- Research
- Open Access

# A cross-layer adaptive channel selection mechanism for IEEE 802.11P suite

- Ali Boyacı
^{1}Email author, - Halim Zaim
^{2}and - Coşkun Sönmez
^{3}

**2015**:214

https://doi.org/10.1186/s13638-015-0441-z

© Boyacıet al. 2015

**Received:**31 December 2014**Accepted:**3 September 2015**Published:**16 September 2015

## Abstract

Recent advances in the automotive industry enabled us to build fast, reliable, and comfortable vehicles with lots of safety features. Also, roads are designed and made safer than ever before. However, traffic accidents remain one of the major causes of death. Intelligent transport systems are expected to reduce if not prevent accidents with interconnected vehicles and infrastructures. These vehicular ad hoc networks are highly dynamic and fragile. Although the standardization efforts are mature enough, the non-emergency/service channel selection mechanisms are not explicitly defined. In this paper, a novel cross-layer prediction-based algorithm is proposed to select the best possible service channel to decrease collisions beforehand. Theoretical analysis regarding the mean squared error prediction performance is established. It is shown that the proposed method outperforms the general Markovian-based prediction schemes under various traffic load scenarios.

## Keywords

- Cross-layer design
- 802.11P
- Vehicle-to-vehicle networks
- Predictive channel selection

## 1 Introduction

Transportation is by far one of the most important features in mankind’s entire history. Especially in today’s busy world, transportation is not only a necessity for personal travel, but it is also necessary for the shipment of goods across the globe. All these needs require infrastructure, planning, and optimization to run safely and smoothly.

Vehicular networks are considered to be a special form of ad hoc networks because of their high-level dynamic topologies. From sparse and fast highways to congested and slow downtown traffic, these network structures are naturally desired to operate in the optimum way. However, the extreme conditions caused by high mobility render vehicular ad hoc networks (VANETs) to a short-lived nature. Despite their inherent constraints, VANETs are also a promising heterogeneous network type, since they are planned to consist of contemporary cellular networks, next-generation wireless networks along with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) link support as well as device-to-device communications options [8]. In order to encompass all of the aforementioned tasks and constraints, the IEEE 802.11p/1609 work group strives to establish a standard known as wireless access in vehicular environments (WAVE) [9].

Although the primary intent for V2V communications systems is safety, like cellular phones and PDAs, entertainment is the primary driving force for this kind of communications technology. Infotainment applications make driving more enjoyable and bring new opportunities to the market [10, 11]. With specialized entertainment products to enhance the driver or the passenger experience, these applications such as video streaming and voice over IP (VoIP) require a high bandwidth connection to create a seamless customer experience.

One should keep in mind that V2V communications take place in the wireless spectrum which is a very valuable, finite, and public resource. This nature of the wireless spectrum brings about multi-access interference (MAI) issues. Interference causes poor signal reception, drastic decrease in system capacity, frequent hand-offs, and service interruptions. Unlike centralized network structures, with ad hoc vehicle networks, there are multiple interference scenarios present simultaneously such as cochannel interference (CCI), adjacent channel interference (ACI), narrowband interference (NBI), wideband interference (WBI), and so on [12]. In the literature, there are mainly three strategies to combat interference: interference avoidance, mitigation, and cancellation. Of these three strategies, it is obvious that interference avoidance is the simplest and most effective one, since avoidance strategy will pave the path for interference-free communications. However, avoidance relies on identifying unused resources. Thus, any avoidance strategy always includes some sort of identification procedure to sense the use of resources, then decides based on the data and acts on it accordingly [12]. Note that even such an effort might not be sufficient to prevent MAI problems such as collision. Even though there are numerous collision avoidance strategies in the literature, they are all based on the assumption of having a channel selected already at hand. It is evident that a successful collision avoidance strategy should definitely be preceded by identification of statistically least occupied channel in advance.

It is obvious that selecting a channel randomly at medium access control (MAC) layer is the simplest and widely adopted solution. However, a channel selection mechanism solely relying on MAC layer functionalities is not sufficient to provide satisfactory performance and needs novel data dissemination strategies benefiting from advanced techniques such as space time network coding [14]. Therefore, a cross-layer design including both MAC and physical layer (PHY) operations is required. In this regard, from the PHY layer perspective, a prediction mechanism is required in order for the MAC layer to take appropriate actions in advance. Failure to achieve these cross-layer operations may cause the system to select an interfering or busy channel and drastically lose bandwidth and performance. Once the channel is selected, it will be used until the next cycle and a busy or interfering medium is subject to wait in collision avoidance state. Also, note that the collision avoidance mechanism in IEEE 802.11p uses carrier sense multiple access/collision avoidance (CSMA/CA) and can only detect known type of signals [9].

