By Topic

A Cognitive MAC Protocol Using Statistical Channel Allocation for Wireless Ad-Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Alex Chia-Chun Hsu ; Ming-Hsieh Dept. of EE, Southern California Univ., Los Angeles, CA ; David S. L. Wei ; C. -C. Jay Kuo

The MAC protocol of a cognitive radio (CR) device should allow it to access unused or under-utilized spectrum without (or with minimal) interference to primary users dynamically. To fulfill such a goal, we propose a cognitive MAC protocol using statistical channel allocation and call it SCA-MAC in this work. SCA-MAC is a CSMA/CA-based protocol, which exploits statistics of spectrum usage for decision making on channel access. For each transmission, the sender negotiates with the receiver on transmission parameters through the control channel. A model is developed for CR devices to evaluate the successful rate of transmission. A CR device should pass the threshold of the successful transmission rate via negotiation before it can begin a valid transmission on data channels. The operating range and channel aggregation are two control parameters introduced to maintain the MAC performance. To validate our ideas, we conducted theoretical analysis and simulations to show that SCA-MAC does improve the throughput performance and guarantee the interference to incumbents to be bounded by a predetermined acceptable rate. The proposed MAC protocol does not need a centralized controller, as the negotiation between the sender and the receiver is performed using the CSMA/CA-based algorithm.

Published in:

2007 IEEE Wireless Communications and Networking Conference

Date of Conference:

11-15 March 2007