Skip to main content

Systematic construction of common channel hopping rendezvous strategies in cognitive radio networks

Abstract

Cognitive radio networks (CRNs) have emerged as a promising paradigm that can solve the shortage of spectrum resources, providing the ability to adapt and opportunistically exploit the spectrum holes. The rendezvous process allows cognitive users to find a common channel and establish a communication link. In this paper, we focus on the design of fast blind rendezvous algorithms to guarantee that every node should be able to rendezvous in all common available channels. We follow a systematic approach by first proposing a role-based algorithm that ensures maximum rendezvous diversity and then extending it to a common strategy through the use of multiples radios. Both proposals guarantee rendezvous under symmetric and asymmetric models. Simulation results show that our proposals outperform other recently developed rendezvous protocols with similar approaches in terms of expected time to rendezvous and maximum time to rendezvous.

1 Introduction

Recent spectrum measurements indicate that much of licensed spectrum is underutilized most of the time and unlicensed spectrum has been overcrowded due to the growth of wireless applications. Cognitive radio networks (CRNs) have been proposed to solve the shortage of usable spectrum and improve the efficiency in the usage of licensed spectrum [1,2].

In CRNs, each cognitive device, or secondary user (SU), has one or more radios capable of sensing the spectrum and detecting portions that are not being used by licensed users, or primary users (PU). To establish a communication link, two SUs should meet on a common channel and exchange handshake information, this process is referred to as rendezvous and is essential in the CRNs operation [3]. Because of the different locations of SUs, the set of spectrum holes, also called available channel set, may not be the same for each SU. If the set of available channels is the same for all SUs, then we are dealing with a symmetric model; otherwise, the model is said to be asymmetric (i.e., different SUs perceive different available channels).

A simple way to solve the rendezvous problem is by using a common control channel (CCC) [4]. In this approach, one of the available channels is assigned as the CCC and serves as the rendezvous channel. Some works have proposed static and dynamic CCC selection [5-10]. Although they have good theoretical performance, their main drawback is that a CCC constitutes a single point of failure, experiencing congestion when the number of PUs increases and facing the possibility that the CCC is occupied by a PU [11,12]. Another approach is to use channel hopping (CH) sequences, in which each SU visits the network channels following a predefined strategy in order to achieve rendezvous in any of the available channels. This process is referred to as blind rendezvous and overcomes the drawbacks of CCC.

Additionally, according to the SUs’ behavior, there are different types of rendezvous strategies [13]. If SUs have preassigned roles (e.g., transmitter or receiver), they can follow different algorithms to generate their CH sequences and perform a role-based (RB) strategy. These strategies have been proven to be optimal in minimizing the time to rendezvous, and the sequences generated by each SU are different. On the other hand, the preassigned role is not possible in some scenarios, and in these cases, the SUs must perform a common strategy (CS) to generate their CH sequences. Unlike the RB strategy, in CS the sequences generated by each SU are identical. Mixed or hybrid strategies are also possible in which the SUs use the same algorithm to generate the CH sequences but the generated sequences are different (e.g., by using a random seed). Furthermore, CS-CH sequences can be deterministic, in which case they are periodically repeated, or can be generated following a random pattern. The latter approach has been used in [12,14]. The authors in [12] show that in scenarios with intermittent PU activity the use of deterministic sequences offers no advantages over random CH algorithms. However, the main drawback of the random solutions is that they cannot guarantee the rendezvous in finite time under any circumstance. The analysis of random sequences is out of the scope of this paper, whose main focus is on the design of deterministic sequences.

Most works regarding CH rendezvous [14-29] consider that the time is divided into slots and the time to rendezvous (TTR) is defined as the number of time slots needed to successfully rendezvous after all SUs have begun the CH sequences. Moreover, the expected TTR (ETTR) and the maximum TTR (MTTR) are two important metrics commonly used to evaluate these strategies and are often computed when all channels are available. The authors in [15,16] adopt the term maximum conditional TTR (MCTTR) to refer to the MTTR when not all channels are available to all SUs. Some authors [15,17,27,30] also consider in the design of CH sequences the number of channels in which the rendezvous may occur (rendezvous diversity). However, most of them only make a qualitative analysis of this parameter. A metric for evaluating the rendezvous diversity can be found in [15,19,21]. As expected, in the asymmetric model, the algorithms with greater rendezvous diversity perform better than the mechanisms where the rendezvous is only achieved in a few channels.

In this paper, we focus on the design of deterministic CH sequences based algorithms to solve the blind rendezvous problem. Our main purpose is to develop a fast rendezvous algorithm which guarantees that SUs may meet in all available channels. We follow a systematic approach by first proposing a full diversity channel hopping (FDCH) role-based algorithm that ensures maximum rendezvous diversity, and then extending it to a common strategy through the use of multiples radios. We include a theoretical analysis as well as extensive simulations for two-user and multi-user CRNs under symmetric and asymmetric models, in order to demonstrate that the proposed strategies outperform other recently proposed ones.

The remainder of this paper is organized as follows. Related work is reviewed in Section 2. The system model and problem formulation is presented in Section 3. In Section 5, we propose the FDCH role-based (FDCH-RB) and FDCH common strategy (FDCH-CS) algorithms and present their theoretical performance analysis. Section 6 extends our proposal to the multi-user scenario. Simulation results are presented in Section 7. Finally, Section 8 concludes the paper.

2 Related works

Several algorithms have been proposed to solve the blind rendezvous issue. In [17], the asynchronous channel hopping (ACH) algorithm is proposed where the authors focus on designing CH sequences that ensure rendezvous in all available channels and use the term rendezvous diversity to denote the number of channels in which the rendezvous may occur. First, they present a transmitter and a receiver sequence (i.e., a RB strategy) and then propose a CS strategy that allows each SU to alternate between these sequences, as to guarantee rendezvous and ensure maximum rendezvous diversity (i.e., rendezvous in all available channels). Recently, in [18], we proposed a simple role-based (SRB) strategy for the symmetric model that outperforms the ACH(RB) algorithm. However, the SRB is unable to guarantee rendezvous in the asymmetric model.

The authors in [15] present four quorum-based channel hopping (QCH) strategies. These algorithms are role based. The M-QCH and L-QCH are described under the assumption of global time synchronization between SUs (i.e., synchronous environment), while A-QCH and A-MOCH do not need time synchronization between SUs. Although A-QCH and A-MOCH work in asynchronous environments, the A-MOCH ensures maximum rendezvous diversity while A-QCH does not. Like ACH(RB) and A-MOCH, our approach considers a role-based strategy which ensures maximum rendezvous diversity but with a different sequence construction scheme that guarantees rendezvous in both, synchronous and asynchronous, environments. Also we extend our proposal to a common strategy by the use of two radios.

Two RB strategies called rendezvous couple channel hopping (RCCH) and asynchronous rendezvous channel hopping (ARCH) are proposed in [19]. The first one considers that the SUs have global clock synchronization while the other assumes an asynchronous scenario and both ensure maximum rendezvous diversity when the number of network channels is even. Also this paper presents the symmetric asynchronous rendezvous channel hopping (SARCH) which is a CS strategy but not ensures maximum diversity. In our proposal, no global clock synchronization is assumed, neither the number of network channels is constrained.

