to primary users (pus), ... very important example is ieee 802.22 wireless regional ... several...

31
1 23 Peer-to-Peer Networking and Applications ISSN 1936-6442 Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-016-0465-0 An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks Ajmery Sultana, Xavier Fernando & Lian Zhao

Upload: buidung

Post on 23-Mar-2018

217 views

Category:

Documents


4 download

TRANSCRIPT

1 23

Peer-to-Peer Networking andApplications ISSN 1936-6442 Peer-to-Peer Netw. Appl.DOI 10.1007/s12083-016-0465-0

An overview of medium access controlstrategies for opportunistic spectrum accessin cognitive radio networks

Ajmery Sultana, Xavier Fernando & LianZhao

1 23

Your article is protected by copyright and all

rights are held exclusively by Springer Science

+Business Media New York. This e-offprint is

for personal use only and shall not be self-

archived in electronic repositories. If you wish

to self-archive your article, please use the

accepted manuscript version for posting on

your own website. You may further deposit

the accepted manuscript version in any

repository, provided it is only made publicly

available 12 months after official publication

or later and provided acknowledgement is

given to the original source of publication

and a link is inserted to the published article

on Springer's website. The link must be

accompanied by the following text: "The final

publication is available at link.springer.com”.

Peer-to-Peer Netw. Appl.DOI 10.1007/s12083-016-0465-0

An overview of medium access control strategiesfor opportunistic spectrum access in cognitive radionetworks

Ajmery Sultana1 · Xavier Fernando1 · Lian Zhao1

Received: 25 January 2016 / Accepted: 25 April 2016© Springer Science+Business Media New York 2016

Abstract Cognitive radio (CR) is a promising wirelesstechnology that provides efficient spectral usage. MediumAccess Control (MAC) has an important role in several cog-nitive radio functions such as sensing, spectrum mobility,resource allocation and spectrum sharing. We focus on theopportunistic spectrum access (OSA) functionality of theCR network MAC layer by which the secondary users (SUs)access licensed spectrum in space and time with no harmfulinterference to primary users (PUs), without prior infor-mation on spectral usage. To achieve this, the unlicensedusers should have the ability to adaptively and dynami-cally seek and exploit opportunities in licensed spectrum intime, polarization and frequency domains. There have beenseveral OSA MAC schemes proposed for CR networks.This article presents a detailed review of such state-of-the-art schemes. First the differences between the conventionalMAC protocols and OSA based MAC protocols are dis-cussed. Existing OSAMAC protocols are classified accord-ing to their key attributes and their performances. Finally,future research directions are discussed.

Keywords Cognitive radio · Opportunistic spectrumaccess · MAC layer · Dynamic spectrum sharing

� Lian [email protected]

1 Department of Electrical and Computer Engineering, RyersonUniversity, Toronto, Canada

1 introduction

Ever increasing service demand poses two major challengesin the next generation wireless communication paradigm.One is the spectrum scarcity and the other is the demand ofhigh data rates, upto few Gbps. While there is a need fornew spectrum bands, it is observed that currently licensedspectrum is significantly underutilized [1]. Cognitive radio(CR), first coined by Joseph Mitola [2], has been proposedas a solution for efficiently utilizing the radio resources.CR is typically built using software-defined radio (SDR)technology, in which the transmitter operating parameters,such as the frequency range, modulation type and trans-mission power can be dynamically adjusted by software [3,4]. CRs, with its ability to smartly interact with the sur-rounding environment, are amenable to allow the coexis-tence licensed (primary) users and unlicensed (secondary)users sharing the same bandwidth opportunistically withoutcausing harmful interference to each other.

Cognitive radio network (CRN) has distinctive charac-teristics from a traditional wireless network where it intel-ligently recognizes the status of the radio environment andadjusts its functional parameters accordingly [4, 5]. Mostcritical part of CRN is allowing CR users to share thelicensed spectrum with PUs without degrading their perfor-mance [6]. This imposes new challenges and open researchissues.

Regulation and standardization efforts have already beencarried out to envision some of the applications of CRN. Avery important example is IEEE 802.22 Wireless RegionalArea Network (WRAN) standard [7]. It provides specifica-tions for broadband wireless access using CR technology

Author's personal copy

Peer-to-Peer Netw. Appl.

and spectrum sharing policies and procedures for opera-tion in the white space TV bands. IEEE 802.11af standardand its amendments [8] enable geo-location database accessin the white space radio frequency (RF) spectrum. IEEE1900.x series of standards [9] provide next generation radioand advanced spectrum management. IEEE 802.19 stan-dard [10] enables the family of IEEE 802 wireless stan-dards to most effectively use TV white space by providingstandard coexistence methods among dissimilar or indepen-dently operated IEEE 802 networks and devices. It is alsouseful for non IEEE 802 networks and TV band devises. Thefirst set of standardization study towards licensed sharedaccess for long term evaluation (LTE) is reported in [11]that were successfully trialed in a live LTE network in the2.4-2.5 MHz frequency band [12]. In most recent times,IEEE has engaged the 802.15.4m task group [13] to char-acterize cognitive radio-aware PHY and MAC layers forcognitive machine-to-machine networks. These examplesshow standardization process for CR is well underway.

1.1 Medium access control layer

Medium access control (MAC) layer is responsible forthe control and coordination of communication over wire-less channels, several cognitive radio functions like channelsensing, spectrum sharing, resource allocation and spectrummobility need to be included in the design of MAC proto-col for CRN. In the rapidly changing radio environment, theCRN MAC protocol shall make number of decisions in realtime. This makes the design of CRN very challenging com-pared to conventional MAC protocols, that work under thecurrent static spectrum policies.

In recent decades, the concept of opportunistic spectrumaccess (OSA) has emerged to significantly increase spec-trum utilization. Efficient sensing and dynamic spectrumaccess are the key challenges of an OSA MAC protocol.For this, the SUs should have the ability of dynamicallysearch and utilize opportunities in the licensed spectrumalong in different dimensions like time, frequency or evencode. Thus an OSA MAC should integrate both sensing andchannel access functionalities. In essence, spectrum sens-ing, allocation and access, spectrum sharing and spectrummobility, are the key elements for efficient OSA MAC pro-tocol design. Figure 1 shows the basic elements of OSAMAC protocol in CRNs. Figure 2 points out the OSA MACprotocol functional requirements.

1.2 Related work and positioning of this survey

There are several burgeoning research efforts to providegeneral classification, analysis and comprehensive overviewregarding MAC paradigm in CRNs. Extensive research andeffort have been conducted to construct several surveys

Fig. 1 Basic elements of OSA MAC protocol

that are presented in [14–25] in order to focus on differentMAC strategies in CRNs. In [14] the authors provide gen-eral classification and overview of MAC protocols whereC-MAC cycle is constructed to incorporate several impor-tant aspects in CRN context; however, they did not includemulti-hop environment into the classification. Also [14]falls short in addressing the challenges in designing MACfor CRNs. The authors discussed several research issuesand challenges in [15], gave an overview of MAC protocolsand presented many classifications with their advantagesand disadvantages. However, a well rounded integrationof most recent research endeavors was missing. In [16],the challenges in the design and implementation of dis-tributed dynamic spectrum access (DSA) protocols are

Fig. 2 OSA MAC protocol functionalities

Author's personal copy

Peer-to-Peer Netw. Appl.

addressed, existing distributed DSA protocols are catego-rized and described to offer a detail overview. An extensivediscussion on different MAC approaches based on clas-sification, are presented in [17–19]. The authors in [20]mainly focus on open research areas and several MACprotocols for distributed architecture. The authors in [21–25] mainly concentrate on multi-channel specific aspects inCRNs and proposed approaches [26–29] reveal the state-of-the-art research exertions in OSA MAC framework. To thisend, we present a comprehensive and up-to-date overviewof OSA MAC schemes with recent research trends and, anin-depth investigation and future research directions. Com-pared to previous surveys, this article provides the followingcontributions:

• It identifies basic elements and pointed out functionalrequirements for OSA MAC protocol.

• It provides classification incorporating most of the char-acteristics in CR MAC context.

• It presents a comprehensive analysis and evolutionaryview of OSA MAC strategies in CRNs with recentresearch progresses.

• It provides comparison based on different objectivesand their solution approaches as well as on severalcharacteristic features.

• It points out potential exertions based on recent researchtrends as well as several active and open issues that getlittle attention so far.

Table 1 highlights the major contributions of differentexisting surveys and clarify the positioning of this survey.

1.3 Organization of the article

The rest of this article is organized as follows. Section 2provides taxonomy of MAC protocols for CRNs. Section 3depicts taxonomy based on different objectives, solutionapproaches and performance metrics, in-depth analysis andcomparison. Section 4 describes standardization endeavorregarding CR-MAC engineering. Section 5 presents discus-sions and future research roadmap. Section 6 concludes thepaper.

2 Taxonomy of MAC protocols for CRNs

During the past decade, a large number of MAC protocolfor CRNs have been explored. The design of newMAC pro-tocol can be classified based on different criteria that areenvisioned in Fig. 3.

2.1 Network architectures

In the context of MAC network architectures, the spec-trum sharing/access technique can either be centralized ordistributed. Centralized architecture is typically used forinfrastructure based CRNs, for example IEEE 802.22 [30].These strategies typically enable simple hardware and soft-ware capabilities for CR nodes, but impose spatio-temporalspectrum sensing and active synchronization among allnodes. Due to the ease of deployment, the distributed archi-tectures draw the attention for more future applications. The

Table 1 Comparison of related surveys in the literature

[14], 2014 [15], 2014 [25], 2013 [16], 2012 [17], 2012 [28], 2009 Our work

Basic element identification and Extensive N/A N/A N/A N/A Limited Extensive

functional requirements

Classification based on characteristic Extensive Moderate Extensive Extensive Extensive Extensive Extensive

features

Comparison based on characteristic Moderate Extensive Extensive Extensive Moderate Moderate Extensive

features

Generic OSA MAC design parameter Moderate Limited Limited Limited Limited Limited Extensive

Taxonomy based on different N/A N/A N/A N/A N/A N/A Extensive

objectives

Comprehensive analysis Extensive Moderate Extensive Extensive Extensive Extensive Extensive

Integration of recent research trends Moderate Limited Moderate Moderate Moderate Moderate Extensive

Comparison of different objectives, N/A N/A N/A N/A N/A N/A Extensive

solution approaches and

performance metrics

Future research roadmap Extensive Moderate Moderate Extensive Extensive Extensive Extensive

Author's personal copy

Peer-to-Peer Netw. Appl.

Fig. 3 Classification of CRMAC protocol

centralized solutions may not be a proper choice due to thedistributed and self-organized nature of OSA CRNs. There-fore, the focus of this article is on the distributed OSAMACs.

2.2 Channel usage strategies

According to the channel usage strategy, MAC schemescan be classified into single channel or multi-channelMAC protocol. Simpler architecture of single channel based

protocol makes it attractive; however, network throughputis low due to lower data transmission rate. In addition, thewell known hidden terminal problem, shadowing, multipathfading and receiver noise/interference uncertainty issuesmay cause severe impact on network performance in sin-gle channel scenario. On the contrary, multi-channel MACprotocol performs better than single channel protocol in sev-eral aspects such as 1) increased network throughput due tomultiple simultaneous data transmissions, 2) reduced inter-ference among SU nodes and, 3) reduced number of SU

Author's personal copy

Peer-to-Peer Netw. Appl.

nodes affected by sudden PU activity [31]. However, com-plex design architecture and high deployment cost are themajor drawbacks for this approach.

2.3 Spectrum sharing schemes

In CRNs, spectrum sharing between PUs and SUs can bedefined as the real time spectrum management that allowsSUs to access licensed spectrum with little or no interfer-ence to the PUs [32]. This leads to a few possible spectrumsharing scenarios. These are: 1) interweave (no space, time,frequency, polarization or angular overlapping transmissionbetween the PU and SU [33], 2) underlay (controlled andmanaged interference between the PU and SU), and 3) over-lay (the SU assists the PU) scenarios [34]. The interweaveapproach is ideal, but offers minimal CR throughput. In theinterweave or OSA scheme, the SU first performs spectrumsensing, discovers white spaces or spectrum holes and thenuses those vacant frequency bands for transmission [35].The focus of this paper is OSA (interweave) MACs.

2.4 Spectrum access methods

Based on the nature of channel access, CRN-MAC pro-tocol can be classified as random access/contention-based protocols, time slotted protocols and hybrid proto-cols [36]. Contention-based MAC protocols mainly workon carrier sense multiple access and collision avoidance(CSMA/CA) principle. Synchronization between SU nodesis not required in this scheme. Contention based protocolsattract researchers attention due to their simple architec-ture. However, inefficient spectrum utilization and datapacket collisions are the major drawbacks which degradenetwork performance. Time slotted protocols, where timeis split into slots to be used for both control and datatransmission, global synchronization between SU nodes isrequired. Hence, slot allocation and synchronization com-plexity can affect the system throughput. Hybrid protocolsare presumed to be a combination of contention basedand time slotted schemes i.e., channels are partially slot-ted and access to these channels is done in random fashion.Therefore, this approach has the benefit of both the aboveapproaches.

2.5 Channel allocation behaviors

The channel allocation behavior in CRNs can either becooperative or non-cooperative [4]. In the cooperativescheme, SU nodes consider the existence of other SU nodesand their information during spectrum allocation. Thisscheme can be treated as a collaborative approach to spec-trum allocation. On the other hand, in the non-cooperativescheme, SU nodes do not exchange any information, and

hence often considered as a selfish approach. Here, the SUnodes access the channel independently according to bothlocal monitoring and statistics, and use pre-programmedregimes, thus reducing communication overhead.

2.6 Spectrum sensing strategies

Spectrum sensing can be either local or cooperative. In localspectrum sensing based MAC protocol, only local sensingoutcomes are utilized for OSA whereas in cooperative spec-trum sensing basedMAC protocol, SU nodes exchange theirlocal sensing outcomes and combine results from variousmeasurements to make more accurate decision. The coop-erative spectrum sensing based protocol is an attractive andeffective strategy to combat multipath fading, shadowingand mitigate the receiver uncertainty problem [3]. How-ever, cooperative spectrum sensing based protocol designand architecture are more complex than the local spectrumsensing based protocol.

2.7 Control channel (CC) mechanism

Control channel (CC) mechanism is a crucial functional-ity in OSA MAC design. It should provide coordination,cooperation and collaboration between all network entitiesand spectrum sensing and access process. CC based MACprotocols can be classified into two broad categories: Dedi-cated (Common) CC (DCC) and non-dedicated CC (NDCC)based MAC protocols. In DCC, two transceivers are usedwhere one is dedicated for control message transmission andthe other for negotiated data transmission for the remain-ing channels. Since one radio is always available for controlmessage exchange, there is no chance to miss the con-trol information even during data transmission. Therefore,multi-channel hidden terminal problem is also solved. How-ever, the case when only one transceiver is used, controland data transmissions occur alternately in time based onthe demand, hence the protocol operation becomes morecomplex and less synchronized.

Another dedicated approach is split phase (SPCC) whichutilizes only one transceiver but the time is divided into twophases, namely control phase and data transmission phase.This approach together with power saving mode (PSM) ofIEEE 802.11, attracts researcher attention to design energyefficient OSA MAC protocols. In addition, SPCC mitigateshidden terminal issues. However, precise time synchroniza-tion requirement and control channel saturation problem arestill drawbacks of this approach.

