By Topic

The X Loss: Band-Mix Selection for Opportunistic Spectrum Accessing with Uncertain Spectrum Supply from Primary Service Providers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Miao Pan ; Dept. of Comput. Sci., Texas Southern Univ., Houston, TX, USA ; Hao Yue ; Yuguang Fang ; Hongyan Li

In a cognitive radio network, primary service providers (PSPs) set prices for the vacant licensed bands and sell/lease them for pecuniary gains while the secondary service provider (SSP) can buy/rent the bands and support opportunistic spectrum accessing (OSA). However, due to the unpredictable activities of primary services, the SSP may suffer the monetary risk or failure to meet the traffic demands from the secondary users (SUs). It is challenging for the SSP to measure the risk for OSA, to choose the bands to use, and to split the traffic on the band-mix, when there are multiple vacant bands from PSPs. In this paper, we first introduce the X loss, an intuitive measurement for the risk for OSA. Although the X loss is attractively simple, it underestimates the potential risk for OSA and is mathematically not subadditive, which makes it difficult to support the band-mix selection for traffic splitting. To overcome this problem, we propose a more suitable risk measurement, which is subadditive and consistent with the SSP's perception of the risk. Based on the proposed risk metric, we formulate the band-mix selection problem as an optimization problem and solve it by linear programming.

Published in:

Mobile Computing, IEEE Transactions on  (Volume:11 ,  Issue: 12 )