Maximum Lifetime Communication Topologies of Secondary User Nodes in Cognitive Radio Ad hoc Networks

نویسنده

  • Natarajan Meghanathan
چکیده

A Cognitive radio ad hoc network (CRAHN) is an ad hoc network of primary user (PU) nodes and secondary user (SU) nodes, wherein the SU nodes use the licensed channels of the PU nodes when not in use. As the availability of the PU channels fluctuates with time, communication topologies spanning the SU nodes have to be dynamically and frequently reconfigured. Given the complete knowledge of the availability of the PU channels, we propose a generic benchmarking algorithm that determines a sequence of stable communication topologies spanning all of the SU nodes such that the number of transitions from one instance of the topology to another is the global minimum. At any time instant t when we need a stable communication topology spanning the entire network, we look for the largest value of k such that the intersection of the static SU graphs from time instants t to t+k, defined as the mobile graph Gt...t+k(SU) = Gt(SU) ∩ Gt+1(SU) ∩ .... ∩ Gt+k(SU), is connected and that the mobile graph Gt...t+k+1(SU) is not connected. We repeat the above procedure for the entire network session to determine a sequence of longest-living instances of the mobile graphs and the corresponding instances of the communication topology of interest (say a shortest path tree rooted at a source SU node) such that the number of topology transitions is the minimum. We prove the theoretical correctness of the algorithm and evaluate its effectiveness by implementing it to determine a sequence of shortest path trees of the maximum lifetime.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Broadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach

While routing in multi-hop packet radio networks (static Ad-hoc wireless networks), it is crucial to minimize power consumption since nodes are powered by batteries of limited capacity and it is expensive to recharge the device. This paper studies the problem of broadcast routing in radio networks. Given a network with an identified source node, any broadcast routing is considered as a directed...

متن کامل

Routing Protocols for Mobile Cognitive Radio Ad Hoc Networks

Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The basic idea of cognitive radio networks is that the unlicensed devices (co...

متن کامل

A Review of routing protocols for mobile cognitive radio ad hoc networks

Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The basic idea of cognitive radio networks is that the unlicensed devices (co...

متن کامل

Study on Power Control in the Cognitive AD HOC Self-organizing Network

Nodes in ad hoc networks form dynamic topologies typically with scarce resources, such as energy and bandwidth. A main challenge in the operation of such networks is the efficient allocation of resources for radio communications. In this context, the presented paper proposes a power control mechanism created as a network-assisted function of ad hoc cognitive packet-based routing and aimed at re...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer and Information Science

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015