An evolution toward cognitive cellular systems: Licensed shared access for network optimization

Miia Mustonen, Marja Matinmikko, Marko Palola, Seppo Yrjölä, Kari Horneman

Research output: Contribution to journalArticleScientificpeer-review

34 Citations (Scopus)


This article reviews the application of the recent European Licensed Shared Access (LSA) concept for spectrum sharing between a mobile network operator (MNO) and an incumbent user. LSA, as a new area of application of cognitive technology, provides the MNO an opportunity to access new frequency resources on a shared basis. The article presents critical design criteria of LSA from the MNO point of view in order to allow future cognitive cellular networks to efficiently exploit shared spectrum bands. We describe the role of LSA bands in the context of heterogeneous networking, and identify the Long Term Evolution (LTE) and LTE-Advanced enabling technologies that support the introduction of LSA. Such technologies include traffic steering, carrier aggregation, and self-organizing networking. Additionally, we introduce an LSA management unit controlled by the MNO, to be implemented on top of the existing LTE/LTEAdvanced architecture, and we discuss the functionalities required for the optimization and automation of LSA resource management. We also depict the interrelations of the tasks between the LSA management unit and the supporting LTE/LTE-Advanced technologies. Based on the findings in this article, the ongoing cellular system evolution is shown to form a solid base for the introduction of new shared spectrum bands for cognitive cellular systems.
Original languageEnglish
Pages (from-to)68-74
JournalIEEE Communications Magazine
Issue number5
Publication statusPublished - 2015
MoE publication typeA1 Journal article-refereed


  • cognitive radio
  • computer architecture
  • Europe
  • licenses
  • long term evolution
  • microprocessors
  • mobile communication


Dive into the research topics of 'An evolution toward cognitive cellular systems: Licensed shared access for network optimization'. Together they form a unique fingerprint.

Cite this