The DCC can either be global, local ordynamic/configurable depending on the network coverage.In global DCC (GDCC), an unlicensed band (e. g., ISMband) can be globally used for control signaling by allSUs in the CRN. In particular, the GDCC provides high

Author's personal copy

Peer-to-Peer Netw. Appl.

level of network coordination and global coverage [37].However, it exhibits some drawbacks such as no trafficdifferentiation, control channel saturation problem, wastageof resource and security issues i.e., denial of service (DoS)attack [38, 39]. In local DCC (LDCC), all SUs in theCRN exchange control information over DCC channelsthat are selected locally and free from PU interference.LDCC mechanism can be achieved by node grouping [40]or node clustering [41–43]. Dynamic/configurable DCCsare similar to the LDCCs except that control channel isnot presumed to exist. The participating SUs configure ordynamically select an available channel temporarily controlchannel. Also there are no cluster-heads or group leadersfor controlling spectrum access in implementing such achannel [44].

The NDCC mechanism alleviates the shortcomings ofthe DCC mechanism since it does not require the controlchannels solely responsible for control message exchangeand to be PU free. The NDCC mechanism can be estab-lished by frequency hopping, rendezvous or ultra-widebandchannels. In frequency hopping DCC (FHDCC), all CRnodes hop across all channels following a deterministicpattern which is usually static in nature and is generatedfrom pseudo-random generator [45]. This scheme has theadvantage of utilizing all the channels for control and datatransmission. This feature makes this scheme to be free fromPU interruption and overcome control channel saturationproblem. In addition, it utilizes only one transceiver. How-ever, hidden terminal issue, high channel switching delay,strong hardware dependency and tight synchronizationrequirement between CR nodes make this approach morechallenging.

In rendezvous approach (RNDCC), multiple SU nodescan exchange control message in different channels at thesame time by using different hopping sequences that over-lap at certain point. This approach permits multiple pairsof communication at the same time across all availablechannels making it most robust to sudden PU activities.However, it requires strict synchronization between thehopping pairs since they need to concern about their over-lapping times of one-hop neighbors. However, they requirea high overhead for supporting broadcast communicationbecause of the randomized connections between neigh-bors [46]. The last approach, ultra-wideband NDCC (UWB-NDCC) utilizes spread spectrum techniques in underlayfashion.

2.8 Effects of number of radio front ends (RFEs)

The number of RFEs extensively plays a pivotal role inthe operation of an SU node which consequently affectsthe scanning procedure and OSA MAC operation. Indeed,

having multiple RFEs means concurrent control and datatransmission which significantly boosts system throughputand decreases delay. Multiple RFEs also provide higherspectrum efficiency and better sensing accuracy. However,they also increase node complexity, deployment cost andpower consumption. Alternatively, single RFE needs scan-ning and transmission (control and data) to be split intime domain. This not only simplifies the structure butalso reduces node complexity, deployment cost and powerconsumption. However, single RFE also reduces spectrumefficiency, sensing accuracy and also suffers from multi-channel hidden terminal problem. In the literature, the num-ber of RFEs differs from one (control and data exchangeis performed by time sharing) to three (one for controlmessage exchange and two for data transmission).

2.9 Network topologies

A CRN may have a single-hop or multi-hop network infras-tructure. The emerging IEEE 802.22 standard-based [47]WRAN technology is based on the single-hop CRN con-cept. Here, a centralized cognitive base station managesthe SUs that opportunistically use the TV bands whenthey are unoccupied by the incumbent TV services. On theother hand, multi-hop CRNs (MHCRN) have no fixed net-work infrastructure or central controller. They also havean additional requirement that the information needs tobe relayed over multiple wireless links. Therefore, theSUs in a MHCRN have to coordinate themselves in adistributed fashion [48]. MHCRNs have the potential toachieve efficient spectrum usage, interference mitigation,higher throughput and extended coverage [49]. The termMHCRN and a multi-channel network seems to be simi-lar, because both control channel and multi-channel hiddenterminal problems [50] are common to these two networkenvironment. But there are some major differences betweenthese two such as 1) channel availability for each node isvariable for MHCRN whereas it is fixed for multi-channelnetworks, 2) transmission ranges and bandwidths varyin MHCRN forming heterogeneous environment whereasthese two parameters are equal in multi-channel environ-ment. Thus, a multi-hop and a multi-channel environmentjointly form MHCRNs [51].

Figure 4 shows generic OSA MAC design parametersfor each section, that are found in the literature. A genericOSA MAC design structure consists of four portions: (1)inputs; (2) outputs; (3) objectives; and (4) constraints. Dif-ferent input parameters are provided by regulatory author-ities. Under different constraints the OSA MAC protocolsare analyzed and evaluated where protocol performance ismeasured in different metrics in order to produce desiredoutputs.

Author's personal copy

Peer-to-Peer Netw. Appl.

Fig. 4 Generic OSA MACdesign structure

Input Metrics(any combination)

Number of SUs, Number of PUs,

Number of transceivers, Channel sensing procedure,

Protocol type, CC mechanism,

Queueing model, Channel access technique, Channel state information, Channel allocation scheme,

Network environment, Customized network related

parameters.

Output Metrics(any combination)

Aggregate throughput,Optimal number

of sensed channels,Channel access delay,

Packet transmission delay, Blocking probability, Continuty probability,

Interference time, Number of interfered incumbent systems,Successful packettransmission ratio,Collisions per slot,

Collision probability with PUs, Forced termination

Probability.

Constraint (any combination)Interference with PUs,

Adjacent channel interference const, Channel selection/assignment,

Sensing errors, QoS, Delay, Bandwidth, Fairness, Topology, Traffic characteristic, Security.

Objective (any combination)

MaximizeSpectrum utilization,

Channel grabbing, Bandwidth utilization,

Link maintenance,Incumbent protection,

Traffic admission probability,

Acceptable sensingerror probability

Packet delivery ratio, Energy efficiency,

Network connectivity.

MinimizeQueueing delay, Packet

transmission delay, Access delay, System

time for buffering, Join time of SUs,

Collision rate, Sensing overheads,

Communication overheads, Blocking

probability, False alarm and miss

detection probability, Probability of collision

with Pus.

3 Taxonomy of objectives, solution approachesand performance metrics

Taxonomy of OSA MAC protocol objectives for CRNis described in Fig. 5. Depending on different objec-tives, researchers proposed different solution approaches toachieve certain goals.

3.1 Spectrum utilization

One important objective for designing OSA MAC isresourceful usage of unused or under-utilized spectrum.

To achieve this goal based on control channel mecha-nism as discussed earlier, some researchers use dedicatedapproaches while others exploit non-dedicated approaches.For dedicated approach, in [52] a CSMA/CA based MACprotocol is proposed for single channel where a dynamicback-off algorithm is exploited that utilizes the networksituation depending on traffic. Another three-dimensionaldiscrete time Markov chain (DTMC) CSMA/CA MACprotocol is proposed in [53]. Here, the censored Markovchain method is utilized to get the steady state dis-tribution for the evaluation of throughput and accessdelay.

Fig. 5 OSA MAC protocolobjective types

Author's personal copy

Peer-to-Peer Netw. Appl.

For dynamic spectrum utilization, IEEE 802.11 basedMAC protocol is proposed in [54]. Here, reporting, nego-tiation (reduced duration) and data transmission are carriedout immediately during the ongoing time slot. The authorsin [55] proposed a contention based distributed multi-channel MAC where spectrum sensing part is exclusivelyhandled by sensing nodes. The length of contention win-dow is optimized to maximize idle channel utilization. Tosupport spectrum agility along with spectrum utilization,the authors proposed an efficient MAC (OS-MAC) protocolin [56]. Here, group based scheme is utilized to choose bestdata channel based on current traffic.

Another CSMA/CA-based cognitive MAC (SCA-MAC)protocol is proposed in [57]. Here, statistical channel allo-cation is performed based on controlling parameters suchas operating range and channel aggregation. In [58] theauthors proposed a decentralized opportunistic cognitiveMAC (OC-MAC) over CRNs along with WLAN usingalmost identical approach of that in [57]. OC-MAC ismainly based on improved version of cognitive borrow-ing algorithm [59] that has three main attributes: channelselection, connection negotiation and collision avoidance.A well-organized handshaking process and a maximumtransmission duration prediction model keep this protocolaway from generating interference to PUs. Like in [58]to co-exist with legacy users (PUs), dynamic open spec-trum sharing (DOSS) MAC protocol is proposed in [60]. Atri-band approach: control band, data band and busy-toneband, is utilized for channel negotiation, for data transmis-sion and for solving hidden and exposed terminal problemsrespectively.

Under non-dedicated approaches, for efficient spectrumutilization, a distinct channel-hopping based OSA MACprotocol is proposed in [61]. Another common hoppingsequence based protocol called dynamic channel hoppingMAC (DH-MAC), is proposed in [62]. The channel-hoppingsequence maintains a cyclic pattern that is adaptive to theactivity of neighboring PUs, thus avoiding the PU long-timeblocking problem. For spectrum utilization under fadingenvironment, the authors in [63] proposed a throughputoptimization OSA MAC strategy with cross-layer designapproach. A partially observable Markov decision process(POMDP) framework has been utilized for optimal spec-trum sensing and access policies which is evaluated by aniterative approach of linear programming. Table 2 sum-marizes different approaches of OSA MAC protocol forspectrum utilization.

3.2 Protection of incumbent system

The major focus of the OSA MAC policy is how it canexploit unused radio resources and avoid interference toboth PUs and other SUs in CRNs. For the detection and

protection of incumbent systems, a CSMA/CA based dis-tributed cognitive radio MAC (DCR-MAC) protocol isproposed in [64]. Here a reactive, reliable and collision-free reporting procedure with little overhead is presentedto obtain the incumbent system sensing results from theneighbor nodes. A channel status table with explicit andimplicit channel sensing and monitoring using an overhear-ing method is also utilized. Another CSMA/CA based reac-tive multi-channel cognitive MAC protocol (RMC-MAC) isproposed in [65]. A reactive sensing period is included andan efficient recovery scheme based on handoff method ispresented to decrease the forced termination probability thatprovides higher capacity for SUs. Table 3 summarizes dif-ferent approaches of OSA MAC protocol for protection ofincumbent system.

3.3 Spectrum sensing

Spectrum sensing is a key utility for OSA MAC designto avert harmful interference with PUs and discover theavailable spectrum holes for improved spectrum exploita-tion. The following aspects need to be carefully designedand handled regarding spectrum sensing in order to developefficient OSA MAC protocols.

3.3.1 Signal detection schemes

In OSA MAC paradigm, the primary aim is to exploreand exploit spectrum holes i.e., idle PU channels by SUwhenever PUs are not present. Detection of spectrum holesi.e., opportunities can be executed by some type of sig-nal detection techniques. State-of-the-art research in signaldetection schemes are categorized in two major classes:blind and feature detection techniques [66]. In blind detec-tion scheme, the presence or absence of any sort of signalcan be detected without apriori information about PU traf-fic statistics. Energy detection [67–69] is one of the mosttypical examples of blind detection schemes. In the featuredetection technique, a signal can be detected as well as clas-sified to make PU distinction from different SUs signal.It can also differentiate between various types of PU andSU signals. Matched filter [70] and cyclostationarity detec-tion techniques are two most popular examples of featuredetection technique.

3.3.2 PU channel models

While designing OSA MAC, PU behavior and activity aremodeled based on predefined or estimated parameters todevelop optimal spectrum sensing, spectrum sharing andcontrol channel management [71]. In this context, the mostcommonly used PU channel model is Gilber-Eliot channelmode [72]. In particular, this model is suitable for slotted

Author's personal copy

Peer-to-Peer Netw. Appl.

Tabl

e2

Different

approaches

forspectrum

utilizatio

n

Ref.

Objectiv

eSo

lutio

napproach

CCmechanism

Spectrum

sensing

Performance

metric

[52],2

014

Spectrum

utilizatio

nDynam

icback-offalgorithm

Singlechannel

Sensingalgorithm

isnotd

escribed

Throughput

(NoCC)

andperfectsensing

isassumed

[53],2

013

Spectrum

utilizatio

nCensoredMarkovchainmethod

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput,channelaccessdelay

used

forsteady

statedistributio

nandperfectsensing

isassumed

[54],2

009

Spectrum

utilizatio

nReportin

g,negotiatio

n(reduced

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput

duratio

n)anddatatransm

ission

andperfectsensing

isassumed

carriedouto

ntheongoingtim

e

slot

[55],2

013

Spectrum

utilizatio

nSeparatesensingpartexclusively

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Channelutilizatio

nandgrabbing,

handledby

sensors

andperfectsensing

isassumed

blocking

probability

[56],2

008

Spectrum

utilizatio

nGroup

basedapproach

where

each

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput,sessiondelayand

andagility

groupchoose

bestdatachannel

andperfectsensing

isassumed

sessionsharing

basedon

currenttrafficloads

[57],2

007

Spectrum

utilizatio

nStatisticalchannelallo

catio

nDedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput

coupledwith

operatingrange

andperfectsensing

isassumed

andthechannelaggregatio

n

[58],2

008

Spectrum

utilizatio

n,Use

cognitive

borrow

ingalgorithm,

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput

avoiding

interference

awell-organizedhandshaking

andperfectsensing

isassumed

toPU

sprocessandamaxim

umtransm

is-

sion

duratio

npredictio

nmodel

[60],2

005

Spectrum

utilizatio

nby

real-

Atri-band

approach

:control

band,

Dedicated

CCC

Sensingalgorithm

isnotd

escribed

Throughput

timedynamicspectrum

databand

andbusy-toneband

andperfectsensing

isassumed

allocatio

nareutilized

[61],2

008

Spectrum

utilizatio

nDistin

ctchannel-hoppingsequence

Non

dedicatedandnon

Sensingalgorithm

isnotd

escribed

Aggregatethroughput

utilizatio

nglobal(M

ultip

leandperfectsensing

isassumed

rendezvous)CCC

[62],2

010

Spectrum

utilizatio

n,Cyclic

switching

ofhopping

Non

dedicatedandnon

Sensingalgorithm

isnotd

escribed

Aggregatethroughput

PUlong

timeblocking

patte

rnwhich

isadaptiv

eto

global(M

ultip

leandperfectsensing

isassumed

problem

PUsactiv

ityrendezvous)CCC

[63],2

013

Spectrum

utilizatio

nunder

Iterativeapproach

basedon

NodedicatedCCC

Realistic

sensingalgorithm

with

errors

Throughput

fading

environm

ent

POMDPfram

ework

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 3 Different approaches for incumbent protection mechanism

Ref. Objective Solution approach CC mechanism Spectrum sensing Performance metric

[64], 2009 Protection of Reactive reporting from neighbor Dedicated CCC No algorithm, Interference time, number

incumbent nodes and channel-status table no errors are of interfered incumbent

system maintenance with explicit and considered systems, successful packet

implicit sensing and monitoring transmission ratio, access

using an overhearing technique delay.

[65], 2011 Protection of An efficient recovery scheme Dedicated CCC No algorithm, Bandwidth utilization, forced

incumbent based on handoff method by no errors are termination probability

system introducing reactive sensing considered

period

PU structures. When the PU channel state is continuouslytracked using spectrum sensing, the Gilber-Eliot channelmodel results in a hidden Markov model (HMM) [73]. Inthis case the OSA MAC protocol utilizes the HMM frame-work. On the contrary, when there are only partial obser-vations of the PU channel, the model results in a POMDP.In this case, the spectrum sensing and sharing processes aredriven under the POMDP framework.

3.4 Cooperative sensing

Cooperative spectrum sensing is an effective scheme wherelocal sensing results are combined to develop signal detec-tion performance [66]. Cooperative sensing can result insensing overhead such as additional sensing time, delay,energy and functions assigned for cooperative sensingwhich in turn cause performance degradation [74]. In orderto avoid complex hardware, an efficient OSA MAC isproposed in [75] where a novel deterministic sensing pol-icy called allocated-group sensing policy is designed todiscover spectrum opportunities based on a dynamic IDnumbering scheme.

