Open Access

A cross-layer adaptive channel selection mechanism for IEEE 802.11P suite

EURASIP Journal on Wireless Communications and Networking20152015:214

https://doi.org/10.1186/s13638-015-0441-z

Received: 31 December 2014

Accepted: 3 September 2015

Published: 16 September 2015

Abstract

Recent advances in the automotive industry enabled us to build fast, reliable, and comfortable vehicles with lots of safety features. Also, roads are designed and made safer than ever before. However, traffic accidents remain one of the major causes of death. Intelligent transport systems are expected to reduce if not prevent accidents with interconnected vehicles and infrastructures. These vehicular ad hoc networks are highly dynamic and fragile. Although the standardization efforts are mature enough, the non-emergency/service channel selection mechanisms are not explicitly defined. In this paper, a novel cross-layer prediction-based algorithm is proposed to select the best possible service channel to decrease collisions beforehand. Theoretical analysis regarding the mean squared error prediction performance is established. It is shown that the proposed method outperforms the general Markovian-based prediction schemes under various traffic load scenarios.

Keywords

Cross-layer design 802.11P Vehicle-to-vehicle networks Predictive channel selection

1 Introduction

Transportation is by far one of the most important features in mankind’s entire history. Especially in today’s busy world, transportation is not only a necessity for personal travel, but it is also necessary for the shipment of goods across the globe. All these needs require infrastructure, planning, and optimization to run safely and smoothly.

Recent advances in the automotive industry have enabled us to build fast, reliable, and comfortable vehicles with numerous safety features. At the same time, roads are designed and built safer than ever before. However, traffic accidents remain one of the major causes of death [1, 2]. The current situation implies that the further improvements in technology for each individual vehicle will not provide extra safety measures for transportation on the whole. Thus, deployment of cooperative and coordinated designs seems to be inevitable in order to extend contemporary safety measures. Even though preventing accidents entirely is a difficult task, cooperative and coordinative approaches provide a promising solution to make transportation safer. Motivated by these, intelligent transport systems (ITS) envisage a network topology consisting of interconnected vehicles and infrastructures [3, 4]. In this regard, vehicles that are aware of each other and of their surrounding environment will form an intelligent, dynamic subnetwork which can be used in several ways ranging from safety to infotainment. Early warning, intersection collision avoidance, and adaptive cruise control are just a few of the potentially life-saving applications available, which are depicted in Fig. 1 [5]. Advertisement, web surfing, gaming, and video streaming are applications falling into the infotainment category. One should keep in mind that potential benefits of ITS are not limited to these two categories. It is believed that ITS will pave the road to green transportation as well [6, 7].
Fig. 1

ITS applications. a Early collision/sudden brake warning. b Adaptive cruise control. c Intersection collision avoidance

Vehicular networks are considered to be a special form of ad hoc networks because of their high-level dynamic topologies. From sparse and fast highways to congested and slow downtown traffic, these network structures are naturally desired to operate in the optimum way. However, the extreme conditions caused by high mobility render vehicular ad hoc networks (VANETs) to a short-lived nature. Despite their inherent constraints, VANETs are also a promising heterogeneous network type, since they are planned to consist of contemporary cellular networks, next-generation wireless networks along with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) link support as well as device-to-device communications options [8]. In order to encompass all of the aforementioned tasks and constraints, the IEEE 802.11p/1609 work group strives to establish a standard known as wireless access in vehicular environments (WAVE) [9].

Although the primary intent for V2V communications systems is safety, like cellular phones and PDAs, entertainment is the primary driving force for this kind of communications technology. Infotainment applications make driving more enjoyable and bring new opportunities to the market [10, 11]. With specialized entertainment products to enhance the driver or the passenger experience, these applications such as video streaming and voice over IP (VoIP) require a high bandwidth connection to create a seamless customer experience.

One should keep in mind that V2V communications take place in the wireless spectrum which is a very valuable, finite, and public resource. This nature of the wireless spectrum brings about multi-access interference (MAI) issues. Interference causes poor signal reception, drastic decrease in system capacity, frequent hand-offs, and service interruptions. Unlike centralized network structures, with ad hoc vehicle networks, there are multiple interference scenarios present simultaneously such as cochannel interference (CCI), adjacent channel interference (ACI), narrowband interference (NBI), wideband interference (WBI), and so on [12]. In the literature, there are mainly three strategies to combat interference: interference avoidance, mitigation, and cancellation. Of these three strategies, it is obvious that interference avoidance is the simplest and most effective one, since avoidance strategy will pave the path for interference-free communications. However, avoidance relies on identifying unused resources. Thus, any avoidance strategy always includes some sort of identification procedure to sense the use of resources, then decides based on the data and acts on it accordingly [12]. Note that even such an effort might not be sufficient to prevent MAI problems such as collision. Even though there are numerous collision avoidance strategies in the literature, they are all based on the assumption of having a channel selected already at hand. It is evident that a successful collision avoidance strategy should definitely be preceded by identification of statistically least occupied channel in advance.

In light of the discussion above, Federal Communications Commission (FCC) allocates the 5.850–5.925-GHz portion of the radio spectrum as dedicated short-range communications (DSRC) for vehicular networks [13]. DSRC standard defines seven 10-MHz channels in this range: one control, two reserved, and four non-safety application channels as shown in Fig. 2. However, a selection mechanism for these channels is not defined explicitly.
Fig. 2

DSRC channels

It is obvious that selecting a channel randomly at medium access control (MAC) layer is the simplest and widely adopted solution. However, a channel selection mechanism solely relying on MAC layer functionalities is not sufficient to provide satisfactory performance and needs novel data dissemination strategies benefiting from advanced techniques such as space time network coding [14]. Therefore, a cross-layer design including both MAC and physical layer (PHY) operations is required. In this regard, from the PHY layer perspective, a prediction mechanism is required in order for the MAC layer to take appropriate actions in advance. Failure to achieve these cross-layer operations may cause the system to select an interfering or busy channel and drastically lose bandwidth and performance. Once the channel is selected, it will be used until the next cycle and a busy or interfering medium is subject to wait in collision avoidance state. Also, note that the collision avoidance mechanism in IEEE 802.11p uses carrier sense multiple access/collision avoidance (CSMA/CA) and can only detect known type of signals [9].

