Cognitive Network Interference

Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately de...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE journal on selected areas in communications 2011-02, Vol.29 (2), p.480-493
Hauptverfasser: Rabbachin, A, Quek, T Q S, Hyundong Shin, Win, M Z
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 493
container_issue 2
container_start_page 480
container_title IEEE journal on selected areas in communications
container_volume 29
creator Rabbachin, A
Quek, T Q S
Hyundong Shin
Win, M Z
description Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.
doi_str_mv 10.1109/JSAC.2011.110219
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_847339962</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5701700</ieee_id><sourcerecordid>861539726</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFbvgiDFi6fUmU2yH8cSqlaKHux92WwnktomdTdV_PduiHjwNAw87_DOw9glwhQR9N3T66yYckDsV476iI0wz1UCAOqYjUCmaaIkilN2FsIGALNM8RG7Ltq3pu7qT5o8U_fV-vfJounIV-SpcXTOTiq7DXTxO8dsdT9fFY_J8uVhUcyWiUs57xIp0BFYZUkClEJYEllpuaBKEUerc7fmpESu1oLTugRurSxJxW5ZqUuXjtntcHbv248Dhc7s6uBou7UNtYdglMA81ZKLSN78IzftwTexm1FZ_FFrwSMEA-R8G4Knyux9vbP-2yCY3pbpbZnelhlsxcjVEKmJ6A_PJWD8KP0BezVkKw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>847339962</pqid></control><display><type>article</type><title>Cognitive Network Interference</title><source>IEEE Electronic Library (IEL)</source><creator>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</creator><creatorcontrib>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</creatorcontrib><description>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2011.110219</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Aggregates ; cognitive network interference ; cognitive radio ; detection-and-avoidance ; Fading ; Interference ; Numerical models ; Opportunistic spectrum access ; Protocols ; Random variables ; Shadow mapping ; Studies ; truncated-stable distribution ; Wireless networks</subject><ispartof>IEEE journal on selected areas in communications, 2011-02, Vol.29 (2), p.480-493</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</citedby><cites>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5701700$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5701700$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rabbachin, A</creatorcontrib><creatorcontrib>Quek, T Q S</creatorcontrib><creatorcontrib>Hyundong Shin</creatorcontrib><creatorcontrib>Win, M Z</creatorcontrib><title>Cognitive Network Interference</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</description><subject>Aggregates</subject><subject>cognitive network interference</subject><subject>cognitive radio</subject><subject>detection-and-avoidance</subject><subject>Fading</subject><subject>Interference</subject><subject>Numerical models</subject><subject>Opportunistic spectrum access</subject><subject>Protocols</subject><subject>Random variables</subject><subject>Shadow mapping</subject><subject>Studies</subject><subject>truncated-stable distribution</subject><subject>Wireless networks</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFbvgiDFi6fUmU2yH8cSqlaKHux92WwnktomdTdV_PduiHjwNAw87_DOw9glwhQR9N3T66yYckDsV476iI0wz1UCAOqYjUCmaaIkilN2FsIGALNM8RG7Ltq3pu7qT5o8U_fV-vfJounIV-SpcXTOTiq7DXTxO8dsdT9fFY_J8uVhUcyWiUs57xIp0BFYZUkClEJYEllpuaBKEUerc7fmpESu1oLTugRurSxJxW5ZqUuXjtntcHbv248Dhc7s6uBou7UNtYdglMA81ZKLSN78IzftwTexm1FZ_FFrwSMEA-R8G4Knyux9vbP-2yCY3pbpbZnelhlsxcjVEKmJ6A_PJWD8KP0BezVkKw</recordid><startdate>201102</startdate><enddate>201102</enddate><creator>Rabbachin, A</creator><creator>Quek, T Q S</creator><creator>Hyundong Shin</creator><creator>Win, M Z</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>7TK</scope></search><sort><creationdate>201102</creationdate><title>Cognitive Network Interference</title><author>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Aggregates</topic><topic>cognitive network interference</topic><topic>cognitive radio</topic><topic>detection-and-avoidance</topic><topic>Fading</topic><topic>Interference</topic><topic>Numerical models</topic><topic>Opportunistic spectrum access</topic><topic>Protocols</topic><topic>Random variables</topic><topic>Shadow mapping</topic><topic>Studies</topic><topic>truncated-stable distribution</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rabbachin, A</creatorcontrib><creatorcontrib>Quek, T Q S</creatorcontrib><creatorcontrib>Hyundong Shin</creatorcontrib><creatorcontrib>Win, M Z</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Neurosciences Abstracts</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rabbachin, A</au><au>Quek, T Q S</au><au>Hyundong Shin</au><au>Win, M Z</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cognitive Network Interference</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2011-02</date><risdate>2011</risdate><volume>29</volume><issue>2</issue><spage>480</spage><epage>493</epage><pages>480-493</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2011.110219</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0733-8716
ispartof IEEE journal on selected areas in communications, 2011-02, Vol.29 (2), p.480-493
issn 0733-8716
1558-0008
language eng
recordid cdi_proquest_journals_847339962
source IEEE Electronic Library (IEL)
subjects Aggregates
cognitive network interference
cognitive radio
detection-and-avoidance
Fading
Interference
Numerical models
Opportunistic spectrum access
Protocols
Random variables
Shadow mapping
Studies
truncated-stable distribution
Wireless networks
title Cognitive Network Interference
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T02%3A24%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cognitive%20Network%20Interference&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Rabbachin,%20A&rft.date=2011-02&rft.volume=29&rft.issue=2&rft.spage=480&rft.epage=493&rft.pages=480-493&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2011.110219&rft_dat=%3Cproquest_RIE%3E861539726%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=847339962&rft_id=info:pmid/&rft_ieee_id=5701700&rfr_iscdi=true