3.4.1 Sensing errors

In general, there are two types of spectrum sensing errors:1) False alarm: This happens when an idle channel is rec-ognized as busy. Hence, a spectrum opportunity will besquandered, 2) Miss detection: This occurs when a busychannel is recognized as idle, thus causing collision withPUs. Both these spectrum sensing errors need to be takeninto account in efficient OSA MAC design. Consideringimperfect spectrum sensing, the authors of [76] proposedan OSA MAC protocol with two spectrum sensing policies:memoryless sensing policy and improved sensing policy.In order to effectively address spectrum sensing error, theauthors of [77] exploited a control transceiver attached tothe with sensors that effectively improves spectrum sensingaccuracy and carefully handles interference with PUs. The

design of optimal frame duration, sensing time and MACrandom access on frame-by-frame basis under imperfectsensing is addressed in [78].

3.4.2 Sensing stopping rule

SU needs to pay careful attention and instantaneous deci-sion when to stop sensing. The sensing process can be endedbased on several criteria: 1) when an idle or a predefinednumber of unused PU channels is discovered, 2) when theassessment of spectrum availability crosses certain thresh-old, 3) when the energy consumption for sensing purposegoes above the permitted level. A decentralized multi-channel cognitive MAC (HC-MAC) is proposed in [37]considering the hardware constraints (e.g., single radio,partial spectrum sensing and spectrum aggregation limit)into consideration. This protocol also integrates sensingand transmission overhead for intelligent spectrum sensing.Based on optimal sensing decision, a k-stage look-aheadmethod is used to formulate an optimal stopping rule withreduced overhead.

3.4.3 Learning capabilities

Learning is a general term that can be integrated into sens-ing scheme to improve system performance. The sensingschemes can be categorized based on learning capabilitiessuch as non-learning or learning approach. In non-learningapproach, spectrum sensing is carried out without consid-ering previous knowledge on spectrum availabilities andopportunities. In learning approach, sensing is performedbased on historical data and feedback results that are used togain knowledge on PU channel structure and traffic parame-ters such as state probabilities, state transition probabilities,activities of belief vectors of PU channels etc. Typicalexample of learning based sensing approach is myopic sens-ing. In [79] the authors proposed a decentralized cognitiveMAC where a decision-theoretic approach is adopted basedon POMDP. In order to design general primary network

Author's personal copy

Peer-to-Peer Netw. Appl.

models both for slotted and un-slotted structures, in [80]the authors proposed blind cognitive MAC protocols basedon augmented whittle index strategy of [81] without apri-ori knowledge about the statistics of the primary traffic.To overcome limitations in spectrum sensing, the authorsin [82] proposed a distributed MAC protocol with one-slotmemory where SUs adjust their transmission parametersbased on the local history of their own transmission actionsand feedback information. To make full use of the pastsensing and access experiences to optimize current chan-nel access, the authors of [83] proposed a decentralizedMAC protocol based on SARSA (state, action, reward, state,action) under POMDP framework. SARSA is a kind ofimportant reinforcement learning algorithm [84, 85] whichhas a self-learning and online learning ability and does notrequire the channel state transition probability of the pri-mary network. Table 4 summarizes different approachesof OSA MAC protocol regarding spectrum sensing relatedissues.

3.5 Channel access issues

Interference free dynamic channel access while meeting allcommunication requirement is the most crucial aspect ofCRNs. For dynamic channel access, a residual white spacedistribution based cognitive MAC (RWS-CMAC) is pro-posed in [86]. For efficient spectrum access as well as toprotect PU activity, a CR-CSMA/CA based MAC protocolis proposed in [87]. A prepare-to-sense frame is incor-porated with conventional RTS/CTS scheme to performasynchronous spectrum sensing and a blocking method isproposed to toil together with the traditional exponentialbackoff method. In order to address fairness issue of chan-nel access in [88], the authors presented a priority basedmulti-channel OSA MAC under Markov chain framework.The authors in [89] developed a CSMA/CA based multi-channel MAC protocol to prevent adjacent-channel inter-ference in channel access. A guard-band-aware sequentialfixing linear program channel assignment algorithm is inte-grated to reduce the quantity of necessary guard channelsfor a given transmission by utilizing adjacent channels andalready reserved guard channels. Table 5 summarizes dif-ferent approaches of OSA MAC protocol regarding channelaccess issues.

3.6 Avoiding the use of dedicated CC

In order to avoid the drawbacks of dedicated CC men-tioned earlier, researchers have, proposed different protocoldesigns. In [36] a two level carrier sensing - multiple accesscollision avoidance (CS-MACA) protocol based on slowcommon hopping (SH-MAC) is proposed for a coordinator-based CRN. In [90] a concurrent access MAC (CA-MAC)

based on split phase MAC protocol is proposed. Here, twochannel lists are exploited, namely 1) sorted channel list forgiving high priority to common channels and, 2) commonchannel list for faster reservation to reduce channel accessdelay.

To overcome the shortcomings of dedicated global CCC,the authors in [91] proposed a decentralized multi-channeladaptive medium access control (AMAC) protocol. Here,channel indexing based on available bandwidth, adaptedrate, channel condition, channel reliability and dual chan-nel usability, is utilized for most reliable CCC. In anotherinteresting approach, a simple learning based on decentral-ized MAC is proposed in [92]. This MAC utilizes multi-channel preamble reservation scheme with multichannelcarrier sensing principle and distributed channel selectionalgorithm.

On the same line, a novel decentralized multi-channelcognitive MAC (C-MAC) is proposed in [44] that uti-lizes the concept of rendezvous channel (RC) which ischosen dynamically based on the reliability of the avail-able channels. Here, backup channel (BC) is exploited formore robust RC to incumbents which can be determinedby in-band and out-of-band measurements via quiet periods(QPs). The authors in [44] did not take the full advantage ofdedicated beacon period for collision avoidance during datatransmission. Addressing this oversight, an efficient dynam-ically adjusting MAC (EDA-MAC) protocol for CRNs isproposed in [93]. In order to address slot-asynchronous ren-dezvous issue, a MAC protocol is designed in [94] with anovel RTS/CTS handshake scheme during channel hoppingprocess. An optimal time slot in terms of the shortest timeto handshake, is also devised.

In order to avoid dedicated CC, a novel stochasticmedium access (SMA-MAC) is proposed in [95]. Simi-larly, a MAC based on dynamic Markov-chain monte-carloapproach is proposed in [96]. A power controlled distributedRTS/CTS exchange scheme is also designed including con-tention resolution and data fragmentation methods for mini-mizing interference to PUs. In order to provide an enhancedmethod for idle channel selection in the NDCC approach,the authors of [97] proposed a MAC protocol where a chan-nel status table (CST) is formed. This is done by sortingand ranking of the channel according to the availability.The highest ranked CC is selected as CCC and the secondhighest CC is selected as data channel.

In order to improve the coexistence of PUs and SUsin CRNs, a novel opportunistic periodic MAC protocol(OP-MAC) is proposed in [98]. Here, the SU uses both slot-structured channels and slot-unstructured channels periodi-cally to sense channels, report channel states and exchangecontrol signals in a NDCC approach. An analytical modelin terms of channel utility, capacity and PU delay for anON/OFF channel scenario based on renewal theory [99] is

Author's personal copy

Peer-to-Peer Netw. Appl.

Tabl

e4

Different

approaches

regardingspectrum

sensingrelatedissues

Ref.

Objectiv

eSo

lutio

napproach

CCmechanism

Spectrum

sensing

Performance

metric

[75],2

009

Cooperativ

espectrum

Asensingalgorithm

based

Dedicated

localC

CC

Sensingalgorithm

and

Throughput,sensingduratio

n,

sensingmethod,

onallocatedgroupsensing

errorsareconsidered

optim

alnumberof

sensed

interference

constraint

policyby

dynamicID

channels

tothePU

snumbering

scheme

[77],2

012

Sensingalgorithm

and

Mem

orylesssensingpolicy,

Dedicated

CCC

Sensingalgorithm

and

Throughput,Collision

errors,P

Uprotectio

nandim

proved

sensingpolicy

errorsareconsidered

probability

with

PUs

constraints

andadjustingcontentio

n

windows,back-offduratio

ns

andaccess

probabilities

[76],2

009

Sensingerroranddelay,

Control

transceiverattached

Dedicated

CCC

Sensingalgorithm

isnot

Throughput,Collisionprobability

interference

constraint

with

sensors

describedbuterrors

with

PUs,maxim

umacceptable.

tothePU

sareconsidered

sensingerrorprobability

[78],2

009

Spectrum

sensingandaccess,

Contin

uous-tim

eMarkovchain

Singlechannel(no

CC)

Sensingalgorithm

isnot

Achievablethroughput,F

alse

PUprotectio

nconstraints

modelbasedon

sensingthroughput

describedbuterrorsare

alarm

probability

trade-offto

optim

izefram

eduratio

n,considered

sensingtim

eandp-persistent

CSM

A

underinterference

constraint

[37],2

008

Spectrum

sensingandaccess

Ak-stagelook-ahead

methodisused

Dedicated

CCC

Sensingalgorithm

anderrors

Throughput

with

hardwareconstraints

toform

ulatean

optim

alstopping

rule

arenotconsidered

basedon

optim

alsensingdecision

ofasecondarytransm

ission

pair

[79],2

007

Dynam

icspectrum

sensing,

POMDPfram

eworkthatincorporates

Synchronoushopping

Sensingalgorithm

isnot

Throughput,spectrum

efficiency

avoiding

theuseof

dedicated

aspectrum

occupancymodelanda

describedbuterrors

CCC,incum

bent

protectio

nsuboptim

alstrategy

with

reduced

areconsidered

mechanism

complexity

basedon

greedy

approach

[80],2

009

Generalprim

arynetworkmodels,

Blin

dMACprotocolsbasedon

NodedicatedCCC

Sensingalgorithm

isnotd

escribed

Throughput

avoiding

theuseof

dedicated

augm

entedWhittleindexstrategy

buterrorsareconsidered

CCC,incum

bent

protectio

nwith

outa-prioryknow

ledge

mechanism

ofPU

traffic

[82],2

011

Spectrum

sensingandsharing,

Use

ofone-slot

mem

oryto

obtain

Singlechannel(no

CC)

Sensingalgorithm

isnotd

escribed

Channelutilizatio

nrate

interference

constraint

tothePU

sdecision

inform

ationin

lasttheslot

buterrorsareconsidered

[83],2

012

Spectrum

sensingandsharing

Makefulluseof

pastsensing

Noinform

ation

Sensingalgorithm

anderrors

Throughput,collisionsperslot,

access

experience

arenotconsidered

spectrum

efficiency

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 5 Different approaches regarding channel access issues

Ref. Objective Solution approach CC mechanism Spectrum sensing Performance metric

[86], 2013 Dynamic channel access, An algorithm using FSM for Dedicated CCC Sensing algorithm Throughput, sensing

PU interference constrain sensing schedule generation is considered but overhead

for data channel and channel selection errors are

considered

[87], 2013 Channel access, A prepare-to-sense frame is Realistic CCC Sensing algorithm Throughput, packet

incumbent protection incorporated to perform adopted by is not described service time, packet

mechanism asynchronous spectrum guaranteed but errors are delay

sensing and a blocking access model considered

method is proposed with

exponential back-off

mechanism

[88], 2009 Fairness issue Markov chain framework Dedicated CCC Sensing algorithm Aggregate throughput,

where priority is set based and errors are not packet transmission

on volume and urgency of considered delay

traffic to adjust contention

window

[89], 2014 Adjacent-channel Integrate guardband-aware Dedicated CCC Sensing algorithm Spectrum efficiency,

interference channel assignment and errors are not throughput, blocking

algorithm considered rate, energy

consumption

also developed. Table 6 summarizes different approaches ofOSA MAC protocol that avoid the use of dedicated CCC.

3.7 Reliable control channel assignment

Since CC establishment is challenging due to differentaspects such as coverage, saturation and security [46],some researchers propose a hybrid approach to balancethese shortcomings. In [38], a novel dynamic de-centralizedhybrid DDH-MAC protocol is proposed. This is designedwith the best attributes of global common control chan-nel (GCCC) but avoid the saturation and security issuesof GCCC by being non-GCCC algorithm. This protocolpartially utilizes GCCC to broadcast a beacon frame thatcontains information about primary control channel (PCCH)for control message exchange and backup control channel(BCCH) when a PU disrupts PCCH. Another interestinghybrid MAC protocol based on 802.11 DCF is proposedin [100]. Here, both common control channel and channelhopping schemes are utilized for reliable CCs assignment.Another hybrid MAC protocol that works between in-bandand out-of-band CCC, is proposed in [101] to improvethe performance of CRNs with respect to CR node syn-chronization, multi-channel hidden terminal and networkconnectivity time. This provides a trade-off between in-band CCC-MAC protocols with higher PU free channelsand saturated unlicensed out-of band CCCMAC protocols.

Table 7 summarizes different approaches of OSA MACprotocol that provide reliable control channel assignment.

3.8 Spectrum mobility

Characterizing spectrum mobility of CRNs is a challengingtask because of the heterogeneous environment. The mainpurpose of spectrum mobility is to carry out seamless spec-trum switching while maintaining ongoing SU transmission.Therefore, spectrum mobility can be envisioned as a combi-nation of two processes: spectrum handover and connectionmanagement. These can be broadly categorized as eithercontinuing on the same channel (buffering) or switch overto a new vacant channel (switching) as soon as PU reclaimsthe channel temporarily occupied by SU. In [67] the authorshave described MAC protocols for CRNs into two majorclasses according to how the SU deals with the suddenappearance of the PU: buffering and switching. In [68],the authors extended the work by introducing the collab-orative spectrum sensing process. Energy detection basedspectrum sensing architecture is decomposed into layersin [102], where each layer is parameterized and, classified.A novel protocol called truncated time division multipleaccess (TTDMA) is proposed that supports efficient distri-bution of sensing results using K-out-of-N fusion rule [103].In order to handle sudden PU appearance efficiently withBC, a new contention-based multi-channel MAC protocol

Author's personal copy

Peer-to-Peer Netw. Appl.

Tabl

e6

Different

approaches

thatavoidtheuseof

dedicatedCCC

Ref.