In the literature, there are mainly four categories in selecting a service channel for VANET systems: pre-allocation-based [1519], randomized rotation-based [20], minimum duration-based [21], and predictive-based schemes [22]. Pre-allocation-based schemes employ a static database and then select a channel based on that database. Despite its simplicity, such an approach evidently yields a poor performance under dynamic access. Furthermore, the database itself should be updated frequently. The randomized rotation-based algorithms take advantage of a different version of frequency hopping. Therefore, they inherently adopt both advantages and disadvantages of frequency hopping approaches such as improved fairness and lack of knowledge regarding the state of the medium. Minimum duration-based methods need to store the occupancy durations of each channel so that the least used can be identified. However, the performance of these methods converge with those of pure random channel selection schemes. Predictive algorithms seem to fit best for the channel selection task, but they lack cross-layer and adaptive design leading to poor and unsatisfactory performances [23]. On the other hand, studies that focus on predictions taking advantage of Markovian assumption rely heavily on selecting the appropriate length of both prediction period and history. In the absence of historical data (past observations), it is reported that prediction accuracy degrades dramatically [22]. Studies which follow decision-making processes based on a posteriori probabilities of the occupancy state of a channel could also be considered in this manner. Nevertheless, such attempts require some sort of collaboration and coordination [24]. It is worth mentioning at this point that there are also studies in the literature, which aim to be aware of spectrum conditions on future positions along the path of any vehicle. Yet, such a strategy mandates obtaining the location of each vehicle via an already-existing reference such as Global Positioning System (GPS) and an infrastructure which allows the vehicles to share the digital maps across the network [25, 26]. Therefore, in this study, a novel cross-layer, adaptive channel selection mechanism is proposed. Even though several predictive channel selecting mechanisms presently exist, to the best of the knowledge of the authors, this study is pioneering the incorporation of cross-layer architecture with predictive strategy into vehicular networks.

The rest of this paper is organized as follows: Section 2 describes the system and signal model along with the theoretical analysis. Section 3 covers the proposed scheme in detail. In Section 4, the results are presented along with relevant discussions. Finally, conclusions and future directions are outlined in Section 5.

2 System and signal model

In this study, a cross-layer adaptive channel selection mechanism is proposed for IEEE 802.11p suite. Therefore, it is first desirable to discuss a complete characterization of the proposed system in conjunction with layered structure. Channel selection mechanism in V2V networks relies on IEEE 802.11 suite including both PHY and MAC layers [27, 28]. The PHY layer is responsible for various air interface functionalities such as synchronization, channel estimation, and equalization. The MAC layer takes care of channel access and scheduling operations. Note that IEEE 802.11p and IEEE 1609.x are jointly known as WAVE and specifically IEEE 1609.4 part extends MAC to multichannel-operations-enable mode. Peculiar to V2V networks, WAVE multichannel operations are carried out over two types of channels, namely control channel and service channel. It is important to keep in mind that there is a single control channel, whereas there are multiple service channels in WAVE. Because the safety and control signals/messages are sent over the control channel and other types of application signals/messages are transmitted over the service channels, a coordination mechanism is necessary. It is obvious that a successful coordination mechanism relies on the joint performance of both PHY and MAC layers, which directly points out a cross-layer design.

2.1 System and signal model

The received signal at baseband which includes the ambient noise and probably an unknown signal is given input to radiometer. The radiometer needs to decide whether the unknown signal is present or not in the received signal, which is expressed as
$$ r(t)= \left\{ \begin{array}{cc} \qquad \quad n(t), & H_{0},\\ x(t) + n(t), & H_{1}, \end{array}\right. $$
(1)

where n(t) is complex additive white Gaussian noise (AWGN) with \(\mathcal {CN}\left (0,{\sigma _{N}^{2}}\right)\) in the form of n(t)=n I (t)+j n Q (t) as both n I (t) and n Q (t) being \(\mathcal {N}\left (0,{\sigma _{N}^{2}}/2\right)\) and \(j=\sqrt {-1}\); x(t) is the complex baseband equivalent of the unknown signal; and H 0 denotes the hypothesis corresponding to the absence of the unknown signal, whereas H 1 is the hypothesis corresponding to the presence of it. Hence, the statement of the problem can be expressed as deciding whether an unknown signal x(t) is present by examining the statistical characteristics of the received signal r(t) in the presence of noise n(t).

The unknown signal, x(t), can be decomposed into the following form under the narrowband channel assumption [29]:
$$ x(t)=m(t)s(t)a(t), $$
(2)
where m(t), s(t), and a(t) represent complex fading channel process, slow-fading process, and the unknown baseband signal, respectively. In addition, the unknown baseband signal is assumed to be digitally modulated as [30]:
$$ a(t) = \sqrt{E_{k}}e^{j\theta_{k}}p_{k}(t), $$
(3)

where E,θ, and p(·) are the energy, phase, and the complex-valued pulse shaping waveform, respectively for the kth digital symbol with k=0,1,…,M−1 in an M-ary scheme. Note that all three processes in (2) are independent of each other and of n(t).

For modeling the fading processes, physical radio propagation environment should be examined. Transmit signals reach the receiver antenna as multiple rays or paths. Due to constructive and destructive superposition, received signal power level fluctuates drastically leading to the phenomenon known as fading. The resulting signal can be represented with a complex fading channel process as
$$ m(t) = h(t)e^{j\phi(t)}, $$
(4)

where h(t) and ϕ(t) refer to the amplitude and phase of the complex channel process, respectively. In case there is sufficiently large number of independent paths superposing at the receiver antenna in the absence of a specular signal such as in line-of-sight (LOS) environments, h(t)=|m(t)| yields the Rayleigh distribution in accordance with the central limit theorem (CLT). In addition, mobility gives rise to correlation in the fading channel process [31]. If the angle of arrival (AoA) of the paths at an omni-directional antenna is assumed to be uniformly distributed [−π,π) on a 2-D plane, then Jakes’ Doppler spectrum occurs as a special case. Correlation in temporal domain for this special case is given by R h (τ)=J 0(2π f D |τ|), where J 0(·) is the zeroth-order Bessel function of the first kind, f D is the maximum Doppler frequency with f c v/c, f c is the operating frequency, v is the mobile speed, and c is the speed of light (c=3×108 m/s).

Beside fast-fading process, transmitter–receiver separation and the obstacles present in between affect the received signal power as well. Loss in the received signal power due to the transmitter–receiver separation is known as distance-dependent path loss. It decreases monotonically as a function of the relative distance between transmitter and receiver. Obstacles along the propagation paths between transmitter and receiver cause drastic fluctuations in the power level of the received signal too. This phenomenon is known as shadow fading. Measurement data reveal that the first-order statistics of the slow-fading phenomenon can be approximated by a log-normal distribution. Therefore, the joint effect of path loss and shadow fading could be modeled by a single process of the form given below [29]:
$$ s(t)=\exp{\left(\frac{1}{2}\mu(t)+\frac{\sigma_{G}}{2} g(t)\right)}, $$
(5)
where μ(t)/2 represents mean, σ G /2 is the standard deviation of log-normal fading, and g(t) is a real-valued unit normal process \(\mathcal {N}(0,1)\). It is not difficult to infer from (5) that μ(t) represents the impact of distance-dependent path loss varying over relatively longer periods of time. As in complex fading process, experimental results also report that g(·) exhibits correlation of an exponentially decaying form [32]:
$$ R_{g}(\tau)=E\left\{g(t)g(t+\tau)\right\}=\exp{\left(-\frac{v\left|\tau\right|}{d_{\rho}}\right)}, $$
(6)

where E{·} is the statistical expectation and d ρ refers to the decorrelation distance. Field measurements show that various environments have different decorrelation distances. For example in [32], d ρ is calculated to be 5.75 and 350 m for urban and suburban environmental classes, respectively. It is crucial to state that both (5) and (6) correspond to simplified theoretical approximations which are consistent to some extent with experimental results available in the literature. However, there are some other studies available in the literature related to shadowing models such as static and dynamic shadowing [33].

