An Underlay Control Channel for Dynamic Spectrum Access: Packet Design, Implementation, Analysis, and Evaluation

Tarek Haddadin, Stephen Andrew Laraway, Arslan Majid, Taylor Sibbett, Daryl Leon Wasden, Brandon F. Lo, David Couch, Lloyd Landon, Hussein Moradi, Behrouz Farhang-Boroujeny

Research output: Contribution to conferencePaperpeer-review

Abstract

This paper presents the design and implementation of an underlay control channel (UCC) that has recently been proposed for application in cognitive radio networks. The UCC builds its waveform based on filter bank multicarrier spread spectrum (FB-MC-SS) signaling. The use of spread spectrum signaling allows one to transmit UCC at a level well below noise temperature and hence, minimize taxation on the primary users. Moreover, the use of filter banks allows us to avoid those portions of the spectrum that are in use by the primary nodes. Hence, the UCC interference to the primary network will be very close to none. We propose a specific packet for UCC and develop algorithms for packet detection, timing acquisition and tracking, as well as channel estimation and equalization. We also present analytical equations that quantify the probability of false detection (when background noise is picked as a UCC packet) and the probability of missed detection (when a packet exists, but the receiver fails to detect it). Moreover, we present the detail of an implementation of the proposed transceiver on a software radio platform and compare our theoretical results with those from experiments.
Original languageEnglish
StatePublished - Apr 1 2016
EventIEEE International Conference on Computer Communications (INFOCOM) - San Franscisco, United States
Duration: Apr 10 2016Apr 15 2016

Conference

ConferenceIEEE International Conference on Computer Communications (INFOCOM)
Country/TerritoryUnited States
CitySan Franscisco
Period04/10/1604/15/16

INL Publication Number

  • INL/CON-15-35958

Fingerprint

Dive into the research topics of 'An Underlay Control Channel for Dynamic Spectrum Access: Packet Design, Implementation, Analysis, and Evaluation'. Together they form a unique fingerprint.

Cite this