WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Wirel. Commun. Mob. Comput. 2010; 10:451–466
Published online 7 August 2009 in Wiley InterScience
(www.interscience.wiley.com) DOI: 10.1002/wcm.776
Routing for cognitive radio networks consisting of
opportunistic links
Kwang-Cheng Chen1∗ , Bilge Kartal Cetin2 , Yu-Cheng Peng1 , Neeli Prasad2 , Jin Wang3 and
Songyoung Lee3
1
Department of Electrical Engineering, Graduate Institute of Communication Engineering, National Taiwan
University, Taipei, Taiwan 106
2
Department of Electronic Systems and CTiF, Aalborg University, Aalborg, Denmark
3
Department of Electrical & Computer Engineering, Kyun Hee University, Korea
Summary
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic
transmissions in CR transmitter–receiver link(s). However, CRs must form a cognitive radio network (CRN) so that
the messages can be forwarded from source to destination, on top of a number of opportunistic links from co-existing
multi-radio systems. Unfortunately, appropriate routing in CRN of coexisting multi-radio systems remains an open
problem. We explore the fundamental behaviors of CR links to conclude three major challenges, and thus decompose
general CRN into cognitive radio relay network (CRRN), CR uplink relay network, CR downlink relay network,
and tunneling (or core) network. Due to extremely dynamic nature of CR links, traditional routing to maintain
end-to-end routing table for ad hoc networks is not feasible. We locally build up one-step forward table at each CR
to proceed based on spectrum sensing to determine trend of paths from source to destination, while primary systems
(PSs) follow original ways to forward packets like tunneling. From simulations over ad hoc with infrastructure
network topology and random network topology, we demonstrate such simple routing concept known as CRN local
on-demand (CLOD) routing to be realistic at reasonable routing delay to route packets through. Copyright © 2009
John Wiley & Sons, Ltd.
KEY WORDS: cognitive radio; cognitive radio networks; routing; unidirectional link; cooperative relay networks;
opportunistic links
1. Introduction
Cognitive radio (CR) establishing opportunistic
CR-link transmission from a CR-transmitter (CR-Tx)
to CR-receiver (CR-Rx) during the spectrum hole of
∗
primary system (PS) [1], has been considered as a key
technology toward future wireless communications
to enhance spectrum utilization efficiency. The CR
concept can be generalized to cooperative co-existing
multi-radio systems if the terminal devices are
Correspondence to: Kwang-Cheng Chen, Graduate Institute of Communication Engineering and Department of Electrical
Engineering, National Taiwan University, Taipei, Taiwan 106.
†
E-mail: chenkc@cc.ee.ntu.edu.tw
Copyright © 2009 John Wiley & Sons, Ltd.
452
K.-C. CHEN ET AL.
Fig. 1. Cooperative relay from CR source to CR destination
in CRN.
equipped with software defined radio (SDR) capability, so that CRs and nodes in co-existing multi-radio
systems can form a general cognitive radio network
(CRN) via cooperative relay [2]. Figure 1 depicts
an example of such a cooperative relay scenario.
The network coding study of cognitive radio relay
networks (CRRNs) has shown that networking CRs
with the help of cooperative relay by PS nodes can
significantly improve network level throughput (than
just link level efficiency) by 130% under the constraint
of no interference to PS traffic [3], in average for
randomly generated network topology.
However, by networking CRs with nodes in
co-existing multi-radio systems, network layer functions of CRN emerge as open problems due to their
nature of heterogeneous wireless networks, although
they have been heavily investigated in wireless network
research. One core feature in network layer functions
is routing, as the focus in this paper. Close explorations
of CRN routing include routing algorithms in ad hoc
networks, in sensor networks, and in heterogeneous
(most likely wired) networks. However, routing in ad
hoc networks and routing in sensor networking differ
from routing in CRN because heterogeneous nature
and temporarily available link nature of CRN [4]. Most
heterogeneous network routing algorithms are applied
in wired networks and could not support wireless.
Let us consider mobile ad hoc networks (MANETs)
as a sort of homogeneous multi-hop packet radio
networks (mh-PRN). Routing of mh-PRN and therefore MANETs has been studied for years. MANET
is considered as a collection of mobile nodes communicating over wireless links without infrastructure
and MANET relies on multi-hop concepts to transport
the packets and each node acts like a router by itself,
Copyright © 2009 John Wiley & Sons, Ltd.
with common assumption of limited resource for
routing. Conventional routing protocols are based on
either link-state or distance vector algorithms aiming
at identifying optimal routes to every node in the
MANET. Topological changes often encountered in
MANET are reflected through propagation of periodic
updates. To update and to maintain the routing consumes tremendous bandwidth and is not practical. For
IP-based MANET, routing protocols can be generally
categorized as proactive and reactive, depending on
whether the protocol continuously updates the routes
or reacts on-demand. Proactive protocols, also known
as table-driven protocols, continuously determine the
network connectivity and already available routes
to forward a packet. Such kind of routing protocols
is obviously infeasible to frequently re-configurable
mobile networks like CRN, due to extreme dynamics
of links. Reactive protocols, also known as on-demand
protocols, invoke determination of routes only when it
is needed (i.e., on-demand). There are two well known
reactive protocols, dynamic source routing (DSR) [5]
and ad hoc on-demand distance vector (AODV) [6].
When a route is needed, reactive protocols conduct
some sort of global search such as flooding, at the price
of delay to determine a route, but reflecting the most
update network topology (i.e., availability of links).
Although routing algorithms in MANET has been
widely studied such as Reference [7], they are hard to
be applied in CRN routing due to difficulty in heterogeneous topology and opportunistic links in CRN, due
to route discovery delay and loss, inevitable delay of
packets forwarding into node-disjoint route(s), large
delay on link status confirmation, and not feasible to
maintain end-to-end information.
The rest of this paper is organized as follows.
Section 2 summarizes mathematical characterization
of CRN routing and the fundamental challenges.
Section 3 introduces trusted CRN to alleviate part
of these challenges. Section 4 proposes a localized
version of on-demand routing for opportunistic links.
Simulations results of static topology and random network topology to verify effectiveness of the proposed
routing are presented in Section 5. As conclusion in
Section 6, routing over opportunistic links to network
CRs is indeed feasible.
