0% found this document useful (0 votes)
5 views

Optimized_MAC_Protocol_Using_Fuzzy-Based_Framework_for_Cognitive_Radio_AdHoc_Networks

The document presents a fuzzy-based optimization framework for the 802.11 DCF MAC protocol in Cognitive Radio AdHoc Networks (CRAHNs) to enhance throughput and reduce delay. The proposed method demonstrates a 25% increase in throughput and a 38% reduction in delay by optimizing contention window and packet length parameters. The study highlights the importance of adapting MAC protocols to the unique characteristics of CRAHNs to address spectrum scarcity effectively.

Uploaded by

SACHIN KUMAR
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Optimized_MAC_Protocol_Using_Fuzzy-Based_Framework_for_Cognitive_Radio_AdHoc_Networks

The document presents a fuzzy-based optimization framework for the 802.11 DCF MAC protocol in Cognitive Radio AdHoc Networks (CRAHNs) to enhance throughput and reduce delay. The proposed method demonstrates a 25% increase in throughput and a 38% reduction in delay by optimizing contention window and packet length parameters. The study highlights the importance of adapting MAC protocols to the unique characteristics of CRAHNs to address spectrum scarcity effectively.

Uploaded by

SACHIN KUMAR
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Received 28 January 2023, accepted 5 March 2023, date of publication 13 March 2023, date of current version 22 March 2023.

Digital Object Identifier 10.1109/ACCESS.2023.3256890

Optimized MAC Protocol Using Fuzzy-Based


Framework for Cognitive Radio AdHoc Networks
NANDKISHOR JOSHI 1 , (Student Member, IEEE), ABHISHEK KUMAR 2 ,
DMITRII MINENKOV3,4 , DMITRII KAPLUN 4 , (Member, IEEE), AND S. C. SHARMA 1
1 Wireless
Networks and Cloud Computing Laboratory, IIT Roorkee, Roorkee, Uttarakhand 247667, India
2 Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh 522502, India
3 Fundamental Foundations of Intelligent Systems Laboratory, Saint Petersburg Electrotechnical University ‘‘LETI,’’ 197022 Saint Petersburg, Russia
4 Department of Automation and Control Processes, Saint Petersburg Electrotechnical University ‘‘LETI,’’ 197022 Saint Petersburg, Russia

Corresponding author: Nandkishor Joshi ([email protected])


This work was supported by the Ministry of Science and Higher Education of the Russian Federation ‘Goszadanie’ 75-01024-21-02 under
Project FSEE-2021-0015.

ABSTRACT Cognitive radio networks (CRNs) have been widely used in various applications for effective
radio spectrum utilization in recent years. It is essential to fend off the growing demand for this finite
natural resource for next-generation communications. In CRNs, detecting the activity of the primary user
requires opportunistic spectrum sensing for efficient usage of the available radio spectrum, which is a limited
and exquisite resource. Thus, CRNs are the key component in solving the spectrum scarcity issue in the
presence of primary user bands through secondary users. Cognitive radio AdHoc networks (CRAHNs) are
a unique kind of CRNs where infrastructures less cognitive radio (CR) nodes are furnished. In CRAHN,
the CR-MAC protocol works slightly differently from the traditional wireless network MAC protocols.
Particularly, the proposed method includes a high traffic scenario under contention-based IEEE 802.11 DCF
MAC protocol. Accordingly, it can be observed that both, throughput and delay, increase as the CW size
and packet length of the 802.11 (DCF) MAC protocol for CRAHN varies. Therefore, this paper proposed
a fuzzy-based optimization framework for the 802.11 (DCF) MAC protocol in CRAHNs. Furthermore,
it optimized throughput and delay by training a database of input parameters, contention window, and
packet length for the Mamdani and Sugeno fuzzy inference system (FIS) models of the 802.11 (DCF)
protocol simultaneously. The experimental result of the proposed framework for CRAHN with FIS shows
that altering the contention window increases throughput by 25% and reduces the delay by 38% compared to
the IEEE802.11 (DCF) protocol for CRAHNs without FIS. Moreover, it is also revealed that the throughput
is increased by and 7% and the delay is reduced by 40% to 50% due to altering the packet length.

INDEX TERMS Cognitive radio AdHoc networks (CRAHNs), MAC protocol, 802.11 (DCF), FIS-based
optimization.

LIST OF ABBREVIATIONS CSMA/CA Kth Carrier sense multiple access/collision


CRNs Cognitive radio networks. avoidance.
CRAHNs CR-AdHoc network. RTS Request to send.
SU Secondary user. CTS Clear to send.
PU Primary user. DCF Distributed coordination function.
CR-WLAN Cognitive Radio wireless Local area net- TDMA Time division multiple access.
work. CDMA Code division multiple access.
MAC Medium access control. FDMA Frequency division multiple access.
The associate editor coordinating the review of this manuscript and FIS Fuzzy inference system.
approving it for publication was Chakchai So-In . DTMC Discrete-Time Markov Chain.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.


27506 For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ VOLUME 11, 2023
N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

