Dynamic Spectrum Access: From the Concept to ... - Semantic Scholar

2 downloads 0 Views 5MB Size Report
Oct 18, 2010 - Zhiqiang Liu, USA. Steven McLaughlin, UK .... transmission statistics of the Primary User (PU) is considered in this paper. When the spectrum is ...
EURASIP Journal on Wireless Communications and Networking

Dynamic Spectrum Access: From the Concept to the Implementation Guest Editors: André Bourdoux, Danijela Cabric, Gianluigi Ferrari, François Horlin, and Zhi Tian

Dynamic Spectrum Access: From the Concept to the Implementation

EURASIP Journal on Wireless Communications and Networking

Dynamic Spectrum Access: From the Concept to the Implementation Guest Editors: Andr´e Bourdoux, Danijela Cabric, Gianluigi Ferrari, Franc¸ois Horlin, and Zhi Tian

Copyright © 2010 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in volume 2010 of “EURASIP Journal on Wireless Communications and Networking.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Editor-in-Chief Luc Vandendorpe, Universit´e catholique de Louvain, Belgium

Associate Editors T. D. Abhayapala, Australia M. H. Ahmed, Canada Farid Ahmed, USA Carles Anton-Haro, Spain A. C. Boucouvalas, Greece Lin Cai, Canada Yuh Shyan Chen, Taiwan Pascal Chevalier, France C.-C. Chong, Republic of Korea Nicolai Czink, Austria S. Dasgupta, USA Rodrigo C. De Lamare, UK Ibrahim Develi, Turkey Petar M. Djuric, USA A. O. Fapojuwo, Canada Michael Gastpar, USA A. Gershman, Germany Wolfgang H. Gerstacker, Germany David Gesbert, France

Zabih F. Ghassemlooy, UK Jean-marie Gorce, France Fabrizio Granelli, Italy Christian Hartmann, Germany Stefan Kaiser, Germany George K. Karagiannidis, Greece Chi Chung Ko, Singapore Nicholas Kolokotronis, Greece Richard Kozick, USA Sangarapillai Lambotharan, UK Vincent Lau, Hong Kong David I. Laurenson, UK Tho Le-Ngoc, Canada Tongtong Li, USA Wei Li, USA Zhiqiang Liu, USA Steven McLaughlin, UK Sudip Misra, India I. Moerman, Belgium

Marc Moonen, Belgium Sayandev Mukherjee, USA Kameswara Rao Namuduri, USA Amiya Nayak, Canada Monica Nicoli, Italy Claude Oestges, Belgium Ashish Pandharipande, The Netherlands Jordi P´erez-Romero, Spain Phillip Regalia, France George S. Tombras, Greece A. Vasilakos, Greece Ping Wang, Canada Weidong Xiang, USA Xueshi Yang, USA Kwan L. Yeung, Hong Kong Fei Richard Yu, Canada W. Zhuang, Canada

Contents Dynamic SpectrumAccess: From the Concept to the Implementation, Andr´e Bourdoux, Danijela Cabric, Gianluigi Ferrari, Franc¸ois Horlin, and Zhi Tian Volume 2010, Article ID 654395, 2 pages Spectrum Sensing for Cognitive Radios with Transmission Statistics: Considering Linear Frequency Sweeping, Sithamparanathan Kandeepan, Radoslaw Piesiewicz, Tuncer C. Aysal, Abdur Rahim Biswas, and Imrich Chlamtac Volume 2010, Article ID 123674, 13 pages Cyclostationarity Detectors for Cognitive Radio: Architectural Tradeoffs, Dominique Noguet, Lionel Biard, and Marc Laugeois Volume 2010, Article ID 526429, 8 pages Higher-Order Cyclostationarity Detection for Spectrum Sensing, Julien Renard, Jonathan Verlant-Chenet, Jean-Michel Dricot, Philippe De Doncker, and Francois Horlin Volume 2010, Article ID 721695, 10 pages Probabilistic Coexistence and Throughput of Cognitive Dual-Polarized Networks, J.-M. Dricot, G. Ferrari, A. Panahandeh, Fr. Horlin, and Ph. De Doncker Volume 2010, Article ID 387625, 15 pages Admission Control and Interference Management in Dynamic Spectrum Access Networks, Jorge Martinez-Bauset, Vicent Pla, M. Jose Domenech-Benlloch, and Diego Pacheco-Paramo Volume 2010, Article ID 708029, 11 pages The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow, Gaoning He, Laura Cottatellucci, and M´erouane Debbah Volume 2010, Article ID 482975, 13 pages

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 654395, 2 pages doi:10.1155/2010/654395

Editorial Dynamic Spectrum Access: From the Concept to the Implementation Andr´e Bourdoux,1 Danijela Cabric,2 Gianluigi Ferrari,3 Franc¸ois Horlin,4 and Zhi Tian5 1 Interuniversity

Microelectronics Center (IMEC), 3001 Leuven, Belgium of California, Los Angeles (UCLA), Los Angeles, CA 90024, USA 3 University of Parma, 43121 Parma, Italy 4 Universit´ e Libre de Bruxelles (ULB), 1050 Bruxelles, Belgium 5 Michigan Technological University, Houghton, MI 49931, USA 2 University

Correspondence should be addressed to Franc¸ois Horlin, [email protected] Received 18 October 2010; Accepted 18 October 2010 Copyright © 2010 Andr´e Bourdoux et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

We are today witnessing an explosive growth in the deployment of wireless communication services. At the same time, wireless system designers are facing the continuously increasing demand for capacity and mobility required by the new user applications. The scarcity of the radio spectrum, densely allocated by the regulators, is a major bottleneck in the development of new wireless communications systems. However actual spectrum occupancy measurements show that the frequency band scarcity is not a result of the heavy usage of the spectrum but is rather due to the inefficient static frequency allocation pursued by the regulators. Dynamic spectrum access, also generally referred to as cognitive radios, has been proposed as a new technology to resolve this paradox. Sparse assigned frequency bands are opened to secondary users, provided that interference generated on the primary licensee is negligible. Even if the concept constitutes a real paradigm shift, it is still unclear how the dynamic spectrum access can operate efficiently and how it can be implemented cost-effectively. The goal of this special issue has been to solicit highquality unpublished research papers on the spectrum sensing and access, the intelligence and learning capability, and implementation aspects of communication systems relying on dynamic spectrum access. Based on the 16 submitted manuscripts, six papers have been accepted, which will be summarized briefly in this paper. Spectrum sensing techniques have been heavily discussed and treated in the literature. Their performance in a noisy

environment is measured in terms of the probability of false alarm and the probability of miss detection. A radiometer (also called energy detector) can be used to detect completely unknown signals in a frequency band. Unfortunately when the primary user bandwidth is much smaller than the cognitive radio spectrum sensing frequency range, scanning a wide range of frequencies can be time consuming. In their paper, S. Kandeepan et al. propose to make use of the primary user time-domain spectral occupancy statistics to enhance the performance of the wideband energy detector. They assume that the primary user spectral occupancy can be modeled with a Poisson law and derive analytically the minimum required sensing time for the cognitive radio to detect the primary user. The energy detector is historically the oldest and simplest detector, and it achieves good performance when the signalto-noise ratio is strong enough. Unfortunately, since it is based on the estimation of the in-band noise power spectral density, it is affected by the noise level uncertainty due to measurement errors or a changing environment, especially at low signal-to-noise ratio. Cyclic feature detectors rely on the hidden periodicities such as the carrier frequency, the symbol rate, or the chip rate hidden in man-made communications signals, that can be extracted based on nonlinear operations of the nth order (order equal to or larger than 2). Cyclostationarity detectors perform better than energy detectors in low signal-to-noise ratio environments. In their paper, D. Noguet et al. analyze the architectural trade-offs that the cognitive radio system designer has to

2

EURASIP Journal on Wireless Communications and Networking

face when implementing a second-order cyclostationarity detector in two dedicated scenarios: the secondary ISM band usage assuming that the primary system is an IEEE 802.11a/g wireless local area network, the secondary TV band usage assuming that the primary system is a DVB-T broadcast system. In the first case, low-latency detection is required, while low-signal-to-noise-ratio detection is required in the second case. Higher-order (order larger than 2) cyclostationarity detectors are generally more complex, and since the variance of the estimators increases when the order rises, most research results concern second-order detectors. Nevertheless, J. Renard et al. demonstrate in their paper that it is possible to derive a fourth-order detector that bears comparable performances to second-order ones to detect linearly modulated signals. Conventionally the physical resources are defined in the time/frequency plan. However when antenna arrays are deployed on the communicating terminals, the definition of the physical resources can be extended to the spatial dimension. J.-M. Dricot et al. propose to further exploit the polarimetric dimension to discriminate the primary and secondary communications. They establish a theoretical model of the interference in dual-polarized networks and derive a closedform expression of the primary link probability of outage due to interference. They theoretically prove that polarimetric diversity can increase the transmission rates for secondary terminals while, at the same time, can significantly reduce the primary exclusive region. Once the knowledge about the spectrum availability has been acquired through spectrum sensing techniques, the access to the frequency resources must be managed. The main issue comes from the dynamism in the resource availability which cannot ensure the viability of the secondary network communication. Blocking the request of a new secondary user session can be employed as a strategy to reduce the number of forcedly terminated secondary user sessions and the interference caused to primary users. J. Martinez-Bauset et al. evaluate how the fractional guard channel reservation scheme, proposed initially for cellular networks, can be used to give priority to spectrum hand-overs over new arrivals. They propose an adaptive admission control scheme able to limit simultaneously the forced termination probability of secondary users and the probability of interference on the primary network. Resource allocation among different communication links is finally another important issue. In their paper, G. He et al. investigate the power allocation in the downlink of small-cell networks, recognized as an effective and lowcost architecture to provide wireless data access to mobile users. Since the base stations of small-cell networks may belong to different service providers eventually organized in coalitions to maximize their own revenues, there is a critical trade-off between cooperation and competition among the providers. The paper proposes to rely on the game theory as an efficient framework to develop decentralized and/or distributed algorithms for resource allocation. They model

the small cells of different operators as players who adaptively and rationally choose their power levels. Andr´e Bourdoux Danijela Cabric Gianluigi Ferrari Franc¸ois Horlin Zhi Tian

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 123674, 13 pages doi:10.1155/2010/123674

Research Article Spectrum Sensing for Cognitive Radios with Transmission Statistics: Considering Linear Frequency Sweeping Sithamparanathan Kandeepan, Radoslaw Piesiewicz, Tuncer C. Aysal, Abdur Rahim Biswas, and Imrich Chlamtac Create-Net International Research Centre, Cognitive Information Networks (CoIN) Group, Povo 38123, Trento, Italy Correspondence should be addressed to Sithamparanathan Kandeepan, [email protected] Received 28 September 2009; Revised 8 January 2010; Accepted 6 March 2010 Academic Editor: Gianluigi Ferrari Copyright © 2010 Sithamparanathan Kandeepan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The spectrum sensing performance of Cognitive Radios (CRs) considering noisy signal measurements and the time domain transmission statistics of the Primary User (PU) is considered in this paper. When the spectrum is linearly swept in the frequency domain continuously to detect the presence of the PU the time-domain statistics of the PU plays an important role in the detection performance. This is true especially when the PU’s bandwidth is much smaller than the CR’s scanning frequency range. We model the transmission statistics that is the temporal characteristics of the PU as a Poisson arrival process with a random occupancy time. The spectrum sensing performance at the CR node is then theoretically analyzed based on noisy envelope detection together with the time domain spectral occupancy statistics. The miss detection and false alarm probabilities are derived from the considered spectral occupancy model and the noise model, and we present simulation results to verify our theoretical analysis. We also study the minimum required sensing time for the wideband CR to reliably detect the narrowband PU with a given confidence level considering its temporal characteristics.

1. Introduction The Cognitive Radio (CR) concept is being under deep consideration to opportunistically utilize the electromagnetic spectrum for efficient radio transmission [1–4]. The CR basically acts as a secondary user of the spectrum allowing the incumbent (primary) users of the spectrum to have higher priority for spectrum utilization. The notion of efficient spectrum utilization has also attracted the radio spectrum regulatory bodies around the world [5, 6] to further investigate the technology. The secondary users therefore need to learn the environment in the presence of any primary users (PUs) and keep track of them to ensure that it does not interfere with the PU. Learning the environment and performing radio scene analysis (RSA) becomes a challenging and an essential task for the CR to successfully perform secondary communication with reduced interference to the PU. Reliably performing the RSA is quite important in order to avoid interfering with the PU’s communications and also to satisfy the regulatory

requirements. To perform such an RSA, the CR nodes need to sense the spectrum continuously in the time, frequency, and spatial domains. Spectrum sensing therefore, amongst many, is one of the key functionalities of a CR in order to perform (RSA) of the communication environment. 1.1. Problem Statement. In the recent years, Ultra Wideband (UWB) technology has emerged as one of the key candidates for CR based secondary user communications [7, 8]. When UWB technology is used as CRs for secondary communications, it is required to scan the entire spectrum from 2.9 GHz–10 GHz (in many cases a significant portion of it) to detect the presence of any PUs in the network. In such situations, scanning a wide range of frequencies (7 GHz) can be a time consuming process and hence a narrow band PU, which has a bandwidth much smaller than the UWB node, can be gone undetected when the UWB-CR node is scanning a large portion of the spectrum. It is obvious to state that such miss detection depends on the PU’s transmission statistics, or in other words the Spectral occupancy Statistics

2

EURASIP Journal on Wireless Communications and Networking

(SoS) as well as the spectrum sniffing hardware unit of the UWB-CR node and the corresponding time required to sense the spectrum. Such a problem is considered to be a crucial one to be solved by many researchers and engineers working in this filed, such as in the European Union funded 20 MEuros project on EUWB [8]. The problem defined here is not specific to UWB based CR systems only, but in general it applies to any CR systems with a bandwidth much larger than the bandwidth of the potential victim services (i.e., the PUs) in the network. 1.2. Literature Review. Spectrum sensing techniques have been heavily discussed and treated in the literature and one could refer to [3, 4, 9–28] for further reading. The performance of different spectrum sensing techniques are measured in terms of the probability of false alarm and the probability of miss detection for noisy sensing. In our work however, in addition to noisy sensing, we also include the SoS (i.e., the temporal characteristics) of the PU and analyze the detection performance of the CR nodes for wideband sensing. In order to perform theoretical analysis some mathematical models should be followed for the temporal characteristics of the PU. The Poisson model for the arrival process is the most common model used in the research literature for theoretical derivations and performance analysis [29–40], and also recommended in the International Telecommunication Union’s (ITU) handbook on Teletraffic Engineering [32]. Moreover, Poisson models are also verified for several cases [34–40], especially for the Internet traffic when the load is higher [34]. Therefore, we adopt such a model in our work. It should be noted that there also exist empirical models for various traffic sources [29, 30, 30, 31, 31–44] and for various radio access technologies mostly derived from the Poisson arrival process. Furthermore, the authors in [21] have used the Poisson traffic model to design an admission controller for the CR node to improve the Quality of Service (QoS) for secondary transmissions. In [22], for Poisson based PU traffic, the authors have studied by means of simulations the tradeoff between sensing time and the achievable throughput by considering the probability of collision. The Poisson traffic model is also used in [23, 24] to derive a-priori probability based detection schemes for spectrum sensing and have presented some numerical results on the improvement over the traditional energy-based detection [45] and the classical Maximum Likelihood- (ML-) based detection techniques [46], respectively. A channel selection scheme for CR nodes for a multichannel multiuser environment is also proposedbased on Poisson traffic model in [25], and recently in [26, 27] we have studied the performance of shared spectrums sensing for UWB-based CR assuming the Poisson model for the PU. Furthermore, moving away from the Poisson based theoretical model, the authors in [47] have analyzed the performances of dynamic spectrum access techniques based on experimentally measured spectrum occupancy statistics. 1.3. Contribution. In this paper, we study the performance of detecting the PU based on its time domain SoS, by classifying them as light, average or heavy users of the spectrum,

together with noisy sensing at the CR nodes. We mainly consider the case where the PU bandwidth is much smaller than the CR’s spectrum scanning frequency range. Though the references in [22–26] have considered the Poisson model for the PU channel SoS they have presented mainly some simulation results to analyze the performances of the the CR node for spectrum sensing and channel occupancy efficiency. In our work presented here, we perform some detailed theoretical analysis of the performance of PU detection, based on an envelope-based energy detector, by initially considering the transmission statistics only case and then together with the sensing noise. The theoretical anaylses are also verified by simulations. We also study the minimum required sensing time for the CR node to reliably detect the narrow band PU given its temporal characteristics. 1.4. Paper Organization. The rest of the paper is organized as follows. In Section 2, we provide the model for the CR network, and in Section 3, we derive the Poisson arrival model for the PU’s transmission statistics from the fundamentals. In Section 4, we provide the signal envelope based spectrum sensing technique followed by some theoretical analysis on the detection performances for the noiseless case with a constant channel occupancy (hold) time in Section 5. In Section 6, we present a PU detection risk analysis based on the transmission statistics (Poisson process) of the PU. In Section 7, we present the detection performance considering noise, and in Section 8, we extend the analysis for a random channel occupancy (hold) time. In Section 9, we present the sensing time requirements for the CR based on the SoS of the PU, and finally we make some concluding remarks in Section 10.

2. Cognitive Radio-System Model The CR network model is presented in this section. We define the following parameters for the wideband sensing CR nodes and the PU in the network. For the PU, we define Bw as its transmission bandwidth, Δ as the time duration between transmissions (spectrum idle time) that is calculated from the end to the beginning of two successive transmissions, and τ as the PU’s transmission duration (spectrum hold/busy time) per transmission. For the CR node, we define W as the total observation bandwidth to sweep, and Tw as the total time to linearly sweep the observation bandwidth W. Linear sweeping is defined by having some constant rate for sweeping the frequency, or in other words the time to sweep a range of frequencies is proportional to the same range of frequencies. Figure 1 depicts the above parameters and also shows the frequency-time observation plot which explains the spectrum scanning process of the wideband sensing CR node. As depicted in the figure, the cognitive radio scans the entire spectrum linearly at a rate of W/Tw . Using such a linear frequency sweeping process, given that the PU is transmitting, the CR node can only detect the PU during its mth scan within the time slot (only) from t1m = t0 + f1 Tw /W + (m − 1)Tw and t2m = t0 + f2 Tw /W + (m − 1)Tw , where t0 is an arbitrary real constant, f1 and f2 are the edge frequencies of the transmission bandwidth of the PU with m = 1, 2, . . .,

EURASIP Journal on Wireless Communications and Networking

3

PU transmission time line CR’s linear spectrum scanning process

Frequency - f

10 GHz W

τ

f2

Δ

Bw f1

3 GHz

(m − 1)th scan

t0

mth scan t1m

Tw

(m + 1)th scan Time-t

t2m

No transmission PU transmission

and f1 < f2 . Below, we summarize the abovementioned parameters: (i) Bw —PU transmission bandwidth,

The presence of a PU in the network is defined by the hypotheses H0 and H1 , as described in (1). Given that the PU is detected during the mth scan, the CR decides upon H1 for the entire period of the scan before reinitializing it back to H0 for the successive scan (i.e., (m + 1)th scan). The hypothetical decision dm made by the CR node at the end of every scan for the particular PU within the frequency band of f1 and f2 in the absence of noise can be mathematically defined as follows: ⎧ ⎪ 0, ⎪ ⎪ ⎪ ⎪ ⎨

dm = ⎪ ⎪ ⎪1, ⎪ ⎪ ⎩

H0 H1

CR does not detect any   PU transmissions ∀t ∈ t1m , t2m , CR detects a PU transmission   for some t ∈ t1m , t2m .

(1)

A more generic detection model considering the PU SoS together with the sensing noise at the CR node is provided in Section 4. The PU’s transmission is modeled as a Poisson arrival process. Therefore, Δ follows an exponential distribution [30] with a mean time between transmission given

er us

(vi) t1m , t2m —start and end times of scanning the PU bandwidth by the CR node, as shown in Figure 1, during the mth iteration.

vy ea H

(v) Tw —average time to scan the frequency band W by the CR node,

r se tu

(iv) W—total bandwidth to be scanned by the CR node,

τ L /Tw

gh Li

(iii) f1 , f2 —edge frequencies of the PU transmission bandwidth ( f1 < f2 ),

τ H /Tw

r se eu ag er Av

(ii) Δ, τ—time duration between successive transmissions, and the time duration of transmission of the PU, respectively,

Hold time/scanning duration (τ/TW )

Figure 1: Linear ultra wideband spectrum scanning process for detecting a narrow band primary user: The frequency versus time plot.

Tw /ΔLa

Tw /ΔH a

Scanning duration/mean arrival time (TW Δa )

Figure 2: Spectrum occupancy levels of the primary user based on the Poisson arrival process.

by Δa . We validate the Poisson arrival model for the CR network that we consider here by referring back to Section 1: Literature Review. In other words, the CR network model considered here has a PU delivering Poissonian traffic to the network within its frequency band. Initially, we treat the transmission duration (hold time) τ of the PU as a constant to simplify the analysis and then in Section 8 we extend the analysis to a random transmission duration τ by modeling it as a random process. Furthermore, based on the values of Δa and τ we can characterize the spectral occupancy levels of a PUs as light, average, or heavy users. Figure 2 depicts the spectral occupancy levels of a PU based on their traffic characteristics. In the figure, we further see that the pairs {ΔLa , τ L } and H {Δ H a , τ } separate the occupancy level regions of the PUs as light, average, or heavy. Corresponding to the occupancy levels, we also characterize the risk of miss detecting the PU as High Risk, Medium Risk, and Low Risk regions, respectively.

4

EURASIP Journal on Wireless Communications and Networking

For analytical purposes, the risk regions for miss detecting the PU are defined by (i) high risk region (light user); for 0 < Tw /Δa < Tw /ΔLa and 0 < τ/Tw < τ L /Tw , (ii) medium risk region (average user); for Tw /ΔLa < L H Tw /Δa < Tw /ΔH a and τ /Tw < τ/Tw < τ /Tw , (iii) low risk region (heavy user); for Tw /ΔH a < Tw /Δa and τ H /Tw < τ/Tw . In later sections, by using the detection probabilities derived from our theoretical analyses, we present numerical L H values for ΔLa , ΔH a , τ , and τ .

3. Primary User Spectral Occupancy Statistics To define the primary user’s spectral occupancy statistics based on the Poisson arrival process we state (consider) some axioms. It is important to note that these axioms are the fundamentals in defining the Poisson arrival process in general, and based on these axioms we then analyze the spectrum sensing detection performances considering the spectral occupancy model of the PU. Let N(t) be the number of times that the PU has been present in the network (number of transmissions) up to time t, where t ∈ R, the axioms are then defined as in [46]. Axiom 1. At time t = 0, the PU has got no occupancy of the spectrum at all. That is, N(0) = 0. Axiom 2. Incremental independency and stationarity of N(t). That is, if J1 = N(t2 ) − N(t1 ) and J2 = N(t4 ) − N(t3 ) for some t1 , t2 , t3 , t4 ∈ t such that t1 < t2 < t3 < t4 , then J1 and J2 are independent. Further, if t4 − t3 = t2 − t1 , then J1 and J2 have the same statistical distributions. The Poisson distribution for the arrival process is then given by P[N(t) = n] = exp(−λt)

(λt)n , n!

(2)

where n = 0, 1, 2, . . . and λ = 1/Δa is the mean arrival (spectral occupancy) rate of the PU. On the other hand, the occupancy time τ of the PU is initially considered to be a constant. Such a model essentially creates an M/D/1 arrival model considering a single CR and single PU system with a Poissonian arrival (M) and a deterministic (D) occupancy time. In later sections, we extend this to an M/M/1 arrival model by considering an exponential distribution and an M/G/1 model considering a Pareto distribution for the random occupancy time for the PU transmissions.

4. Spectrum Sensing The spectrum sensing technique considered here is the signal envelope-based method [45] where the envelope of the signal is computed within a given range of frequencies in time and compared against a threshold value μ. We consider the

envelope-based detection method over the standard energybased detection method [45, 48–50] mainly considering its simplicity in hardware implementation and computation. From the analytical framework we provide in this paper on the detection performance of the envelope-based detector, together with SoS of the PU, it is rather straight forward to derive the corresponding theoretical expressions for the energy-based detector and perform similar analyses to the ones that we present here. The Energy detectors in general including the envelope-based detector have drawbacks [10, 11, 49] for spectral occupancy detection especially when the noise power is not known, but on the other hand it is the simplest detection method when the CR node has got no knowledge about the PU transmission. The received baseband signal of bandwidth Bw in its complex envelope form received over a time period of t1m ≤ t ≤ t2m is given by ⎧ ⎨ν(t),

r(t) = ⎩ s(t) + ν(t),

when PU is not present,

(3)

when PU is present,

where, s(t) is the complex envelope of the received signal from the PU without noise, and ν(t) is the additive bandpass and band limited complex noise component associated with the sensing process. The additive noise ν(t) is modeled as a zero mean complex Gaussian random process with a power of 2σ 2 over a bandwidth Bw . Note that in (3) we only consider the signal of our interest given within the frequencies f1 and f2 (corresponding to the scanning time duration of t1m ≤ t ≤ t2m ). Since we consider only one PU in our model, therefore r(t) corresponds to the signal received within the PU’s transmission bandwidth. We also assume negligible fading associated with s(t) in our model or in other words the amount of fading is small considering the time period for computing the envelope (energy) of the signal, which is a valid assumption as there exist many cases with slow fading scenarios [51]. The envelope of the received signal at t = α over a time of t1m ≤ α ≤ t2m is used as the test statistic ξs (α) to detect the PU (transmitting in the frequency band between f1 and f2 ), where ξs (α) is given by ξs (α) = |r(t)|t=α

for t1m ≤ α ≤ t2m .