2. Mathematical Characterization of
Routing in Cognitive Radio Networks
Prior to routing of any CRN packets/traffic, the very
first function of CRN network layer is association,
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
which means a CRN to successfully access the general
CRN (including PS). In principle, after sensing possible
transmission opportunities (i.e., spectrum holes), a CR
must complete association then execute dynamic spectrum access (DSA) through physical layer transmission
and medium access control, to send packet(s) from CR
transmitter to CR receiver. Here, the CR receiver can
be a CR or a node in PS. In addition to regular association (or registration) to a network/system (typically
PS), the challenge would be quick association for a CR
to another node in CRN (either another CR or a node
in PS or multi-radio system) under very short available time window, which would be realized via trusted
mechanism as another part of the paper.
The primary difference and thus challenges between
routing of CRN and routing of wireless ad hoc
(or sensor) networks would be summarized as follows:
(a) Link Availability: CRN links are available under
idle duration of primary system(s) that DSA can
effectively fetch such opportunities, after successful spectrum sensing. Consequently, links in CRN,
especially those involving CRs as transmitters
and/or receivers, are stochastically available in general, which gives CRN topology to be random even
under all nodes being static, not to mention mobile
nature of CRN. Although wireless ad hoc networks
and sensor networks have similar phenomenon,
links in CRN can vary much more rapidly as link
available duration is only fraction of inter-arrival
time for traffic and control signaling packets. That
is, link available period in CRN is in the range of
milliseconds, instead of seconds, minutes, hours,
and even days, like its wireless networking counterparts.
(b) Unidirectional Links: Typical wireless networks
have bi-directional links, as radio communication
is half-duplex. In typical wireless ad hoc and sensor
networks, unidirectional links might be possible
due to the asymmetric transmission power and/or
different interference levels at receivers. We may
treat unidirectional links to be rare in wireless networking. However, in CRN, unidirectional links
are more likely due to the fact that a CR node
may just have an opportunity to transmit in one
time duration and there is no warrantee to allow
the opportunity for transmission from the other
direction. Another possible situation is that a CR
node wants to leverage an existing PS to (cooperatively) relay packets, however, the other direction
might not be permitted, and vice versa. Generally speaking, a link involving a CR node is likely
Copyright © 2009 John Wiley & Sons, Ltd.
453
uni-directional. It distinguishes CRN from other
wireless networks, especially for network layer
functions.
(c) Heterogeneous Wireless Networks: Different from
typical wireless ad hoc or sensor networks, CRN
is generally formed by heterogeneous wireless networks (co-existing PSs and CR nodes to form ad
hoc networks). Inter-system handover is usually
required for routing in such heterogeneous wireless
networks. However, CR links might be available for
just an extremely short duration and its successful networking lies in cooperative relaying among
such heterogeneous wireless networks. If we further consider network security, to enable CRN for
spectrum efficiency of wireless networks at the
price of losing security might be questionable, as
there is not enough time for a CR node to get secure
certificate within the short opportunistic window. A
compromise to operate among heterogeneous wireless networks and CR nodes for CRN routing is
obviously needed.
To ensure a CRN link to be available for network
layer functioning, we may go back to hardware operation. Assuming that a genie observes CRN operation
for both PS and CR, CR must utilize the spectrum
hole window to complete transmission of packet(s).
Suppose such a spectrum window period is denoted by
Twindow . It is clear that
Twindow ≥ Tsense + TCR−Transmission + Tramp−up
+ Tramp−down
(1)
where Tsense stands for minimum sensing duration to
ensure CR transmission opportunity and acquisition of
related communication parameters; TCR−Transmission is
the transmission period for CR packets; Tramp−up/down
means the ramping (up or down) period for transmission. Equation (1) ignores propagation delay and
processing delay at the transmitter–receiver pair, which
can be considered as a portion of ramp-up/down
duration. The maximum duration of spectrum hole
(availability) can be considered as the time duration
for beacon signals.
It is obvious that we have to mathematically model
the link availability in CRN. Since the link is either
available for opportunistic transmission(s) or not available, considering the timings for the change of link
availability, we can adopt an embedded continuoustime Markov chain and the rates specifying this
continuous-time Markov chain can be obtained from
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
454
K.-C. CHEN ET AL.
Fig. 2. Link availability of CRN: (a) CR transmission opportunity window, (b) continuous-time Markov chain model for link
availability, and (c) embedded discrete-time Markov chain.
the statistics of spectrum measurement [4]. Figure 2(b)
depicts continuous-time Markov chain or general
cases, while Figure 2(c) illustrates such 2-state Markov
chain with fixed timing (say, PS’s beacon signal time
separation), where state ‘A’ stands for ‘link available’
and state ‘N’ stands for ‘link not available’. A link
between node X and node Y in CRN can define two
unidirectional links X → Y and Y → X. Via simple 2state embedded Markov chain model, it allows general
study on natures of network layer functions for CRN,
and thus effective design, under challenges (A) and
(B). Routing of MANET with uni-directional links was
explored [8], however, it is still open for routing with
opportunistic links as Figure 2. Recent research considering homogeneous ad hoc networks, start-networks,
or mesh networks, has modeled spectrum utilization of
CRN to help routing in CRN [9–13]. However, they
usually do not treat the stochastic and dynamic nature
of CR links into routing or spectrum utilization/sharing.
One of the recent major efforts to deal with stochastic nature in wireless ad hoc networks is opportunistic
routing [14]. Its subsequent research [15–17] dealt with
opportunistic routing in multi-hop ad hoc networks
through negotiation with distributed slotted MAC to
ensure highest priority receiver for higher throughput in lossy wireless environments pretty much like
cooperative communication to create diversity order to
against severe fading. The source node determines the
prioritized candidate list prior to broadcasting packets.
Copyright © 2009 John Wiley & Sons, Ltd.
The nodes relaying a packet are determined after the
packet being transmitted, which allows source node to
opportunistically take advantage of inherently random
outcomes. The destination nodes send the ACK back to
the source node after successfully received the packet.
