Cooperative Spectrum Sensing over Correlated Log–Normal Sensing and Reporting Channels Marco Di Renzo† , Laura Imbriglio‡ , Fabio Graziosi‡ , Fortunato Santucci‡ (†) (‡)
Institute for Digital Communications (IDCOM), The University of Edinburgh, Edinburgh, EH9 3JL, Scotland (UK) Dept. of Electrical and Information Engineering, Center of Excellence DEWS, Univ. of L’Aquila, 67100 L’Aquila, Italy E–Mail: m.di–
[email protected], {laura.imbriglio, fabio.graziosi, fortunato.santucci}@univaq.it
Abstract— In this paper, we investigate the performance of a general multi–layer decentralized system setup for cooperative spectrum sensing, which includes realistic sensing/reporting channels and correlated Log–Normal shadow–fading in all wireless links of the cooperative network. Our investigations will show that, even though often overlooked in typical cooperative spectrum sensing analysis, shadowing correlation on the reporting channel can yield similar performance degradations as shadowing correlation on the sensing channel. All findings will be substantiated via theoretical arguments and Monte Carlo simulations, and, in particular, novel approximation methods to account for correlated Log–Normal shadowing in cooperative spectrum sensing problems will be introduced.
I. I NTRODUCTION Cognitive Radio (CR) is commonly considered a key enabling technology to provide high bandwidth to mobile users via heterogeneous wireless architectures and Dynamic Spectrum Access (DSA) capabilities (see, e.g., [1], [2]). In particular, the inspirational principle of DSA relies on the broadly recognized experimental evidence of low spatial and temporal usages of the frequency spectrum [3]. The basic idea of DSA is to allow some users (which are often called Secondary Users, SUs) to dynamically borrow, for data transmission, unused frequency bands, provided that no harmful interference is generated towards those users either having high transmit priorities (i.e., gold users with a high quality of service) or owning the exclusive rights to transmit over those frequency bands [4]. In such a context, the key enabling element for the successful exploitation of the DSA principle is the CR, which can be broadly defined as “an intelligent wireless communication system that periodically monitors the radio spectrum, intelligently detects occupancy in the different parts of the spectrum and then opportunistically communicates over spectrum holes with minimal interference to the active users” [5]. Although a CR is likely to consist of several components, but mainly of a sensing, decision, and execution unit, the most important element to enable DSA capabilities is the ability to sense/detect temporarily unused frequency bands with high reliability [3]. Accordingly, several spectrum sensing methods have been recently proposed in the literature, each one having its own inherent complexity and performance (see, e.g., [6]–[8] and references therein for a survey). Moreover, theoretical, simulative, and experimental results have shown that spectrum sensing performed by a single CR might be very demanding in terms of required sensitivity and operation in wireless environments with deep fades, and cooperative spectrum sensing methods have been proposed to alleviate these problems and mitigate the requirements of individual radios (see, e.g., [9]–[11] and references therein).
As recently noticed by [12], [13], cooperative spectrum sensing for CRs belongs to the general research area of decentralized and distributed data/signal fusion problems (see, e.g., [14], [15] and references therein). However, the vast majority of published results available in the literature so far have investigated the cooperative spectrum sensing problem under the typical assumptions of the so–called classical decentralized data fusion framework [14]. For example, i) in, e.g., [16], [17] the wireless channel is not considered in the analysis, and ii) in, e.g., [18]–[23] the effect of the wireless channel on the reliability and performance of the spectrum sensing process is taken into account only on the sensing channel and is overlooked on the reporting channel. To the best of the authors’ knowledge, only in a few contributions the authors have applied the guidelines of the emerging decentralized data fusion framework [14] to the analysis of cooperative spectrum sensing problems. For example, i) in [13], the authors consider correlated observations on the sensing channel, but an error– free reporting channel is still retained, and ii) in [7], [24] a noisy reporting channel is analyzed, but simplified fading channel models are still considered. In particular, as far as the fading channel is considered, recent measurement campaigns, as well as extensive simulation and experimental activities, have pointed out the inconsistency of several assumptions that are typically used for analysis and simulation of mobile ad–hoc and multi–hop networks [25]–[27]. It has been shown that when the system to be analyzed gets distributed, one of the most important factors to be taken into account to get reliable performance predictions and system designs is Log–Normal shadow–fading, as well correlation effects that characterize this statistical phenomenon over short/medium distances [27]. Actually, the analysis of correlated Log–Normal shadowing for cooperative spectrum sensing has already been investigated by some authors, even though several limitations are retained in these analyzes (see, e.g., [7], [8], [11], [13], [18], [19]). For example, i) in [18], the effect of correlated shadow–fading on the system performance is analyzed, but only for a very large number of cooperative users and for a specific spatial correlation function; moreover, the reporting channel is assumed to be ideal and error–free, ii) in [19], Log–Normal shadowing is analyzed only via Monte Carlo simulations, and still neglecting the existence of a realistic reporting channel, iii) in [13], correlated Log–Normal shadowing on the sensing channel is accounted for to design optimal decision strategies at the fusion center, but the reporting channel is still overlooked in the analysis, and iv) in [23], approximation methods to analyze correlated Log–Normal shadowing on the sensing channel are introduced, but the reporting channel is still neglected. In
