Improved spectrum access control of cognitive radios based on primary ARQ signals

被引:8
|
作者
Lapiccirella, F. E. [1 ]
Ding, Z. [1 ]
Liu, X. [1 ]
机构
[1] Univ Calif Davis, Davis, CA 95616 USA
基金
美国国家科学基金会;
关键词
THROUGHPUT;
D O I
10.1049/iet-com.2010.0542
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilisation. In this work, the authors present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme constitutes a non-trivial generalisation of the more traditional 'Listen-Before-Talk' (LBT) strategy that merely listens to and yields to primary transmissions regardless of primary receiver (PRx) responses. Our new method exploits the bi-directional and interactive nature of most wireless communication links to facilitate better opportunistic secondary access while achieving PRx protection. By allowing the secondary users to learn from both primary transmissions and the corresponding receiver confirmations, our approach allows secondary cognitive users to exploit critical information that PRxs regularly send to their transmitters. The authors show that, by monitoring both primary transmissions and receiver feedback signals, secondary radio access can improve throughput over the traditional LBT while limiting the probability of collision with primary user signals.
引用
下载
收藏
页码:900 / 908
页数:9
相关论文
共 50 条
  • [31] Learning-Based Spectrum Sensing and Access in Cognitive Radios via Approximate POMDPs
    Keshavamurthy, Bharath
    Michelusi, Nicolo
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) : 514 - 528
  • [32] Performance Analysis of Control Signal Transmission Technique for Cognitive Radios in Dynamic Spectrum Access Networks
    Sakata, Ren
    Tomioka, Tazuko
    Kobayashi, Takahiro
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (12) : 3597 - 3605
  • [33] Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios
    Ling, Xiang
    Wu, Bin
    Wen, Hong
    Ho, Pin-Han
    Bao, Zhiqiang
    Pan, Lili
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (05) : 448 - 451
  • [34] Performance of secondary radios in spectrum sharing with prioritized primary access
    Tang, Pak Kay
    Chew, Yong Huat
    Ong, Ling Chuen
    Haldar, M. K.
    MILCOM 2006, VOLS 1-7, 2006, : 1273 - +
  • [35] Robust Adaptive Beamforming for Cyclostationary Signals in Spectrum Detection of Cognitive Radios
    Ma, Xiaolong
    Chen, Guican
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 387 - 390
  • [36] Hierarchical sequential detection in the context of dynamic spectrum access for cognitive radios
    Kundargi, Nikhil
    Tewfik, Ahmed
    2007 14TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-4, 2007, : 514 - 517
  • [37] A game theoretic approach for medium access of open spectrum in cognitive radios
    Musku, Madhusudhan R.
    Chronopoulos, Anthony T.
    Penmatsa, Satish
    Popescu, Dimitrie C.
    2007 2ND INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2007, : 336 - +
  • [38] Dynamic spectrum access with cognitive radios: Future architectures and research challenges
    Nekovee, Maziar
    2006 1ST INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2006, : 94 - 98
  • [39] Improving the Interference Temperature Estimation for Dynamic Spectrum Access in Cognitive Radios
    Benedetto, F.
    Giunta, G.
    Guzzon, E.
    Renfors, M.
    Arcangeli, M.
    2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 1154 - 1157
  • [40] Secure transmission power of cognitive radios for dynamic spectrum access applications
    Li, Xiaohua
    Chen, Jinying
    Ng, Fan
    2008 42ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-3, 2008, : 213 - 218