(4)

Further more, we define the signal to noise ratio as ρ = Es /2σ 2 , where Es is the power of s(t) over the frequency band of f1 to f2 given by Es =

1 t2m − t1m

 t2m t1m

s(t) s(t)dt,

(5)

where s(t) denotes the complex conjugate of s(t). The generic detection criteria in deciding whether a PU is present or not for the mth scan, considering the sensing noise as well as the linear spectrum scanning process of the CR, is then given by, ⎧ ⎨0;

dm = ⎩ 1;





H0

for ξs (t) < μ, ∀t ∈ t1m , t2m ,

H1

for ξs (t) ≥ μ, for some t ∈ t1m , t2m .





(6)

Note that, as described in (6), we are only interested in the detection of a PU within the spectral range of f1 to

EURASIP Journal on Wireless Communications and Networking f2 . The test statistic ξs (α) follows two different distributions under the hypotheses H0 and H1 depending on whether the signal s(t) is present or not. From the signal model presented in (3), it is well known that [46] (since ν(t) is complex Gaussian) ξs follows a Rayleigh distribution under H0 and a Rice distribution under H1 , given by



ξ2 ξ fξs |H0 (ξs ) = s2 exp − s 2 , σ 2σ



ξ 2 + E2 ξ fξs |H1 (ξs ) = s2 exp − s 2 r σ 2σ



I0

ξs Er σ2



(7)

where Er is the time domain root mean square value of the signal r(t), and I0 is the zeroth order modified Bessel function of the first kind. The distributions in (7) are used to analyze the detection performance which we present in the subsequent sections.

Γ = t2m − t1m = Tw ( f2 − f1 )/W, and from (2) we find a closed form expression given by PD = 1 − exp(−λ(τ + Γ)).

(9)

Note that when τ + Γ = Tw , then PD = PO . Therefore, the CR detects all the transmissions from the PU in a single scanning period. At the same time, we also observe from (9) that PD = 1 when λ → ∞. 5.1.3. Miss Detection Probability. The probability of miss detection is defined by the probability that CR deciding H0 gives H1 for a single scan. In other words, miss detection for the noiseless case occurs when there is at least one initiation of transmission occurring for some t outside the interval t∈ / [t1m − τ, t2m ], but no initiations (of transmissions) during the interval, in a single scan. Therefore, for a single scan the miss detection probability is given by 



 = P N t2m − N t1m − τ PM

5. Performance Analysis: Noiseless Sensing



 = 0 | (N(α1 ) − N(α2 )) ≥ 1

(10)

The theoretical performance analysis for detecting the PU is performed in three stages. Initially, we study the detection performance considering only the SoS of the PU with a constant hold time with no sensing noise (i.e., SNR ρ = ∞), then we extend the analysis considering the sensing noise, and then we further extend the analysis for random hold time. We also provide simulation results to support our theoretical analysis. 5.1. Theoretical Analysis. In the noiseless case, the detection performance of the CR node is characterized by the SoS of the PU, the bandwidth Bw of the PU, and the total time Tw for the CR node to scan the entire bandwidth W. As mentioned previously, we assume the CR nodes linearly scan the frequency in time over the desired (wideband) spectrum. 5.1.1. Occupancy Probability. For the PU, we define the spectral occupancy probability PO as the probability of initiation of at least one transmission by the PU over a time of To seconds. Therefore; PO is given by PO = P[N(t = To ) ≥ 1; ∀To > 0]. From (2), we find a closed form expression for the probability of occupancy as PO = 1 − exp(−λTo ).

5

for some α1 , α2 ∈ [t0 +mTw , t0 +(m+1)Tw ] and, α1 , α2 ∈ / [t1m − m τ, t2 ], with α1 > α2 . Since, the events occuring at t ∈ [t1m −  τ, t2m ] and t ∈ can / [t1m −τ, t2m ] in (10) are mutually disjoint, PM m m  be rewritten as PM = P[N(t2 ) − N(t1 − τ) = 0]. Again, using the incremental independence and stationarity property of the arrival process with (2), we find a closed form expression as  = exp(−λ(τ + Γ)). PM

 We further verify the analytical expressions for PD and PM ,   from (9) and (11), since PD = 1 − PM .

5.1.4. False Alarm Probability. The false alarm probability for the noiseless case is defined by the probability of detecting a transmission given that no transmissions have been initiated by the PU during a single scan. Since we do not consider noise in this case, the probability of false alarm is simply zero. Further, we could verify this by expressing the false alarm probability as 



PF = P N t2m − N t1m − τ



 ≥ 1 | (N(t0 + (m + 1)Tw ) − N(t0 + mTw )) = 0,

(12)

(8)

From (8), we can compute the spectral occupancy probability of the PU for a single scanning period Tw by letting To = Tw . 5.1.2. Detection Probability. The detection probability, for detecting the PU by the CR node over a single scan duration of Tw , in the noiseless case is defined by the probability of initiation of at least one transmission within the time slot of t1m − τ ≤ t ≤ t2m for the mth scanning iteration (t1m and t2m are defined in Section 2). The probability of detection is given by PD = P[(N(t2m ) − N(t1m − τ)) ≥ 1]. Using the incremental independence and stationarity property of the arrival process (Axiom 2), we can rewrite PD as PD = P[N(Γ+τ) ≥ 1], where

(11)

and since (N(t0 +(m+1)Tw ) − N(t0 +mTw )) = 0 implies that (N(t2m ) − N(t1m − τ)) = 0, giving us {((N(t2m ) − N(t1m − τ)) ≥ 1} ∩ {(N(t0 + (m + 1)Tw ) − N(t0 + mTw )) = 0} = ∅, the probability of false alarm for the noiseless case becomes PF = 0.

(13)

5.2. Numerical Results. We present the simulation results in this section using Matlab to verify the theoretical analysis performed in Section 5.1 Simulations were performed using Monte-Carlo techniques to generate the random (Poisson based) PU’s transmissions. In our simulations, the Poissonian arrivals are generated using the Binomial

6

EURASIP Journal on Wireless Communications and Networking 100

100 To = 4Tw To = 3Tw

10−1

10−1 τ = 0.02 sec  PM

PO

To = 2Tw To = Tw 10−2

To = 0.5Tw

τ = 0.05 sec τ = 0.1 sec

10−2

τ = 0.02 sec

10−3

10−3 10−3

10−2

10−1 Arrival rate−λ

100

100

101

101 Arrival rate−λ (sec−1 )

(sec−1 ) Simulation Theory

Theory Simulation

counting process by generating a binary random event with a probability of p within a small time duration of Ts , as described in [46, Section 21.3], which converges to a Poissonian process as Ts → 0 with λ = p/Ts . Simulations were performed in Matlab to generate the random arrival process with a deterministic hold time. Figure 3 presents the occupancy probability PO for various time durations To . From the figure, we observe that PO increases with the arrival rate λ, as expected, and also marginally improves with the time duration To . The figure shows how the the spectral occupancy probability of the PU (defined over a period of To = Tw ) increases when the scanning duration Tw increases for a given arrival rate λ. This observation is quite important, especially when we study the minimum time requirement (minimum Tw ) for sensing the PU, which we present in the later sections. Figure 4 depicts the miss detection probability  for various holding times τ and arrival rate λ. From the PM figures, we see that the detection performance at the CR node improves when both τ and λ increase, we further observe that the improvement in the detection performance is greater when λ increases than when τ increases, relatively. From the figure we also see a very close match between the theoretical expressions derived in the previous section and the simulated results further verifying our analysis.

6. Analysis of the Primary User Miss Detection Risk Regions In this section, we study the risk regions associated with miss detecting the PU depending on their SoS. Continuing from Section 2 and referring back to Figure 2, here we define the risk regions based on the probability of detection PD (for the noiseless case). In other words, we define the values for

Figure 4: Probability of miss detection for the noiseless case with Tw = 1 sec, Bw = 500 MHz, W = 7 GHz.

1 0.8

Low risk

0.6

Low risk

0.4

Medium risk

PD

Figure 3: Occupancy probability of the PU versus the arrival rate λ for the Poisson arrival model for various time durations To , with Tw = 0.7 sec.

102

Medium risk

0.2 High risk 8 6 4 /Δ a Tw 2

High risk

0 12

10

8 τ/Tw

6

4

2

0

Figure 5: Probability of detection for the noiseless case with Tw = 1 sec, Bw = 500 MHz, W = 7 GHz.

 τ L , τ H , ΔLa and ΔH a based on the value of PD . Let us define two    values for PD , given by PDL and PDH . We define the

(i) High Risk Region as the range of values for τ and Δa , for all values of PD such that PD < PD L , (ii) Medium Risk Region as the range of values for τ and Δa such that PD L < PD < PD H , (iii) Low Risk Region as the range of values for τ and Δa such that PD < PD H . Figure 5 shows the risk regions of miss detecting the PU by depicting a three-dimensional plot of PD for PD L = 0.2 and PD H = 0.6 with respect to Δa and τ (for the noiseless case). The figure also shows the risk regions separated by two planes given by PD L = 0.2 and PD H = 0.6 that define the boundaries of the risk regions. The values of PD L and PD H

EURASIP Journal on Wireless Communications and Networking









Γ , ΔLa = lim R1 = −  τ →0 ln 1 − PD L = lim R2 = − τ →0



Γ

ln 1 − PD H

100

10−2

R2

Medium risk region (between 20% and 60% confidence in detecting the PU)

R1

High risk region (lower than 20% confidence in detecting the PU)

10−4 10−2

100

102

Tw /Δa

(14)

where Γ = Tw Bw /W (from Section 5.1). The curves R1 and R2 and the corresponding risk regions are shown in Figure 6. The figure here (Figure 6) defines the risk regions more precisely than Figure 2. Note that the risk regions can be custom defined based on the values of PD L and PD H that define the curves R1 and R2 , respectively. As observed in the figure, the risk regions become independent of the hold time τ for small values of τ. In practice, this is true since the detection performance only depends on the arrival rate λ(= 1/Δa ) for small values of τ/Δa . The values of ΔLa and ΔH a defining the risk regions are then computed from R1 and R2 , respectively as

ΔH a

102

Low risk region (greater than 60% confidence in detecting the PU)

Figure 6: Risk regions associated with PU detection, for Tw = 1 sec, W = 7 GHz, Bw = 10 MHz.

R1 : ln 1 − PD L + λΓ + λτ = 0, R2 : ln 1 − PD H + λΓ + λτ = 0,

104

τ/Tw

can be varied depending on our traffic model (traffic sources) based on the application. The values of PD L and PD H for the risk regions are basically custom defined and chosen to comply with regulatory requirements. For example, if the regulatory requirement for a minimum detection probability (to minimize interference to the PU) is given, then it could be assigned to PD H . This would ensure that the low risk region (defined by PD H ) does satisfy the regulatory requirements, which we explain in Example 1 later. On the other hand, PD L which defines the medium and high risk regions is defined by the CR Network as a benchmark for classifying interference level as medium or high interference, respectively, (i.e., interference from the CR to the PU and vice versa). Further, for a given set of values Bw , Tw and W, we can define two theoretical curves R1 and R2 for the boundaries of risk regions, which are given by

7

(15) .

For the parameters given in Figure 6, the values of Δa defining the risk regions are given by ΔLa = 0.0064 sec (for 20% confidence, i.e., PD L = 0.2) and ΔH a = 0.0016 sec (for 60% confidence, i.e., for PD H = 0.6). The values τ L and τ H , on the other hand, can only be defined for a given value of λ, letting λ → 0 to compute τ L and τ H has no practical significance since when λ = 0 there are no transmissions from the PU. Therefore, for a given λ, say λ = (1/Δa ) = 1/10−3 , we find the values of τ defining the risk regions by using R1 and R2 (or by using Figure 6), as τ L = 223.14 sec and τ H = 916.3 sec. Example 1 (WiMedia-UWB based Cognitive Radio System with Constant Scanning Time (Tw )). We now provide an example of a WiMedia based Ultra-Wideband (UWB) [7] CR system which requires a 90% confidence (PD > 0.9, PD L = PD H = 0.9) in detecting a PU in the network. The PU system that we consider here is the WiMax radio [52] operating

at 3.5 GHz with a bandwidth of Bw = 10 MHz and a transmission statistics derived by the Poisson process (Note: In practice the temporal behavior of WiMax transmissions may not be Poisson arrival process, however we consider the Poisson arrival here for analytical purposes). We analyze, for the noiseless case, the values of Δa that enables the WiMedia based CR node to detect a WiMax PU with the given confidence level (90%). We assume that the WiMedia system has an operational bandwidth of W = 1.5 GHz (from 3 GHz–4.5 GHz) and a hardware that has a spectrum scanning time of TW = 10 msec (assumption only). Then, by using (15), we compute the value of Δa for small values of τ, that defines whether the requirement of 90% confidence for detecting the WiMax radio can be achieved or not in the noiseless case. Accordingly, we get Δa = 2.89 × 10−5 where Γ = (10 × 10−3 )(10 × 106 )/(1.5 × 109 ) = 6.67 × 10−5 . Therefore, given a fixed value Tw , the CR can detect the PU with 90% confidence for the noiseless case (or for very high received SNR of the PU signal) provided that the SoS of the PU is such that the mean time between transmissions Δa satisfies Δa < 2.89 × 10−5 sec for small values of τ.

7. Performance Analysis: Noisy Sensing The detection performance with noise is of great interest to us. In this section, we analyze the overall probability of false alarm and the overall probability of miss detection for the envelope-based PU detection given the Poisson SoS of the PU for noisy sensing. 7.1. Theoretical Analysis. First, we define the four probabilities P00 , P01 , P10 , and P11 for the noiseless case as, P00 = P[dm = 0 | H0 ], P01 = P[dm = 0 | H1 ], P10 = P[dm = 1 | H0 ], and P11 = P[dm = 1 | H1 ]. From the analysis  , performed in Section 5, we identify that P00 = 1, P01 = PM   P10 = PF = 0, and P11 = PD . Then, the overall probability of

8

EURASIP Journal on Wireless Communications and Networking

detection PD = P[ξs ≥ μ | H1 ] and the probability of false alarm PF = P[ξs ≥ μ | H0 ] for the noisy case are given by,







PF = fξs |H0 ξs ≥ μ P00 + fξs |H1 ξs ≥ μ P10 .



PD = exp −



γ = 15 dB

(16)

From (16), by using (7), we come up with two closed form expressions for PD and PF as



μ2 E μ   PM + Q1 r , P , 2 2σ σ σ D

∞ x2

z exp −

γ = 20 dB 10−1

 PM

10−2

where, Q1 (x1 , x2 ) is the Marcum Q-Function defined by, Q1 (x1 , x2 ) =

γ = 5 dB γ = 10 dB

(17)



μ2 PF = exp − 2 , 2σ

γ = −10 dB

PD = fξs |H0 ξs ≥ μ P01 + fξs |H1 ξs ≥ μ P11 ,

Prob of Miss: PM



100

10−4



z2 + x12 I0 (x1 z)dz. 2

(18)

From the expressions we, observe that the probability of false alarm PF does not depend on the transmission statistics of the PU but only depends on the sensing noise. In the following section, we perform some simulations to study the detection performances and also verify the theoretical analysis performed in this section.

10−3 10−2 Prob of false alarm: PF

10−1

100

Theory Simulation

Figure 7: Complementary receiver operating Characteristics curves for various SNR values for the envelope based detector with W = 7 GHz, Bw = 500 MHz, Tw = 0.7 sec, f1 = 3.5 GHz, λ = 25 (sec−1 ), τ = 0.01 sec. 100

8. Performance Analysis: Random Hold Time In our analysis so far we have assumed a constant hold time τ. In this section we extend the analysis for the

λ=1 λ = 10 Prob of Miss: PM

7.2. Complementary Receiver Operating Characteristic Curves and Simulation Results. The Complementary Receiver Operating Characteristic Curves (C-ROCs) for the envelopebased detector is presented here considering the PU transmission statistics. The C-ROC curve is the plot between PF and PM by varying the detection threshold μ. Together with the theoretical C-ROC curves, derived from the previous section, we also present some simulation results to verify our theoretical analysis. Monte-Carlo simulations were performed to generate the PU’s (Poisson) transmission process and the noisy sensing process with Gaussian noise. Figure 7 shows the C-ROC curves for various SNR values for λ = 25 and τ = 0.01. As expected, we see that the C-ROC curves improve when the SNR is increased, the figure also shows the  ) for the noiseless case as probability of miss detection (PM well. Figure 8 shows the C-ROC curves for different values of arrival rate λ with γ = 5 dB and τ = 0.02. From the figure, we observe how the detection performance improves when the arrival rate (spectral occupancy rate) of the PU is increased. Moreover, we see that when λ is increased further the detection performance predominantly depends on the sensing noise. Figure 9 shows the C-ROC curves for various values of spectral hold time τ for λ = 15 and γ = 5 dB. Improvements in the detection performances are observed when τ is increased but not as much as when λ is increased as in Figure 8. Furthermore, we clearly see that the simulation results very closely match with the theoretical results on all the figures, verifying our analysis in the previous section.

λ = 80

10−1

10−2

10−2

10−1 Prob of false alarm: PF

100

Theory Simulation

Figure 8: Complementary receiver operating characteristics curves for various arrival rates for the envelope based detector with W = 7 GHz, Bw = 500 MHz, Tw = 0.7 sec, f1 = 3.5 GHz, γ = 5 dB , τ = 0.02 sec.

detection performance with a randomly distributed hold time τ. We consider two random hold time models namely (1) the exponential distribution which is a traditional way for modeling the call hold time describing many real time applications, and (2) the Pareto distribution which is used to model the World Wide Web IP traffic. The exponential model is a very traditional model used to describe the random call hold time process. It is useful in modeling voice traffic as recommended by the ITU [32]. In

EURASIP Journal on Wireless Communications and Networking

Prob of Miss: PM

100

9

values of τ. Therefore, the probability of detection is given by PD =

τ = 0.01 s

 ∞











μ2 E μ   exp − 2 PM + Q1 r , P fτ (τ)dτ. 2σ σ σ D

0

(19) τ = 0.05 s

10−1

(Note that for the Pareto model the integration range in the above is from τmin to ∞.) By solving the integral in (19) for both exponential and Pareto models, we come up with a closed form expression for PD as

τ = 0.2 s



PD = PM 10−2

10−2

10−1 Prob of false alarm: PF

100

Theory Simulation

Figure 9: Complementary receiver operating characteristics curves for various holding times for the envelope based detector with W = 7 GHz, Bw = 500 MHz, Tw = 0.7 sec, f1 = 3.5 GHz, λ = 15 (sec−1 ), γ = 5 dB.

[28], the exponential model is also verified experimentally for aggregated HSDPA data traffic by Telefonica I + D. Based on the type of traffic, the exponential model can also be extended to obtain further traffic models such as Erlange and Phase-type models [32]. However, in our paper, we adopt the exponential model whereas the other models could simply follow similar analytical procedures. We also adopt another model for the random hold time which suits modern teletraffic such as the World Wide Web IP traffic, namely, the Pareto distributed hold time model. The Pareto model is (experimentally) proven to fit Internet traffic as described in [28, 37, 53–56]. Furthermore, in practice, the analyses for the constant τ with the M/D/1 model and the random τ with exponential and Pareto models are all useful depending on the type of traffic generated by the PU. The exponentially distributed hold time τ is given by the density function fτ (τ) = 1/τa exp(−τ/τa ), with a mean hold time of τa . The Pareto distributed hold time τ is given k τ −(k+1) for τ > τmin by the density function fτ (τ) = kτmin and ∀k > 0, with E[τ] = τb = kτmin /(k − 1) for k > 1 2 /[(k − 1)2 (k − 2)] for k > 2. The and E[(τ − τb )2 ] = kτmin parameter k for the Pareto model describes the peaky nature of the density function and τmin describes the minimum hold time that models a typical IP packet oriented service. 8.1. Theoretical Analysis. Using the exponential and Pareto hold time models with Poisson arrival for the PU transmission we rederive the expression for the probability of detection here for random τ. The probability of false alarm PF stays unchanged, as in (17), because PF is independent of the transmission statistics of the PU (i.e., PF is independent of τ). From (17), we derive the new probability of detection for the random hold time by averaging over all possible



μ2 exp − 2 2σ



 − Q1

Er μ , σ σ





+ Q1



Er μ , , σ σ (20)

∞

  where PM = 0 PM fτ (τ)dτ is the probability of miss detection for the random τ in the absence of the sensing noise (i.e., considering only the transmission statistics of the PU), given by

⎧ exp(−λΓ) ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ (1 + λτa )

for the exponential model,

k exp(−λ(τmin + Γ)) ⎪ ⎪ ⎩

for the Pareto model.

 = PM ⎪ ⎪ ⎪

(λτmin + k)

(21) Furthermore, the probability of detection PD for random  . The τ in the absence of noise is given by PD (τ) = 1 − PM curves R1 and R2 defining the risk regions (Section 6) can also be redefined for the random holding time case. From Section 8.1 we have two new curves for the exponential hold time model given by 







Rτ1 =⇒ ln 1 − PD L + ln(1 + λτa ) + λΓ = 0, Rτ2 =⇒ ln 1 − PD H + ln(1 + λτa ) + λΓ = 0.

(22)

The new curves in (22) differ mainly for low values of λ but has the same limit values of ΔLa and ΔH a defining the risk regions, as in (15), when τa → 0. 8.2. Numerical Results. We compare the differences in the detection performance between the constant τ and the random τ cases. The random τ case obviously relates to reality more than the former. Figure 10 depicts the theoretical curves for the probability of miss detection with respect to the arrival rate λ for the noiseless case. The figure shows both the constant and the random τ cases for the exponential and the Pareto models. As we observe from the figure, the differences between the two arise for higher values of mean hold time and λ. This is due to the fact that for larger values of τa and τb , the probability of having smaller hold times is greater in the random case, and hence we observe poorer performances compared to the constant τ case. Figure 11 on the other hand shows the complementary ROC curves for the random and constant τ cases for noisy sensing. In Figure 10, we observed that the differences between the random and the

EURASIP Journal on Wireless Communications and Networking

constant τ detection performances arise for higher values of (both) mean hold time and λ, and in Figure 11 we observe that the difference between the two arise only when the SNR is higher, provided that the mean hold time and λ are high. For lower values of γ we see that the difference is negligible. Furthermore, we observe that Pareto model shows better detection performance compared to the exponential model based on the value of k(= 2) for the same mean hold time. Note that when k increases the, Pareto model approaches the constant hold time case because the density function gets more peakier.

100

10−1 Prob of Miss

10

10−2

10−3

9. Minimum Required Spectrum Sensing Time

Tw ≥ Twmin = −



100

101

102

Arrival rate−λ Random τ: exponential Random τ: pareto; k = 2 Constant τ

Figure 10: Probability of miss detection for the noiseless case with constant τ and random exponentially distributed τ, for W = 7 GHz, Bw = 500 MHz, Tw = 0.7 sec, f1 = 3.5 GHz. 100 10−1 10−2 τ = τa = τb = 5 and γ = 5 dB 10−3

10−6

(23)

=⇒ for random exponential τ,

Tw ≥ Twmin = −

10−1

τ = τa = τb = 0.001 and γ = 15 dB τ = τa = τb = 5 and γ = 15 dB

10−5

Wτ − =⇒ for constant τ, Bw Tw ≥ Twmin

10−2

10−4

W ln(1 − Υ) Bw λ

W ln[(1 − Υ)(1 + λτa )] =− BW λ

10−4

Prob of Miss

The temporal behavior of the PU influences the required spectrum sensing time for the CR node to reliably detect the PU. From the theoretical analyses performed in the previous sections, we study the minimum required sensing time to reliably detect the narrow band PU by a wideband CR node with a given confidence level. We compute the minimum required time for spectrum sensing based (only) on the temporal characteristics of the PU for both constant and random τ cases. The advantages of knowing the minimum required sensing time Tw = Twmin here is two fold, (1) To reliably detect the PU with a given confidence level by not underscanning the spectrum (not scanning lower than the minimum required time) and (2) To save power at the CR node by not overscanning the spectrum (not scanning higher than the minimum required time), From (9) and Section 8.1, for a given confidence level of Υ% (i.e., probability of detection is Υ) for detecting the PU, the minimum required spectrum sensing time Twmin for the constant and random hold time τ cases are given by

W ln[(1/k)(1 − Υ)(λτmin + k)] BW λ Wτmin =⇒ for random Pareto τ. Bw

The expressions in (23) can then be used by the CR nodes to dynamically adopt the spectrum sensing time Tw , given the hardware capability to adopt its time to sense, to reliably detect the PU, and at the same time save power. The temporal characteristics of the PU that is required to compute Twmin may be known a priori or be acquired by learning the environment at the CR node. Example 2 (Minimum Sensing Time for WiMedia-UWB CR node for Detecting WiMax). In this section we provide

10−6

10−5

10−4 10−3 10−2 Prob of false alarm

10−1

100

Constant τ Random τ: exponential Random τ: pareto; k = 2

Figure 11: Complementary ROC curves with constant τ and random exponentially distributed τ, for W = 7 GHz, Bw = 500 MHz, Tw = 0.7 sec, f1 = 3.5 GHz, λ = 50: Note: The τ values specified in the figure are for the constant hold time case, and τa values are for the random hold time case.

an example, continuing form Example 1 in Section 6, for a WiMedia-UWB based CR to detect a WiMax terminal with 90% confidence and the minimum required time to sense the spectrum. Note that, again here we assume as explained in Example 1 that the WiMax transmission has a Poisson arrival process. Figure 12 shows the curves of Twmin Bw /W for 90% confidence in detecting the PU for both constant and random

EURASIP Journal on Wireless Communications and Networking 101

research is to be conducted for optimizing the detection threshold for envelope- (energy-) based detection depending on the temporal characteristics of the PU together with the sensing noise. From the analytical framework that is provided in this paper, application (traffic) specific temporal (empirical) model for PU transmissions can also be used to perform similar analysis.