In the literature, there are mainly four categories in selecting a service channel for VANET systems: pre-allocation-based [15–19], randomized rotation-based [20], minimum duration-based [21], and predictive-based schemes [22]. Pre-allocation-based schemes employ a static database and then select a channel based on that database. Despite its simplicity, such an approach evidently yields a poor performance under dynamic access. Furthermore, the database itself should be updated frequently. The randomized rotation-based algorithms take advantage of a different version of frequency hopping. Therefore, they inherently adopt both advantages and disadvantages of frequency hopping approaches such as improved fairness and lack of knowledge regarding the state of the medium. Minimum duration-based methods need to store the occupancy durations of each channel so that the least used can be identified. However, the performance of these methods converge with those of pure random channel selection schemes. Predictive algorithms seem to fit best for the channel selection task, but they lack cross-layer and adaptive design leading to poor and unsatisfactory performances [23]. On the other hand, studies that focus on predictions taking advantage of Markovian assumption rely heavily on selecting the appropriate length of both prediction period and history. In the absence of historical data (past observations), it is reported that prediction accuracy degrades dramatically [22]. Studies which follow decision-making processes based on a posteriori probabilities of the occupancy state of a channel could also be considered in this manner. Nevertheless, such attempts require some sort of collaboration and coordination [24]. It is worth mentioning at this point that there are also studies in the literature, which aim to be aware of spectrum conditions on future positions along the path of any vehicle. Yet, such a strategy mandates obtaining the location of each vehicle via an already-existing reference such as Global Positioning System (GPS) and an infrastructure which allows the vehicles to share the digital maps across the network [25, 26]. Therefore, in this study, a novel cross-layer, adaptive channel selection mechanism is proposed. Even though several predictive channel selecting mechanisms presently exist, to the best of the knowledge of the authors, this study is pioneering the incorporation of cross-layer architecture with predictive strategy into vehicular networks.

The rest of this paper is organized as follows: Section 2 describes the system and signal model along with the theoretical analysis. Section 3 covers the proposed scheme in detail. In Section 4, the results are presented along with relevant discussions. Finally, conclusions and future directions are outlined in Section 5.

## 2 System and signal model

In this study, a cross-layer adaptive channel selection mechanism is proposed for IEEE 802.11p suite. Therefore, it is first desirable to discuss a complete characterization of the proposed system in conjunction with layered structure. Channel selection mechanism in V2V networks relies on IEEE 802.11 suite including both PHY and MAC layers [27, 28]. The PHY layer is responsible for various air interface functionalities such as synchronization, channel estimation, and equalization. The MAC layer takes care of channel access and scheduling operations. Note that IEEE 802.11p and IEEE 1609.x are jointly known as WAVE and specifically IEEE 1609.4 part extends MAC to multichannel-operations-enable mode. Peculiar to V2V networks, WAVE multichannel operations are carried out over two types of channels, namely control channel and service channel. It is important to keep in mind that there is a single control channel, whereas there are multiple service channels in WAVE. Because the safety and control signals/messages are sent over the control channel and other types of application signals/messages are transmitted over the service channels, a coordination mechanism is necessary. It is obvious that a successful coordination mechanism relies on the joint performance of both PHY and MAC layers, which directly points out a cross-layer design.

### 2.1 System and signal model

where *n*(*t*) is complex additive white Gaussian noise (AWGN) with \(\mathcal {CN}\left (0,{\sigma _{N}^{2}}\right)\) in the form of *n*(*t*)=*n*
_{
I
}(*t*)+*j*
*n*
_{
Q
}(*t*) as both *n*
_{
I
}(*t*) and *n*
_{
Q
}(*t*) being \(\mathcal {N}\left (0,{\sigma _{N}^{2}}/2\right)\) and \(j=\sqrt {-1}\); *x*(*t*) is the complex baseband equivalent of the unknown signal; and *H*
_{0} denotes the hypothesis corresponding to the absence of the unknown signal, whereas *H*
_{1} is the hypothesis corresponding to the presence of it. Hence, the statement of the problem can be expressed as deciding whether an unknown signal *x*(*t*) is present by examining the statistical characteristics of the received signal *r*(*t*) in the presence of noise *n*(*t*).

*x*(

*t*), can be decomposed into the following form under the narrowband channel assumption [29]:

*m*(

*t*),

*s*(

*t*), and

*a*(

*t*) represent complex fading channel process, slow-fading process, and the unknown baseband signal, respectively. In addition, the unknown baseband signal is assumed to be digitally modulated as [30]:

where *E*,*θ*, and *p*(·) are the energy, phase, and the complex-valued pulse shaping waveform, respectively for the *k*th digital symbol with *k*=0,1,…,*M*−1 in an *M*-ary scheme. Note that all three processes in (2) are independent of each other and of *n*(*t*).

where *h*(*t*) and *ϕ*(*t*) refer to the amplitude and phase of the complex channel process, respectively. In case there is sufficiently large number of independent paths superposing at the receiver antenna in the absence of a specular signal such as in line-of-sight (LOS) environments, *h*(*t*)=|*m*(*t*)| yields the Rayleigh distribution in accordance with the central limit theorem (CLT). In addition, mobility gives rise to correlation in the fading channel process [31]. If the angle of arrival (AoA) of the paths at an omni-directional antenna is assumed to be uniformly distributed [−*π*,*π*) on a 2-D plane, then Jakes’ Doppler spectrum occurs as a special case. Correlation in temporal domain for this special case is given by *R*
_{
h
}(*τ*)=*J*
_{0}(2*π*
*f*
_{
D
}|*τ*|), where *J*
_{0}(·) is the zeroth-order Bessel function of the first kind, *f*
_{
D
} is the maximum Doppler frequency with *f*
_{
c
}
*v*/*c*, *f*
_{
c
} is the operating frequency, *v* is the mobile speed, and *c* is the speed of light (*c*=3×10^{8} m/s).