The well known ExOR algorithm has been presented
in References [14,18]. The key feature of opportunistic
routing is to take advantage of numerous but unreliable
wireless links into a probabilistic manner with two key
issues in design: to generate the prioritized candidate
list and to avoid duplicated packets at the destination. Opportunistic routing cannot be directly applied in
CRN under obvious reasons, no warrantee of feedback
due to asymmetric nature of links in CRN, and ‘opportunistic’ nature (link availability) in links of CRN.
Consequently, routing in CRN, especially with opportunistic links, is still open to research and different from
opportunistic routing, while Reference [18] presents a
good approach to combine on-demand and opportunistic routing and thus to initiate idea in Section 4.
3. Trusted Cognitive Radio
Networking (TCRN)
To mathematically tackle challenge (C), we may introduce a trust mechanism in addition to typical network
security schemes. Please note an interesting observation that the security in CRN shall lie on the ground
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
of end-to-end nodes, and intermediate nodes in CRN
(either CRs and/or nodes in PSs) can simply forward the CR traffic packets (i.e., cooperative relay
inside CRN). Such cooperative relay of packets can be
facilitated as amplify-and-forward (AF) and decodeand-forward (DF), while intermediate nodes in CRN
have almost limited security treats by relaying packets.
Compress-and-forward (CF) cooperative networking
might jeopardize the security of intermediate nodes due
to mixing relay packets and own traffic together. In the
following, the cooperative relay suggests either AF or
DF, but not CF.
We can now classify a node in CRN and thus traffic/control packets from such node into three categories
during the operation of CRN:
(i) Secure: The node has executed security check that
is good throughout entire heterogeneous wireless
networks, such as through public key infrastructure (PKI) check. The packets and messages from
this node can go all the way in CRN as secure
clearance. A node classified as ‘secure’ can be a
CR and a node in a co-existing PS.
(ii) Trusted: This level of security for ‘trusted’ is not as
effective as ‘secure’. As CR is generally not possible to complete security check of several rounds
handshaking protocol within the timing window of
an available link (i.e., CR to CR or CR to PS node),
we create a security level of trusted that enables
packet transmission over available opportunistic
unidirectional links. In case a CR source node
that generates packet(s) for opportunistic transmission, the CR receiver node (either a CR or a
node in PS) recognizing such CR source node as
‘trusted’ can relay packets toward CR sink node
via appropriate routing mechanism. Please note
that CR source node and CR sink node shall complete their end-to-end security check in advance
by all means. A CR receiving node should always
maintain a table of trusted/secure nodes around,
based on security check and historical update. In
other words, any node in CR only allows reception
of packets from its secure and trusted neighboring
node. Such a table is localized and is not large
in number of neighboring nodes. The methodology of update trusted-node table is described in
Reference [19].
(iii) Lure: A CR node is neither secure nor trusted by
its target-receiving node, and it is classified as
‘lure’. The major reason to be rated as lure shall
be from bad historical actions, such as spreading
virus, wasting bandwidth in a wireless network,
Copyright © 2009 John Wiley & Sons, Ltd.
455
attacking wireless network, selfish behaviors, etc.
Such a lure node actually loses its CR capability
in practice of CRN operation.
The purpose of introduction of trust mechanism is
clear, that is, to create a homogeneous networking
functioning environment for heterogeneous wireless
networks, and thus to allow cooperative relay of packets in spite of opportunistic and extremely dynamic link
availability of CRN. In other words, we shall encourage nodes from all kinds of wireless networks to act as
nodes in CRN by providing some incentive programs,
so that these nodes can effective relay packets from
trusted CR source nodes, to form a large scale of homogeneous multi-hop ad hoc network under the same trust
level across different wireless networks.
Let us summarize some critical issues of CRN network layer operation in the following:
• CRN consists of CRs and nodes from various
co-existing PSs, which may operate using different
communication parameters, in different frequency
bands, and in different geographical locations. SDR
inside a CR is capable of reconfigurable realization
for multiple systems operating at multiple frequency
bands.
• CR source node (initiation point of traffic) and CR
destination (termination point of traffic) node should
conduct their own end-to-end security beyond trust
level by employing CRN nodes to complete bidirectional verification.
• CRN nodes are assumed to conduct only AF or DF
cooperative relaying, under trust domain of CRN.
• Nodes in secure domain may reject relays from
trusted nodes, which suggests that such links are not
available in trusted multi-hop packet radio network
routing. Similarly, nodes in trusted domain (i.e.,
typical nodes in CRN) may reject connection
requests from lure nodes.
• Any packet from CR source node, once getting into
a PS or infrastructure, the packet follows operation
of the PS or infrastructure, to enjoy the benefits
from existing systems and networks. For example,
a CR source node wishes to relay its packets through
near-by WiFi to access a web site of Internet, where
near-by means radio accessibility as a kind of localization. As long as the packets from CR source node
are allowed to access point of WiFi, these packets
transport as WiFi packets. A CR terminal device
is therefore capable of conversion/re-configurability
among multiple physical layer transmissions and
multiple medium access control scheme.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
456
K.-C. CHEN ET AL.
The general CRN operation can therefore be summarized as the following figure. We have an infrastructure
network as the core that might be just Internet, and
several radio access networks (RAN) that provides
various ways to access core infrastructure network.
Mobile stations (MS) are associated with certain RAN
technology. Each CR is capable of configuring itself
into appropriate radio system to transport packets for
communication/networking purpose. RAN, MS, and
infrastructure can be just any specific PS, and there are
a few possible PSs co-exist in the figure. A CR may also
be a MS of a PS. Bidirectional links have double arrows,
and all links in PSs shall be bidirectional. Opportunistic links owing to CR’s DSA and certain ad hoc links
have single arrow in the figure. From CR source node,
there are three different cooperative paths to transport
the packets. There are also three cooperative paths to
CR sink as the final destination. Please note that outgoing path 3 and incoming path 3 generally represent
CRRN described earlier.
As we can clearly observe from the figure, CRN consists of CRs and PSs. CR dynamic spectrum access
(DSA) at physical layer transmission and medium
access control works between CR transmission and CR
receiver in a CR (or DSA) link. CRN routing establishes
on top of these CR links and bidirectional links in PSs.
Let us summary again:
• CR transmitter and CR receiver form a CR link, typically using DSA. CR receiver may be a CR or a node
in PS.