Objectiv

eSo

lutio

napproach

CCmechanism

Spectrum

sensing

Performance

metric

[36],2

012

Avoidingtheuseof

dedicatedCCC

TwolevelC

S-MACAoperation

NodedicatedCCC

Sensingalgorithm

and

Aggregatethroughput,

basedon

slow

common

hopping

errorsarenot

packetdelay

forCoordinator-based

CRN

considered

[90],2

013

Avoidingtheuseof

dedicatedCCC

Concurrentm

ultip

leaccess

basedon

NodedicatedCCC

Sensingalgorithm

and

Throughput,channel

split

phasewhere

sorted

channellist

errorsarenot

access

delay,network

isused

forprioritized

control

considered

connectiv

ity.

message

exchange

andcommon

channellistfor

faster

reservation

[91],2

009

Avoidingtheuseof

dedicatedCCC

Channelindexing

basedon

available

NodedicatedCCC

Sensingalgorithm

and

Aggregatethroughput,

bandwidth

formostreliableCCC

errorsarenotconsidered

networkconnectiv

ity[92],2

010

Avoidingtheuseof

dedicatedCCC

Multi-channelp

ream

blereservation

NodedicatedCCC

Sensingerrorsarenot

Normalized

throughput,

schemewith

multichannelcarrier

considered

packetdeliv

eryratio

sensingprincipleanddistributed

channelselectio

nalgorithm

[44],2

007

Avoidingtheuseof

dedicatedCCC,

Dynam

icRCbasedon

reliabilityand

Dynam

icRC

Sensingalgorithm

and

Aggregatethroughput

incumbent

protectio

nmechanism

useof

BCby

in-bandandout-of-band

errorsarenotconsidered

measurementsviaQPs

[93],2

010

Avoidingtheuseof

dedicatedCCC,

Use

ofdynamically

adjusted

signaling

Dynam

icRC

Sensingalgorithm

and

Join

time,throughput

incumbent

protectio

nmechanism

sslots,dedicatedbeacon

slot

and

errorsarenotconsidered

leader

selectionapproach

[95],2

011

Avoidingtheuseof

dedicatedCCC,

Anovelstochastic

schemebasedon

NodedicatedCCC

Sensingalgorithm

isnot

Accessfailu

rerate,access

incumbent

protectio

nmechanism

sMarkov-Chain

Monte-Carlo

approach

considered

buterrorsare

overhead,throughput,

andapower

controlledRTS/CTS

considered

packetdelay

exchange

mechanism

with

contentio

nresolutio

nanddatafragmentatio

n

method

[94],2

014

Avoidingtheuseof

dedicatedCCC,

AnovelR

TS/CTShandshakescheme

Blin

dRC

Sensingalgorithm

and

Expectedtim

eto

slot-asynchronousrendezvous

during

channelh

opping

processwith

errorsarenotconsidered

handshake

optim

altim

eslot

interm

sof

shortest

timeto

handshake

[97],2

011

Avoidingtheuseof

dedicatedCCC,

Achannelstatustableisused

andhighest

NodedicatedCCC

Sensingalgorithm

and

Aggregatedthroughput,

incumbent

protectio

nmechanism

s,ranked

CCisselected

asCCCand

errorsarenotconsidered

packetdelay,

channelselectio

nsecond

highestC

Cas

datachannel

connectiv

ityaccordingto

availability

[98],2

010

Avoidingtheuseof

dedicatedCCC,

SUscooperateperiodically

tosensechannels,

NodedicatedCCC

Sensingalgorithm

and

Channelutility

and

coexistenceof

PUsandSU

sin

CRNs

reportchannelstatesandexchange

control

errorsarenotconsidered

capacity

signalsin

aNDCCapproach

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 7 Different approaches that provide reliable control channel assignment

Ref. Objective Solution approach CC mechanism Spectrum Performance

sensing metric

[38], Reliable Hybrid between GCCC and non-GCCC families, Hybrid approach Sensing Pre-transmission time

2011 control channel partial use of GCCC to broadcast beacon that contain algorithm and

assignment information about PCCH, BCCH and multiple levels errors are not

of secure transmission using dedicated local CC considered

[100], Reliable Hybrid protocol of using CCC and channel hopping Hybrid approach Sensing Throughput, collision

2012 control channel where multiple control channels are used indepen- algorithm and rate, connectivity

assignment dently for channel negotiation and channel hopping errors are not

is executed only for control channels considered

[101], Reliable Hybrid between in-band and out-of-band CCC with Hybrid approach Sensing Aggregate

2014 control channel respect to CR node synchronization, multi-channel algorithm and throughput, packet

assignment hidden terminal and network connectivity time errors are not delay

considered

named opportunistic spectrum access with backup channel(SWITCH) is developed in [104]. To cope with the appear-ance of the PUs, another unaided rendezvous, asynchronousand contention-based multi-channel MAC protocol namedopportunistic spectrum access with backup channel andbuffered data with resume (OSA-BR) is proposed in [69].To combat the major drawbacks associated with CCC,this protocol exploits the blind rendezvous algorithm [105]under the PUs activities where all channels are availablefor exchanging information and establishing data commu-nications. Table 8 summarizes different approaches of OSAMAC protocol for spectrum mobility.

3.9 Analysis of delay and quality of service (QoS)provisioning

QoS provisioning is essential for satisfactory service, espe-cially in a multimedia environment where different mediashave difference attributes. For, example real time voice

communications is very sensitive to delay. Hence, delayis another significant metric for designing OSA MAC. Itincorporates queueing delay and transmission delay. Themain aim of QoS provisioning in OSA MAC design isto guarantee a minimum delay, reduction in jitter andpacket loss. Different researchers have dealt this problemdifferently. In [106] the authors focused on SUs queue-ing delay analysis based on a stochastic fluid queueapproximation approach [107]. The system is mod-eled using Poisson driven stochastic differential equa-tions and characterized the moments of the queuelengths of SUs. In order to optimize transmission delayperformance considering traffic characteristics of SUs,the authors of [108] proposed contention based multi-channel OSA MAC protocol. This protocol exploitsresource reservation mechanism to improve QoS require-ments that support important data traffic transmission ofSUs for some successive time slots without interferingPUs.

Table 8 Different approaches for spectrum Mobility

Ref. Objective Solution approach CC mechanism Spectrum sensing Performance

metric

[67], Handling sudden Use buffering or switching Both DCC and HCC Energy detection is used but Throughput

2010 appearance of PUs errors are not considered

[68], Handling sudden Joint spectrum sensing and use Both DCC and HCC Energy detection is used and Throughput

2011 appearance of PUs buffering or switching errors are considered

[104], Handling sudden Use backup channel Dedicated CCC Cooperative sensing but algo- Throughput

2012 appearance of PUs rithm and no errors are not con-

sidered

[69], Handling sudden Use backup channel and No dedicated CCC, Energy detection is used but Throughput, dropping

2014 appearance of PUs buffered data to resume use blind rendezvous errors are not considered. probability, commu-

algorithm nications overhead

Author's personal copy

Peer-to-Peer Netw. Appl.

To improve the delay-QoS provisioning over CRNs,the authors of [109] proposed cross-layer based oppor-tunistic multi-channel MAC protocol. Two collaborativespectrum-sensing policies, the random sensing policy andthe negotiation-based sensing policy, are also proposed toattain the channel state correctly. Markov chain model andM/GY /1-based queueing model are exploited to charac-terize the protocol performance for both saturated networkand un-saturated network settings. A throughput analysis isperformed in [110] in the presence of saturated traffic byutilizing buffering and switching policies [68]. The authorsalso provide a comprehensive delay and queuing analysisunder unsaturated traffic.

In [111] a throughput aimed MAC (T-MAC) with QoSprovisioning and a power control scheme that renders im-proved space reuse efficiency are proposed based onTDMA slot assignments. For efficient channel access, anopportunistic spectrum access MAC (OSA-MAC) is pro-posed in [112] that utilizes the idea of power savingmechanism (PSM) in 802.11 DCF. Two channel selec-tion schemes are included, namely uniform channel selec-tion and spectrum opportunity-based channel selection. Theauthors in [113] provide some improvements over previouswork where 1) the broadcast mechanism avoided colli-sion resulting from several communication pairs selectingthe samel channel and 2) an innovative contention schememade all SUs to possess the same opportunity for datatransmission.

For efficient spectrum utilization and QoS provision-ing of delay sensitive applications, in [114], an oppor-tunistic multi-channel MAC (OMC-MAC) for distributedCRNs is proposed. Here, a method for calculating priori-tized applications during channel reservation is exploited todesign admission control modules. In order to support datarate sensitive applications for QoS provisioning, a novelCSMA/CA-based multichannel cognitive radio mediumaccess control (MCR-MAC) protocol is devised in [115].Here, IEEE 802.11 DCF is modified to dynamically assignavailable channels to SUs by an inventive random arbitra-tion scheme. The authors in [116] provide an improvementof MCR-MAC protocol by incorporating packet size varia-tion in accordance with the level of PUs distraction to limitinterference.

For efficient spectrum usage and QoS provisioning, agroup based MAC protocol is proposed in [117] where,SUs are split into a number of non-overlapping groups. Theexisting channels are shared among these groups accord-ing to their bandwidth requirements. In order to maintainefficient wireless link establishment and reliable transmis-sion for QoS provisioning, an orthogonal frequency divi-sion multiple access (OFDMA) based cross layer MACprotocol (LM-MAC) is proposed in [118] where a fatherspectrum list (FSL) with different functional sub-channels

like redundant sub-channels (RSC), backup sub-channels(BSC) and data sub-channels (DSC), are devised to compen-sate packet loss and enhance channel quality. Three accessmechanisms, first access, continuous access and intermittentaccess, are adopted and a quasi-synchronous access algo-rithm (QSAA) [119] is used to avoid direct contention overCCC directly after sensing process. Table 9 summarizes dif-ferent approaches of OSA MAC protocol for delay analysisand quality of service (QoS) provisioning.

3.10 Multi-hop communication

Most of the OSA MAC protocols found in the literature areproposed for single hop domain. There are some approachesin the literature where the authors especially focus onmulti-hop domain for OSA MAC protocol. A common-hopping-based MAC protocol called synchronized MAC(SYN-MAC) is proposed in [120] for multi-hop CRNsthat is pertinent in heterogeneous environment. The ideabehind the protocol is to divide the total time into groupsof fixed time slot where number of slots represent num-ber of available channels. Using synchronized time slots, allSUs negotiate for a channel to exchange control informationwhich can vary with time and the following data transmis-sion occurs in asynchronous fashion using random channelaccess schemes. In order to address interference-dependentcontention resolution problem for OSA MHCRNs, a newoptimal cross-layer cognitive MAC (OCC-MAC) frame-work is proposed in [121]. This protocol incorporatesfew auxiliary variables that are interpreted as interferenceweights and noisy channel estimations. Table 10 sum-marizes different approaches of OSA MAC protocol formulti-hop communication. Table 11 shows characteristicfeatures based on classification of CR MAC protocol thatare described in the literature. Since the focus of this paper ison decentralized overlay approaches, other features such aschannel usage strategy, access method, allocation behavior,number of RFEs and network topology of MAC protocolsare summarized to provide a clear outlook regarding thoseaspects.

4 Standardization endeavor regarding CR-MACengineering

There has been significant and momentous developmentin the spectrum regulation paradigm to tackle the grow-ing demand for radio communication provisions during thepast few years. The regulatory and standardization authori-ties, such as international telecommunications union (ITU),IEEE, and European telecommunications standards institute(ETSI), have arranged abundant consultations, accumulatedconcerns and proposals regarding various CR usages, that

Author's personal copy

Peer-to-Peer Netw. Appl.

Tabl

e9

Different

approaches

fordelayAnalysisandQoS

provisioning

Ref.

Objectiv

eSo

lutio

napproach

CC

Spectrum

sensing

Performance

metric

mechanism

[106],

Queueingdelayperfor-

Adaptivealgorithm

basedon

stochastic

Noinform

a-Sensingalgorithm

Queueingdelay,traf-

2012

mance

ofSU

sfluidqueueapproxim

ation

tion

anderrorsnotare

ficadmission

proba-

considered

bility

[108],

Transmission

delaycon-

Resourcereservationincorporatingback-

Dedicated

Sensingalgorithm

Transmission

delay

2012

sidering

trafficcharacter-

offmechanism

CCC

anderrorsnotare

istic

sof

SUs(Q

oS)

considered

[109],

Throughputand

delay

MarkovchainmodelandM/G

Y/1-based

Dedicated

Sensingerrorsarenot

Throughput,packet

2008

analysisforQoS

queueing

modelareexploitedunderran-

CCC

considered

transm

ission

delay

provisioning

dom

sensingpolicyandnegotiatio

n-based

sensingpolicy

[110],

Delay

andqueueing

anal-

Queue

occupancyMarkovChain

model

Dedicated

Sensingalgorithm

System

time

2015

ysisforbufferingand

andaservicecycleanalysisbasedon

CCC

anderrorsnotare

switc

hing

Geom/M

/1queue

considered

[111],

QoS

provisioning

StrictTDMAslot

synchronization,

power

Dedicated

Sensingalgorithm

Throughput,access

2010

controlschem

e,protectio

nof

dataand

CCC

anderrorsnotare

delay

controlp

acketsby

exclusiveACKfram

esconsidered

[112],

QoS

provisioning

Uniform

channelselectio

nandspectrum

Dedicated

Sensingalgorithm

isThroughput,collision

2008

opportunity

-based

channelselectio

nare

CCC

notconsideredbuter-

probability

with

PUs

used

alongwith

PSM

in802.11

DCF

rorsareconsidered

[113],

Spectrum

utilizatio

n,QoS

Broadcastmechanism

,innovativecon-

Dedicated

Sensingalgorithm

isThroughput

2009

provisioning

tentionscheme

CCC

notconsideredbuter-

rorsareconsidered

[114],

QoS

provisioning

ofdelay

Prioritized

applications

during

channel

Dedicated

Sensingalgorithm

isThroughput,collision

2011

sensitive

applications

reservation

CCC

notconsideredbuter-

probability

with

PUs

rorsareconsidered

[116],

QoS

provisioning

fordata

Random

arbitrationschemeby

modify-

Nodedicated

Sensingalgorithm

Throughput,collision

2012

ratesensitive

applications,

ingthe4-way

handshakingbasedIEEE

CCC

anderrorsnotare

probability

with

PUs

incumbent

protectio

n802.11

DCFandpacketsize

variation

considered

mechanism

sbasedon

PUsinterruptio

nto

limitinter-

ference

[117],

Spectrum

utilizatio

nand

Dynam

icchannelallo

catio

nby

group

Dedicated

Sensingalgorithm

Throughput

2008

QoS

provisioning

basedarchitectureconsideringbandwidth

CCC

anderrorsnotare

requirem

ents

considered

[118],

QoS

provisioning

forlin

kThree

access

mechanism

sandFS

Lalong

Dedicated

Cooperativ

esensing

Saturatio

n2015

maintenance

with

differentfunctionalsub-channelsare

CCC

isappliedandsensing

throughput,access

designed

errorsareconsidered

delay,continuity

prob

ability

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 10 Different approaches for multi-hop communication

Ref. Objective Solution approach CC Spectrum Performance metric

mechanism sensing

[120], Avoiding the use of dedi- Common-hopping-based hybrid channel ac- No Sensing Aggregate throughput,

2008 cated CCC, spectrum het- cess where control message exchange follows dedicated algorithm and network connectivity.

erogeneity synchronized slotted transmission and data CCC errors not are

exchange use un-synchronized random access considered

[121], Channel contention reso- A distributed solution using some auxiliary Dedicated Sensing Social welfare, PU target

2013 lution, incumbent protec- variables that are interpreted as interference CCC algorithm and collision probability, fair-

tion mechanism, fairness weights and noisy channel estimations errors not are ness index

issue considered

lead towards the evolution of standardization and technicalresolutions.

The IEEE 802.22WRAN standard [122] defines the poli-cies and procedures for the operation in spectrum allocatedto the television broadcasting service in the frequency rangeof 54 MHz to 862 MHz. It includes the MAC and PHYlayer of the fixed and portable point-to-multipoint WRANsthat integrate CR technology. Recently, there have been twoamendments of the standard, i.e. the IEEE 802.22a and theIEEE 802.22b amendments to further enhance it [123]. TheIEEE 802.22 standard and its two amendments describe thecognitive capabilities that are attained by utilizing a spec-trum manager along with the functionalities such as spec-trum sensing, channel set management, incumbent databaseservice and geo-location management, and self-co-existencemechanism. It also includes enhanced broadband services(e.g. remote medical service) and monitoring use (e.g. smartgrid).

The IEEE 802.11af standard [8] is aimed to allow IEEE802.11 wireless local area networks (WLANs) to be uti-lized in white spaces of the RF spectrum. The added featuresof IEEE 802.11af are devised to offer geolocation databaseaccess to previously unavailable, unused or under-used fre-quencies. The amendment to IEEE 802.11 establishes aglobal standard with a new cognitive radio tool for theirspectrum-sharing toolbox that allow users worldwide tomake use of unused or under-used spectrum, based onlocation and time of the day.