As in ACH, A-MOCH, RCCH, and ARCH algorithms, the authors in [20,21] consider the rendezvous diversity in the design of an efficient channel hopping (ETCH) algorithm. This algorithm has two variants; first, the authors propose SYNC-ETCH which considers synchronous environments. Next, the ASYN-ETCH algorithm is proposed which does not assume the existence of global clock synchronization. Both ensure maximum rendezvous diversity. The main drawback of the ASYN-ETCH is that it exhibits a greater MTTR than that of other similar proposals [19].

In [22] three algorithms called generated orthogonal sequence (GOS) based, modular clock (MC), and modified modular clock (MMC) are presented. The GOS and MC algorithms only work under the symmetric model while MMC provides asymmetric model support. In terms of ETTR, the MC and MMC performance is better than that of GOS, but they do not guarantee rendezvous.

Other CS-CH sequence algorithms are introduced in [23] and [24]: the deterministic rendezvous (DRSEQ) and the channel rendezvous (CRSEQ). Although both schemes guarantee rendezvous, none of them guarantees maximum rendezvous diversity. The DRSEQ algorithm only works under the symmetric model and outperforms GOS, MC, and CRSEQ in this scenario.

The aforementioned algorithms consider that the SUs follow a CH sequence for visiting each of the channels in the network and once in the selected channel perform spectrum sensing to identify whether the channel is free of PU activity. This strategy can be effective when the channels used by the PUs change dynamically. However, in scenarios where these channel changes do not occur or occur very slowly, other mechanisms are more suitable. In this paper, we consider that during the rendezvous attempt the PUs operate in a fixed set of channels and that the SUs have prior knowledge of the state of each of the network channelsa. With this knowledge, some authors [16,25-29] provide each SU with the ability to attempt to rendezvous only in a channel previously identified as available (free of PU interference).

In [25] the ring walk (RW) rendezvous algorithm and two variants, RW1 and RW2, are proposed. Both work under symmetric and asymmetric models, guarantee multi-user rendezvous, and outperform GOS, MC, and MMC in terms of ETTR. The performance of RW2 is better than RW1, but none of them ensures maximum rendezvous diversity.

The authors in [26] propose the jump stay (JS) algorithm which guarantees rendezvous under symmetric and asymmetric models, supports multi-user rendezvous, and ensures maximum rendezvous diversity. In [27] the same authors report the enhanced jump stay (EJS) algorithm that also guarantees rendezvous in all available channels and improves over JS in terms of ETTR and MTTR for the asymmetric model but slightly increases the MTTR in the symmetric model. The fast rendezvous channel hopping (FRCH) algorithm is introduced in [16] and is shown to outperform JS in terms of ETTR. In [28] we propose the short sequence-based (SSB) rendezvous algorithm which outperforms the FRCH and EJS algorithm in terms of ETTR and MTTR but, like FRCH, does not guarantee rendezvous in all available channels.

Except in the ACH(RB), SRB, RCCH, and ARCH in all other protocols described above, all SUs use the same algorithm to generate the CH sequences. However, in the SYNC-ETCH, ASYN-ETCH, MC, MMC, JS, EJS, and RW algorithms, each SU uses different parameters to generate its CH sequence. Thus, even when using a common algorithm, the jump sequences generated by each SU are different. These algorithms are an hybrid variant between CS and RB strategies. Note that they do not need preassigned roles, but the hopping sequences are different for each SU. One way to generate different CH sequences is that each SU uses random selected parameters, as this is the approach used in the MC, MMC, JS, and EJS algorithms. On the other hand, in the RW algorithm, each SU uses its ID as a seed to generate the CH sequences.

Most of the reported algorithms [16-28] implicitly consider that each SU is equipped with one radio. However, the use of multiple radios can help to reduce the TTR. This view is presented in [29] where a role-based parallel sequence (RPS) is proposed to exploit multiple radios and reduce the ETTR in a two-user scenario. The SUs use an hybrid strategy to generate the CH sequences which ensure rendezvous and maximum rendezvous diversity. The use of multiple radios allows each radio to use a different CH sequence, so that each SU assumes more than one role simultaneously. Our approach is similar to that described in [29], but with different CH sequences, providing better performance in most practical scenarios as can be seen in Section 7.

Table 1 shows a brief comparison of some of the above mentioned algorithms considering the asymmetric model support, rendezvous diversity, and rendezvous strategy. Also we include the theoretical results in terms of ETTR, MTTR, and MCTTR as provided by the respective authors.

Table 1 Summary of representative rendezvous protocols

3 System model and problem formulation

We consider a CRN consisting of M≥2 SUs which coexist with some PUs in the same geographical area. The PUs are the licensed users of the spectrum, which can be divided into N≥2 non-overlapping channels, labeled as 0,1,…N−1, and these labels are the same for all SUs. We assume that the time is divided into slots of equal duration. For any time slot \(t\in \mathbb {N}\) b let S u (t), \(S_{u}: \mathbb {N}^{*} \rightarrow \{0,\ldots,N-1\}\), be the CH sequence for SU u, u{1,2,…M}. Let A u {0,1,2,…,N−1} be the set of available channels for SU u, where a channel is said to be available for SU communication if PU activity is not detected in this channel. Like [16,25-27] we consider that each SU know its set of available channels (i.e., A u ) before the rendezvous process begins. Let G be the number of commonly available channels for all SUs (i.e., \(G=|\bigcap _{\forall u}A_{u}|\), where \(\bigcap _{\forall u}A_{u}\) is the intersection between the set of available channels for all SUs and |·| is the cardinality operator). Note that G≠0 is a necessary condition for a feasible rendezvous solution.

According to the channels’ availability, we consider both symmetric and asymmetric models. In the symmetric model, the SUs perceive the same available channels, so that A i =A j ,i,jM. For the asymmetric model, different SUs might perceive different available channels.

We also assume that the SUs have not global time synchronization and each one has a local independent clock. We emulate slot boundary synchronization following a similar approach as in [23,26]. Let τ be the minimum duration for exchanging the necessary handshake information. In [23] the authors proved that since the SUs may not be time synchronized, the duration of a time slot of at least 2τ ensures that the overlap of any two slots is sufficient to complete the rendezvous process. As proved in [26], this is equivalent to consider that the SUs are synchronized with respect to slot boundaries. Moreover, we consider that the SUs can start its CH sequences at different time slots.

We consider important to highlight that even if two SUs are in the same channel, the communication between them can fail due to fading, contention with other SUs or some other situations that affect the quality of the channels. Then, if the CH sequence only guarantees that SUs meet in few channels, the rendezvous will be conditioned by the state of those channels and eventually will degrade the TTR performance. Thus, in addition to ensuring rendezvous, it is also important to diversify the channels where rendezvous may occur (i.e., to maximize rendezvous diversity). To compute the rendezvous diversity, we introduce a new metric, the rendezvous diversity index, which is a variation of the degree of rendezvous proposed in [19].

Definition 1.