DIFS Distributed interframe spacing. based 802.11 (DCF) random access protocol for CRAHNs;
SIFS Kth Short Interframe Space. Its background and related studies are presented in the next
PL Packet length. section. The correlations of various MAC protocols for mul-
CW Contention window. tichannel AdHoc CRNs are presented in [6], [14], and [15].
These studies indicate that no single MAC protocol always
continues to perform well because it mainly depends on the
I. INTRODUCTION number of channels, the number of nodes, the characteristics
The potential technique known as Cognitive Radio (CR) of the data traffic in the network, etc. Article [16] uses
addresses the spectrum scarcity issue by opportunistically the Markov chain model to examine the effectiveness of
utilizing vacant spectrum bands for transmission while safe- multi-channel access protocols for CR-WLAN in terms of
guarding the licensed bands or primary users (PUs). There delay and throughput while altering the number of CR users,
are two categories of spectrum users in these networks viz., channels, and spectrum availability. It is essential to develop
primary users, who have more priority to access the spectrum, the MAC protocols adapted to the characteristics of given
and secondary users (SUs), who find and exploit ‘spectrum network circumstances. In other words, any wireless network
gaps’ of the spectrum that the PUs are not using actively must operate with high throughput and little access lag to per-
[1], [2], [3]. An excellent wireless MAC protocol must offer form at its optimum. Accordingly, our work proposes a fuzzy
a simple method for wireless channel sharing, high band- inference system (FIS) optimization-based strategy to address
width usage, and network fairness (i.e., parity in channel these issues for CRAHNs. The proposed method analyzes
access). Subsequently, [4] mention that the main challenges the network for different data traffic conditions and varying
to an ideal wireless network are low mean packet latency CSMA/CA wait for state parameters. The contribution and
(minimum delay), high throughput, low packet drop ratio, novelty of the present work can be described as follows:
and good fairness under heavy traffic loads. In this scenario,
• Analysis of an efficient sensing scheme for the proposed
cognitive radio MAC protocol may be an efficient solution for
CRAHN in which periodic sensing and continuous sens-
the maximum utility of the radio spectrum. Since cognitive
ing are used to PU ON and PU OFF states, respectively.
radio users utilize the PU user spectrum opportunistically
• Contention-based 802.11 DCF MAC protocol is adopted
by adding spectrum sensing techniques, the MAC protocol
to proposed CRAHN, and delineated a flowchart with
for the CR-AdHoc network (CRAHNs) is slightly different
respect to its working procedure for the proposed frame-
from conventional wireless AdHoc Networks [5]. Therefore,
work.
developing a successful medium access control (MAC) pro-
• A FIS-based optimization framework is proposed for
tocol is crucial for CRAHN i.e., SU must exploit the spectrum
802.11 DCF CSMA/CA MAC protocol in CRAHNs,
available from PU while ensuring good quality of service
outlining it for Mamdani and Sugeno FIS models.
(QoS) (e.g., throughput, delay) [6].
• Analyze and optimize the throughput and delay simul-
Several ongoing standardization initiatives by the
taneously to improve the performance of the 802.11 for
IEEE 802 community, including IEEE 802.22 [7], IEEE
CRAHNs.
802.11af [8], and IEEE 1900 [9], are focused on CRNs.
The infrastructure-based CR network and CRAHNs are two The rest of the paper is organized as follows. The related
categories into which CRNs can be subdivided based on the work of the proposed work is described in Section II. The pro-
network architecture [10]. In the first type, the network is posed network access model and mac protocol for CRAHNs
managed and supervised by a central body, such as an access are presented in section III. The results are analyzed in
point (identical to a cellular network) [11], [12]. Although Section IV and finally, the final findings are concluded in
the CRAHNs network does not have the backbone of any Section V.
established infrastructure, it does have AdHoc communica-
tion amongst CR users [13]. Compared to infrastructure- II. BACKGROUND AND RELATED WORKS
based CRN, the CRAHNs are a better solution because of For the particular application of the CR, pre-defined
their reduced implementation costs, more straightforward well-performing architectures of CR should be required. Sub-
system, and quicker alignment positioning. Due to the dis- sequently, extensive analysis and recently proposed architec-
tributed nature of CRAHNs, these networks frequently use tures for cognitive radio AdHoc networks with their strengths
the distributed coordination function (DCF) as stated in IEEE and limitations are described in [10]. The authors surveyed
802.11. It is easier to combine IEEE 802.11 (DCF) with the spectrum management architecture for CRAHNs and
a cognitive radio network to develop a CR-MAC protocol highlighted the differences between CRAHNs and tradi-
because IEEE 802.11 (DCF) can use unlicensed CR spectrum tional AdHoc networks [17]. MAC protocols for the central-
bands, such as the 2.4 ISM band and TV whitespace band. ized network topology of CRNs are specified by the IEEE
Mainly, CR MAC protocols are divided into three categories 802.22 [18], and IEEE 802.11af [8] standards. The IEEE
such as random access (e.g., Aloha, CSMA/CA), Controlled 802.11 DCF protocol is a random-access protocol based on
access (e.g., Reservation, Poling), and channel access (e.g., contention and is better suited for CRAHNs. In [19], [20],
FDMA, TDMA, CDMA). Our paper presents a CSMA/CA 2D DTMC is used to control the contention window of

VOLUME 11, 2023 27507


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

IEEE 802.11 DCF protocol, i.e., Bianchi model, for better


performance. Moreover, [21] investigate the throughput and
delay of this CSMA/CA-based IEEE 802.11 (DCF) protocol
under maximum load conditions using a 2D-DTMC model.
The MAC protocol for cognitive radio networks requires
control channels for spectrum sensing or observing primary
user activity. This dedicated control channel-based dynamic
open spectrum sharing (DOSS) protocol is proposed in the
secondary network with two transceivers per node [22], [23],
[24]. In further work, a decentralized MAC protocol is intro-
duced in [25], where communication time and throughput
performance improvement are accomplished by reducing the
number of handshaking signals broadcast over a common
control channel (CCC) between SUs. In [26], the point coor-
dination function (PCF) of Wi-Fi networks is used to create
a reliable and efficient control channel (CC) in Wi-Fi-based
CRNs.
Fuzzy logic has been used in numerous types of research to
improve the quality of service in wireless networks viz., the
FLCMAC adaptive fuzzy logic cooperative MAC protocol
is presented for efficient prioritized traffic management to
achieve QoS. It has been shown that using the suggested
approach, both single-hop and multi-hop wireless transmis- FIGURE 1. Cognitive Radio AdHoc (CRAHNs) networks architecture.
sion has increased efficiency in terms of delay time and
throughput [27]. Another fuzzy logic-based study offered a
fuzzy expert system that increases VoIP (voice over inter- Furthermore, [35] improves the performance of the IEEE
net protocol) user’s connections even by 40% in AdHoc 802.11 MAC protocol performance for WLANs employing
networks. It can also quickly modify packet size values to fuzzy logics and the ANOVA regression model [35].
the current optimal level and has been enhanced with min- Therefore, to the best of the author’s knowledge, the 802.11
imal delay, and tolerable packet loss [28]. A fuzzy logic- (DCF) protocol for cognitive radio networks using FIS, which
based approach was adopted to load balancing to the access can improve throughput and delay, is not yet available in
point (AP) in IEEE 802.11 networks for improving the QoS the literature. In light of the preceding discussions, we have
exhibited by various wireless scenarios [29]. The congestion, developed a FIS-based strategy for IEEE 802.11 (DCF) based
a typical network issue, and barrier were addressed using protocols in CRAHNs, which increases the throughput with
fuzzy logic, and the resulting technique was known as fuzzy reducing the delay simultaneously.
random early detection (FLRED) [30]. In order to train the
neuron fuzzy models, a genetic algorithm and backpropa- III. SYSTEM MODEL
gation learning algorithm were employed via adaptive traf- Consider a cognitive radio AdHoc network (CRAHN) that
fic engineering solution for video surveillance systems over employs the IEEE 802.11 DCF protocol and is composed of
SDN based on type-2 fuzzy logic [31]. A fuzzy-based sched- single-hop communication as in Fig.1. In this network, the
uler system is also developed for mobile AdHoc networks spectrum is licensed to the primary users and secondary users
to prioritize packets using routing protocols by looking at use the licensed bands opportunistically considering overlay
packet-scheduling methods that enhance the performance of mode. The CRAHNs do not offer an infrastructure system,
congested networks [32]. In addition, a fuzzy logic-based and the network does not even depend on the pre-existing
prioritized scheduler for MANET is suggested, employing infrastructure. As is well known, the proposed 802.11 (DCF)
the data rate, signal-to-noise ratio (SNR), and queue size as protocol is a contention-based system where sensing is cru-
inputs. Moreover, [33] has presented a scheduler that outper- cial for CRAHNs. Therefore, the two primary purposes of the
formed the previous scheduler in terms of performance i.e., cognitive radio MAC protocol are contention and spectrum
averaging improvements of 37% for the end-to-end delay, sensing.
56% for throughput, and 57% for the packet delivery ratio.
Subsequently, [34] uses adaptive neuro-FIS to optimize the A. CONTENTION
power control ratio in CRNs. Adaptive neuro-fuzzy infer- The proposed CRAHN shows that the number of SUs utilized
ence systems, self-organizing maps, artificial immune sys- by the PUs spectrum and may vary according to the net-
tems, fuzzy logic and neural models, and hybrid models work requirement coverage Fig.1. The IEEE 802.11 (DCF)
are among the prominent soft computing methodologies that is the random access type of MAC protocol reported for
WLAN researchers have been progressively incorporating. wireless AdHoc networks [36], and CSMA/CA access is
27508 VOLUME 11, 2023
N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