100 min TW Bw /W

11

10−1

Acknowledgments

τ = τa = τb = 0.001 τ = τa = τb = 0.091

10−2 100

101 Arrival rate−λ

102

Constant t Random τ: exponential Random τ: pareto; k = 2

Figure 12: Duration of the spectrum sensing time (Tw ) requirement for 90% confidence in detecting the PU, based on the temporal characteristics of the PU, with W = 1.5 GHz, Bw = 10 MHz.

τ considering only the SoS of the PU (without noise). The figure shows the curves with respect to the arrival rate λ for various values of mean hold times. From the results; we observe that the minimum time required to sense the spectrum increases when the arrival rate (λ) is low and as well as when the holding time is low. In the figure, we also show the operational region (for Tw > Twmin ) and the inoperational region (for Tw < Twmin ) of the CR nodes to reliably detect the PU (in the absence of noise). We further observe from the figure that the minimum sensing time Twmin reduces significantly when the hold time increases. Though the results shown in Figure 12 is for the noiseless case, it holds true for relatively high values of γ. Similar analytical curves also can be generated for the noisy case by following the above procedure.

10. Conclusion In this paper, we presented some detailed theoretical analysis on the performance of detecting a narrow band PU by a wideband CR terminal. The performance analyses were based on noisy sensing at the CR node as well as on the temporal characteristics of the PU. Closed form expressions were presented for the probabilities of detection, miss detection, and false alarm at the CR node, and were also verified using simulations. Further, we classify different risk regions for miss detecting the PU based on the temporal characteristics of the PU transmission, and consequently derive the minimum required spectrum sensing time to reliably detect the PU with a given confidence level. The analyses and the results were presented for both constant and random spectrum holding time, as well as random spectrum idle time considering the Poisson arrival process. Further

The research work was partly funded through the EUFP7 Grant FP7-ICT-215669 under the EUWB Integrated Project. The authors would like to thank Professor Stephen Hanly from the University of Melbourne for his valuable comments.

References [1] J. Mitola III and G. Q. Maguire Jr., “Cognitive radio: making software radios more personal,” IEEE Personal Communications, vol. 6, no. 4, pp. 13–18, 1999. [2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005. [3] H. Arslan, Ed., Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems, Springer, Dordrecht, The Netherlands, 2007. [4] E. Hossain and V. Bhargava, Eds., Cognitive Wireless Communication Networks, Springer, New York, NY, USA, 2007. [5] “Federal Communications Commission, Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies, NPRM and Order,” ET Docket no. 03-322, December 2003. [6] “The Commission of the European Communities, Commission Decision 2007/131/EC on allowing the use of the radio spectrum for equipment using ultra-wideband technology in a harmonised manner in the Community,” Official Journal of the European Union, February 2007. [7] G. Heidari, WiMedia UWB: Technology of Choice for Wireless USB and Bluetooth, John Wiley & Sons, New York, NY, USA, 2006. [8] EUWB consortium, http://www.euwb.eu/. [9] S. Kandeepan, et al., “D2.1.1:Spectrum Sensing and Monitoring,” EUWB Integrated Project, European Commissiona Funded Project EC: FP7-ICT-215669, May 2009, http://www.euwb.eu/. [10] D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issues in spectrum sensing for cognitive radios,” in Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 772–776, Pacific Grove, Calif, USA, November 2004. [11] A. Sahai, N. Hoven, and R. Tandra, “Some fundamental limits on cognitive radio,” in Proceedings of the 42nd Allerton Conference on Communication, Control and Computing, Monticello, Minn, USA, September 2004. [12] D. B. Cabric, Cognitive Radios: System Design Perspective, Ph.D. thesis, University of California, Berkeley, Calif, USA, 2007. [13] P. Wang, L. Xiao, S. Zhou, and J. Wang, “Optimization of detection time for channel efficiency in cognitive radio systems,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC ’07), pp. 111–115, Kowloon, Hong Kong, March 2007.

12

EURASIP Journal on Wireless Communications and Networking

[14] G. Amir and S. S. Elvino, “Opportunistic spectrum access in fading channels through collaborative sensing,” Journal on Communications, vol. 2, no. 2, pp. 71–82, 2007. [15] Z. Quan, S. Cui, A. H. Sayed, and H. V. Poor, “Wideband spectrum sensing in cognitive radio networks,” in Proceedings of the IEEE International Conference on Communications (ICC ’08), pp. 901–906, Beijing, China, May 2008. [16] W.-Y. Lee and I. F. Akyildiz, “Optimal spectrum sensing framework for cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3845–3857, 2008. [17] D. Cabric, A. Tkachenko, and R. W. Brodersen, “Experimental study of spectrum sensing based on energy detection and network cooperation,” in Proceedings of the 1st International ACM Workshop on Technology and Policy for Accessing Spectrum, Boston, Mass, USA, 2006. [18] T. C. Aysal, S. Kandeepan, and R. Piesiewicz, “Cooperative spectrum sensing over imperfect channels,” in Proceedings of IEEE Globecom Workshops (GLOBECOM ’08), New Orleans, La, USA, November-December 2008. [19] T. C. Aysal, S. Kandeepan, and R. Piesiewicz, “Cooperative spectrum sensing with noisy hard decision transmissions,” in Proceedings of the IEEE International Conference on Communications (ICC ’09), Dresden, Germany, June 2009. [20] M. P. Wylie-Green, “Dynamic spectrum sensing by multiband OFDM radio for interference mitigation,” in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’05), pp. 619– 625, Baltimore, Md, USA, November 2005. [21] M. M. Rashid, Md. J. Hossain, E. Hossain, and V. K. Bhargava, “Opportunistic spectrum access in cognitive radio networks: a queueing analytic model and admission controller design,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM ’07), pp. 4647–4652, Washington, DC, USA, November 2007. [22] Y. Pei, A. T. Hoang, and Y.-C. Liang, “Sensing-throughput tradeoff in cognitive radio networks: how frequently should spectrum sensing be carried out?” in Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’07), Athens, Greece, September 2007. [23] J. Ma and Y. Li, “A probability-based spectrum sensing scheme for cognitive radio,” in Proceedings of IEEE International Conference on Communications (ICC ’08), pp. 3416–3420, Beijing, China, May 2008. [24] S. Tang and B. L. Mark, “An adaptive spectrum detection mechanism for cognitive radio networks in dynamic traffic environments,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM ’08), pp. 3009–3013, New Orleans, La, USA, November-December 2008. [25] X. Zhou, Y. Li, Y. H. Kwon, and A. C. K. Soong, “Detection timing and channel selection for periodic spectrum sensing in cognitive radio,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM ’08), pp. 2988–2992, New Orleans, La, USA, November-December 2008. [26] S. Kandeepan, A. B. Rahim, T. C. Aysal, and R. Piesiewicz, “Time divisional and time-frequency divisional cooperative spectrum sensing,” in Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM ’09), Hannover, Germany, June 2009.

[27] S. Kandeepan, A. Giorgetti, and M. Chiani, “Time-divisional cooperative periodic spectrum sensing for cognitive radio networks,” in Proceedings of IEEE International Conference on Communications (ICC ’10), Cape Town, South Africa, May 2010. [28] S. Kandeepan, A. Sierra, J. Campos, and I. Chlamtac, “Periodic sensing in cognitive radios for detecting UMTS/HSDPA based on experimental spectral occupancy statistics,” in Proceedings of IEEE Wireless Communications & Networking Conference (WCNC ’10), Sydney, Australia, April 2010. [29] B. Jabbari, “Teletraffic aspects of evolving and next-generation wireless communication networks,” IEEE Personal Communications, vol. 3, no. 6, pp. 4–9, 1996. [30] T. Janevski, Traffic Analysis and Design of Wireless IP Networks, Artech House, Boston, Mass, USA, 2003. [31] A. O. Allen, Probability Statistics, and Queuing Theory with Computer Science Applications, Academic Press, 1990. [32] ITU Handbook, “Teletraffic Engineering, ITU-D,” Study Group 2, June 2006, http://www.itu.int/. [33] C. Park, H. Shen, F. Hernndez-Campos, J. S. Marron, and D. Veitch, “Capturing the elusive poissonity in web traffic,” in Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS ’06), pp. 189–196, Monterey, Calif, USA, September 2006. [34] J. Cao, W. S. Cleveland, D. Lin, and D. X. Sun, “Internet traffic tends toward poisson and independent as the load increases,” in Nonlinear Estimation and Classification, D. D. Denison, M. H. Hansen, C. C. Holmes, B. Mallick, and B. Yu, Eds., vol. 171 of Lecture Notes in Statistics, Springer, New York, NY, USA, 2003. [35] P. Salvador, A. Pacheco, and R. Valadas, “Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs,” Computer Networks, vol. 44, no. 3, pp. 335–352, 2004. [36] M. Mandjes, R. Van de Meent, and S. N. Quija, “Measuring modeling and cost allocation (M2C) project deliverable D2.1: a classification of IP traffic models,” Project Report, December 2003, http://arch.cs.utwente.nl/projects/m2c/. [37] M. Zukerman, T. D. Neame, and R. G. Addie, “Internet traffic modeling and future technology implications,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies, vol. 1, pp. 587–596, San Francisco, Calif, USA, March-April 2003. [38] T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, “A nonstationary poisson view of internet traffic,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1558–1569, Hong Kong, March 2004. [39] M. M. Krunz and A. M. Makowski, “Modeling video traffic using M/G/∞ input processes: a compromise between Markovian and LRD models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 5, pp. 733–748, 1998. [40] T. D. Neame, M. Zukerman, and R. G. Addie, “Modeling broadband traffic streams,” in Proceedings of the IEEE Global Telecommunication Conference (GLOBECOM ’99), vol. 1, Rio de Janeiro, Brazil, December 1999. [41] Y. Fang, I. Chlamtac, and Y.-B. Lin, “Modeling PCS networks under general call holding time and cell residence time distributions,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 893–906, 1997. [42] B. A. Mah, “Empirical model of HTTP network traffic,” in Proceedings of the 16th IEEE Annual Conference on Computer Communications (INFOCOM ’97), vol. 2, pp. 592–600, Kobe, Japan, April 1997.

EURASIP Journal on Wireless Communications and Networking [43] V. A. Bolotin, “Modeling call holding time distributions for CCS network design and performance analysis,” IEEE Journal on Selected Areas in Communications, vol. 12, no. 3, pp. 433– 438, 1994. [44] F. Barcelo and S. Bueno, “Idle and inter-arrival time statistics in public access mobile radio (PAMR) systems,” in Proceedings of the IEEE Global Telecommunications Conference, vol. 1, pp. 126–130, Phoenix, Ariz, USA, November 1997. [45] H. Urkowitz, “Energy detection of unknown deterministic signals,” Proceedings of the IEEE, vol. 55, no. 4, pp. 523–531, 1967. [46] S. Kay, Intuitive Probability and Random Processes Using Matlab, Springer, New York, NY, USA, 2006. [47] M. Wellens, A. de Baynast, and P. M¨ah¨onen, “Performance of dynamic spectrum access based on spectrum occupancy statistics,” IET Communications, vol. 2, no. 6, pp. 772–782, 2008. [48] T. Kailath and H. Vincent Poor, “Detection of stochastic processes,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2230–2259, 1998. [49] R. Tandra and A. Sahai, “Fundamental limits on detection in low SNR under noise uncertainty,” in Proceedings of International Conference on Wireless Networks, Communications and Mobile Computing, vol. 1, pp. 464–469, Maui, Hawaii, USA, June 2005. [50] F. F. Digham, M.-S. Alouini, and M. K. Simon, “On the energy detection of unknown signals over fading channels,” IEEE Transactions on Communications, vol. 55, no. 1, pp. 21–24, 2007. [51] T. S. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall, Upper Saddle River, NJ, USA, 2nd edition, 2002. [52] J. G. Andrews, A. Ghsoh, and R. Muhamed, Fundamentals of WiMAX: Understanding Braodband Wireless Networking, Prentice Hall, Upper Saddle River, NJ, USA, 2007. [53] M. E. Crovella and A. Bestavros, “Self-similarity in world wide web traffic evidence and possible causes,” Performance Evaluation Review, vol. 24, no. 1, pp. 160–169, 1996. [54] K. Park, G. Kim, and M. Crovella, “On the relationship between file sizes, transport protocols, and self-similar network traffic,” in Proceedings of the International Conference on Network Protocols, pp. 171–180, Columbus, Ohio, USA, October-November 1996. [55] W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson, “Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 71–86, 1997. [56] R. G. Addie, T. D. Neame, and M. Zukerman, “Modeling superposition of many sources generating self similar traffic,” in Proceedings of IEEE International Conference on Communications (ICC ’99), vol. 1, pp. 387–391, Vancouver, Canada, June 1999.

13

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 526429, 8 pages doi:10.1155/2010/526429

Research Article Cyclostationarity Detectors for Cognitive Radio: Architectural Tradeoffs Dominique Noguet, Lionel Biard, and Marc Laugeois CEA-LETI-MINATEC, 17 rue des Martyrs, 38054 Grenoble cedex 9, France Correspondence should be addressed to Dominique Noguet, [email protected] Received 17 November 2009; Revised 25 February 2010; Accepted 15 July 2010 Academic Editor: Danijela Cabric Copyright © 2010 Dominique Noguet et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cyclostationarity detectors have been studied in the past few years as an efficient means for signal detection under low-SNR conditions. On the other hand, some knowledge about the signal is needed at the detector. This is typically the case in Cognitive Radio spectrum secondary usage, where the primary system is known. This paper focuses on two hardware architectures of cyclostationarity detectors for OFDM signals. The first architecture aims at secondary ISM band use, considering IEEE802.11a/g as the primary system. In this scenario, low latency is required. The second architecture targets TV band secondary usage, where DVB-T signals must be detected at very low SNR. The paper focuses on the architectural tradeoffs that the designer has to face, and how his/her choices will influence either performance or complexity. Hardware complexity evaluation on FPGA is provided for detectors that have been tested in the laboratory under real conditions.

1. Introduction Recently, there has been a growing interest in signal detection in the context of Cognitive Radio [1], and more specifically in that of opportunistic radio, where secondary Cognitive Radio Networks (CRNs) can be operated over frequency bands allocated to some primary system in so far as this primary system is absent or, in a more general case, whenever harmful interference with primary systems can be avoided. In most cases, the presence of the primary system is assessed through direct detection of its communication signal, although beaconing is sometimes considered [2]. Thus, in many situations, the primary system detection problem is transposed to the problem of detecting a communication signal in the presence of noise. Surveys of signal detection in the context of spectrum sensing have been proposed in the literature [3, 4]. These detectors operate according to the a priori knowledge they have about the signal and the model of this signal. Telecommunication signals are modulated by sine wave carriers, pulse trains, repeated spreading, hopping sequences, or exhibit cyclic prefixes. Thus, these signals are characterized by the fact that their momentum

(mean, autocorrelation, etc.) exhibits periodicity. This builtin periodicity, which of course is not present in noise, can be exploited to detect signals in the presence of noise even at a low Signal-to-Noise Ratio (SNR) [5]. Using this model, the signal detection process becomes a test for presence of cyclostationary characteristics of the tested signal [6– 8]. Many scenarios have been investigated in the context of CRN over the past years. The two most likely to occur in the short term are, on the one hand, the unlicensed usage of TV bands and, on the other hand, the opportunistic use of unlicensed bands by nonlegacy secondary systems. The first scenario, often referred to as the TV White Space (TVWS) scenario, was made possible by the FCC in the US in 2008, with some restrictions which include high-sensitivity requirements for primary user detection [9]. In the context of this scenario, standardization has been very active, especially under the IEEE802.22 banner [10]. Industry fora, like the White Space Coalition, have given more momentum to this option. The second scenario is, for obvious regulatory reasons, the first that can be practically experimented and used [11].

2

EURASIP Journal on Wireless Communications and Networking

In this context, implementation of blind cyclostationarity detectors has been proposed. In [12], a detector based on Cyclostationary Spectrum Density (CSD) is suggested. The CSD theoretically makes it possible to explore the presence of cyclic frequencies for any autocorrelation lag at any frequency (also referred to as 2D CSD). However, the comprehensive 2D CSD is never implemented in practice due to its huge implementation cost. To sort out this issue, 1D CSDs are preferred to limit implementation cost. The CSD can be performed on the time domain autocorrelation [13, 14], or through the analysis of signal periodicity redundancy in the frequency domain [15]. In both cases however, a large FFT operator (512 to 2048) needs to be implemented, leading to significant hardware complexity. The approach described hereafter goes one step further in narrowing down the CSD domain. Indeed, in both scenarios of interest, the primary systems (which are the ones requiring the highest detection sensitivity) are known. Therefore, analysis of the primary signal nature helps narrow down the CSD search to very specific cyclic frequencies, thereby avoiding implementation of a large FFT. However, when the CSD is narrowed down, the algorithm becomes more specific to the signal to detect. For this reason, this paper will analyze two different implementation options depending on the aforementioned scenarios. The main reason justifying different types of implementation in the WiFI and TVWS scenarios is the sensitivity level required in each case. In the case of TVWS, the guarantee that secondary CRN will not interfere with licensed systems (TV, microphones) leads to high-sensitivity requirements. On the other hand, unlicensed band networks, such as IEEE802.11x, have lighter coexistence constraints. These specific requirements lead to architectural tradeoffs which are examined in this paper. First, the principle of prefix-based cyclostationarity detection will be recapped. Then, the two aforementioned scenarios will be analyzed by pinpointing their impact on the sensor requirement. Considering these requirements, two hardware implementation architectures will be described and evaluated. These approaches will be compared and discussed before concluding the paper.

2. Cyclostationarity Detector for OFDM Signal In both scenarios considered in this paper, in the primary system—DVB-T broadcast system on the one hand, IEEE802.11a/g networks on the other—the signal is modulated using Orthogonal Frequency Digital Multiplexing (OFDM); see, for example, [16]. The OFDM signal is a compound signal consisting of multiple frequency carriers, also called subcarriers or tones, that are each modulated in phase or in phase and amplitude. From a practical outlook, the modulated tones are multiplexed at the transmitter using an inverse FFT. Conversely, the subcarriers are demultiplexed at the receiver end by an FFT. The size of the FFT N, which defines that of the OFDM symbols, depends on the system. In the case of IEEE802.11a/g systems, 64 subcarriers are used whereas the DVB-T signal uses 1024, 2048, 4096, or 8192 tones. In order to avoid intersymbol interference, a

Guard Interval (GI) is introduced. In the case of OFDM, this GI is designed as a copy of the last samples of the OFDM symbol. This approach provides the symbol with a cyclic nature which simplifies the receiver. For this reason, this D long GI is called the Cyclic Prefix (CP). Let us now consider the autocorrelation of this signal, 



R y (u, m) = E y(u + m) · y ∗ (u) .

(1)

Under the condition that all subcarriers are used, the autocorrelation of an OFDM signal is written as [17] R y (u, m) = R y (u, 0)δ(m) + R y (u, N)δ(m − N) + R y (u, −N)δ(m + N).

(2)

The first term corresponds to the energy of the signal. Energy detectors, which analyze this term only, provide poor performance at low SNR. Therefore, we focus on the two other terms, which stem from the repetition of the cyclic prefix present at the beginning and the end of each symbol. It can be shown that the term R y (u, N) is a periodic function of u [8] which characterizes the signal y. R y (u, N) has a period of α−1 = N + D. This cyclostationary nature of the signal is illustrated in Figure 1. Thus, R y (u, N) can be written as a Fourier series [5]: R y (u, N) =

R0y (N) +

−1 k=α /2−1

2 jπkαu Rkα . y (N)e

(3)

k=−α−1 /2,k = /0

In (3), each Fourier coefficient Rkα y (N) is the cyclic correlation at frequency kα at time lag N. This term is also written as u=U −1  1   E y(u + N)y ∗ (u) · e−2 jπkαu , (4) U →∞U u=0

Rkα y (N) = lim

which can be estimated as follows: Rkα y (N) =

u=U −1 1  y(u + N)y ∗ (u) · e−2 jπkαu . U u=0

(5)

The basic idea behind the cyclostationarity detector is to analyze this Fourier decomposition and assess the presence of the signal by setting a cost function related to one [18] or more [19] of these cyclic frequencies. This cost function is compared to some reference value. Several papers related to this algorithm have been proposed in the literature [17, 19–21]. They mainly differ in the way the harmonics are considered. In this paper, we consider the cost function suggested in [17]. By introducing the oversampling rate of Tc /Te and by considering Nb harmonics, this cost function can be derived from (5) as follows: J y,N (Nb )  2      Nb U   −1  T T c c ∗ ( − 2iπku/N+D)(T /T ) c e   (u+N) = y y u e   . Te Te   k=−Nb u=0

(6)

EURASIP Journal on Wireless Communications and Networking y(n)

3 CP0

CP0

y(n − N)

CP1

CP1 CP0

CP−1 CP0

CP1

E[y(n)y ∗ (n − N)] N

D

N

D

Figure 1: Ideal autocorrelation signal of an OFDM symbol burst.



⎞ ⎛

⎜ Tc ⎟ ⎟ y⎜ ⎝(u + N) T ⎠ e



Delay line



Complex multiplier

e

2Nb

k=2



Look-up table

Look-up table

e

+

k=0

k=1



⎜ ⎜ ⎟ Tc ⎟ ⎟ ∗ ⎜ TC ⎟ y⎜ ⎝(u + N) T ⎠ y ⎝u T ⎠

+

Acc

J y,N (Nb )

Modulus

Complex multiplier

Complex multiplier

+

Acc

+

Acc

+

Acc

+

Acc

Modulus

+ Modulus

+

−2iπku Tc e N + D Te

+

Acc

⎛ ⎞ ⎛ ⎞ −2iπku Tc ⎟ ⎜ ⎟ U −1 ⎜ T T c ⎟ ∗⎜ ⎜ y ⎝u C ⎟ e N + D Te u=0 y ⎝(u + N) ⎠ ⎠ T T e

e

Figure 2: Cyclostationarity detector for WiFi signals.

It can be observed that the cost function is only built upon −kα Rkα y (N) while R y (−N) is omitted. Indeed, it is fairly easy to ∗ −kα prove that for all k, Rkα y (N) = R y (−N) (where ∗ denotes the complex conjugation).