The regulatory arrangements such as authorized sharedaccess (ASA) [124] and licensed shared access (LSA) [125]provide a controlled framework for spectrum sharing, thatincreases spectrum utilization in an authentic way. The LSAconcept is a complementary approach that may take use ofCR technology to adapt to the varying spectrum availabil-ity, particularly in the form of a geolocation database [126].The LSA concept has been successfully applied with alive LTE network in the 2.3 GHz shared band [12] butthe first standardization studies are done by ETSI that arereported in [11]. LTE or the E-UTRAN (evolved universal

terrestrial access network), introduced in the third gener-ation partnership project (3GPP) release 8 (Rel-8) [127].This is the access part of the evolved packet system (EPS).Note that the main requirements for the new access net-work are high spectral efficiency, high peak data rates,short round trip time as well as flexibility in frequency andbandwidth. Compared to the legacy technologies such asLTE Rel-8, LTE-advanced release 10 (Rel-10) [127], tar-gets the achievement of 1 Gb/s downlink and 500 Mb/suplink throughput [128]. The performance improvements ofLTE-advanced are achieved with advanced physical layertechniques including enhanced interference coordinationtechniques, and enhanced multiple-antenna schemes [129].Thus 3GPP’s potential efforts towards LTE-advanced, areexpected to be the dominating standard on the mobile com-munication system in near future. The carrier aggregation(CA) features of LTE-A can be exploited for enabling a cog-nitive operation in a subset of component carriers [130].Using CA, an operator can aggregate up to 5 component car-riers of 20 MHz each [131], thus cognitive spectrum sharingbecomes particularly interesting in the context of CA inLTE-A systems.

The IEEE 802.15 task group 4m (TG4m) [13] isemployed to specify a physical layer for 802.15.4 and todevelop and add functional operations to the existing stan-dard 802.15.4-2006 MAC meeting the TV white space reg-ulatory requirements. The amendment enables operation inthe available TV white space, supporting typical data ratesin the order of 40 kbps-2000 kbps, to recognize optimal andpower efficient communication in large scale command andcontrol applications.

5 Future research directions

Ongoing research focuses on improving the performance ofthe OSA-MAC protocols for CRN. We discuss some of themajor topics in this domain. Figure 6 shows the potentialroadmap of OSA MAC schemes for CRNs.

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 11 Taxonomy of OSA MAC protocol characteristic features

Ref. Usage strategy Access method Allocation RFEs Topology

behaviour

[52], 2014 Single channel Hybrid Non-cooperative Single radio Single hop

[53], 2013 Single and Hybrid Non-cooperative Single and two radios Single hop

multi-channel

[54], 2009 Multi-channel Hybrid Non-cooperative Two radios Single hop

[55], 2013 Multi-channel Hybrid Non-cooperative Two radios Single hop

[56], 2008 Multi-channel Hybrid Cooperative Single half-duplex Single hop

[57], 2007 Multi-channel Contention-based(CSMA/CA) Non-cooperative Two radios Single hop

[58], 2008 Multi-channel Hybrid Non-cooperative Two radios Single hop

[60], 2005 Multi-channel Contention-based Non-cooperative Threeo radios Single hop

(non-persistent CSMA)

[61], 2008 Multi-channel Time-slotted(Channel hopping) Non-cooperative Single radio Single hop

[62], 2010 Multi-channel Hybrid Non-cooperative Single radio Single hop

[63], 2013 Single channel Time-slotted Non-cooperative Single radio Single hop

[64], 2008 Multi-channel Contention-based(CSMA/CA) Non-cooperative Single radio Single hop

[65], 2011 Multi-channel Hybrid Non-cooperative Two half-duplex-radios Single hop

[75], 2009 Multi-channel Time-slotted Cooperative Single radio Single hop

[76], 2012 Multi-channel Hybrid Non-cooperative Two radios Single hop

[77], 2012 Multi-channel Hybrid Non-cooperative Two radios Single hop

[78], 2009 Single channel Hybrid Non-cooperative No information Single hop

[37], 2008 Multi-channel Contention-based(CSMA/CA) Non-cooperative Single half-duplex radio Single hop

[79], 2007 Multi-channel Hybrid Non-cooperative Single radio Single hop

[80], 2009 Single and Time-slotted Non-cooperative Single radio Single hop

multi-channel

[82], 2011 Single channel Time-slotted Non-cooperative Single radio Single hop

[83], 2012 Multi-channel Time-slotted Non-cooperative Single radio Single hop

[86], 2013 Multi-channel Time-slotted Non-cooperative Two radios Single hop

[87], 2013 Single and Contention-based(CSMA/CA) Non-cooperative No information Single hop

multi-channel

[88], 2009 Multi-channel Contention-based Cooperative Two radios Single hop

(p-persistent CSMA)

[89], 2014 Multi-channel Contention-based(CSMA/CA) Cooperative Single half-duplex radio Single hop

[36], 2012 Multi-channel Contention-based(CS-MACA) Cooperative Single radio Single hop

[90], 2013 Multi-channel Time-slotted Non-cooperative Two radios Single hop

[91], 2009 Multi-channel Contention-based(CSMA/CA) Non-cooperative No information Single hop

[92], 2010 Multi-channel Contention-based(CSMA) Non-cooperative Single half-duplex Single hop

[94], 2014 Multi-channel Hybrid Non-cooperative Single half-duplex Single hop

[98], 2010 Multi-channel Contention-based(CSMA/CA) Cooperative Single Radio Single hop

[38], 2011 Multi-channel Contention-based(CSMA/CA) Non-cooperative Two half-duplex radios Single hop

[100], 2012 Multi-channel Contention-based(CSMA/CA) Non-cooperative No information Single hop

[101], 2014 Multi-channel Time-slotted Non-cooperative Single half-duplex Single hop

[67], 2010 Multi-channel Time-slotted Non-cooperative Single radio Single hop

[68], 2011 Multi-channel Time-slotted(TTDMA) Cooperative Single radio Single hop

[104], 2012 Multi-channel Contention-based(CSMA/CA) Cooperative Two radios Single hop

[69], 2014 Multi-channel Contention-based(CSMA/CA) Cooperative No information Single hop

[106], 2012 Multi-channel Contention-based(Slotted ALOHA) Non-cooperative Single and two radios Single hop

[108], 2012 Multi-channel Contention-based(CSMA/CA) Non-cooperative Two radios Single hop

[110], 2015 Multi-channel Time-slotted(Slotted ALOHA) Non-cooperative Single radio Single hop

Author's personal copy

Peer-to-Peer Netw. Appl.

Table 11 (continued)

Ref. Usage strategy Access method Allocation RFEs Topology

behaviour

[111], 2010 Multi-channel Time-slotted Non-cooperative Single half-duplex radio Single hop

[112], 2008 Multi-channel Time-slotted (CSMA/CA, PSM) Non-cooperative Single radio Single hop

[114], 2011 Multi-channel Contention-based(CSMA/CA) Non-cooperative Single half-duplex radio Single hop

[116], 2012 Multi-channel Contention-based(CSMA/CA) Non-cooperative Single radio Single hop

[117], 2008 Multi-channel Hybrid Cooperative Two half-duplex radio Single hop

[118], 2015 Multi-channel Hybrid Cooperative Single half-duplex radio Single hop

[186], 2011 Multi-channel Hybrid Non-cooperative Single half-duplex radio Single hop

[120], 2008 Multi-channel Hybrid Non-cooperative Two radios Multi-hop

[121], 2013 Multi-channel Hybrid Non-cooperative Two radios Multi-hop

5.1 Spectrum sensing issues

5.1.1 Spectrum opportunities discovery

Discovery process of spectrum need to be carried out morecarefully because it is influenced by three main issues: thehidden transmitter, the exposed transmitter and the hiddenreceiver. The hidden transmitter issue has been resolvedby carrying out sensing operation at both transmitter andreceiver ends, but there are still no satisfactory solutions forthe latter issues. A CR user should be capable of discovering

the existence of a neighboring primary receiver to resolvethese issues. Hence, feasible solutions for this purpose areyet to be investigated.

5.1.2 Sensing performance

Spectrum sensing performance is limited by hardwareand physical constraints. For instance, SUs with a sin-gle transceiver cannot transmit and sense simultaneously.Moreover, users usually only observe a partial state ofthe network to limit sensing overhead. There is a fun-

Fig. 6 The future roadmap ofOSA MAC schemes for CRNs

Author's personal copy

Peer-to-Peer Netw. Appl.

damental trade-off between the undesired overhead andspectrum holes detection effectiveness: the more bands aresensed, the higher the number and quality of the availableresource. Thus this problem needs to be further investigatedto improve spectrum sensing effectiveness.

5.1.3 Sensing errors

Sensing errors due to false detection and miss detectionin PU signal sensing are ignored in many cases in the lit-erature. Accurate models that take both false alarm andmis-detection probabilities into account, need to be devised.Therefore, the simplified ON/OFF model for PU traffic maynot be a proper choice for practical environment wherePUs may be cellular or wireless sensors. To improve theprobability of detection with less sensing errors, coopera-tive techniques have been proposed [66]. However, manyaspects of cooperative sensing need to be still investigatedfor better solutions [51]. Future OSA-MAC protocols haveto incorporate more complex considerations such as theimpact of correlation among sensing channels, imperfect-ness of reporting channels etc. to develop more efficientcooperative sensing schemes [132]. Furthermore, trade-offbetween sensing action and throughput as well as otherapplications such as multimedia application over CRNsneeds to be further investigated.

5.1.4 Utilization of other decision theoretic schemes

For OSA systems, POMDP is the most popular tool forautomated decision-making that notifies CR users whataction to perform. This two-dimensional framework isused to solve a situation by considering the channel qual-ity under fading environment [133]. Some other decisiontheoretic frameworks such as game theory [134], opti-mal stopping problem [135, 136] and multi-armed bandit(MAB) problem [137] can be incorporated with POMDPin order to address channel quality issues. These deci-sion theoretic frameworks can be utilized to constructbetter OSA MAC structures to address two or more chal-lenges simultaneously which form active areas for futureresearch.

5.2 Backoff algorithms

Backoff algorithms, part of MAC protocol, play a signif-icant role in decreasing packet conflicts, increasing suc-cessful transmission rate and overall throughput. Evaluationof a backoff algorithm mainly depends on two basic per-formance metrics: throughput and delay analysis. Due tovariation in network nodes, channel contention may varywhich consequently affects in selecting backoff values.Therefore, optimal backoff value selection becomes crucial

and challenging which leads to an open area for research.A new backoff algorithm based on the dynamic modulat-ing parameters is presented in [138] to improve the useof wireless channel for the competition. This algorithmuses a network performance of slot utilization indicator todescribe the current network state of competition. In orderto decrease the MAC overhead and the collision probabil-ity, in [139] a new backoff strategy is proposed leading tobetter saturation throughput and access delay performancecomparing to the classical protocol. Few attempts that arefound in the literature, which are not sufficient and urgentattention is needed for designing dynamic backoff algorithmin order to improve network throughput and to minimizedelay.

5.3 CC issues

CC in CRNs are radio resources provisionally assigned andcommonly accessible to CR users for control informationexchange. For CC establishment, CR users need cooper-ation among spectrum management functions. CC designand assignment become more difficult by the impacts of PUactivities, transmission impairments and intelligent attacks.Therefore, reliable and secure establishment of CC for effi-cient and seamless communication in CRNs is a very crucialand challenging task. In order to enhance awareness ofPU activities, a competent control channel design is neces-sary [140]. This will enable efficient establishment of con-trol links as well as extension of control channel coverageupon PUs detection to protect from interference. Transmis-sion impairments like multipath fading and shadowing inCCs have considerable impact on PU detection capabilities.Cooperative sensing [132, 141] can be treated as an effec-tive solution to combat transmission impairments which canhowever incur delay and overhead in the network. There-fore, self-organized [142] and robust cooperative sensingschemes [143] for CCC allocation need to be investigated inorder to enhance cooperative gain and minimize overheadand delay.

Utilization of single dedicated CC is more prone tosecurity attacks such as control channel jamming denialof service attacks [144]. This may devastate the wholenetwork with single point of failure [145]. Moreover, tra-ditional schemes like channel hopping may not be ableto mitigate jamming under PUs activities and sensingerrors. Therefore, CC establishment become another cru-cial issue. A scalable mechanism [146] incorporating reli-ability and security issues needs to be developed forimproved control channel assignment by increasing com-munication and sensing abilities. Hence, a complete frame-work for CCC design and allocation need urgent attentionfor further investigation in order to provide innovative CCsolutions.

Author's personal copy

Peer-to-Peer Netw. Appl.

5.4 Cross-layer design approaches and security issues

In CRNs, superior interaction is needed between differ-ent layers of protocol stacks in order to attain desiredgoals and performance in terms of radio resource man-agement, QoS provisioning, security and other networkobjectives. The idea behind the Cross-layer design [147]approach refers to devise the protocol stack by exploitingthe information exchange and reliance between differentprotocol layers to acquire superior performance. But at thesame time, it will also be susceptible to cross-layer attackswhich may happen due to malevolent operations executedat one layer that could cause security violations at anotherlayer [148]. CRNs inherently require greater interactionbetween different layers of the protocol stack. Therefore,cross-layer attacks and security related issues [149] includ-ing jamming attack and mitigation, selfish behavior incollaborative sensing and misbehavior in detection, physi-cal layer and MAC layer in security, and the modeling anddetection of insider attacks should be given special atten-tion. A cross-layer security mechanism that incorporatesrecent advances on security threats/attacks and counter-measures, need to be investigated in OSA MAC designin order to permit a reliable and secure environment forCRNs [150]. Finally, the application of artificial intelli-gence (AI) techniques can be included in OSA MAC designto tackle security challenges for dynamic spectrum access[151].

5.5 Spectrum mobility issues

Spectrum mobility is also an essential issue in OSA MACdesign aspect. Studies in the literature incorporate severaldesign issues such as PU detection, handoff decision, tar-get channel selection and spectrum handoff strategy [152].Spectrum sensing speed and precision that greatly influ-ence PU detection event, can be increased by cooperativesensing [153]. Handoff decision is another important issuewhich can cause harmful interference to PU. This can begreatly improved by using proper handoff algorithm e.g. fuzzy logic based algorithm [154]. Appropriate targetchannel selection approaches in the literature include hav-ing a backup channel, target channel availability predictionunder partial sensing scheme and selection utilizing his-torical data. PU traffic modeling taking PU mobility [155]into account needs careful attention in order to intelli-gently select the target channel by SUs. Several predictionand estimation schemes [156], like hidden Markov mod-els [157], neural networks [158], Bayesian inference [159]and, autoregressive model [160] can be adopted for betterrealization of PU activity. Proper spectrum handoff strate-gies need to be chosen that are adaptive in nature according

to PU traffic. In order to minimize delay in handoff event,simultaneous data transmission in multi-channel CRNs needto be performed. Effective contention resolution for multi-ple SUs during handoff need to be carried out for successfulhandoff. Cross-layer approach for link maintenance is nec-essary to effectively address mobility issues in physical,MAC and network layers. Finally an integrated handoffmanagement process [161] is necessary to improve networkperformance.

5.6 Multi-hop scenario

Dynamic spectrum access in multi-hop domain incorporatesseveral challenges in MAC layer. Several studies [162, 163]in the literature tried to bring up research issues regard-ing OSA MAC design for multi-hop CRNs which canbe summarized as 1) control channel establishment andmanagement scheme without a predefined dedicated con-trol channel, 2) transceiver synchronization, 3) CTS timeoutand problems in decoding CTS, 4) multi-channel hiddenterminal problem, 5) hidden incumbent node problem, 6)number of transceivers, 7) coordination of spectrum sensingand accessing decision making, 8) radio frequency het-erogeneity 9) group communication and 10) MAC layerauthentication. Some other attributes like the effect ofchannel state information in spectrum access, QoS guar-antee, concern in fairness aspect, PU protection also needcareful attention and further investigation in multi-hopenvironment.