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
summary, the few contributions that try to take into account correlated Log–Normal shadowing for analysis and design of cooperative spectrum sensing only focus on one side of the communication system, i.e., the sensing channel, while the other side, i.e., the reporting channel, is often overlooked. However, recent results in [7], [24] have clearly illustrated (even though without considering shadowing propagation) that errors on the reporting channel yield fundamental performance limits for cooperative spectrum sensing, which are similar to Signal–to–Noise Ratio (SNR) walls in [28]. Motivated by the above considerations, the aim of the this contribution is to propose an advanced framework for analyzing the performance of cooperative spectrum sensing problems under the assumptions of the emerging decentralized data fusion framework, and to take into account realistic propagation conditions on both sensing and reporting channels. In particular, the contributions of the paper are as follows. • Realistic Wireless Channel Assumptions. Differently from typical system setups where correlated Log–Normal shadowing is just considered on the sensing channel, we consider the effect of correlated Log–Normal shadowing on both sensing and reporting channels. In fact, regardless of the cooperative protocol used for data reporting, shadowing correlation is expected to exist in all wireless links (see, e.g., [7, Fig. 4.3] and [27, Fig. 2]). • Simple Cooperative Protocol for Data Reporting. Moving from the good performance/complexity trade–off offered by the Amplify–and–Forward (AF) relying mechanism [29], we propose an AF–inspired cooperative setup for data reporting from local sensors to a fusion center. This allows to keep the complexity of sensors at a very low level, since each of them needs only to forward the sensed signal to the remote fusion center (see, e.g., [7], [30]). • Improved Framework for Modeling Correlated Log– Normal Shadowing. It is well–known that no closed– form expressions to model the power–sum of generically correlated Log–Normal Random Variables (RVs) exist in the literature (see, e.g., [31], [32] and references therein). In this contribution, we move on and generalize recent results on modeling Log–Normal power–sums to take into account the particular needs of cooperative spectrum sensing over realistic sensing and reporting channels. The remainder of the manuscript is organized as follows. In Section II, the multi–layer system model that accounts for realistic sensing/reporting channels is introduced. In Section III, the problem of cooperative spectrum sensing is formalized from the analytical point of view. In Section IV, the analytical framework for modeling correlated Log–Normal shadowing in the cooperative spectrum sensing scenario is introduced. In Section V, numerical and simulation results are shown, and the accuracy of the proposed method substantiated. Finally, Section VI concludes the paper. II. S YSTEM M ODEL A. Distributed Model for Cooperative Spectrum Sensing Let us consider the general multi–layer decentralized detection problem shown in Fig. 1. In general, there is an event, which is often called “Phenomenon of Interest” (PoI) [15], we are interested in detecting by using a cooperative network of dispersed local nodes. In this contribution, we
Fig. 1. System model: multi–layer distributed/cooperative spectrum sensing.
assume PoI is the determination of either presence (H1 ) or absence (H0 ) of a Primary User (PU) transmitting over a given frequency band. In this latter scenario, we assume that some local nodes (SUs in Fig. 1) sense/observe a given frequency band independently and in a decentralized fashion. As shown in Fig. 1, the quality of the observations depend on the wireless channel between PoI and SUs (i.e., the “sensing channel”), which affects the sensing capabilities of each local sensor. As described in Section I, most literature on either generic data fusion (see, e.g., [14], [15]) or cooperative spectrum sensing (see, e.g., [7], [24]) problems makes the unrealistic assumption that the decisions of local sensors can be sent with high reliability (i.e., error–free) over a dedicated channel (i.e., the “reporting channel”) to a fusion center, which, upon reception of local data, produces an estimate of PoI by choosing either H0 or H1 . Following the principles of the emerging data fusion framework, we remove this limitation and consider an unreliable wireless reporting channel, as shown in Fig. 1. B. AF–Inspired Relay Protocol for Data Reporting In particular, to consider realistic operations of local sensors when reporting their own local estimates to the fusion center, we consider the following protocol for data reporting. After local sensing, every local SU is assumed to act as a relay node, which forwards the sensed signal to the fusion center through a faded (reporting) channel. In particular, moving from recent advances in the field of cooperative wireless communications, we suggest to use the simple AF relay protocol for data forwarding/reporting [29]. Among the various possibilities for cooperative relying [29], the reason for choosing AF is twofold: i) it allows to keep the complexity of local sensors at a low level since only analog forwarding is required by them, and ii) it offers an implicit and simple way to report row data to the fusion center, which it has been shown to improve spectrum sensing performance [17]. We also note that similar spectrum sensing relay protocols have been recently suggested in [7], [30]. However, their operational principle and motivation are different from those proposed in the present paper: we do not use relay for local messages exchange among SUs to avoid bad shadowed channels, but simply exploit the similarity of data fusion problems and cooperative relaying [33] to report row data to the fusion center without assuming ideal reporting channels and to keep the complexity of local
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
