1. Introduction
Many studies have examined several aspects of cognitive radio networks (CRNs). Because the radio spectrum resource is limited for wireless communication systems, inadequate resource management can restrict the development of next-generation wireless communication systems.
A wireless sensor with a cognitive radio (CR) is called a cognitive radio wireless sensor (CR-WS). Networks of these sensors collaborate for research or industrial and consumer applications, such as environmental monitoring, warfare, child education, surveillance, microsurgery, agriculture, wildlife monitoring and fire sensing. The CR-WS generates a packet burst whenever an event is detected, and might otherwise remain silent for a long time.
In CRNs, primary users (PUs) are the license holders; therefore, they have first priority when accessing the channels. Secondary users (SUs) are opportunistic and utilize a channel whenever the PUs are not using it. Because PUs and SUs have a different priority on the channel, CR wireless sensor networks (CR-WSNs) are very different than traditional wireless sensor networks. Therefore, media access control (MAC) layer protocols designed for traditional wireless sensor networks (WSNs) cannot be used directly in CR-WSNs.
To protect the right of the PUs to access the channel, SUs have to monitor PU activity on a regular basis. If a PU claims a channel currently used by SUs, the SUs have to immediately leave the channel and inform neighboring SUs about the PU’s arrival on the channel. To flag PU activity and negotiate for the channel for data communications, most existing MAC protocols for CR-WSNs rely on a dedicated common control channel (CCC) [1]. The CCC is common among all nodes and, in most cases, it is assumed that this channel is not subject to PU intervention.
However, the CCC may get saturated, and can become a victim of a denial-of-service attack [2]. In addition, allocating just one channel for control packet exchange is a waste of resources for channel-constrained (e.g., 802.11b) networks [3]. Using the industrial, scientific and medical (ISM) band for a CCC is also a kind of violation of CRNs’ original principle.
In this work, we analyze how long it takes to access the channel under a cognitive radio media access control (CR-MAC) protocol for ad hoc cognitive radio wireless sensor networks without a dedicated CCC.
2. Related Work
CR-WSNs are a specialized ad hoc network of distributed wireless sensors that are equipped with cognitive radio capabilities. In many ways, a CR-WSN is different from conventional WSNs and conventional distributed CRNs. The CR-WSN is an emerging research area, and research on them is still in its infancy. The detailed differences in various aspects among ad hoc CRNs, WSNs, and CR-WSNs were reported by Joshi et al. [4]
Although, several MAC layer protocols, both with and without a CCC, have been reported in the literature on CRNs [5-8], there are a few MAC protocols proposed for CR-WSNs with a dedicated CCC. There are even fewer protocols proposed in the literature for CR-WSNs without a CCC.
In the CR environment, it is not allowed to access a channel without proper information about PUs’ existence in that channel. It is very important for SUs to leave the channel whenever a PU claims it. For these reasons, most of the protocols for CR-WSNs are CCC-based. In our previous work, we analyzed channel access delay in a synchronized MAC protocol for CRNs [9]. To the best of our knowledge, this is the first work that analyzes channel access delay in ad hoc CR-WSNs without a CCC.
3. Protocol Description
This paper analyzes a MAC protocol for a CR-WSN that requires no dedicated CCC. A prototype of such a protocol is described briefly. Each CR-WS node was assumed to be equipped with two transceivers; one for data packets and another for control packets. In the beginning, we assumed each CR-WS node knows how many channels can be accessed opportunistically, which is denoted by K. Whenever a node wakes up, it selects a channel to listen to and waits for a time period of length K × BI, where BI is a beacon interval fixed by a set design parameter. The BI was assumed to be a tolerable time period for PUs. If the wakened node does not receive any signal from other nodes within the K × BI time, the node declares itself the first node in the network. The first node divides the channel into BIs, and each BI is divided further into the default timeslot (τ) and Idata, as shown in Fig. 1. τ is a default time period for a particular channel and is slotted into Ns number of mini-slots. Idata is a combination of the data transmission time (I’data) and the channel switching time. The first node creates channel sensing sequence, senses the channel, and broadcasts a sync message at the beginning of the BI, and other nodes respond to the sync message, as reported by Sichitiu and Veerarittiphan [10].
