The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2013 IEEE Wireless Communications and Networking Conference (WCNC) took place April 7-10, 2013 in Shanghai, China. Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy...
IEEE 802.15.4 is a communication standard specifically designed targeting low power personal area networks. It provides MAC and Physical layer specifications for resource constrained networks like Wireless Sensor Networks(WSN). IEEE 802.15.4 MAC specification targets fairness as one of the design considerations. That creates a problem when IEEE 802.15.4 MAC is used for event driven WSN applications...
With the continuous growth of the wireless communication business, energy issues and environmental problems are becoming increasingly grim. Therefore, this paper investigates the energy efficient transmission scheme with cooperative sensing in cognitive radio networks, in which AND fusion rule is introduced to determine the presence of the primary user. It is proved that the energy efficiency is a...
This paper considers the problem of adjacent channel interference between two different operators using different duplexing methods. Focusing on the interference between two co-located base stations, which existing guard-band based methods still cannot solve efficiently, we propose a scheme that adjusts the downlink power of the aggressor system to maximize the downlink transmission capacity while...
Cooperative spectrum sensing generally consists of two consecutive stages: sensing and reporting, where sensors measure channels at the sensing stage and then use a multiple access protocol to report their local measurement results which we call the reporting MAC protocol. In this paper, we examine the impact of reporting MAC protocols on centralized cooperative sensing in multiband cognitive networks...
The cooperative spectrum sensing techniques in cognitive radio networks increase the energy consumption while improving the throughput of the system. The energy efficient techniques with sensing time optimization are considered in this paper. The optimization model is established, in which the sensing time is to be optimized to maximize the energy efficiency. Then, the golden section search algorithm...
In this paper, distributed iterative time slot allocation algorithms for spectrum sensing information (SSI) sharing in cognitive radio ad hoc networks are proposed. The proposed algorithms are based on a collision detection and acknowledgment scheme, which allows nodes to receive knowledge about collisions with their two-hop neighbors. The nodes use this information to update their operating time...
Cognitive Radio Networks enable a higher number of users to access the spectrum of frequency simultaneously. This access is possible due to the implementation of dynamic spectrum allocation algorithms. In this context, one of the main algorithms found in the literature is the reinforcement learning based approach called Q-Learning. Although been widely applied, this algorithm does not take into account...
This paper analyzes the performance of a realistic multi-PHY layer IEEE 802.15.4g Smart Utility Networks (SUN) design and proposes a coexistence approach for multi-PHY interference management. Technical details of the design such as network architecture, mechanism protocols, signal formats, device interfaces, regulatory requirements and channel characterization are implemented following the IEEE 802...
Various emerging applications enabled by wireless sensor networks demand new and versatile MAC algorithms. These MAC protocols should be able to adapt to varying application requirements and deployment conditions. In this paper, we present a component based scheme for enabling fast prototyping of MAC protocols using a lightweight toolchain. Our toolchain allows run-time MAC protocol reconfiguration...
IEEE 802.15.4 networks operating in the 2.4 GHz ISM band are seriously affected by co-channel interference from coexisting radio systems such as IEEE 802.11x wireless local area networks. In this paper, we consider the beacon transmission in the presence of co-channel interference in the IEEE 802.15.4 beacon-enabled mode. For reliable transmission of the beacon frame, we propose repeated transmission...
Wireless sensor networks (WSNs) operating in 2.4 GHz unlicensed bands must explore favorable channels in order to mitigate the effects of induced interference by co-existing wireless systems and frequency selective fading. In this context, we develop a packet delivery ratio (PDR) estimation method for channel ranking in WSNs. The PDR, in general, is defined as a function of signal-to-noise ratio (SNR)...
IEEE 802.15.4 networks employ a medium access control scheme based on carrier sense multiple access with collision avoidance (CSMA/CA). However, CSMA/CA may seriously experience contention collision, suffering from resource wastage in time-varying operation environments. In this paper, we consider the alleviation of contention collision in IEEE 802.15.4 networks by partitioning the transmission period...
Wireless personal area network (WPAN) technology will be used for cable replacement in connecting various devices and sensors carried by a person for health monitoring. With the increasing need, every person will eventually have a WPAN and each WPAN is an autonomous entity. When two WPANs come into the radio range of each other, a collision occurs and network performance is affected. To manage the...
Efficient data transmission in cognitive radio networks (CRNs) is critical for cognitive radio (CR) users to communicate with each other in an opportunistic manner. Even with successful access to required channels, the transmission could still suffer from failures due to channel fading. In this paper, we propose a random linear coded scheme for efficient data transmission in multi-channel CRNs under...
We consider a non-cooperative Opportunistic Spectrum Access (OSA) where Secondary Users (SUs) access opportunistically the spectrum licensed for Primary Users (PUs) in TV white spaces (TVWS). As sensing licensed channels is time and energy consuming, we consider a hierarchical Cognitive Radio (CR) architecture, where CR base stations sense a subset of the spectrum in order to locate some free frequencies...
This paper considers designing efficient medium access strategies for secondary users (SUs) to select frequency channels to sense and access in cognitive radio networks. The interaction among the SUs is considered as a learning problem, in which every SU behaves as an intelligent agent. Each SU believes that its competitors alter their future medium access strategies in proportion to its own current...
In cognitive radio networks (CRNs), a rendezvous between two nodes exists when they tune to the same channel simultaneously. Rendezvous guarantee between any pair of nodes is essential because a rendezvous is a necessary condition for a communication. Several existing works claim that such a guarantee can be provided by using a dedicated common control channel for channel negotiation. A serious problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.