8th International Conference on Cognitive Radio Oriented Wireless Networks

Research Article

Interference control in cognitive wireless networks by tuning the carrier sensing threshold

Download530 downloads
  • @INPROCEEDINGS{10.4108/icst.crowncom.2013.252082,
        author={Byungjin Cho and Konstantinos Koufos and Riku J\aa{}ntti},
        title={Interference control in cognitive wireless networks by tuning the carrier sensing threshold},
        proceedings={8th International Conference on Cognitive Radio Oriented Wireless Networks},
        publisher={ICST},
        proceedings_a={CROWNCOM},
        year={2013},
        month={11},
        keywords={aggregate interference control carrier sensing threshold interference margin},
        doi={10.4108/icst.crowncom.2013.252082}
    }
    
  • Byungjin Cho
    Konstantinos Koufos
    Riku Jäntti
    Year: 2013
    Interference control in cognitive wireless networks by tuning the carrier sensing threshold
    CROWNCOM
    IEEE
    DOI: 10.4108/icst.crowncom.2013.252082
Byungjin Cho1,*, Konstantinos Koufos1, Riku Jäntti1
  • 1: Aalto university
*Contact email: byungjin.cho@aalto.fi

Abstract

The requirement for secondary spectrum usage is the control of secondary generated interference to the primary system. The generated interference from different types of secondary networks can be controlled by adjusting different parameters. The carrier sensing threshold can be used as a common parameter to control the density of active secondary users in wireless networks with contention control thereby enabling primary system protection. In this paper, we propose a method to set the carrier sensing threshold in secondary wireless networks with finite user density and finite deployment area. Based on the secondary user density, we first find the required distance separation among secondary transmitters so that the primary system service is protected. Given the distance separation, we set the carrier sensing threshold by computing the self-interference at a secondary user. Our method is illustrated for Matern type II and Matern type III point processes for modelling the locations of active secondary users due to the resemblance of these processes to CSMA/CA type of contention control.