Skip to main content
Log in

An urn occupancy approach for cognitive radio networks in DTVB white spaces

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The paradigm of cognitive radio recently received considerable interest to address the so called ‘spectrum scarcity’ problem. In the USA, the Federal Communications Commission issued the regulatory for the use of cognitive radio in the TV white space spectrum. The primary objective is the design of cognitive devices able to combine the use of spectrum sensing and GEO-location information with the concept of the cognitive control channel to manage the cognitive devices. The recent standard ECMA-392 defines physical layer techniques and medium access control protocols to enable a cognitive network managed in a fully distributed fashion.

In this work, we pursue the design of an efficient medium access control protocol for the cognitive control channel to flexibly and reliably exchange messages inside the cognitive radio network. In particular, we explore how the cognitive devices can raise their awareness of spectrum vacancies of spectrum vacancies by means of sensing when the distributed beaconing defined by ECMA-392 is used.

Our main contributions are the following: (1) we propose a proprietary medium access control protocol based on the Standard ECMA-392; (2) we model the behavior of the cognitive radio network by means of an innovative urn model approach, (3) we investigate the access of the cognitive devices to the frequency channels with and without spoofing attacks and (4) we investigate the ability of the cognitive devices to identify frequency holes accounting for perfect and imperfect spectrum sensing, as well as we study the network throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. In a real system adjacent channels might be weakly correlated.

  2. In this work we do not explicitly tackle the hidden terminal problem but we instead partially address this aspect by means of a non-ideal sensing.

  3. In principle a similar type of problem could be formulated when the spoofers provide correct or incorrect sensing in a random fashion.

  4. Physical Layer Convergence Protocol.

  5. This situation can well describe the cases in which the information obtained from the DB is either outdated or incomplete.

References

  1. Mitola, J. (2000). Cognitive radio: an integrated agent architecture for software defined radio. PhD Dissertation, Royal Institute of Technology KTH, Stockholm, Sweden.

  2. Federal Communications Commission (2002). Spectrum policy task force (ET-Docket No. 02-155). Tech. Rep.

  3. Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks, 50, 2127–2159.

    Article  Google Scholar 

  4. Federal Communications Commission (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices below 900 MHz in the 3 GHz band (Recommendation ET-Docket No. 04-186).

  5. ECMA International (2009). Standard ECMA-392: MAC and PHY for operation in TV white space. Standard Cognitive Network Alliance.

  6. Wang, J., Myung, S. S., Santhiveeran, S., Lim, K., Ko, G., Kim, K., Hwang, S. H., Ghosh, M., Gaddam, V., & Challapali, K. (2010). First cognitive radio networking standard for personal/portable devices in TV white spaces. In IEEE DySPAN2010, Singapore (pp. 1–12).

    Google Scholar 

  7. Cognitive Networking Alliance. http://www.cognea.org.

  8. Electronic Communications Committee (ECC) (2011). Technical and operational requirements for the possible operation of cognitive radio systems in the white spaces of the frequency band 470–790 MHz (ECC Report 159).

  9. Rabbachin, A., Quek, T. Q. S., Shin, H., & Win, Z. (2011). Cognitive network interference. IEEE Journal on Selected Areas in Communications, 29(2), 480–493.

    Article  Google Scholar 

  10. Goratti, L., Yaprak, E., Savazzi, S., & Pomalaza, C. R. An urn occupancy approach for modeling the energy consumption of distributed beaconing. IEEE/ACM Transactions on Networking, submitted.

  11. Drmota, M., Gardy, D., & Gittenberger, B. (2001). A unified presentation of some urn models. Algorithmica, 29, 120–147.

    Article  Google Scholar 

  12. Goratti, L., Baldini, G., & Rabbachin, A. (2011). An urn occupancy approach for cognitive radio networks in DTVB white spaces. In Proceedings of the international workshop MACOM, 11–13 September 2011.

    Google Scholar 

  13. Wang, B., & Liu, K. (2011). Advances in cognitive radio networks: a survey. IEEE Journal of Selected Topics in Signal Processing, 5(1), 5–23.

    Article  Google Scholar 

  14. Chen, R., Park, J.-M., Hou, Y. T., & Reed J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50–55.

    Article  Google Scholar 

  15. Chen, R., Park, J.-M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25–37.

    Article  Google Scholar 

  16. Husheng, L., & Zhu, H. (2010). Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: an abnormality detection approach. In IEEE symposium on new frontiers in dynamic spectrum access networks (DySPAN 2010), Singapore, 6–9 April 2010 (pp. 1–12).

    Google Scholar 

  17. Kun, Z., Paweczak, P., & Cabric, D. (2010). Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Communications Letters, 14(3), 226–228.

    Article  Google Scholar 

  18. Nuallain, E. O. (2008). A proposed propagation-based methodology with which to address the hidden node problem and security/reliability issues in cognitive radio. In 4th international conference on wireless communications, networking and mobile computing, WiCOM, 12–14 October 2008 (pp. 1–5).

    Google Scholar 

  19. Biswas, A. R., Aysal, T. C., Kandeepan, S., Kliazovich, D., & Piesiewicz, R. (2009). In Cooperative shared spectrum sensing for dynamic cognitive radio networks. IEEE international conference on communications (ICC 2009), Dresden, Germany, 14–18 June 2009 (pp. 1–5).