In a CRN with G common available channels for SUs, if C: |C|≤G is a set of channels in which the rendezvous occurs, the rendezvous diversity index can be computed as: \(D=\frac {|C|}{G}\).

The rendezvous diversity is maximized when |C|=G which minimizes the risk of rendezvous failures. For some rendezvous protocols [16,22-25,28], the cardinality of C is a function of the channels in which each SU starts the rendezvous process. Accordingly, we consider \(\overline {D}\) as the mean value of the rendezvous diversity index and when \(\overline {D}=1\) we say that the rendezvous scheme ensures maximum rendezvous diversity.

4 Basic idea for CH sequence construction

Similar to [18,24], we allocate T discrete points in a ring, as shown in Figure 1, such that each point represents one of the N network channels. In order to maximize rendezvous diversity, all channels appears at least once in the ring, so that TN. Note that this is an abstraction in order to clarify the analysis in the rest of this paper. In the CRN context, two SUs are initially placed in any of the T positions in the ring. In the literature, there are some classical rendezvous algorithms that work over continuous rings, as the OP-DIR algorithm [13], in which those intending to rendezvous jump in opposite directions over the ring. However, since the SUs jump at discrete positions in the CRN context, the use of such classical rendezvous algorithm is not effective in all cases. Next, some considerations regarding this issue are discussed in detail.

Figure 1
figure 1

Channel distribution.

Consider that two SUs, denoted by A and B, sequentially run through the T positions in Figure 1 in opposite directions (i.e., SU A runs clockwise and SU B runs anticlockwise, for instance), one position at a time with the same speed. Then, the CH sequences can be described as:

$$\begin{array}{*{20}l} &S_{A}(t)=(S_{A}(0)-t)\text{ mod}\, T, \end{array} $$
((1))
$$\begin{array}{*{20}l} &S_{B}(t)=(S_{B}(0)+t)\text{ mod}\, T, \end{array} $$
((2))

where S A (0) and S B (0) are the initial positions in the ring for SUs A and B, respectively, and a mod b is the non-negative remainder of the division of a by b.

Let d(t):0≤d(t)<T be the distance between the SUs which can be computed as a number of nodes between SUs A and B at time slot t, such that:

$$ d(t)=\left\{ \begin{array}{ll} S_{A}(t)-S_{B}(t), & S_{A}(t)\geq S_{B}(t)\\ T+S_{A}(t)-S_{B}(t), &S_{A}(t)<S_{B}(t). \end{array} \right. $$
((3))

Theorem 1.

If all channels are available for the SUs and d(0) is even, the rendezvous occurs in \(t_{r}=\frac {d(0)}{2}\) time slots.

Proof.

For the rendezvous to occur at time slot \(t_{r}=\frac {d(0)}{2}\), we must have S A (t r )=S B (t r ). If S A (0)≥S B (0), from (3) we have that S B (0)=S A (0)−d(0). Then, with the help of (2)

$$\begin{array}{@{}rcl@{}} S_{B}(t_{r})&=&\left(S_{A}(0)-d(0)+\frac{d(0)}{2}\right)\text{mod }T\\ &=&\left(S_{A}(0)-\frac{d(0)}{2}\right)\text{mod }T=S_{A}(t_{r}). \end{array} $$
((4))

If S A (0)<S B (0), then from (3) S B (0)=T+S A (0)−d(0), and consequently

$$\begin{array}{@{}rcl@{}} S_{B}(t_{r})&=&\left(T+S_{A}(0)-d(0)+\frac{d(0)}{2}\right)\text{mod }T\\ &=&\left(T+S_{A}(0)-\frac{d(0)}{2}\right)\text{mod }T=S_{A}(t_{r}).\ \end{array} $$
((5))

Alternatively, S A (t r )=S B (t r ) implies d(t r )=0. By noting that in each time slot both SUs sequentially jump in opposite directions (see Figure 1), if d(t)≠1 then in the next time slot the distance between them decreases by 2, so that d(t+1)=d(t)−2 (i.e., the distance between SUs decreases twice the number of elapsed time slots). Therefore, the time to rendezvous can be calculated as \(t_{r}=\frac {d(0)}{2}\) for d(0) even. □

Following the above reasoning, it is easy to see that, if d(0) is odd, after \(\frac {d(0)+1}{2}\) time slots the SUs transpose their positions without meeting each other. Once the SUs transpose their positions, the new resulting distance is T−1. Now, if T is even, the new distance, just after the SUs transpose their positions, is odd and the SUs indefinitely run through the ring without ever meeting. To overcome this problem, in what follows we restrict the analysis by making T odd.

Theorem 2.

If all channels are available for the SUs and d(0) and T are odd, rendezvous occurs in \(t_{r}=\frac {d(0)+T}{2}\) time slots.

Proof.

Given that d(0) is odd, from the above discussion, we have \(d(\frac {d(0)+1}{2})=T-1\). Since T is odd, T−1 is even and from Theorem 1 we can write \(d(\frac {d(0)+1}{2} + \frac {T-1}{2})=0\) which implies \(t_{r}=\frac {d(0)+T}{2}\). □

4.1 Rendezvous diversity analysis

To compute the rendezvous diversity of the CH sequences presented in Equations 1 and 2, let us recall the example in Figure 1, where it can be seen that the rendezvous occurs in a single channel on every lap around the ring. Also given that Equations 1 and 2 exhibit a periodic behavior with period T and that d(t) is a linear combination of S A (t) and S B (t) we have , where the value of k identifies the number of turns of each SU around the ring (thus k=0 identifies the first round, k=1 the second one and so on). This means that the rendezvous channel is the same in all sequences periods and therefore this strategy does not guarantee maximum rendezvous diversity. Therefore, next we discuss the proposed algorithm which aims at maximizing the rendezvous diversity while minimizing the TTR.

5 Proposed algorithm

As proved in Theorems 1 and 2 and according to the rendezvous diversity index definition, in order to guarantee finite MTTR and maximize the rendezvous diversity, two conditions must be met: (i) T must be odd and (ii) |C|=G. With this in mind we make

$$ T=\left\{ \begin{array}{ll} N, & \text{for}\,\, \textit{N}\,\, \text{odd}\\ N+1, & \text{for}\,\, \textit{N}\,\, \text{even}. \end{array} \right. $$
((6))

Note that, in order to make T odd, in the case of N even an additional node is placed in the ring of Figure 1 so that one of the channels is listed twice. We consider important to highlight that even when the authors in [19] also use a ring channel distribution, they restrict their analysis for the case of N even (i.e., the number of networks channels must be even). Also, the construction of the sequences presented in this section differ greatly from that of the sequences described in [19].

In what follows we propose the full diversity channel hopping algorithm with two variants, one that is role based (FDCH-RB) and another that is a common strategy (FDCH-CS). We first present the role based rendezvous algorithm and, as in [15,17-19], we assume that the SUs attempting to rendezvous have different preassigned roles which are allocated before the rendezvous process starts. In the sequel, we use the terms transmitter and receiver in order to differentiate the role of each SU. In our proposal, the transmitter runs clockwise and jumps in each time slot. The receiver runs anticlockwise and jumps for T−1 time slots but remains at the last node for one additional time slot before starting to jump for the next T−1 time slots. This behavior of the receiver ensures maximum rendezvous diversity as we will discuss in Section 5.2.