sensors at a moderate level (no local detection, but simple analog forwarding). Finally, for the sake of simplicity, we assume every SU in Fig. 1 forwards its data over orthogonal sub–channels [29], so that we can neglect interference among SUs during data reporting. III. P ROBLEM S TATEMENT A. Notation According to Fig. 1 and Section II, we adopt the following notation, which is similar to dual–hop cooperative systems [33], [34]. i) PU is denoted by S (i.e., source), ii) the fusion L center is denoted by D (i.e., destination), iii) {Rl }l=1 are the L active SUs (i.e., relays), which report their local sensed signals to D, and iv) the dual–hop wireless link S–Rl –D L is the l–th branch of the network. Moreover, i) {Gl }l=1 is L L the relay gain associated to relay {Rl }l=1 , ii) {αl,SR }l=1 L and {αl,RD }l=1 are the fading gains of sensing and reporting channels, respectively, iii) N0 is the one–sided power spectral density of the Additive White Gaussian Noise (AWGN) at L 2 Es /N0 and the input of {Rl }l=1 and D, iv) γl,SR = αl,SR 2 γl,RD = αl,RD Es /N0 are the SNRs of sensing and reporting links on the l–th branch, respectively, and v) Es is the average radiated energy in every transmission. 2 2 , αl,RD , i.e., the channel power gains on Finally, i) αl,SR sensing and reporting channels, respectively, are assumed to be Log–Normal distributed and generically correlated RVs, as a consequence of shadow–fading propagation [27], and ii) motivated by [35], we consider the fusion center to be equipped with a simple Energy Detection (ED) for spectrum sensing, and to use a Square–Law Combining (SLC) [9] mechanism to combine the signals received from the SUs (this choice leads to combine in a Maximal Ratio Combining (MRC) fashion the received SNRs, see Section III-B). B. Analytical Formulation According to [9], the decision L statistic of a SLC decentralized detector is ySLC = l=1 yl . In particular, when the fusion center uses square–and–integrate operations T for every received signal (i.e., ED), we have yl = (2/Ψl ) 0 rl2 (t) dt, where rl (·) is the signal received by the fusion center from Rl , Ψl is one–sided power spectral density of the noise component of rl (·), and T is the observation (i.e., integration) window. By relying on the AF–inspired data reporting mechanism, the received signal from each SU is rl (t) = (αl,SR αl,RD Gl ) s (t)+(αl,RD Gl ) nRl (t)+nD (t), where s (·) denotes the presence or absence of the PU, i.e., s (t) = 0 if H0 , and nRl (·), nD (·) are the AWGNs at the input of terminals Rl and D, respectively [33], [34]. Accordingly, we also have 2 2 Ψl = αl,RD Gl + 1 N0 . Some important comments deserve to be made with regard to ySLC . i) Only the fusion center needs to compute Ψl for every received local observation, and this can be directly done by its own without any message exchange with the SUs (Ψl is independent from αl,SR ). In particular, the estimation of Ψl can be done directly from rl (·) when PU is not transmitting, but SUs are still relaying during the PU’s silence periods. ii) In this contribution we will not analyze the effect of estimation errors on Ψl [36]. This is left to a future contribution. Given that the main aim of this paper is to analyze the performance of the AF–inspired reporting method for general settings, we will consider several options for choosing
L
{Gl }l=1 . In particular, two basic AF relay mechanisms will be considered: i) Channel State Information (CSI) [33], and ii) Fixed–Gain (FG) [34] relaying. In the former case, every SU is assumed to have full CSI about the sensing channel, = 1/αl,SR [33]. On and the relay gain is Gl = GCSI l the contrary, in the latter case the relays are not required to have instantaneous CSI. In particular, the relay gain is G = E /(C Gl = GF s l N0 ), where Cl is a constant factor l for blind relays [34], and it is a function of the Average CSI (A–CSI) on the sensing channel for semi–blind relays (see [37] for analytical details for this latter case). Following similar analytical steps as described in [9], it is possible to show that, for both relaying mechanisms, ySLC follows either a central or non–central chi–square distribution depending on PU is not (H0 ) or is (H1 ) transmitting, respectively. Accordingly, the performance of the distributed spectrum sensing problem in Fig. 1 can be characterized by two performance measures, i.e., False Alarm Probability (Pfa ) and Detection Probability (Pd ). These metrics can be computed as follows, when removing the conditioning upon fading channel statistics on both sensing and reporting channels: ⎧ Γ(LN /2,λ/(2σ 2 )) ⎪ ⎨ Pfa = Γ(LN /2) +∞ (1) ⎪ QLN /2 aξp σ 2 , λ σ 2 fγt (ξ) dξ ⎩ Pd = 0
where the following definitions have been used: i) Γ (·) is the Gamma function [38, pp. 255, Eq. (6.1.1)], ii) Γ (·, ·) denotes the incomplete Gamma function [38, pp. 260, Eq. (6.5.3)], iii) Qm (·, ·) is the generalized Marcum Q–function [19, pp. 73], iv) N is the number of degrees of freedom of the system [9], v) λ is the detection/decision threshold used by the fusion center in the binary hypothesis testing problem to discriminate between presence and absence of a PU, and vi) σ 2 = 1, a = 2. Moreover, fγt (·) is the Probability Density Function (PDF) of the end–to–end SNR, γt , at the fusion center. Depending on the chosen AF relay mechanism, the latter SNR can be explicitly L written as γt = l=1 γl,t , where [33], [34]: ⎧ −1
⎪ γl,SR γl,RD 1 1 CSI ⎪ ⎪ = = + γ ⎨ l,t γl,SR + γl,RD γl,SR γl,RD γl,t = −1
⎪ 1 Cl ⎪ ⎪ γ F G = γl,SR γl,RD = ⎩ + l,t Cl + γl,RD γl,SR γl,SR γl,RD (2) Furthermore, in (1) we have introduced a constant term p. We have done this for the sake of generality. As a matter of fact, two system setups have been proposed for spectrum sensing using EDs: 1) the first one (see, e.g., [9]) where p = 1, and 2) the second one (see, e.g., [19]) where p = LN /2. These system setups are related to different settings, with 2) being used more often than 1) by many researchers. Since in the next sub–sections we will propose approximations for performance analysis, and, in general, approximations can yield a different level of accuracy for different weight functions [31], we will analyze the reliability and numerical stability of our frameworks for both system setups in what follows. Let us also note that the typical scenario with error–free reporting channels can be readily obtained from (2) when L SR , {γl,RD }l=1 → ∞. In such a case, we will have γl,t = γl,t used in most and γt will reduce to the well–known expression L SR . analysis (see, e.g., [9], [23]), i.e., γt = l=1 γl,t