2.2 Energy detection

Energy detector (or radiometer) is a simple, first-order receiver which accumulates the energy of the received signal for a specific time interval. Collected energy, which is called decision statistic, is then sent to a decision device. Decision device compares the instantaneous decision statistic with a pre-defined threshold to come up with a binary conclusion regarding the absence/presence of an unknown signal. In discrete domain, assuming that the detector has a sufficiently high sampling rate, the output of the detector is calculated by
$$ d[n] = \sum_{i=0}^{N-1}\left|r[i]\right|^{2} $$
(7)

where N is an arbitrary number of samples taken into consideration and r[·] denotes the discrete counterpart of the received signal, r(·). For H 0, AWGN assumption yields a central χ 2 distribution with N degrees of freedom (\({\chi ^{2}_{N}}\)). For H 1, d[n] provides a non-central \({\chi ^{2}_{N}}\) distribution with an additional shape parameter. If N is selected to be large enough, the decision statistic is assumed to be asymptotically normally distributed with certain mean and variance values in accordance with the CLT. Before proceeding with the performance analysis of radiometer, it is worth mentioning that the radiometer is a non-coherent receiver and is known to be the “optimum” detector in the absence of a priori knowledge about the received signal [34, 35]. Yet, it has very critical drawbacks. First of all, noise-plus-interference uncertainty degrades the performance of the radiometer drastically [36]. In addition, low signal-to-noise ratio (SNR) regime leads to unsatisfactory results [37]. Combining these two issues, one could easily conclude that the radiometer performs poorly in detecting spread-spectrum signals [38]. Furthermore, it is clear that the performance of the radiometer is heavily dependent on the SNR/signal-to-interference-plus-noise ratio. For the sake of completeness, it is desirable to show how the performance of the radiometer is related to SNR.

As stated earlier, the decision statistic d[n] under the AWGN assumption has a central χ 2 distribution with N degrees of freedom (\({\chi ^{2}_{N}}\)) for H 0, whereas it has \({\chi ^{2}_{N}}(m)\), where m denotes the shape (non-centrality) parameter [34] for H 1. Based on these assumptions, one could easily obtain the probability density function (PDF) for H 0 scenario as
$$ f_{{\chi^{2}_{N}}}(x)=x^{N/2-1}e^{-\frac{x}{2}}/\left(2^{N/2}\Gamma{(N/2)}\right) $$
(8)
where Γ(·) denotes the gamma function. Similarly, the PDF for H 1 scenario is given by
$$ f_{\chi^{2}_{N,m}}(x)=\frac{1}{2}\left(\frac{x}{m}\right)^{N/4-\frac{1}{2}}e^{-\frac{m+x}{2}}J_{N/2-1}{\left(\sqrt{mx}\right)} $$
(9)

where J k (·) denotes the k-th-order modified Bessel function of the first kind. Based on both \(f_{{\chi ^{2}_{N}}}(x)\) and \(f_{\chi ^{2}_{N,m}}(x)\), receiver operating characteristic (ROC) could theoretically be derived by seeking for \(\Pr {\left ({\chi ^{2}_{N}}>\lambda \vline H_{1}\right)}\) and \(\Pr {\left (\chi ^{2}_{N,m}>\lambda \vline H_{0}\right)}\), which correspond to probability of detection and probability of false alarm, respectively. Here, \(\Pr {\left ({\chi ^{2}_{N}}>\lambda \vline H_{1}\right)}\) is given by \(Q_{g}\left (\sqrt {2\gamma },\sqrt {\lambda }\right)\) where λ denotes the decision threshold, Q g (·) is the generalized Marcum Q function, and γ is the instantaneous SNR. Note that the optimum threshold selection mandates one to have knowledge about the SNR ([34] Eq. (35)). It is not difficult to see that the same conclusion (with more sophisticated calculations) holds also for the SINR in case there are unknown activities within the spectrum of interest apart from that of primary user [39].

3 Channel selection

Cross-layer channel selection mechanism relies on both PHY and MAC operations as outlined in Fig. 3. In order for the MAC layer to select a specific channel, a short-term history of the time-domain statistics of candidate channels are stored. Next, a short-term/next step prediction is evaluated based on the collected data. Evaluation is followed by selection step where the node chooses the channel that has the maximum value of a pre-defined metric.
Fig. 3

Proposed cross-layer architecture

The proposed channel selection metric is defined to be the first-order difference of variance estimates of the predicted value of the energy detection operation output. As will be shown subsequently, variance estimates are scaled appropriately in order not to violate Kolmogorov’s assumptions for the probability metric. Before proceeding further, prediction of the energy detector output should be given. Assuming that the predicted value of the energy detection operation, namely \(\hat {\mathbf {X}}_{n+1}^{k}\), is a wide-sense stationary (WSS) process, then
$$ \hat{\mathbf{X}}_{n + 1}^{k} = \sum_{i = 0}^{L - 1}\alpha_{i}\mathbf{X}_{n - i}^{k} + \mu_{\mathbf{X}^{k}} $$
(10)

expresses the weighted moving average prediction where \(\hat {\mathbf {X}}_{n + 1}^{k}\) denotes the predicted value for the n+1-th step based on past L historical data of the k-th channel; α i s denote the weighting coefficients; and \(\mu _{\mathbf {X}^{k}}\) represents the intercept of the prediction.