• CR source node and CR destination node form a
virtual link like a session in CRN. CR destination
node can be a CR or any node in PS. In case CR
destination node is a CR, we call as CR sink.
4. Routing of Dynamic and
Unidirectional CR Links in CRN
To conduct CRN routing over unidirectional CR links
and usually bidirectional links in PS (mobile stations
in PS can form ad hoc with possible unidirectional
links) as earlier description, we can extend on-demand
routing protocols of MANET for CRN routing by
(i) Each CR link is modeled by a 2-state Markov
chain, independent with other CR links.
(ii) Without knowing specific PS, all links in PS are
assumed to be bidirectional and can support our
routing protocol. As a matter of fact, the entire
behavior inside a PS can be treated as a ‘link’ by
Copyright © 2009 John Wiley & Sons, Ltd.
queuing model of this PS if we just follow the PS
operation.
(iii) Typical MANET routing algorithms are trying
to isolate unidirectional links [8], as they are
likely to be very localized. However, unidirectional links are inevitable in CRN. Fortunately, we
may assume the depth (i.e., number of hops) from
CR to PS to be within hops, due to their roles in
wireless access to infrastructure or purely ad hoc.
(iv) The fact of CR links to be unidirectional is
usually true at one instant. At next instant, this
CR link might be still unidirectional but reverse
its direction depending on network situations.
By introducing trust mechanism, CRN would
pretty much like an ad hoc network with ‘temporarily’ unidirectional links.
For routing in CRN, we care one major purpose of
CRN, to reduce latency of traffic due to more cooperative paths, especially for CR source not possible to
transport packets to CR destination node without CRN
technology. In the mean time, there are a few issues
that we want to make sure in CRN routing.
• Since CR shall not interfere with PS(s), we should
avoid the global or periodic advertisement of any
CR node, though such advertisement is common in
ad hoc network routing.
• For a CR link that is the link with CR as transmitter,
we shall avoid acknowledgement over the link, as
there might not be enough opportunistic time window to execute this acknowledgement.
• For the same reasons as above two points, we shall
not use hello packet in common ad hoc network
routing.
• CRN routing must be able to detect and to minimize possibility of any loop or any dead-end, where
dead-end means ‘no way to forward the packet further within a reasonable amount of time duration’;
loop means ‘the packet that was forwarded to another
route will come back in a repeated way’.
We assume localized connectivity to be concerned in
CRN routing, which is pretty much true for CRN operation and routing as the CR links are only opportunistic.
Under highly dynamic nature, it is likely in vain by
trying large-scale or global optimization. Our strategy
is to forward the packet over an effective opportunistic
CR link, toward appropriate direction/trend. It exactly
matches the philosophy of reactive (or on-demand)
routing in ad hoc networks [20].
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
Consequently, taken the spirit of AODV routing,
we create CRN local on-demand (CLOD) routing as
follows. Each CR node executes routing only when
there is a need (on-demand). The routing message
include the following routing overhead information:
CR destination node IP.
CR source node IP.
Message ID (i.e., msg id).
CR relay node IP (cr relay ip).
CR transmitter IP (cr tx ip) and its radio-type
(cr tx type) for the received packet/frame.
• CR receiver IP (cr rx ip) and its radio-type
(cr rx type) for the forwarding packet/frame.
• Sequence number seq count associated with the path
(cr tx ip, cr relay ip, cr rx ip), starting from 0, and
add 1 for each same path.
• Time counter at CR relay node, time counter, starting
from 0 and adding 1 for a new time slot duration.
•
•
•
•
•
In case a new CR node or a new mobile station of
PS gets into scenario, we may not immediately be able
to acquire its IP address, and we then can use an ID to
serve the purpose of table. Each node maintains localized table(s) to connect possible neighboring nodes,
rather than global or end-to-end tables. The table at
each node is used when there is a demand for routing.
CLOD routing consists of three phases in operation:
sensing phase, path discovery phase, and table update
phase.
4.1. Sensing Phase
The CR node listens to the radio environments, that is,
spectrum sensing of multiple co-existing systems (and
even possible different frequency bands), to update
its forward-path table. The forward-path table records
information regarding each potential CR receiver, history, the estimate of its trust on the CR node, and
communication parameters to adjust SDR. Each potential CR receiver is identified by IP address that could be
acquired from its past transmission, or by ID designated
by the CR node. History can be a simple flag to indicate
the potential CR receiver to be trustworthy or not, based
on history and learning process. Finally, communication system parameters can be obtained from spectrum
sensing to adjust SDR.
4.2. Path Discovery Phase
Once the CR node originates a packet/frame to
destination or receives a packet/frame for relay, it
Copyright © 2009 John Wiley & Sons, Ltd.
457
checks backward-path table for any violation. In case
no violation from the checking, the CR node selects
another CR node from forward-path table to relay the
packet/frame. The selection is based on availability
of CR links and forward-path table. Of course, those
links to PS have the highest priority. On the other hand,
in case violation happens, the CR relay node seeks
opportunity to ‘negative-acknowledge’ CR transmitter
based on backward-path table. CR transmitter node
shall try to re-route the packet to another CR relay
node if possible, or further back if no route available.
4.3. Table Update Phase
In addition to link selection to complete routing, a
backward-path route associated with this relay has
to update as a part of backward-path table. Each
backward-path route consists of parameters msg id,
cr rx ip, cr rx type, cr tx ip, cr tx type, and seq count.
Both cr rx type and cr tx type are to specify the
operation of co-existing multi-radio systems (or overlay wireless systems/networks) in CRN (Figure 4).
It is obvious that the parameter history in forwardpath table plays a key role in routing. Backward-path
table is useful to prohibit routing disasters from loops
and dead-ends. The violation is defined as detection of
either loop existence or dead-end existence. Seq count
plays its role to determine the existence of a loop. Timeout for not possible to relay a packet is issued to avoid
dead-end, which is a useful information to update the
backward-path table.
For the case that negative-acknowledgement (nor
the positive-acknowledgement from destination) cannot trace back all the way to CR source node, likely
due to some permanent unidirectional links, end-toend timeout can terminate the routing and re-start a
new round of routing.
5. Control of CRN
5.1.
