2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications 2008
DOI: 10.1109/pimrc.2008.4699626
|View full text |Cite
|
Sign up to set email alerts
|

Double Hopping: A new approach for Dynamic Frequency Hopping in Cognitive Radio networks

Abstract: Abstract-one of the major challenges in designing cellular Cognitive Radio (CR) networks is the avoidance of Secondary User (SU) interference to so called Primary Users (PUs) operating in the licensed bands. Usually, SU operation has to be interrupted periodically in order to detect PU activity and avoid the respective frequencies. Recently, Dynamic Frequency Hopping (DFH) mechanisms have been suggested to enable reliable PU detection and continuous SU operation at the same time. Applying DFH in a multi-cell e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 16 publications
0
22
0
Order By: Relevance
“…To overcome the limitation of complexity in DSA-MAC protocols, several approaches have been considered to model network interactions e.g. the localized variation of the island genetic algorithm (El Nainay et al 2008), graph colouring theory (Zheng and Peng 2005;Willkomm et al 2008), game theory (Younis and Krunz 2006;Zou and Chigan 2008), stochastic theory Swami et al (2005), genetic algorithms (Rondeau et al 2004), and swarm intelligence algorithms (Atakan and Akan 2007).…”
Section: Mac Protocols Based On Dynamic Spectrum Allocation (Dsa)mentioning
confidence: 99%
“…To overcome the limitation of complexity in DSA-MAC protocols, several approaches have been considered to model network interactions e.g. the localized variation of the island genetic algorithm (El Nainay et al 2008), graph colouring theory (Zheng and Peng 2005;Willkomm et al 2008), game theory (Younis and Krunz 2006;Zou and Chigan 2008), stochastic theory Swami et al (2005), genetic algorithms (Rondeau et al 2004), and swarm intelligence algorithms (Atakan and Akan 2007).…”
Section: Mac Protocols Based On Dynamic Spectrum Allocation (Dsa)mentioning
confidence: 99%
“…It is known that player-specific matroid congestion game admit pure equilibrium, and the number of steps towards Nash Equilibrium is upper-bounded 3 by n 2 · m. In our context, n is the number of debatable nodes, m is number of clusters in CRN, so the total time complexity to achieve the Nash Equilibrium using greedy approach is O(n 2 m). This is upper-bounded (in the worst case) by O(|I| 3 ).…”
Section: N} the Set Of Players (Debatable Nodes)mentioning
confidence: 99%
“…This typically requires all CR users 1 within some cluster to stop payload transmission on the operating channel and initiate the sensing process. Furthermore, by clustering (and shifting the sensing process) the potential for collisions (when vacating the channel due to primary node appearance) among neighboring clusters is reduced [3]. Finally, routing becomes simplified if clusters are formed in cognitive ad-hoc 0 Di Li and James Gross are with the Mobile Network Performance Group, UMIC Research Center, RWTH Aachen University, Germany, {li|gross}@umic.rwth-aachen.de; This work was supported in part by NRW State, Germany, within the B-IT Research School and by the DFG Cluster of Excellence on Ultra High-Speed Mobile Information and Communication (UMIC), German Research Foundation grant DFG EXC 89.…”
Section: Introductionmentioning
confidence: 99%
“…In DSA-driven MAC protocols each cognitive radio node can adapt its transmission parameters, such as modulation, coding scheme and power transmission, in order to find the optimum configuration for the experimented radio environment. In this context, in the last decade several way to realize DSA has been proposed, such as trial and error solutions [10], algorithms derived from graph theory [11], [12], stochastic theory [13], game theory [14]. Regarding algorithms derived from heuristic [15], [16], in this context they appear to be not suitable due to their prohibitively computational cost and the necessity of a complete knowledge of the network.…”
Section: Introductionmentioning
confidence: 99%