MCR-MAC: Multi-channel cognitive radio MAC protocol for cooperative incumbent system protection in wireless ad-hoc network

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

MAC protocol design for cognitive radio (CR) should provide access control for unused spectrum without or with minimal interference to primary users. On this basis, considering how to improve the throughput can make CR MAC protocol more meaningful. To achieve these goals, in this paper a TDMA based multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc network that provides for cooperative detection and protection of incumbent systems around communication pair. By mainly focusing on possible signal collisions between incumbent devices and cognitive radio ad hoc devices, any kind of the hidden incumbent terminal problem is handled in our proposed scheme. To this end, a simple but efficient emergency notification exchanging mechanism between neighbor nodes with little overhead is proposed. Simulation results show that the proposed MCR-MAC can reduce interference on incumbents greatly and improve the throughput remarkably.

Original languageEnglish
Title of host publication2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009
Pages6-11
Number of pages6
DOIs
StatePublished - 2009
Event2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009 - Hong Kong, China
Duration: 7 Jun 20099 Jun 2009

Publication series

Name2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009

Conference

Conference2009 1st International Conference on Ubiquitous and Future Networks, ICUFN 2009
Country/TerritoryChina
CityHong Kong
Period7/06/099/06/09

Keywords

  • Ad-hoc network
  • Cognitive radio
  • Incumbent devices
  • MAC
  • Multiple channels

Fingerprint

Dive into the research topics of 'MCR-MAC: Multi-channel cognitive radio MAC protocol for cooperative incumbent system protection in wireless ad-hoc network'. Together they form a unique fingerprint.

Cite this