the foundation of this protocol. In this protocol, a random


backoff mechanism follows every busy medium scenario.
After completing the spectrum sensing in the CRAHNs, if any
SU has a packet to broadcast, it must first ‘‘listen’’ to the
channel, according to the CSMA/CA-based 802.11-based
(DCF) approach. If another user is sending the data packet,
wait for the DIFS time interval, which is the minimum time
for that user to be inactive. After DIFS, if the medium is still
available, the current user initiates transmission, otherwise,
it waits for the previous user to finish transmitting the packets.
After that, it will generate a random delay and wait for another
DIFS time before broadcasting its packet, which refers to
as the back-off procedure. This delay is randomly selected
in the contention window (0, CW − 1). The SU sends its FIGURE 2. Spectrum sensing scheme.
packet if no other transmissions occur before the expiration
of this time frame. When other SU’s are broadcasting during is detected to be engaged in continuous sensing mode for
this time, the back-off counter is frozen until the end of each a period longer than Tsensing . In this case, CR assumes that
broadcast, and then the counting procedure is resumed after PU has occupied the channel and returns to the periodic
DIFS time. The SU sends its packet when its counter hits sensing mode after the sensing period Tsensing with periods T ,
zero. The first transmission attempt is for the minimum size as long as PU is sensed busy. Here, 1/λ and 1/β are the mean
of the contention window CWmin , after which CW doubles values for exponentially distributed PU ON and PU OFF
to a maximum value after each retransmission brought on by duration, respectively. As long as the channel is considered
a collision, i.e., Cmax = 2m CWmin , where m is the number busy, it remains in periodic sensing mode, otherwise, in ideal
of contention window sizes. Once the contention window is conditions, the SU uses it with continuous sensing. Now, from
maximum, it resets the counter and again follows the back-off Fig.2a, energy spent for periodic sensing EPS and continuous
procedure reported in [37]. sensing ECS can be formulated as follows [41]:
 
1
EPS = ES , (1)
B. SENSING λT
 
In CR networks, despite the cohabitation of SU and PU in the 1 T
ECS = E + Tsensing − , (2)
same spectrum band, both are typically unaware of each other. β 2
It is challenging to determine the ON/OFF state of a PU by where ES represented as energy spent perh sensing, the
using the carrier sensing approach when it lies from outside
i
1
expected number of sensing is represented as λT , E is the
the carrier sensing range (CSR) of an SU. To prevent interfer-
energy per unit time duration in continuous sensing config-
ence among them, we should take into account the spectrum
uration, Tsensing is time units for continuous sensing before
sensing technology [10], [38], such as energy detection or
switching to periodic sensing mode on activation of PU.
cyclostationary feature detection, etc. Spectrum sensing is
Moreover, it is visible in Fig.2b that in the OFF phase of the
carried out by the MAC protocol at the physical layer and
PU (continuous sensing), the T /2 time unit is often wasted
packet scheduling at the MAC layer, respectively [39]. A node
to detect it. It indicates that starting from the moment PU
continuously senses the channel in accordance with the IEEE
turns off, the typical delay for transitioning from periodic
802.11 DCF standard [40], which causes the wastage of
sensing to continuous sensing is provided by the constant
energy. This problem has been reformed by adopting an
T /2. Furthermore, on the basis of (1) and (2), Etotal i.e.,
approach wherein SUs start periodic sensing during the ON
(3), which is the average total energy consumed during an
condition and continuous sensing built on the DCF during
ON-OFF cycle, can be written as follows
the OFF condition of the PUs, respectively [41]. This process
has been adopted in the proposed work. When the channel Etotal = ECS + EPS . (3)
is discovered to be empty in a sensing start instantly while in
periodic sensing mode, the CR changes to continuous sensing IV. PROPOSED SCHEME FOR 802.11 PROTOCOL FOR
mode and adheres to the 802.11 DCF protocol. CRAHNS
The proposed methodology employs periodic sensing with A. 802.11 DCF PROTOCOL FOR CRAHNS
periods of T when the PU is ON (the channel is not open For proposed CRAHNs, this scheme includes the sensing
to SUs), and the time period T can either have a constant, function with the 802.11 (DCF) protocol that contains M =
deterministic value or be randomly chosen from a suitable 50 contending SU’s and defined simulation time to obtain
distribution [42], [43] Fig.2a. According to this adopted the output results such as throughput and delay by varying
method, the length of the SU packet is limited by Tsensing the input parameters like packet length and contention win-
to prevent interference on the PU. Suppose that the channel dow. Based on the literature, many types of MAC protocols

VOLUME 11, 2023 27509


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

load and the design of the MAC protocol. Note that, the IEEE
802.11 DCF protocol is being used in the presented work,
therefore, these parameters depend on factors associated with
this protocol. The contention window size and packet length
are two factors that this study takes into account to opti-
mize throughput and access delay. The mathematical analysis
for IEEE 802.11 (DCF) in detail is reported in [19], [20],
and [21], [36] presented the detailed analysis of throughput
and delay for both two-way (acknowledgment) and four-way
access (RTS-CTS) methods of this MAC protocol at high
traffic condition using a renewal process.

1) THROUGHPUT FOR IEEE 802.11 (DCF)


In one renewing interval among two subsequent transmis-
sions, the normalized throughput [19], [20] is described as
E[successful packet payload transm. in a slot time]
S=
E[ length between two subsequent transmissions]
It can be also elaborated as follows
Average successful packet payload transmission
S=
AIDNT + STDST + CDC
where
AIDNT = Average ideal duration with no transmission
STDST = Successful transmission duration with successful
transmission
CDC = Collision duration with collision
Consequently, S can be written mathematically as
PS E[Pav ]
S= , (4)
FIGURE 3. Flow chart of the simulation for the proposed scheme. E[Z ] + PS TS + (1 − PS )TC
where (4) represents the saturation throughput for the IEEE
802.11 (DCF) protocol, PS is the successful probability of
are reported, a Markov chain-based analytical model for the transmission, E[Pav ] is the average packet payload size for
802.11 (DCF) protocol is presented in [21] and [36], which DCF protocol, E [Z ] is the average number of consecutive
are relevant in the context of the proposed work. The flow ideal slots, TS successful time duration (average time that
chart which describes the simulation for the proposed scheme the channel is occupied with a successful transmission of
is shown in Fig.3. First, the sensing functions are utilized SU packet) and TC collision time duration (average time
to observe the PU activity, thereafter, DCF based back-off the channel is occupied by colliding SU’s) for SU’s packet
process will start and initialize its parameters. Here, the transmission that can be defined as below
time counter will start from ‘0’ to the total simulation time
TS = H + E[Pav ] + SIFS + τ + ACK + DIFS + τ