Moreover, we consider that each sequence replaces the unavailable channels by an available one. Then, let S T (t) and S R (t) be the CH sequences of the transmitter and the receiver, respectively. The procedure for sequences construction are shown in Algorithms 1 and 2 where S T (0), S R (0) denote the initial channels and A T , A R are the set of available channels of the transmitter and the receiver, respectively.

An example of sequences for even and odd values of N is shown in Figure 2. Due to the lack of synchronization between SUs, each one can begin its CH sequence at different time slots. The time to rendezvous is measured taking as starting point the time slot where both sequences have already begun. In Figure 2a, N=4 and the additional channel is marked as 4(0). The first number is used to measure the distance between SUs and the number in parentheses is the actual channel selected in the CH sequence. Since both SUs use the same additional channel in every turn around the ring, rendezvous takes place.

Figure 2
figure 2

Transmitter and receiver sequences.(a) N is even; (b) N is odd.

5.1 ETTR and MTTR performance

By using the mathematical framework presented in [28], the ETTR can be computed as:

$$ \text{ETTR} = \frac{1}{T}\sum\limits_{d(0)=0}^{T-1}\min\left\{t_{r}:S_{T}(t_{r})=S_{R}(t_{r})\right\}. $$
((7))

By Theorems 1 and 2, the sequences intersect for first time after

$$ t_{r}=\left\{ \begin{array}{ll} \frac{d(0)}{2}, & \text{for}\, \text{d(0)}\, \text{even}\\ \frac{d(0)+T}{2}, & \text{for}\, \text{d(0)}\, \text{odd} \end{array} \right. $$
((8))

time slots. Therefore, (7) can be rewritten as:

$$\begin{array}{@{}rcl@{}} \text{ETTR} &=& \frac{1}{T}\left\{\sum\limits_{d(0)=1}^{\frac{T-1}{2}}\frac{2d(0)}{2}+\sum\limits_{d(0)=1}^{\frac{T-1}{2}}\left[\frac{2d(0)-1+T}{2}\right]\right\}\\ &=&\frac{1}{T}\left\{2\sum\limits_{d(0)=1}^{\frac{T-1}{2}}d(0)+\sum\limits_{d(0)=1}^{\frac{T-1}{2}}\frac{T-1}{2}\right\}\\ &=&\frac{T-1}{2}. \end{array} $$
((9))

Additionally, from (8) the maximum time to rendezvous occurs when d(0) is odd and equal to T−2, then by making d(0)=T−2 in (8) we have MTTR=T−1. The greatest value of MTTR for the proposed FDCH-RB algorithm happens when T=N+1, in such case MTTR=N. Note that this value is comparable with the MTTR for the SRB algorithm and smaller than that of the MTTR for the A-MOCH and ARCH algorithms (see Table 1). We consider important to highlight that the ETTR and MTTR as computed by the above equations are valid when all N channels are available for the SUs. In the next section, we analyze the MCTTR as the maximum TTR in scenarios where the number of common available channels is less than N.

5.2 Rendezvous diversity and MCTTR

As described at the beginning of Section 5 and shown in Figure 2b, at every time slot, the transmitter jumps to the next position in the sequence. However, the receiver follows the jump pattern for T−1 time slots and then stays in the same channel for one time slot before the new jump period. As a consequence, the distance, as defined in (3), between SUs at the beginning of each lap around the ring increases by one with respect to the previous lap, except when the distance has its maximum value in which case is reduced to zero, that is

$$ d((k+1)T)=(d(kT)+1)\,\,\text{mod}\,\, T, $$
((10))

and by solving the recurrence relation (10) we obtain

$$ d(kT) = (d(0)+k)\,\,\text{mod} T. $$
((11))

Note that d(k T) takes values in the range from 0 to T−1 being an infinite sequence of truncated discrete ramp functions concatenated together. Then, after T laps of the SUs around the ring (i.e., from k=0 to k=T−1), d(k T) has swept all possible integer values in its output range. Also, it is important to highlight that the proposed algorithm guarantees rendezvous for each lap around the ring. Let \({t^{k}_{r}}\) be the TTR in the kth lap around the ring, measured from the beginning of that lap. Then, using (8) and (11), \({t^{k}_{r}}\) can be written as

$$ {t^{k}_{r}}=\left\{ \begin{array}{ll} \frac{d(kT)}{2}, & \text{for}\, \, d(kT)\, \, \text{even}\\ \frac{d(kT)+T}{2}, & \text{for}\, \, d(kT)\, \, \text{odd}. \end{array} \right. $$
((12))

By evaluating the transmitter sequence in \({t^{k}_{r}}\) we have

$$ S_{T}({t^{k}_{r}})=(S_{T}(0)-{t^{k}_{r}})\, \,\text{mod}\, \, T. $$
((13))

Note that each different value of d(k T) implies a different value of \({t^{k}_{r}}\) in the range from 0 to T−1. Hence, after T turns around the ring, the rendezvous will have occurred in all possible channels according to (13). In other words, in every lap around the ring, the initial distance between SUs changes, modifying the next time to rendezvous and the resulting rendezvous channel. This means that FDCH-RB guarantees maximum rendezvous diversity.

Theorem 3.

The MCTTR for the FDCH-RB algorithm is MCTTR=T 2−1.

Proof.

If not all channels are available for the SUs, due to the maximum rendezvous diversity property, in the worst case the rendezvous occurs in lap k=T−1. By noting that at the start of lap k, the elapsed time since the beginning of the rendezvous process is kT, the maximum conditional TTR (i.e., for the worst case) can be computed as M C T T R=(T−1)T+M T T R. Since, as derived in Section 5.1, in a lap where rendezvous is guaranteed the MTTR is T−1, we have M C T T R=T 2−1. □

The greatest value of MCTTR happens when N is even, in such case T=N+1 and MCTTR=N 2+2N. This value is greater than that of the MCTTR for A-MOCH and ARCH algorithms. However, for N odd the MCTTR of the proposed FDCH-RB algorithm is MCTTR=N 2−1 which is slightly smaller than the MCTTR for the A-MOCH algorithm. Note that the ARCH algorithm only ensures rendezvous when N is even (see Table 1).

Additionally, the jump pattern of the transmitter causes that the channel S T (t+k T) is the same for any value of k. However, as a consequence of the jump-stay pattern of the receiver, S R (t+k T) sweeps all possible values in its output range for 0≤kT−1. Then, in each lap around the ring to the same channel S T (t+k T), corresponds a different channel S R (t+k T) (e.g., time slots 1, 6, 11, and 16 in Figure 2a). Exploiting this feature, if the SUs are under the symmetric model, the unavailable channels are replaced by one channel in A u (i.e., the set of available channels seen by SU u) in the following T laps to the ring as described in line 2 of Algorithm 3, where the notation A u(i) is used to indicate the ith element of Au. Note that for the symmetric model G=|A u | and SUs always replace unavailable channels by a commonly available one.