Once L past energy detector observations are at hand, the channel selection mechanism then proceeds with calculating the variance of the past observations as:
$$ \sigma_{\mathbf{X}^{k}}^{2}[n] = \sum_{i = 0}^{L - 1}E\left\{\left(\mathbf{X}_{n - i}^{k}\right)^{2}\right\} - \left(E\left\{\mathbf{X}_{n - i}^{k}\right\}\right)^{2} $$
(11)
where \(E\left \{\mathbf {X}_{n - i}^{k}\right \}\) denotes the sample mean of the past L observations. In order for the channel selection mechanism to quantify whether a state transition takes place at the prediction stage/step, (11) needs to be scaled so that as mentioned above, Kolmogorov’s assumptions for the probability metric are not violated:
$$ \psi_{X}[n] = \varrho^{k} \sigma_{\mathbf{X}^{k}}^{2}[n] $$
(12)
where ϱ k is a constant for the k-th channel which satisfies \(0<\psi _{\mathbf {X}^{k}}[n] \leq 1\).1 Finally, the channel selection mechanism applies the first-order difference operator to (12) and reaches the channel selection metric as
$$ {\Theta_{n}^{k}} = \ensuremath{D^{-1}\left(\psi_{\mathbf{X}^{k}}[n]\right)} $$
(13)
where D −1(·) denotes the first-order difference operator being applied to its input. Now, the channel selection mechanism is ready to provide the hard decision based on (13) as follows:
$$ \hat{d}_{n}^{k}= \left\{ \begin{array}{ll} 1, & \zeta<{\Theta_{n}^{k}},\\ 0, & \zeta \geq {\Theta_{n}^{k}}, \end{array}\right. $$
(14)

where \(\hat {d}_{n}^{k}\) denotes the predicted binary state of the k-th channel at the n-th step for the next n+1-th step and ζ is an adaptive threshold below which is predicted to be occupied.

There are some critical points in establishing the steps (10) through (14). First and foremost, the depth of the history, L, should be specified. Consequently, weighting coefficients α i s in (10) need to be determined in an effective way as well. Second, ϱ k in (12) should be decided. Because (10) is a linear model in essence, any minimization approach based on 2-norm (·2) such as mean squared error (MSE) could be adopted in determining the weighting coefficients as shown subsequently. On the other hand, determining the depth of the history, L, is actually nothing but deciding the order of the linear model adopted in (10) based on a specific set of criteria. Mean magnitude residual statistics, sum of squares of Pearson residuals, and Akaike information criteria (AIC) are prominent model order selection strategies present in the literature [40]. However, model order selection is outside the scope of this study.

In what follows, it will be shown that the proposed channel selection mechanism has a prediction error which cannot be reduced further and the aforementioned issues will all be clarified.

Proposition 1 (Irreducible prediction error).

The proposed channel selection mechanism has an irreducible prediction error variance, \(\sigma _{\mathbf {e}}^{2}\), which cannot be reduced further and is a function of the threshold that is used by the energy detector at the decision stage.

Proof.

See Appendix.

Based on the analysis carried out in the Appendix, it is seen that the channel selection mechanism relies heavily on the threshold for the decision device operating on an energy detector. There are several implications of Proposition 1. First of all, it states that prediction error variance reaches its lower bound with the first threshold when there are multiple thresholds. For instance in [40], a two-level threshold strategy is applied where the first stage is clipping the original time series and the other is used at the prediction stage. Similar multi-stage scenarios take place in decision fusion schemes as well [41]. Hence, with the aid of Proposition 1, it is known in advance that the lower bound for the prediction error variance could only be achieved in case decision is obtained directly from the original time series. Second, due to the positive semi-definite structure of error variance, multiple-threshold strategies cannot outperform single-threshold strategies in terms of prediction error variance given that both single- and multiple-threshold strategies are of the same mathematical structure such as both being linear or non-linear and so on. Performance results and irreducible prediction error will be investigated in the subsequent sections. A sketch of the proposed channel selection mechanism is given in Fig. 4.
Fig. 4

Proposed channel selection mechanism

4 Numerical results

The performance of the proposed method is investigated in various traffic conditions and scenarios. Also, a performance comparison is established between the method proposed and Markovian-based prediction scheme. In the sequel, one might be interested in why specifically Markovian-based scheme is selected for comparison purposes. The reason is threefold: (i) Peculiar to the spectrum sensing problem, spectrum occupancy could best be represented with a Bernoulli process, which is a special case of Markov chain. Therefore, Markovian-based structures provide a very high-level flexibility in both modeling and analyzing the spectrum sensing problem. (ii) Markovian-based schemes are vastly employed prediction strategies present in the literature. This stems from the fact that it has a simplistic design and tractable statistical analysis. Furthermore, depending on the problem formulation, several adaptations and extensions such as multi-layer Markovian or hidden Markov model (HMM)-based approaches could easily be obtained with minor modifications in the original model organization. (iii) Finally, Markovian-based models are so versatile that they could be exploited to tackle spectrum sensing problems in different parts of open systems interconnection (OSI) reference. For instance, it could be used both in PHY and MAC layers to shed light on different aspects of spectrum sensing problem.

Simulation setup considers several levels of traffic load ranging from light occupancy to densely occupied scenario based on the parameters reported in [42]. At this point, it is worth mentioning why parameter selection is based on the findings reported in [42]. (I) First and foremost, the proposed method requires both theoretical and empirical analyses. Therefore, studies which focus on both theoretical and empirical findings should be evaluated. From this perspective, [42] is a prominent work in the literature. (II) Also, as proposed, channel selection mechanism could be shared by both PHY and MAC layers in the sense of cross-layer approach. In [42], the same strategy is followed and both PHY and MAC layers are binded. (III) Finally, as discussed above, a generic Markovian-based structure for industrial, scientific, and medical (ISM) band depending on several important occupancy parameters is provided in [42] such that it could be used for comparing other findings with each other.

In simulating channel access, both busy and idle channel statistics are taken into account. According to the empirical observation-based model given in [42], busy and idle channel state transitions can be well approximated by the exponential distribution with a factor that changes with the traffic load. For the proposed method, the first energy detector is used to obtain the decision statistics. Next, decision statistics are fed to the prediction stage. Prediction is yielded by equal gain combining (\(\alpha _{i}=\alpha _{j}=\frac {1}{L}, \forall i,j\)). Along with the past measurement results, prediction is quantified with the metric defined in Section 3. Finally, a binary decision is reached so that MSE is obtained for the performance evaluations. It should be stated at this point that equal gain combining might not be the optimal prediction strategy for many scenarios. However, it establishes simplicity in implementation from the practical point of view because it skips the stage at which the weighting coefficients are estimated. Therefore, equal gain combining is adopted in the numerical results.