*μ*(

*t*)/2 represents mean,

*σ*

_{ G }/2 is the standard deviation of log-normal fading, and

*g*(

*t*) is a real-valued unit normal process \(\mathcal {N}(0,1)\). It is not difficult to infer from (5) that

*μ*(

*t*) represents the impact of distance-dependent path loss varying over relatively longer periods of time. As in complex fading process, experimental results also report that

*g*(·) exhibits correlation of an exponentially decaying form [32]:

where *E*{·} is the statistical expectation and *d*
_{
ρ
} refers to the decorrelation distance. Field measurements show that various environments have different decorrelation distances. For example in [32], *d*
_{
ρ
} is calculated to be 5.75 and 350 m for urban and suburban environmental classes, respectively. It is crucial to state that both (5) and (6) correspond to simplified theoretical approximations which are consistent to some extent with experimental results available in the literature. However, there are some other studies available in the literature related to shadowing models such as static and dynamic shadowing [33].

### 2.2 Energy detection

where *N* is an arbitrary number of samples taken into consideration and *r*[·] denotes the discrete counterpart of the received signal, *r*(·). For *H*
_{0}, AWGN assumption yields a central *χ*
^{2} distribution with *N* degrees of freedom (\({\chi ^{2}_{N}}\)). For *H*
_{1}, *d*[*n*] provides a non-central \({\chi ^{2}_{N}}\) distribution with an additional shape parameter. If *N* is selected to be large enough, the decision statistic is assumed to be asymptotically normally distributed with certain mean and variance values in accordance with the CLT. Before proceeding with the performance analysis of radiometer, it is worth mentioning that the radiometer is a non-coherent receiver and is known to be the “optimum” detector in the absence of a priori knowledge about the received signal [34, 35]. Yet, it has very critical drawbacks. First of all, noise-plus-interference uncertainty degrades the performance of the radiometer drastically [36]. In addition, low signal-to-noise ratio (SNR) regime leads to unsatisfactory results [37]. Combining these two issues, one could easily conclude that the radiometer performs poorly in detecting spread-spectrum signals [38]. Furthermore, it is clear that the performance of the radiometer is heavily dependent on the SNR/signal-to-interference-plus-noise ratio. For the sake of completeness, it is desirable to show how the performance of the radiometer is related to SNR.

*d*[

*n*] under the AWGN assumption has a central

*χ*

^{2}distribution with

*N*degrees of freedom (\({\chi ^{2}_{N}}\)) for

*H*

_{0}, whereas it has \({\chi ^{2}_{N}}(m)\), where

*m*denotes the shape (non-centrality) parameter [34] for

*H*

_{1}. Based on these assumptions, one could easily obtain the probability density function (PDF) for

*H*

_{0}scenario as

*Γ*(·) denotes the gamma function. Similarly, the PDF for

*H*

_{1}scenario is given by

where *J*
_{
k
}(·) denotes the *k*-th-order modified Bessel function of the first kind. Based on both \(f_{{\chi ^{2}_{N}}}(x)\) and \(f_{\chi ^{2}_{N,m}}(x)\), receiver operating characteristic (ROC) could theoretically be derived by seeking for \(\Pr {\left ({\chi ^{2}_{N}}>\lambda \vline H_{1}\right)}\) and \(\Pr {\left (\chi ^{2}_{N,m}>\lambda \vline H_{0}\right)}\), which correspond to probability of detection and probability of false alarm, respectively. Here, \(\Pr {\left ({\chi ^{2}_{N}}>\lambda \vline H_{1}\right)}\) is given by \(Q_{g}\left (\sqrt {2\gamma },\sqrt {\lambda }\right)\) where *λ* denotes the decision threshold, *Q*
_{
g
}(·) is the generalized Marcum *Q* function, and *γ* is the instantaneous SNR. Note that the optimum threshold selection mandates one to have knowledge about the SNR ([34] Eq. (35)). It is not difficult to see that the same conclusion (with more sophisticated calculations) holds also for the SINR in case there are unknown activities within the spectrum of interest apart from that of primary user [39].

## 3 Channel selection

expresses the weighted moving average prediction where \(\hat {\mathbf {X}}_{n + 1}^{k}\) denotes the predicted value for the *n*+1-th step based on past *L* historical data of the *k*-th channel; *α*
_{
i
}s denote the weighting coefficients; and \(\mu _{\mathbf {X}^{k}}\) represents the intercept of the prediction.