However, under the asymmetric model, G≠|A u | and therefore, the replacement operation described above offers no advantage. In this case, we propose a random replacement operation. Note that since the proposed strategy ensures maximum rendezvous diversity, the random nature of the replacement operation do not compromise the MCTTR. The random replacement operation is described in Algorithm 4.

5.3 Removing the preassigned roles

The CH sequences construction described in the previous section gume slots, the ETTR can be computed as:arantees rendezvous and ensures maximum rendezvous diversity but requires that the roles be preassigned, which may not be possible in all scenarios. To overcome this drawback, the authors in [17] propose that each SU uses its ID to alternate between the role of transmitter and receiver. Although this proposal guarantees rendezvous, the performance in terms of ETTR of the CS strategy is worse than the RB strategy.

To solve the problem of allocation of roles, we equipped the SUs with two radios that operate simultaneously. One radio follows the transmitter sequence and the other the receiver sequence. Since the SUs implement the same algorithms, they perform a CS strategy. The appropriate use of more than one radio improves the ETTR and MTTR as was concluded in [29] and as we are going to show in the sequel. Figure 3 shows the basic idea behind our maximum diversity channel hopping common strategy (FDCH-CS) algorithm. Let S Tu (t) and S Ru (t) denote the transmitting and receiving CH sequences followed by the SU u, and S u (0) the initial position of SU u on the ring.

Figure 3
figure 3

Common strategy. N=5, d 12(0)=3, d 21(0)=2.

Since each SU runs both sequences simultaneously, the rendezvous is expected to be achieved between the transmitter sequence of one SU and the receiver sequence of the other (i.e., S T1(t)=S R2(t) or S T2(t)=S R1(t)). Then, there exist two different values of d(0): d 12(0) for S T1(0) with respect to S R2(0) and d 21(0) for S T2(0) with respect to S R1(0). Algorithm 5 shows the proposed common strategy (FDCH-CS).

Theorem 4.

If two SUs use the FDCH-CS algorithm to generate their CH sequences, then: \(\text {MTTR}=\frac {T-1}{2}\) and \(\text {ETTR}=\frac {(T-1)(T+1)}{4T}\).

Proof.

Considering that the SUs begin the rendezvous process at the same time and from Figure 3, it can be noted that d 12(0)+d 21(0)=T. Given that T is odd, always one of the distance values between SUs (d 12(0) or d 21(0)) is even. We refer to this value as d p (0). Note that even when the SUs do not begin the rendezvous process at the same time, 0≤d p (0)≤T−1, so that the worse case occurs when the SUs begin the rendezvous process at the same time and the maximum value of d p (0) is T−1 and by Theorem 1\(\text {MTTR}=\frac {T-1}{2}\).

In Figure 3 d 21(0)=d p (0)=2, however, if SU2 was at node 4 in the ring, then d 12(0)=2, d 21(0)=3 and also d p (0)=2. This analysis leads to a value of d p (0) that is the same for two different positions of SU2 in the ring. Then, considering that d p (0)=0,2,4,…T−1, the probability of d p (0) assuming a given value is

$$ \text{Pr}\left[d_{p}(0)\right]=\left\{ \begin{array}{ll} \frac{1}{T}, & ~~\text{for}~~ d_{p}(0)=0\\ \frac{2}{T}, & ~~\text{for}~~ d_{p}(0)>0 ~~\text{and}~~ d_{p} ~~\text{even}. \end{array} \right. $$
((14))

As the SUs intersect for the first time after \(t_{r}=\frac {d_{p}(0)}{2}\) time slots, the ETTR can be computed as:

$$\begin{array}{@{}rcl@{}} \text{ETTR} &=& \frac{2}{T}\sum\limits_{d_{p}(0)=1}^{\frac{T-1}{2}}\frac{2d_{p}(0)}{2}\\&=&\frac{1}{T}\left[\left(\frac{T-1}{2}\right)\left(\frac{T-1}{2}+1\right)\right]\\ &=&\frac{(T-1)(T+1)}{4T}. \end{array} $$
((15))

Theorem 5.

If two SUs use the FDCH-CS algorithm to generate their CH sequences, then MCTTR=T 2−1.

Proof.

Because the SUs follow S T (t) and S R (t) sequences simultaneously, they meet twice in every lap around the ring. As we also considered in the proof of Theorem 4, the rendezvous happens for the first time at \(t_{r}=\frac {d_{p}(0)}{2}\). Furthermore, there is a distance value between SUs that is odd (Td p (0)). Considering the second term of (8), the SUs rendezvous for the second time at \(t_{s}=\frac {2T-d_{p}(0)}{2}\).

The rendezvous channels can be identified as: c 1=S T (t r ) and c 2=S R (t s ) for the first and second rendezvous, respectively. With the help of Algorithms 1 and 2, c 1 and c 2 can be rewritten as:

$$\begin{array}{@{}rcl@{}} c_{1} &=&\left(S_{T}(0)-\frac{d_{p}(0)}{2}\right) \text{mod} \, T,\\ c_{2} &=&\left(S_{R}(0)+\frac{2T-d_{p}(0)}{2}\right) \text{mod} \, T\\ &=&\left(T+S_{R}(0)-\frac{d_{p}(0)}{2}\right) \text{mod} \ T. \end{array} $$
((16))

Considering that the remainder operation is non-negative and that S Tu (0)=S Ru (0)=S u (0) it can be seen that c 2=c 1. Then, although SUs meet twice at every lap around the ring, the rendezvous happens in the same channel and according to the proof of Theorem 3 MCTTR=T 2−1. □

Let us remark that in our CS strategy each user follows the S T and S R sequences simultaneously; therefore, as in the RB strategy, maximum rendezvous diversity is also guaranteed. Also we consider important to highlight that the FDCH-CS algorithm, in terms of ETTR and MTTR, performs better than the FDCH-RB algorithm. This is an expected result due to the fact that FDCH-CS uses two radios.

6 Multi-user rendezvous algorithm

The proposed FDCH-CS algorithm can be extended to a multi-user scenario. The purpose is to achieve rendezvous for M SUs by multiple pair-wise rendezvous. Once two SUs rendezvous in one of the channels, they interchange information to synchronize their parameters and, after that, the two SUs generate an identical CH sequence.

Each SU u has two parameters to determine the jump sequence: the initial channel (S u (0)) and the current time slot since the beginning of its sequence (t u ). After SU1 and SU2 successfully rendezvous, each one updates its parameters according to the following strategy: S 1(0)=S 2(0)= min{S 1(0),S 2(0)} and t 1=t 2= min{t 1,t 2}. Afterward, the two SUs generate an identical CH sequence.

As an illustrative example, consider the scenario shown in Figure 4 where P u is the parameter set of SU u and the lines between users denote that they are within the communication range of each other (i.e., they are neighbors). Since two users may have different available channels, the replacement operation described in Section 5.2 may cause that each user replaces unavailable channels by a different one. This replacement operation may broken the previous parameter synchronization.

Figure 4
figure 4

Multi-user scenario.

