Skip to main content
Log in

Performance analysis of opportunistic CSMA schemes in cognitive radio networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this paper, we consider underlay cognitive radio (CR) networks where an amount of interference caused by secondary stations (STAs) has to be kept below a predefined level, which is called interference temperature. We propose opportunistic p-persistent carrier sense multiple access schemes for the CR networks, which opportunistically exploit wireless channel conditions in transmitting data to the secondary access point. We also devise an adaptive interference-level control technique to further improve quality-of-service of a primary network by limiting the excessive interference due to collisions among STAs. The performances of the proposed schemes are mathematically analyzed, and they are validated with extensive computer simulations. The simulation results show that the proposed schemes achieve near optimal throughput of the secondary network while they are backward-compatible to the conventional p-persistent CSMA scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. This interference constraint guarantees that the PR can accept only predetermined degradation of its quality of service (QoS).

  2. Most emerging wireless applications, such as vehicle-to-vehicle (V2V) communications, vehicle-to-infrastructure (V2I) communications, or millimeter wave communications, operate in a decentralized manner. For instance, the IEEE 802.11p system [19, 20], which is also called the wireless access in vehicular environments (WAVE) protocol, is based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol which is one of the most popular distributed scheduling algorithm.

  3. In addition to this difference, we have also considered more sophisticated transmit power control scheme in our work compared with our previous work [1].

  4. In this paper, we assume that the number of PR is one. However, when multiple PRs coexist, \(g_i\) can be selected by referring the channel condition of the PR whose channel gain is largest, i.e., \(\mu _{G}\) is highest.

  5. The proper value of Q can be notified by the PR or the SAP.

  6. The exploitation of the channel opportunity means that the transmission of STAs is adjusted according to randomly varying channel conditions. For example, the STA with high signal channel gain can be selected in scheduling to achieve higher throughput.

  7. This technique of using statistics of the wireless channel for determining the threshold is motivated by [33], and we extend it to various CR scenarios in this paper. The proposed schemes differ from the scheme of [33] in the design of thresholds and medium access mechanism.

  8. Unfortunately, the closed form of the inverse function of \(F_F(x)\) does not exist, such that \(\{T_k\}\) for the COpCSMA-III should be numerically calculated.

  9. Given that the transmission is scheduled in distributed manner, the collision is inevitable.

  10. The violation probability is the probability that the interference constraint is violated.

References

  1. Kang, M. S., & Jung, B. C. (2010). A cognitive p-persistent CSMA scheme for spectrum sharing based cognitive radio networks. In Proceedings of IEEE WCNC.

  2. Kang, M. S., & Jung, B. C. (2011). Performance analysis of an opportunistic CSMA scheme in cognitive radio networks. In Proceedings of IEEE MTT-S IMWS.

  3. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

    Article  Google Scholar 

  4. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  5. Lee, W., & Cho, D.-H. (2011). Enhanced spectrum sensing scheme in cognitive radio systems with MIMO antennae. IEEE Transactions on Vehicular Technology, 60(3), 1072–1085.

    Article  MathSciNet  Google Scholar 

  6. Ban, T. W., Choi, W., Jung, B. C., & Sung, D. K. (2009). Multi-user diversity in a spectrum sharing system. IEEE Transactions on Wireless Communications, 8(1), 102–106.

    Article  Google Scholar 

  7. Lee, W., & Cho, D.-H. (2013). Cooperation based new channel state acquisition scheme for ad hoc cognitive radio systems’. IEEE Transactions on Vehicular Technology, 62(7), 3325–3338.

    Article  Google Scholar 

  8. Federal Communications Commission, Spectrum policy task force report, (ET Docket No. 02-135), (2002). http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-228542A1.

  9. ET Docket No. 03-237; FCC 07-78, Interference Temperature Operation, site. http://www.gpo.gov/fdsys/pkg/FR-2007-05-30/pdf/E7-10337.

  10. Ban, T. W., Choi, W., & Sung, D. K. (2009). Capacity and energy efficiency of multi-user spectrum sharing systems with opportunistic scheduling. IEEE Transactions on Wireless Communications, 8(6), 2836–2841.

    Article  Google Scholar 

  11. Zhang, L., Xin, Y., & Liang, Y.-C. (2009). Weighted sum rate optimization for cognitive radio MIMO broadcast channels. IEEE Transactions on Wireless Communications, 8(6), 2950–2959.