For Markovian-based prediction scheme, the first output of a Bernoulli stochastic variable is used in order to determine the initial state of the channel. Next, simulated channel statistics are compared with a threshold whose value can be adjusted according to several levels of traffic load. Once busy/idle periods are shaped, prediction stage is initiated. For the Markovian-based scheme, a specific portion of the simulated data is fed to the predictor in order to estimate the transition probability matrix. Then, predictions are calculated based on the initial state (last training data sample) and the transition probability matrix estimate. Finally, MSE values are obtained for performance evaluations and comparisons. General parameters used in the simulations are given in Table 1.
Table 1

Common parameters used in the simulation setup

Parameters

Values

Occupied state parameter λ −1

{15.9 9.10 4.48 2.90 1.98 1.39

 

1.01 0.74 0.55 0.36 0.21} ms

 

(based on ([42] §V.A, Table I, p. 103))

Idle state parameter μ −1

{1.11 1.08 1.05 1.03 1.02 1.03

 

1.03 1.02 1.03 1.03 1.03} ms

 

(based on ([42] §V.A, Table I, p. 103))

Sampling interval

200 ns

Low-pass filter duration (T A )

Between 0 ms and 85 ms (based on ([45] §V.C, p. 444))

Number of samples for energy detection (N)

20

Major propagation channel characteristics

Rayleigh fading with Jakes’ spectrum

Average SNR under H 1scenario

10 dB

Performance results for Markovian-based scheme are plotted in Fig. 5. It is seen in Fig. 5 that the performance of the Markovian-based prediction method improves with the increasing traffic load. This mainly stems from the fact that underlying stochastic channel access becomes denser with the increased traffic load; therefore, the number of transitions between busy and idle states becomes less frequent. Since it is known that steady-state behavior always converges a biased binary estimation given that the transition probability matrix is not symmetric, prediction step always yields a biased output in favor of the busy state. Another important observation in Fig. 5 is that the performance of the Markovian-based prediction scheme cannot be improved any further by increasing the amount of history at the training stage. As can be verified from Fig. 5, 10 % of the entire data set is sufficient under each level of traffic load to reach the same performance level in training the Markovian-based scheme.
Fig. 5

Markovian-based prediction results along with the proposed method performance

The performance of the proposed method for L=2 can be seen in Fig. 5 as well under a generic scenario for comparison purposes. Here, L=2 is adopted, since in conjunction with equal gain combining strategy it provides some sort of a lower bound for the performance of the proposed predictor, as discussed above. This way, a fair comparison platform between the proposed method and the Markovian-based structures could be established. First and foremost, the proposed method yields a stationary MSE in contrast to the Markovian-based scheme. This is caused by the combined impact of both energy detector and the equal gain combining. Recall that the channel selection mechanism first collects the energy of the received signal at a sufficiently high sampling rate (generally satisfying the Nyquist criterion) for a very short period of time. This implies that especially switching from idle state to busy state can be captured in a few consecutive decision statistics produced by the energy detector. Once consecutive, high-resolution, and very low-latency decision statistics are fed to the prediction procedure, dramatic power fluctuations in the decision statistics due to fading are smoothed out to some extent since equal gain combining is nothing but applying a low-pass filtering operation to its input. This way, the proposed method firstly can capture the transitions very effectively, and secondly, false alarms due to drastic power fluctuations caused by fading are eliminated automatically. Hence, a stationary output for the proposed method is established as observed in Fig. 5.

The discussion above could be investigated in a better way by examining Fig. 6. In Fig. 6, a single snapshot of the prediction stage is plotted for ≈20 ms. As can be seen from the figure, there are two plots corresponding to the output of both the energy detector (decision statistic) and the predictor. Based on the values given in Table 1, several bursts are generated and passed through the energy detector. The decision statistics, output of the energy detector, are stored. Next, a specific portion of the data stored (10 % as discussed above) is used for estimating the weighting coefficients of the predictor for L=2. Then, the predictor runs. Note that the prediction lags one sample behind its input as expected. Nevertheless, one could conclude that by looking at the time scale of the bursts, prediction reacts very rapidly. Yet, it is observed in Fig. 6 also that the predictor fails to track the actual observations when dramatic fluctuations occur in the received signal power. This is not surprising since prediction could only take into account a temporal window whose duration is L×T A . Therefore, any burst whose duration, say T B , satisfying T B <L×T A will yield a dramatic fluctuation in the decision statistic. Thus, prediction will not be able to keep track of these sudden changes in the received signal power.
Fig. 6

A single snapshot of the prediction stage for ≈20 ms

It is desirable also to see the impact of traffic load on the performance of the proposed method. Average error rate performances for the proposed method under various levels of traffic load are given in Fig. 7. Note that the traffic load does not change the average error rate performance drastically. However, it is observed from Fig. 7 that the traffic load might influence the performance of the proposed method around 2 % on average between the best- and the worst-case scenarios. Moreover, it is seen that the proposed method exhibits its worst performance under the average traffic load scenario. This is not surprising since the entropy of the channel occupancy statistics reaches its maximum when the load is 0.5 [43].
Fig. 7

The proposed method average error rate performance under various levels of traffic load

In conjunction with the aforementioned discussion, it is important to check the collision rate performance of the proposed channel selection mechanism. In order to evaluate this, a single-channel access scheme is assumed. As in the previous cases, channel access is shaped by the parameters reported in [42] with a traffic load ranging from light occupancy to densely occupied scenario. Based on the predictor output, it is decided whether the channel is accessed or not. Cases where “no access” takes place are omitted since no access strategy will never yield a collision for any single-channel access scheme. Hence, collision rate is calculated for the predictor output when channel access is allowed. The results are plotted in Fig. 8 under various traffic loads. In parallel with the results given in Fig. 7, collision rate reaches its maximum when the traffic load is 0.5.
Fig. 8

Collision rate for the proposed channel selection mechanism

In the sequel, it is important to investigate how the proposed mechanism behaves under various threshold values. Recall that the proposed channel selection mechanism relies heavily on selecting an optimal thereshold value, ζ, in (14). Three different threshold values and corresponding collision rates are given in Fig. 9. To better understand how the proposed mechanism behaves under various threshold values, Fig. 9 could be examined in conjunction with Fig. 8, since Fig. 8 shows the results regarding optimal threshold selection. As can be seen from both Figs. 8 and 9, the proposed mechanism performs poorly in case random threshold selection strategy is employed. On the contrary, Fig. 8 implies that optimum threshold gives rise to the minimum collision rate for all traffic load rates. From the practical point of view, obtaining the optimum threshold value might be difficult; therefore, cases where optimum threshold is not available should be examined as well. In Fig. 9, two different suboptimal threshold values and corresponding collision rates are given. As can be seen from the figure, depending on the traffic load, one of the thresholds slightly outperforms the other in one part, whereas the situation is reversed in the other part, as expected.
Fig. 9

Performance of the proposed mechanism under various threshold values in terms of collision rates. Note that one of the threshold values yields better performance under dense traffic load, whereas the other performs better in light traffic load. However, random threshold selection strategy leads to dramatic collision rates

It is worth mentioning that whether the theoretical lower bound mentioned in the Appendix given with (23) exists. As Proposition 1 implies, lower bound could be reached in case the behavior of the decision device could be characterized statistically, since (23) is a function of the decision threshold, ζ. For the energy detector, it is known that optimal decision threshold theoretically exists as expressed in ([44] § III.B).

