Design and implementation of credit-based resource allocation protocol for DSA systems

R. Hamdi, M.B. Ghorbel, B. Hamdaoui, M. Guizani

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

Abstract

This paper designs, implements, and evaluates an efficient dynamic spectrum access (DSA) protocol for cognitive radio networks. The proposed protocol relies on the concept of credit value to allocate resources among users fairly. It basically associates a credit value with each user (or agent) which captures its trustworthiness level, and then allocates spectrum resources to users based on their credit values. It relies on CSMA to allow users to share the spectrum resources. The protocol is implemented and evaluated using ns3, and is shown to perform well in terms of ensuring fairness and overcoming selfish behaviors among users. Using simulations, it is shown that the credit-based technique yields high system achievable rewards under various networking scenarios. In addition, the simulations also study the impact of various different practical aspects on the protocol's performance.
Original languageEnglish
Title of host publication2014 International Conference on Computing, Management and Telecommunications, ComManTel 2014
PublisherIEEE Explore
ISBN (Electronic)978-1-4799-2903-0
DOIs
Publication statusPublished - 2014
Event2014 International Conference on Computing, Management and Telecommunications (ComManTel) - Da Nang, Vietnam, Da Nang, Viet Nam
Duration: 27 Apr 201429 Apr 2014

Conference

Conference2014 International Conference on Computing, Management and Telecommunications (ComManTel)
Country/TerritoryViet Nam
CityDa Nang
Period27/04/1429/04/14

Bibliographical note

ACKNOWLEDGMENT
This work was made possible by NPRP grant #NPRP 5−319−2–121 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Fingerprint

Dive into the research topics of 'Design and implementation of credit-based resource allocation protocol for DSA systems'. Together they form a unique fingerprint.

Cite this