To illustrate this phenomenon, let us consider that SU1 and SU2 achieve rendezvous and synchronize their parameters, so they visit the commonly available channels in the same time slots. Afterward, if SU2 performs the replacement operation and eventually achieves rendezvous with SU3, the parameters synchronization between SU2 and SU3 may break the previous synchronization between SU2 and SU1. Although the pair-wise rendezvous has been proposed in [25,26], these works do not consider the problem of breaking the previous parameter synchronization. To avoid this problem, let us define ChS u as the set of potentially channels for parameter synchronization and at the beginning of rendezvous process ChS u =A u . When a rendezvous between two SUs occurs, they only synchronize their parameters if the rendezvous channel belongs to ChS1∩ChS2. Let us remark that the only purpose of ChS u is to ensure the parameters’ synchronization between all SUs so, like in the two-user scenario, each SU uses its perceive available channels (i.e., A u ) to perform the replacement operation. The proposed multi-user strategy is show in Algorithm 6.

In order to compute the ETTR, MTTR, and MCTTR in the multi-user scenario, let be the network diameter denoting the maximum number of hops between two SUs (e.g., in Figure 4 the more remote SUs are SU1 and SU3, so H=2).

Theorem 6.

In a CRN with network diameter H and M≥2 SUs, the MTTR and MCTTR for all SUs to achieve rendezvous are \(\text {ETTR}_{M}\leq H\left (\frac {(T-1)(T+1)}{4T}\right)\), \(\text {MTTR}_{M}=H\left (\frac {T-1}{2}\right)\) and MCTTR M =H(T 2−1), respectively.

Proof.

Without loss of generality, consider the scenario of Figure 4 with S 1(0)<S 2(0)<S 3(0) and t 3<t 2<t 1. In this situation, the three SUs rendezvous when all of them update their parameters to S 1(0) and t 3. For this to happen H=2 pair-wise rendezvous are required (i.e., SU1 with SU2 and later, SU2 with SU3). Note that independently of the order in which the rendezvous between SUs occurs, always are needed H pair-wise rendezvous. By Theorem 4, in the FDCH-CS strategy, two neighboring SUs rendezvous in at least \(\frac {T-1}{2}\) time slots. Then, for any H, all SUs in the network rendezvous in at least \(\text {MTTR}_{M}=H\left (\frac {T-1}{2}\right)\).

By Theorem 4 the ETTR for two SUs is \(\frac {(T-1)(T+1)}{4T}\). Considering the above analysis and the properties of expected value, then ETTR M H \(\left (\frac {(T-1)(T+1)}{4T}\right)\). When not all channels are available, two SUs achieve rendezvous in at least MCTTR=T 2−1 (see Theorem 5). Then, like in the previous analysis, all SUs in the network rendezvous in at least MCTTR M =H(T 2−1). □

7 Simulation

Simulations are used to evaluate the performance of the proposed strategies. The simulations cover two-user and multi-user scenarios under symmetric and asymmetric models. We consider a CRN with at most 45 potentially available channels for SUs (N≤45), each SU performs spectrum sensing to determine its set of available channels (A u ). To evaluate the ETTR and the MTTR, we compute the average TTR and the maximum TTR of 105 independent runs, respectively. In each run, the SUs are initially placed in a randomly selected channel.

7.1 Impact of rendezvous diversity

To evaluate the impact of rendezvous diversity, we assume that all channels are available for the SUs (N=|A u |=G=45). We also consider that in α N, 0≤α≤1 channels, the communication between SUs may fail with a certain probability ρ, so that even if a pair of SUs jump to one of these channels at the same time slot, the rendezvous between them may failc with probability ρ. Table 2 shows the mean of rendezvous diversity index for some of the protocols in Table 1 d Note that while RW2, DRSEQ, SSB, and FRCH only guarantee rendezvous in 5% of the channels, EJS, ACH(RB), and the proposed schemes ensure maximum rendezvous diversity.

Table 2 Mean of rendezvous diversity index ( \(\overline {D}\) )

To show the impact of maximum rendezvous diversity, let ETTR ρ and ETTR0 be the ETTR for ρ>0 and for ρ=0, respectively. Thus, we introduce the increased ETTR (I-ETTR), as a new metric that can be calculated as

$$ \text{I-ETTR} = \text{ETTR}_{\rho}-\text{ETTR}_{0}. $$
((17))

Figure 5 shows the I-ETTR as a function of ρ when the communications between SUs may fail in 10% of the channels (α=0.1). It is worth noting that the I-ETTR increases faster with ρ for protocols with \(\overline {D}<1\). This result can be extended for α>0.1, and although the I-ETTR for all protocols increase, the maximum rendezvous diversity protocols still have better performance, with a smaller increase rate in the I-ETTR. These results show that maximum rendezvous diversity protocols have a certain advantage in realistic scenarios.

Figure 5
figure 5

Impact of rendezvous diversity. N=45 and α=0.1.

7.2 Two-user symmetric scenario

In this section, we first consider a scenario like the one used in [25,26,29], in which all channels are available for the SUs. Therefore, N=|A u |=G=45, as in the previous section, but only the protocols with the best results in this scenario are included.

Table 3 shows the analytical and simulation results for the selected protocols. Note that we divide the table in four parts. The first one collects the results for DRSEQ, SSB, and FRCH algorithms which use a single radio and the SUs perform a CS strategy to generate identical sequences but, due to the lack of synchronization between SUs, each one starts its CH sequence at different time slots. In the second part, we include the RW2 and EJS algorithms which use a single radio and the SUs perform a hybrid strategy. In the RW2 algorithm, each SU uses its identification number (i.e., node ID) as a seed to generate the CH sequence. However, in the EJS algorithm, the seed is a random selected value between one and the smallest prime number greater than or equal to the number of network channels. Next, in the third part, we present the algorithms that also use a single radio but the SUs use a RB strategy (i.e., the proposed FDCH-RB and ACH(RB)). Finally, in the last part, RPS and the proposed FDCH-CS are included. Both of them consider that the SUs have two radios. It is important to note (see Table 1) that in the RPS algorithm, each SU uses a hybrid strategy to generate the CH sequence. Also, the authors of RPS exploit the use of more than two radios; however, this fact increases the complexity of secondary devices. Hence, we only consider the simpler case in which each SU has two radios.

Table 3 Analytical and simulation results for N = G =45

Note that, although RB strategies in general should outperform the CS and hybrid approaches, the ETTR and MTTR performance of ACH(RB) is worse than that of EJS, which is an hybrid strategy. Moreover, it is also worth noting that in terms of ETTR and MTTR, the analytical and simulation results of the proposed FDCH-RB algorithm match very well and that FDCH-RB outperforms the ACH(RB) strategy and also the other strategies. On the other hand, the analytical results for EJS and RW2 provided by their authors are only upper bounds.

In the case of protocols which consider that SUs have two radios, the performance of RPS in terms of ETTR is better than the proposed FDCH-CS. However, in terms of MTTR, the performance of RPS is almost twice worse than the proposed FDCH-CS. Also note that the analytical and simulation results of the proposed FDCH-CS algorithm match very well, while for the RPS algorithm the analytical result for ETTR and MTTR are the same (please see Theorem 4 in [29] for more information about this result).