3. Cyclostationarity Detector Architecture for WiFi Signals The cyclostationarity detector for IEEE802.11a/g signals is specified considering the scenario presented in [22]. In this scenario, the detector is used to check the presence of WiFi signals in order to trigger data transmission from a secondary system which is completely independent from the primary system (no messaging exchanged, no synchronization performed). Besides, in order to achieve the highest spectrum efficiency, the secondary system is expected to exploit time

gaps (opportunities) in the time domain rather than to leave the channel to find a vacant one. Although this strategy may lead to some collisions, it is found acceptable due to the nature of the primary (unlicensed system) and in so far as the impact is not significant at application level [22]. Focusing on the design of the cyclostationarity detector, this scenario leads to the requirements of a low-latency detector. Detector latency directly impacts the duration of the time gaps that will be exploited by the secondary system. When the primary system is bursty, which is the typical nature of WiFi traffic, latency should be far shorter than the gaps between two consecutive bursts. The need for low latency calls for a parallel approach in which the Fourier coefficients are computed at the same time. Such a structure is described in Figure 2. This architecture is directly derived from (6). The top left corner block computes one single observation of the

EURASIP Journal on Wireless Communications and Networking 1

1

0.9

0.9

0.8

0.8 Probability of detection

Probability of detection

4

0.7 0.6 0.5 0.4 0.3

0.7 0.6 0.5 0.4 0.3

0.2

0.2

0.1

0.1

0

−20

−19

−18

−17

−16

−15

−14

−13

−12

−11

0

−20 −18 −16 −14 −12 −10

U =5 U = 10

Nb = 0 Nb = 2 Nb = 5

−8

−6

−4

−2

0

SNR (dB)

SNR (dB)

U = 100 U = 1000

Figure 4: Influence of U (with Nb = 2). Figure 3: Influence of Nb .

autocorrelation function. Each grey block then computes the Fourier coefficients in parallel. Each of these branches is accumulated over the observation time U before being aggregated by the sum blocks on the right of the figure. The first point to consider when designing a parallel architecture is to analyze how many branches need to be instantiated. In other words, how the cyclostationary detector performs according to Nb . For this purpose, the probability of detection is computed as a function of the SNR under AWGN conditions for various Nb values. Other parameters are kept constant. For instance U is set to a large value (U = 1000). The results obtained are provided in Figure 3. For Figures 3–6, 1000 independent iterations have been carried out to build the curve. Selecting Nb = 0 corresponds to considering the fundamental frequency only, which is equivalent to performing energy detection. Detector performance is maximized for a small Nb value, which implies that performance can be maximized for a limited hardware complexity. Aggregating harmonics still further causes performance to decrease since high harmonics, of low amplitude, are strongly impacted by noise. This shows that performance can be optimized with respect to Nb while preserving a limited hardware complexity. Another important parameter for the detector is the size of the integration window U (where U denotes the number of OFDM symbols considered for integration). Although this parameter has a more limited impact on hardware complexity (only the accumulators are slightly larger), U has a strong influence on latency, another major requirement in the scenario. As expected, increasing U does indeed improve performance significantly as shown in Figure 4. Limiting detector latency while preserving performance of long observation time is possible by trading U against

Tc /Te (Fe = 1/Te = 20 MHz). Oversampling is expected to have a similar influence on performance in that it increases U, except for the fact that Tc /Te cannot be reasonably increased to a similar extent to U. Therefore, whenever latency is not critical, increasing U should be considered. Besides, increasing Tc /Te directly impacts the length of the delay line of the correlator, as well as the look-up tables used for storage of the sine waveforms, whereas U had only a slight impact on the complexity of the accumulators in each branch. Thus, priority should be given to increasing U in so far as detector latency fits into the latency specification. In the case of the WiFi detector, 5 OFDM symbols correspond to a latency of 20 μs. Additional performance can then be ensured by a reasonable increase in Tc /Te to limit the additional complexity drawback. Figure 5 shows the influence of Tc /Te. Finally, the last parameter that needs to be determined is W, the width of the binary word representing the I/Q input data. Assuming that the full dynamic range is preserved throughout the architecture, it is obvious that this parameter will significantly impact hardware complexity. However, the impact on detector performance is less obvious, and some simulations must be quantified. These simulation results are provided in Figure 6. Figure 6 shows that near optimal performance can be obtained where W = 4. However, to preserve some additional margin, a value of 8 is preferred, with rescaling after each macro block to guarantee a good performance/complexity tradeoff. With these parameters, detector overall latency has been measured at 40.5 μs. Finally, the complexity of detector hardware implementation is determined on a Xilinx Virtex 4 target technology using the ISE XST synthesis tool. Results are provided in Table 1 when the following parameter values are considered: N = 64, D = 16, U = 5, Nb = 2, Tc /Te = 1, and W = 4.

5

1

1

0.9

0.9

0.8

0.8 Probability of detection

Probability of detection

EURASIP Journal on Wireless Communications and Networking

0.7 0.6 0.5 0.4 0.3

0.7 0.6 0.5 0.4 0.3

0.2

0.2

0.1

0.1

0

−16

−14

−12

−10

−8

−6

−4

−2

0

0

−12 −10

−8

−6

−4

4

6

8

Table 1: Complexity evaluation of the WiFi detector.

4. Cyclostationarity Detector Architecture for DVB-T Signals In the same way as IEEE802.11a/g, the physical layer of DVB-T is based on an OFDM modulation. However, some key elements differ from WiFi systems. First, the DVB-T standard defines four FFT sizes: N = 1024, 2048, 4096, or 8192, and Fe = 8 MHz. The cyclic prefix over FFT size ratio D/N can also vary: 1/32, 1/16, 1/8, and 1/4. However, in practice, implementation considers a smaller set of parameters depending on the country. For instance, in France, the set of parameters used is N = 8192, D/N = 1/32. Another key difference, which will be exploited in the architecture design, stems from the broadcast nature of the DVB-T signal. This means that detector sensitivity can be increased significantly by very long integration time which cannot be considered in the case of short signal bursts occurring in WiFi. This is, of course, a relevant feature since sensitivity requirements for primary user detection are very demanding (typically SNR = −10 dB, to which an additional margin for detector Noise Figure must be added [23]). Another point derived from the broadcast nature of the signal is the way the reference signal used to define the decision threshold is computed. When undertaking this calibration phase, the secondary system needs to consider a reference value which is independent from signal presence. When considering long (ideally infinite) integration time, the autocorrelation function R y (u, N) defined in Section 2 tends to a rectangular signal as depicted in Figure 1, the cyclic ratio of which is D/(N + D). In this case, the Fourier coefficient is written as 

2

Figure 6: Influence of W (N = 64, D = 16, U = 5, Nb = 2, Tc /Te = 1)

Figure 5: Influence of Tc /Te (N = 64, D = 16, U = 5, Nb = 2).



0

W =4 W =8

W =2 W =3

Tc /Te = 1 Tc /Te = 2 Tc /Te = 8

A 2π · k · D 2π · k · D sin + j 1 − cos Rkα y (N) = 2π · k N +D N +D

−2

SNR (dB)

SNR (dB)



. (7)

Slices 1960

Complexity RAM 0

Mult 35

Latency 40.5 μs

Each coefficient power is given by  2  A · D 2  0 R y  = ,

k = 0,

N +D

      2π · k · D A 2  kα 2 R y  = 2 1 − cos ,

N +D

2πk

(8) k= / 0.

It is obvious from (8) that Rkα y (N) = 0 whenever kD/(N + D) is an integer value. This holds for instance when k=

N + 1. D

(9)

Figure 7 plots the Fourier coefficients of a rectangular signal when N/D = 32. It can therefore be concluded that Fourier harmonic 33 is not impacted by the presence of the signal and can thus be used for calibration purposes to define the reference noise level. As a comparison, calibration based on input power computation (i.e., (1/U) Uu=−01 | y(u)|2 ) is not relevant as this estimator is strongly impacted by the presence of the signal. When considering the first 4 harmonics [−3; +3], a decision variable V can be expressed as follows:

V=

3 2 2 i=−3 |hi | . 7 |h−33 |2 + |h33 |2

(10)

Of course, this technique holds for infinite integration time to guarantee the rectangular shape of the autocorrelation

6

EURASIP Journal on Wireless Communications and Networking

Harmonic power (dB)

Fourier decomposition coefficient of square signal (N/D = 32) 0 −5 −10 −15 −20 −25 −30 −35 −40

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 Harmonic index

Figure 7: Fourier coefficient values for N/D = 32.

Useful to noise harmonic ratio (dB)

35 30 25 20 15 10 5 0 −12

−2

−7

3

8

13

18

Input SNR (dB) n = 128 n = 64 n = 32

Figure 8: Detection threshold according to the input SNR.

estimator (Figure 1). Whenever a finite integration is performed, the convergence of the integrator needs to be considered. The integrator is a first order IIR filter, the z transform of which is given by H(z) =

1 1 , n 1 − ((n − 1)/n)z−N

(11)

where n can be tuned to adjust the raising time of the filter. Indeed, the indicial response of the filter is given by 

sind (k) = 1 −

n−1 n

k

(k ≥ 0).

(12)

The raising time kr (in number of symbols) to reach 90% is then given by kr ≤

2.3 − 1 ≤ kr + 1. ln(n/(n − 1))

(13)

Table 2: Complexity evaluation of the DVB-T detector.

Slices

Complexity RAM blocks of 18 kbits

Mult

1600

122

23

Latency Depends on n

For large n values, the expression in (13) tends to 2.3n. Estimator performance is increased by increasing the integration ability of the filter. This is, however, at the cost of long integration time. Thus, this approach is to be considered for “always on” kind of systems, such as DVB-T broadcast signals to guarantee reliable detection under low SNR-conditions. Figure 8 shows the decision variable V as a function of the input SNR (under AWGN conditions) for several values of n. The area before the curve corresponds to a 0.5 detection probability and must be avoided. The aim of the curve is to show how increase in integration time impacts the performance of the detector for a given threshold value. For instance when an SNR of −7 dB is targeted and for a threshold set to 15, no detection is possible when considering n = 32. However, when n is set to 128, a reliable behavior is achieved. Setting n to 64 results in nonreliable decisions. From this graph, a trade-off between SNR detection condition and integration time can be set. Detection and probability detection curves based on real signal measurements will be provided in a future paper. However, in order to evaluate a first implementation of the detector, parameter values used for the WiFi case were considered as an initial assumption. Finally, the cyclostationary detector hardware architecture for DVB-T is shown in Figure 9. First, the autocorrelation is computed on the I/Q complex samples. The IIR integrator then averages over a number of symbols tuned by setting the integration time parameter to achieve the required sensitivity. The supervisor, a Finite State Machine (FSM), then triggers the writing into a buffer that stores 8 k filter output samples (equivalent to the length of an OFDM symbol). Then, using a faster clock, the Fourier harmonics are computed sequentially. Unlike parallel computation over distinct instances in the architecture of Section 2, parallelism is achieved here using a faster clock and some control mechanisms provided by the FSM, even though latency constraints are not as critical as in the first case study. The sine generator computes sequentially the required sine function of the Fourier taps of interest. The Multiply ACcumulate (MAC) function enables the Fourier coefficient to be obtained for these taps. The sequence is as follows. First, the reference harmonics {−33; +33} are generated to compute the noise reference power. Then, the harmonics of interest for the DVB-T signal {0; −1; +1; −2; +2; −3; +3} are calculated. The power of each harmonic is summed up to obtain the cyclostationarity estimator value. Finally, the decision engine gives the final result by comparing the estimated value to the threshold value according to (10), which provides a hard decision output of the detector.

EURASIP Journal on Wireless Communications and Networking

7

Q

Write @ Read Start

Supervisor manager

Control signals m

p

Control signals

Sequential sine generator exp(j.π.mp/(N + D)) m in 0; L symbol-1 p is {−33; +33; (noise harmonics)) 0; (fundamental harmonics) −1; +1; (cyclic harmonics 1) −2; +2; (cyclic harmonics 1) −3; +3; } (cyclic harmonics 1)

I MAC

Power computation Q

Noise harmonics accumulator

Q

I

Useful harmonics accumulator

Q

Read interface

I

IIR first order

One symbol acquisition DP-RAM

Input imaginary part-Q

I

Write interface

Input real part-I

Autocorrelation computation

Sampling clock System clock

I Q

Decision Decision engine

Threshold

Figure 9: Cyclostationarity detector for DVB-T signals.

Finally, the complexity of detector hardware implementation is determined on a Xilinx Virtex 5 target technology using the ISE XST synthesis tool. Results are provided in Table 2.

5. Conclusion This paper presents 2 cyclostationarity detectors targeting different scenarios. It is shown in the paper that selection of the scenario has a strong influence on architecture and its performance tradeoffs. First, when aiming at secondary usage of ISM bands with time leftover reuse, latency is the key parameter. With this architecture, latency as low as 40.5 μs was measured. Besides, the cyclostationary detectors of this paper outperform classical energy detectors in terms of probability of detection (e.g., Pd is increased by 0.4 where SNR = −17 dB in the WiFi case). This has led to a parallel design in which sensitivity is traded against low latency as collisions with the primary system may be tolerated. On the other hand, when considering secondary spectrum usage of licensed bands, collisions are not permitted and much attention must be paid to sensitivity. This is achieved through long integration time which relies on the assumption that the signal is either “always on” or absent. This assumption makes the second architecture ideally suited to broadcast signal detection (e.g., DVB-T), but would be inapplicable to the first scenario.

Acknowledgments The authors would like to acknowledge the ORACLE European IST project of the 6th Framework Program and the French ANR INFOP project for supporting the work presented in this paper.

References [1] J. Mitola, Cognitive radio: an integrated agent architecture for software defined radio, Ph.D. thesis, Royal Institute of Technology, Stockholm, Sweden, May 2000. [2] L. Berlemann and S. Mangold, Cognitive Radio and Dynamic Spectrum Access, John Wiley & Sons, New York, NY, USA, 2009. [3] A. Sahai and D. Cabric, “A tutorial on spectrum sensing: fundamental limits and practical challenges,” in Proceedings of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’05), Baltimore, Md, USA, November 2005. [4] D. Noguet et al., “Sensing techniques for cognitive radio— state of the art and trends,” April 2009, http://grouper.ieee.org/ groups/scc41/6/documents/white papers/P1900.6 WhitePaper Sensing final.pdf. [5] W. A. Gardner, Statistical Spectral Analysis: A Nonprobabilistic Theory, Prentice-Hall, Englewood Cliffs, NJ, USA, 1988. ˇ [6] G. D. Zivanovi´ c and W. A. Gardner, “Degrees of cyclostationarity and their application to signal detection and estimation,” Signal Processing, vol. 22, no. 3, pp. 287–297, 1991. [7] W. A. Gardner and C. M. Spooner, “Signal interception: performance advantages of cyclic-feature detectors,” IEEE Transactions on Communications, vol. 40, no. 1, pp. 149–159, 1992. [8] W. Gardner and A. William, Cyclostationarity in Communications and Signal Processing, IEEE Press, New York, NY, USA, 1994. [9] “FCC adopts rules for unlicensed use of television white spaces,” Official announcement of FCC, November 2008, http://www.fcc.gov/. [10] IEEE 802.22, “Wireless Regional Area Networks (“WRANs”),” http://www.ieee802.org/22/.

8

EURASIP Journal on Wireless Communications and Networking

[11] L. Biard, D. Noguet, T. Gernandt, P. Marques, and A. Gameiro, “A hardware demonstrator of an opportunistic radio system using temporal opportunities,” in Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom ’09), pp. 1–6, Hanover, Germany, June 2009. [12] Z. Ye, J. Grosspietsch, and G. Memik, “Spectrum sensing using cyclostationary spectrum density for cognitive radios,” in Proceedings of the IEEE Workshop on Signal Processing Systems, Shanghai, China, October 2007. [13] V. Turunen, M. Kosunen, A. Huttunen et al., “Implementation of cyclostationary feature detector for cognitive radios,” in Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom ’09), Hannover, Germany, June 2009. [14] V. Turunen, M. Kosunen, S. Kallioinen, A. Parssinen, and J. Ryynanen, “Spectrum estimator and cyclostationary detector for cognitive radio,” in European Conference on Circuit Theory and Design (ECCTD ’09), pp. 283–286, Antalya, Turkey, August 2009. [15] Y. Tachwali, M. Chmeiseh, F. Basma, and H. H. Refai, “A frequency agile implementation for IEEE 802.22 using software defined radio platform,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’08), pp. 3128–3133, New Orleans, La, USA, December 2008. [16] R. Prasad, OFDM for Wireless Communications Systems, Artech House, Norwood, Mass, USA, 1999. [17] P. Jallon, “A spread signals detection algorithm based on the second order statistics in semi-blind contexts,” in Proceedings of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom ’08), May 2008. [18] A. V. Dandawat´e and G. B. Giannakis, “Statistical tests for presence of cyclostationarity,” IEEE Transactions on Signal Processing, vol. 42, no. 9, pp. 2355–2369, 1994. [19] J. Lund´en, V. Koivunen, A. Huttunen, and H. V. Poor, “Spectrum sensing in cognitive radios based on multiple cyclic frequencies,” in Proceedings of the 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom ’07), pp. 37–43, Orlando, Fla, USA, August 2007. [20] M. Ghozzi, M. Dohler, F. Marx, and J. Palicot, “Cognitive radio: methods for detection of free bands,” Elsevier Science Journal, vol. 7, pp. 794–805, 2006. [21] A. Bouzegzi, P. Jallon, and P. Ciblat, “A second order statistics based algorithm for blind recognition of OFDM based systems,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’08), pp. 3257–3261, December 2008. [22] ORACLE D6.1 Deliverable, “Definition of test scenarios for the demonstrator,” August 2007, http://www.ist-oracle.org/. [23] S. Shellhammer, “Spectrum sensing in IEEE802.22,” in Proceedings of the 1st IAPR Workshop on Cognitive Information Processing (CIP ’08), Santorini, Greece, June 2008.

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 721695, 10 pages doi:10.1155/2010/721695

Research Article Higher-Order Cyclostationarity Detection for Spectrum Sensing Julien Renard, Jonathan Verlant-Chenet, Jean-Michel Dricot, Philippe De Doncker, and Francois Horlin Universit´e Libre de Bruxelles, Avenue F. D. Roosevelt 50, 1050 Brussels, Belgium Correspondence should be addressed to Julien Renard, [email protected] Received 30 September 2009; Revised 18 February 2010; Accepted 15 June 2010 Academic Editor: Andr´e Bourdoux Copyright © 2010 Julien Renard et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Recent years have shown a growing interest in the concept of Cognitive Radios (CRs), able to access portions of the electromagnetic spectrum in an opportunistic operating way. Such systems require efficient detectors able to work in low Signal-to-Noise Ratio (SNR) environments, with little or no information about the signals they are trying to detect. Energy detectors are widely used to perform such blind detection tasks, but quickly reach the so-called SNR wall below which detection becomes impossible Tandra (2005). Cyclostationarity detectors are an interesting alternative to energy detectors, as they exploit hidden periodicities present in man-made signals, but absent in noise. Such detectors use quadratic transformations of the signals to extract the hidden sinewaves. While most of the literature focuses on the second-order transformations of the signals, we investigate the potential of higher-order transformations of the signals. Using the theory of Higher-Order Cyclostationarity (HOCS), we derive a fourthorder detector that performs similarly to the second-order ones to detect linearly modulated signals, at SNR around 0 dB, which may be used if the signals of interest do not exhibit second-order cyclostationarity. More generally this paper reviews the relevant aspects of the cyclostationary and HOCS theory, and shows their potential for spectrum sensing.

1. Introduction Many studies have shown that the static frequency allocation for wireless communication systems is responsible for the inefficient use of the spectrum [1]. This is so because the systems are not continuously transmitting. Cognitive Radios (CRs) networks try to make use of the gaps that can be found in the spectrum at a given time. This opportunistic behavior categorizes CR as secondary users of a given frequency band, by contrast with the systems that were permanently assigned this band (primary users) [2]. For the CR concept to be viable, it is required that it does not interfere with the primary user services. It means that the system must be able to detect primary user signals in low signal-to-noise ratio (SNR) environments fast enough. Efforts are being made to improve the performance of the detectors [3]. A radiometer (also called energy detector) can be used to detect completely unknown signals in a determined frequency band [4]. It is historically the oldest and simplest detector, and it achieves good performance when the SNR is strong enough. Unfortunately, since it is based on an estimation of the in-band noise power spectral density

(PSD), it is affected by the noise level uncertainty (due to measurement errors or a changing environment), especially at low SNR [5], where it reaches an absolute performance limit called the SNR wall. Another type of detector is based on the spectral redundancy present in almost every manmade signal. It is called a cyclic feature detector and will be the kind of detector of interest in this paper. Cyclic feature detectors make use of the cyclostationarity theory, which can be divided in two categories: the secondorder cyclostationarity (SOCS) introduced by Gardner in [6–8] and the higher-order cyclostationarity (HOCS) introduced by Gardner and Spooner in [9, 10]. The SOCS uses quadratic nonlinearities to extract sine-waves from a signal, whereas the HOCS is based on nth-order nonlinearities. The idea behind this theory is that man-made signals possess hidden periodicities such as the carrier frequency, the symbol rate or the chip rate, that can be regenerated by a sine-wave extraction operation which produces features at frequencies that depend on these hidden periodicities (hence called cyclic features and cycle frequencies resp.). Since the SOCS is based on quadratic nonlinearities, two frequency parameters are used for the sine-wave extraction function. The result is

2

EURASIP Journal on Wireless Communications and Networking

called the spectral correlation density (SCD), and can be represented in a bifrequency plane. The SCD can be seen as a generalization of the PSD, as it is equal to the PSD when the cycle frequency is equal to zero. Therefore, the SOCS cyclic feature detectors act like energy detectors, but at cycle frequencies different from zero. The advantage of these detectors comes from the absence of features (at least asymptotically) when the input signal is stationary (such as white noise), since no hidden frequencies are present, or when the input signal exhibits cyclostationarity at cycle frequencies different than the one of interest. The HOCS cyclic-feature detectors are based on the same principles, but the equivalent of the SCD is a n-dimensional space (n > 2). Like SOCS detectors, HOCS detectors have originally been introduced in the literature to blindly estimate the signal frequency parameters. It has been shown that the second-order cyclostationarity detectors perform better than the energy detectors in low SNR environments [7], and this has recently triggered a lot of research on the use of cyclostationarity detectors for spectrum sensing in the context of cognitive radios [11, 12]. However the second-order detectors suffer from a higher computational complexity that has just become manageable. First field-programmable gate array (FPGA) implementations are presented in [13, 14]. Higher-order detectors are generally even more complex, and since the variance of the features estimators increases when the order rises, most research results concern secondorder detectors. We will nevertheless demonstrate that it is possible to derive fourth-order detectors that bear comparable performances to second-order ones to detect linearly modulated baseband signals at SNR around 0 dB. The paper will include a mathematical analysis of the detection algorithm, the effects of each of its parameters and its computational complexity. Performance will be assessed through simulations and compared with the second-order detector. After introducing the system model in Section 2, we will briefly review the basic notions of cyclostationarity theory in Section 3 in order to understand how second-order detectors work and identify their limitations. Afterwards, we will move on to HOCS theory, and present its most relevant aspects in Section 4, which will be used to characterize the linearly modulated signals in Section 5 and to derive an algorithm that may be used for signal detection of linearly modulated signals in Section 6. We will conclude by a comparison of the new detector performance with second-order detector and energy detector performances in Section 7.

where Im is the sequence of information symbols transmitted at the rate Fs = 1/Ts and p(t) is the pulse shaping filter (typically a square-root Nyquist filter). After baseband-toradio frequency (RF) conversion, the RF transmitted signal is given by: sRF (t) = R[s(t)] cos(ωc t) − I[s(t)] sin(ωc t),

where ωc = 2π fc and fc is the carrier frequency. In the PAM case, the symbols Im are real and only the cosine is modulated. In the QAM case, the symbols Im are complex and both the cosine and sine are modulated. A QAM signal can be seen as two uncorrelated PAM signals modulated in quadrature. For the sake of clarity, we assume that the signal propagates through an ideal channel. Our results can nevertheless be extended to the case of multipath channels, if we consider a new pulse shape that is equal to the convolution of square-root Nyquist filter with the channel impulse response. However, this would make the new pulse random. Simulations have shown that both second-order and fourth-order detectors are affected in the same way by a multipath channel (equivalent degradation of performances). Therefore it does not seem critical to introduce multipath channels in order to compare the two, and it allows us to work with a constant pulse shape. Additive white Gaussian noise (AWGN) of onesided PSD equal to N0 corrupts the signal at the receiver. Some amount of noise uncertainty can be added to N0 . The detection of the signal at the receiver can be either done directly in the RF domain or in the baseband domain after RF-to-baseband conversion.

3. Second-Order Cyclostationarity Two approaches are used to introduce the notion of cyclostationarity [8]. While the first approach introduces the temporal features of cyclostationary signals, the second approach is more intuitive and is based on a graphical representation of spectral redundancy. Both approaches lead to the same conclusion. This section reviews the main results of the second-order cyclostationarity theory, which will be generalized to higher-order cyclostationarity in the next sections. 3.1. Temporal Redundancy. A wide-sense cyclostationary signal x(t) exhibits a periodic autocorrelation function [6, 7] Rx (t, τ) := E[x(t)x∗ (t − τ)],

s(t) =

Rx (t, τ) =

∞ 

Im p(t − mTs ),

m=−∞

(1)

(3)

where E[·] denotes the statistical expectation operator. Since Rx (t, τ) is periodic, it can be decomposed in a Fourier series

2. System Model This paper focuses on the detection of linearly modulated signals, like pulse amplitude modulation (PAM) or quadrature amplitude modulation (QAM) signals. The baseband transmitted signal is usually expressed as

(2)



Rαx (τ)e j2παt ,

α

(4)

where the sum is over integer multiples of the fundamental frequencies. The coefficient Rαx (τ) is called the cyclic autocorrelation function, and represents the Fourier coefficient of the series given by Rαx (τ)

1 = T0

 T0 /2 t =−T0 /2

Rx (t, τ) e− j2παt dt.

(5)

EURASIP Journal on Wireless Communications and Networking When the signal is cyclo-ergodic, the expectation in the definition of the autocorrelation can be replaced by a time average so that 1 T →∞T

Rαx (τ) = lim

 T/2 t =−T/2

x(t) x∗ (t − τ) e− j2παt dt .

f

3.2. Spectral Redundancy. Let X( f ) be the Fourier transform of x(t). The SCD measures the degree of spectral redundancy between the frequencies f − α/2 and f + α/2 (α being called the cyclic frequency). It can be mathematically expressed as the correlation between two frequency bins centered on f − α/2 and f + α/2 when their width tends toward zero [6, 7]  

Sαx f



 Δt/2 t =−Δt/2

XT









=

 t+T/2 u=t −T/2

x(u) e− j2π f u du .

SCD

f

Figure 1: Baseband signal frequency spectrum (top) and SCD at the symbol rate (bottom). The frequency spectrum results from the repetitive discrete signal spectrum and the filter shaping. The SCD is measured by the correlation between two frequency bins centered on f − α/2 and f + α/2 where α is the symbol rate. The symbol rate feature exists for baseband PAM/QAM signals if there is some excess bandwidth in the system.



f +α ∗ f −α t, XT t, dt, 2 2 (7)

where XT (t, f ) denotes the short-time Fourier transform of the signal XT t, f

XT ( f )

(6)

The cyclic autocorrelation is therefore intuitively obtained by extracting the frequency α sine-wave from the time-delay product x(t) x∗ (t − τ). The SCD Sαx ( f ) is defined as the Fourier transform of Rαx (τ) over τ. We notice that the only cyclic frequencies α for which the SCD will not be null are the ones corresponding to the Fourier coefficients.

