2nd International ICST Conference on Wireless Internet

Research Article

Opportunistic spectrum access: challenges, architecture, protocols

  • @INPROCEEDINGS{10.1145/1234161.1234174,
        author={C. Santivanez and R.  Ramanathan and C. Partridge and R. Krishnan and M.  Condell and S. Polit},
        title={Opportunistic spectrum access: challenges, architecture, protocols},
        proceedings={2nd International ICST Conference on Wireless Internet},
        publisher={ACM},
        proceedings_a={WICON},
        year={2006},
        month={8},
        keywords={Dynamic spectrum access opportunistic spectrum access cognitive radios spectrum agility.},
        doi={10.1145/1234161.1234174}
    }
    
  • C. Santivanez
    R. Ramanathan
    C. Partridge
    R. Krishnan
    M. Condell
    S. Polit
    Year: 2006
    Opportunistic spectrum access: challenges, architecture, protocols
    WICON
    ACM
    DOI: 10.1145/1234161.1234174
C. Santivanez1,*, R. Ramanathan1,*, C. Partridge1,*, R. Krishnan1,*, M. Condell1,*, S. Polit1,*
  • 1: BBN Technologies, 10 Moulton Street, Cambridge, MA 02138
*Contact email: csantiva@bbn.com, ramanath@bbn.com, craig@bbn.com, krash@bbn.com, mcondell@bbn.com, spolit@bbn.com

Abstract

We consider the concept of opportunistic spectrum access (OSA) -- whereby radios identify unused portions of licensed spectrum, and utilize that spectrum without adverse impact on the primary licensees. OSA allows both dramatically higher spectrum utilization and near-zero deployment time, with an obvious and significant impact on both civilian and military communications. We discuss two broad classes of challenges to OSA: spectrum agility, which involves wideband sensing, opportunity identification, coordination and use; and policy agility, which enables regulatory policies to be applied dynamically using machine understandable policies. Focusing on spectrum agility, we present an architecture based on an OSA adaptation layer. We describe protocols for OSA, including a hole information protocol, idle channel selection and use, and an access protocol for the coordination channel. We present a simulation study, discuss insights, and show that even a simple protocol for opportunistic spectrum allocation can provide an order-of-magnitude performance improvement in throughput over a legacy system.