*L*past energy detector observations are at hand, the channel selection mechanism then proceeds with calculating the variance of the past observations as:

*L*observations. In order for the channel selection mechanism to quantify whether a state transition takes place at the prediction stage/step, (11) needs to be scaled so that as mentioned above, Kolmogorov’s assumptions for the probability metric are not violated:

*ϱ*

^{ k }is a constant for the

*k*-th channel which satisfies \(0<\psi _{\mathbf {X}^{k}}[n] \leq 1\).

^{1}Finally, the channel selection mechanism applies the first-order difference operator to (12) and reaches the channel selection metric as

*D*

^{−1}(·) denotes the first-order difference operator being applied to its input. Now, the channel selection mechanism is ready to provide the hard decision based on (13) as follows:

where \(\hat {d}_{n}^{k}\) denotes the predicted binary state of the *k*-th channel at the *n*-th step for the next *n*+1-th step and *ζ* is an adaptive threshold below which is predicted to be occupied.

There are some critical points in establishing the steps (10) through (14). First and foremost, the depth of the history, *L*, should be specified. Consequently, weighting coefficients *α*
_{
i
}s in (10) need to be determined in an effective way as well. Second, *ϱ*
^{
k
} in (12) should be decided. Because (10) is a linear model in essence, any minimization approach based on 2-norm (∥·∥_{2}) such as mean squared error (MSE) could be adopted in determining the weighting coefficients as shown subsequently. On the other hand, determining the depth of the history, *L*, is actually nothing but deciding the order of the linear model adopted in (10) based on a specific set of criteria. Mean magnitude residual statistics, sum of squares of Pearson residuals, and Akaike information criteria (AIC) are prominent model order selection strategies present in the literature [40]. However, model order selection is outside the scope of this study.

In what follows, it will be shown that the proposed channel selection mechanism has a prediction error which cannot be reduced further and the aforementioned issues will all be clarified.

###
**Proposition**
**1** (Irreducible prediction error).

The proposed channel selection mechanism has an irreducible prediction error variance, \(\sigma _{\mathbf {e}}^{2}\), which cannot be reduced further and is a function of the threshold that is used by the energy detector at the decision stage.

###
*Proof*.

See Appendix.

## 4 Numerical results

The performance of the proposed method is investigated in various traffic conditions and scenarios. Also, a performance comparison is established between the method proposed and Markovian-based prediction scheme. In the sequel, one might be interested in why specifically Markovian-based scheme is selected for comparison purposes. The reason is threefold: (i) Peculiar to the spectrum sensing problem, spectrum occupancy could best be represented with a Bernoulli process, which is a special case of Markov chain. Therefore, Markovian-based structures provide a very high-level flexibility in both modeling and analyzing the spectrum sensing problem. (ii) Markovian-based schemes are vastly employed prediction strategies present in the literature. This stems from the fact that it has a simplistic design and tractable statistical analysis. Furthermore, depending on the problem formulation, several adaptations and extensions such as multi-layer Markovian or hidden Markov model (HMM)-based approaches could easily be obtained with minor modifications in the original model organization. (iii) Finally, Markovian-based models are so versatile that they could be exploited to tackle spectrum sensing problems in different parts of open systems interconnection (OSI) reference. For instance, it could be used both in PHY and MAC layers to shed light on different aspects of spectrum sensing problem.

Simulation setup considers several levels of traffic load ranging from light occupancy to densely occupied scenario based on the parameters reported in [42]. At this point, it is worth mentioning why parameter selection is based on the findings reported in [42]. (I) First and foremost, the proposed method requires both theoretical and empirical analyses. Therefore, studies which focus on both theoretical and empirical findings should be evaluated. From this perspective, [42] is a prominent work in the literature. (II) Also, as proposed, channel selection mechanism could be shared by both PHY and MAC layers in the sense of cross-layer approach. In [42], the same strategy is followed and both PHY and MAC layers are binded. (III) Finally, as discussed above, a generic Markovian-based structure for industrial, scientific, and medical (ISM) band depending on several important occupancy parameters is provided in [42] such that it could be used for comparing other findings with each other.

In simulating channel access, both busy and idle channel statistics are taken into account. According to the empirical observation-based model given in [42], busy and idle channel state transitions can be well approximated by the exponential distribution with a factor that changes with the traffic load. For the proposed method, the first energy detector is used to obtain the decision statistics. Next, decision statistics are fed to the prediction stage. Prediction is yielded by equal gain combining (\(\alpha _{i}=\alpha _{j}=\frac {1}{L}, \forall i,j\)). Along with the past measurement results, prediction is quantified with the metric defined in Section 3. Finally, a binary decision is reached so that MSE is obtained for the performance evaluations. It should be stated at this point that equal gain combining might not be the optimal prediction strategy for many scenarios. However, it establishes simplicity in implementation from the practical point of view because it skips the stage at which the weighting coefficients are estimated. Therefore, equal gain combining is adopted in the numerical results.