1 = lim lim T → ∞ Δt → ∞ TΔt

3

(8)

Since the SCD depends on f and α, it can be graphed as a surface over the bifrequency plane ( f , α). When α = 0, the SCD reduces to the PSD. 3.3. Baseband and RF Second-Order Features. The performance of the cyclic feature detectors will first depend on the strength of the features they are trying to estimate. The two most common features exploited to detect the linearly modulated signals are linked with the symbol rate and the carrier frequency. (i) The symbol rate feature is usually exploited after RFto-baseband conversion at the receiver. As its name suggests it, it originates from the symbol rate at the transmitter. Since this is a discrete signal, its frequency spectrum is periodic, with a period equal to the inverse of the sample rate (which is equal to the symbol rate before RF conversion). If there is some excess bandwidth in the system, or in other words, if the pulse shaping filter p(t) does not totally cut off the frequency components larger than half the inverse of the symbol rate, some frequencies will be correlated, as shown in Figure 1. (ii) The doubled-carrier frequency feature is directly exploited in the RF domain. It is based on the symmetry of the RF spectrum, and it is much

stronger than the symbol rate feature (it is as strong as the PSD). Since it depends on the symmetry of the spectrum of the baseband signal, it only exists if the modulation used has no quadrature components. If a real PAM scheme is used, the carrier feature exists, as illustrated in the left part of Figure 2. If a complex QAM scheme is used, the carrier feature vanishes, as illustrated in the right part of Figure 2. Since complex modulations are quite common, it would not be possible to implement a cyclic feature detector for CRs based on the doubled-carrier frequency feature. On the other hand, the symbol rate feature solely depends on the pulse shaping filter. Provided that there is some excess bandwidth, the symbol rate feature will exist, whatever the modulation. Unfortunately, that feature is relatively small and depends on the amount of excess bandwidth. We can therefore ask ourselves if it would not be possible to find greater features using a fourth-order detector.

4. Higher-Order Cyclostationarity The higher-order cyclostationarity (HOCS) theory is a generalization of the second-order cyclostationarity theory, which only deals with second-order moments, to nth-order moments [9, 10]. It makes use of the fraction-of-time (FOT) probability framework (based on time averages of the signals) which is closely related to the theory of high-order statistics (based on statistical expectations of the signals), by ways of statistical moments and cumulants. This section reviews the fundamentals of the HOCS theory and highlights the metrics that can be used for spectrum sensing. 4.1. Lag-Product. We must always keep in mind that the goal of the HOCS theory is to extract sine-waves components

4

EURASIP Journal on Wireless Communications and Networking XT RF ( f )

XT RF ( f )

− fc

fc − fc

fc

f

f

SCD

SCD

f

f

(a)

(b)

Figure 2: RF signal frequency spectrum (top) and SCD at twice the carrier frequency (bottom). The SCD is measured by the correlation between two frequency bins centered on f − α/2 and f + α/2 where α is the carrier frequency. The doubled-carrier frequency feature exists for RF PAM signals as the baseband frequency spectrum exhibits a correlation between negative and positive frequencies. In the absence of any filtering, this correlation produces a symmetric frequency spectrum (left part). The doubled-carrier frequency feature vanishes for RF QAM signals as the baseband frequency spectrum is uncorrelated (right part).

from a signal, in which they are hidden by random phenomena. To extract, or regenerate, these frequencies, a nonlinear operation must be called upon. The second-order theory uses the time-delay product L(t, τ) = x(t) · x∗ (t − τ) which will be transformed in the autocorrelation after averaging. A natural and intuitive generalization of this operation to the nth-order is called the lag-product and can be expressed as [9]: L(t, τ)n = x(∗) (t + τ1 )x(∗) (t + τ2 ) · · · x(∗) (t + τn ) =

n 





x(∗) j t + τ j ,

(9) (10)

j =1

where the vector τ is composed of the individual delays τ j ( j = 1, . . . , n). The notation x(∗) (t) indicates an optional conjugation of the signal x(t). 4.2. Temporal Moment Function and Cyclic Temporal Moment Function. If the signal possesses a nth-order sine-wave of frequency α, then the averaging of the lag-product, multiplied by a complex exponential of frequency α, must be different from zero [9]: 1 T →∞T

Rαx (τ)n = lim

 T/2 −T/2

L(t, τ)n e− j2παt dt.

(11)

Obviously, Rαx (τ)n is a generalization of the cyclic autocorrelation function described in (5). It is called the nthorder cyclic temporal moment function (CTMF). The sum of the CTMF (multiplied by the corresponding complex exponentials) over frequency α is called the temporal moment function (TMF) and is a generalization of the autocorrelation

function described in (3): Rx (t, τ)n =



Rαx (τ)n e j2παt .

(12)

α

Each term of the sum in (12) is called an impure nthorder sine-wave. This is so because the CTMF may contain products of lower-order sine-waves whose various orders sum to n. In order to extract the pure nth-order sine-wave from the lag-product, it is necessary to subtract the lowerorder products. The pure nth-order sine-wave counter-part of the CTMF, denoted by Cxα (τ)n , is called the cyclic temporal cumulant function (CTCF). The pure nth-order sine wave counter-part of the TMF, denoted by Cx (t, τ)n , is called the temporal cumulant function (TCF). 4.3. Temporal Cumulant Function and Cyclic Temporal Cumulant Function. The CTMF and TMF have been computed by using the FOT probability framework. In order to compute the CTCF and TCF, it is interesting to make use of the equivalence between the FOT probability framework and the high-order statistics theory. More specifically, the paper [9] demonstrates that the TMF of a signal can be seen as the nth-order moment of the signal, and that the TCF of a signal can be seen as the nth-order cumulant of the signal (hence their names). By using the conventional relations between the moments and the cumulants found in the high-order statistics theory, the TCF takes therefore the form: Cx (t, τ)n =

 {P }

⎡ ⎣(−1)

p−1 

p  

p−1 !



Rx t, τ j

j =1



nj

⎦,

(13)

where {P } denotes the set of partitions of the index set 1, 2, . . . n (10), p is the number of elements in the partition P, and Rx (t, τ j )n j is the TMF of the jth-element of order n j of the partition P.

EURASIP Journal on Wireless Communications and Networking The CTCFs are the Fourier coefficients of the TCF and can be expressed in terms of the CTMFs: ⎡

Cxα (τ)n =

in which CI,n is the nth-order cumulant of the symbol sequence Im :



p ⎢    βj ⎥ ⎢(−1) p−1 p − 1 ! Rx τ j n ⎥ ⎣ ⎦,   j

CI,n =

where {β} denotes the set of vectors of cycle frequencies for p

βj

the partition P that sum to α ( j =1 β j = α), and Rx (τ j )n j is the CTMF of the jth-element of order n j of the partition P at the cycle frequency β j . The CTCF is periodic in τ: Cxα (τ + 1n φ)n = Cxα (τ)n e j2πφα (1n is the dimension-n vector composed of ones, meaning that φ is added to all elements of τ). Therefore, it is not absolutely integrable in τ. To circumvent this problem, one dimension is fixed (e.g., τn = 0), and the CTCF becomes: α C x (u)n = Cxα ([u 0])n . This function is called reduced dimension-CTCF (RD-CTCF). It is the key metric of the ensuing algorithms for HOCS detectors. It should be noted that the equivalent exists for the CTMF and is called the RDα CTMF (Rx (u)n = Rαx ([u 0])n ). However the RD-CTMF is generally not absolutely integrable. 4.4. Cyclic Polyspectrum. The need for integrability comes from the desire to compute the Fourier transform of the RD-CTCF, which gives the cyclic polyspectrum (CP). The CP is a generalization of the SCD plane for cyclostationnary signals. However it is not necessary to compute the CP of a signal for sensing applications since detection statistics can be directly derived from a single slice of the RD-CTCF. For this reason, and the computational complexity gain, we will put the spectral parameters aside and devote our attention to the RD-CTCF.

5. Fourth-Order Features of Linearly Modulated Signals We have previously talked about the second-order cyclic features for communication signals, and we saw that the carrier frequency features tend to vanish from the SCD plane if the modulation is complex. We also asked ourselves if a fourth-order transformation of the signal may suppress the destructive interferences of quadrature components of a signal. We now have to gauge the potential of these fourthorder features. In this section, we compute the RD-CTCF of the baseband and RF linearly modulated signals and identify the interesting features that can be used for signal detection. 5.1. Baseband Signals. The TCF of the baseband signal (1) has been computed in paper [10]. The mathematical derivation results in: ∞  n 

p t + mTs + τ j

m=−∞ j =1



(15)



⎡ ⎣(−1)

pn −1



pn  

pn − 1 !



RI,n j ⎦,

(16)

j =1

{Pn }

(14)

β j =1

{P }

Cs (t, τ)n = CI,n

5

where {Pn } is the set of partitions of the set {1, . . . , n}, pn is the number of elements in the partition Pn , and n j is the order of the jth-element in the partition Pn ( j = 1 · · · pn ). RI,n is the nth-order moment of the symbol sequence Im : K/2−1

RI,n





1  ⎣  (∗)q ⎦ = lim Ik . K →∞K k=−K/2 q=1 n

(17)

The expression of the moment RI,n can be understood this way: given a particular type of modulation, do the symbol variables Ik elevated to the power n (with optional conjugation specified by the operator (∗)q ) gives a constant result? The answer to this question is helpful in assessing if a given signal may exhibit nth-order features and what kind of conjugation must be used in the lag-product (10). The appendix illustrates this result for the binary PAM and the quaternary QAM constellations (see also [10, 15]). Computing the Fourier transform of the TCF and canceling τn reveals the RD-CTCF in the form of: α

C s (u)n =

CI,n Ts

∞ t =−∞

p(∗) (t)

n −1





p(∗) t + u j e− j2παt dt,

j =1

(18) where the cycle frequencies are integer multiples of the symbol rate (α = kFs with k integer). The RD-CTCF of the baseband signal is nonzero only for harmonics of the symbol rate. The amplitude of the features tend to zero as the harmonic number k increases. 5.2. RF Signals. The RD-CTCF of the RF signal specified by (2) can be inferred from the RD-CTCF of the baseband signal s(t) by noting that the RF signal is obtained by modulating two independent PAM signals in quadrature. We need to calculate the CTCFs of PAM, sine and cosine signals, and to combine them using the following rules: (i) The cumulant of the sum is equal to the sum of the cumulants if the signals are independent. Therefore, if y(t) = x(t) + w(t) where x(t) and w(t) are two independent random signals, we have: C y (t, τ)n = Cx (t, τ)n + Cw (t, τ)n

(19)

and, after Fourier transform, we obtain: C αy (τ)n = Cxα (τ)n + Cwα (τ)n .

(20)

(ii) The moment of the product is equal to the product of the moments if the signals are independent. Therefore, if y(t) = x(t) w(t) where x(t) and w(t)

6

EURASIP Journal on Wireless Communications and Networking are two independent random signals, we have:

Lsin (t, τ)4 =

R y (t, τ)n = Rx (t, τ)n Rw (t, τ)n

(21)

  1 cos 4ωc t − φ1 − φ2 − φ3 − φ4 8  1  cos 2ωc t + φ1 + φ2 + φ3 − φ4 8



and, after Fourier transform, we obtain: Rαy (τ)n =



+ cos 2ωc t + φ1 + φ2 − φ3 + φ4



α−γ γ Rx (τ)n Rw (τ)n .



(22)

γ

+ cos 2ωc t + φ1 − φ2 + φ3 + φ4 

+ cos 2ωc t − φ1 + φ2 + φ3 + φ4

Equation (22) means that we have to multiply all CTMFs of x(t) and w(t) which sum to α. If one of the signals is nonrandom (w(t) in our case), the CTMF of the random signal can be replaced by its CTCF: C αy (τ)n =



α−γ Cx (τ)n

+

 1  cos φ1 − φ2 + φ3 − φ4 8 







+ cos φ1 − φ2 − φ3 + φ4

γ Rw (τ)n .

(23)

γ



+ cos φ1 + φ2 − φ3 − φ4





(26) The CTCFs of the baseband PAM signals can be computed using (18). The only difference with a QAM signal resides in the cumulant of the symbol sequence CI,n , which must be computed for PAM symbols through (16) and (17) (see the binary PAM case in the appendix). The CTMF of the sine and cosine signals can easily be determined from the expression of their lag-products: 1 T →∞T

Rαcos (t, τ)n = lim

1 Rαsin (t, τ)n = lim T →∞T

 T/2  n −T/2 j =1

 T/2  n −T/2 j =1





cos ωc t + φ j e−i2παt dt

α

C sRF (u)n =

sin ωc t + φ j e−i2παt dt,

where φ j = ωc τ j . The lag-product can be decomposed into a sum of cosine signals at various frequencies using Simpson formulas:   1   1 cos 2ωc t + φ1 + φ2 + cos φ1 − φ2 2 2

α−γ



γ

0



0

+ cos 2ωc t + φ1 + φ2 − φ3 + φ4



+ cos 2ωc t + φ1 − φ2 + φ3 + φ4 

+ cos 2ωc t − φ1 + φ2 + φ3 + φ4









+ cos φ1 + φ2 − φ3 − φ4

0

0



0

(28)

4 fc

0

 1   cos 2ωc t + φ1 + φ2 + φ3 − φ4 8 

0

= 2C PAM (u)4 Rcos (u)4 4f

4f 0 4f C s c (u)4  C PAM (u)4 Rcosc (u)4 + Rsinc (u)4 0



(27)

= 2C PAM (u)4 Rcos (u)4 .

  1 Lcos (t, τ)4 = cos 4ωc t − φ1 − φ2 − φ3 − φ4 8

+ cos φ1 − φ2 − φ3 + φ4

γ

C s (u)4  C PAM (u)4 Rcos (u)4 + Rsin (u)4

for the second order, and:

 1   + cos φ1 − φ2 + φ3 − φ4 8



C PAM (u)n Rcos (u)n + Rsin (u)n .

For n = 2, we observe the destructive interference between γ γ the components of Rcos (u)2 and Rsin (u)2 at twice the carrier frequency, as was introduced in Section 3. For n = 4, we also observe that the components of γ γ Rcos (u)4 and Rsin (u)4 at twice the carrier frequency cancel out, just as they do for the second order. There only remain the features at zero and four times the carrier frequency:

  1   1 Lsin (t, τ)2 = − cos 2ωc t + φ1 + φ2 + cos φ1 − φ2 2 2 (25)

+

 γ



(24)

Lcos (t, τ)2 =

for the fourth order. It is clear that the CTMF of sine or cosine signals is made of Dirac’s deltas at cycle frequencies 4 fc , 2 fc , and 0. Since the real and imaginary parts of s(t) are two statistically independent PAM signals, the CTCF of sRF (t) is the sum of two CTCFs of modulated PAM signals in quadrature. The CTCFs of R[s(t)] and I[s(t)] are equal and α (τ)n in our next results. We can finally write: denoted by CPAM





Since Rcos (u)4 is a sum of cosines that depend on u and  4f Rcosc (u)4 = (1/16)e jωc (−)i φi (the notation (−)i indicates an optional sign change according to the expressions (25)-(26)), 4f the features C s c (u)4 are six times smaller than the features 0 C s (u)4 (at least when u is null) and are therefore less suited for sensing scenarios. 5.3. Baseband and RF Fourth-Order Features. We have to choose between baseband or RF signals and decide on the cycle frequency that will be used by the detector. We have seen that baseband QAM signals have features at the cycle frequencies that are multiples of the symbol rate (0, Fs , 2Fs . . .), whereas RF signals have additional features

EURASIP Journal on Wireless Communications and Networking 30 0.6 20

7

In practice, the RD-CTCF is estimated based on a sizeN finite observation window of the received sequence s[n] obtained after sampling the received signal.

0.5 10 l2

0.4 0 0.3 −10

 [l] = C s 4

N/2−1

1  Ls [n, l]4 N n=−N/2

(30)

with N > 2 max |l j | and l j are the elements of the discrete lag-vector l of size n − 1.

0.2 −20 −30 −30

0.1 −20

−10

0 l1

10

20

30

Figure 3: Fourth-order RD-CTCF of a 4-QAM baseband signal as a function of the lag parameters l1 and l2 for the cycle frequency 0. The values of l0 and l3 have been fixed to 0 and 3 respectively. The system parameters are: 1 MHz symbol frequency, 10 MHz sample frequency, normalized square-root Nyquist pulse shaping filter of 0.2 roll-off factor.

at cycle frequencies that depend on the carrier frequency (4 f c + 0, 4 f c + Fs , 4 f c + 2Fs . . .). It has been shown that these additional features are small and that the strongest feature for both baseband and RF signals is obtained when the cycle frequency α is equal to zero. Since noise signals do not have any fourth-order feature (the fourth-order cumulant of a Gaussian random variable is equal to zero), even when α = 0. Note that α = 0 is a degenerated cycle frequency, which is present even in stationary signals. However, since it gives the strongest 4th-order feature, it is the frequency that will be preferred for our sensing scenario, even if the denomination “cyclic-feature detector” becomes inappropriate in this case. Simulations made with baseband or RF signals for α = 0 have shown that the two detectors exhibit similar performances. From now on, we will focus on the fourthorder feature detection for baseband signals and let aside the fourth-order feature detection for RF signals, as it enables a significant reduction of the received signal sampling frequency. The feature obtained in this situation is illustrated in Figure 3.

6. Fourth-Order Feature Detectors 6.1. RD-CTCF Estimator. In order to estimate the RD-CTCF of the baseband QAM signal, we would have to use (14). Luckily, the signal is complex and the second order features disappear if we do not use any conjugation in the lag product (see the quaternary QAM example in the appendix). Therefore the RD-CTCF is equal to the RD-CTMF:

0 C s (u)4

=

0 Rs (u)4

1 = lim T →∞T

⎧ 1 8 ⎪ ⎪ σn ⎪ ⎪ ⎪ N ⎪ ⎪ ⎪2 ⎪ ⎪ ⎪ ⎨ σn8

Ls (t, u)4 dt

(29)

if all lag values are different if two lag values are equal

N 2 = σRD-CTCF ⎪6 8 ⎪ ⎪ σ ⎪ ⎪ ⎪ N n ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ 24 σ 8 N n

(31) if three lag values are equal if all lag values are equal

in which σn2 is the variance of AWGN noise samples at the input of the RD-CTCF estimator. Simulations illustrated in Figure 4 confirm the result (31). Every discrete lag-vector l for which two or more values li , l j are identical should be avoided, since it increases the noise variance. However, to afford the luxury of choosing lag values that are different from zero, we would have to increase the sampling rate at the receiver, which in turn would increase the noise power. Simulations have shown that it is better to use the lowest sampling rate that still satisfies Shannon’s theorem, and set all lag values equal to zero. The RD-CTCF variance also quite naturally decreases as the observation window N is increased. 6.3. Detector. The detector has to decide between two hypotheses: hypothesis H0 implying that no signal is present, hypothesis H1 implying that the linearly modulated signal is present. The absolute value of the feature (here the RDCTCF) is compared to a threshold γ to make a decision:  0  H1   C (l)  ≷ γ.  s 4

(32)

H0

The threshold is usually fixed to meet a target probability of false alarm (decide H1 if H0 ). In order to compute the threshold level as a function of the probability of false alarm, we must know the distribution of the RD-CTCF. We already know its mean and variance values and using the centrallimit theorem, we assume that the output distribution is Gaussian (see also [16]). As a consequence, the absolute value of the RD-CTCF takes the form of a Rayleigh distribution and the threshold level can be found using: γ =

 T/2 −T/2

6.2. Noise Mean and Variance. When there is only noise in the system, the mean of the RD-CTCF is equal to 0 since the fourth-order cumulant of a Gaussian random variable is null. On the other hand, the variance of the RD-CTCF is a function of the lag-vector given by:



2 −σRD-CTCF ln P f a ,

where P f a is the probability of false alarm.

(33)

8

EURASIP Journal on Wireless Communications and Networking 10

efficient detector, which requires some characteristics of the signal in order to work (e.g., the symbol rate must be known in advance). Its advantage resides in the absence of features (at least asymptotically) when the input signal is a white noise, which results in the output mean of the detector always being equal to zero in presence of noise, therefore shielding the detector from noise uncertainty effects. Its computational complexity evolves as N · log2 (1024) = N.10 if the FFTs used to evaluate the cyclic periodogram [6] have a length of 1024 samples, and the total number of samples is equal to N.

5.5 5

5

4.5 4 3.5

l2

0

3 2.5

−5

2 1.5

−10 −10

−5

0 l1

5

7.3. Fourth-Order Detector. This detector averages the lagproduct of the received sequence over time:

10

N/2−1

Figure 4: Noise variance at the output of the RD-CTCF estimator as a function of the lag parameters l1 and l2 for the cycle frequency 0. The values of l0 and l3 have been fixed to 0 and 3, respectively. The system parameters are: 1 MHz symbol frequency, 10 MHz sample frequency, σn2 = 10. The number of noise realizations is 1000.

7. Detector Comparison We will now briefly review the principles of all detectors previously mentioned in this paper, and compare their performance and computational complexity. We assume that second-order and fourth-order detectors work only at a single location of the feature they exploit (the second-order detector works at most favorable frequency, the fourth-order detector works at the most favorable value of the discrete lagvector l). Monte-Carlo simulations were used, each of which used 5000 iterations. 7.1. Energy Detector. This is the most widely used detector in wireless communication systems. It averages the square modulus of the received sequence over time: N/2−1

ρED =

1  2 |s[n]| . N n=−N/2

(34)

Its advantages are its simplicity and its ability to perform blind detection (since it does not require any information about the signal it is trying to detect). Unfortunately, it has been demonstrated that it cannot be used in low-SNR environments due to its sensitivity to noise uncertainty [6]. 7.2. Second-Order Detector. This detector computes an estimation of the SCD by averaging, over time and frequency domains, the cyclic periodogram of the signal spectrum Sk ( f ) computed for a finite time window at time k: K/2−1

ρCF2 =

F/2−1



 1 1  α Sk f + u − K F k=−K/2 u=−F/2 2





S∗k f + u +



α , 2 (35)

where K is the number of time windows and F is the number of frequency bins. It is a much more complex and less

ρCF4 =

1  s[n]s[n + l1 ]s[n + l2 ]s[n + l3 ]. N n=−N/2

(36)

This detector is simpler to implement than the previous one (no Fourier transform of the signal is required since we work in the time domain), which results in a computational complexity evolving as N, the total number of samples. It benefits from the same immunity to noise uncertainty, and is therefore suited for operations at low SNR. 7.4. Performance Comparison. We may now take a look at the performance of the different detectors. Figure 5 illustrates the probability of missed detection (decide H0 if H1 ) curves as a function of the SNR for the three detectors under consideration. The threshold has been set in the three cases to achieve a target probability of false alarm equal to 10−1 . These curves have been obtained without adding any noise uncertainty to the signal. In such conditions, the energy detector is the optimal detector for blind detection, and can be considered as a reference. It appears that the secondorder detector and the fourth-order detector, have similar performances when the SNR is around zero dB: for the same complexity, (that leads to an observation time ten times longer for the fourth-order detector), both detectors exhibit the same probability of missed detection (roughly 1 percent) at an SNR of −0.8 dB. However, when we consider an SNR of −4 dB, the fourth-order detector requires much more samples, which makes it more complex than the secondorder. Besides, the detection-time constraints that are part of the cognitive radios reglementation would not be met if the observation time is too long. If we add some amount of noise uncertainty, the energy detector cannot perform reliable detections and must be discarded, whereas the cyclic feature detectors remain unaffected. In order to verify this assumption, we computed the receiver operating characteristics (ROC) curves of the fourth-order detector for two situations, one without any noise uncertainty, and one with 0 dB of noise uncertainty. The results are illustrated in Figure 6. We observe that the energy detector, which had the best ROC curve in the first case is a lot more affected by the noise uncertainty than the fourth-order detector. ROC curves for the second-order detector can be found in [7], and show the same immunity to noise uncertainty than the fourth-order.

EURASIP Journal on Wireless Communications and Networking

9 1

100

0.9 0.8 0.7

T = 50 μs

0.6 10−2

Pd

P f a and Pmd

10−1

0.4

T = 10000 μs T = 500 μs

10−3

0.5

0.3 0.2 0.1

10−4

−20 −18 −16 −14 −12

−10

−8

−6

−4

−2

0

SNR 4th order detector 2nd order detector

0 0

Energy detector Pfa

Figure 5: Energy, second-order and fourth-order detector probability of missed detection (the solid lines) for a fixed probability of false alarm (the points at 10−1 ). The system parameters are: baseband QPSK signal with 20 MHz symbol frequency, 40 MHz sample frequency, square-root Nyquist pulse shaping filter of 0.2 roll-off factor. No noise uncertainty added. The second-order detector is set to detect the symbol-rate feature (cf = 20 MHz), and the fourth-order detector works with the feature at four-times the carrier frequency, which is equal to zero in the present situation (cf = 0 MHz).Two observation times are considered for the three detectors: 50 and 500 μs. An observation time of 10 ms has been added for the fourth-order detector

8. Conclusion

0.1

0.2

0.3

0.4

0.5

Pfa eng (-inf dB) cf4 (-inf dB)

eng (0 dB) cf4 (0 dB)

Figure 6: Energy (eng) and fourth-order detector (cf4) ROC curves for two values of the noise uncertainty (no uncertainty, 0 dB uncertainty). The system parameters are: 1 MHz symbol frequency, 4 MHz sample frequency, square-root Nyquist pulse shaping filter of 0.2 roll-off factor, SNR = −2 dB.

