A Feedback- Soft Sensing-Based Access Scheme for Cognitive Radio Networks

In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are functions of...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 12; no. 7; pp. 3226 - 3237
Main Authors Arafa, Ahmed M., Seddik, Karim G., Sultan, Ahmed K., ElBatt, Tamer, El-Sherif, Amr A.
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.07.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are functions of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on the primary link's feedback. We study the cognitive radio network from a queuing theory point of view. Access probabilities are determined by solving a secondary throughput maximization problem subject to a constraint on the primary queues' stability. First, we formulate our problem which is found to be non-convex. Yet, we solve it efficiently by exploiting the structure of the secondary throughput equation. Our scheme yields improved results in, both, the secondary user throughput and the primary user packet delay as compared to the scheme where no feedback information is exploited. In addition, it comes very close to the optimal genie-aided scheme in which secondary users act upon the presumed perfect knowledge of the primary users' activity.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1536-1276
1558-2248
DOI:10.1109/TWC.2013.061413.120851