Flow Control of CRN
Flow control can happen in two types in CRN: First of
all, end-to-end flow control between CR source node
and CR destination node, while a typical credit-based
flow control such as leaky-bucket can does the work.
However, for completely successful operation of CRN
on-demand routing protocols, such as CRN-ODV or
CRN-DSR, we need another function, flow control in
CRN network layer. Different from conventional firsttype flow control in computer networks, flow control
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
458
K.-C. CHEN ET AL.
Fig. 3. Routing packets in cognitive radio network.
in CRN is primarily for damage control purpose. Since
it is not possible for us to ensure neither dead-end nor
loop not happening in AODV, we have to detect these
two cases and to stop CR link relaying packets under
these scenarios, such that network bandwidth would
not waste. To achieve such a goal, loop detection by
checking sequence number and dead-end detection by
‘maximum resend attempt’ parameter would be needed
and associated with routing.
Furthermore, we may observe that the entire CRN of
CRs and PSs as Figure 3 is actually formed by several
segments as Figure 5, while the packets are routed from
CR source node to CR destination node (or CR sink),
through these segments:
• Uplink CRN.
• Co-existing Multi-Radio PSs usually with infrastructure or core network (such as Internet), functioning
like a CRN tunneling in backbone by inspiration
from Reference [21].
• Downlink CRN.
• CRRN (described in Reference [3]).
CRRN can be considered as a special kind of CRN
consisting of pure CRs, with the only purpose to relay
packets.
Copyright © 2009 John Wiley & Sons, Ltd.
The traffic flow can be categorized as
• CR source node → Uplink CRN → PS and infrastructure → downlink CRN → CR destination node.
• CR source node → CRRN → CR destination node.
Routing in CRN thus has another hidden agenda
based on above segmentation or decomposition. For
uplink CRN, the routing shall try to reach the PS via
opportunistic CR links. For example, in Figure 5, when
CR relay node is in the process to select forwarding
path, it has tendency to select the node ‘closer’ to PS,
which is the node in RAN 1. On the contrary, the routing shall try to leave the PS via opportunistic CR links
for downlink CRN. When a CR node in path discovery phase based on forward-path table, parameter (or
field more precisely) history thus plays a key role to
provide such information in node selection. In other
words, routing in uplink CRN and downlink CRN is
not totally stochastic, and there shall be a drift along the
direction inside a dynamic topology CRN. It reminds us
the movement of ants, and literatures about ant routing
provide more opportunities to develop effective update
of parameter/field history in the Table [22,23].
We also note that CRN routing shall favor a way
to forward packets in an effective way for overlay/coexisting multi-radio systems, which suggests longer
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
459
Fig. 4. CLOD routing.
range PS to be favored in relaying packets for a CR
relay node as long as among possible choices, and
thus another potential enhancement of CRN routing
efficiency.
5.2.
End-to-End Error Control in CRN
Conventional concept of packet error control lies in
physical layer and data link layer. However, error
Fig. 5. Segmentation or decomposition of CRN.
Copyright © 2009 John Wiley & Sons, Ltd.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
460
K.-C. CHEN ET AL.
control shall be useful to support CRN functions. Please
recall that links in CRN are dynamically available and
it might not be feasible to conduct ARQ between CR
transmitter and CR receiver in a CRN link. Furthermore, CRN routing just try the best to forward the packets and the CR sink might receive multiple copies of one
transmitted packet, while these copies of one packet
might not be correct as no error protection other than
forward error control (FEC) available. Conventional
network layer requires extremely low packet error rate,
which is warranted by physical layer FEC, CRC check,
and data link control. For CRN, data link control may
or may not exist, and error control between CR source
node and sink node is needed, while re-transmissions
shall be minimized due to much higher price than common (wireless) networks. We can immediately borrow
the idea from hybrid automatic request (HARQ) to conduct CRN network layer error control, to significantly
reduce the error control traffic between CR source node
and CR destination node [24]. As Figure 3, for the purpose of reliable packet transportation in wireless networks, CR destination node may receive three (or more)
copies of a packet from CR source node, which suggests application of HARQ to create more path diversity and to enhance error control capability. The challenge for HARQ in CRN lies in the uncertain number
of copies for a packet to be received at CR destination
node and in the uncertain arrival times of these copies.
Last but not the least, such end-to-end control shall be
conducted based on CR ‘session’, rather than CR ‘link’.
6. Numerical Results
General CRN routing is an extremely complicated
mechanism. However, we can design experiments to
verify our proposed routing under the opportunistic
links, which would be the first closer-to-realistic exploration in literatures for CRN routing.
6.1. Independent Opportunistic Links
We start explorations by assuming each opportunistic
link in CRN is independently available under a given
link-availability probability. The first experiment is to
demonstrate feasibility of CRN, as the generalization of
cooperative relay among CRs and nodes in PS, capable
of forwarding packets from CR-source node to CRdestination node.
The objective of this simulation is to compute
routing delay, when routing path is establishing based
on available channel. The routing delay is defined as
delay caused by routing through these dynamically
opportunistic links, without considering other factors
such as transmission delay, processing delay, etc. Our
simulation follows the topology as Figure 6, with the
following assumptions:
• There is one CR source and one CR destination. Link
direction is like shown in the figure above. Arrows
shows the direction of the link. Although there are
unidirectional link in the scenario, in this stage of
Fig. 6. Topology of CRN in simulations.
Copyright © 2009 John Wiley & Sons, Ltd.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
461
Fig. 7. Distribution of routing delay caused by channel connectivity (available to CR opportunistic transmission in terms of
probability), while x-axis: routing delay and y-axis: percentage of packets.
•
•
•
•
the simulation, they do not have special effect or
function.
Every node has a routing table (forward path table) to
summarize potentially available links with receiving
nodes. We assume spectrum sensing capability.
So far there is no backward path table, because no
acknowledgement is sending by receiver.
When data start to transmitting, node checks the
available channel in order. At this stage of the work,
none of the channels has priorities. For example, in
Figure 5, source node 31 has six channels and in
every iteration it always starting to scan with 31a
and next 31b, 31c, . . . , and so on.
Every channel has Markov based availability function. We properly select the seed to generate random
numbers to ensure statistical meaning.
