2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) 2014
DOI: 10.1109/sahcn.2014.6990355
|View full text |Cite
|
Sign up to set email alerts
|

A new communication framework for wide-band cognitive radio networks

Abstract: Cognitive radio is a promising technology to solve the spectrum scarcity problem. In a cognitive radio network, a secondary user (SU) first senses a specific range of the spectrum to get its available channels and two SUs need to rendezvous on a common available channel to establish a physical link for communications. The spectrum band allocated for existing wireless services is very wide. However, when a SU works in wideband spectrum, the increasing delay and energy consumption in spectrum sensing and the tim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…iii) Anonymous SUs' information. Onymous algorithms (e.g., Sym-ACH [7] and Framework in [8]) rely on distinct SUs' identifiers (IDs) to achieve rendezvous. However, SUs in distributed environments are anonymous in most cases, and they do not possess an explicit ID.…”
Section: Introductionmentioning
confidence: 99%
“…iii) Anonymous SUs' information. Onymous algorithms (e.g., Sym-ACH [7] and Framework in [8]) rely on distinct SUs' identifiers (IDs) to achieve rendezvous. However, SUs in distributed environments are anonymous in most cases, and they do not possess an explicit ID.…”
Section: Introductionmentioning
confidence: 99%
“…(iv) Onymous/anonymous information. Onymous algorithms (e.g., Sym-ACH [8] and Framework in [9]) rely on distinct SUs' IDs to distinguish their CH sequences and guarantee rendezvous. However, SUs are usually anonymous with no explicit IDs in distributed CRNs.…”
Section: Introductionmentioning
confidence: 99%
“…(ii) Symmetric/asymmetric role. Asymmetric-role algorithms (e.g., Asym-ACH [6], Framework in [7]) need to pre-assign the role (either a sender or a receiver) before hopping. Different roles generate CH sequences based on different rules.…”
Section: Introductionmentioning
confidence: 99%
“…(iii) Onymous/anonymous information. Onymous algorithms (e.g., Sym-ACH [6], Framework in [7]) rely on distinct SUs' IDs to generate CH sequences. However, SUs in the distributed CRN are anonymous in most cases and they do not possess a public ID.…”
Section: Introductionmentioning
confidence: 99%