5.7 Quality of service (QoS) management in CRenvironment

Spectrum utilization and network capacity of CRNs canbe increased by dynamic spectrum supervision. However,this imposes several challenges in QoS management [164].Users can exploit available spectrum successfully capturedby a CR but accurate information needs to be forwarded tothe application to amend traffic features and user require-ments. Once the available frequency bands are character-ized, the most suitable spectrum bands can be selected bytaking into account the spectrum characteristics and QoScriteria. However, spectrum characteristics can alter dueto the dynamic nature of PU traffic and network param-eters. Thus, appropriate spectrum decisions and necessaryinteractions among application streams, need to be per-formed to meet the QoS provisioning. Several QoS sup-portive MAC protocols are reported in the literature. Mostof the approaches assumed that PU traffic characteristicsare known by SUs. However, this may not be true in gen-eral. Hence, PU traffic parameter estimation needs to bedone often [165]. Such accurate estimation is necessary to

Author's personal copy

Peer-to-Peer Netw. Appl.

guarantee QoS criteria in terms of disruption caused to thePUs. Overall, further investigations are needed to designQoS supportive MAC schemes for CRN based on differentcriteria.

5.8 Multi-purpose OSA MACs

Depending on the requirements of CRNs, the purpose ofOSA MAC protocols may differ in nature. Some pro-tocols are devised with the goal of offering throughput-maximization or delay-minimization while some othersintending at energy-efficiency. However, each protocol ispreferred in its specific goal. Therefore, adaptive frame-works that alter the objectives according to the CR proper-ties and applications are necessary in order to fulfill multipleobjectives at different levels. This adaptive property is moreappropriate to the nature of CRNs which is presumed tobe agile. Agility mainly refers to the competence of CR toadjust functional parameters and also to the nimbleness inthe protocol stack. In other words, SUs can switch its MACprotocol stack depending on its purpose. Hence, spectrumagility in OSA MAC protocols requires adaptability andclose PHY-MAC interaction [166] which brings up a newresearch dimension and challenges.

5.9 Green OSA MACs

Energy efficiency is another important objective whiledesigning OSAMAC protocol, especially in cognitive wire-less sensor networks. Usual research trends in OSA MACdesign has mainly been focused on the functional behav-ior and performance measurement, except on battery con-sumption. Green communications, aiming towards energyefficiency as a main concern, have therefore induced a newresearch horizon. Several investigations [167–170] are car-ried out in order to address different challenges regardingenergy efficiency, but still needs more attention to explorethis area. RF energy harvesting is another promising tech-nique to obtain enough energy and spectrum opportunity forpacket transmission. The spectrum access, that determinesthe channel for the SU to transmit a packet or to har-vest RF energy, is a critical component to achieve optimalperformance. Thus MAC protocols, developed for energyharvesting CRNs, are recently investigated [171] and offeran active area for research.

5.10 Cognitive heterogeneous networks (HetNets)

Cognitive heterogeneous networks (HetNets) are an attrac-tive solutions for expanding network capacity to multi-ple spectrum access technologies, network structures andcommunication protocols. Some applications such as tac-

tical applications in military communications [172], med-ical applications in CR-based wireless body area net-works [173], are few interesting recent applications ofcognitive HetNets. A thorough study of MAC protocol withthe capability of cognitive HetNets is still an open area ofresearch. However, only a few works address the issues ina coexistent heterogeneous CRNs scenario [174]. Since thesystem characteristics of these cognitive HetNets, are differ-ent in several categories such as spectrum sensing aspects,PU detection ability, hardware capacity, fairness issue, allthese categories need to be explored while designing MACstructure. A scenario of coexistent heterogeneous CRNswith collision-based PUs and fairness issue are discussedin [175]. Further research towards opportunistic 3G/4G/5Gspectrum sharing involve precise evaluation of the scenarioconditions, in terms of terminal confinement, link mainte-nance, and user preferences, and will also need to considerface side aspects such as security supervision and privacypreservation. The rising requirement of wireless data trafficand the scarceness of accessible radio spectrum, will extend3GPP’s LTE (Release 8) and LTE-Advanced (Release 10) tounlicensed bands (5 GHz). Thus dynamic spectrummanage-ment for LTE [176] and LTE-Advanced [177, 178] mobilecommunication network as a CR-ready technology, becomechallenging and provide an active area for research.

5.11 Cognitive machine-to-machine (M2M)communications

The CR research community has considered the machine-to-machine (M2M) communications, as one of the emergingand indispensable CR usage area. M2M communicationsreduce costs and provide considerable efficiency that affectindividual as well as industrial use with smart services,such as smart city, smart grid and, smart home [179]. Cog-nitive M2M communications can be envisioned as newparadigm in terms of efficient spectrum utilization due todynamic spectrum access capabilities [180]. In addition,cognitive M2M is intrinsically enriched to tackle the chal-lenges of spectrum scarcity issue due to huge and increas-ing number of devices, interference management, energyefficiency, network coverage issue and device heterogene-ity [181, 182]. Thus cognitive M2M opens new horizonby providing enormous unexplored field for researchers.Designing MAC protocols that effectively meet the M2Mservice requirements, along with integrating CR technol-ogy, become crucial and challenging. Only a few handfulstudies regarding MAC protocol, are found in the literaturesuch as data aided cognitive technique (DACT) protocol forcognitive M2M proposed in [183]. A receiver-based cog-nitive MAC protocol, termed as cognitive receiver-based(CRB)-MAC, has been proposed in [184] with special

Author's personal copy

Peer-to-Peer Netw. Appl.

emphasis on energy efficiency and reliability requirementsof M2M devices operating in challenging wireless environ-ments such as smart grid. The basic Packet ReservationMultiple Access (PRMA) is enhanced in [185] with novelmodifications especially tailored for cognitive M2M com-munication. Therefore, the ongoing research on structuringMAC framework for cognitive M2M is still in infancy.

6 Conclusion

Different OSA MAC protocols have different focus, crite-ria, objective, mechanism and performance issues. In thispaper, we explored different MAC schemes in OSA contextfor CRNs. The main contributions of this paper are fourfold.First, we pointed out differences of OSA MAC approachesfrom conventional MAC protocols and also figured out thebasic elements for OSA based MAC protocols. Second,we classified CR MAC framework based on different cri-teria and provided a generic OSA MAC design structurein CRNs. Third, we presented a comprehensive literaturereview of protocol objectives, solution approaches, charac-teristic features and performance metrics. Forth, we ana-lyzed and compared of these different schemes to highlightmajor attributes, outlined further research issues and chal-lenges, presented roadmap for future OSA MAC structure.

Acknowledgments The authors sincerely acknowledge the supportfrom Natural Sciences and Engineering Research Council (NSERC) ofCanada and support from the Ryerson University Faculty of Engineer-ing and Architectural Science Dean’s Research Fund.

References

1. Federal Communications Commission (2002) Spectrum policytask force, pp 2–135

2. Mitola J (2000) Cognitive radio: an integrated agent architecturefor software defined radio. PhD thesis, KTH Royal Institute ofTechnology. Stockholm

3. Akyildiz I, Lee W, Vuran M, Mohanty S (2006) Next generation/dynamic spectrum access/cognitive radio wireless networks: asurvey. Elsevier Comput Netw 50(13):2127–2159

4. Haykin S (2005) Cognitive radio: brain-empowered wirelesscommunications. IEEE J Sel Areas Commun (JSAC) 23(2):201–220

5. Hijazi S, Natarajan B, Michelini M, Wu Z, Nassar C (2004) Flex-ible spectrum use and better coexistence at the physical layer offuture wireless systems via a multicarrier platform. IEEE WirelComm 11(2):8–14

6. Zahmati AS, Fernando X, Grami A (2010) Steady-State Markovchain analysis for heterogeneous cognitive radio networks. IEEESarnoff Symposium, pp 1–5

7. IEEE Standard for Information Technology, Telecommunica-tions and information exchange between systems WRAN Spe-cific requirements - Part 22: Cognitive Wireless RAN MediumAccess Control (MAC) and Physical Layer (PHY) Specifi-cations, IEEE 802.22a (Amendment to the IEEE Std-802.22-2011(TM)) (2014). [Online]. Available: https://standards.ieee.org/about/get/802/802.22.html

8. Standard for Wireless LAN in TV White Space, IEEE802.11af (2014). [Online]. Available: https://standards.ieee.org/news/2014/ieee802.11af

9. IEEE 1900 Standards. [Online]. Available: http://grouper.ieee.org/groups/dyspan/

10. IEEE 802.19: TV white space coexistence methods. [Online].Available: https://standards.ieee.org/about/get/802/802.19.html

11. ETSI (2013) Mobile Broadband Services in the 2,300MHz 2,400MHz Frequency Band under Licensed Shared Access regime

12. Matinmikko M, Palola M, Saarnisaari H, Heikkila M, ProkkolaJ, Kippola T, Hanninen T, Jokinen M, Yrjola S (2013) CognitiveRadio Trial Environment: First live authorized shared access-based spectrum-sharing demonstration. IEEE Veh Technol Mag8(3):30–37

13. IEEE 802.15 Working Group (2012) Wireless mediumaccess control (MAC) and physical layer (PHY) specifica-tions for low-rate wireless personal area networks (WPANs).[Online]. Available: http://www.ieee802.org/15/pub/TG4m.html,accessedJun.2012

14. Gavrilovska L, Denkovsk D, Rakovic V, Angjelichinoski M(2014) Medium access control protocols in cognitive radio net-works: Overview and general classification. IEEE Commun SurvTutorials 16(4):2092–2124

15. Chowdhury M, Asaduzzaman, Kader MF (2014) CognitiveRadio MAC Protocols: A Survey, Research Issues, and Chal-lenges. Smart Comput Rev 5(1):19–29

16. Ren P, Wang Y, Du Q, Xu J (2012) A survey on dynamic spec-trum access protocols for distributed cognitive wireless networks.EURASIP J Wirel Commun Netw 2012(60):1–21

17. Domenico AD, Strinati EC, Benedetto M-GD (2012) A surveyon MAC strategies for cognitive radio networks. IEEE CommunSurv Tutorials 14(1):21–44

18. Xiang J, Zhang Y, Skeie T (2010) Medium access control pro-tocols in cognitive radio networks. Wirel Commun Mob Comput10(1):31–49

19. Cormio C, Chowdhury KR (2009) A survey on MAC proto-cols for cognitive radio networks. Ad Hoc Netw (ELSEVIER)7(7):1315–1329

20. JHA SC, Rashid MM, Bhargava VK (2011) Medium access con-trol in distributed cognitive radio networks. IEEEWirel Commun18(4):41–51

21. Yau AK-L, Komisarczuk P, Teal PD (2008) On multi-channelMAC protocols in cognitive radio networks. In: Proceedings ofIEEE international conference Australasian telecommunicationnetworks and applications conference (ATNAC08), Adelaide,pp 300–305

22. Wang H, Zhou H, Qin H (2008) Overview ofMulti-channel MACProtocols in Wireless Networks. In: Proceedings of IEEE inter-national conference wireless communications, networking andmobile computing, pp 1–5

23. Pawelczak P, Pollin S, So H, Bahai A, Prasad R, HekmatR (2008) Comparison of opportunistic spectrum multichannelmedium access control protocols. In: Proceedings of IEEE inter-national conference globecom, pp 1–6

24. Mo J, So HSW, Walrand J (2008) Comparison of multi-channelMAC protocols. IEEE Trans Mobile Comput 7(1):50–65

25. Sun Y, Zhou B, Wu Z, Ni Q, Zhu R (2013) Multi-channel MACProtocol in Cognitive Radio Networks. J Netw 8(11):2478–2490

26. Wang H, Qin H, Zhu L (2008) Performance analysis of mul-tichannel medium access control algorithms for opportunisticspectrum access. In: Proceedings of IEEE international confer-ence computer and science software engineering, vol 1, Wuhan,pp 214–218

27. Pawelczak E.-Y. P, Pollin S, So H.-S. W, Bahai A, Prasad RV,Hekmat R (2008) Quality of service assessment of opportunisticspectrum ccess: a medium access control approach. IEEE WirelCommun 15(5):20–29

Author's personal copy

Peer-to-Peer Netw. Appl.

28. Krishna TV, Das A (2009) A survey on MAC protocols in OSAnetworks. Comput Netw (ELSEVIER) 53(9):1377–1394

29. Wang H, Qin H, Zhu L (2008) A survey on MAC protocols foropportunistic spectrum access in cognitive radio networks. In:Proceedings of IEEE international conference computer scienceand software engineering (CSSE), vol 1, pp 214–218

30. Cordeiro C, Challapali K, Birru D, Shankar S (2006) IEEE802.22: An introduction into the first wireless standard based oncognitive radios. J Commun 1(1):38–47

31. Choi N, Patel M, Venkatesan S (2006) A full duplex multi-channel MAC protocol for multi-hop cognitive radio networks.In: Proceedings of IEEE international conference cognitive radiooriented wireless networks and communications, pp 1–5

32. Hossain E, Niyato D, Han Z (2009) Dynamic spectrum accessand management in cognitive radio networks. Cambridge Uni-versity Press

33. Sharma SK, Chatzinotas S, Ottersten B (2015) 3D Beamformingfor spectral coexistence of satellite and terrestrial networks. In:IEEE vehicular technology conference

34. Goldsmith A, Jafar SA, Maric I, Srinivasa S (2009) Breakingspectrum gridlock with cognitive radios: an information theoreticperspective. Proc IEEE 97(5):894–914

35. Zhao Q, Sadler B (2007) A survey of dynamic spectrum access.IEEE Signal Process Mag 24(3):79–89

36. Akyildiz I, Lee W, Chowdury K (2009) CRAHNS: cognitiveradio ad hoc networks. J Ad Hoc Netw 7(5):810–836

37. Jia J, Zhang Q, Shen XS (2008) HC-MAC: a hardware-constrained cognitive MAC for efficient spectrum management.IEEE J Selected Areas in Commun 26(1):233–242

38. Shah MA, Safdar GA, Maple C (2011) DDH-MAC: a noveldynamic De-Centralized hybrid MAC protocol for cognitiveradio networks. In: Proceedings IEEE international conferenceroedunet international conference (RoEduNet), pp 1–6

39. Safdar G, Neill M (2009) Common control channel securityframework for cognitive radio networks. In: Proceedings IEEE69th vehicular technology conference, pp 1–5

40. Zhao J, Zheng H, Yang G.-H (2005) Distributed coordination indynamic spectrum allocation networks. In: Proceedings of 1stIEEE international symposium new frontiers DySpan, Baltimore,pp 259–268

41. Chen T, Zhang H, Maggio G, Chlamtac I (2007) Topologymanagement in CogMesh: a cluster-based cognitive radio meshnetwork. In: Proceedings of IEEE ICC, Glasgow, pp 6516–6521

42. Liu S, Lazos L, Krunz M (2012) Cluster-based control channelallocation in opportunistic cognitive radio networks. IEEE TransMobile Comput 11(10):1436–1449

43. Lazos L, Liu S, Krunz M (2009) Topology management inCogMesh: a cluster-based cognitive radio mesh network. In: Pro-ceedings of 6th annual IEEE communication. SECON, Rome,pp 135–143

44. Cordeiro C, Challapali K (2007) c-MAC: a cognitiveMAC proto-col for multi-channel wireless networks. In: Proceedings of IEEEsymposium new frontiers in dynamic spectrum access networks(DySPAN), pp 147–157

45. Rozovsky R, Kumar P (2001) SEEDEX: a MAC protocol for AdHoc networks. In: Proceedings of ACM MobiHoc, pp 67–75

46. Lo BF (2011) A survey of common control channel design incognitive radio networks. Phys Commun 4(1):26–39

47. Standard for Recommended Practice for Installation and Deploy-ment of IEEE 802.22 Systems, IEEE 802.22.2-2012(TM), Sep.28 2012