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
Finally, as Pfa in (1) is independent from channel statistics, in the next sections we will be mainly interested in developing a simple but effective framework to compute Pd in (1), which requires a closed–form expression for the PDF of γt . In Section IV we will show that the computation of fγt (·) boils down to have accurate and simple methods for approximating the power–sum of generically correlated Log–Normal RVs. In particular, a novel two–step method will be proposed to handle this problem in the specific system setup under analysis. IV. M ODELING C ORRELATED L OG –N ORMAL P OWER –S UM FOR C OOPERATIVE S PECTRUM S ENSING As mentioned in Section I, even though there are several methods for approximating the power–sum of Log–Normal RVs for both scenarios with and without distributed diversity [31], none of them can handle correlation among all diversity branches of the distributed spectrum sensing problem depicted in Fig. 1. In particular, we have recently proposed a method for taking into account shadowing correlation for multi–hop networks [37], but we have always assumed uncorrelated branches, while correlation among sensing and reporting branches is the main focus of the present contribution. In order to solve this problem, we propose a novel two–step approximation method, and show that, with respect to [37], the approximation of a Log–Normal power–sum with another Log–Normal RV might not be accurate for most system setups. So, we will exploit non–Log–Normal approximation methods, by providing advances along three main directions [32]: i) these methods have been analyzed only for uncorrelated terms so far, while our interest is in correlated links, ii) these methods have not been analyzed for distributed detection problems and scenarios with cooperative diversity, while this is the main focus of this contrition, and iii) the accuracy of Log–Normal power–sum approximations, either with Log– Normal or non–Log–Normal RVs, has never been tested for computing either Pd or the Miss Probability Pm = 1 − Pd , which are the performance metrics we are considering. In the subsequent sub–sections, we will propose a two–step approximation method and substantiate its accuracy in typical operating system setups. In particular, in Section IV-A we will show that for all system setups analyzed in this contribution γt can be written as the power–sum of correlated Log–Normal RVs in a unified way; then, in Section IV-B we will introduce the two–step approximation method. A. fγt (·) as Power–Sum of Log–Normal RVs CSI FG By carefully looking at γl,t and γl,t defined in Section III-B, we can easily figure out that in both cases the inverse of end–to–end SNR in every branch is given by the summation of correlated Log–Normal RVs. As a consequence, modeling the distribution of the SNRs in Section III-B is equivalent to find the distribution of the inverse of a linear combination of generically correlated Log–Normal RVs. Before proceeding with the analytical derivation, it is conCSI FG and γl,t in a unified way. venient to re–write the SNRs γl,t −1 2 In particular, they are expressible as γl,t = X = n=1 l,n −1 2 2 0.1Yl,n , where {Yl,n }n=1 is a vector of Normal n=1 10 μYl ) and covariance matrix (Σ ΣYl ) given RVs with mean vector (μ
in (3) and ⎧ ⎪ ⎪ ⎪ ⎪ ⎨ CSI : ⎪ ⎪ ⎪ ⎪ ⎩
(4) for CSI and FG relays, respectively1 : μ Yl (1) = −μl,SR − 10 log10 (Es /N0 ) μ Yl (2) = −μl,RD − 10 log10 (Es /N0 ) 2 Σ Yl (1, 1) = σl,SR 2 Σ Yl (2, 2) = σl,RD Σ Yl (1, 2) = Σ Yl (2, 1) = ρl,{SR,RD} σl,SR σl,RD
(3) ⎧ μ Yl (1) = −μl,SR − 10 log10 (Es /N0 ) ⎪ ⎪ ⎪ ⎪ μ Yl (2) = −μl,SR − μl,RD − 20 log10 (Es /N0 ) ⎪ ⎪ ⎨ + 10 log10 (Cl ) FG : 2 (1, 1) = σl,SR ⎪ Σ Yl ⎪ ⎪ 2 2 ⎪ ⎪ Σ (2, 2) = σl,SR + σl,RD + 2ρl,{SR,RD} σl,SR σl,RD ⎪ ⎩ Yl 2 Σ Yl (1, 2) = Σ Yl (2, 1) = σl,SR + ρl,{SR,RD} σl,SR σl,RD (4) 2 and where i) μl,SR and μl,RD are the mean values, ii) σl,SR 2 σl,RD are the variances, and iii) ρl,{SR,RD} is the correlation
2 and χl,RD = coefficient of RVs χl,SR = 10 log10 αl,SR 2 , i.e., the Normal RVs associated to the Log– 10 log10 αl,RD 2 2 Normal power gains αl,SR and αl,RD , respectively. According to the above analysis, the problem of computing Pd (or Pm ) boils down to have general and flexible methods for managing the power–sum of correlated Log–Normal RVs. In particular, two main problems need to be addressed: i) L firstly, the PDF of {γl,t }l=1 needs to be estimated, which results in the need to have efficient tools for approximating the power–sum of generically correlated Log–Normal RVs, and ii) L secondly, the PDF of γt = l=1 γl,t needs to be computed, which results in dealing with the power–sum of correlated either Log–Normal or non–Log–Normal RVs depending on L the assumptions done to compute the PDF of {γl,t }l=1 [32].
B. A Two–Step Approximation for Computing fγt (·) To handle correlation among every pair of links in Fig. 1, we propose a simple yet accurate two–step procedure for computing fγt (·), and then use it for the estimation of Pd in (1). Although several methods are available in the literature [31], we will consider and generalize two of them: the Improved Schwartz–Yeh (I–SY) [37] and Pearson Type IV (P–IV) [32] methods. The reason for using these methods is twofold: i) they offer simple non–recursive closed–form (using Gauss Quadrature Rules, GQRs) formulas to compute the approximating parameters, without the need to use non– linear least–squares methods, and ii) when error–free reporting channels are considered, they have been shown to be very accurate for approximating Pd [23]. 1) Step 1 – Improved Schwartz–Yeh (I–SY) Approximation L for {γl,t }l=1 : The I–SY approximation method has been recently introduced in [32], only for independent Log–Normal RVs, as an improved version of the SY method proposed in 1982 [39]. The main idea of Step 1 is to approximate the Log–Normal power–sum γl,t with another Log–Normal RV by using I–SY, as follows: 2 (10 log10 (ξ) − μl,I−SY ) 10/ln (10) ∼ exp − fγl,t (ξ) = 2 2σl,I−SY ξ 2πσ 2 l,I−SY
(5) 1 We denote with v (i) the i–th element of vector v, and with M (i, j) the element in the i-th row and j–th column of matrix M.
