Cognitive Radio Techniques for M2M Environments

Cognitive Radio Techniques for M2M Environments

Daniele Tarchi, Romano Fantacci, Dania Marabissi
ISBN13: 9781466665712|ISBN10: 1466665718|EISBN13: 9781466665729
DOI: 10.4018/978-1-4666-6571-2.ch035
Cite Chapter Cite Chapter

MLA

Tarchi, Daniele, et al. "Cognitive Radio Techniques for M2M Environments." Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, edited by Naima Kaabouch and Wen-Chen Hu, IGI Global, 2015, pp. 909-927. https://doi.org/10.4018/978-1-4666-6571-2.ch035

APA

Tarchi, D., Fantacci, R., & Marabissi, D. (2015). Cognitive Radio Techniques for M2M Environments. In N. Kaabouch & W. Hu (Eds.), Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management (pp. 909-927). IGI Global. https://doi.org/10.4018/978-1-4666-6571-2.ch035

Chicago

Tarchi, Daniele, Romano Fantacci, and Dania Marabissi. "Cognitive Radio Techniques for M2M Environments." In Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, edited by Naima Kaabouch and Wen-Chen Hu, 909-927. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6571-2.ch035

Export Reference

Mendeley
Favorite

Abstract

Machine to Machine (M2M) communications have been recently introduced as a viable paradigm for allowing low cost and efficient communications among devices mainly in an autonomous manner. Even if M2M protocols need dedicated resources, a new paradigm, called Cognitive M2M (CM2M) communications, has been recently considered exploiting cognitive/opportunistic radio communications. After having introduced the problem of applying cognitive techniques in M2M scenarios, the authors focus their attention on the Medium Access Control (MAC) protocols for CM2M scenarios, with a particular attention on the OFDMA-based primary systems. Among other approaches, the authors focus on a data-aided approach for the access of the secondary devices aiming to reduce interference toward the primary system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.