Dynamic multichannel access with imperfect channel state detection
IEEE Transactions on Signal Processing
On the feasibility of effective opportunistic spectrum access
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Model based bandwidth scavenging for device coexistence in wireless LANs
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
IEEE/ACM Transactions on Networking (TON)
Mobile Networks and Applications
The effectiveness of opportunistic spectrum access: a measurement study
IEEE/ACM Transactions on Networking (TON)
Fast track article: Bandwidth scavenging for device coexistence in pervasive computing systems
Pervasive and Mobile Computing
Pricing-based decentralized spectrum access control in cognitive radio networks
IEEE/ACM Transactions on Networking (TON)
Practical unicast and convergecast scheduling schemes for cognitive radio networks
Journal of Combinatorial Optimization
On the cascading spectrum contention problem in self-coexistence of cognitive radio networks
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband
Hi-index | 0.00 |
Cognitive radio offers a promising technology to mitigate spectrum shortage in wireless communications. It enables secondary users (SUs) to opportunistically access low-occupancy primary spectral bands as long as their negative effect on the primary user (PU) access is constrained. This PU protection requirement is particularly challenging for multiple SUs over a wide geographical area. In this paper, we study the fundamental performance limit on the throughput of cognitive radio networks under the PU packet collision constraint. With perfect sensing, we develop an optimum spectrum access strategy under generic PU traffic patterns. Without perfect sensing, we quantify the impact of missed detection and false alarm, and propose a modified threshold-based spectrum access strategy that achieves close-to-optimal performance. Moreover, we develop and evaluate a distributed access scheme that enables multiple SUs to collectively protect the PU while adapting to behavioral changes in PU usage patterns. Our results provide useful insight on the trade-off between the protection of the primary user and the throughput performance of cognitive radios.