A.1. Second-Order Cumulant. There are 2 possible partitions of the set {1, 2}: {1, 2} and {1}{2}. Since the binary PAM constellation is symmetric, only the first partition has a chance to give a product of moments different from 0. We will limit our investigations to the first partition. The partition {1, 2} gives RI,2 = 1 for its single element, so that CI,2 = 1.

This paper has started from the need for robust detectors able to work in low SNR environments. A brief review of the second-order cyclostationarity and second-order cyclic feature detectors has exposed the advantages and drawbacks of such detectors, and explained the intuition that lead to the study of higher-order cyclostationarity (HOCS). The main guideline is to identify features of sufficient strength and to design a detector able to extract it from the signal. The most relevant aspects of HOCS theory have then been analyzed and we have derived a new fourth-order detector that can be used for the detection of linearly modulated signals. Simulation results have shown that fourth-order cyclic feature detectors may be used as a substitute for second-order detectors at SNR around zero dB, which could be needed if the received signals do not exhibit second-order cyclostationarity.

A.2. Fourth-Order Cumulant. There are 14 possible partitions of the set {1, 2, 3, 4}, but only the ones that group Ik by two or four have a chance to give a product of moments different from 0, which reduces the number of interesting partitions to four: {1, 2, 3, 4}; {1, 2}{3, 4}; {1, 3}{2, 4} and {1, 4}{2, 3}. The first partition {1, 2, 3, 4} gives RI,4 = 1 for its single element, and the three last partitions {1, 2}{3, 4}; {1, 3}{2, 4} and {1, 4}{2, 3} give RI,2 = 1 for their two elements, so that CI,4 = −2.

Appendices

B.1. Second-Order Cumulants. There are 2 possible partitions of the set {1, 2}: {1, 2} and {1}{2}. Since the 4-QAM constellation is symmetric, only the first partition has a chance to give a product of moments different from 0. We limit therefore our investigations to the first partition. Different results are obtained according to the number of conjugations in the lag-product (10):

A. Cumulants of the Binary PAM This section computes the second- and fourth-order cumulants of a binary PAM sequence. The symbols take the values Im = {±1}.

B. Cumulants of the Quaternary QAM This section computes the second- and fourth-order cumulants of a √4-QAM√sequence. The symbols take the values Im = {±1/ 2 ± j/ 2}.

10

EURASIP Journal on Wireless Communications and Networking (i) When no conjugation or two conjugations are used in the lag-product, the partition {1, 2} gives RI,2 = 0 for its single element, so that CI,2 = 0. (ii) When one conjugation is used in the lag-product, the partition {1, 2} gives RI,2 = 1 for its single element, so that CI,2 = 1.

B.2. Fourth-Order Cumulant. There are 14 possible partitions of the set {1, 2, 3, 4}, but only the ones that group Ik by two or four have a chance to give a product of moments different from 0, which reduces the number of interesting partitions to four: {1, 2, 3, 4}; {1, 2}{3, 4}; {1, 3}{2, 4} and {1, 4}{2, 3}. Different results are obtained according to the number of conjugations in the lag-product (10): (i) When no conjugation or four conjugations are used in the lag-product, the first partition {1, 2, 3, 4} gives RI,4 = −1 for its single element, and the three last partitions {1, 2}{3, 4}; {1, 3}{2, 4} and {1, 4}{2, 3} give RI,2 = 0 for their two elements, so that CI,4 = −1. (ii) When two conjugations are used in the lag-product, arbitrary placed for this example on the second and fourth element of the lag-product, the partition {1, 2, 3, 4} gives RI,4 = 1 for its single element, the two partitions {1, 2}{3, 4} and {1, 4}{2, 3} give RI,2 = 1 for their two elements, and the partition {1, 3}{2, 4} gives RI,2 = 0 for its two elements, so that CI,4 = −1. (iii) When one or three conjugations are used in the lag-product, the partition {1, 2, 3, 4} gives RI,4 = 0 for its single element, and the three last partitions {1, 2}{3, 4}; {1, 3}{2, 4} and {1, 4}{2, 3} give RI,2 = 0 for at least one of their two elements, so that CI,4 = 0.

References [1] F. C. Commission, “FCC-03-322: Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies,” December 2003. [2] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006. [3] A. Sahai and D. Cabric, “Spectrum sensing: fundamental limits and practical challenges,” in Proceedings of IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’05), Baltimore, Md, USA, November 2005. [4] H. Urkowitz, “Energy detection of unknown deterministic signals,” Proceedings of the IEEE, vol. 55, no. 4, pp. 523–531, 1967. [5] R. Tandra, Fundamental limits on detection in low SNR, M.S. thesis, Berkeley, Calif, USA, 2005. [6] W. A. Gardner, “Signal interception: a unifying theoretical framework for feature detection,” IEEE Transactions on Communications, vol. 36, no. 8, pp. 897–906, 1988. [7] W. A. Gardner and C. M. Spooner, “Signal interception: performance advantages of cyclic-feature detectors,” IEEE Transactions on Communications, vol. 40, no. 1, pp. 149–159, 1992.

[8] W. A. Gardner, Statistical Spectral Analysis: A Nonprobabilistic Theory, Prentice-Hall, Englewood Cliffs, NJ, USA, 1987. [9] W. A. Gardner and C. M. Spooner, “Cumulant theory of cyclostationary time-series, part I: foundation,” IEEE Transactions on Signal Processing, vol. 42, no. 12, pp. 3387–3408, 1994. [10] C. M. Spooner and W. A. Gardner, “Cumulant theory of cyclostationary time series, part II: development and applications,” IEEE Transactions on Signal Processing, vol. 42, no. 12, pp. 3409–3429, 1994. [11] K. Kim, I. A. Akbar, K. K. Bae, J.-S. Um, C. M. Spooner, and J. H. Reed, “Cyclostationary approaches to signal detection and classification in cognitive radio,” in Proceedings of the 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’07), pp. 212–215, Dublin, Ireland, April 2007. [12] P. D. Sutton, K. E. Nolan, and L. E. Doyle, “Cyclostationary signatures in practical cognitive radio applications,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 13–24, 2008. [13] A. Tkachenko, D. Cabric, and R. W. Brodersen, “Cyclostationary feature detector experiments using reconfigurable BEE2,” in Proceedings of the 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’07), pp. 216–219, Dublin, Ireland, April 2007. [14] V. Turunen, M. Kosunen, A. Huttunen et al., “Implementation of cyclostationary feature detector for cognitive radios,” in Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM ’09), Hannover, Germany, June 2009. [15] O. A. Dobre, Y. Bar-Ness, and W. Su, “Higher-order cyclic cumulants for high order modulation classification,” in Proceedings of IEEE Military Communications Conference (MILCOM ’03), pp. 112–117, October 2003. [16] A. V. Dandawate and G. B. Giannakis, “Statistical tests for presence of cyclostationarity,” IEEE Transactions on Signal Processing, vol. 42, no. 9, pp. 2355–2369, 1994.

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 387625, 15 pages doi:10.1155/2010/387625

Research Article Probabilistic Coexistence and Throughput of Cognitive Dual-Polarized Networks J.-M. Dricot,1 G. Ferrari,2 A. Panahandeh,1 Fr. Horlin,1 and Ph. De Doncker1 1 OPERA 2 WASN

Department, Wireless Communications Group, Universit´e Libre de Bruxelles, Belgium Lab, Department of Information Engineering, University of Parma, Italy

Correspondence should be addressed to J.-M. Dricot, [email protected] Received 30 October 2009; Revised 8 February 2010; Accepted 25 April 2010 Academic Editor: Zhi Tian Copyright © 2010 J.-M. Dricot et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Diversity techniques for cognitive radio networks are important since they enable the primary and secondary terminals to efficiently share the spectral resources in the same location simultaneously. In this paper, we investigate a simple, yet powerful, diversity scheme by exploiting the polarimetric dimension. More precisely, we evaluate a scenario where the cognitive terminals use cross-polarized communications with respect to the primary users. Our approach is network-centric, that is, the performance of the proposed dual-polarized system is investigated in terms of link throughput in the primary and the secondary networks. In order to carry out this analysis, we impose a probabilistic coexistence constraint derived from an information-theoretic approach, that is, we enforce a guaranteed capacity for a primary terminal for a high fraction of time. Improvements brought about by the use of our scheme are demonstrated analytically and through simulations. In particular, the main simulation parameters are extracted from a measurement campaign dedicated to the characterization of indoor-to-indoor and outdoor-to-indoor polarization behaviors. Our results suggest that the polarimetric dimension represents a remarkable opportunity, yet easily implementable, in the context of cognitive radio networks.

1. Introduction Cognitive radio networks and, more generally, dynamic spectrum access networks are becoming a reality. These systems consist of primary nodes, which have guaranteed priority access to spectrum resources, and secondary (or cognitive) nodes, which can reuse the medium in an opportunistic manner [1–4]. Cognitive nodes are allowed to dynamically operate the secondary spectrum, provided that they do not degrade the primary users’ transmissions [5]. From a practical viewpoint, this means that the secondary terminals must acquire a sufficient level of knowledge about the status of the primary network. This information can be gathered through the use of techniques such as energy detection [6], cyclostationary feature detection [7], and/or cooperative distributed detection [8]. Due to the complexity and drawbacks of the detection phase, the FCC recently issued the statement that all devices “must include a geolocation capability and provisions to access over the Internet a database of protected radio services and the locations and channels that may

be used by the unlicensed devices at each location” [9]. Furthermore, the positions of the primary nodes and other meta-information can be shared in the same way. Though the locations of the nodes and their configurations can be obtained easily, the exploitation of such information remains an open problem. Considering that any diversity technique can be used by cognitive nodes, several approaches have been proposed to allow for the coexistence of primary and secondary networks [10]. These include, for example, the use of orthogonal codes (code division multiple access, CDMA) [11], frequency multiplexing (frequency division multiple access, FDMA), directional antennas (spatial division medium access, SDMA) [12], orthogonal frequencydivision multiple access (OFDMA) [13], and time division multiple access (TDMA) [14], among others. In this paper, we investigate a simple, yet powerful, diversity scheme by exploiting the polarimetric dimension [15–17]. More specifically, a dual-polarized wireless channel enables the use of two distinct polarization modes, referred to as copolar (symbol: ) and cross-polar (symbol: ⊥),

2

EURASIP Journal on Wireless Communications and Networking

respectively. Ideally, cross-polar transmissions (i.e., from a transmitting antenna on one channel to the receiving antenna on the corresponding orthogonal channel) should be impossible. In reality, this is not the case due to an imperfect antenna cross-polar isolation (XPI) and a depolarization mechanism that occurs as electromagnetic waves propagate (i.e., a signal sent on a given polarization “leaks” into the other). Both effects combine to yield a global phenomenon referred to as cross-polar discrimination (XPD) [18–20]. The scenario of interest for this work is shown in Figure 1. The primary system consists of a single transmitter located at a distance of d0 from its intended receiver. Without any loss of generality, the primary receiver is considered to be located at the origin of the coordinates system, leading to a receiver-centric analysis. The secondary (cognitive) terminals are deployed along with the primary ones. However, limitations on interference prevent them from entering a protected region around the receiver. This region, referred to as the “primary exclusive region” [21], is assumed to be circular and therefore, is completely characterized by its radius, denoted as dexcl . Since polarimetric diversity does not allow a perfect orthogonality between primary and secondary nodes’ transmissions, its use is possible under the application of a socalled underlay paradigm [10, 22, 23]. This means that both cognitive and primary terminals carry out communications, provided that the capacity loss caused by cognitive users does not degrade communication quality for primary users. For this purpose, we can further characterize the underlaid paradigm by requiring that the primary system must be guaranteed a minimum (transmission) capacity during a large fraction of time. As will be shown, this can, in turn, be formulated as a probabilistic coexistence problem under the constraint of a limited outage probability in the primary network. We argue that using the polarimetric dimension allows dynamic spectrum sharing to be efficiently implemented in cognitive systems. To this end, we propose a theoretical model of interference in dual-polarized networks and derive a closed-form expression for the link probability of outage. We theoretically prove that polarimetric diversity can increase transmission rates for the secondary terminals while, at the same time, can significantly reduce the primary exclusive region. First, we validated the expected (theoretical) performance gains analytically. To the best of our knowledge, none of the past studies in literature has investigated the behavior of the XPD under a complete range of propagation conditions, such as indoor-to-indoor and outdoor-to-indoor. In particular, we conducted a vast experimental campaign to provide relevant insights on the proper models and statistical distributions which would accurately represent the XPD. Based on these measures, the achievable performance of these dual-polarized cognitive networks, considering both half-duplex and full-duplex communications, will be determined. The medium access control (MAC) protocol considered is a variant of the slotted ALOHA protocol [24] such that in each time slot, the nodes transmit independently with a

Primary terminal

Cognitive terminals

Cognitive terminals

d0 dexcl Primary exclusive region

Figure 1: Cognitive network model: a single primary transmitter is placed at the center of a primary exclusive region (PER), with radius dexcl , where its intended receiver is present.

certain fixed probability [25]. This approach is supported by the observations in [26, page 278] and [25, 27], where it is shown that the traffic generated by nodes using a slotted random access MAC protocol can be modeled by means of a Bernoulli distribution. In fact, in more sophisticated MAC schemes, the probability of transmission of a terminal’s transmission can be modeled as a function of general parameters, such as, queuing statistics, the queue-dropping rate, and the channel outage probability incurred by fading [28]. Since the impact of these parameters is not the focus of the this study, for more details we refer the interested reader to the existing studies in the literature [29–31]. The remainder of this paper is organized as follows. In Section 2, we demonstrate how the polarimetric dimension increases spectrum-utilization efficiency and supports the coexistence of primary and secondary users in a probabilistic sense, which requires guaranteed capacity for the primary network. After these theoretical developments, several insights are presented to move from the concept to practical implementation. First, Section 3 presents an experimental determination of the main parameters used to characterize cognitive dual-polarized networks in indoor-to-indoor and outdoor-to-indoor situations. These results are then used in Section 4 for analytical performance evaluation. Section 5 concludes the paper.

2. The Dual-Polarized Cognitive Network Architecture 2.1. Probabilistic Coexistence and Interference. Consider the cognitive network shown in Figure 1 with two types of users: primary and secondary (cognitive). The primary network is supposed to be copolar and the cognitive network is cross-polar. Without cognitive users, the primary network would operate with background noise and with the usual interference generated by the other primary users. Let Cp (dimension: [bit/s/Hz]) be the desired capacity for a user in the primary network (In this manuscript, bold letters refer to random variables). We impose that the secondary network

EURASIP Journal on Wireless Communications and Networking operates under the following outage constraint on a primary user:   P Cp ≤ C ≤ ε,

(1)

where 0 < ε < 1 and C (dimension: [bit/s/Hz]) is a minimum per-primary user capacity. Equivalently, this constraint guarantees a primary user a maximum transmission rate of at least C for at least a fraction (1 − ε) of the time. Under the simplifying assumption of Gaussian signaling (Note that this assumption is expedient for analytical purposes. However, in the following the analytical predictions will be confirmed by experimental results.), the rate of this primary user can be written as a function of the signal-to-noise and interference ratio (SINR) as follows: Cp = log2 (1 + SINR).

(2)

Using (2) into (1) yields 







P Cp ≤ C ≤ ε ⇐⇒ P log2 (1 + SINR) ≤ C ≤ ε   ⇐⇒ P SINR ≤ 2C − 1 ≤ ε

(3)

and, by introducing θ  2C − 1, one has 

3 N⊥

⊥ cross-polar interferers at distances {dj } j =int1 transand Nint

N⊥

mitting at powers {P ⊥j } j =int1 with a cross-polar discrimination coefficient XPD0 , is P{SINR > θ } 

N0 B = exp −θ P0 d0−α ⎧ ⊥ ⎪ Nint ⎨  × 1− ⎪ ⎩ j =1

P Cp ≤ C ≤ ε ⇐⇒ P{SINR > θ } > 1 − ε,

(4)

where P{SINR > θ } can be interpreted as the primary link probability of successful transmission for an outage SINR value θ. This value depends on the receiver’s characteristics, modulation, and coding scheme, among others [32]. The SINR at the end of a primary link with length d0 can be written as SINR 

P0 (d0 ) , N0 B + Pint

(5)

where P0 (d0 ) is the instantaneous received power (dimension: [W]) at distance d0 , N0 /2 is the noise power spectral density of the noise (dimension: [W/Hz]), B is the channel bandwidth, and Pint is the cumulated interference power (dimension: [W]) at the receiver, that is, the sum of the received powers from all the undesired transmitters. We now provide the reader with a series of theoretical results, which stem from the following theorem. Theorem 1. In a narrowband Rayleigh block-faded dualpolarized network, where nodes transmit with probability q on the copolar and the cross-polar channels, the probability that the SINR exceeds a given value θ on a primary transmission,  copolar given a fixed transmitter-receiver distance d0 , Nint N

N

interferers at distances {di }i=int1 transmitting at powers {Pi }i=int1 ,

⎫  ⎧ Nint ⎨ ⎬  θq × 1−

 α ⎩ P0 /Pi (di /d0 ) + θ ⎭ i=1

θq

XPD0 G(d, dref ) P0 /P ⊥j



d j /d0

α

⎫ ⎪ ⎬

, ⎭ +θ⎪ (6)

where P0 is the transmit power, N0 B is the average power of the background noise, θ is the SINR threshold, α is the path loss exponent, XPD0 is the reference cross-polar discrimination of the antenna at a reference distance dref , and G(d, dref ) is a function that characterizes the polarization loss over distance. Proof. We assume a narrowband Rayleigh block fading propagation channel. The instantaneous received power P(d) from a node is exponentially distributed [33] with temporalaverage received power Et [P(d)] = P(d) = P · L(d), where P denotes the transmit power and L(d) ∝ d−α is the path loss at distance d (it accounts for the antenna gains and carrier frequency). The received power is then a random variable with the following probability density function: 





fP (x) =







1 x 1 x . exp − exp − = P(d) P(d) P · L(d) P · L(d) (7)

In a dual-polarized system, the cross-polar discrimination (XPD) is defined as the ratio of the temporal-average power emitted on the cross-polar channel and the temporal-average power received in the copolar channel [15], that is, P (⊥ → ) (d) =

P ⊥ (d) , XPD(d)

(8)

where d is the transmission distance, P (j⊥ → ) (d)  Et [P(⊥ → ) (d)] is the temporal-average value of the instantaneous leaked power P(⊥ → ) (d), and P ⊥ (d)  Et [P⊥ (d)] is the temporal-average value of the instantaneous crosspolar power P⊥ (d). In a generic situation, the XPD is subject to spatial variability [19] and, therefore, in the context of this network-level analysis, we define the XPD in a spatialaverage sense, that is, XPD(d) 





P ⊥ (d) , ( P ⊥ → ) (d)

(9)

where the operator X denotes the average of the value X computed on multiple different locations at the same distance d. Note that, even though the XPD is considered here in a spatial-average sense, it is possible to accommodate its expected variability for the purpose of ensuring a required minimum cross-polar discrimination. This will be detailed

4

EURASIP Journal on Wireless Communications and Networking

in Section 4. Finally, it is shown in [17–19], that XPD(d), defined according to (9), can be expressed as follows: XPD(d) = XPD0 G(d, dref ),

(10)

where XPD0 ≥ 1 is the XPD value at a reference distance dref and the function G(d, dref ) ≤ 1 characterizes the depolarization experienced over the distance.  ⊥ primary and Nint cognitive interLet the traffic at the Nint fering nodes be modeled through the use of independent N

N⊥

indicators {Λi }i=int1 , {Λj } j =int1 , with for all i, j; Λi , Λj ∈ {0, 1}. In other words, {Λi } and {Λj } are sequences of independent and identically distributed (iid) Bernoulli random variables: if, in a given time slot, one of these indicators is equal to 1, then the corresponding node is transmitting; if, on the other hand, the indicator is equal to 0, then the node is not transmitting. We also assume that the traffic distribution is the same at all interfering nodes of the network, that is, for all i, P{Λi = 1} = q and for all j, P{Λj = 1} = q, which is supported by the analyses presented in [25, 27, 34]. The overall interference power at the receiver is the sum of the interference powers due to copolarized and cross-polarized (leaked because of depolarization) interference powers, that is,  Nint

Pint =



⊥ Nint



Pi (di )Λi +

i=1



P(j⊥ → )



where in the second passage, we have exploited the fact that, in a Rayleigh faded transmission, the SINR is also exponentially-distributed [33]. Since all terminals have an independent transmission behavior and are subject to noncorrelated channel fading, that is, {Pi }, {Λi }, {P(j⊥ → ) }, and {Λj } are independent sets of random variables, it then holds that P{SINR > θ } ! " N0 B = exp −θ

P0 L(d0 )

×

i=1

dj Λj,

×

Nint  j =1

#

=1−

j

⎞⎞⎤  ⊥ Nint Nint    (⊥ → ) ⎟⎟⎥ ⎜ ×⎝N0 B + Pi (di )Λi + Pj d j Λj ⎠⎠⎦ i=1

j =1

! " N0 B = exp −θ

$

!

"

exp −

& ' θ pi f  pi dpi P0 L(d0 ) Pi

(14)

θq





P0 /Pi (di /d)α + θ

.





θP(j⊥ → ) d j Λj P0 L(d0 )

  %∞  exp − = P Λj = 1 × 0



⎞⎤ ⎠⎦ 

θpj fP(j⊥ → ) p j dp j P0 L(d0 )



+ P Λj = 0 × 1

θq

XPD0 G(d, dref ) P0 /P ⊥j



dj /d0

α



.

j



By plugging (14) and (15) into (13), one finally obtains expression (6) for the probability of successful transmission.

   Nint θPi  (di )Λi ⎢ × ⎣ exp −

P0 L(d0 )



⎠⎦.

(15)

× E{P },{Λi },{P(⊥ → ) },{Λ }



⎞⎤

θP(j⊥ → ) d j Λj ⎥ ⎠⎦, × exp⎝− P0 L(d0 ) j =1 ⊥

0

j

=1−

P0 L(d0 )

Nint 

%∞

E{P(⊥ → ) },{Λ } ⎣exp⎝−



i=1





θ P0 L(d0 )

j

P0 L(d0 )

j

⎞⎤

+ P{Λi = 0} × 1

j



i



θP(j⊥ → ) d j Λj

The generic second expectation term in (13) can be expressed, by using (8), in a similar way:

= E{P },{Λi },{P(⊥ → ) },{Λ } ⎜ ⎢ × ⎣exp⎝ −

j

= P{Λi = 1} ×

= EPint [P{SINR > θ } | Pint ] j

E{P(⊥ → ) },{Λ } ⎣exp⎝−

θP (di )Λi exp − i P0 L(d0 )

P{SINR > θ }

i





$

The generic first expectation term at the right-hand side of (13) can be expressed as follows:

i

where {Pi (di )} and {P(j⊥ → ) (d j )} are the (instantaneous) interfering powers at the receiver. The probability that the SINR at the receiver exceeds θ can thus be expressed as follows:



i

θP (di )Λi exp − i P0 L(d0 )

(13)

(11)

j =1

E{P },{Λi }





E{P },{Λi } 

#



Nint 

(12)

Theorem 1 gives interesting insights on the expected performance in a dual-polarized transmission subject to background and internode interference. First, the leftmost term of the expression at the right-hand side of (6) is relevant in a situation where the throughput is limited by the

EURASIP Journal on Wireless Communications and Networking background (typically thermal) noise. In large and/or dense networks, the transmission is only limited by the interference and one can focus on the interference and polarization terms (i.e., the two other term of the expression, assuming N0 B is negligible). The first exponential term can be easily evaluated if N0 B = / 0. The second and the third terms of expression (6) relate to the interference generated by the surrounding nodes transmitting in co- and cross-polarized channels. These terms depend on (i) the polarization characteristics of the interfering nodes, (ii) the traffic statistics, and (iii) the topology of the network. Note that the impact of the topology has been largely investigated in [35] and we will limit our study to the effect of polarization. Finally, channel correlation is neglected here, as often in the literature, for the purpose of analytical tractability and because these correlations do not change the scaling behavior of link-level performance. For the sake of completeness, we note that in [36] an analysis of the impact of channel correlation is carried out. The authors conclude that, when the traffic is limited (q < 0.3), the assumption of uncorrelation holds. On the other hand, when the traffic is intense (q ≥ 0.3), the link probability of success is higher in the correlated channel scenario than in the uncorrelated channel scenario. 2.2. Probabilistic Link Throughput. Referring back to our definition of the probabilistic coexistence of the primary and secondary terminals in (1), a transmission is said to be successful if and only if the primary terminal is not in an outage for a fraction of time longer than (1 − ε), that is, if the (instantaneous) SINR of the cognitive terminal is above the threshold θ. Therefore, we denote the probability of successful transmission in a primary link as Ps , that is, Ps = P{SINR > θ }.