Fig. 1.Channels with their default timeslots.
Fig. 2.Channel negotiation in the default timeslot.
After synchronization, the nodes sense the channel, contend for channel access, broadcast a beacon to inform the neighbors as to the BI and default time, and select the cluster head [11]. Subsequently, the nodes that have packets to send start the channel negotiation process by exchanging a channel negotiation message (CNM), along with channel negotiation acknowledge (CNM-ACK) and channel negotiation reservation (CNM-RES) packets, as shown in Fig. 2. All these packets are sent after the interframe spacing (IFS) time. Other nodes listen for the channel negotiation messages and update their channel status table.
After channel negotiation, the nodes begin sending data on the negotiated channel in the Idata period. After Idata, the nodes again rendezvous on another channel. This process continues in the same manner.
If a PU is sensed on the channel at the beginning of the default time, all the nodes hop to another channel without interfering with the PU, and they continue the process. In addition, if there are no control packets for a substantial period of time, the SUs assume the arrival of PUs on the channel. Because PUs can tolerate a unit of time up to one BI, a collision within the default time would be tolerable damage. In addition, before sending data packets in Idata, the nodes sense the channel, and if a PU detected, the SUs stop sending data packets.
4. Channel Access Delay Analysis
The channel access delay was analyzed by the control transceiver in default timeslot τ. Table 1 lists the notation used throughout this work.
Table 1.Notations and their definitions.
The contention model was considered, where the contention window size Wi in backoff stage i is determined to be
where W is the minimum contention window size, m is the station short retry count and m is also the maximum backoff stage. The expectation of the MAC layer access delay X can be expressed as
Now, the behavior of the PUs on the channel was modeled. The primary users were assumed to arrive on the channel according to a Poisson process at a rate of β, and the sojourn time of each primary user on the channel is distributed exponentially with an average of 1/α. If N denotes the number of primary users on the channel at an arbitrary time, the process {N(t), t ≥ 0} can be modeled by a birth-death process, as shown in the state transition diagram in Fig. 3.
Fig. 3.State transition diagram of the birth-death process.
If Pn is defined asPn = Pr(N = n) for n ≥ 0 , then the following set of balance equations can be obtained [12]:
The following can be obtained by solving the set of equations iteratively:
Actually, Eq. (3) is also valid for n ≥ 0.
Therefore, N has the following distribution:
If p denotes the probability that a packet transmitted from an SU encounters a collision, then
where p1 and p2 are the probability that a transmitted packet encounters a collision with any packet from a PU, and the probability that a transmitted packet encounters a collision with any packet from an SU, respectively. p2 can be obtained using the formulae described by Barowski and Biaz [13] (their Section III).
An SU will experience a collision if the channel is used by the PUs when the SU attempts to use the channel. Therefore, p1 can be approximated by of Eq. (4), if the mini-slot interval in the default time is negligibly short compared to the duration that the PU is active on the channel.