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
(n) ml,tdB
= (−1)
n
10 ln (10)
n Np Np p1 =1 p2 =1
···
Np pQ =1
n Πγl,tdB (p) ln Ωγl,tdB (p)
⎧ 2 ⎪ Hpi ⎪ ⎪ √ (p) = Π γ ⎪ l,t dB ⎪ π ⎨ i=1
⎛ ⎡ ⎞⎤ 2 2 ⎪ √ ⎪ ln (10) ⎪ ⎝ 2 ⎠⎦ ⎪ exp ⎣ Σ sq ⎪ Yl (i, j) xpj + μ Yl (i) ⎩ Ωγl,tdB (p) = 10 i=1 j=1
where μl,I−SY and σl,I−SY are the parameters of the approximating PDF, which are obtained via a moment matching in the logarithmic domain between γl,t and the approximating Log–Normal RV, i.e.,: ⎧ (1) ⎪ ⎨ μl,I−SY = mγl,t dB 2 (6) (1) ⎪ ⎩ σl,I−SY = m(2) − m γl,t dB γl,t dB (n)
n
n
where ml,tdB = (−1) E {[10 log10 (1/γl,t )] }, and E {·} denotes statistical expectation. From (5), (6), it turns out that the I–SY method requires the (n) computation of the log–moments ml,tdB of the power–sum 1/γl,t . These log–moments have been computed in closed– form for the first time in [32]. However, the framework therein can be only used for independent summands, and it needs to be generalized to the correlated scenario to be used in our context. As a matter of fact, in [37] correlation arises only due to the particular signal structure of FG relaying techniques, but shadow–fading is always assumed to be uncorrelated, as the analysis of the CSI and MRC setups in [37] can confirm. Moreover, the computed performance metrics are different. The generalization of I–SY method can be obtained by plugging into [32, Eq. (6)] the Moment Generating Function (MGF) of the power–sum of correlated Log–Normal RVs, which has been recently computed in [40, pp. 2694, Eq. (17)] by using GQR methods. By avoiding the lengthy but simple details of the analytical derivation due to space constraints, the final result is shown in (7) on top of this page, which yields (n) the n–th non–central moment ml,tdB when Q = 2. Moreover, 2 Np in (7) i) p is a vector with elements {pj }j=1 , ii) {xp }p=1 Np and {Hp }p=1 are zeros and weights of the Np –order Hermite polynomial [38, Table 25.10, pp. 924], and iv) Πγl,tdB (·) and Ωγl,tdB (·) are defined in (8) on top of this page, where 1/2 , and U and V are the matrices containing the Σ sq Yl = UV eigenvectors and eigenvalues of Σ Yl , respectively. Using Step 1, we can now approximate in closed–form the L PDF of {γl,t }l=1 via a Log–Normal RV. We observe that even though in [31] it is pointed out that a Log–Normal approximation for the Log–Normal power–sum may fail to be accurate in some circumstances, Step 1 needs to deal only with the power–sum of two correlated Log–Normal RVs. It is well– known in the literature (see, e.g., [32] and references therein for Log–Normal power–sum approximation) that non–Log– Normal approximation methods should to be preferred when the number of summands increases. So, in the present context a Log–Normal approximation seems to be a good compromise
(7)
(8)
in terms of approximation accuracy and simplicity. We will prove this claim in Section V, where Monte Carlo numerical simulations will be presented to substantiate the accuracy of our two–step method. 2) Step 2 – Pearson Type IV Approximation for γt : As L a result of the I–SY approximation for {γl,t }l=1 in Step 1, the computation of fγt (·) boils down to the estimation of the PDF of the power–sum of generically correlated Log– Normal RVs. However, in this case the number of RVs, i.e., L, involved in the summation is, in general, greater than two. As a consequence, to get very accurate results, we propose to use a non–Log–Normal approximation method to estimate fγt (·). Moving from the excellent matching accuracy at the PDF level shown by the P–IV method introduced in [32] for independent summands, we will generalize it to deal with correlated terms to be used in Step 2. The P-IV method allows to approximate the PDF of γt , fγt (·), as follows: 2 −m (10 log10 (ξ) + u) 10 h ∼ 1+ fγt (ξ) = ln (10) ξ d2 (9) !
10 log10 (ξ) + u −1 × exp −ν tan d where h is a normalization factor, and u, m, d, ν are the parameters that define the P–IV distribution [32]. These latter parameters can be computed from the non–central moments of RV γtdB = 10 log10 (γt ). Due to space constraints, we do not report in the present contribution the formulas that allow to obtain u, m, d, ν from the non–central moments, but they can be found in [32]. On the contrary, the most complicated task for this approximation is the computation of the non– (n) n central moments mtdB = E {[10 log10 (γt )] }, which cannot be directly derived from [32], [37], as a consequence of the L particular form taken by the end–to–end SNR {γl,t }l=1 in (2) for each sensing/reporting branch. (n)
From a formal point of view, mtdB can be obtained from (7) when Q = L, and by replacing (Πγl,tdB (·), Ωγl,tdB (·)) with (ΠγtdB (·), ΩγtdB (·)), respectively, which need to be computed. In particular, ΠγtdB (·) and ΩγtdB (·) can be written as shown in (10) on top of next page, where μ γt is the dB vector containing the first log–moment of γt , and Σ sq γtdB = 1/2 ˜ ˜ ˜ ˜ UV , with U and V being the matrices containing the eigenvectors and eigenvalues of Σ γtdB , which is the covariance L matrix of SNRs {γl,t }l=1 in the logarithmic domain, i.e.,
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
⎧ L ⎪ Hpi ⎪ ⎪ √ ΠγtdB (p) = ⎪ ⎪ π ⎨ i=1
⎛ ⎡ ⎞⎤ L L ⎪ √ ⎪ ln (10) sq ⎪ ⎝ 2 ⎪ exp ⎣ Σ γt (i, j) xpj + μ γt (i)⎠⎦ ⎪ ⎩ ΩγtdB (p) = dB dB 10 i=1 j=1
R γtdB (l, n) =
R γtdB
p1 =1 p2 =1 p3 =1 p4