    Google Scholar 

  20. Sakran, H., & Shokair, M. (2011). Hard softened combination for cooperative spectrum sensing over imperfect channels in cognitive radio networks. Telecommunications Systems. doi:10.1007/s11235-011-9467-7.

    Google Scholar 

  21. Luo, L., & Roy, S. (2007). Analysis of search schemes in cognitive radio. In 4th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON’07).

    Google Scholar 

  22. Hohlfeld, O., & Ciucu, F. (2009). Viewing impaired video transmissions from a modeling perspective. ACM SIGMETRICS Performance Evaluation Review, 37(2), 33–35.

    Article  Google Scholar 

  23. Poikonen, J., Paavola, J., & Ipatov, V. (2009). Aggregated renewal Markov processes with applications in simulating mobile broadcast systems. IEEE Transactions on Vehicular Technology, 58(1), 21–31.

    Article  Google Scholar 

  24. McDougall, J., & Miller, S. (2003). Sensitivity of wireless network simulations to a two-state Markov model channel approximation. In Global telecommunications conference GLOBECOM (Vol. 2, pp. 697–701).

    Chapter  Google Scholar 

  25. Zhao, Q., Tong, L., Awami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in ad hoc: a POMDP framework. IEEE Journal on Selected Areas in Communications, 25, 589–600.

    Article  Google Scholar 

  26. Zhu, J., Wang, J., Luo, T., & Li, S. (2009). Adaptive transmission scheduling over fading channels for energy-efficient cognitive radio networks by reinforcement learning. Telecommunications Systems, 42(1–2), 123–138.

    Article  Google Scholar 

  27. ECMA International (2008). Standard ECMA-368: High rate ultra wideband PHY and MAC standard.

  28. Lam, S. S. (1980). Packet broadcast networks—a performance analysis of the R-Aloha protocol. IEEE Transactions on Computers, C-29(7), 596–603.

    Article  Google Scholar 

  29. Wang, W., Wu, K., Luo, H., Yu, G., & Zhang, Z. (2011). Sensing error aware delay-optimal channel allocation scheme for cognitive radio networks. Telecommunications Systems. doi:10.1007/s11235-011-9472-x.

    Google Scholar 

  30. Gardy, D. (2002). Occupancy urn models in the analysis of algorithms. Journal of Statistical Planning and Inference, 101, 95–105.

    Article  Google Scholar 

  31. Boucheron, S., & Gardy, D. (1997). An urn model from learning theory. Random Structures and Algorithms, 10(1–2), 43–67.

    Article  Google Scholar 

  32. Daniels, H. E. (1984). Saddlepoint approximations in statistics. The Annals of Mathematical Statistics, 25, 255–265.

    Google Scholar 

  33. Nekovee, M. (2009). Quantifying the availability of TV white spaces for cognitive radio operation in the UK. In IEEE international conference on communications workshops (ICC) (pp. 14–18).

    Google Scholar 

  34. Gardy, D. (1995). The asymptotic behaviour of coefficients of large powers of functions. Discrete Mathematics, 139, 189–217.

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported, in part, by the European Commission Marie Curie International Outgoing Fellowship under Grant 2010-27292.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo Goratti.

Appendix: The saddle point approximation

Appendix: The saddle point approximation

The method of the steepest descendant is a method used to approximate the probability density function (pdf) of some statistic, when it exists, starting from the known characteristic function of the statistic itself. This method, also referred to as the saddle point approximation, provides an accuracy of the approximated pdf that is O(k −1) and moreover it allows to approximate particularly well the tails of a distribution. A pioneering work on this method is provided in [32] considering the ensemble of k independent random variables with known mean. In this and other studies, parameters m and k are supposed roughly proportional as they tend to grow to the infinity.

In this paper, we are interested in determining the coefficient of a term having the following general form: e mz f(z). Consequently, a suitable extension to the work developed in [32] is provided by [34]. The latter studies the case in which the rates of growth of the function f(z) and m are decoupled. Therefore, this paper provides an adaptation to the saddle point approximation that better suits the purpose of our study. Since the provision of detailed derivations of the saddle point approximation is out of the scope of our paper, we use the method provided in [31] (which relies on [34]) to derive the coefficient of interest. However, the interested reader is remanded to the above cited papers for a more in-depth explanation.

$$\begin{aligned} \bigl[z^k\bigr]\big\{e^{(m-a)z}f(z) \big\} =&\frac{e^{(m-a) \alpha}f(\alpha)}{\alpha^{k+1}\sqrt{2\pi \varPhi(\alpha)}}\biggl(1+ \frac{\epsilon^2 +2\epsilon}{2k} \\ &{} - \frac{1}{12k} +o\biggl(\frac{1}{k} \biggr) \biggr), \end{aligned}$$
(33)

where α=k/m, ϵ=1+δf(α), δf(z)=zf′(z)/f(z) and Φ(α)=f′′(α)/f(α)−(f′/f)2(α)+(k+1)/α 2. In our study we consider only the first term of the development shown in (33).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Goratti, L., Baldini, G. & Rabbachin, A. An urn occupancy approach for cognitive radio networks in DTVB white spaces. Telecommun Syst 56, 229–244 (2014). https://doi.org/10.1007/s11235-013-9832-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9832-9

Keywords

Navigation