ABSTRACT

In a cognitive radio-based opportunistic spectrum access network (CR-OSAN), sec-

ondary users hope to utilize the spectrum hole for their communications. To utilize

these spectrum holes with the required protection over primary users in the same fre-

quency band, secondary users have to adopt strict constraints on the resulting interfer-

ence. For example, for the packet-based primary user, CR-OSAN usually constrains

the probability of collision with the primary user’s packet to be under a predefined

threshold. Therefore, it is critical to know how to maximize the secondary user’s

throughput under a certain primary user’s collision probability constraint.