' " 2 $ %& # $ %& # 1 ¯ ¯ ¯ ¯ ¯ ¯ (l, n) = Hp1 Hp2 Hp3 Hp4 · 10 log10 Ψ1 + Cl Ψ1 Ψ2 · 10 log10 Ψ3 + Cl Ψ3 Ψ4 π p1 =1 p2 =1 p3 =1 p4 =1 (13)
2 σl,SR ⎢ ρ σl,SR σl,RD l,{SR,RD} =⎢ ⎣ ρ{l,SR},{n,SR} σl,SR σn,SR ρ{l,SR},{n,RD} σl,SR σn,RD
ρl,{SR,RD} σl,SR σl,RD 2 σl,RD ρ{l,RD},{n,SR} σl,RD σn,SR ρ{l,RD},{n,RD} σl,RD σn,RD
L 10 log10 {γl,t }l=1 . In formulas, we have2 :
l=n=1
(1)
(1)
− ml,t · mn,tdB dB (1) = RγtdB (l, n) − ml,t
dB
(1)
· mn,tdB
(11)
From (11), L we can readily figure out that while the moments, μ γt (l) , in (10) can be obtained from (7) with Q = dB l=1 L L, the expression of the covariance, Σ γtdB (l, n) , is l,n=1
not available in the open technical literature for both the independent and correlated scenario, but needs to be obtained from the correlation matrix RγtdB . So, we need to derive it in closed–form in order develop our P–IV approximation to solve distributed data fusion problems. The final expression of RγtdB can be found in (12) and (13) on top of this page for CSI and FG relaying, respectively. √ In particular, in (12) and (13) μ −0.1 2 4j=1 Σ sq Zl,n (k,j)xpj +μ Zl,n (k) ¯ k = 10 we have defined Ψ with k = 1, 2, 3, 4, μ Zl,n (1) = μl,SR , μ Zl,n (2) = μl,RD , ¯ ¯ 1/2 , μ Zl,n (3) = μn,SR , μ Zl,n (4) = μn,RD , Σ sq Zl,n = UV ¯ and V ¯ are the matrices containing the eigenvectors and U eigenvalues of covariance matrix Σ Zl,n , which is defined in (14) on top of this page3 . Due to space constraints, the proof of (12), (13) is not shown in the present paper, but can be found in [41]. V. N UMERICAL AND S IMULATION R ESULTS The aim of this section is to analyze the accuracy of the proposed approximations to compute Pm , as a function of $ % that Σ γtdB (l, l) is the variance of 10 log10 γl,t , and can be obtained from (7) using its definition. 3ρ (a,b) is the correlation coefficient between link a and b 2 Note
ρ{l,SR},{n,SR} σl,SR σn,SR ρ{l,RD},{n,SR} σl,RD σn,SR 2 σn,SR ρ{n,SR},{n,RD} σn,SR σn,RD
⎤ ρ{l,SR},{n,RD} σl,SR σn,RD ρ{l,RD},{n,RD} σl,RD σn,RD ⎥ ⎥ ρ{n,SR},{n,RD} σn,SR σn,RD ⎦ 2 σn,RD (14)
the number of reporting dual–hop links (L), and shadowing correlation among them. In particular, Pm is obtained, via straightforward numerical integration techniques, from (1) by approximating the PDF of the SNR γt by using the two–step method described in Section IV-B. Analysis is compared with Monte Carlo simulations to assess the accuracy.
⎧ L $ %+ * (1) ⎪ ⎪ μ γt (l) = E 10 log10 γl,t = ml,t ⎪ dB ⎪ dB l=1 ⎪ L ⎪ * + $ % ⎪ ⎨ Σ γtdB (l, n) = E 10 log10 γl,t · 10 log10 (γn,t ) ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩
(12)
Np Np Np Np
⎡
Σ Zl,n
' " 2 $ %& # $ %& # 1 ¯ ¯ ¯ ¯ Hp1 Hp2 Hp3 Hp4 · 10 log10 Ψ1 + Ψ2 · 10 log10 Ψ3 + Ψ4 π =1
Np Np Np Np
(10)
With regard to the system setup, most settings are shown directly in the captions of figures, as the robustness of the approximations has been substantiated for several system setups and correlation values. However, in general, the common assumptions for every system setups are, unless otherwise stated, as follows. i) The detection/decision threshold λ is computed according to a Constant False Alarm (CFA) criterion [19] by + * using the formula for Pfa in (1) with Pfa = 10−3 , 10−4 . ii) In those scenarios where the shadowing is assumed to be identically distributed (but not necessarily uncorrelated), we denote with μ, σ, and ρ the mean, standard deviation, and correlation coefficient of the Log–Normal power gains in every wireless link, respectively. Moreover, in this scenario C is used to denote the constant for FG relaying. iii) N = 10. iv) Es /N0 = 0 dB. v) Np = 7. Finally, we note that for our numerical results we have chosen correlation coefficients that agree with those recently measured in [27]. In Figs. 2, 3, we have analyzed robustness and numerical accuracy of the proposed approximations for both setups available in the literature for ED (i.e., p = 1 and p = LN/2), as well as for different gains Gl (CSI, blind, and semi–blind setups) that the SUs might use to forward the signal to the fusion center on the reporting channel. Overall, we can observe a very good accuracy of the proposed approximation method for several system setups and Pfa requirements. In general, we observe that increasing the number, L, of SUs is useful only when shadowing on both sensing and reporting channels is uncorrelated. Otherwise, the performance degradation is significant and can limit the achievable Pm for a given
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
P = 0.001 − unbalanced means
P = 0.001 fa
0
−1
10
−1
−2
10
Pm
Pm
10
C=0.0 − ρ=0.0 C=2.5 − ρ=0.0 C=20.0 − ρ=0.0
−3
10
−4
10
fa
0
10
10
1
2
3
4
−3
ρ=0.0 ρ=0.1 ρ=0.3
10
−5
5
L
6
7
8
9
10
10
1
2
3
fa
L
6
7
8
9
10
fa
0
10
10
−1
−1
10 Pm
Pm
10
ρ=0.0 ρ=0.3 ρ=0.5
−2
10
−3
10
5
P = 0.001 − unbalanced standard deviations
P = 0.0001 0
4
1
2
ρ=0.0 ρ=0.1 ρ=0.3
−2
10
3
4
5
L
6
7
8
9
10
1 0 −1
Fig. 2. Probability of Miss Detection (Pm ), scenario with blind (top), semi–blind (bottom) relays, and p = 1. Comparison between Monte Carlo simulation (markers) and model (solid lines). System setup: i) μ = 10dB, and ii) σ = 6dB.
−3
10
1
2
3
4
5
L
6
7
8
9
10
1 01 0 −1
Fig. 4. Probability of Miss Detection (Pm ), scenario with CSI–assisted relays and p = 1. Comparison between Monte Carlo simulation (markers) and model (solid lines) for unbalanced system setups. (top) System setup: i) μ ∼ U (10, 20) dB, and ii) σ = 6dB. (bottom) System setup: i) μ = 12dB, and ii) σ ∼ U (3, 9) dB.