Before concluding this part, one might want to contemplate the worst-case scenario regarding the prediction error variance. Selecting the weighting coefficients α i in (10) plays an important role on the error variance behavior. In this regard, any approach ignoring the actual observations, \(\mathbf {X}_{n - i}^{k}\), in (10) would lead to no-information case and, therefore, yield the maximum entropy. It automatically implies that the maximum entropy could only be reached by setting α i =0,i. In (10), such a setting gives rise to a prediction, \(\hat {\mathbf {X}}_{n + 1}^{k}\), which is equal to AWGN due to the autoregressive (AR) structure with a certain mean and variance pair. Theoretically speaking, AWGN could take any real value; therefore, prediction error variance diverges for the worst-case scenario.

5 Conclusions

In this paper, a cross-layer predictive channel selection mechanism is proposed to increase utilization and performance in WAVE multi-channel architecture. With this selection scheme, channel history is used to predict the next state of the wireless channel. By taking advantage of the cross-layer design, the MAC layer is fed with energy detector statistics from the PHY layer to make the best decision to find the most appropriate non-emergency/service channel. The proposed method implies a channel access protocol which improves the effectiveness of collision avoidance procedure. Furthermore, the proposed architecture could be adapted to various scenarios and conditions by appropriately selecting the model parameters. Analysis along with the results shows that the proposed method outperforms the widely deployed Markovian-based prediction method; therefore, it is a promising candidate for the WAVE standard.

The cross-layer architecture allows the proposed method to be extended further in various ways. For instance, both traffic and geographical information could be incorporated into the architecture as a pseudo-layer appended into both PHY, MAC, and network layers. Moreover, predictive strategy could be enhanced further by taking into account network traffic type statistics such as web access, VoIP, video streaming, and gaming. Considering the fact that different network traffic types exhibit distinct statistical behaviors, enhanced predictive strategies could be devised based on these statistical models and parameters reflecting the stochastic nature of each traffic type.

Finally, collaborative, cooperative, and coordinated access schemes could be incorporated into the model proposed. This way, relays, horizontal and vertical handover algorithms, and V2I link support can be optimized since VANETs are considered to be an integral part of next-generation wireless networks (NGWNs).

6 Endnotes

1 Note that in (12) the case where ψ X [n]=0 is excluded since it implies \(\sigma _{\mathbf {X}^{k}}^{2}[n] = 0\) pointing out absolute certainty.

7 Appendix

7.1 Proof of Proposition 1

Proof.

In order to prove Proposition 1, let L=1 since the analysis is more tractable and valid for any channel. Therefore, the indices k and i will be dropped. However, one should keep in mind that the proof holds for 1<L since (10) satisfies the linearity conditions.

Mean squared prediction error is given by
$$ \begin{aligned} \sigma_{\mathbf{e}}^{2}&=E\left\{\left({\hat{\mathbf{X}}}_{n + 1} - \left(\alpha\mathbf{X}_{n} + \mu_{X}\right)\right)^{2}\right\}\\&= \overbrace{\sigma^{2}_{\hat{\mathbf{X}}_{n + 1}} + \alpha^{2}\sigma^{2}_{\mathbf{X}_{n}} - 2\alpha{E}\left\{\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}\right\}}^{\varphi(\alpha)}\\ &\quad+ \underbrace{\mu^{2}_{\mathbf{X}} + 2\mu_{\mathbf{X}}\left(\alpha{E}\left\{\mathbf{X}_{n}\right\}-E\left\{\hat{\mathbf{X}}_{n + 1}\right\}\right)}_{h(\mu_{\mathbf{X}})} \end{aligned} $$
(15)
where h(μ X ) in (15) is the final term which should be minimized. Because the condition that is sought for is \(\frac {d}{d\mu _{\mathbf {X}}}h(\mu _{\mathbf {X}}) = 0\), it is clear that
$$ {\mu}_{\mathbf{X}} = {{\mu}_{\hat{\mathbf{X}}}}_{n + 1} - \alpha{\mu}_{{\mathbf{X}}_{n}} $$
(16)
is obtained where μ Z =E{Z} for any stationary stochastic process Z. Note that \(\varphi _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}}\) in (15) can be rewritten as
$$ \varphi(\alpha) = \text{Var}\left({\hat{\mathbf{X}}_{n + 1}-\alpha\mathbf{X}_{n}}\right) $$
(17)
where \(\text {Cov} \left ({\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}}\right)\) denotes the covariance \(E\left \{\!\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}\!\right \}\). In this regard, following the same reasoning as that for h(μ X ), minimization of φ(α) in (15) seeks a solution for \(\frac {d}{d\alpha }\varphi (\alpha) = 0\):
$$ \alpha =\rho_{\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}} \frac{\sigma_{\hat{\mathbf{X}}_{n + 1}}}{\sigma_{\mathbf{X}_{n}}} $$
(18)
where \(\rho _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}} \in \,[-1, 1]\) denotes the cross-correlation coefficient estimates bearing in mind that
$$ \rho_{\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}} = \frac{\text{Cov} \left({\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}}\right)}{\sigma_{\hat{\mathbf{X}}_{n + 1}}\sigma_{\mathbf{X}_{n}}} $$
(19)
Next, α in (18) can be plugged into φ(α) in (15) and after some mathematical manipulations the following:
$$ \text{Var}\left({\hat{\mathbf{X}}_{n + 1}-\alpha\mathbf{X}_{n}}\right) = \sigma_{\hat{\mathbf{X}}_{n + 1}}^{2}\left(1-\rho_{\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}}^{2}\right) $$
(20)

is obtained. Recall that \(\rho _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}} \in \,[-1, 1]\); therefore, \(\rho _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}}^{2} \in \, [0, 1]\).

Once the prediction is established, one might want to quantify the probability that the predicted value of the energy detector is above a threshold so that the channel selection mechanism could act on it accordingly. In this regard, the channel selection mechanism investigates \(\text {Pr}\left (\left (\hat {\mathbf {X}}_{n + 1}-\mu _{\hat {\mathbf {X}}_{n + 1}}\right) < \zeta \right)\). Considering the fact that the energy detector yields always non-negative output as declared in (7), \(\hat {\mathbf {X}}_{n + 1}\) is actually a non-negative stochastic process. Therefore, \(\text {Pr}\left (\left (\hat {\mathbf {X}}_{n + 1}-\mu _{\hat {\mathbf {X}}_{n + 1}}\right)^{2} < \zeta ^{2}\right)\) is read. Applying Chebyshev’s inequality:
$$ \begin{array}{ll} \zeta^{2}\left(1 - \text{Pr}\left(\left(\hat{\mathbf{X}}_{n + 1}-\ensuremath{\mu_{\hat{\mathbf{X}}_{n + 1}}}\right)^{2} \geq \zeta^{2}\right)\right)&\leq \sigma_{\hat{\mathbf{X}}_{n + 1}}^{2} \end{array} $$
(21)
is yielded. Then, combining both (20) and (21):
$$ \begin{aligned} &\zeta^{2}\underbrace{\left(1-\rho_{\hat{\mathbf{X}}_{n + 1}\mathbf{X}_{n}}^{2}\right)}_{\xi}\underbrace{\left(1 - \text{Pr}\left(\left(\hat{\mathbf{X}}_{n + 1}-\ensuremath{\mu_{\hat{\mathbf{X}}_{n + 1}}}\right)^{2} \geq \zeta^{2}\right)\right)}_{\kappa}\\ &\quad\leq \text{Var}(\hat{\mathbf{X}}_{n + 1}-\alpha\mathbf{X}_{n}) \end{aligned} $$
(22)
is held. Note that all ζ 2, ξ, and κ are non-zero. Furthermore, both ξ,κ [0,1]. This implies that
$$ 0 < \zeta^{2}\xi\kappa \leq \text{Var}(\hat{\mathbf{X}}_{n + 1}-\alpha\mathbf{X}_{n}) $$
(23)

revealing that prediction has an irreducible lower bound of error and the lower bound is a function of the threshold ζ used by the energy detector. This completes the proof.