and calculate the successful time Ts (average time that the ,
TC = H + E[Pmax _coll ] + DIFS + τ
channel is occupied with a successful transmission of SU
(5)
packet) i.e., equivalent to Tsensing in this case, and the collision
time Tc (average time the channel is occupied by colliding where H = MAC_header + PHY _header is representing the
SU’s). In this back-off process, if cognitive radio user packets packet header and τ is known as propagation delay, E[Pav ]
collide with increment collision time Tc , these packets are is the average packet payload size and E[Pmax _coll ] is the
re-transmitted with back-off counter resets to the back-off longest packet payload size at the collision, which can be
process. If there is no collision, i.e., successful transmission calculated by the PDF of respective payload size and channel
of the packet, then the successful time is incremented, and at bit rate.
the end, the outputs throughput and delay results are obtained
from (4) and (6). 2) DELAY FOR IEEE 802.11 (DCF)
The main objective of the network MAC protocol is to The period between the creation of a packet and its successful
maximize the throughput and minimize the access delay since reception is known as a packet access delay. Let us assume
throughput and access delay mainly depends on the traffic that E[AD] is the mean value of the random variable AD

27510 VOLUME 11, 2023


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

which represents the packet access delay. The relationship,


as shown below, can be used to get the mean frame delay (6)

E[AD] = Average delay due to total number of Collisions


+ Average delay during the
× successful transmission ,
E[AD] = E[Ncollisions ](E[BOD] + TC + TW )
+ (E[BOD] + TS ), (6)

where TW is DIFS, E[Ncollisions ] is the mean number of


collisions up to the anticipation of successful transmission,
and the mean back-off delay E[BOD] is the time when a
station chooses to wait before entering a channel when it is
congested. When a broadcast packet collides between two
nodes, it must wait until TW before sensing the channel once
again. Different delays, to calculate the total access delay
of the packet such as E[Ncollisions ], E[BOD] at a different
situation, have been exhibited in [21], [36], [44].

B. PROPOSED FUZZY BASED OPTIMIZATION SCHEME


There are mainly three types of Fuzzy inference systems
like Mamdani fuzzy model, Takagi-Sugeno fuzzy model, and
Tsukamoto fuzzy model that are being used as a controller for
optimization purposes. E. H. Mamdani is credited with devel-
oping the Mamdani fuzzy inference system [45], [46]. In this
system, both the input and output membership functions take
the form of linguistic variables, such that the Mamdani sys-
tem requires human expert knowledge for fuzzification and
fuzzy rule setting. Takagi, Sugeno, and Kang introduced the
Sugeno fuzzy model [47], sometimes referred to as the TSK
fuzzy model, in an aim to provide a methodical process for FIGURE 4. Proposed fuzzy inference based complete flow chart of a
proposed solution.
generating fuzzy rules from a given input and output data
set [48]. In the Sugeno system, input membership functions
also take the form of linguistic variables, and output should
be linear or constant (Crisp value). Since each rule’s output is 3) Rule evaluation has been done on basis of experiences
a crisp value, the sum of all the outputs is determined as their instead of knowledge with the help of Boolean algebra
weighting factor. This method is less difficult than the Mam- and fuzzy rules in FIS.
dani model since defuzzification is not required because the 4) Fuzzy outputs are introduced from rule evaluation, and
output is a crisp value. In Tsukamoto Fuzzy Model [49], each predefined membership functions for the parameters
fuzzy if-then rule’s consequence is represented by a fuzzy for proposed parameters are combined for defuzzifica-
set with a monotonic membership function. The Tsukamoto tion to get the crisp output.
fuzzy model is not widely used because it is not as transparent 5) An output distribution is created by calculating and
as the Mamdani or Sugeno fuzzy models. The following steps combining the results of all the fuzzy rules.
have been followed to implement such a fuzzy model i.e., 6) In most applications, a sharp output is usually neces-
Mamdani or Sugeno fuzzy models, in the proposed strategy sary. Defuzzification is the turning of ambiguous data
Fig. 4. (such as output distribution) into comprehensive infor-
mation (single value or crisp data). Numerous tech-
1) Crips inputs mean a statement is ‘True’ or ‘Not’ with
niques can be applied in this situation like the center
proposed parameters (contention window and packet
of Mass, Mean of the Maximum, and other frequently
Length) of the proposed problem and membership
used techniques.
functions are the method for solving practical problems
employing experiences instead of knowledge. Algorithms 1 and 2 exhibit the pseudocode of the Mamdani
2) In this step combined the Crips inputs and membership and Sugeno FIS models, which were used for optimization
functions to fuzzification. Fuzzification is the process in the proposed work. The Mamdani model for defuzzifica-
to convert the crisp data of proposed parameters to the tion employs the centroid approach, while the Sugeno model
fuzzy sets of the inputs in FIS. employs the weight sum method.

VOLUME 11, 2023 27511


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

Algorithm 1 Pseudo Code for Mamdani Fuzzy- TABLE 1. Fuzzy sets for Mamdani FIS.

Model-Based Optimization of 801.11 (DCF) Protocol


to CRAHN
Input : Contention Window, Packet Length
(antecedents)
Output: Throughput, Delay (consequents)
1) Adopted the database from the proposed 802.11
(DCF) protocol of antecedents and consequents
for the FIS model
2) Chose Mamdani fuzzy model
3) Initilize the different methods for Mamdani FIS -
AndMethod= min
OrMethod= max
ImpMethod= min 1. Three parameters, a1 , a2 and a3 , are used to specify a
AggMethod= max triangular MF as follows:
DefuzzMethod= centroid 
4) Defined the membership function for 1)

 0 x ≤ a1
x − a1


5) Generate the fuzzy rule database for 1), 2), and 3)


 a1 ≤ x ≤ a2
6) Compare the optimized result triangle(x; a1 , a2 , a3 ) = aa23 −
−x
a1 , (7)
7) end

 a2 ≤ x ≤ a3
 a3 − a2



0 a3 ≤ x
Algorithm 2 Pseudo Code for Sugeno Fuzzy-Model- Alternatively, this MF can also be expressed as below by
Based Optimization of 801.11 (DCF) Protocol to using min and max
CRAHN
Input : Contention Window, Packet Length triangle(x; a1 , a2 , a3 , a4 )
   