P = 0.001 fa
0
P = 0.001 − unbalanced correlation coefficients
10
fa
0
10
−1
10
−3
ρ=0.0 ρ=0.3 ρ=0.5
10
−4
10
−5
10
1
2
−1
10 3
4
5
L
6
7
8
9
10
Pfa = 0.0001
0
Pm
Pm
−2
10
10
Pm
ρ=0.0 ρ=0.3 ρ=0.5
−2
−3
1
2
=0.0, ρ
SR
10
10 10
ρ
−2
−1
10
ρ
=0.0, ρ
SR
3
4
5
L
6
7
8
9
10
=0.2, ρ
RD
=0.0
SD
ρSR=0.2, ρRD=0.2, ρSD=0.2
−3
10
requirement of Pfa . We observe that the setups p = 1 and p = LN/2 yield, in general, very different performance, but our framework can track both of them. Finally, let us note that in Fig. 2 we have also verified the accuracy for different values of C when blind relays are considered. We observe a good accuracy in a wide range of values of this parameter. Moreover, when C = 0 the system setup boils down to the classical system configuration used in most literature with ideal reporting channel [23]. As expected, in this case the system yields the best performance, as neither noise accumulation at the SUs nor channel fading on the reporting channel are considered. In other words, this figure clearly shows that, even in the absence of shadowing correlation, considering a more realistic setup for data reporting to the fusion center can yield a non–negligible performance drop. Finally, in Fig. 4, 5 we have analyzed a more realistic system setup where all nodes in the network do not have the same view of it, thus possibly experiencing unbalanced shadowing conditions and correlation coefficients. In order to simulate arbitrary unbalanced system setups, when the
=0.0
SD
ρSR=0.2, ρRD=0.2, ρSD=0.0
1 0 −1
Fig. 3. Probability of Miss Detection (Pm ), scenario with CSI (top), semi– blind (bottom) relays, and p = LN/2. Comparison between Monte Carlo simulation (markers) and model (solid lines). System setup: i) μ = −2dB, and ii) σ = 6dB.
=0.0, ρ
RD
ρSR=0.2, ρRD=0.0, ρSD=0.0
1
2
3
4
5
6
7
8
9
10
1 0 −1
L
Fig. 5. Probability of Miss Detection (Pm ), scenario with CSI–assisted relays and p = 1. Comparison between Monte Carlo simulation (markers) and model (solid lines) for unbalanced correlation coefficients. System setup: i) μ = 12dB, and ii) σ ∼ U (3, 6) dB.
shadowing parameters are not fixed and the same in all links, we have extracted them from uniform RVs, i.e., c ∼ U (a, b) in the figures means that c is uniformly distributed in the interval [a, b]. In particular, in Fig. 4 we can observe the effect, on the system performance, of having unbalanced means and standard deviations, when all links have the same correlation coefficient. We can see a very good agreement of our framework with Monte Carlo simulations, even for the scenario with unbalanced standard deviations, which is, in general, the most complicated to be modeled [37]. Finally, in Fig. 5 we have investigated the most important system setup: we have analyzed the effect of different correlation coefficients on the wireless links, as well as considered unbalanced standard deviations. Since the number of possibilities to analyze is large, we have considered three sets of correlation coefficients: i) the correlation coefficient of wireless links in the sensing channel, which is denoted by ρSR , ii) the correlation coefficient of wireless links in the reporting channel, which is denoted by ρRD , and iii) the correlation coefficient between a wireless
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.
link in the sensing channel and a wireless link in the reporting channel, which is denoted by ρSD . The most important result shown in Fig. 5 is as follows: we can see that even though the observations sensed by the SUs are independent, i.e., ρSR = 0, (which offers the best diversity gain for the classical system setup), the reporting channel might degrade the system performance due to shadowing effects that might make the data reported to the fusion center correlated, i.e., ρRD = 0. In other words, when considering a realistic system setup, shadowing correlation on the reporting channel can yield similar performance degradations as shadowing correlation on the sensing channel. So, uncorrelated observations might become correlated due to reporting operations regardless of the degree of correlation of SUs’ observations. This is an important result as it shows that, for the accurate analysis and design of decentralized data fusion problems, the reporting channel should be carefully taken into account, as well as good reporting strategies should be designed. Moreover, we can also observe from Fig. 5 a very good match of our framework in a very challenging setup for Log–Normal power– sum approximation, i.e., unbalanced standard deviations and unbalanced correlation coefficients. Finally, we can readily figure out how the system performance get worse when more links get correlated. VI. C ONCLUSIONS In this paper, we have provided an advanced framework for the analysis and design of cooperative spectrum problems over realistic sensing and reporting channels, which might experience correlated Log–Normal shadow–fading. Besides having shown the good accuracy, with a moderate computational complexity, of the analytical framework proposed for performance analysis, we have also highlighted the deleterious effects of correlated Log–Normal shadowing on the reporting channel, which might yield similar performance degradations as shadowing correlation on the sensing channel. R EFERENCES [1] J. Mitola III, G. Q. Maguire Jr., “Cognitive radio: making software radios more personal”, IEEE Personal Commun., pp. 13–18, Aug. 1999. [2] I. F. Akyildiz, et al., “A survey on spectrum management in cognitive radio networks”, IEEE Commun. Mag., vol. 46, pp. 40–48, Apr. 2008. [3] D. Cabric, et. al., “Spectrum sharing radios”, IEEE Circuits Syst. Mag., vol. 6, pp. 30–45, 2006. [4] I. F. Akyildiz, et. al., “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey”, Computer Networks, vol. 50, pp. 2127–2159, May 2006. [5] A. Goldsmith, et. al., “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective”, Proc. IEEE, vol. 97, pp. 894–914, May 2009. [6] D. Cabric, S. M. Mishra, R. W. Brodersen, “Implementation issues in spectrum sensing for cognitive radios”, IEEE Asilomar SSC, Nov. 2004. [7] K. B. Letaief, W. Zhang, “Cooperative spectrum sensing”, Cognitive Wireless Communication Networks, Springer, pp. 115–138, Oct. 2007. [8] D. Cabric, “Cognitive radios: System design perspective”, Ph.D. Dissertation, Univ. of California, Berkeley, Fall 2007. [9] F. F. Digham, M.–S. Alouini, M. K. Simon, “On the energy detection of unknown signals over fading channels”, IEEE Trans. Commun., vol. 55, pp. 21–24, Jan. 2007. [10] S. M. Mishra, A. Sahai, R. W. Brodersen, “Cooperative sensing among cognitive radios”, IEEE ICC, June 2006. [11] D. Cabric, A. Tkachenko, R. W. Brodersen, “Experimental study of spectrum sensing based on energy detection and network cooperation”, ACM TAPAS, Aug. 2006. [12] C. Sun, W. Zhang, K. B. Letaief, “Cluster–based cooperative spectrum sensing in cognitive radio systems”, IEEE ICC, June 2007. [13] J. Unnikrishnan, V. V. Veeravalli, “Cooperative sensing for primary detection in cognitive radio”, IEEE J. Sel. Topics Signal Process., vol. 2, pp. 18–27, Feb. 2008.
