An energy-preserving spectrum access strategy in cognitive radio networks

Yalong Xiao, Shigeng Zhang, Jiannong Cao, Jianxin Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

4 Citations (Scopus)

Abstract

Cognitive radio technique improves spectrum utilization by allowing secondary users (SUs) to opportunistically exploit the authorized spectrum of primary users (PUs) to transmit their data. In order to avoid colliding with PU, SUs often sense the channel before transmission. As many secondary users are mobile devices, how to preserve energy consumption of the secondary users is considered in this paper. According to a defined utility function, SU dynamically schedules its actions, i.e., sensing, transmission or sleeping. the utility function is optimized based on the reward and penalty of sleeping actions. Those sleeping actions obeying the rule will be rewarded and those opposite actions will be penalized. SU schedules its action of sensing and sleeping so as to reach a tradeoff between the minimum energy consumption and PU's protection. By maximizing the mean benefit, the proposed strategy exhibits a simple threshold-based structure. Simulation results show that the proposed scheme can greatly reduce energy cost and achieve similar PU collision rate as previous works, with only negligible throughput reduction.
Original languageEnglish
Title of host publication2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
Pages738-743
Number of pages6
DOIs
Publication statusPublished - 21 Aug 2013
Event2013 IEEE Wireless Communications and Networking Conference, WCNC 2013 - Shanghai, China
Duration: 7 Apr 201310 Apr 2013

Conference

Conference2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
Country/TerritoryChina
CityShanghai
Period7/04/1310/04/13

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'An energy-preserving spectrum access strategy in cognitive radio networks'. Together they form a unique fingerprint.

Cite this