Declarations

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors’ Affiliations

(1)
Department of Electrical and Electronics Engineering, Istanbul Ticaret University
(2)
Department of Computer Engineering, Istanbul Ticaret University
(3)
Department of Computer Engineering, Istanbul Technical University

References

  1. M Peden, R Scurfield, D Sleet, D Mohan, AA Hyder, E Jarawan, C Mathers, World report on road traffic injury prevention. Technical Report ISBN 92-4-156260-9 (World Health Organization, Geneva, 2004).Google Scholar
  2. DD Group, Traffic accident statistics - road, 2011. Technical Report ISBN 978-975-19-5333-9, General Directorate of Public Security and Turkish Statistical Institute (Turkish Statistical Institution, Printing Division, Ankara, Turkey, 2012). MTB 2012-504-110.Google Scholar
  3. SF Hasan, N Siddique, S Chakraborty, Intelligent Transport Systems, 1st edn. (Springer-Verlag, New York, 2013). eBook ISBN:978-1-4614-3272-2 doi:10.1007/978-1-4614-3272-2.View ArticleGoogle Scholar
  4. T ElBatt, SK Goel, G Holland, H Krishnan, J Parikh, in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. VANET ’06. Cooperative Collision Warning Using Dedicated Short Range Wireless Communications (ACM,Los Angeles, CA, USA, 2006), pp. 1–9. doi:10.1145/1161064.1161066.View ArticleGoogle Scholar
  5. C, 2C-CC System, Car 2 car communication consortium manifesto (C2C-CC System, 2007). https://www.car-2-car.org/index.php?id=31.
  6. M Alsabaan, W Alasmary, A Albasir, K Naik, Vehicular networks for a greener environment: A survey. Commun. Surv. Tutorials IEEE. 15(3), 1372–1388 (2013). doi:10.1109/SURV.2012.101912.00184.View ArticleGoogle Scholar
  7. A Boyaci, E Ozturk, S Yarkan, AH Zaim, in Application of information and communication technologies (AICT), 2013 7th international conference on. Towards green and secure vehicle-to-vehicle communications: a protocol for establishing the network (IEEE, 2013), pp. 1–4. doi:10.1109/ICAICT.2013.6722720.
  8. X Cheng, L Yang, X Shen, D2d for intelligent transportation systems: A feasibility study. Intell. Transp. Syst, IEEE Trans. 16(4), 1784–1793 (2015). doi:10.1109/TITS.2014.2377074.View ArticleGoogle Scholar
  9. IEEE, IEEE standard for information technology– local and metropolitan area networks– specific requirements– part 11: wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: wireless access in vehicular environments. IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, IEEE Std 802.11n-2009, and IEEE Std 802.11w-2009), 1–51 (2010). doi:10.1109/IEEESTD.2010.5514475.
  10. R Schneiderman, Car makers see opportunities in infotainment, driver-assistance systems [special reports]. Signal Process. Mag. IEEE. 30(1), 11–15 (2013). doi:10.1109/MSP.2012.2219681.View ArticleGoogle Scholar
  11. E-J Jang, R Woo, DS Han, Improvement of connectivity between infrastructure and consumer devices for infotainment services. Consum. Electron. IEEE Trans. 59(2), 329–334 (2013). doi:10.1109/TCE.2013.6531114.View ArticleGoogle Scholar
  12. H Arslan, S Yarkan, ME Sahin, S Gezici, in Reliable Communications for Short-Range Wireless Systems, ed. by I Guvenc, S Gezici, Z Sahinoglu, and UC Kozat. Interference mitigation and awareness for improved reliability (Cambridge University Press,Cambridge, UK, 2011), pp. 190–233.View ArticleGoogle Scholar
  13. ASTM International, Standard specification for telecommunications and information exchange between roadside and vehicle systems – 5 ghz band dedicated short range communications (dsrc) medium access control (mac) and physical layer (phy) specifications (ASTM InternationalWest Conshohocken, PA, 2015). doi:10.1520/E2213-03R10.
  14. X Shen, X Cheng, L Yang, R Zhang, B Jiao, Data Dissemination in VANETs: a scheduling approach. IEEE Trans. Intell. Transp. Syst. 15(5), 2213–2223 (2014). doi:10.1109/TITS.2014.2313631.View ArticleGoogle Scholar
  15. C Campolo, A Cortese, A Molinaro, in Ultra Modern Telecommunications Workshops, 2009. ICUMT ’09. International Conference on. Crasch: A cooperative scheme for service channel reservation in 802.11p/WAVE vehicular ad hoc networks (IEEE, 2009), pp. 1–8. doi:10.1109/ICUMT.2009.5345640.
  16. S Rocke, S Chen, R Vuyyuru, O Altintas, AM Wyglinski, in Vehicular Networking Conference (VNC), 2012 IEEE. Knowledge-based dynamic channel selection in vehicular networks (poster) (IEEE, 2012), pp. 165–172. doi:10.1109/VNC.2012.6407426.
  17. K Inage, S Lee, T Fujii, O Altintas, in Vehicular Networking Conference (VNC), 2011 IEEE. White space vectors for channel selection in vehicular cognitive networks (IEEE, 2011), pp. 55–61. doi:10.1109/VNC.2011.6117124.
  18. S Chen, R Vuyyuru, in Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. Dynamic channel selection for wireless mobile ad hoc networks: Adaptation and learning (IEEE, 2013), pp. 75–82. doi:10.1109/WiMOB.2013.6673343.
  19. S Chen, R Vuyyuru, O Altintas, AM Wyglinski, in Vehicular Networking Conference (VNC), 2011 IEEE. On optimizing vehicular dynamic spectrum access networks: automation and learning in mobile wireless environments (IEEE, 2011), pp. 39–46. doi:10.1109/VNC.2011.6117122.
  20. WB Heinzelman, AP Chandrakasan, H Balakrishnan, An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Comm. 1(4), 660–670 (2002). doi:10.1109/TWC.2002.804190, ISSN:1536-1276.View ArticleGoogle Scholar