Copyright © 2009 John Wiley & Sons, Ltd.
• Channel propagation delay, or delay in the PSs is
neglected, computing delay is the delay only caused
by routing. In one slot a node can scan only one
channel if it is available, delay counter will not be
increased otherwise it will be increased.
• During the packet transmission, zero delay means
all channels which is checked first were available,
so nodes do not have to check the second channel to
forward the packet.
• Simulations repeat 105 times, that is, 105 packets are
sent.
Figures 7–10 summarizes the simulation of CRN
example shown in Figure 6. Connectivity means the
probability of a link available to CR transmission.
According to wide range of study, the spectrum of
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
462
K.-C. CHEN ET AL.
Fig. 8. Throughput versus maximum resend attempt.
Fig. 9. Average delay versus maximum resend attempt.
PSs may be used with 10–20% duty cycle, and thus 90
and 80% connectivity may have more reference value.
As we can clearly see that our proposed routing can
work under the dynamically available uni-directional
links, with tolerable routing delay, in a well-behaved
but general network topology case. Since we define
maximum resent attempt as the life time (or duration)
for a node to hold the packet without successful relaying out. Under four different pre-selected values for
maximum resent attempt, the distribution (percentage
of packets in simulations) of routing delay is illustrated
in Figure 7.
From above simulations, we may have some interesting and valuable observations, where throughput
means network routing throughput (may not be 1 due
to opportunistic nature) and delay means routing delay
excluding transmission delay:
• Under relatively light traffic load that is suggested by
the high availability (or probability) of link connection, the routing delay (i.e., delay caused by routing
in opportunistic link availability) has smooth distribution as expected to demonstrate the effective
routing capability, as Reference [3] implies CRN
supporting significant network level throughput gain
at lighter traffic load in PS. However, for low link
availability, routing in CRN would be in troubles.
• At reasonable link availability, throughput can
approach 1 to warrantee successful delivery of packets over opportunistic links as Figure 8.
• High link availability (i.e., connectivity ratio) indeed
suggests good routing performance, as long as better than 50% or so. When the PS is heavily loaded
to result in low link availability, CR packets cannot
be stochastically delivered even increasing MRA as
Figure 8.
• Maximum resend-attempt (MRA) can also help networking throughput at the price of routing delay
(i.e., delay caused by routing), with saturation phenomenon suggesting that holding longer at a node
cannot help network efficiency. It also implies that
end-to-end control at CR-session level makes sense
by certain time-out mechanism.
6.2. Random Network Topology
Fig. 10. Average normalized delay versus maximum resend
attempt (normalization with respect to the maximum waiting
time for sending (24 slot—round trip slot).
Copyright © 2009 John Wiley & Sons, Ltd.
In the following, we will consider a more dynamic network topology to verify our idea in the proposed CRN
routing. Recall decomposition of CRN in Figure 5,
the most general path can be treated as CR-Source
to CR(s) to PS-tunnel to CR(s) to CR-Destination.
PS trunk here plays a role like tunnelling with just
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
463
Fig. 11. Delay performance of linear topology (P = PAN = PNN ).
propagation delay (assuming a unit-time slot for the
time being). For cognitive radio relay networking
(CRRN), we can simply take out the PS-tunnelling.
For each hop, we also assume the packet transmission
delay to be a unit-time slot. Now, the problem is to
calculate the accumulated delay (latency) from CR
source to CR destination under unidirectional link (the
link might be unavailable and the latency increases).
First of all, we will study the one-dimensional case
(linear case) where the state transition of CR node can
be modeled as Markov Chain as Figure 2, withPAA +
PAN = 1 andPNA + PNN = 1. Since there is not guaranteed end-to-end route between CR source and CR
destination under unidirectional link, where the network topology might change very quickly, each packet
will be sent directly from one node to another.
Each node has two states, namely available (state A)
and unavailable (State N). If a packet arrives at certain
node, it will wait for one or more time slot until the
node state value turns to be 1. For example, if the previous state value is 0 which means the current link is not
available, the packet will wait for one more time slot.
After that, if the state value is changed to 1 with probability PNA , the packet will be transmitted to the next
hop according to the current node’s route table. If the
state value is still 0 with probability PNN , the packet has
to wait for the next time slot. Finally, the packet will
be discarded if the maximum resend-attempt (MRA)
exceeds.
Now, let us suppose there are N hops on a route
path from source to destination. Each of the nodes is
Copyright © 2009 John Wiley & Sons, Ltd.
unidirectional with the Markov chain state transmission. If the link is available, each hop is equivalent to
1 time slot, or else the one hop latency will be larger
than 1, which depends on Markov chain probability.
Intuitively, we can see that the latency from source
to destination is determined by the number of nodes
on the route, the Markov chain probability as well as
the MRA. Let the initial states of N hops on the route
be {1 0 0 0 1. . . 0} and PAA = PNA ∈ [0, 1]. Taking
N = 4, the initial state is {0 1 0 1}, PAA = PNA = 0.1
as an example shown below: CR-Source to CR to
CR to CR to CR-Destination. The end-to-end source
to destination packet delay is 4.5, according to the
simulation. From Figure 11 we can observe as follows:
• the average packet delay increase with PAN (and/or
PNN );
• the growth of delay is faster than the growth of number of node (or PAN /PNN );
• for a given N and PAN /PNN as well as MRA, we
can estimate the average packet delay (whether the
packet can arrive or it will be discarded).
Next, we shall look into the general network topology
in two-dimension scenario as Figure 12. Our simulations assume 50 randomly deployed CR nodes in
200 (unit length) by 200 (unit length) rectangular.
Each CR has communication range of 50 m. That is,
N = 50, [X, Y] = 200 × 200 (unit length)2 , R = 50 (unit
length). Each of the 50 CRs wishes to transmit data
packet to CR Destination (CR Sink) which is located at
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
464
K.-C. CHEN ET AL.
Fig. 13. Success rate of packet delivery vs. p given 8-hops
routing.
Fig. 12. Random network topology in 2D.