    Article  Google Scholar 

  12. Zhang, L., Liang, Y.-C., Xin, Y., & Poor, H. (2009). Robust cognitive beamforming with partial channel state information. IEEE Transactions on Wireless Communications, 8(8), 4143–4153.

    Article  Google Scholar 

  13. Guimaraes, F., da Costa, D., Tsiftsis, T., Cavalcante, C., & Karagiannidis, G. (2014). Multiuser and multirelay cognitive radio networks under spectrum-sharing constraints. IEEE Transactions on Vehicular Technology, 63(1), 433–439.

    Article  Google Scholar 

  14. Gastpar, M. (2007). On capacity under receive and spatial spectrum-sharing constraints. IEEE Transactions on Information Theory, 53(2), 471–487.

    Article  MathSciNet  MATH  Google Scholar 

  15. Ghasemi, A., & Sousa, E. (2007). Fundamental limits of spectrum-sharing in fading environments. IEEE Transactions on Wireless Communications, 6(2), 649–658.

    Article  Google Scholar 

  16. Zhang, R., & Liang, Y.-C. (2008). Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 2(1), 88–102.

    Google Scholar 

  17. Shah, G. A., & Akan, O. B. (2014). Performance analysis of CSMA-based opportunistic medium access protocol in cognitive radio sensor networks. Ad Hoc Networks, 15, 4–13.

    Article  Google Scholar 

  18. Li, S., Ekici, E., & Shroff, N. (2015). Throughput-optimal queue length based CSMA/CA algorithm for cognitive radio networks. IEEE Transactions on Mobile Computing, 14(5), 1098–1108.

    Article  Google Scholar 

  19. Gozalvez, J., Sepulcre, M., & Bauza, R. (2012). IEEE 802.11p vehicle to infrastructure communications in urban environments. IEEE Communications Magazine, 50(5), 176–183.

    Article  Google Scholar 

  20. Pyun, S., Lee, W., & Cho, D. (2016). Resource allocation for Vehicle-to-Infrastructure communication using directional transmission. IEEE Trans. Intell. Transp. Syst., 17(4), 1183–1188.

    Article  Google Scholar 

  21. Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework. IEEE Journal on Selected Areas in Communications, 25(3), 589–600.

    Article  Google Scholar 

  22. Zhang, Q., Fitzek, F., & Iversen, V. (2008). Cognitive radio MAC protocol for WLAN. In Proceedings of PIMRC.

  23. Adamis, A., & Constantinou, P. (2007). Performance study of CSMA/CA over spectrum pooling environment for cognitive radios. In Proceedings of WiMOB.

  24. Cheng, Y. C., Wu, E. H., & Chen, G. H. (2016). A decentralized MAC protocol for unfairness problems in coexistent heterogeneous cognitive radio networks scenarios with collision-based primary users. IEEE Systems Journal, 10(1), 346–357.

    Article  Google Scholar 

  25. Wu, C. M., & Su, H. K. (2014). Cooperative power and contention control mac protocol in multichannel cognitive radio ad hoc networks. In Proceedings of IMIS.

  26. Banaei, A., Eslami, A., Georghiades, C. N., & Cui, S. (2014). Joint random spectrum sensing and access scheme for decentralized cognitive radio networks. In Proceedings of ICC.

  27. Joshi, G. P., Nam, S. Y., & Kim, S. W. (2014). Decentralized predictive MAC protocol for ad hoc cognitive radio networks. Wireless Personal Communications, 74(2), 803–821.

    Article  Google Scholar 

  28. Liao, Y., Wang, T., Bian, K., Song, L., & Han, Z. (2015). Decentralized dynamic spectrum access in full-duplex cognitive radio networks. In Proceedings of ICC.

  29. Wang, P., Ansari, J., Petrova, M., & Mhnen, P. (2014). Demo: CogMAC+-a decentralized multichannel MAC protocol for cognitive wireless networks. In Proceedings of ACM SRIF.

  30. Knopp, R., & Humblet, P. (1995). Information capacity and power control in single-cell multiuser communications. In Proceedings of ICC.

  31. Viswanath, P., Tse, D., & Laroia, R. (2002). Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory, 48(6), 1277–1294.

    Article  MathSciNet  MATH  Google Scholar 

  32. Qin, X., & Berry, R. (2003). Exploiting multiuser diversity for medium access control in wireless networks. In Proceedings of INFOCOM.

  33. Hwang, C.-S., Seong, K., & Cioffi, J. (2008). Throughput maximization by utilizing multi-user diversity in slow-fading random access channels. IEEE Transactions on Wireless Communications, 7(7), 2526–2535.