48. Mauriand JL, Ghafoor KZ, Rawat DB, Perez JMA (2014) Cogni-tive networks: applications and deployments. CRC Press-Taylorand Francis Group, USA. ISBN=9781482236996

49. Sengupta S, Subbalakshmi KP (2013) Open research issuesin Multi-Hop cognitive radio networks. IEEE Commun Mag51(4):168–176

50. So J, Vaidya N (2004) Multi-Channel MAC for ad hoc net-works: handling multi-channel hidden terminals using a sin-gle transceiver. In: Proceedings of ACM MobiHoc, pp 222–233

51. Hussain S, Fernando X (2014) Closed-form analysis of relay-based cognitive radio networks over nakagami-m fading chan-nels. IEEE Trans Veh Technol 63(02):1193–1203

52. Tripathi SB, Shah M. B (2014) A dynamic opportunistic spec-trum access MAC protocol for cognitive radio networks. In:Proceedings of IEEE international conference advances in com-puting, communications and informatics (ICACCI), pp 1195–1198

53. Kim KJ, Kwak KS, Choi BD (2013) Performance analysis ofopportunistic spectrum access protocol for multi-channel cogni-tive radio networks. J Commun Netw 15(1):77–86

54. Benslimane A, Ali A, Kobbane A, Taleb T (2009) A newopportunistic MAC layer protocol for cognitive IEEE 802.11-based wireless networks. In: Proceedings of IEEE internationalconference personal, indoor and mobile radio communications,pp 2181–2185

55. Debroy S, De S, Chatterjee M (2013) A new opportunisticMAC layer protocol for cognitive IEEE 802.11-based wire-less networks. In: Proceedings of IEEE global communicationsconference (GLOBECOM), pp 1221–1226

56. Hamdaoui B, Shin KG (2008) OS-MAC: an efficient MAC pro-tocol for spectrum-agile wireless networks. IEEE Trans MobileComput 7(8):915–930

57. Hsu AC-C, Wei DSL, Kuo C-CJ (2007) A cognitive MAC pro-tocol using statistical channel allocation for wireless ad-hocnetworks. In: Proceedings of IEEE wireless communications andnetworking conference(WCNC), pp 105–110

58. Hung S-Y, Cheng Y-C, Wu EH-K, Chen G-H (2008) An oppor-tunistic cognitive MAC protocol for coexistence withWLAN. In:Proceedings of IEEE ICC, Beijing, pp 4059–4063

59. Hung S-C, Hung S-Y, Wu EH-K, Chen G-H (2006) A decentral-ized CR system algorithm for cognitive borrowing scheme fromprimary users. In: Proceedings of IEEE international conferencepersonal, indoor and mobile radio communications, pp 1–5

60. Ma L, Han X, Shen C-C (2005) Dynamic open spectrum sharingMAC protocol for wireless ad hoc networks. In: Proceedings ofIEEE symposium on new frontiers in dynamic spectrum accessnetworks (DySPAN), pp 203–213

61. Su H, Zhang X (2008) Channel-Hopping based single transceiverMAC for cognitive radio networks. In: Proceedings of IEEEannual conference on information sciences and systems (CISS,pp 197–202

62. Shih C.-F., Wu TY, Liao W (2010) DH-MAC: a dynamic chan-nel hopping MAC protocol for cognitive radio networks. In:Proceedings of IEEE ICC. Cape Town, pp 1–5

63. Msumba J, Xu H (2013) Throughput optimization MAC schemefor cognitive radio networks: a POMDP framework. In: Proceed-ings of AFRICON, pp 1–5

64. Yoo S.-J., Nan H, Hyon T.-I. (2009) DCR-MAC: distributed cog-nitive radio MAC protocol for wireless ad hoc networks. J WirelCommun Mob Comput 9(5):631–653

65. Fourati S, Hamouda S, Tabbane S (2011) RMC-MAC: a reac-tive multi-channel MAC protocol for opportunistic spectrumaccess. In: Proceedings of IEEE international conference newtechnologies, mobility and security (NTMS), pp 1–5

66. Yucek T, Arslan H (2009) A survey of spectrum sensing algo-rithms for cognitive radio applications. IEEE Commun SurvTutorials 11(1):116–130

Author's personal copy

Peer-to-Peer Netw. Appl.

67. Park J, Paweczak P, Cabric D (2010) To buffer or to switch:design of multichannel MAC for OSA Ad Hoc networks. In: Pro-ceedings of IEEE symposium new frontiers in dynamic spectrumaccess networks (DySPAN), pp 1–10

68. Park J, Paweczak P, Cabric D (2011) Performance of jointspectrum sensing and MAC algorithms for multichannel oppor-tunistic spectrum access ad hoc networks. IEEE Trans MobileComput 10(7):1011–1027

69. Al-Mahdi H, Wahed M, El-Aziz SA (2014) Design and anal-ysis of an OSA-BR MAC protocol for cognitive radio ad hocnetworks. Int J Commun, Netw Syst Sci 7(7):223–234

70. Oo TZ, Tran NH, Dang DNM, Han Z, Le LB, Hong CS OMF-MAC: an opportunistic matched filter-based MAC in cognitiveradio networks. IEEE Trans Veh Technol

71. Zahmati AS, Fernando X, Grami A (2013) Application-specificspectrum sensing method for cognitive sensor networks. IETWireless Sens Syst 3(3):193–204

72. Gilbert EN (1960) Capacity of burst-noise channels. Bell SystTech J 39:1253–1265

73. Rabiner L, Juang H (1986) An introduction to hidden Markovmodels. IEEE ASSP Mag 3(1):4–16

74. Akyildiz IF, Lo BF, Balakrishnan R (2011) Cooperative spec-trum sensing in cognitive radio networks: a survey. J PhysCommun (ELSEVIER) 4(1):40–62

75. Alshamrani A, Shen X, Xie L-L (2009) A cooperative MAC withefficient spectrum sensing algorithm for distributed opportunisticspectrum networks. J Commun 4(10):728–740

76. Hu D,Mao S (2009) Design and analysis of a sensing error-awareMAC protocol for cognitive radio networks. In: Proceedingsof IEEE global telecommunications conference (GLOBECOM),pp 1–6

77. Chowdhury M, Asaduzzaman, Kader MF, Rahman MO (2012)Design of an efficient MAC protocol for opportunistic cognitiveradio networks. Int J Comput Sci Inf Technol (IJCSIT) 4(5):233–242

78. Zheng S, Liang Y-C, Kam PY, Hoang AT (2009) Cross-layereddesign of spectrum sensing and MAC for opportunistic spectrumaccess. In: Proceedings of IEEE wireless communications andnetworking conference (WCNC), pp 1–6

79. Zhao Q, Tong L, Swami A, Chen Y (2007) Decentralized cogni-tive MAC for opportunistic spectrum access in ad hoc networks:a POMDP framework. IEEE J Sel Areas Commun 25(3):589–600

80. Mehanna O, Sultan A, Gamal HE (2009) Cognitive MAC pro-tocols for general primary network models. IEEE Trans MobComput 1–12

81. Liu K, Zhao Q (2010) Indexability of restless bandit problemsand optimality ofWhittle index for dynamic multichannel access.IEEE Trans Inf Theory 56(11):5547–5567

82. Park J, van der Schaar M (2011) Cognitive MAC protocols usingmemory for distributed spectrum sharing under limited spectrumsensing. IEEE Trans Commun 59(9):2627–2637

83. Jiang L, Jiang H, Wu S, Zhou X (2012) Decentralized cog-nitive MAC protocol based on SARSA. In: Proceedings ofIEEE 14th international conference communication technology(ICCT), pp 392–396

84. Koivunen V, Kulkarni SR, Poor HV (2011) Reinforcement learn-ing based distributed multiagent sensing policy for cognitiveradio networks. In: Proceedings of IEEE symposium new fron-tiers in dynamic spectrum access networks (DySPAN), pp 642–646

85. Teng YL, Richard F, Han YK (2011) Reinforcement-Learning-Based double auction design for dynamic spectrum access incognitive radio networks. In: Proceedings of IEEE wirelesscommunications and networking conference (WCNC), pp 90–95

86. Sharma M, Sahoo A (2013) Residual white space distributionbased opportunistic multichannel access protocol for dynamicspectrum access networks. In: Proceedings of IEEE 5th interna-tional conference communication systems and networks (COM-SNETS), pp 1–10

87. Chen Q, Wong W-C, Motani M, Liang Y-C (2013) Decentral-ized cognitive MAC for opportunistic spectrum access in ad hocnetworks: a POMDP framework. IEEE J Sel Areas Commun31(11):2289–2300

88. Liu G, Chen C, Li Y, Guo J (2009) Priority-based variable multi-channel MAC protocols in cognitive radio wireless network: afair channel access strategy. In: Proceedings of IEEE interna-tional conference communications technology and applications(ICCTA), pp 488–492

89. Salameh HAB, Krunz M, Manzi D (2014) Spectrum bond-ing and aggregation with Guard-Band awareness in cogni-tive radio networks. IEEE Trans Mobile Comput 13(3):569–581

90. Timalsina SK, Moh S, Chung I, Kang M (2013) A concurrentaccess MAC protocol for cognitive radio ad hoc networks with-out common control channel. EURASIP J Adv Signal Process2013(69):1–13

91. Joshi GP, Kim SW, Kim B-S (2009) An efficient MAC pro-tocol for improving the network throughput for cognitive radionetworks. In: Proceedings of IEEE international conferencenext generation mobile applications, services and technologies(NGMAST), pp 271–275

92. Ansari J, Zhang X, Mahonen P (2010) A decentralized MACfor opportunistic spectrum access in cognitive wireless networks.Comput Commun 36(13):1399–1410

93. Hsu C-S, Chen Y-S, He C-E (2010) An efficient dynamic adjust-ing MAC protocol for multichannel cognitive wireless networks.In: Proceedings of IEEE international conference wireless com-munications, networking and information security (WCNIS),pp 556–560

94. Liu X, Xie J (2014) A Slot-Asynchronous MAC protocol designfor blind rendezvous in cognitive radio networks. In: Proceedingsof IEEE global communications conference (GLOBECOM),pp 4641–4646

95. Wang XY, Wong A, Ho P-H (2011) Stochastic medium accessfor cognitive radio ad hoc networks. IEEE J Sel Areas Commun29(4):770–783

96. Hastings WK (1970) Monte carlo sampling methods usingmarkov chains and their applications. Biometrika 57(1):97–109

97. Joshi GP, Kim SW (2011) An enhanced synchronized MACprotocol for cognitive radio networks. In: Proceedings of IEEEinternational conference wireless communications, networkingand mobile computing (WiCOM), pp 1–4

98. Xue D, Ekici E, Wang X (2010) Opportunistic periodic MACprotocol for cognitive radio networks. In: Proceedings of IEEEglobal telecommunications conference (GLOBECOM), pp 1–6

99. Cox DR (1967) Renewal theory, Butler and Tanner Ltd, London100. Htike Z, Lee J, Hong CS (2012) A MAC protocol for cogni-

tive radio networks with reliable control channels assignment.In: Proceedings of IEEE international conference informationnetworking (ICOIN), pp 81–85

101. Anamalamudi S, Jin M (2014) Hybrid common control channelbased MAC protocol for cognitive radio Ad-Hoc networks. Int JInf Electron Eng 4(3):216–224

102. Park J, Jain R, cabric D (2009) Spectrum sensing design frame-work based on cross-layer optimization of detection efficiency.In: Proceedings of IEEE ICC, Dresden, pp 1–6

103. Sun C, Zhang W, Letaief KB (2007) Cluster-based cooperativespectrum sensing in cognitive radio systems. In: Proceedings ofICC, pp 2511–2515

Author's personal copy

Peer-to-Peer Netw. Appl.

104. Kalil MA, Puschmann A, Mitschele-Thiel A (2012) SWITCH:a multichannel MAC protocol for cognitive radio ad hoc net-works. In: Proceedings of IEEE Vehicular Technology Confer-ence (VTC Fall), pp 1–5

105. Gu Z, Hua Q-S, Wang Y, Lau FC (2013) Nearly optimalasynchronous blind rendezvous algorithm for cognitive radionetworks. In: Proceedings of IEEE sensor mesh and ad hoccommunications and networks (SECON), pp 371–379

106. Wang S, Zhang J, Tong L (2012) A characterization of delayperformance of cognitive medium access. IEEE Trans WirelCommun 11(2):800–809

107. Liu Y, Gong W (2003) On fluid queueing systems with strictpriority. IEEE Trans Wirel Commun 48(12):2079–2088

108. Elmachkour M, Kobbane A, Sabir E, Koutbi ME (2012) Newinsights from a delay analysis for cognitive radio networkswith and without reservation. In: Proceedings of IEEE wirelesscommunications and mobile computing conference (IWCMC),pp 65–70

109. Su H, Zhang X (2008) Cross-layer based opportunistic MACprotocols for QoS provisionings over cognitive radio wirelessnetworks. IEEE J Sel Areas Commun 26(1):118–129

110. Azarfar A, Frigon J-F, Sanso B (2015) Delay analysis of mul-tichannel opportunistic spectrum access MAC protocols. IEEETrans Mob Comput PP(99):1–14

111. Wang Y, Ren P, Wu G (2010) A throughput-aimed MAC pro-tocol with QoS provision for cognitive ad hoc networks. IEICETrans Commun E93-B(6):1426–1429

112. Le L, Hossain E (2008) OSA-MAC: a MAC protocol foropportunistic spectrum access in cognitive radio networks. In:Proceedings of IEEE wireless communications and networkingconference (WCNC), pp 1426–1430

113. Botong L, Jing L, Zhi N, Xiaoying G, Youyun X (2009) Animprovement on opportunistic spectrum access MAC proto-col. In: Proceedings of IEEE 15th Asia-Pacific conference oncommunications (APCC), pp 766–769

114. Jha SC, Phuyal U, Rashid MM, Bhargava VK (2011) Design ofOMC-MAC: an opportunistic multi-channel MACwith QoS pro-visioning for distributed cognitive radio networks. IEEE TransWirel Commun 10(10):3414–3425

115. Hasan R, Murshed M (2011) A novel multichannel cognitiveradio network with throughput analysis at saturation load. In:Proceedings of IEEE international symposium on network com-puting and applications (NCA), pp 211–218

116. Hasan R, Murshed M (2012) Unsaturated throughput analysisof a novel interference-constrained multi-channel random accessprotocol for cognitive radio networks. In: Proceedings of IEEE23rd international symposium on personal, indoor and mobileradio communications (PIMRC), pp 178–184

117. Song H, Lin X (2008) A group based MAC protocol for QoSprovisioning in cognitive radio networks. In: Proceedings ofIEEE international conference communication systems (ICCS),pp 1489–1493

118. Li J, Luo T, Gao J, Yue G (2015) A MAC protocol for link main-tenance in multichannel cognitive radio ad hoc networks. IEEE JCommun Netw 17(2):172–183

119. Li J, Gao J, Luo T, Yue G (2012) Design of QSPM-MAC quasi-synchronous priority multichannel MAC access protocol. In:Proceedings of IEEE international conference wireless commu-nications and signal processing (WCSP), pp 1–6

120. Kondareddy YR, Agrawal P (2008) Synchronized MAC protocolfor multi-hop cognitive radio networks. In: Proceedings of IEEEICC, Beijing, pp 3198–3202

121. NguyenMV, Hong CS (2013) Interference-dependent contentioncontrol in multi-hop wireless ad-hoc networks: an optimal cog-nitive MAC protocol. In: Proceedings of IEEE ICC, Budapest