[14] J.–F. Chamberland, V. V. Veeravalli, “Wireless sensors in distributed detection applications”, IEEE Signal Process. Mag., vol. 24, pp. 16–25, May 2007. [15] V. R. Kanchumarthy, R. Viswanathan, M. Madishetty, “Impact of channel errors on decentralized detection performance of wireless sensor networks: A study of binary modulations, Rayleigh–fading and nonfading channels, and fusion–combiners”, IEEE Trans. Sig. Process., vol. 56, pp. 1761–1769, May 2008. [16] Z. Quan, S. Cui, A. H. Sayed, “Optimal linear cooperation for spectrum sensing in cognitive radio networks”, IEEE J. Sel. Topics Signal Process., vol. 2, pp. 28–40, Feb. 2008. [17] L. Chen, J. Wang, S. Li, “Cooperative spectrum sensing with multi–bits local sensing decisions in cognitive radio”, IEEE WCNC, Apr. 2008. [18] A. Ghasemi, E. S. Sousa, “Asymptotic performance of collaborative spectrum sensing under correlated Log–Normal shadowing”, IEEE Commun. Lett., vol. 11, pp. 34–36, Jan. 2007. [19] –, “Opportunistic spectrum access in fading channels through collaborative sensing”, IEEE J. of Commun., vol. 2, pp. 71–82, Mar. 2007. [20] F. Visser, G. Janssen, P. Pawelczak, “Multinode spectrum sensing based on energy detection for dynamic spectrum access”, IEEE VTC, May 2008. [21] W. Zhang, R. K. Mallik, K. B. Letaief, “Cooperative spectrum sensing optimization in cognitive radio networks”, IEEE ICC, May 2008. [22] J. Ma, G. Zhao, Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks”, IEEE Trans. Wireless Commun., vol. 7, pp. 4502–4507, Nov. 2008. [23] M. Di Renzo, F. Graziosi, F. Santucci, “Cooperative spectrum sensing in cognitive radio networks over correlated Log–Normal shadowing”, IEEE VTC, Apr. 2009. [24] W. Zhang, K. B. Letaief, “Cooperative spectrum sensing with transmit and relay diversity in cognitive radio networks”, IEEE Trans. Wireless Commun., vol. 7, pp. 4761–4766, Dec. 2008. [25] D. Kotz, et. al., “Experimental evaluation of wireless simulation assumptions”, ACM MSWiM, Oct. 2004. [26] C. Newport, et. al., “Experimental evaluation of wireless simulation assumption”, Simulation, vol. 83, pp. 643–661, Sept. 2007. Online version: http://cmc.cs.dartmouth.edu/cmc/papers/kotz:axioms-tr2.pdf. [27] P. Agrawal, N. Patwari, “Correlated link shadow fading in multi–hop wireless networks”, Tech. Report arXiv:0804.2708v2, Apr. 2008. [28] R. Tandra, A. Sahai, “SNR walls for signal detection”, IEEE J. Sel. Topics Signal Process., vol. 2, pp. 4–17, Feb. 2008. [29] J. N. Laneman, D. Tse, G. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior”, IEEE Trans. Inform. Theory, vol. 50, pp. 3062–3080, Dec. 2004. [30] G. Ganesan, Y. Li, “Cooperative spectrum sensing in cognitive radio, Part I: Two user networks; Part II: Multiuser networks”, IEEE Trans. Wireless Commun., vol. 6, pp. 2204–2222, June 2007. [31] M. Di Renzo, F. Graziosi, F. Santucci, “Approximating the linear combination of Log–Normal RVs via Pearson type IV distribution for UWB performance analysis”, IEEE Trans. Commun., vol. 57, pp. 388– 403, Feb. 2009. [32] –, “Further results on the approximation of Log–Normal power sum via Pearson type IV distribution: A general formula for log–moments computation”, IEEE Trans. Commun., vol. 57, pp. 893–898, Apr. 2009. [33] M. O. Hasna, M.–S. Alouini, “End–to–end performance of transmission systems with relays over Rayleigh–fading channels”, IEEE Trans. Wireless Commun., vol. 2, pp. 1126–1131, Nov. 2003. [34] –, “A performance study of dual–hop tranmission with fixed gain relays”, IEEE Trans. Wireless Commun., vol. 3, pp. 1963–1968, Nov. 2004. [35] H. Kim, K. Shin, “In–band spectrum sensing in cognitive radio networks: energy detection or feature detection?”, ACM MobiCom, Sept. 2008. [36] Z. Ye, G. Memik, J. Grosspietsch, “Energy detection using estimated noise variance for spectrum sensing in cognitive radio networks”, IEEE WCNC, Apr. 2008. [37] M. Di Renzo, F. Graziosi, F. Santucci, “Performance of cooperative multi–hop wireless systems over Log–Normal fading channels”, IEEE GLOBECOM, Nov. 2008. [38] M. Abramowitz, I. A. Stegun, Handbook of mathematical functions with formulas, graphs, and mathematical tables, NY, 9th ed., 1972. [39] S. C. Schwartz, Y. S. Yeh, “On the distribution function and moments of power sums with log–normal components”, Bell Syst. Tech. J., vol. 61, pp. 1441–1462, Sept. 1982. [40] N. B. Mehta, et al., “Approximating a sum of random variables with a lognormal”, IEEE Trans. Wireless Commun., vol. 6, pp. 2690–2699, July 2007. [41] M. Di Renzo, L. Imbriglio, F. Graziosi, F. Santucci, “Distributed data fusion over realistic sensing and reporting channels: Application to cooperative spectrum sensing among cognitive radios over correlated Log–Normal shadowing”, IEEE Trans. Wireless Commun., under second revision, July 2009.
978-1-4244-4148-8/09/$25.00 ©2009 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2009 proceedings.