(16)

The probabilistic link throughput [37] (adimensional) of a primary terminal is defined as follows: (i) in the full-duplex communication case, it corresponds to the product of (a) Ps and (b) the probability that the transmitter actually transmits (i.e., q); (ii) in the half-duplex communication case, it corresponds to the product of (a) Ps , (b) the probability that the transmitter actually transmits (i.e., q), and (c) the probability that the receiver actually receives (i.e., 1 − q). The probabilistic link throughput can be interpreted as the unconditioned reception probability which can be achieved with a simple automatic-repeat-request (ARQ) scheme with error-free feedback [38]. For the slotted ALOHA transmission scheme under consideration, the probabilistic throughput in the half-duplex mode is then τ (half)  q(1 − q)Ps and in full-duplex case τ (full)  qPs . 2.3. Properties and Opportunities of Polarization Diversity. Theorem 1 expresses a network-wide condition to support the codeployment of primary and cognitive terminals. In

5

order to implement polarization diversity and make it work, proper considerations have to be carried out. In this section, we propose several lemmas, all derived from Theorem 1, that allow to design and operate dual-polarized systems. Lemma 2. In a dual-polarized system subject to probabilistic coexistence of primary and secondary networks, relocating a cognitive terminal from the copolar channel to the cross-polar channel increases its probability of transmission while keeping intact the transmission capacity of the primary network. Proof. Let us consider a scenario with a single interferer located at distance d and transmitting with power P. For the ease of understanding, let us assume that if the terminal uses a polarized antenna, its probability of transmission will be denoted as q = q⊥ , whereas if a classical (not dual-polarized) scenario is considered, then q = q . If the cognitive terminal is using the copolar mode, the probabilistic coexistence condition (1) can be written as θq ≤ ε; (P0 /P)(d/d0 )α + θ

(17)

whereas if the cognitive terminal is using the cross-polar mode, it holds that θq⊥ ≤ ε. XPD(d)(P0 /P)(d/d0 )α + θ

(18)

Therefore, the maximum acceptable probability of transmission in the copolar mode is #



qmax

!

1 P0 d =ε 1+ θ P d0

"α $

.

(19)

Note that, on average, XPD(d) ≥ 1 according to definition (8) and for physical reasons—the power leaked on the copolar dimension is at most equal to the power transmitted on the cross-polar channel. Finally, all other quantities in (19) are strictly positive and, therefore, one obtains that #



qmax

!

XPD(d) P0 d ≤ε 1+ θ P d0

"α $

⊥ = qmax ,

(20)

⊥ where the right-hand side expression for qmax derives directly from (18). Therefore, the thesis of the lemma holds.

Lemma 2 indicates that polarization can be exploited as a diversity technique. Indeed, the achievable transmission rate will always be increased if the secondary network uses a polarization state that is orthogonal to that of the primary network and, furthermore, this remains true regardless of the values taken by the other system parameters (e.g., transmission power, acceptable outage rate ε, SINR value, etc.). Lemma 3. There exists a region of space, referred to as the primary exclusive region, where the cognitive terminals are not allowed to transmit and can be reduced by means of polarimetric diversity.

6

EURASIP Journal on Wireless Communications and Networking It is interesting to observe that relation (21) can also be used to parameterize practical realizations of the antennas. Indeed, it yields that

4 No polarization

dexcl /d0

3

XPD0 = 4 dB

!

XPD(d) ≥

2

XPD0 = 8 dB

1

XPD0 = 10 dB

P d0 P0 d

"α &

'

q−ε θ ε

(24)

from which, with XPD(d) = XPD0 G(d, dref ), it follows that !

1 P d0 XPD0 ≥ G(d, dref ) P0 d 0

0.2

0.4

0.6

0.8

1

q

Figure 2: Primary exclusive region as a function of the terminal probability of transmission q, for various polarimetric values and with ε = 0.2.

Proof. As previously anticipated in Section 1, the primary exclusive region is completely characterized by the primary exclusive distance dexcl , that is, the minimum distance at which a cognitive terminal has to be, with respect to a primary receiver, so that it does not impact the capacity of the primary user (in a probabilistic sense) [21]. Starting from (6), in the presence of a single cross-polar interferer, one can write θq ≤ ε. XPD(d)(P0 /P)(d/d0 )α + θ

(21)

This relation is equivalent to d ≥ d0



1 XPD0 G(d, dref )

1/α !

P q−ε θ P0 ε

"1/α

d  excl , d0

(22)

where the definition at the right-hand side allows to express the minimum distance dexcl as a function of the distance d0 and the other main system parameters as follows: 

dexcl = d0

1 XPD0 G(d, dref )

1/α !

P q−ε θ P0 ε

"1/α

.

(23)

Therefore, since α ≥ 2, using polarization diversity, that is, causing XPD0 G(d, dref ) > 1, reduces dexcl . In Figure 2, the normalized primary exclusive distance, defined as dexcl /d0 , is shown, as a function of the terminal probability of transmission q, with ε = 0.2. It can be observed that in the case without polarization, one always has dexcl  d0 , that is, the cognitive terminals must be located outside the transmission zone defined by the primary emitter-receiver distance. On the opposite, it is possible to operate a cognitive terminal inside this region (i.e., with dexcl < d0 ) when the polarimetric dimension is used. Furthermore, in both cases the exclusive distance increases as a function of the terminal probability of transmission but its gradient is smaller in the dual-polarized case.

"α &

'

q−ε θ. ε

(25)

Therefore, the quantity at the right-hand side of (25) represents the minimum amount of XPD that the antenna of the cognitive terminal must possess. This value depends on the network configuration but also on the propagation environment (through the depolarization function G(d, dref )). Lemma 4. If q < ε, polarization diversity is not required to achieve a probabilistic coexistence. Proof. As previously introduced, the coefficient XPD0 is greater than or equal to 1. Therefore, the minimum value of XPD0 to guarantee error-free transmissions on the crosspolar channel is (

!

P d0 1 XPD0 = max 1, G(d, dref ) P0 d

"α &

' )

q−ε θ . ε

(26)

In (25), all quantities are greater than zero. Therefore, if q < ε, the quantity q − ε is always negative and the solution of (26) is XPD0 = 1. Lemma 4 indicates that, if the desired throughput remains limited, then the outage is guaranteed on the primary system without summoning up the diversity of polarization on the secondary terminal. Therefore, the crosspolar channel can be kept available for other terminals that may require higher data rates. This can be observed in Figure 2. Theorem 5. Besides being limited by probabilistic coexistence considerations, there exists an optimum probability of transmission by a terminal in the primary network, denoted as qopt , that maximizes the throughput. Proof. Let us define the optimal user probability of transmission as qopt  arg max τ, q

(27)

where the probabilistic throughput τ has been defined in Section 2.2. We first focus on half-duplex systems, using polarization diversity: in this case, the link throughput is τ = q(1 − q)Ps . Since ln(·) is a monotonically increasing function, finding the maximum of τ is equivalent to finding the maximum of ln(τ), that is, qopt = arg max ln(τ). q

(28)

EURASIP Journal on Wireless Communications and Networking In order to find the maximum, we compute the partial derivative of ln(τ) with respect to q: N⊥





int q ∂  1 1 ∂ ln 1 − , ln(τ) = − + ∂q q 1 − q ∂q j ηj

(29)

where 

XPD0 P d j G(d, dref ) ⊥0 ηj  θ P j d0



+ 1.

(30)

By using the approximation (This approximation is accurate for 0 < q < η j /3, which is always verified since dj and XPD0 need to be kept high because of the probabilistic coexistence constraint.) ln(1 + x) ≈ x and setting ∂ ln(τ)/∂q = 0, one has

where η  1/ is given by

qopt

*N⊥int j

2

& ' − qopt 1 + 2η + η ≈ 0,

(31)

η−j 1 . The positive solution of this equation

qopt ≈ η +

+ 1

1 − 1 + 4η2 2

(32)

which is the probability of transmission that maximizes the throughput. The same derivation can be applied in the case of a full duplex system and leads to the solution qopt ≈ η. If the approximation ln(1+x) ≈ x is not used, then the optimal probability of transmission cannot be given in a closed-form expression but has to be numerically evaluated. Obviously, the maximum value of q will be the minimum between (i) the optimum probability of transmission in a slotted transmission system (in a general sense), given by (32), and (ii) the maximum rate that can be achieved under the constraint of a probabilistic coexistence in (20). Therefore, before selecting its transmission rate, a cognitive terminal must evaluate these two quantities, on the basis of the available information stored in the databases (positions of the nodes, acceptable outage, etc.), and use the smallest one. In Figures 3(a) and 3(b), the accessible and optimal terminal probabilities of transmission are presented as functions of d/d0 , in the cases with (a) half duplex and (b) full duplex communications, respectively. In each case, two polarization strategies are considered: (i) no polarization and (ii) XPD0 = 10 dB. The accessible regions are defined by means of the inequality (22). In particular, the leftmost border of each exclusive region, denoted as line qexcl , is defined as the probability of transmission for a terminal at the boundary of the primary exclusive region, that is, with d = dexcl . From these figures, it can be observed that the probability of transmission of dual-polarized cognitive systems is mainly limited by the interference bound imposed to protect the primary system. In fact, the transmission rate of the terminals will nearly always be lower than the optimal transmission rate, except when the cognitive terminal is distant. In that specific case, the optimum probability of transmission (20)

7

in the accessible region (in a probabilistic sense) saturates, that is, it reaches qopt ≈ 1/2 in the half-duplex case and qopt ≈ 1 in the full-duplex case. Note that these values correspond to the maximum achievable throughput observed in any half-duplex or full-duplex system. Indeed, the definitions of the probabilistic link throughput are τ (half)  q(1 − q)Ps and τ (full)  qPs and the corresponding optimum terminal probabilities of transmission cannot exceed q = 1/2 and q = 1, respectively. In the scenarios where polarimetric diversity is exploited, this crossover distance is smaller (dexcl /d0 ≈ 1.5) than in the classical case (dexcl /d0 ≈ 3.3). Comparing the results in Figure 3(a) with those in Figure 3(b), another observation can be carried out. In the half-duplex case, for each distance d > dexcl , the optimal transmission probability qopt lies inside the accessible region. In other words, q has to be properly selected to maximize the throughput. In the fullduplex case, qopt ≈ 1 everywhere in the exclusive region. These observations will be confirmed by the results presented in Section 4. Finally, it is confirmed that, in the accessible regions, one either has (i) (dj /d0 )α  1 with XPD0 > 1 (i.e., q/η j  1) or (ii) qopt  0.3. Therefore, the approximation used in proof of Theorem 5 (i.e., ln(1 + x) ≈ x) holds and the value of qopt derived in Theorem 5 can be considered as an accurate approximation of the true value. 2.4. Considerations for Practical System Implementation. In the previous subsections, we have shown that the capacity of a primary user can be guaranteed, while, at the same time, allowing efficient spectrum access, if the polarimetric dimension is exploited. Moreover, dual-polarized terminals will benefit from an increase of capacity by means of a higher transmission rate and reduced terminal-to-terminal interference. The efficiency of polarization diversity depends on the cross-polar discrimination of the antennas in use. More precisely, the value of the initial cross-polar discrimination (i.e., XPD0 ) has to be as high as possible; yet, the XPD of well-designed antennas is typically on the order of 10 ÷ 20 dB [15, 39], which allows a significant discrimination between copolar and cross-polar channels. Depending on the achievable value of XPD0 , the outage rate of a primary terminal, and the location of the terminals, the transmission rate of a cognitive terminal can be adapted taking into account the relations (20) and (32). Finally, the primary exclusive region can be determined by means of (22) and notified to the cognitive terminals which, in turn, can use it as a constraint.

3. Experimental Determination of the Indoor-to-Indoor and Outdoor-to-Indoor XPD Several previous works have been undertaken in order to model the XPD for different kinds of environment. In [20], a theoretical analysis is conducted for the small-scale variation of XPD in an indoor-to-indoor scenario and it is concluded that it has a doubly, noncentral Fisher-Snedecor distribution.

8

EURASIP Journal on Wireless Communications and Networking Accessible region

Accessible region

1

1 qexcl

0.8

XPD0 = 10 dB

0.6 q

XPD0 = 10 dB

0.6 q

qopt

0.4

qexcl

0.8

0.4 qopt

0.2

qexcl

qopt

qopt

No polarization 0

1

2 d/d0

3

qexcl

0.2 No polarization 4

(a) Half duplex communications

0

1

2 d/d0

3

4

(b) Full duplex communications

Figure 3: Accessible and optimal terminal probabilities of transmission as a function of d/d0 and for ε = 0.1. In both cases, two polarization strategies are considered: (i) no polarization (drawn in red) and (ii) polarization with XPD0 = 10 dB (drawn in blue).

A mean-fitting (i.e., the pathloss) model of XPD as a function of the distance in an outdoor-to-outdoor scenario was studied in [16, 19]. The corresponding performance is analyzed in [11]. In this paper, we provide the reader with original measurements campaigns in both indoor-to-indoor and outdoor-to-indoor scenarios. Indeed, these correspond to real-life situations where various technologies, such as WiFi, sensor networks, personal area networks (indoor-to-indoor scenarios) or WiMax, public WiFi, and 3G systems (outdoorto-indoor scenarios) are in use. We consider three generic models to describe the variation of the XPD with respect to the distance. For instance, when the transmission ranges are long (several hundreds of meters or a few kilometers), the best expression for the path loss function is !

G1 (d, dref ) =

d dref

"−β

,

(33)

where β is a decay factor (0 < β ≤ 1). On the other hand, when distances are small (tens of meters) or in indoorto-indoor scenarios, the XPD value, in decibels, decreases linearly with respect to the distance. In other words, one can write XPD(d) [dB] = XPD0 [dB] − γd

(34)

which corresponds, in linear scale, to the following path loss function: G2 (d, dref ) = 10−(γ/10)d .

(35)

Finally, in some indoor scenarios where the transmission distances are small, it was observed that the XPD remains constant, that is, G3 (d, dref ) = 1.

(36)

In the remainder of this section, we characterize the applicability of the three XPD models just introduced. In

other words, we consider an experimental setup and, on the basis of an extensive measurement campaign, we determine which XPD model is to be preferred in each scenario of interest (indoor-to-indoor and outdoor-to-indoor). 3.1. Setup. The measurements were performed using a Vector Signal Generator (Rohde & Schwarz SMATE200A VSG) at the transmitter (Tx) side and a Signal Analyzer (Rohde & Schwarz FSG SA) at the receiver (Rx) side. The Tx chain was composed of the VSG and a directional antenna. The Rx antenna was a tri-polarized antenna, made of three colocated perpendicular antennas. Two of these antennas were selected to create a Vertical-Horizontal dual-polarized antenna. The three receiver antennas were selected one after another by means of a switch and were connected to the Signal Analyzer through a 25 dB, low-noise amplifier. The Rx antennas were fixed on an automatic positioner to create a virtual planar array of antennas. A continuous wave (CW) signal at the frequency of 3.5 GHz was transmitted and the corresponding frequency response was recorded at the receiver side. The antenna input power was 19 dBm. The measurement site was the third floor of a building located on the campus of Brussels University (ULB) and referred to as “Building U.” In the outdoor-to-indoor case, shown in Figure 4(a), the transmitter was fixed on the rooftop of a neighboring building (referred to as “Building L”), at a height of 15 m and was directed toward the measurement site. A brick wall was separating the lineof-sight (LOS) direction between this measurement site and the transmitter. The measurements were performed in a total of 78 distinct locations and in seven successive rooms. The rooms were separated by brick walls and closed wooden doors. The distance between the transmitter and the measurement points was in the range between 30 m and 80 m. In the indoor-to-indoor case, shown in Figure 4(b), the Tx antenna was fixed in the first room and was directed toward the seven next rooms, in which 65 measurement points were considered. The distance between the transmitter

EURASIP Journal on Wireless Communications and Networking and the measurement points was in the range between 8 m and 55 m. In order to characterize the small-scale statistics of XPD a total of 64 spatially separated measurements were taken at each Rx position and in an 8 × 8 grid. The spacing between grid points was λ/2 = 4 cm. At each grid point, 5 snapshots of the received signal were sampled and averaged to increase the signal-to-noise-ratio. 3.2. Experimental Results and Their Interpretation. The analysis of the collected experimental results has shown that the values of the XPD, for a given distance, present a locationdependent variability. Therefore, in the following figures, where the XPD is shown as a function of the distance d, the average value is shown along with the 1σ and 2σ being confidence intervals. Since the spatial variations were found to be Gaussian, these intervals account for 68% and 95% of the observed sets, respectively. The horizontal polarization was first used in an indoorto-indoor scenario and is reported in Figure 5. It was observed that the XDP can be accurately modeled by means of the propagation model G2 (d, dref ) where one has XPD0 = 11.3 dB, dref = 1 m, and γ = 0.16 dB/m. The variation around the average value was also analyzed and the corresponding cumulative distribution function (CDF) is shown in Figure 6. This variation was found to fit with a zeromean Gaussian random variable with standard deviation equal to 0.295 dB. It is interesting to note that, unlike the case of the outdoor-to-outdoor scenarios presented in [19], the behavior of the XDP depends on the initial polarization of the antenna. More precisely, the results in Figure 6 correspond to a horizontal polarization while the results in Figure 7 correspond to an initial vertical polarization. It can be seen that, in the latter scenario, the XPD is almost constant and equal to XPD0 = 4 dB. In this case, the XPD variability can be modeled as a zero-mean Gaussian random variable with standard deviation equal to 2.75 dB. Finally, the results collected in an outdoor-to-indoor scenario are presented in Figure 8. As expected, the XPD is a decreasing function of the distance and is suitably modeled by using the propagation model G2 (d, dref ), with XPD0 = 12.87 dB, dref = 20 m, and γ = 0.13 dB/m. The spatial variability can be modeled as a zero-mean Gaussian random variable with standard deviation equal to 2.95 dB. Note that full de-polarization occurs after a hundred of meters and the two initial polarizations (i.e., horizontal and vertical) lead to the same behaviour.

4. Numerical Performance Evaluation In this section, a numerical analysis of the performance of the proposed dual-polarized cognitive systems is presented. In Section 3, it has been shown that the XPD experiences spatial shadowing: more precisely, at a fixed distance different values of the XPD can be observed at different locations. The system parameters for performance analysis are selected by taking into account this normal fluctuation. Therefore, instead of using the average value for XPD0 , it is preferable to use a value (denoted as XPDmin 0 ) that can be observed with a

9

confidence equal to a predefined value δ ∈ (0, 1). Taking into account that XPD0 has a Gaussian distribution, it follows that 

P XPD0 ≤

XPDmin 0





XPDmin −μ 0 =1−Q σ

 = δ,

(37)

where μ and σ are the average value and the standard deviation of the observed XPD0 , respectively. Therefore, can be expressed as XPDmin 0 = μ + σQ−1 (δ). XPDmin 0

(38)

For instance, if a confidence level of 80% is required (i.e., δ = 0.8), one has to select XPDmin = μ − σQ−1 (0.8) ≈ μ − 0.81σ. 0 This approach will be used to set the initial parameters in the following performance analysis. 4.1. Full Duplex Systems in an Outdoor-to-Indoor Scenario. Cellular system typically corresponds to an outdoor-toindoor scenario. Examples include WiMax base stations or cellular mobile phone systems. A typical scenario is presented in Figure 9. Referring to the experimental results presented in Section 3, we used in our simulations the model G1 (d, dref ) with parameters α = 3, β = 0.4, and XPD0 = 4 ÷ 10 dB. Also, equal to 10.48 dB the measurements lead us to set XPDmin 0 with an 80% confidence level. The cell radius is r = 200 m, 10 cognitive terminals are deployed, their distances uniformly distributed over [0, r]. Finally, the Tx-Rx distance in the primary network is d0 = 30 m. Two different polarization strategies are investigated: (i) the primary and the cognitive networks do not use polarimetric diversity (this scenario is referred to as no polarization) and (ii) the systems reduce their interference by using two orthogonal polarization states (this scenario is referred to as full polarization). In Figure 11, the performance of full duplex systems is presented. More specifically, in Figure 11(a), the throughput of the system is shown as a function of the terminal probability of transmission. It can be seen that the throughput of the dual-polarized system is significantly higher, particularly when the probability of transmission is high. In Figure 11(b), the corresponding link probability of success in the primary network is investigated. It can be seen that it confirms the conclusions of Lemma 2: for a given minimum value of the link probability of success, the achievable transmission rate is significantly higher in the dual-polarized mode with respect to the value observed with the classical approach. For instance, with ε = 0.8, one has qmax = 0.15 while, by using the dual-polarized approach, the maximum probability of transmission can be increased up to qmax = 1.0. In other words, virtually any transmission rate is achievable with a limited impact on the primary system. 4.2. Half-Duplex System in an Indoor-to-Indoor Scenario. In a second scenario, the probabilistic coexistence is analyzed in the context of half-duplex systems, where indoor-to-indoor transmissions are typically used. Examples include wireless sensor networks (WSNs), ZigBee systems, and body area net-

10

EURASIP Journal on Wireless Communications and Networking

Building U, third floor

53 m

Building U, third floor

62 m

11 m

15 m

27 m Building L rooftop

15 m Window glasses Wooden door

Rx Tx

Rx Tx

Window glasses Wooden door

(a) Indoor-to-indoor measurement setup

(b) Outdoor-to-indoor measurement setup

Figure 4: Scenario descriptions.

20

1 0.9 0.8

15

10

P{XPD ≤ x}

XPD (dB)

0.7

5

0.6 0.5 0.4 0.3 0.2

0

0.1 −5

0

10

20

30 d

40

50

60

0

−4

−2

0

2

4

6

8

10

x (dB)

Figure 5: XPD in logarithmic scale, as a function of the Tx distance, in the indoor-to-indoor scenario with an initial horizontal polarization.

Figure 6: CDF of the XPD in the indoor-to-indoor scenario.

works (BANs). A typical scenario is presented in Figure 10. In our simulations, we considered a primary transmission at distance d0 = 15 m and subject to interference from 5 terminals located at d = 25 m from the central base station.

This corresponds to d/d0 ≈ 1.67 and it can be seen from Figure 3(a) that this value is in the accessible region. The propagation model G3 (d, dref ) is used and the other relevant parameters are θ = 10 dB, XPD0 = 4–10 dB, and α = 3.

EURASIP Journal on Wireless Communications and Networking

11

12 10 25 m

8

XPD (dB)

6

Cognitive terminals

4

Primary terminal 15 m

Cognitive terminals

Base station

2 0 −2 −4 −6

Figure 10: The indoor-to-indoor scenario. 0

10

20

30 d

40

50

60

Figure 7: XPD in logarithmic scale, as a function of the Tx distance, in the indoor-to-indoor scenario with an initial vertical polarization.

20

XPD (dB)

15

10

5

0

−5

20

30

40

50

60

70

80

90

d

Figure 8: XPD (logarithmic scale) in the outdoor-to-indoor scenario.

Base 30 m station

200 m

The transmit power is the same at all nodes. Referring to the experimental analysis conducted in Section 3, one can (with a 80% observe that the values of interest for XPDmin 0 level of confidence) are 8.91 dB and 1.8 dB for horizontal and vertical polarizations, respectively. In Figure 12, the performance of these half-duplex systems is presented. More particularly, in Figure 12(a), the throughput is shown as a function of transmission rate of the terminals, in a scenario with copolar interferers (i.e., without diversity of polarization) and under the dualpolarized scheme under study. It can be observed that the diversity of polarization drastically increases the throughput, even when the terminal probability of transmission is small. Regarding the probabilistic coexistence, in Figure 12(b) the link probability of success at the primary terminal is shown as a function of the transmission rate of the cognitive terminals. It can be observed that the use of polarization diversity gives a clear advantage in terms of interference limitation and available throughput for the cognitive terminals. For instance, with ε = 0.8 and a horizontal initial polarization, one has qmax = 0.07 while, by using the dual-polarized approach, this quantity can be increased up to qmax = 0.25 at each terminal. Finally, it can be seen that the optimum probability of transmission with XPD = 10 dB is approximately qopt ≈ 0.5, which matches with the value of qopt found in Figure 3(a).

5. Conclusions

Primary terminal Cognitive terminals

Figure 9: The outdoor-to-indoor scenario.

In this paper, we have presented a novel theoretical framework to demonstrate the network-level performance increase that can be achieved in a polarimetric diversityoriented system subject to Rayleigh fading and probabilistic coexistence of primary and secondary (cognitive) networks. The theoretical approach was supported by an extensive measurement campaign. It has been shown that different mathematical expressions must be used in order to suitably model the dependence of the XPD on the distance between transmitter and receiver. These models depend not only on the scenario of interest, but also on the initial antenna polarization. For instance, in an indoor-to-indoor scenario,

12

EURASIP Journal on Wireless Communications and Networking 1

1

Full polarization XPD0 = 10 dB

0.8 0.6

0.6 Polarization

50% of cognitive terminals use polarization

Ps

τ (full)

0.8

0.4

0.4 0.2

No polarization

0.2

XPD0 = 4 dB No polarization 0

0.2

0.4

0.6

0.8

0

1

0.2

0.4

0.6

0.8

1

q

q (a) Throughput as a function of the probability of transmission

(b) Link probability of outage on the primary network as a function of the probability of transmission

Figure 11: Performance analysis of a dual-polarized full-duplex cellular system. 1 0.2 Polarization

0.8 XPD0 = 10 dB Horizontal polarization

0.6 Ps

τ (half)

0.15 XPD0 = 4 dB

0.1

0.4

0.05

Vertical polarization

0.2 No polarization 0

0.2

No polarization 0.4

0.6

0.8

1

0

0.2

0.4

q

0.6

0.8

1

q

(a) Throughput as a function of the probability of transmission

(b) Link probability of outage on the primary network as a function of the probability of transmission

Figure 12: Performance analysis of a dual-polarized half-duplex system. The distance of the transmission is d0 = 15 m and the 5 interferers are located at d = 25 m of the receiver. Accessible region (Narrowband)

(Wideband)

1 ν=0

(Narrowband)

0.2

ν>0

(Wideband)

0.8 0.6

τ (half)

Increase of the ISI XPD0 = 10dB

q

Increase of the ISI

0.15

0.1

0.4 Polarization XPD0 = 10 dB

0.05

No polarization

0.2

No polarization 0

1

2 d/d0

(a) Half duplex communications

3

4

0

0.2

0.4

0.6

0.8

1

q (b) Throughput as a function of the probability of transmission

Figure 13: Impact of the channel fading on the system-level performance. The parameter value ν = 0 and ν > 0 correspond to narrowband scenarios and wideband scenario, respectively.