(antecedents) x − a1 a3 − x
= max min , ,0 . (8)
Output: Throughput, Delay (consequents) a2 − a1 a3 − a2
1) Adopted the database from the proposed 802.11 2. Three parameters, a1 ,a2 ,a3 and a4 are used to specify a
(DCF) protocol of antecedents and consequents for trapezoidal MF as follows:
the FIS model 
2) Chose Sugeno Fuzzy model 
 0 x ≤ a1

 x − a1
3) Initilize the different methods for Sugeno FIS - 

 a1 ≤ x ≤ a2
AndMethod= min  a2 − a1

OrMethod= max trapezoid(x; a1 , a2 , a3 , a4 ) = 1 a2 ≤ x ≤ a3

 a4 − x
ImpMethod= prod 
 a3 ≤ x ≤ a4
a4 − a3


AggMethod= sum 

0 a3 ≤ x

DefuzzMethod= wtsum
4) Defined the membership function for 1) (9)
5) Generate the fuzzy rule database for 1), 2), and 3) Similarly, MF can also be written as
6) Compare the optimized result
7) end trapezoid(x; a1 , a2 , a3 , a4 )
   
x − a1 a4 − x
= max min , 1, ,0 . (10)
a2 − a1 a4 − a3
V. RESULTS AND DISCUSSION The proposed Mamdani model is depicted in Fig. 5a, and
A fuzzy inference model’s membership function (MF) encap- the Sugeno fuzzy model is illustrated in Fig. 5b. Table 1
sulates all its characteristics. Most fuzzy inference model shows the proposed fuzzy sets for input and output parameters
applications use membership functions, which are straight- for Mamdani FIS, and their linguistic values are considered
forward composites of linear functions and more control- ‘Low,’ ‘Medium,’ and ‘High.’ The trapezoidal type member-
lable than Gaussian functions [50]. In the proposed work, ship function is evaluated for ‘Low,’ ‘High,’ and the triangular
triangular and trapezoidal membership functions are used type membership function is considered for the ‘Medium’
for input and output parameters for Mamdani FIS, whereas, linguistic values, shown in Fig. 6. Similarly, Table 2 shows
in the Sugeno model, consequents exhibited the content linear the fuzzy sets for the Sugeno model.
membership function. The mathematical modeling of differ- Fig.7a attains the proposed 9 (32 ) rules with two input vari-
ent types of membership [49] is defined as follows ables and three linguistic levels for the Mamdani technique

27512 VOLUME 11, 2023


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

FIGURE 5. Antecedent and consequent in fuzzy logic.

TABLE 2. Fuzzy sets for Sugeno FIS.

FIGURE 6. Membership for antecedent and consequent.

employing max(maximum), and min(minimize) approaches


for constructing rules. In this approach, the fuzzy sets pro- fuzzy rule’s structure. The centroid defuzzification method-
duced as the result of obtaining the most significant value of ology was the one that was employed with the Sugeno FIS
a rule are then used to change the fuzzy region and applied model and results are displayed in Fig.7b. With a similar
to the output using the OR operator (Union) to maximize the procedure, we can use defuzzification with Mamdani FIS
output variable throughput. Similarly, to minimize the output except for the type of method i.e., in this case, a weighted
variable delay employed by the min(minimize) approach, sum approach is applied to the defuzzification in which con-
which fuzzy set produced as the result of obtaining the mini- sequents are represented as constant linear equations.
mum value of a rule is then used to change the fuzzy region Fig. 8a and 8b show the surface results for Mamdani FIS for
and applied to the output using the ‘AND’ operator ( inter- proposed antecedents and consequents under different rule-
section or conjunction). The first column shows the degree base conditions. Fig. 8a shows as the consequent parameter
of membership of the antecedent, i.e., contention window throughput goes to the greatest upward region and in Fig. 8b
(X 1) = 32, followed by the remaining antecedent’s packet consequent parameter delay goes to the downward region.
length (X 2) = 25 for the second column, and the consequent Similar findings are shown in Fig. 9a and 9b for Sugeno FIS
throughput is displayed in the third column. In contrast, the for proposed antecedents and consequences under various
delay is provided in the fourth column for these conditions. rule-base conditions. Fig. 9a illustrates how the subsequent
From the first to the fifth, each column indicates the collective parameter throughput moves to the largest upward zone,
area of each fuzzy rule, which are the consequence of the whereas Fig. 9b illustrates how the subsequent parameter

VOLUME 11, 2023 27513


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

FIGURE 7. Fuzzy rule base for antecedent and consequent.

TABLE 3. Simulation values.

FIGURE 8. Antecedent and consequent surface results for the Mamdani


model.

and packet length have a significant impact on the through-


put and delay of any MAC protocol. Assuming the net-
work system is stable, it is assumed that the anticipated
network traffic is at its peak load and in saturation. We take
into account the 802.11 (DCF) protocol and add it to our
suggested CRAHN to assess the experiment’s performance
delay moves to the downward region. Here, the range of on MATLAB. Fig.10a shows the throughput-versus-CR-user
variation of CW (0, 64) slots, APL (0, 50) slots, throughput relationship for various values of the contention window
is (0, 1) and delay (0, 0.1) seconds. size. As per Fig.10a, if the number of CR users increases,
To optimize the 802.11 (DCF) MAC protocol perfor- throughput falls, however, as the contention window size
mance (simulation values are shown in Table 3) in CRAHNs, expands, throughput rises. A fuzzy inference system is a
it should be required to consider the key parameters such as tremendous tool for maximizing throughput, as evidenced
throughput and delay. For these parameters, the 802.11 ran- by the FIS optimization results in Fig.10a, which are bet-
dom access type MAC protocol is already analyzed for con- ter compared to those obtained without the FIS at the
ventional and small-scale wireless AdHoc wireless LANs same contention window size and which fluctuate between
in [21], [36]. It is widely known that contention window 0.35 and 0.75.

27514 VOLUME 11, 2023


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

FIGURE 10. Throughput and delay optimization on altering contention


window.

FIGURE 9. Antecedent and consequent surface results for the Sugeno


model. Mamdani model and to 38 milliseconds (approximate) for the
Sugeno model at the contention window value 64. Moreover,
with the throughput being maximized, it is seen that the delay
Since it is known that the delay should be as minimal is reduced at the same contention window value.
as possible, we will turn our attention to its performance. The 802.11 (DCF) protocol’s throughput is depicted in
Moreover, the delay which is also affected by the contention Fig.11a, where throughput rises as packet length increases
window and packet length depends on the total number of because more information is transmitted. But the packet
collisions and the successful time period. To do this, we will length can only be increased to a certain limit, so the use of
first incorporate the varying contention window, delay is FIS is a great solution to maximize this further. The findings
constantly fluctuating between 0 and 0.1. Fig.10b demon- demonstrate that the throughput is raised about to 0. 05 bits
strates that it also increases in proportion to the expansion per second with FIS. It also turns out that the Sugeno model
of the contention window. However, for promising wireless produces better results that are consistent with fuzzy theo-
communication, it should be the minimum. This has been ries. Fig.11b demonstrates that it also increases in propor-
beneficially changed by training with the FIS on the con- tion to the expansion of the packet length (in slots). Here,
tention window and packet length parameters of the chosen the delay is reduced to the minimum length of the packet,
802.11 (DCF) protocol. Fig.10 demonstrated that the delay which is achieved by comparing the same value without FIS.
has been decreased to 18 milliseconds (approximate) for the Additionally, Fig.11 reveals that the delay is decreased to

VOLUME 11, 2023 27515


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

TABLE 4. Comparison to similar works.