Common parameters used in the simulation setup

Parameters | Values |
---|---|

Occupied state parameter | {15.9 9.10 4.48 2.90 1.98 1.39 |

1.01 0.74 0.55 0.36 0.21} ms | |

(based on ([42] §V.A, Table I, p. 103)) | |

Idle state parameter | {1.11 1.08 1.05 1.03 1.02 1.03 |

1.03 1.02 1.03 1.03 1.03} ms | |

(based on ([42] §V.A, Table I, p. 103)) | |

Sampling interval | 200 ns |

Low-pass filter duration ( | Between 0 ms and 85 ms (based on ([45] §V.C, p. 444)) |

Number of samples for energy detection ( | 20 |

Major propagation channel characteristics | Rayleigh fading with Jakes’ spectrum |

Average SNR under | 10 dB |

*%*of the entire data set is sufficient under each level of traffic load to reach the same performance level in training the Markovian-based scheme.

The performance of the proposed method for *L*=2 can be seen in Fig. 5 as well under a generic scenario for comparison purposes. Here, *L*=2 is adopted, since in conjunction with equal gain combining strategy it provides some sort of a lower bound for the performance of the proposed predictor, as discussed above. This way, a fair comparison platform between the proposed method and the Markovian-based structures could be established. First and foremost, the proposed method yields a stationary MSE in contrast to the Markovian-based scheme. This is caused by the combined impact of both energy detector and the equal gain combining. Recall that the channel selection mechanism first collects the energy of the received signal at a sufficiently high sampling rate (generally satisfying the Nyquist criterion) for a very short period of time. This implies that especially switching from idle state to busy state can be captured in a few consecutive decision statistics produced by the energy detector. Once consecutive, high-resolution, and very low-latency decision statistics are fed to the prediction procedure, dramatic power fluctuations in the decision statistics due to fading are smoothed out to some extent since equal gain combining is nothing but applying a low-pass filtering operation to its input. This way, the proposed method firstly can capture the transitions very effectively, and secondly, false alarms due to drastic power fluctuations caused by fading are eliminated automatically. Hence, a stationary output for the proposed method is established as observed in Fig. 5.

*%*as discussed above) is used for estimating the weighting coefficients of the predictor for

*L*=2. Then, the predictor runs. Note that the prediction lags one sample behind its input as expected. Nevertheless, one could conclude that by looking at the time scale of the bursts, prediction reacts very rapidly. Yet, it is observed in Fig. 6 also that the predictor fails to track the actual observations when dramatic fluctuations occur in the received signal power. This is not surprising since prediction could only take into account a temporal window whose duration is

*L*×

*T*

_{ A }. Therefore, any burst whose duration, say

*T*

_{ B }, satisfying

*T*

_{ B }<

*L*×

*T*

_{ A }will yield a dramatic fluctuation in the decision statistic. Thus, prediction will not be able to keep track of these sudden changes in the received signal power.

*%*on average between the best- and the worst-case scenarios. Moreover, it is seen that the proposed method exhibits its worst performance under the average traffic load scenario. This is not surprising since the entropy of the channel occupancy statistics reaches its maximum when the load is 0.5 [43].

*ζ*, in (14). Three different threshold values and corresponding collision rates are given in Fig. 9. To better understand how the proposed mechanism behaves under various threshold values, Fig. 9 could be examined in conjunction with Fig. 8, since Fig. 8 shows the results regarding optimal threshold selection. As can be seen from both Figs. 8 and 9, the proposed mechanism performs poorly in case random threshold selection strategy is employed. On the contrary, Fig. 8 implies that optimum threshold gives rise to the minimum collision rate for all traffic load rates. From the practical point of view, obtaining the optimum threshold value might be difficult; therefore, cases where optimum threshold is not available should be examined as well. In Fig. 9, two different suboptimal threshold values and corresponding collision rates are given. As can be seen from the figure, depending on the traffic load, one of the thresholds slightly outperforms the other in one part, whereas the situation is reversed in the other part, as expected.

It is worth mentioning that whether the theoretical lower bound mentioned in the Appendix given with (23) exists. As Proposition 1 implies, lower bound could be reached in case the behavior of the decision device could be characterized statistically, since (23) is a function of the decision threshold, *ζ*. For the energy detector, it is known that optimal decision threshold theoretically exists as expressed in ([44] *§* III.B).

Before concluding this part, one might want to contemplate the worst-case scenario regarding the prediction error variance. Selecting the weighting coefficients *α*
_{
i
} in (10) plays an important role on the error variance behavior. In this regard, any approach ignoring the actual observations, \(\mathbf {X}_{n - i}^{k}\), in (10) would lead to no-information case and, therefore, yield the maximum entropy. It automatically implies that the maximum entropy could only be reached by setting *α*
_{
i
}=0,∀*i*. In (10), such a setting gives rise to a prediction, \(\hat {\mathbf {X}}_{n + 1}^{k}\), which is equal to AWGN due to the autoregressive (AR) structure with a certain mean and variance pair. Theoretically speaking, AWGN could take any real value; therefore, prediction error variance diverges for the worst-case scenario.

