive radio MAC protocol based on cooperative communications. IEICE Trans. on Commun., E94-B(6), 1657 1668. [2] Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad-Hoc networks: A POMDP framework. IEEE J. Select. Areas Commun., 25(3), 589 600. [3] Su, H., & Zhang, X. (2007). Opportunistic MAC protocols for cognitive radio based wireless networks. 334 Volume 4, umber 5, September 2015

Proceedings of CISS (pp. 363 368). Baltimore, Maryland, USA. [4] Su, H., & Zhang, X. (2008). Cross-layer based opportunistic MAC protocols for QoS provisioning over cognitive radio wireless networks. IEEE J. Select. Areas Commun., 26(1), 118 129. [5] Jia, J., Zhang, Q., & Shen, X. (2008). HC-MAC: A hardware-constrained cognitive MAC for efficient spectrum management. IEEE J. Select. Areas Commun., 26(1), 106 117. [6] Felegyhazi, M., Cagalj, M., & Hubaux, J. (2009). Efficient MAC in cognitive radio systems: A game-theoretic approa. IEEE Trans. Wireless Commun., 8(4), 1984 1995. [7] Wang, W., Kasiri, B., Choi, J., & Alfa, A. S. (2011). Channel assignment of cooperative spectrum sensing in multi-annel cognitive radio networks. Proceedings of IEEE ICC (pp. 1 5). Kyoto, Japan. [8] Wong, D. T. C., Zheng, S., & Liang, Y. (2011). Cognitive multi-annel MAC protocols with perfect and imperfect sensing. Proceedings of IEEE ICC (pp. 1 5). Kyoto, Japan. [9] Willkomm, D., Mairaju, S., Bolot, J., & Wolisz, A. (2009). Primary user behavior in cellular networks and implications for dynamic spectrum access. IEEE Commun. Mag., 47(3), 88 95. [10] IEEE 802.11. (2007). Wireless LA Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Mingyu Lee received the B.S. degree in electronics engineering from Kwangwoon University, Seoul, Korea in 2009 and the M.S. degree in mobile systems engineering from Sungkyunkwan University, Suwon, Korea in 2012. He is currently pursuing his Ph.D. degree in the Department of IT convergence at Sungkyunkwan University since Mar 2012. His resear interests include cognitive networks, wireless LA, and Ad-Hoc networks. Seyoun Lim received the B.S and M.S. degrees in telecommunication & information engineering from Korea Aerospace University, Goyang, Korea in 2000 and 2002, respectively and his Ph.D. degree in mobile systems engineering from Sungkyunkwan University, Suwon, Korea, in 2013. In 2002, he joined the Telecommunication R&D Center in Samsung Electronics. He is working as a senior engineer at DMC R&D Center in Samsung Electronics. His resear interests include medium access control, resource allocation for cognitive radio networks. Tae-Jin Lee received his B.S. and M.S. degrees in electronics engineering from Yonsei University, Korea in 1989 and 1991, respectively, and the M.S.E. degree in electrical engineering and computer science from University of Miigan, Ann Arbor, in 1995. He received the Ph.D. degree in electrical and computer engineering from the University of Texas, Austin, in May 1999. In 1999, he joined the Corporate R & D Center, Samsung Electronics where he was a senior engineer. Since 2001, he has been a professor in the College of Information and Communication Engineering at Sungkyunkwan University, Korea. He was a visiting professor in Pennsylvania State University from 2007 to 2008. His resear interests include performance evaluation, resource allocation, medium access control (MAC), and design of communication networks and systems, wireless LA/PA/MA, Ad-Hoc/sensor/RFID networks, next generation wireless communication systems. He has been a voting member of IEEE 802.11 WLA Working Group, and is a member of IEEE and IEICE. 335 Volume 4, umber 5, September 2015