35 milliseconds (approximate) for the Mamdani model and


to 54 milliseconds (approximate) for the Sugelo model at the
packet length value 50. Additionally, with throughput being
maximized, it is seen that the delay is reduced at the same
packet length value.
Furthermore, for completeness, we provide a separate
Table 4 containing the different network scenarios. Particu-
larly, [20] has been focused on the throughput performance
whereas [21] focused on both throughput and delay as shown
in Table 4. These research works consider IEEE 802.11(DCF)
as the primary MAC protocol for conventional wireless LAN
and AdHoc networks with fifty contending users. Table 4
shows that [20] provides throughput analysis, varying from
0.55 (minimum value) to 0.82 (maximum value) for con-
tention window sizes 32 and 128. In contrast, [21] provides
throughput and delay analysis for contention window sizes
(i.e., 16, 32, and 64), where throughput fluctuates from 0.58 to
0.82 and delay fluctuates from 88 to 1000 ms. Moreover, [35]
enhances the performance of IEEE 802.11 (DCF) proto- FIGURE 11. Throughput and delay optimization in altering packet size.
col by accomplishing fuzzy-based analysis with an ANOVA
regression model for similar traditional protocol and network
scenarios with ten contending nodes, as shown in Table 4. VI. CONCLUSION AND FUTURE SCOPE
However, as per Table 4, the proposed CRAHN scenario with Cognitive radios can play a vital role in future wireless com-
fifty CR contending users reveals that throughput has been munication, as well as in the efficient use of the available
reduced, whereas the delay is improved, as compared to [21]. spectrum. However, cognitive radio wireless communication
Specifically, the throughput fluctuates from 0.35 to 0.59 with differs from ordinary wireless communication, where the
CW 16, 32, and 64, whereas with the variation of packet trade-off increases the CW size and packet length of the
length 20, 30, and 50 slots, it fluctuates from 0.35 to 0.70. 802.11 (DCF) MAC protocol for CRAHN which increases
Note that delay performance has been improved and varies both throughput and delay. This work has improved the
between 0.002 and 0.1 ms. Subsequently, the Mamdani and performance of the 802.11 protocol for CRAHNs using a
Sugeno FIS models are applied with CRAHN. As shown in fuzzy-based approach as revealed by the proposed algo-
Table 4 the proposed modification improved the throughput rithm. Specifically, altering the contention window increases
by 25% and reduced the delay by 38% for different contention throughput by 25% and reduces the contention window by
window sizes. Moreover, by altering packet length, through- 38%. Additionally, as a result of altering the packet length,
put is increased by 7%, and the delay is reduced by 40% to the throughput has improved by 7% and the delay has been
50% as compared to the IEEE802.11 (DCF) for CRAHNs reduced by 40% to 50%. In future work, the performance
without FIS. of physical layer spectrum sensing, and machine learning
Conclusively, the proposed framework has improved the applications can be used with the same parameters of this
performance and delay of the CRAHN as compared to the protocol, and the QoS of the 802.11 protocol can be further
existing networks. improved.

27516 VOLUME 11, 2023


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

REFERENCES [23] M. Timmers, S. Pollin, A. Dejonghe, L. V. D. Perre, and F. Catthoor,