## 5 Conclusions

In this paper, a cross-layer predictive channel selection mechanism is proposed to increase utilization and performance in WAVE multi-channel architecture. With this selection scheme, channel history is used to predict the next state of the wireless channel. By taking advantage of the cross-layer design, the MAC layer is fed with energy detector statistics from the PHY layer to make the best decision to find the most appropriate non-emergency/service channel. The proposed method implies a channel access protocol which improves the effectiveness of collision avoidance procedure. Furthermore, the proposed architecture could be adapted to various scenarios and conditions by appropriately selecting the model parameters. Analysis along with the results shows that the proposed method outperforms the widely deployed Markovian-based prediction method; therefore, it is a promising candidate for the WAVE standard.

The cross-layer architecture allows the proposed method to be extended further in various ways. For instance, both traffic and geographical information could be incorporated into the architecture as a pseudo-layer appended into both PHY, MAC, and network layers. Moreover, predictive strategy could be enhanced further by taking into account network traffic type statistics such as web access, VoIP, video streaming, and gaming. Considering the fact that different network traffic types exhibit distinct statistical behaviors, enhanced predictive strategies could be devised based on these statistical models and parameters reflecting the stochastic nature of each traffic type.

Finally, collaborative, cooperative, and coordinated access schemes could be incorporated into the model proposed. This way, relays, horizontal and vertical handover algorithms, and V2I link support can be optimized since VANETs are considered to be an integral part of next-generation wireless networks (NGWNs).

## 6 Endnotes

^{1} Note that in (12) the case where *ψ*
_{
X
}[*n*]=0 is excluded since it implies \(\sigma _{\mathbf {X}^{k}}^{2}[n] = 0\) pointing out absolute certainty.

## 7 Appendix

### 7.1 Proof of Proposition 1

###
*Proof*.

In order to prove Proposition 1, let *L*=1 since the analysis is more tractable and valid for any channel. Therefore, the indices *k* and *i* will be dropped. However, one should keep in mind that the proof holds for 1<*L* since (10) satisfies the linearity conditions.

*h*(

*μ*

_{ X }) in (15) is the final term which should be minimized. Because the condition that is sought for is \(\frac {d}{d\mu _{\mathbf {X}}}h(\mu _{\mathbf {X}}) = 0\), it is clear that

*μ*

_{ Z }=

*E*{

**Z**} for any stationary stochastic process

**Z**. Note that \(\varphi _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}}\) in (15) can be rewritten as

*h*(

*μ*

_{ X }), minimization of

*φ*(

*α*) in (15) seeks a solution for \(\frac {d}{d\alpha }\varphi (\alpha) = 0\):

*α*in (18) can be plugged into

*φ*(

*α*) in (15) and after some mathematical manipulations the following:

is obtained. Recall that \(\rho _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}} \in \,[-1, 1]\); therefore, \(\rho _{\hat {\mathbf {X}}_{n + 1}\mathbf {X}_{n}}^{2} \in \, [0, 1]\).

*ζ*

^{2},

*ξ*, and

*κ*are non-zero. Furthermore, both

*ξ*,

*κ*∈ [0,1]. This implies that

revealing that prediction has an irreducible lower bound of error and the lower bound is a function of the threshold *ζ* used by the energy detector. This completes the proof.