Let pbp represent the probability that an SU senses the presence of a PU on the channel during the fast-sensing period (see Fig. 2). Assuming that the duration of the fast-sensing period is negligibly small compared to the duration of the data window, then pbp can be approximated as
Also,
Combining Eq.(2) and Eq.(7) yields
Let denote the sojourn time in stage j measured in the number of mini-slots, and let represent the summation of up to stage i, i.e. s0 denotes the time when stage 0 begins in the default time of the given channel, i.e. when the MAC layer access attempt begins. When Ns and Δ denote the number of mini-slots in a single default time and the width of one mini-slot, respectively, s0 can be assumed to be distributed uniformly as follows:
If Ei represents the event that the transmission succeeds in stage i, then
By assuming independence between s0 and can be expressed as
In cases where no PU is attempting to access the channel, then of Eq.(11) can be simplified as
If a PU is sensed during the fast-sensing period, SUs do not attempt to access the channel during that BI. Therefore, when Pbp is not zero, can be expressed by the expectation of negative binomial distribution as
Combining Eqs. (11) and (13) yields
Combining Eq.(10) and Eq.(14) yields
Here,
Therefore, can be expressed as follows:
In Eq. (16), A(n,i) counts the number of solutions for the integer indeterminate equation X0 + X1 + X2 +... + Xi = n, when, Xj ≥ 1 and Xj ≤ Wj(0 ≤ j ≤ i)
A closed-form formula for A(n,i) is difficult to derive, but it is possible to evaluate the value of A(n,i) numerically for given values of n, i and Wj using the following recursive formula and initial conditions:
Assume that the MAC layer of a given node can receive data from the upper layer at an arbitrary time. Let Xadd be the random variable denoting the delay from the time when a MAC layer receives data from the upper layer to the first available default time slot.
The following can be obtained by combining Eqs. (8), (15), (16) and (17)
The channel access delay was compared with the CCC-based protocol and the discussed protocol without CCC, with varying numbers of PUs from 4 to 55 nodes. This analysis was simulated using C++, and ns-2 [14] was extended for the simulation. The first part of Table 2 lists the parameters and values used for the analysis. For the analysis, the collision probability was taken from the simulation results. The next part of Table 2 presents the simulation parameters.
Table 2.Simulation parameters.
Fig. 4 presents the results of an evaluation of the proposed model and simulation results when the number of SUs is constant at 15 nodes. In the simulation, if a CR node loses contention for channel access, it attempts to regain it next time until it wins contention or reaches the maximum retry limit. The SU node can win contention in any subsequent BI. For simplicity, it is assumed that s0 is distributed uniformly over a single default time slot in the analysis. The simulation results and the analysis results are closely matched. The small gap between the analysis and simulation results is due to the assumption of s0 above.
Fig. 4.Comparison of the channel access delay with the CCC-based protocol and non–CCC-based protocol.
Fig. 4 also compares the channel access delay in the CCC-based MAC protocol [15] and the discussed non–CCC-based protocol. The result shows that the non–CCC-based protocol has slightly more delay than the CCC-based protocol when the number of PUs increases. This is because in the CCC-based protocol, the nodes negotiate for the channel on a separate channel. On the other hand, in the discussed non–CCC-based protocol, SUs need to wait until the next default time if the channel is occupied by a PU in that channel’s default time. In the worst case, some SUs may get a chance to access the channel after several BIs. In addition, there is a channel-switching delay, because at each time, the SUs negotiate for a channel during a different channel’s default time.
Fig. 5 shows the delay due to the number of SUs, whereas the number of active PUs is constant at five. Here, active PUs means the PUs have a packet to send. The figure shows that if the number of PUs increases, the channel access delay is higher, and vice versa.
Fig. 5.Comparison of the channel access delay by analysis and simulation when the number of active PUs is 5.
The results show that when the number of active PUs is small, the channel access delay is reasonable, even if there is no dedicated CCC for control packet exchange. However, when the number of active PUs is higher, it is better to use a dedicated CCC.
5. Conclusion
This paper analyzed a non–CCC-based MAC protocol for CR-WSNs. The advantage of this protocol is that it does not require a dedicated CCC for control packet exchange. Therefore, it does not suffer from CCC bottleneck problems and saves bandwidth resources. On the other hand, this protocol requires tight time synchronization, which causes overhead. This protocol has a slightly higher channel access delay than the CCC-based protocol in the case of a dense network topology. The results suggest that CCC is necessary for dense CR-WSNs. The above-discussed non–CCC-based MAC protocol might be suitable for non–delay-sensitive applications and/or sparse-network scenarios.
The CCC-based MAC protocol has issues as to how to obtain a dedicated CCC channel to negotiate exclusively for control packets. The present study showed that it is possible to communicate opportunistically with no dedicated CCC channel. The tradeoff is that it incurs a delay in cases of dense SU deployment.