The scenario described above assumes that the network channels are free of PU activity, but in the context of cognitive radio, this consideration may be unrealistic. In the sequel we consider that the SUs share the same available channels, but not all of them are free of PU activity (i.e., |A u |=G and |A u |≤N). Note that this is a typical scenario for a CRN in which SUs are in a small area. Figures 6 and 7 show the ETTR and MTTR results in this scenario for single and two-radio protocols, respectively.

Figure 6
figure 6

Average TTR for two-user symmetric scenario.

Figure 7
figure 7

Maximum TTR for two-user symmetric scenario.

In Figure 6, we only consider the protocols that perform the replacement operation and attempt to rendezvous at previously identified available channels. The RW2 algorithm presents better results than the EJS algorithm when G≤14; however, like FRCH and SSB, its ETTR rapidly grows when the number of common available channels increases. For G>14 the EJS performs better than RW2, SSB, and FRCH. The proposed FDCH-RB outperforms the RW2, EJS, FRCH, and SSB protocols. Let us remark that in the proposed FDCH-RB the SUs that attempt to rendezvous need preassigned roles.

In the case of protocols which consider that the SUs have two radios, for G≤42 the proposed FDCH-CS clearly outperforms the RPS algorithm. For G>35 the performance of RPS slightly improves and when almost all of the channels are commonly available to SUs (42≤G≤45), the performance of the RPS algorithm is better than the proposed FDCH-CS.

Figure 7 shows that the MTTR of the FRCH, the RW2, and the SSB algorithms increases faster than for the others. For G≥12 the performance of all of them is worse than the EJS algorithm and the proposed RB algorithm (FDCH-RB) performs better than FRCH, RW2, SSB, and EJS. When each SU is equipped with two radios, the MTTR performance of the proposed FDCH-CS is twice better than the RPS algorithm.

7.3 Two-user asymmetric scenario

Under the asymmetric model, we consider that each SU has 22 available channels (|A u |=22) and 4≤G≤|A u |. In this scenario, each SU jumps to all available channels (i.e., all channels in A u ) but can only achieve rendezvous in G channels. The results in Figures 8 and 9 show that for all the compared algorithms the ETTR and MTTR performance improves when the number of common available channels increases.

Figure 8
figure 8

Average TTR for two-user asymmetric scenario.

Figure 9
figure 9

Maximum TTR for two-user asymmetric scenario.

Figure 8 shows that unlike the symmetric model, the performance of SSB is better than FRCH and EJS, specially for small values of G. The performance of RW2 in terms of ETTR is better than FRCH, SSB, and EJS. The proposed FDCH-RB outperforms the other compared protocols. When each SU has two radios, it is worth noting that for G<16 the proposed FDCH-CS algorithm outperforms the RPS algorithm. If the number of commonly available channels is close to the amount of available channels seen by each SU (i.e., G≈|A u |), the performance of RPS and FDCH-CS is similar.

In terms of MTTR, Figure 9 shows that the EJS algorithm has the worse results among the compared algorithms. The FRCH and SSB algorithms have similar performance and are outperformed by the RW2 algorithm. Again, as was expected, the proposed RB algorithm (FDCH-RB) outperforms the EJS, FRCH, SBB, and RW2 algorithms. When the SUs have two radios, the proposed FDCH-CS performs better than RPS for G≤14 and for G>14 their results are similar.

7.4 Multi-user scenario

We compare the proposed FDCH-CS algorithm with RW2 [25] and JS [26] (which were extended to this scenario by their authors). We assume a network with M=10 SUs, each one having θ N available channels. As in [25,26] we set θ=0.8 and consider the symmetric and asymmetric models. For the asymmetric model, we repeatedly generate the available channels for each user until at least one common available channel for all SUs is ensured.

According to Figure 10, in both models when the number of channels in the network increases, the ETTR for the three algorithms increases. However, in the asymmetric scenario (Figure 10b) the ETTR of the RW2 algorithm grows faster than JS and the proposed FDCH-CS. Note that in the proposed FDCH-CS algorithm each SU has two radios, while in RW2 and JS algorithms each SU has a single radio. Thus, it is reasonable that the proposed FDCH-CS outperforms RW2 and JS in the multi-user scenario.

Figure 10
figure 10

Average TTR for multi-user scenario. |A u |=0.8N and M=10. (a) Symmetric scenario. (b) Asymmetric scenario.

8 Conclusions

In this paper, we focus on the design of CH sequences that ensure maximum rendezvous diversity and low ETTR for SUs in CRNs. We consider two-user and multi-user rendezvous under symmetric and asymmetric scenarios. Through simulation, we analyze the impact of the rendezvous diversity index in the performance of rendezvous algorithms in CRNs. The results show that the protocols with maximum rendezvous diversity exhibit a better behavior in realistic scenarios.

Two new rendezvous algorithms are proposed, the FDCH-RB and the FDCH-CS. In the first one, the SUs require preassigned roles, while the FDCH-CS algorithm removes this constraint by considering that each SU has two radios, which improves the ETTR and MTTR performance but requires more hardware resources. The theoretical analysis as well as the simulation results show that the proposed algorithms ensure maximum rendezvous diversity and in most scenarios of practical interest outperform other recently proposed schemes.

9 Endnotes

aHow to perform spectrum sensing is out of the scope of this paper. Interesting surveys of spectrum sensing techniques are presented in [31,32]

bIn this paper, we use the notation to refer to as natural numbers including the zero and to refer to as natural numbers without including the zero.

cEven when PUs signals can be perfectly detected, the communication between two SUs may fail because of the hidden transmitter, the exposed transmitter, and the hidden receiver. We refer the reader to [33] for a detailed discussion on these topics.

d The protocols that are not shown in Table 2 have worse results.

References

  1. IF Akyildiz, W-Y Lee, MC Vuran, S Mohanty, NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006). doi:10.1016/j.comnet.2006.05.001.

    Article  MATH  Google Scholar 

  2. IF Akyildiz, W-Y Lee, KR Chowdhury, CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Netw. 7(5), 810–836 (2009). doi:10.1016/j.adhoc.2009.01.001.

    Article  Google Scholar 

  3. LA DaSilva, I Guerreiro, in 2008 3rd IEEE symposium on new frontiers in dynamic spectrum access networks. Sequence-based rendezvous for dynamic spectrum access (Chicago, 2008), pp. 1–7. doi:10.1109/DYSPAN.2008.52.

  4. Z Htike, CS Hong, S Lee, The life cycle of the rendezvous problem of cognitive radio ad hoc networks: A Survey. J. Comput. Sci. Eng. 7(2), 81–88 (2013). doi:10.5626/JCSE.2013.7.2.81.

    Article  Google Scholar 

  5. A Alshamrani, X Shen, L-L Xie, A Cooperative MAC with efficient spectrum sensing algorithm for distributed opportunistic spectrum networks. J. Commun. 4(10), 728–740 (2009).

    Article  Google Scholar 

  6. Q Chen, Y-C Liang, M Motani, W-C Wong, A two-level MAC protocol strategy for opportunistic spectrum access in cognitive radio networks. IEEE Trans. Vehicular Technol. 60(5), 2164–2180 (2011). doi:10.1109/TVT.2011.2141694.