[1] S. Haykin, ‘‘Cognitive radio: Brain-empowered wireless communica- ‘‘A distributed multichannel MAC protocol for multihop cognitive radio
tions,’’ IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005. networks,’’ IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 446–459,
Jan. 2010.
[2] S. Haykin. (2012). Cognitive Radio: Brain-Empowered Wireless Com-
[24] S.-L. Wu, C.-Y. Lin, Y.-C. Tseng, and J.-L. Sheu, ‘‘A new multi-channel
muncations. Accessed: Oct. 18, 2022. [Online]. Available: https://
MAC protocol with on-demand channel assignment for multi-hop mobile
web.stanford.edu/class/ee360/previous/lectures/matt.pdf
ad hoc networks,’’ in Proc. Int. Symp. Parallel Archit., Algorithms Netw.,
[3] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, ‘‘Next Dec. 2000, pp. 232–237.
generation/dynamic spectrum access/cognitive radio wireless networks: [25] W. Alhakami, A. Mansour, and G. A. Safdar, ‘‘Performance analysis of
A survey,’’ Comput. Netw., vol. 50, pp. 2127–2159, Sep. 2006. a novel decentralised MAC protocol for cognitive radio networks,’’ in
[4] N. I. Sarkar, ‘‘Improving WLAN performance by modifying an IEEE Proc. IEEE Asia Pacific Conf. Wireless Mobile (APWiMob), Sep. 2016,
802.11 protocol,’’ Int. J. Wireless Netw. Broadband Technol., vol. 1, no. 1, pp. 85–91.
pp. 15–31, Jan. 2011. [26] H.-L. Chao, T.-L. Li, C.-C. Chung, and S.-H. Wu, ‘‘Throughput analysis
[5] A. Sultana, X. Fernando, and L. Zhao, ‘‘An overview of medium access of a hybrid MAC protocol for WiFi-based heterogeneous cognitive radio
control strategies for opportunistic spectrum access in cognitive radio net- networks,’’ in Proc. IEEE 82nd Veh. Technol. Conf. (VTC-Fall), Sep. 2015,
works,’’ Peer-Peer Netw. Appl., vol. 10, no. 5, pp. 1113–1141, Sep. 2017. pp. 1–5.
[6] A. De Domenico, E. C. Strinati, and M.-G. Di Benedetto, ‘‘A survey on [27] Z.-X. Wang, H.-L. Xia, and W. Ding, ‘‘A fuzzy logic cooperative MAC
MAC strategies for cognitive radio networks,’’ IEEE Commun. Surveys for MANET,’’ J. China Universities Posts Telecommun., vol. 15, no. 1,
Tuts., vol. 14, no. 1, pp. 21–44, 1st Quart., 2012. pp. 55–60, Mar. 2008.
[7] C. Cordeiro, K. Challapali, D. Birru, and S. Shankar, ‘‘IEEE 802.22: [28] T. Frantti and M. Koivula, ‘‘Fuzzy packet size control for delay sen-
The first worldwide wireless standard based on cognitive radios,’’ in Proc. sitive traffic in ad hoc networks,’’ Expert Syst. Appl., vol. 38, no. 8,
1st IEEE Int. Symp. New Frontiers Dyn. Spectr. Access Netw., Nov. 2005, pp. 10188–10198, Aug. 2011.
pp. 328–337. [29] M. Collotta, ‘‘FLBA: A fuzzy algorithm for load balancing in IEEE 802.11
[8] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, networks,’’ J. Netw. Comput. Appl., vol. 53, pp. 183–192, Jul. 2015.
‘‘IEEE 802.11 af: A standard for TV white space spectrum sharing,’’ IEEE [30] M. M. Abualhaj, A. A. Abu-Shareha, and M. M. Al-Tahrawi, ‘‘FLRED:
Commun. Mag., vol. 51, no. 10, pp. 92–100, Oct. 2013. An efficient fuzzy logic based network congestion control method,’’ Neu-
[9] S. Buljore, H. Harada, S. Filin, P. Houze, K. Tsagkaris, O. Holland, ral Comput. Appl., vol. 30, no. 3, pp. 925–935, Aug. 2018.
K. Nolte, T. Farnham, and V. Ivanov, ‘‘Architecture and enablers for [31] R. Mohammadi and R. Javidan, ‘‘An adaptive type-2 fuzzy traffic engi-
optimized radio resource usage in heterogeneous wireless access networks: neering method for video surveillance systems over software defined net-
The IEEE 1900.4 working group,’’ IEEE Commun. Mag., vol. 47, no. 1, works,’’ Multimedia Tools Appl., vol. 76, no. 22, pp. 23627–23642, 2017.
pp. 122–129, Jan. 2009. [32] K. Manoj, S. C. Sharma, and L. Arya, ‘‘Fuzzy based QoS analysis in
[10] I. F. Akyildiz, W. Y. Lee, and K. R. Chowdhury, ‘‘CRAHNs: Cognitive wireless ad hoc network for DSR protocol,’’ in Proc. IEEE Int. Advance
radio ad hoc networks,’’ Ad Hoc Netw., vol. 7, pp. 810–836, Jul. 2009. Comput. Conf., Mar. 2009, pp. 1357–1361.
[11] S. Feng, Z. Liang, and D. Zhao, ‘‘Providing telemedicine services in an [33] O. A. Egaji, A. Griffiths, M. S. Hasan, and H. Yu, ‘‘Fuzzy logic based
infrastructure-based cognitive radio network,’’ IEEE Wireless Commun., packet scheduling algorithm for mobile ad-hoc network with a realistic
vol. 17, no. 1, pp. 96–103, Feb. 2010. propagation model,’’ in Proc. 19th Int. Conf. Autom. Comput., Sep. 2013,
[12] M.-V. Nguyen and H. S. Lee, ‘‘Effective scheduling in infrastructure-based pp. 1–6.
cognitive radio networks,’’ IEEE Trans. Mobile Comput., vol. 10, no. 6, [34] N. Joshi and B. Jharia, ‘‘Optimized fuzzy power control over fading chan-
pp. 853–867, Jun. 2011. nels in spectrum sharing cognitive radio using ANFIS,’’ in Proc. 2nd Int.
[13] M. Zareei, A. K. M. Muzahidul Islam, N. Mansoor, S. Baharun, Conf. Signal Process. Integr. Netw. (SPIN), Noida, India, 2015, pp. 329–
E. M. Mohamed, and S. Sampei, ‘‘CMCS: A cross-layer mobility-aware 333, doi: 10.1109/SPIN.2015.7095404.
MAC protocol for cognitive radio sensor networks,’’ EURASIP J. Wireless [35] C. Kocak and H. B. Karakurt, ‘‘Fuzzy logic-based performance improve-
Commun. Netw., vol. 2016, no. 1, pp. 1–15, Dec. 2016. ment on MAC layer in wireless local area networks,’’ Neural Comput.
Appl., vol. 31, no. 10, pp. 6113–6128, Oct. 2019.
[14] L. Gavrilovska, D. Denkovski, V. Rakovic, and M. Angjelichinoski,
[36] E. Ziouva and T. Antonakopoulos, ‘‘The IEEE 802.11 distributed coordi-
‘‘Medium access control protocols in cognitive radio networks: Overview
nation function in small-scale ad-hoc wireless lans,’’ Int. J. wireless Inf.
and general classification,’’ IEEE Commun. Surveys Tuts, vol. 16, no. 4,
Netw., vol. 10, no. 1, pp. 1–15, 2003.
pp. 2092–2124, 4th Quart., 2014.
[37] P. Chatzimisios, V. Vitsas, and A. C. Boucouvalas, ‘‘Throughput and delay
[15] P. Pawelczak, S. Pollin, H. S. W. So, A. R. S. Bahai, R. V. Prasad, and
analysis of IEEE 802.11 protocol,’’ in Proc. 3rd IEEE Int. Workshop Syst.-
R. Hekmat, ‘‘Performance analysis of multichannel medium access control
Chip Real-Time Appl., Oct. 2002, pp. 168–174.
algorithms for opportunistic spectrum access,’’ IEEE Trans. Veh. Technol.,
[38] Y.-C. Liang, Y. Zeng, E. C. Peh, and A. T. Hoang, ‘‘Sensing-throughput
vol. 58, no. 6, pp. 3014–3031, Jul. 2009.
tradeoff for cognitive radio networks,’’ IEEE Trans. Wireless Commun.,
[16] B. Dappuri and T. G. Venkatesh, ‘‘Design and performance analysis of vol. 7, no. 4, pp. 1326–1337, Apr. 2008.
multichannel MAC protocol for cognitive WLAN,’’ IEEE Trans. Veh. [39] X. Zhang and H. Su, ‘‘CREAM-MAC: Cognitive radio-enabled multi-
Technol., vol. 67, no. 6, pp. 5317–5330, Jun. 2018. channel MAC protocol over dynamic spectrum access networks,’’ IEEE
[17] N. Mansoor, A. K. M. M. Islam, M. Zareei, S. Baharun, T. Wakabayashi, J. Sel. Topics Signal Process., vol. 5, no. 1, pp. 110–123, Feb. 2011.
and S. Komaki, ‘‘Cognitive radio ad-hoc network architectures: A survey,’’ [40] IEEE Standard for Information Technology—Telecommunications and
Wireless Pers. Commun., vol. 81, no. 3, pp. 1117–1142, Apr. 2015. Information Exchange Between Systems—Local and Metropolitan Area
[18] IEEE Standard for Information Technology—Local and Metropolitan Networks—Specific Requirements—Part 11: Wireless LAN Medium
Area Networks—Specific Requirements—Part 22: Cognitive Wireless Access Control (MAC) and Physical Layer (PHY) Specifications,
Ran Medium Access Control (MAC) and Physical Layer (PHY) Spec- IEEE Standard 802.11-2020, 2021.
ifications: Policies and Procedures for Operation in the TV Bands, [41] B. Dappuri and T. G. Venkatesh, ‘‘Design and performance analysis of cog-
IEEE Standard 802.22-2011, 2011. nitive WLAN MAC protocol,’’ IEEE Syst. J., vol. 12, no. 3, pp. 2261–2272,
[19] G. Bianchi, ‘‘IEEE 802.11-saturation throughput analysis,’’ IEEE Com- Sep. 2018.
mun. Lett., vol. 2, no. 12, pp. 318–320, Dec. 1998. [42] Y. Pei, A. T. Hoang, and Y.-C. Liang, ‘‘Sensing-throughput tradeoff in
[20] G. Bianchi, ‘‘Performance analysis of the IEEE 802.11 distributed coordi- cognitive radio networks: How frequently should spectrum sensing be
nation function,’’ IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, carried out?’’ in Proc. IEEE 18th Int. Symp. Pers., Indoor Mobile Radio
Apr. 2000. Commun., Sep. 2007, pp. 1–5.
[21] E. Ziouva and T. Antonakopoulos, ‘‘CSMA/CA performance under high [43] A. P. Azad, S. Alouf, E. Altman, V. Borkar, and G. S. Paschos, ‘‘Optimal
traffic conditions: Throughput and delay analysis,’’ Comput. Commun., control of sleep periods for wireless terminals,’’ IEEE J. Sel. Areas Com-
vol. 25, no. 3, pp. 313–321, Feb. 2002. mun., vol. 29, no. 8, pp. 1605–1617, Sep. 2011.
[22] L. Ma, X. Han, and C.-C. Shen, ‘‘Dynamic open spectrum sharing MAC [44] S. Balasubramani, ‘‘Review on MAC layer delay computation methods in
protocol for wireless ad hoc networks,’’ in Proc. 1st IEEE Int. Symp. New wireless networks,’’ in Proc. Int. Conf. Circuit, Power Comput. Technol.
Frontiers Dyn. Spectr. Access Netw., Dec. 2005, pp. 203–213. (ICCPCT), Apr. 2017, pp. 1–7.

