ZTE Communications ›› 2009, Vol. 7 ›› Issue (2): 21-26.

• Special Topic • Previous Articles     Next Articles

Key MAC Layer Technologies of Cognitive Radio Network

Zeng Zhimin, Guo Caili   

  1. School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China
  • Online:2009-06-25 Published:2020-03-03
  • About author:Zeng Zhimin, PhD, is a professor in the School of Information and Communication Engineering of Beijing University of Posts and Telecommunications (BUPT), a member of the Advisory Committee of BUPT, a senior member of China Institute of Communications and China Institute of Electronics. He has been engaged in the research and teaching in the field of communication and information system for a long time. His research interests include wireless communication theories and technologies, broadband networks and wireless sensor networks.

    Guo Caili, PhD, is a lecturer in the School of Information and Communication Engineering of BUPT. She is mainly engaged in the research of new technologies for future wireless mobile communications and CR key technologies.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China under Grant No. 60772110.

Abstract: As a smart spectrum sharing technology, Cognitive Radio (CR ) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC ) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.