122. Standard for Recommended Practice for Installation and Deploy-ment of IEEE 802.22 Systems, IEEE 802.22.2-2012(TM) (2012)

123. Mody AN, Lei Z, Ko G, Pyo C, Rahman MA (2011) Introductionto IEEE Std. 802.22-2011 and its amendment PAR for P802.22b:broadband extension and monitoring. IEEE 802 Plenary Session,Atlanta

124. Authorised Shared Access: an innovative model of pro-competitive spectrum management. Parcu and Associates (2012)

125. RSPG opinion on LSA (2013)126. Matinmikko M, Okkonen H, Palola M, Yrjola S, Ahokangas

P, Mustonen M (2014) Spectrum sharing using licensed sharedaccess: the concept and its workflow for LTE -advanced net-works. IEEE Wireless Commun 21(2):72–79

127. 3rd Generation Partnership Project (3GPP): technical specifica-tions; LTE (Evolved UTRA) and LTE-advanced radio technol-ogy series (Rel 11). [Online]. Available: http://www.3gpp.org/DynaReport/36-series.htm

128. Liu L, Chen R, Geirhofer S, Sayana K, Shi Z, Zhou Y (2012)Downlink MIMO in LTE-advanced: SU-MIMO vs. MU-MIMO.IEEE Commun Mag 50(2):140–147

129. Lee J-KHJ, Zhang J (2009) MIMO technologies in 3GPPLTE and LTE-advanced. EURASIP J Wirel Commun Netw2009

130. Karunakaran P, Wagner T, Scherb A, Gerstacker W (2014)On simultaneous sensing and reception for cognitive LTE-Asystems. In: Proceedings of IEEE international workshop oncognitive cellular systems (CCS), pp 1–5

131. Sesia S, Toufik I, Baker M (2011) LTE - the UMTS long termevolution: from theory to practice, 2nd edn. Wiley

132. Hussain S, Fernando X (2014) Performance analysis of relay-based cooperative spectrum sensing in cognitive radio networksover non-identical nakagami-m channels. IEEE Trans Commun62(8):2733–2746

133. Wang Y, Xu Y, Shen L, Xu C, Cheng Y (2014) Two-dimensionalPOMDP-based opportunistic spectrum access in time-varyingenvironment with fading channels. IEEE J Commun Netw16(2):217–226

134. Wang B, Wu Y, Liu KR (2010) Game theory for cogni-tive radio networks: an overview. Comput Netw (ELSEVIER)54(14):2537–2561

135. Vaid V, Patel A, Merchant SN (2014) Optimal channel stoppingrule under constrained conditions for CRNs. In: Proceedings ofIEEE national conference on communications (NCC), pp 1–5

136. Sharma H, Patel A, Merchant SN, Desai UB (2014) Optimalspectrum sensing for cognitive radio with imperfect detector.In: Proceedings of IEEE vehicular technology conference (VTCSpring), pp 1–5

137. Xu Y, Anpalagan A, Wu Q, Shen L, Gao Z, Wang J (2013)Decision-theoretic distributed channel selection for opportunis-tic spectrum access: strategies, challenges and solutions. IEEECommun Surv Tutorials 15(4):1689–1713

138. Jingqi F, Qiang Z, Haikuan W (2009) A new backoff algorithmbased on the dynamic modulating parameters of IEEE 802.11. In:Proceedings of IEEE international conference wireless commu-nications, networking and mobile computing (WiCom), pp 1–4

139. Mawlawi B, Dore J-B (2013) CSMA/CA bottleneck remediationin saturation mode with new backoff strategy. In: Proceedings of6th International Workshop onMultiple Access Communications(MACOM), vol 8310, pp 70–81

140. Lo BF, Akyildiz IF, Al-Dhelaan AM (2010) Efficient recoverycontrol channel design in cognitive radio ad hoc networks. IEEETrans Veh Technol 59(9):4513–4526

141. Akyildiz IF, Lo BF, Balakrishnan R (2011) Efficient recoverycontrol channel design in cognitive radio ad hoc networks. PhysCommun 4(1):40–62

Author's personal copy

Peer-to-Peer Netw. Appl.

142. dos Santos PMR, Kalil MA, Artemenko O, Lavrenko A,Mitschele-Thiel A (2013) Self-organized common control chan-nel design for cognitive radio ad hoc networks. In: Proceedingsof IEEE international symposium on personal indoor and mobileradio communications (PIMRC), pp 2419–2423

143. Lo BF, Akyildiz IF (2010) Reinforcement learning-basedcooperative sensing in cognitive radio ad hoc networks. In:Proceedings of IEEE international symposium on personalindoor and mobile radio communications (PIMRC), pp 2244–2249

144. Chan A, Liu X, Noubir G, Thapa B (2007) Efficient broadcastcontrol channel jamming: resilience and identification of traitors.In: Proceedings of IEEE international symposium on informationtheory (ISIT), pp 2496–2500

145. Bian K, Park JM (2006) MAC-layer misbehaviors in multi-hopcognitive radio networks. In: Proceedings of US-Korea confer-ence on science, technology and entrepreneurship, pp 1–8

146. Lo BF, Akyildiz IF (2012) Multiagent jamming-resilient con-trol channel game for cognitive radio ad hoc networks. In:Proceedings of IEEE ICC, Ottawa, pp 1821–1826

147. Srivastava V, Motani M (2005) Cross-layer design: a sur-vey and the road ahead. IEEE Commun Mag 43(12):112–119

148. Peng Y, Xiang F, Long H (2009) The research of cross-layerarchitecture design and security for cognitive radio network.In: Proceedings of IEEE international symposium on informa-tion engineering and electronic commerce (IEEC), pp 603–607

149. Ren K, Zhu H, Han Z, Poovendran R (2013) Security in cognitiveradio networks. Proc IEEE Netw 27(3):2–3

150. Sharma RK, Rawat DB (2015) Advances on security threats andcountermeasures for cognitive radio networks: a survey. IEEECommun Surv Tutorials 17(2):1023–1043

151. He A, Bae KK, Newman TR, Gaeddert J, Kim K, Menon R,Morales-Tirado L, Neel JJ, Zhao Y, Reed JH, Tranter WH (2010)A survey of artificial intelligence for cognitive radios. IEEETrans Veh Technol 59(4):1578–1592

152. Christian I, Moh S, Chung I, Lee J (2012) Spectrum mobil-ity in cognitive radio networks. IEEE Commun Mag 50(6):114–121

153. Liu X, Ding Z (2007) ESCAPE: a channel evacuation protocolfor spectrum-agile networks. In: Proceedings of IEEE interna-tional symposium new frontiers in dynamic spectrum accessnetworks (DySPAN), pp 292–302

154. Giupponi L, Prez-Neira AI (2008) Fuzzy-based spectrum hand-off in cognitive radio networks. In: Proceedings of IEEE interna-tional conference cognitive radio oriented wireless networks andcommunications, pp 1–6

155. Butun I, Talay AC, Altilar DT, Khalid M, Sankar R (2010)Impact of mobility prediction on the performance of cognitiveradio networks. In: Proceedings of IEEE wireless telecommuni-cations symposium (WTS), pp 1–5

156. Xing X, Jing T, Cheng W, Huo Y, Cheng X (2013) Spectrumprediction in cognitive radio networks. IEEE Wirel Commun20(2):90–96

157. Akbar IA, Tranter WH (2007) Dynamic spectrum allocation incognitive radio using hidden Markov models: poisson distributedcase. In: Proceedings of IEEE Southeastcon, pp 196–201

158. Tumuluru VK, Wang P, Niyato D (2010) A neural network basedspectrum prediction scheme for cognitive radio. In: Proceedingsof ICC, Cape Town, pp 1–5

159. Xing X, Jing T, Huo Y, Li H, Cheng X (2013) Channel qual-ity prediction based on bayesian inference in cognitive radionetworks. In: Proceedings of IEEE INFOCOM, Turin, pp 1465–1473

160. Wen Z, Luo T, Xiang W, Majhi S, Ma Y (2008) Autoregres-sive spectrum hole prediction model for cognitive radio systems.In: Proceedings of IEEE international conference on communi-cations workshops, pp 154–157

161. Nejatian S, Syed-Yusof SK, Latiff NMA, Asadpour V (2013)Integrated handoff management in cognitive radio mobile adhoc networks. In: Proceedings of IEEE international symposiumon personal indoor and mobile radio communications (PIMRC),pp 2887–2892

162. Gozupek D, Alagoz F (2011) An opportunistic pervasive net-working paradigm: multi-hop cognitive radio networks. In: Obai-dat MS, Denko M, Woungang I (eds) Pervasive computing andnetworking. Wiley, Chichester. doi:10.1002/9781119970422.ch7

163. Rabbi KM, Rawat DB, Ahad MA, Amin T (2015) Analysis ofmulti-hop opportunistic communications in cognitive radio net-work. In: Proceedings of IEEE SoutheastCon, Fort Lauderdale,pp 1–8

164. Kartheek M, Sharma V (2012) Providing QoS in a cognitiveradio network. In: Proceedings of IEEE international conferenceon communication systems and networks (COMSNETS), pp 1–9

165. Sahoo A, Souryal M (2015) Implementation of an opportunis-tic spectrum access system with disruption QoS provisioning andPU traffic parameter estimation. In: Proceedings of IEEE inter-national conference wireless communications and networkingconference (WCNC), pp 1084–1089

166. Ansari J, Zhang X, Achtzehn A, Petrova M, Mahonen P (2011)A flexible MAC development framework for cognitive radiosystems. In: Proceedings of IEEE international wireless com-munications and networking conference (WCNC), pp 156–161

167. Mishra V, Tong LC, Chan S, Mathew J (2014) TQCR-Mediaaccess control: two-level quality of service provisioning mediaaccess control protocol for cognitive radio network. IET Netw3(2):74–81

168. Zia MT, Qureshi FF, Shah SS (2013) A energy efficient cognitiveradio MAC protocols for adhoc network: a survey. In: Proceed-ings of IEEE international conference computer modelling andsimulation (UKSim), pp 140–143

169. Timmers M, Pollin S, Dejonghe A, der Perre LV, Catthoor F(2010) A distributed multichannel MAC protocol for multihopcognitive radio networks. IEEE Trans Veh Technol 59(1):446–459

170. Kamruzzaman SM (2010) An energy efficient multichannelMAC protocol for cognitive radio ad hoc networks. Int J Com-mun Netw Inf Secur (IJCNIS) 2(2):112–119

171. Hoang DT, Niyato D, Wang P, Kim DI (2015) Performance opti-mization for cooperative multiuser cognitive radio networks withRF energy harvesting capability. IEEE Trans Wirel Commun14(7):112–119

172. Suojanen M, Nurmi J (2014) Tactical applications of hetero-geneous ad hoc networks – cognitive radios, wireless sensornetworks and COTS in networked mobile operations. In: In theproceedings of international conference on advances in cognitiveradio (COCORA), pp 1–5

173. Chvez-Santiago R, Balasingham I (2011) Cognitive radio formedical wireless body area networks. In: In the proceedingsof IEEE international workshop on computer aided modelingand design of communication links and networks (CAMAD),pp 148–152

174. Hu S, Yao Y-D, Yang Z (2014) MAC Protocol identificationusing support vector machines for cognitive radio networks.IEEE Wirel Commun 21(1):52–60

175. Cheng Y-C, Wu EH, Chen G-H (2015) A decentralized MACprotocol for unfairness problems in coexistent heterogeneous

Author's personal copy

Peer-to-Peer Netw. Appl.

cognitive radio networks scenarios with collision-based primaryusers. IEEE Syst J PP(99):1–12

176. Naranjo J, Viering I, Friederichs K (2012) A cognitive radiobased dynamic spectrum access scheme for lte heterogeneousnetworks. In: Proceedings of IEEE wireless telecommunicationssymposium (WTS), pp 1–7

177. Deaton J, Irwin R, DaSilva L (2011) The effects of a dynamicspectrum access overlay in lte-advanced networks. In: Proceed-ings of IEEE symposium on new frontiers in dynamic spectrumaccess networks (DySPAN), pp 488–497

178. Naranjo JD, Bauch G, Saleh AB, Viering I, Halfmann R (2013)A dynamic spectrum access scheme for an LTE-advanced Het-Net with carrier aggregation. In: Proceedings of InternationalITG Conferenceon Systems, Communication and Coding (SCC),pp 1–6

179. Zhang Y, Yu R, Nekovee M, Liu Y, Xie S, Gjessing S (2012)Cognitive machine-to-machine communications: visions andpotentials for the smart grid. IEEE Netw 26(3):6–13

180. Hoang DT, Niyato D (2012) Performance analysis of cognitivemachine-to-machine communications. In: Proceedings of IEEEinternational conference on communication systems (ICCS),pp 245–249

181. Aijaz A, Aghvami A-H (2015) Cognitive machine-to-machinecommunications for internet-of-things: a protocol stack perspec-tive. IEEE Internet Things J 2(2):103–112

182. Boisguene R, Chou S, Huang C (2014) A survey on cognitivemachine-to-machine communications. In: Proceedings of IEEEinternational conference wireless communications and mobilecomputing (ICWCMC), pp 739–744

183. Tarchi D, Fantacci R, Marabissi D (2015) An M2M cognitiveMAC protocol for overlaid OFDMA environments. Transac-tions on emerging telecommunications technologies (Wiley).doi:10.1002/ett.2955

184. Aijaz A, Ping S, Akhavan M, Aghvami A-H (2014) CRB-MAC:a receiver-based MAC protocol for cognitive radio equippedsmart grid sensor networks. IEEE Sensors J 14(12):4325–4333

185. Aijaz A, Aghvami A-H (2013) A PRMA based MAC protocolfor cognitive machine-to-machine communications. In: Proceed-ings of IEEE international conference communication (ICC),pp 2753–2758

186. Yang M, An J (2011) Opportunistic spectrum access with spec-trum heterogeneity in cognitive networks. In: Proceedings ofIEEE international conference wireless communications, net-working and mobile computing (WiCOM), pp 1–5

Ajmery Sultana ([email protected]) obtainedher master of science degreefrom University of Dhaka in2008. She is currently pursu-ing her PhD degree at RyersonUniversity. Her researchinterests are cognitive andcooperative communicationsystems.

Xavier N. Fernando([email protected], S’97-M’01-SM’04) received thePh.D. degree from the Uni-versity of Calgary, Canadain 2001. In 2001, he joinedRyerson University, where heis currently a Professor. Hehas authored or coauthoredclose to 100 research articles.

Prof. Fernando is a mem-ber of the IEEE COMSOCEducation Board WorkingGroup on Wireless Com-munications and an IEEEDistinguished Lecturer. He

has delivered invited lectures and tutorials worldwide. He is a Pro-gram Evaluator for ABET. He is the General Chair for the 2014 IEEECanadian Conference on Electrical and Computer Engineering. Hewas a member of Ryerson Board of Governors during 2010–2011 andthe Chair of the IEEE Toronto Section during 2012–2013. His workhas won several awards and prizes, including the IEEE HumanitarianInitiative Technology Workshop First Prize in 2014, IEEE MicrowaveTheory and Techniques Society Prize in 2010, Sarnoff SymposiumPrize in 2009, Opto-Canada Best Poster Prize in 2003, and CCECEBest Paper Prize in 2001.

Lian Zhao ([email protected], S99-M03-SM06) receivedher PhD degree from theDepartment of Electricaland Computer Engineering(ELCE) from University ofWaterloo, Canada, in 2002.She joined the Electricaland Computer EngineeringDepartment, Ryerson Uni-versity, Toronto, Canada,as an Assistant Professor in2003 and now is a Profes-sor. Her research interestsare in the areas of wire-less communications, radio

resource management, power control, cognitive radio and cooperativecommunications.

Author's personal copy