    Article  Google Scholar 

  7. C Cordeiro, K Challapali, D Birru, in First IEEE International symposium on new frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. IEEE 802.22: the first worldwide wireless standard based on cognitive radios (Baltimore, 2005), pp. 328–337. doi:10.1109/DYSPAN.2005.1542649.

  8. L Ma, X Han, C-C Shen, in First IEEE international symposium on new frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks (Baltimore, 2005), pp. 203–213. doi:10.1109/DYSPAN.2005.1542636.

  9. J Jia, Q Zhang, X Shen, HC-MAC: A hardware-constrained cognitive MAC for efficient spectrum management. IEEE J. Selected Areas Commun. 26(1), 106–117 (2008). doi:10.1109/JSAC.2008.080110.

    Article  Google Scholar 

  10. C Cormio, KR Chowdhury, A survey on MAC protocols for cognitive radio networks. Ad Hoc Netw. 7(7), 1315–1329 (2009).

    Article  Google Scholar 

  11. BF Lo, A survey of common control channel design in cognitive radio networks. Phys. Commun. 4(1), 26–39 (2011). doi:10.1016/j.phycom.2010.12.004.

    Article  Google Scholar 

  12. J Misic, VB Misic, Probabilistic vs. sequence-based rendezvous in channel-hopping cognitive networks. IEEE Trans. Parallel Distributed Syst.PP(99), 1–1 (2013). doi:10.1109/TPDS.2013.192.

    Google Scholar 

  13. S Alpern, S Gal, The Theory of Search Games and Rendezvous, 1st edn (Kluwer Academic, Boston, 2003).

    MATH  Google Scholar 

  14. C Cormio, KR Chowdhury, Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430–438 (2010). doi:10.1016/j.adhoc.2009.10.004.

    Article  Google Scholar 

  15. B Kaigui, P Jung-Min, C Ruiliang, Control channel establishment in cognitive radio networks using channel hopping. IEEE J. Selected Areas Commun. 29(4), 689–703 (2011). doi:10.1109/JSAC.2011.110403.

    Article  Google Scholar 

  16. G-Y Chang, J-F Huang, A fast rendezvous channel-hopping algorithm for cognitive radio networks. IEEE Commun. Lett. 17(7), 1475–1478 (2013). doi:10.1109/LCOMM.2013.060513.130471.

    Article  MathSciNet  Google Scholar 

  17. K Bian, Park J-mJ, Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks. IEEE Trans. Mobile Comput. 12(7), 1294–1307 (2013).

    Article  Google Scholar 

  18. EO Guerra, VA Reguera, RD Souza, G Brante, EMG Fernandez, Simple role-based rendezvous algorithm for cognitive ad hoc radio networks. Electron. Lett. 50(3), 182–184 (2014). doi:10.1049/el.2013.2994.

    Article  Google Scholar 

  19. G-Y Chang, W-H Teng, H-Y Chen, J-P Sheu, Novel channel-hopping schemes for cognitive radio networks. IEEE Trans. Mobile Comput., 1–1 (2012). doi:10.1109/TMC.2012.260.

  20. Y Zhang, Q Li, G Yu, B Wang, in 2011 proceedings IEEE INFOCOM. ETCH: Efficient Channel hopping for communication rendezvous in dynamic spectrum access networks (Shanghai, 2011), pp. 2471–2479. doi:10.1109/INFCOM.2011.5935070.

  21. Y Zhang, G Yu, Q Li, H Wang, X Zhu, B Wang, Channel-hopping-based communication rendezvous in cognitive radio networks. IEEE/ACM Trans. Netw.PP(99), 1–1 (2013). doi:10.1109/TNET.2013.2270443.

    Google Scholar 

  22. NC Theis, RW Thomas, LA Dasilva, Rendezvous for cognitive radios. IEEE Trans. Mobile Comput. 10(2), 216–227 (2011). doi:10.1109/TMC.2010.60.

    Article  Google Scholar 

  23. D Yang, J Shin, C Kim, Deterministic rendezvous scheme in multichannel access networks. Electron. Lett. 46(20), 1402 (2010). doi:10.1049/el.2010.1990.

    Article  Google Scholar 

  24. J Shin, D Yang, C Kim, A channel rendezvous scheme for cognitive radio networks. IEEE Commun. Lett. 14(10), 954–956 (2010). doi:10.1109/LCOMM.2010.091010.100904.

    Article  Google Scholar 

  25. H Liu, Z Lin, X Chu, Y-W Leung, in 2010 IEEE/ACM Int’l conference on green computing and communications. Ring-walk based channel-hopping algorithms with guaranteed rendezvous for cognitive radio networks, (2010), pp. 755–760. doi:10.1109/GreenCom-CPSCom.2010.30.

  26. H Liu, Z Lin, X Chu, Y Leung, Jump-stay rendezvous algorithm for cognitive radio networks. IEEE Trans. Parallel Distributed Syst. 23(10), 1867–1881 (2012).

    Article  Google Scholar 

  27. Z Lin, H Liu, X Chu, Y-W Leung, Enhanced jump-stay rendezvous algorithm for cognitive radio networks. IEEE Commun. Lett.17(9), 1742–1745 (2013). doi:10.1109/LCOMM.2013.071013.131029.

    Article  Google Scholar 

  28. V Reguera, E Guerra, R Souza, E Fernandez, G Brante, Short channel hopping sequence approach to rendezvous for cognitive networks. Commun. Lett. 18(2), 1–4 (2014). doi:10.1109/LCOMM.2013.112713.132338.

    Article  Google Scholar 

  29. L Yu, H Liu, Y-W Leung, X Chu, Z Lin, in 2013 IEEE International Conference on Communications (ICC). Multiple radios for effective rendezvous in cognitive radio networks (Budapest, 2013), pp. 2857–2862. doi:10.1109/ICC.2013.6654974.

  30. K Bian, J-M Park, R Chen, in Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom ‘09, 25. A quorum-based framework for establishing control channels in dynamic spectrum access networks (New York, 2009). doi:10.1145/1614320.1614324.

  31. T Yucek, H Arslan, A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutorials. 11(1), 116–130 (2009). doi:10.1109/SURV.2009.090109.

    Article  Google Scholar 

  32. F Khan, K Nakagawa, in 2013 World Congress on Computer and Information Technology (WCCIT). Comparative study of spectrum sensing techniques in cognitive radio networks (Sousse, 2013), pp. 1–8. doi:10.1109/WCCIT.2013.6618728.

  33. A De Domenico, E Calvanese Strinati, M-G Di Benedetto, A survey on MAC strategies for cognitive radio networks. IEEE Commun. Surv. Tutorials. 14(1), 21–44 (2012). doi:10.1109/SURV.2011.111510.00108.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by CAPES, CNPq and Araucaria Foundation (Brazil) and MES (Cuba).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard D Souza.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.

The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guerra, E.O., Reguera, V.A., Souza, R.D. et al. Systematic construction of common channel hopping rendezvous strategies in cognitive radio networks. J Wireless Com Network 2015, 134 (2015). https://doi.org/10.1186/s13638-015-0356-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-015-0356-8

Keywords