References
- Brandon F. Lo, "A survey of common control channel design in cognitive radio networks," Physical Communication, vol. 4, no. 1, pp. 26-39, March, 2011. https://doi.org/10.1016/j.phycom.2010.12.004
- Kaigui Bian and Jung-Min Park, "MAC-layer misbehaviors in multi-hop cognitive radio networks," MAC-layer misbehaviors in multi-hop cognitive radio networks," in Proc. of the 2006 US - Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), August 2006.
- Gyanendra Prasad Joshi and Sung Won Kim "Mitigating the control channel bottleneck problem in dense cognitive radio networks," International Journal of the Physical Sciences, vol. 6, no. 20, pp. 4832-4837, September, 2011.
- Gyanendra Prasad Joshi, Seung Yeob Nam, and Sung Won Kim, "Cognitive radio wireless sensor networks: Applications, challenges and research trends." Sensors, vol. 13, no. 9, pp. 11196-11228, August, 2013. https://doi.org/10.3390/s130911196
- Brandon F. Lo, "Design and analysis of common control channels in cognitive radio ad hoc networks." PhD Thesis, Georgia Institute of Technology, December, 2013.
- Yongli Sun, Bin Zhou, Zhenguo Wu, Qiufen Ni, and Rongbo Zhu, "Multi-channel MAC protocol in cognitive radio networks." Journal of Networks, vol. 8, no. 11, pp. 2478-2490, November, 2013.
- Kaigui Bian, Jung-Min Park, and Ruiliang Chen, "Control channel establishment in cognitive radio networks using channel hopping." IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 689-703, April, 2011. https://doi.org/10.1109/JSAC.2011.110403
- De Domenico Antonio, Emilio Calvanese Strinati, and M-G. Di Benedetto, "A survey on MAC strategies for cognitive radio networks." IEEE Communications Surveys & Tutorials, vol. 14, no. 1, pp. 21-44, First Quarter 2012. https://doi.org/10.1109/SURV.2011.111510.00108
- Gyanendra Prasad Joshi, Seung Yeob Nam, and Sung Won Kim, "An analysis of channel access delay in synchronized MAC protocol for cognitive radio networks," Transactions on Emerging Telecommunications Technologies, doi: 10.1002/ett.2589, September, 2012.
- Mihail L. Sichitiu and Chanchai Veerarittiphan, "Simple, accurate time synchronization for wireless sensor networks," in Proc. of the IEEE Wireless Communications and Networking (WCNC 2003), vol.2, pp.1266-1273, March 16-20, 2003.
- Gyanendra Prasad Joshi, Srijana Acharya and Sung Won Kim, "Decentralized cognitive radio medium access control protocol for cognitive radio wireless sensor networks," INFORMATION, in press.
- S.M. Ross, Probability Models for Computer Science. Academic Press, New York.
- Yawen Barowski and Saâd Biaz, The performance analysis of IEEE 802.11 under unsaturated traffic conditions, Technical Report, Auburn University, Alabama, USA, pp. 1-12, August 3, 2004.
- The network simulator-ns-2. Internet: http://www.isi.edu/nsnam/ns/. Accessed 17 June 2009.
- Michael Timmers, Sofie Pollin, Antoine Dejonghe, Liesbet Van der Perre, and Francky Catthoor, "A distributed multichannel MAC protocol for multihop cognitive radio networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 1, pp. 446-459, January, 2010. https://doi.org/10.1109/TVT.2009.2029552
Cited by
- A MAC Protocol for CR-WSN without a Dedicated Common Control Channel vol.11, pp.3, 2014, https://doi.org/10.1155/2015/982408
- Enhanced Channel Access Estimation based Adaptive Control of Distributed Cognitive Radio Networks vol.10, pp.3, 2014, https://doi.org/10.3837/tiis.2016.03.022
- Analysis of Density-Adaptive Spectrum Access for Cognitive Radio Sensor Networks vol.eb99, pp.5, 2014, https://doi.org/10.1587/transcom.2015ebp3283