## Declarations

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## Authors’ Affiliations

## References

- M Peden, R Scurfield, D Sleet, D Mohan, AA Hyder, E Jarawan, C Mathers,
*World report on road traffic injury prevention. Technical Report ISBN 92-4-156260-9*(World Health Organization, Geneva, 2004).Google Scholar - DD Group,
*Traffic accident statistics - road, 2011. Technical Report ISBN 978-975-19-5333-9, General Directorate of Public Security and Turkish Statistical Institute*(Turkish Statistical Institution, Printing Division, Ankara, Turkey, 2012). MTB 2012-504-110.Google Scholar - SF Hasan, N Siddique, S Chakraborty,
*Intelligent Transport Systems*, 1st edn. (Springer-Verlag, New York, 2013). eBook ISBN:978-1-4614-3272-2 doi:10.1007/978-1-4614-3272-2.View ArticleGoogle Scholar - T ElBatt, SK Goel, G Holland, H Krishnan, J Parikh, in
*Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. VANET ’06*. Cooperative Collision Warning Using Dedicated Short Range Wireless Communications (ACM,Los Angeles, CA, USA, 2006), pp. 1–9. doi:10.1145/1161064.1161066.View ArticleGoogle Scholar - C, 2C-CC System,
*Car 2 car communication consortium manifesto*(C2C-CC System, 2007). https://www.car-2-car.org/index.php?id=31. - M Alsabaan, W Alasmary, A Albasir, K Naik, Vehicular networks for a greener environment: A survey. Commun. Surv. Tutorials IEEE. 15(3), 1372–1388 (2013). doi:10.1109/SURV.2012.101912.00184.View ArticleGoogle Scholar
- A Boyaci, E Ozturk, S Yarkan, AH Zaim, in
*Application of information and communication technologies (AICT), 2013 7th international conference on*. Towards green and secure vehicle-to-vehicle communications: a protocol for establishing the network (IEEE, 2013), pp. 1–4. doi:10.1109/ICAICT.2013.6722720. - X Cheng, L Yang, X Shen, D2d for intelligent transportation systems: A feasibility study. Intell. Transp. Syst, IEEE Trans. 16(4), 1784–1793 (2015). doi:10.1109/TITS.2014.2377074.View ArticleGoogle Scholar
- IEEE, IEEE standard for information technology– local and metropolitan area networks– specific requirements– part 11: wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: wireless access in vehicular environments. IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, IEEE Std 802.11n-2009, and IEEE Std 802.11w-2009), 1–51 (2010). doi:10.1109/IEEESTD.2010.5514475.
- R Schneiderman, Car makers see opportunities in infotainment, driver-assistance systems [special reports]. Signal Process. Mag. IEEE. 30(1), 11–15 (2013). doi:10.1109/MSP.2012.2219681.View ArticleGoogle Scholar
- E-J Jang, R Woo, DS Han, Improvement of connectivity between infrastructure and consumer devices for infotainment services. Consum. Electron. IEEE Trans. 59(2), 329–334 (2013). doi:10.1109/TCE.2013.6531114.View ArticleGoogle Scholar
- H Arslan, S Yarkan, ME Sahin, S Gezici, in
*Reliable Communications for Short-Range Wireless Systems*, ed. by I Guvenc, S Gezici, Z Sahinoglu, and UC Kozat. Interference mitigation and awareness for improved reliability (Cambridge University Press,Cambridge, UK, 2011), pp. 190–233.View ArticleGoogle Scholar - ASTM International,
*Standard specification for telecommunications and information exchange between roadside and vehicle systems – 5 ghz band dedicated short range communications (dsrc) medium access control (mac) and physical layer (phy) specifications*(ASTM InternationalWest Conshohocken, PA, 2015). doi:10.1520/E2213-03R10. - X Shen, X Cheng, L Yang, R Zhang, B Jiao, Data Dissemination in VANETs: a scheduling approach. IEEE Trans. Intell. Transp. Syst. 15(5), 2213–2223 (2014). doi:10.1109/TITS.2014.2313631.View ArticleGoogle Scholar
- C Campolo, A Cortese, A Molinaro, in
*Ultra Modern Telecommunications Workshops, 2009. ICUMT ’09. International Conference on*. Crasch: A cooperative scheme for service channel reservation in 802.11p/WAVE vehicular ad hoc networks (IEEE, 2009), pp. 1–8. doi:10.1109/ICUMT.2009.5345640. - S Rocke, S Chen, R Vuyyuru, O Altintas, AM Wyglinski, in
*Vehicular Networking Conference (VNC), 2012 IEEE*. Knowledge-based dynamic channel selection in vehicular networks (poster) (IEEE, 2012), pp. 165–172. doi:10.1109/VNC.2012.6407426. - K Inage, S Lee, T Fujii, O Altintas, in
*Vehicular Networking Conference (VNC), 2011 IEEE*. White space vectors for channel selection in vehicular cognitive networks (IEEE, 2011), pp. 55–61. doi:10.1109/VNC.2011.6117124. - S Chen, R Vuyyuru, in
*Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on*. Dynamic channel selection for wireless mobile ad hoc networks: Adaptation and learning (IEEE, 2013), pp. 75–82. doi:10.1109/WiMOB.2013.6673343. - S Chen, R Vuyyuru, O Altintas, AM Wyglinski, in
*Vehicular Networking Conference (VNC), 2011 IEEE*. On optimizing vehicular dynamic spectrum access networks: automation and learning in mobile wireless environments (IEEE, 2011), pp. 39–46. doi:10.1109/VNC.2011.6117122. - WB Heinzelman, AP Chandrakasan, H Balakrishnan, An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Comm. 1(4), 660–670 (2002). doi:10.1109/TWC.2002.804190, ISSN:1536-1276.View ArticleGoogle Scholar
- K-L Wang, T-P Wang, C-C Tseng, A fair scheme for multi-channel selection in vehicular wireless networks. Wireless personal communications. 73(3), 1049–1065 (2013). Springer.View ArticleGoogle Scholar