Table I. End-to-end latency of N-hop when P = PAN = PNN = 0.1
N
2
3
4
5
6
7
8
9
10
Latency (unit time) 2.2 3.3 4.5 5.6 6.7 7.9 8.9 10.2 11
(100, 225) outside. We temporarily do not consider
MS/PS tunneling and it is a pure CRN. Later on, the
network performance can be improved with the introduction of MS/PS tunneling.
Based on our routing algorithm, we can build the
corresponding route table finally to CR Destination via
greedy algorithm. Suppose there is a source CR node
4 having data to send to CR destination node. It takes
the route {4 → 25 → 8 → 14 → 38 → 17}. Considering the unidirectional link with Markov chain property,
we calculate the accumulated end-to-end packet delay
based on the one-dimensional experience we studied
above. If we let p = 0.1 and MRA = 10, we can get an
averaged packet delay of 6.7 according to Table I. If
p = 0.4, the final end-to-end delay is 9.9 which is less
than MRA. If p = 0.5 the packet from node 4 will be
discarded since the final delay is larger than MRA. In
this case, the packet cannot be successfully transmitted
to CR sink.
It is interesting to observe that the network topology
(density) plays a very important role on the packet
transmission delay. When the CR increases its transmission radius, the network density gets higher and
it takes less latency to reach CR sink (or destination).
On the other hand, the interference as well as energy
consumption would also increase. It is a kind of
tradeoff between latency and energy consumption. For
the same network topology, if R = 80 (unit-length), the
Copyright © 2009 John Wiley & Sons, Ltd.
corresponding route of node 4 is {4 → 18 → 6} and
the corresponding end-to-end packet delay becomes
smaller. Finally, if we replace some of the CR nodes
with MS/PS, the end-to-end packet delay will be much
shortened since there is a backbone (trunk or tunneling) network between CR source and CR destination
(or sink). Taking the same network topology as an
example when R = 50 (unit-length), if we replace the
route from node 8 to node 38 with a trunk network,
the route from node 4 to CR sink is as follows, with
final average end-to-end packet delay 3.3 + 1 = 4.3
when p = 0.1. Figure 13 presents a non-surprising
numerical result, being consistent with observations
of fixed topology.
7. Conclusions
With CR’s advantages in spectrum utilization, networking CRs is critical to practical applications. While little
attention has been paid to CRN routing up to this
moment, we summarized key features of CR links,
developed decomposition methodology for CRN, and
then proposed CLOD routing protocol for CRN with
on-demand local table at each CRN node. Our simulations verify our proposed CRN routing concepts indeed
working and reasonably effective in well-structured
cooperative relay network topology with and without
infrastructure. Proper routing of CRN can significantly
improve network level efficiency given fixed spectrum,
as long as PS traffic load is not high, which proves networking CR nodes to be a useful concept. Of course,
there requires more efforts to facilitate details of CRN
routing such as learning routing parameters [25], while
this paper lights initially successful effort toward the
final realization of CRN.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
ROUTING FOR CRN
Acknowledgements
This research was supported in part by the National
Science Council under the contract NSC-95-2923-I002-001-MY2.
References
1. Mitola J, III. Cognitive Radio Architecture. Wiley-Interscience:
2000.
2. Chen KC, Peng YJ, Prasad N, Liang YC, Sun S. ‘Cognitive
radio network architecture—part I: general structure’ and ‘cognitive radio network architecture—part II: trusted network layer
structure’, (ACM) ICUMIC, Seoul, Korea, 2008.
3. Huang C-H, Lai Y-C, Chen K-C. Network capacity of cognitive radio relay networks. Physical Communications 2008; 1(2):
112–120.
4. Geirhofer S, Tong L, Sadler BM. Dynamic spectrum access in
the time domain: modeling and exploiting white space. IEEE
Communications Magazine 2007; 45: 66–72.
5. Johnson DB, Maltz DA. Dynamic source routing in ad hoc
wireless networks. In Mobile Computing, Chapter 5, Imielinski
T, Korth H (eds). Kluwer Academic Publishers: Boston, 1996;
153–181.
6. Perkins CE, Royer EM. Ad-hoc on-demand distance vector
routing, Proceedings of the second IEEE Workshop on Mobile
Computing Systems and Applications, 1999.
7. Boukerche A. Performance evaluation of routing protocols for
ad hoc networks. Mobile Networks and Applications 2004; 9:
333–342.
8. Prakash R. A routing algorithm for wireless ad hoc networks
with unidirectional links. Wireless Networks 2001; 7: 617–625.
9. Thomas Hou Y, Shi Y, Sherali HD. Spectrum sharing for multihop networking with cognitive radios. IEEE Journal on Selected
Areas in Communications 2008; 26(1): 146–154.
10. Shi Y, Thomas Hou Y. A distributed algorithm for multi-hop
cognitive radio networks. IEEE INFOCOM 2008; 1292–1300.
11. Yang K, Wang X. Cross-layer network planning for multi-radio
multi-channel cognitive wireless networks. IEEE Transactions
on Communications 2008; 56(10): 1705–1714.
12. Chowdhury KR, Akyildiz IF. Cognitive wireless mesh networks
with dynamic spectrum access. IEEE Journal on Selected Areas
in Communications 2008; 26(1): 168–181.
13. Pefkianakis I, Wong SHY, Lu S. SAMER: spectrum aware mesh
routing in cognitive radio networks. DySPAN, 2008.
14. Biswas S, Morris R. Opportunistic routing in multi-hop wireless
networks. ACM SIGCOMM Computer Communication Review
2004; 34(1): 69–74.
15. Biswas S, Morris R. ExOR: opportunistic multi-hop routing for
wireless networks. ACM SIGCOMM Computer Communication
Review 2005; 35(4): 133–144.
16. DE Couto DSJ, Aguayo D, Bicket J, Morris R. A highthroughput path metric for multi-hop wireless routing. Wireless
Networks 2005; 11: 419–434.
17. Chachulski S, Jennings M, Katti S, Katabi D. Trading
structure for randomness in wireless opportunistic routing. SIGCOMM’07, August 2007.
18. Boice J, Garcia-Luna-Aceves JJ, Obraczka K. Combining ondemand and opportunistic routing for intermittently connected
networks. Ad Hoc Networks 2009; 7: 201–218.
