2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6638681
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic channel-aware spectrum access for cognitive radio networks with periodic sensing

Abstract: Opportunistic spectrum access in a cognitive radio network has been a challenge due to the dynamic nature of spectrum availability and possible collisions between the primary user (PU) and the secondary user (SU). To maximize the spectrum utilization, we propose a spectrum access strategy where SU's packets are interleaved with periodic sensing to detect PU's return. We formulate the sensing/probing/access process as a maximum rate-of-return problem in the optimal stopping theory framework and show that the op… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…CR is one of the important technologies for wireless applications that has considered as a spectrum opportunistic technology. The main goal of CR is to exploit licensed bands without a license, where the unlicensed user (Secondary User) can use the spectrum band of the licensed user (Primary User) when the primary user is idle [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…CR is one of the important technologies for wireless applications that has considered as a spectrum opportunistic technology. The main goal of CR is to exploit licensed bands without a license, where the unlicensed user (Secondary User) can use the spectrum band of the licensed user (Primary User) when the primary user is idle [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…CR which was proposed in 1998 by Joseph Mitola is a promising technology to solve the spectrum shortage and to utilise the underutilised spectrum, where in CR we define two users, the first one is the primary user (PU) which have a licensed spectrum access and have the priority for transmission, and the second one is the secondary user (SU) which has unlicensed spectrum access. In the overlay strategy, the SU can acess the channel after checking that the PU does not use the channel, and if the PU suddenly has decided to transmit its own data, then the SU shall stop its transmission [2,3]. In the underlay strategy, the spectrum is accessible to the SU under an interference constraint at the PU receiver.…”
Section: Introductionmentioning
confidence: 99%