- F Mapar, K Chowdhury, in
*Communications (ICC), 2014 IEEE International Conference on*. Predictive decision-making for vehicular cognitive radio networks through Hidden Markov models (IEEE,Sydney, Australia, 2014), pp. 1537–1542. doi:10.1109/ICC.2014.6883540.View ArticleGoogle Scholar - IH Brahmi, S Djahel, Y Ghamri-Doudane, in
*Proc. IEEE Global Communications Conference (GLOBECOM 2012)*. A Hidden Markov Model based scheme for efficient and fast dissemination of safety messages in VANETs (IEEE,Anaheim, CA, 2012), pp. 177–182. doi:10.1109/GLOCOM.2012.6503109.View ArticleGoogle Scholar - H Li, DK Irick, in
*Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st*. Collaborative Spectrum Sensing in Cognitive Radio Vehicular Ad Hoc Networks: Belief Propagation on Highway (IEEE,Taipei, China, 2010), pp. 1–5. doi:10.1109/VETECS.2010.5494005.Google Scholar - M Di Felice, KR Chowdhury, L Bononi, in
*Wireless Days (WD), 2010 IFIP*. Analyzing the potential of cooperative Cognitive Radio technology on inter-vehicle communication (IEEE,Venice, Italy, 2010), pp. 1–6. doi:10.1109/WD.2010.5657770. Invited paper.View ArticleGoogle Scholar - AJ Ghandour, K Fawaz, H Artail, in
*Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International*. Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks (IEEE,Istanbul, Turkey, 2011), pp. 871–876. doi:10.1109/IWCMC.2011.5982661.View ArticleGoogle Scholar - H Yoo, D Kim, Dynamic channel coordination schemes for IEEE 802.11p/1609 vehicular networks: a survey. IET Commun. 2013, 1–8 (2013). Article ID: 827317.Google Scholar
- C-S Lin, J-C Lin, Physical-layer transceiving techniques on data-aided orthogonal frequency-division multiplexing towards seamless service on vehicular communications. IET Commun. 7(8), 721–730 (2013).View ArticleGoogle Scholar
- K Qaraqe, S Yarkan, in
*Personal Indoor and Mobile Radio Communications (PIMRC), 2010 IEEE 21st International Symposium on*. A second-order statistical method for spectrum sensing in correlated shadowing and fading environments (IEEE,Istanbul, Turkey, 2010), pp. 780–785. doi:10.1109/PIMRC.2010.5671965.Google Scholar - JG Proakis,
*Digital Communications*(Mc-GrawHill International Editions, New York, 2001).Google Scholar - GL Stüber,
*Principles of Mobile Communications*(Kluwer Academic Publishers, Norwell, MA, USA, 1996). Fourth Printing, ISBN: 0–7923–9732–0.View ArticleGoogle Scholar - M Gudmundson, Correlation model for shadow fading in mobile radio systems. Electron. Lett. 27(23), 2145–2146 (1991).View ArticleGoogle Scholar
- C Oestges, N Czink, B Bandemer, P Castiglione, F Kaltenberger, AJ Paulraj, Experimental characterization and modeling of outdoor-to-indoor and indoor-to-indoor distributed channels. IEEE Trans. Vehicular Technol. 59(5), 2253–2265 (2010).View ArticleGoogle Scholar
- H Urkowitz, Energy detection of unknown deterministic signals. Proc. IEEE. 55(4), 523–531 (1967).View ArticleGoogle Scholar
- VI Kostylev, in
*Communications, 2002. ICC 2002. IEEE International Conference on*, 3. Energy detection of a signal with random amplitude (IEEE,New York, USA, 2002), pp. 1606–1610. doi:10.1109/ICC.2002.997120.Google Scholar - A Sonnenschein, PM Fishman, Radiometric detection of spread-spectrum signals in noise of uncertain power. IEEE Tran. Aerospace Electron. Syst. 28(3), 654–660 (1992). doi:10.1109/7.256287.View ArticleGoogle Scholar
- H Tang, in
*New frontiers in dynamic spectrum access networks, 2005. DySPAN 2005. 2005 first IEEE international symposium on*. Some physical layer issues of wide-band cognitive radio systems (IEEE,Baltimore, MD, USA, 2005), pp. 151–159. doi:10.1109/DYSPAN.2005.1542630.View ArticleGoogle Scholar - RA Dillard, Detectability of spread-spectrum signals. IEEE, Trans. Aerospace Electron. Syst.AES-15(4), 526–537 (1979). doi:10.1109/TAES.1979.308737.View ArticleGoogle Scholar
- Y Zeng, Y-C Liang, AT Hoang, ECY Peh, in
*Communications Workshops, 2009. ICC Workshops 2009. IEEE International Conference on*. Reliability of spectrum sensing under noise and interference uncertainty (IEEE,Dresden, Germany, 2009), pp. 1–5. doi:10.1109/ICCW.2009.5208033.Google Scholar - S Yarkan, H Arslan, in
*Vehicular technology conference, 2007. VTC-2007 Fall. 2007 IEEE 66th*. Binary time series approach to spectrum prediction for cognitive radio (IEEE,Baltimore, MD, USA,2007), pp. 1563–1567. doi:10.1109/VETECF.2007.332.Google Scholar - S Yarkan, BU Toreyin, KAQAE Cetin, An online adaptive cooperation scheme for spectrum sensing based on a second-order statistical method. IEEE Trans. Vehicular Technol. 61(2), 675–686 (2012).View ArticleGoogle Scholar
- S Geirhofer, L Tong, BM Sadler, Cognitive medium access: constraining interference based on experimental models. IEEE J. Selected Areas Commun. 26(1), 95–105 (2008).View ArticleGoogle Scholar
- CE Shannon, The mathematical theory of communication. Bell Syst. Techn. J. 27, 379–423623656 (1948).MATHMathSciNetView ArticleGoogle Scholar
- W Zhang, R Mallik, KB Letaief, IEEE Trans. Wireless Commun.8(12), 5761–5766 (2009). doi:10.1109/TWC.2009.12.081710.
- AJ Goldsmith, LJ Greenstein, GJ Foschini, Error statistics of real-time power measurements in cellular channels with multipath and shadowing. IEEE Trans. Vehicular Technol. 43(3.P.I), 439–446 (1994).View ArticleGoogle Scholar