  21. K-L Wang, T-P Wang, C-C Tseng, A fair scheme for multi-channel selection in vehicular wireless networks. Wireless personal communications. 73(3), 1049–1065 (2013). Springer.View ArticleGoogle Scholar
  22. F Mapar, K Chowdhury, in Communications (ICC), 2014 IEEE International Conference on. Predictive decision-making for vehicular cognitive radio networks through Hidden Markov models (IEEE,Sydney, Australia, 2014), pp. 1537–1542. doi:10.1109/ICC.2014.6883540.View ArticleGoogle Scholar
  23. IH Brahmi, S Djahel, Y Ghamri-Doudane, in Proc. IEEE Global Communications Conference (GLOBECOM 2012). A Hidden Markov Model based scheme for efficient and fast dissemination of safety messages in VANETs (IEEE,Anaheim, CA, 2012), pp. 177–182. doi:10.1109/GLOCOM.2012.6503109.View ArticleGoogle Scholar
  24. H Li, DK Irick, in Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st. Collaborative Spectrum Sensing in Cognitive Radio Vehicular Ad Hoc Networks: Belief Propagation on Highway (IEEE,Taipei, China, 2010), pp. 1–5. doi:10.1109/VETECS.2010.5494005.Google Scholar
  25. M Di Felice, KR Chowdhury, L Bononi, in Wireless Days (WD), 2010 IFIP. Analyzing the potential of cooperative Cognitive Radio technology on inter-vehicle communication (IEEE,Venice, Italy, 2010), pp. 1–6. doi:10.1109/WD.2010.5657770. Invited paper.View ArticleGoogle Scholar
  26. AJ Ghandour, K Fawaz, H Artail, in Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks (IEEE,Istanbul, Turkey, 2011), pp. 871–876. doi:10.1109/IWCMC.2011.5982661.View ArticleGoogle Scholar
  27. H Yoo, D Kim, Dynamic channel coordination schemes for IEEE 802.11p/1609 vehicular networks: a survey. IET Commun. 2013, 1–8 (2013). Article ID: 827317.Google Scholar
  28. C-S Lin, J-C Lin, Physical-layer transceiving techniques on data-aided orthogonal frequency-division multiplexing towards seamless service on vehicular communications. IET Commun. 7(8), 721–730 (2013).View ArticleGoogle Scholar
  29. K Qaraqe, S Yarkan, in Personal Indoor and Mobile Radio Communications (PIMRC), 2010 IEEE 21st International Symposium on. A second-order statistical method for spectrum sensing in correlated shadowing and fading environments (IEEE,Istanbul, Turkey, 2010), pp. 780–785. doi:10.1109/PIMRC.2010.5671965.Google Scholar
  30. JG Proakis, Digital Communications (Mc-GrawHill International Editions, New York, 2001).Google Scholar
  31. GL Stüber, Principles of Mobile Communications (Kluwer Academic Publishers, Norwell, MA, USA, 1996). Fourth Printing, ISBN: 0–7923–9732–0.View ArticleGoogle Scholar
  32. M Gudmundson, Correlation model for shadow fading in mobile radio systems. Electron. Lett. 27(23), 2145–2146 (1991).View ArticleGoogle Scholar
  33. C Oestges, N Czink, B Bandemer, P Castiglione, F Kaltenberger, AJ Paulraj, Experimental characterization and modeling of outdoor-to-indoor and indoor-to-indoor distributed channels. IEEE Trans. Vehicular Technol. 59(5), 2253–2265 (2010).View ArticleGoogle Scholar
  34. H Urkowitz, Energy detection of unknown deterministic signals. Proc. IEEE. 55(4), 523–531 (1967).View ArticleGoogle Scholar
  35. VI Kostylev, in Communications, 2002. ICC 2002. IEEE International Conference on, 3. Energy detection of a signal with random amplitude (IEEE,New York, USA, 2002), pp. 1606–1610. doi:10.1109/ICC.2002.997120.Google Scholar
  36. A Sonnenschein, PM Fishman, Radiometric detection of spread-spectrum signals in noise of uncertain power. IEEE Tran. Aerospace Electron. Syst. 28(3), 654–660 (1992). doi:10.1109/7.256287.View ArticleGoogle Scholar
  37. H Tang, in New frontiers in dynamic spectrum access networks, 2005. DySPAN 2005. 2005 first IEEE international symposium on. Some physical layer issues of wide-band cognitive radio systems (IEEE,Baltimore, MD, USA, 2005), pp. 151–159. doi:10.1109/DYSPAN.2005.1542630.View ArticleGoogle Scholar
  38. RA Dillard, Detectability of spread-spectrum signals. IEEE, Trans. Aerospace Electron. Syst.AES-15(4), 526–537 (1979). doi:10.1109/TAES.1979.308737.View ArticleGoogle Scholar
  39. Y Zeng, Y-C Liang, AT Hoang, ECY Peh, in Communications Workshops, 2009. ICC Workshops 2009. IEEE International Conference on. Reliability of spectrum sensing under noise and interference uncertainty (IEEE,Dresden, Germany, 2009), pp. 1–5. doi:10.1109/ICCW.2009.5208033.Google Scholar
  40. S Yarkan, H Arslan, in Vehicular technology conference, 2007. VTC-2007 Fall. 2007 IEEE 66th. Binary time series approach to spectrum prediction for cognitive radio (IEEE,Baltimore, MD, USA,2007), pp. 1563–1567. doi:10.1109/VETECF.2007.332.Google Scholar
  41. S Yarkan, BU Toreyin, KAQAE Cetin, An online adaptive cooperation scheme for spectrum sensing based on a second-order statistical method. IEEE Trans. Vehicular Technol. 61(2), 675–686 (2012).View ArticleGoogle Scholar
  42. S Geirhofer, L Tong, BM Sadler, Cognitive medium access: constraining interference based on experimental models. IEEE J. Selected Areas Commun. 26(1), 95–105 (2008).View ArticleGoogle Scholar
  43. CE Shannon, The mathematical theory of communication. Bell Syst. Techn. J. 27, 379–423623656 (1948).MATHMathSciNetView ArticleGoogle Scholar
  44. W Zhang, R Mallik, KB Letaief, IEEE Trans. Wireless Commun.8(12), 5761–5766 (2009). doi:10.1109/TWC.2009.12.081710.
  45. AJ Goldsmith, LJ Greenstein, GJ Foschini, Error statistics of real-time power measurements in cellular channels with multipath and shadowing. IEEE Trans. Vehicular Technol. 43(3.P.I), 439–446 (1994).View ArticleGoogle Scholar

Copyright

© Boyacıet al. 2015