A spectrum aware routing protocol for public safety applications over cognitive radio networks

Athina Bourdena, Evangelos Pallis, Antonis Arvanitis, George Mastorakis, Georgios Kormentzas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The paper elaborates on a routing protocol that efficiently coordinates data flows among public safety secondary systems considering the unpredictable availability of TVWS spectrum resources. The proposed application scenario exploits for the communication of the nodes both Ad-hoc and mesh network architectures. Ad-hoc network connections are ideally for emergency situations, when the spectrum resources are pour, while the mesh network architecture addresses the emerging market requirements for building wireless networks that are highly scalable and cost effective, offering a solution for the easy deployment of high-speed ubiquitous wireless access. Efficient protocol operation as a matter of maximum-possible routing paths establishments and minimum delays is obtained by a coordination mechanism. The validity of the research approach is verified via a number of experimental tests, conducted under controlled simulation conditions, evaluating the performance of the proposed routing protocol.

Original languageEnglish
Title of host publication2012 International Conference on Telecommunications and Multimedia, TEMU 2012
Pages7-12
Number of pages6
DOIs
Publication statusPublished - 2012
Event2012 International Conference on Telecommunications and Multimedia, TEMU 2012 - Heraklion, Greece
Duration: 30 Jul 20121 Aug 2012

Other

Other2012 International Conference on Telecommunications and Multimedia, TEMU 2012
Country/TerritoryGreece
CityHeraklion
Period30/07/121/08/12

Keywords

  • Ad-hoc Networks
  • Cognitive Radio
  • Mesh Networks
  • Public Safety Applications
  • Routing Protocols
  • TVWS

Fingerprint

Dive into the research topics of 'A spectrum aware routing protocol for public safety applications over cognitive radio networks'. Together they form a unique fingerprint.

Cite this