19. Chen KC, Chen PY. Trusted cognitive radio networking. Wiley
Wireless Communications and Mobile Computing (submitted
for publication).
Copyright © 2009 John Wiley & Sons, Ltd.
465
20. Yang Z, Cheng G, Liu W, Yuan W, Cheng W. Local coordination
based on routing and spectrum assignment in multi-hop cognitive radio networks. Springer Mobile Networks & Applications
2008; 13: 67–81.
21. Liang B, Haas ZJ. Hybrid routing in ad hoc networks with
a dynamic virtual backbone. IEEE Transactions on Wireless
Communications 2006; 5(6): 1392–1405.
22. Beckers R, Deneubourg JL, Goss S. Trail and U-turns in the
selection of the shortest path by the ant Lasius Niger. Journal
of Theoretical Biology 1992; 159: 397–415.
23. Rosati L, Berioli M, Reali G. On ant routing algorithms in ad
hoc networks with critical connectivity. Ad Hoc Networks 2008;
6: 827–859.
24. Lo CK, Heath RW, Jr, Vishwanath S. Hybrid-ARQ in multihop networks with opportunistic relay selection. IEEE ICASSP,
2007.
25. Byun HJ, Do MS, Liu Y, So J, Taori R. Self-organization in
future mobile communication networks. White Paper, Wireless
World Research Forum (WWRF) Special Interest Group (SIG)
3, Version 1.0, 22 April 2008.
Authors’ Biographies
Kwang-Cheng Chen received B.S.
from the National Taiwan University in
1983, M.S. and Ph.D from the University of Maryland, College Park, United
States, in 1987 and 1989, all in electrical engineering. From 1987 to 1998,
he worked with SSE, COMSAT, IBM
Thomas J. Watson Research Center,
and National Tsing Hua University, in
mobile communications and networks. Since 1998, he has
been with the Graduate Institute of Communication Engineering and Department of Electrical Engineering, National
Taiwan University, Taipei, Taiwan, ROC, and is the Distinguished Professor and Irving T. Ho Chair. He actively
involves the technical organization of numerous leading IEEE
conferences, including as the Technical Program Committee
Chair of 1996 IEEE International Symposium on Personal
Indoor Mobile Radio Communications, TPC co-chair for
IEEE Globecom 2002, General Co-Chair for 2007 IEEE
Mobile WiMAX Symposium in Orlando, 2009 IEEE Mobile
WiMAX Symposium in Napa Valley, and IEEE 2010 Spring
Vehicular Technology Conference. He has served editorship
with a few IEEE journals and many international journals,
and served various positions in IEEE. He also actively participate various wireless international standards. He has authored
and co-authored over 200 technical papers and 18 granted
US patents. He co-edits (with R. DeMarca) the book Mobile
WiMAX published by Wiley 2008, and authors a book Principles of Communications published by River 2009, and
co-author (with R.Prasad) another book Cognitive Radio Networks published by Wiley 2009. He was elected as an IEEE
Fellow in 2006 and received numerous awards and honors.
His research interests include wireless communications and
networks, nano-computation/communication, and cognitive
science.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm
466
K.-C. CHEN ET AL.
Bilge Kartal Cetin is currently working towards the Ph.D. at the Aalborg
University, Denmark. Her research interests include ad-hoc and sensor networks,
RFID systems, cognitive radio, self
organized networking and biologically
inspired networking paradigms.
Yu-Jheng Peng received the B.S.
degree in electrical engineering (EE)
and M.S. degree wireless network
routing both from National Taiwan
University (NTU), Taiwan, in 2006
and 2008, respectively. His research
interests include routing in cognitive,
cooperative, and self-organized wireless
networks.
Neeli Rashmi Prasad, Associate Professor and Coordinator of Network
Architecture Thematic Group, Center for
TeleInfrastruktur (CTIF), and Head of
Wireless Security and Sensor Networks
Group, Aalborg University, Denmark.
During her industrial and academic
career for over 13 years, she had lead
and coordinated several projects. At
present, She is leading a industry-funded project on reliable self organizing networks REASON funded by Huawei,
Project Coordinator of European Commission (EC) Integrated Project (IP) ASPIRE on RFID and Middleware and
EC Network of Excellence CRUISE on Wireless Sensor Networks. She is coordinating Internet of Things working group
for European Commission Future of Internet Assembly and
co-caretaker of real world internet (RWI). She has lead EC
Cluster for Mesh and Sensor Networks and Counsellor of
IEEE Student Branch, Aalborg. She is Aalborg University
project leader for EC funded IST IP e-SENSE on Wireless
Sensor Networks and NI2S3 on Homeland and Airport secu-
Copyright © 2009 John Wiley & Sons, Ltd.
rity and ISISEMD on telehealth care. Her publications range
from top journals, international conferences and chapters in
books. She has also co-edited and co-authored two books
titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP
Security, Mobility, QoS and Mobile Network Integration”,
published by Artech House, 2001 and 2005. She is member
of IEEE. Her current research interest lies in context-aware
security management framework, threat models and attack
trees, mobility, mesh networks, WSN, RFID/NFC, emerging
technologies and heterogeneous networks.
Jin Wang received the B.S. and
M.S. degree in Electronical Engineering from Nanjing University of Posts
and Telecommunications, China in 2002
and 2005, respectively. Since 2005, he
has been pursuing Ph.D. in Ubiquitous Computing laboratory in Computer
Engineering Department of Kyung Hee
University Korea. His research interests
include routing protocol and algorithm design, analysis and
optimization, and performance evaluation for wireless ad hoc
and sensor networks.
Sungyouog Lee received his B.S. from
Korea University, Seoul, Korea. He got
his M.S. and Ph.D. degrees in Computer
Science from Illinois Institute of Technology (IIT), Chicago, Illinois, USA
in 1987 and 1991 respectively. He has
been a professor in the Department
of Computer Engineering, Kyung Hee
University, Korea since 1993. He is n
founding director of the Ubiquitous Computing Laboratory, and has been affiliated with a director of Neo Medical
ubiquitous-Life Care Information Technology Research Center, Kyung Hee University since 2006. He is a member of the
ACM and IEEE.
Wirel. Commun. Mob. Comput. 2010; 10:451–466
DOI: 10.1002/wcm