VOLUME 11, 2023 27517


N. Joshi et al.: Optimized MAC Protocol Using Fuzzy-Based Framework for Cognitive Radio AdHoc Networks

[45] E. H. Mamdani, ‘‘Application of fuzzy logic to approximate reasoning DMITRII KAPLUN (Member, IEEE) received
using linguistic synthesis,’’ IEEE Trans. Comput., vol. C-26, no. 12, the Ph.D. degree in digital signal processing
pp. 1182–1191, Dec. 1977. from Saint Petersburg Electrotechnical University
[46] E. H. Mamdani and S. Assilian, ‘‘An experiment in linguistic synthesis ‘‘LETI,’’ Saint Petersburg, Russia, in 2009. He was
with a fuzzy logic controller,’’ Int. J. Hum.-Comput. Stud., vol. 51, no. 2, an Associate Professor with Saint Petersburg Elec-
pp. 135–147, 1999. trotechnical University ‘‘LETI,’’ in 2015, where
[47] M. Sugeno and G. T. Kang, ‘‘Structure identification of fuzzy model,’’ he is currently a Lead Researcher. His current
Fuzzy Sets Syst., vol. 28, no. 1, pp. 15–33, Oct. 1988.
research and academic work are related to digital
[48] T. Takagi and M. Sugeno, ‘‘Fuzzy identification of systems and its
signal and image processing, radio monitoring and
applications to modeling and control,’’ IEEE Trans. Syst., Man, Cybern.,
hydroacoustic monitoring applications, embedded
vol. SMC-15, no. 1, pp. 116–132, Jan. 1985.
[49] J. S. R. Jang, C. T. Sun, and E. Mizutani, ‘‘Neuro-fuzzy and soft and reconfigurable systems, computer vision, and machine learning. He reg-
computing—A computational approach to learning and machine intel- ularly takes part in different collaborative projects related to signal pro-
ligence,’’ IEEE Trans. Autom. Control, vol. 42, no. 10, pp. 1482–1484, cessing, machine learning, and embedded computing. The most substantial
Oct. 1997. results are in the fields of digital signal and image processing, embedded
[50] V. Adriaenssens, P. L. M. Goethals, and N. De Pauw, ‘‘Fuzzy knowledge- systems, computer vision, and machine learning. He is the author of more
based models for prediction of Asellus and Gammarus in watercourses in than 100 papers in journals and conference proceedings.
flanders (Belgium),’’ Ecol. Model., vol. 195, nos. 1–2, pp. 3–10, May 2006.

NANDKISHOR JOSHI (Student Member, IEEE)


received the B.E. degree in electronics and com-
munication engineering and the M.E. degree
in digital communication specialization from
the Ujjain Engineering College, Ujjain (an
autonomous college under the Government of
Madhya Pradesh), in 2010 and 2015, respectively.
He is currently pursuing the Ph.D. degree with IIT
Roorkee, India. He has five years of professional
experience, including four years of teaching and
one year of research experience as a Junior Research Fellow with IIIT
Allahabad, India, in 2018. His research interests (practical and experimental)
mainly focused on issues in MAC protocols in cognitive radio networks,
energy harvesting and performance optimization with IEEE 802.11 protocol, S. C. SHARMA received the M.Sc. degree in
and full duplexing for next-generation wireless communication with cogni- electronics, the M.Tech. degree in electronics and
tive radio network environments. communication engineering, and the Ph.D. degree
in electronics and computer engineering from
IIT Roorkee (erstwhile University of Roorkee),
in 1981, 1983, and 1992, respectively. He started
ABHISHEK KUMAR received the Ph.D. degree his career as a research and development engineer,
in electronics and communication engineer- in 1983. Since January 1984, he has been in the
ing from the Indian Institute of Informa- teaching profession with IIT Roorkee. He has also
tion Technology Allahabad, Prayagraj, India, worked as a Group Leader with the Department of
in 2021. He has experience as a Postdoctoral Electronics and Instrumentation Engineering, BITS Pilani, Dubai Campus,
Fellow with the Signal Processing Research from August 2003 to August 2005. He has worked as a Research Scientist
Group, Department of Automation and Con- with FMH, Munchen, Germany, and visited many countries, such as the
trol Processes, Saint Petersburg Electrotechni- U.K., France, Germany, Italy, Switzerland, Canada, United Arab Emirates,
cal University ‘‘LETI,’’ Saint Petersburg, Russia. Thailand, and The Netherlands, for his research work. He is currently
He is currently an Assistant Professor with the a Professor with IIT Roorkee, Saharanpur Campus. He has more than
Koneru Lakshmaiah Education Foundation (KLEF), Guntur, Andhra Pradesh, 35 years of teaching and research experience with IIT Roorkee. He has
India. His research interests include digital signal processing, multirate completed several major research projects funded by various government
digital signal processing, filter designing, and digital communication. He is agencies, such as AICTE, CSIR, UGC, MHRD, DST, and DRDO, and
a regular reviewer of reputed journals. many minor research projects related to communication and SAW filter
designs sponsored by the Government of India. He has published more than
300 research papers in national and international journals (152)/conferences
(150) and supervised more than 30 projects/dissertations of PG students.
He has supervised 20 Ph.D. students in the areas of computer networking,
DMITRII MINENKOV received the M.Sc. degree wireless networks, computer communication, cloud and its security, and
in control and informatics in technical systems mobile computing and continues supervising Ph.D. students in the same area.
from Saint Petersburg Electrotechnical Univer- He is an Honorary Member of NSBE, ISOC, and IAENG, USA. He received
sity ‘‘LETI,’’ Saint Petersburg, Russia, in 2010. the Khosla Annual Research Prize for the Best Research Paper from IIT
He is currently a Researcher with Saint Petersburg Roorkee. His many research papers have been awarded by national and inter-
Electrotechnical University ‘‘LETI.’’ He has ten national committees and journals. He has chaired sessions at international
years of professional experience in the industry. conferences and delivered invited talks at various forums. He is an active
His research interests include embedded systems, reviewer of IEEE journals and an editor of various reputed international and
FPGA designs, digital signal processing, and dig- national journals.
ital communication.

27518 VOLUME 11, 2023

You might also like