    Article  Google Scholar 

  34. Kleinrock, L., & Tobagi, F. (1975). Packet switching in radio channels: Part I-carrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 23(12), 1400–1416.

    Article  MATH  Google Scholar 

  35. Cali, F., Conti, M., & Gregori, E. (2000). Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Transactions on Networking, 8(6), 785–799.

    Article  Google Scholar 

  36. Gradshteyn, I. S., & Ryzhik, I. (2000). Table of integrals, series, and products. Cambridge: Academic Press.

    MATH  Google Scholar 

Download references

Acknowledgments

This research was supported in part by the National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2015R1D1A1A01057529).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woongsup Lee.

Additional information

This paper was presented in part at IEEE WCNC 2010 and IEEE MTT-S IMWS 2011 [1, 2].

Appendix

Appendix

1.1 The CDF of the effective channel gain \(f_i\)

The CDF of \(f_i\) is, by definition, given as

$$\begin{aligned} F_F(x)=\, & {} {\text {Pr}}\left\{ {f \le x}\right\} \nonumber \\=\, & {} {\text {Pr}}\left\{ {f \le x,\gamma _i\le Q /\overline{P}}\right\} +{\text {Pr}}\left\{ {f \le x,\gamma _i> Q /\overline{P}}\right\} \nonumber \\=\, & {} {\text {Pr}}\left\{ {\overline{P} \eta _i \le x,\gamma _i\le Q /\overline{P}}\right\} +{\text {Pr}}\left\{ { Q \frac{\eta _i}{\gamma _i} \le x,\gamma _i> Q /\overline{P}}\right\} \nonumber \\=\, & {} {\text {Pr}}\left\{ {\overline{P} \eta _i \le x}\right\} {\text {Pr}}\left\{ {\gamma _i\le Q /\overline{P}}\right\} +{\text {Pr}}\left\{ { Q \frac{\eta _i}{\gamma _i} \le x,\gamma _i> Q /\overline{P}}\right\} \nonumber \\=\, & {} \left( {1-e^{-\frac{x}{\overline{P} \mu _H}}}\right) \left( {1-e^{-\frac{ Q }{\overline{P} \mu _G}}}\right) +{\text {Pr}}\left\{ { Q \frac{\eta _i}{\gamma _i} \le x,\gamma _i> Q /\overline{P}}\right\} . \end{aligned}$$
(30)

\({\text {Pr}}\left\{ { Q \frac{\eta _i}{\gamma _i} \le x,\gamma _i> Q /\overline{P}}\right\}\) in (30) can be further derived as follows.

$$\begin{aligned} {\text {Pr}}\left\{ { Q \frac{\eta _i}{\gamma _i} \le x,\gamma _i> Q /\overline{P}}\right\}= & {} \int _{ Q /\overline{P}}^{\infty }{{\text {Pr}}\left\{ { Q \frac{\eta _i}{t} \le x|\gamma _i=t}\right\} f_\varGamma (t) dt}\nonumber \\= & {} \int _{ Q /\overline{P}}^{\infty }{{\text {Pr}}\left\{ { Q \frac{\eta _i}{t} \le x}\right\} \left( {\frac{1}{\mu _G}e^{-\frac{t}{\mu _G}}}\right) dt}\nonumber \\= & {} e^{-\frac{ Q }{\overline{P} \mu _G}}-\left( {\frac{\mu _H Q }{\mu _G x+\mu _H Q }}\right) e^{-\left( {\frac{x}{\overline{P} \mu _H}+\frac{ Q }{\overline{P} \mu _G}}\right) }. \end{aligned}$$
(31)

By substituting (31) into (30), we obtain the CDF of the effective secondary channel gain \(f_i\) given as

$$\begin{aligned} \begin{array}{lll} F_F(x)=1-e^{-\frac{x}{\overline{P} \mu _H}}+\left( {\frac{\mu _G x}{\mu _G x+\mu _H Q }}\right) e^{-\left( {\frac{x}{\overline{P} \mu _H}+\frac{ Q }{\overline{P} \mu _G}}\right) }. \end{array} \end{aligned}$$
(32)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jung, B.C., Lee, W. Performance analysis of opportunistic CSMA schemes in cognitive radio networks. Wireless Netw 24, 833–845 (2018). https://doi.org/10.1007/s11276-016-1375-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1375-z

Keywords

Navigation