EURASIP Journal on Wireless Communications and Networking we have observed that the horizontal polarization provides a significant diversity (XPD0 around 10 dB) while the vertical polarization leads to a more limited gain (XPD0 around 4 dB). Our results suggest that dual-polarized networks are of interest, even if orthogonality (indicated by the XPD value) is limited. Indeed, with respect to the classical implementation of probabilistic coexistence of primary and secondary networks on the same (single polarization) channel, the use of polarization diversity allows to remarkably increase the perlink throughput and reduce the primary exclusive region. In some cases (i.e., at low transmission rates), it could even be possible to deploy a cognitive terminal closer to a primary receiver than the primary transmitter itself, that is, inside the primary exclusive region.

13 P{SINRwb > θ } = E[P{SINRwb > θ } | Pint , PISI ] = EPISI ,{P },{Λi },{P(⊥ → ) },{Λ } i

j

j







⎜ ⎢ × ⎣exp⎝ −

N

int  θ ⎜  ⎝N0 B + Pi L(di )Λi P0 L(d0 ) i=1 ⊥ Nint

+



P(j⊥ → ) L

⎞⎞⎤ ⎥ d j Λj + PISI ⎠⎠⎦,



j =1

(A.3) where the expectation of the term containing the ISI power becomes , ! "θPISI EPISI ,{P },{Λi },{P(⊥ → ) },{Λ } exp −

Appendix

j

i

The performance analysis carried out throughout the paper applies to networking scenarios with narrowband fading. In this appendix, we present a preliminary, yet insightful, extension of our approach to encompass the presence of wideband fading. In the presence of a transmission channel experiencing wideband fading, the transmitted symbols of the considered packet suffer from interference of the other symbols that have been delayed by multipath [33]. This phenomenon is referred to as Inter-Symbol-Interference (ISI) and it depends on the channel model, modulation format, and symbol sequence characteristics, among others [40–42]. Therefore, the expression of the ISI is hard to obtain and typically is not in closed form. In the network-level approach, we follow in this paper, an approximation to SINR in presence of wideband fading can be obtained by treating the ISI as an additive, uncorrelated, Rayleigh-faded noise power proportional to the received power [41]. The expression of the link-level SINR introduced in (5) becomes

, = EPISI =

%∞ 0

P0 L(d0 )

j

! "θPISI exp −

(A.4)

P0 L(d0 )

!

"

exp −

θx fPISI (x)dx. P0 L(d0 )

The definition of PISI gives 

fPISI (x) =

1 x exp − PISI PISI





=



1 x exp − νP0 L(d0 ) νP0 L(d0 ) (A.5)

and, finally, , ! "θPISI EPISI ,{P },{Λi },{P(⊥ → ) },{Λ } exp − = j

i

j

P0 L(d0 )

1 . 1 + νθ (A.6)

Following the derivation outlined in the proof of Theorem 1, the link probability of successful transmission (A.3) in the wideband fading case finally becomes P{SINRwb > θ }

SINRwb 

P0 (d0 ) , N0 B + Pint + PISI

(A.1)

where PISI is noise power associated with the ISI. Its average value (noted PISI = E[PISI ]) is supposed to be proportional to the received power [41] and can be defined as

(

N0 B = exp −θ P0 d0−α ⎧ ⊥ ⎪ Nint ⎨  × 1− ⎪ ⎩ j =1

 ×

)

⎫  ⎧ Nint ⎨ ⎬  θq 1 −

× ⎩ P0 /Pi (di /d0 )α + θ ⎭ i=1

θq

XPD0 G(d, dref ) P0 /P ⊥j



dj /d0

α

⎫ ⎪ ⎬ ⎭ +θ⎪



1 . 1 + νθ

(A.2)

(A.7)

Note that ν = 0 refers to the narrowband scenario. Theorem 1 can now be extended to incorporate the case of wideband Rayleigh fading as follows. The probability that the SINR at the receiver exceeds a given value θ is

By comparing (A.7) with (6), it can be observed that the presence of wideband fading reduces the probability of successful link transmission by the factor 1/(1 + νθ). Since this factor is lower than 1 for ν ∈ (0; 1], it can be concluded that the presence of ISI has a negative impact on the link probability of outage. Moreover, for a given value of ν, that

PISI  νP0 (d0 ),

0 ≤ ν < 1.

14

EURASIP Journal on Wireless Communications and Networking

is, for a given level of ISI, the stronger this negative impact is, the higher is the considered SINR threshold θ. This, in turn, results in (i) an increase of the primary exclusive region (i.e., a reduction of the accessible region) and (ii) a degradation of system throughput. More precisely, in Figure 13(a) we clearly show the reduction of the comparison between the accessible transmission regions in the presence of narrowband fading (shown in Figure 3(a)) and in the presence of wideband fading (with P0 /PISI = 20 dB). As one can see, the presence of a limited ISI has a detrimental impact, significantly increasing the primary exclusive region. In Figure 13(b), the throughput in the presence of ISI is shown in a scenario with half-duplex communications. In this case as well, the negative impact of wideband fading is evident. Although the impact of frequency selective fading is detrimental, from these figures it can be concluded that, even in presence of wideband fading channel, the use of polarimetric diversity significantly increases the overall performance of the whole system and is thus of interest in the context of cognitive radio networks.

Acknowledgment The support of the Belgian National Fund for Scientific Research (FRS-FNRS) is gratefully acknowledged.

References [1] C. Cordeiro, K. Challapali, D. Birru, and S. Shankar, “IEEE 802.22: an introduction to the first wireless standard based on cognitive radios,” Journal of Communications, vol. 1, no. 1, pp. 38–47, 2006. [2] Q. H. Mahmoud, Ed., Cognitive Networks, John Wiley & Sons, New York, NY, USA, 2007. [3] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006. [4] F. K. Jondral, “Software-defined radio—basics and evolution to cognitive radio,” EURASIP Journal on Wireless Communications and Networking, vol. 2005, no. 3, pp. 275–283, 2005. [5] I. Budiarjo, M. K. Lakshmanan, and H. Nikookar, “Cognitive radio dynamic access techniques,” Wireless Personal Communications, vol. 45, no. 3, pp. 293–324, 2008. [6] R. Qingchun and L. Qilian, “Performance analysis of energy detection for cognitive radio wireless networks,” in Proceedings of the 2nd International Conference on Wireless Algorithms, Systems and Applications (WASA ’07), pp. 139–146, Chicago, Ill, USA, August 2007. [7] S. Xu, Z. Zhao, and J. Shang, “Spectrum sensing based on cyclostationarity,” in Proceedings of Workshop on Power Electronics and Intelligent Transportation System (PEITS ’08), pp. 171–174, Guangzhou, China, August 2008. [8] S. S. Barve, S. B. Deosarkar, and S. A. Bhople, “A cognitive approach to spectrum sensing in virtual unlicensed wireless network,” in Proceedings of International Conference on Advances in Computing, Communication and Control (ICAC ’09), pp. 668–673, ACM, Mumbai, India, August 2009. [9] FCC 08-260, “Second report and order and memorandum opinion and order,” 2008, http://hraunfoss.fcc.gov/ edocs public/attachmatch/FCC-08-260A1.pdf.

[10] L. Berlemann and S. Mangold, Cognitive Radio and Dynamic Spectrum Access, John Wiley & Sons, New York, NY, USA, 2009. [11] J.-M. Dricot, F. Horlin, and P. De Doncker, “On the coexistence of dual-polarized CDMA networks,” in Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM ’09), Hannover, Germany, June 2009. [12] E. Baccarelli, M. Biagi, C. Pelizzoni, and N. Cordeschi, “Multiantenna cognitive radio for broadband access in 4G-WLANs,” in Proceedings of the 5th ACM international Workshop on Mobility Management and Wireless Access, pp. 66–73, ACM, Chania, Greece, October 2007. [13] J.-A. Bazerque and G. B. Giannakis, “Distributed scheduling and resource allocation for cognitive OFDMA radios,” Mobile Networks and Applications, vol. 13, no. 5, pp. 452–462, 2008. [14] X. Wang and W. Xiang, “An OFDM-TDMA/SA MAC protocol with QoS constraints for broadband wireless LANs,” Wireless Networks, vol. 12, no. 2, pp. 159–170, 2006. [15] C. Oestges, “A comprehensive model of dual-polarized channels: from experimental observations to an analytical formulation,” in Proceedings of the 3rd International Conference on Communications and Networking in China (ChinaCom ’08), pp. 1172–1176, Hangzhou, China, August 2008. [16] M. Shafi, M. Zhang, A. L. Moustakas et al., “Polarized MIMO channels in 3-D: models, measurements and mutual information,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 514–526, 2006. [17] F. Argenti, T. Bianchi, L. Mucchi, and L. S. Ronga, “Polarization diversity for multiband UWB systems,” Signal Processing, vol. 86, no. 9, pp. 2208–2220, 2006. [18] C. Oestges, V. Erceg, and A. J. Paulraj, “Propagation modeling of MIMO multipolarized fixed wireless channels,” IEEE Transactions on Vehicular Technology, vol. 53, no. 3, pp. 644–654, 2004. [19] V. Erceg, P. Soma, D. S. Baum, and S. Catreux, “Multiple-input multiple-output fixed wireless radio channel measurements and modeling using dual-polarized antennas at 2.5 GHz,” IEEE Transactions on Wireless Communications, vol. 3, no. 6, pp. 2288–2298, 2004. [20] F. Quitin, C. Oestges, F. Horlin, and P. De Doncker, “Smallscale variations of cross-polar discrimination in polarized MIMO systems,” in Proceedings of the 3rd European Conference on Antennas and Propagation (EuCAP ’09), pp. 1011–1015, Berlin, Germany, March 2009. [21] M. Vu, N. Devroye, and V. Tarokh, “On the primary exclusive region of cognitive networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 3380–3385, 2009. [22] L. Giupponi and C. Ibars, “Distributed cooperation among cognitive radios with complete and incomplete information,” EURASIP Journal on Advances in Signal Processing, vol. 2009, Article ID 905185, 13 pages, 2009. [23] L. Le and E. Hossain, “Resource allocation for spectrum underlay in cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 5306–5315, 2008. [24] N. Abramson, “The ALOHA system—another alternative for computer communications,” in Proceedings of Joint Computer Conference, vol. 37 of AFIPS Conference, pp. 281–285, Houston, Tex, USA, November 1970. [25] F. A. Tobagi, “Analysis of a two-hop centralized packet radio network—part I: slotted ALOHA,” IEEE Transactions on Communications Systems, vol. 28, no. 2, pp. 196–207, 1980.

EURASIP Journal on Wireless Communications and Networking [26] D. Bertsekas and R. Gallager, Data Networks, Prentice-Hall, Upper Saddle River, NJ, USA, 2nd edition, 1992. [27] R. Nelson and L. Kleinrock, “The spatial capacity of a slotted ALOHA multihop packet radio network with capture,” IEEE Transactions on Communications, vol. 32, no. 6, pp. 684–694, 1984. [28] H. Wu and Y. Pan, Medium Access Control in Wireless Networks, Nova Science, Hauppauge, NY, USA, 2008. [29] Y. Kwon, Y. Fang, and H. Latchman, “Performance analysis for a new medium access control protocol in wireless LANs,” Wireless Networks, vol. 10, no. 5, pp. 519–529, 2004. [30] J. Weinmiller, M. Schl¨ager, A. Festag, and A. Wolisz, “Performance study of access control in wireless LANs—IEEE 802.11 DFWMAC and ETSI RES 10 Hiperlan,” Mobile Networks and Applications, vol. 2, no. 1, pp. 55–67, 1997. [31] H.-Y. Hsieh and R. Sivakumar, “IEEE 802.11 over multihop wireless networks: problems and new perspectives,” in Proceedings of the 56th IEEE Vehicular Technology Conference (VTC ’02), vol. 2, no. 2, pp. 748–752, Vancouver, Canada, September 2002. [32] T. S. Rappaport, Wireless Communications: Principles and Practice, IEEE Press, Piscataway, NJ, USA, 1996. [33] A. Goldsmith, Wireless Communications, Cambridge University Press, New York, NY, USA, 2005. [34] J. A. Silvester and L. Kleinrock, “On the capacity of multihop slotted ALOHA networks with regular structure,” IEEE Transactions on Communications, vol. 31, no. 8, pp. 974–982, 1983. [35] O. Dousse, F. Baccelli, and P. Thiran, “Impact of interferences on connectivity in ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 13, no. 2, pp. 425–436, 2005. [36] R. K. Ganti and M. Haenggi, “Spatial and temporal correlation of the interference in ALOHA ad hoc networks,” IEEE Communications Letters, vol. 13, no. 9, pp. 631–633, 2009. [37] M. Haenggi, “Outage, local throughput, and capacity of random wireless networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 8, pp. 4350–4359, 2009. [38] S. Ahmed and M. S. Alam, “Performance evaluation of important ad hoc network protocols,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 78645, 11 pages, 2006. [39] C. A. Balanis, Antenna Theory: Analysis and Design, JWileyInterscience, New York, NY, USA, 2005. [40] J. C.-I. Chuang, “The effects of time delay spread on portable radio communications channels with digital modulation,” IEEE Journal on Selected Areas in Communications, vol. 5, no. 5, pp. 879–889, 1987. [41] S. Gurunathan and K. Feher, “Multipath simulation models for mobile radio channels,” in Proceedings of the 42nd IEEE Vehicular Technology Conference (VTC ’92), pp. 131–134, May 1992. [42] V. Fung, T. S. Rappaport, and B. Thomas, “Bit error simulation for pi/4DQPSK mobile radio communications using tworay and measurement-based impulse response models,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 3, pp. 393–405, 1993.

15

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 708029, 11 pages doi:10.1155/2010/708029

Research Article Admission Control and Interference Management in Dynamic Spectrum Access Networks Jorge Martinez-Bauset, Vicent Pla, M. Jose Domenech-Benlloch, and Diego Pacheco-Paramo Departamento de Comunicaciones, Universidad Polit´ecnica de Valencia (UPV), Camino de Vera s/n, 46022 Valencia, Spain Correspondence should be addressed to Jorge Martinez-Bauset, [email protected] Received 6 October 2009; Revised 16 February 2010; Accepted 9 May 2010 Academic Editor: Gian Luigi Ferrari Copyright © 2010 Jorge Martinez-Bauset et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs) to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs). In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

1. Introduction Cognitive radio networks are envisaged as the key technology to realize dynamic spectrum access (DSA). Such paradigm shift in wireless communications aims at solving the scarcity of radio spectrum [1–4]. The DSA concept proposes to boost spectrum utilization by allowing DSA users (SUs) to access the licensed wireless channel in an opportunistic manner so that interference to licensed users (PUs) is kept to a minimum. The idea of DSA is undoubtedly compelling and its realization will induce a huge advance in wireless communications. However, there are many challenges and open questions that have to be addressed before DSA networks become practically realizable [5, 6]. To fulfill the requirement of minimum interference to PUs, a SU with an ongoing communication must vacate the channel when a licensed user is detected. The SU may switch to a different unused spectrum band which is referred to as spectrum mobility or spectrum handover (SH). If no available bands can be found or the SH procedure is not

implemented, one or more SUs will be forced to terminate their sessions. From the user’s perspective, it is generally assumed that the interruption of an ongoing session is more annoying than denying initial access [7]. Therefore, blocking the request of a new SU session, even if there are enough free resources, can be employed as a strategy to reduce the number of SU sessions forcedly terminated and the interference caused to PUs. A variety of studies that focus on priority mechanisms to handle conventional handovers in cellular networks have appeared in the literature, see [8] and references therein. However, SH and conventional handover are different in nature and also from a modeling perspective. In this paper, we focus on the study of the Quality of Service (QoS) perceived by PUs and SUs at the session level. We employ the same rather simple model than [9], which is enhanced to include an extension of the reservation scheme so that a noninteger number of channels can be reserved for SH. Such extension borrows the idea from the Fractional Guard Channel scheme that was introduced

2

EURASIP Journal on Wireless Communications and Networking

in cellular networks [10]. Furthermore, our numerical results for the system throughput are qualitatively different from those obtained in [9] leading to completely different conclusions, especially in what concerns the optimum system configuration. Interference management has been identified as one of the critical challenges to make DSA networks work in practice [6]. Common DSA proposals take a reactive approach, in which SUs perform SH only after detecting PU interference. To detect PU activity in the same band, a SU must perform spectrum sensing, which requires to pause any ongoing transmission and causes a considerable performance penalty [6]. Additionally, SUs must execute spectrum sensing frequently to react quickly when a PU occupies the same band [11]. To handle both requirements, transmission and spectrum sensing episodes are typically interleaved in a cyclic manner [12, 13]. We study the interference management problem from the traffic perspective. Our perception is that the mechanisms we propose might have a complementary role with respect to those defined at the physical layer. Our work is motivated by the fact that although simple spectrum access and channel repacking algorithms have been proposed in the classical communications literature their application to DSA systems has not been explored yet. In this paper, we assume that the primary network follows a predefined deterministic pattern when searching for free channels to set up a new session. The secondary network is aware of the rule followed by the primary network and uses this information in its own benefit but also in that of the primary network. The secondary network senses and assigns free channels to SUs in the reversed order that they will be occupied by PUs, hence reducing the probability of SUs having to vacate the assigned channel and causing interference to PUs. The probability of causing interference may be further reduced by performing a channel rearrangement to SUs after the release of channel. The mechanisms described above entail a minimal cooperation of the primary network, which in turn redound in a reduced interference for PUs. The idea of the primary network cooperating with the secondary one has also been proposed in [14]. We will show that both the forced termination probability and the interference created by the operation of SUs upon PUs can be controlled by limiting the access of SUs. This finding motivated us to design an admission control scheme for SUs that is able to limit simultaneously both the forced termination probability of SUs and what we define as the probability of interference. We show that both the forced termination probability and the interference caused to PUs are highly dependent on system parameters and on the arrival processes and service distributions. However, the proposed scheme is self-adaptive and does not require any configuration parameters beyond the targeted QoS objectives. Besides, it does not rely on any particular assumptions on the traffic characteristics; that is, it can operate with any arrival process and distribution of the session duration. The rest of the paper is structured as follows. The different models of the systems studied are described in Section 2. In Section 3, we evaluate numerically the impact

of incorporating admission control on the forced termination of SUs and also the impact of deploying channel allocation with preference and repacking on the interference. In Section 4, we propose and evaluate a novel adaptive admission control scheme that is able to limit simultaneously both the forced termination probability and the interference. Finally, Section 5 concludes the paper.

2. Model Description We consider an infrastructure-based DSA network where PUs and SUs cooperate. Infrastructure-based DSA networks have been proposed in [2, 6, 15]. We assume that channels available for system operation are numbered according to the order in which they are assigned by the primary network; that is, we consider that to setup a PU session, the system searches from left (low-channel numbers) to right (high-channel numbers) until enough free channels can be allocated to the new session. Conversely, to setup a new SU communication the system searches from right (high-channel numbers) to left (low-channel numbers). We call this mechanism channel allocation with preference (CAP). Additionally, once a PU or a SU session has finished, a channel repacking of ongoing SU sessions can be performed to avoid interfering with future PU arrivals. Channel repacking can be triggered when, after a session completion, there exist ongoing SU sessions that can be moved to higher channel numbers; that is, there exist ongoing SU sessions that can perform a preventive SH to avoid creating future interference. The system has a total of C resource units, being the physical meaning of a unit of resource dependent on the specific technological implementation of the radio interface. For the sake of mathematical tractability, we make the common assumptions of Poisson arrival processes and exponentially distributed service times. However, we also study the impact that distributions different than the exponential for the session lifetime have on system performance. The arrival rate for PU (SU) sessions to the system is λ1 (λ2 ), and a request consumes b1 (b2 ) resource units when accepted, bi ∈ N, i = 1, 2. For a packet-based air interface, bi represents the effective bandwidth of the session [16, 17]. We assume that b1 = N, b2 = 1 and C = M × N, therefore the system resources can be viewed as composed by M = C/N bands for PUs or M × N subbands or channels for SUs. In other words, the maximum number of ongoing PU sessions is M and of SU sessions is M ×N. The service rates for primary and secondary sessions are denoted by μ1 and μ2 , respectively. We study seven different systems that can be aggregated into three groups. The characteristics of each of the seven systems are defined in Table 1. The second (SH), third (AC-FT) and sixth (AC-FT&I) columns refer, respectively, to spectrum handoff mechanism, the admission control (AC) scheme to limit the forced termination (FT) of SUs, and the adaptive AC scheme that limits simultaneously the forced termination probability perceived by SUs (P2ft ) and the interference caused to PUs. On these columns, a “Y” means that the systems implements the corresponding mechanism and a “N” that it is not implemented. The fourth (CA) and fifth (RP) columns refer, respectively, to the

EURASIP Journal on Wireless Communications and Networking Table 1: Features of the systems studied. System S1 S2 S3a S3b S4 S5a S5b

SH N Y N Y Y N Y

AC-FT N Y N N N Y Y

CA R R P P P P P

RP N N N N Y N Y

AC-FT&I N N N N N Y Y

channel allocation, which can be either random (“R”) or with preference (“P”); and the the repacking mechanism, which is either implemented (“Y”) or not (“N”). In the following subsections, we introduce analytical and simulation models to study the systems described in Table 1. In Section 2.1 we present two continuous-time Markov chain (CTMC) models that define the operation of systems 1 (S1) and 2 (S2). The aim is to use these models to evaluate the effectiveness of AC to limit P2ft . Numerical results of this evaluation are shown in Section 3. In Section 2.2, we briefly outline two CTMC models that define the operation of systems 3 (S3) and 4 (S4). The aim is to use these models to compare the interference in a system deploying the proposed CAP and repacking schemes with the interference in the conventional random channel allocation scheme. Numerical results of this evaluation are also shown in Section 3. Finally, the model of the adaptive AC scheme deployed in system 5 (S5) and its evaluation is described in Section 4. 2.1. AC Scheme to Limit the Forced Termination of SUs. We denote by x = (x1 , x2 ) the system state vector, when there are x1 ongoing PU sessions and x2 SU sessions. Let b(x) represent the amount of occupied resources at state x, b(x) = x1 N + x2 . The system evolution along time can be modeled as a multidimensional Markov process whose set of feasible states is S := {x = (x1 , x2 ) : x1 N + x2 ≤ C }.

(1)

3

when k SUs are in the channels occupied by the newly arrived PU session, while the other (x2 − k) are distributed in the other (M − x1 − 1)N channels. Clearly, min(x 2 ,N)

p(x, k) = 1.

(3)

k=0

Let rxy be the transition rate from x to y, x, y ∈ S, and be ei a vector whose entries are all 0 except the ith one, which is 1, then ⎧ p(x, k)λ1 ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨

if y = x + e1 − ke2 , k = 0, . . . , min(x2 , N), if y = x + e2 ,

rxy = ⎪λ2 ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ xi μi ⎪ ⎪ ⎪ ⎩

(4)

if y = x − ei , i = 1, 2,

0

otherwise.

Figure 1 shows the state diagram and transition rates of the CTMC that models the system dynamics. The global balance equations are expressed as π(x)



rxy =

y∈S



π y ryx

∀x ∈ S,

y∈S

where π(x) is the stationary probabilityof state x. The stationary distribution {π(x)} is obtained from (5) and the normalization equation. The blocking probability for SU requests, P2 , and the SUs forced termination probability, P2ft , can be determined from the stationary distribution. Let us define k(x) =

min(x 2 ,N)

(6)

r p(x, r).

r =0

Clearly, k(x) is the mean number of SUs that are forced to terminate upon the arrival of a PU in state x. Then, 

P2 =

π(x),

(7)

x∈S,x+e2 ∈ /S

We develop two analytical models to evaluate the performance of DSA systems measured by the forced termination probability of SUs. 2.1.1. System 1. This first system is characterized by not supporting SH, deploying the Complete Sharing admission policy, that is, all SU requests are accepted while free resources are available, deploying a random channel allocation scheme with no repacking. A PU arrival in state x will force the termination of k SUs, k = 0, . . . , min(x2 , N), with probability  

p(x, k) =

N k

(M −x1 −1)N x2 −k   (M −x1 )N x2



.

(2)

(5)



P2ft =

k(x)π(x)λ1 . λ2 (1 − P2 )

x∈S

(8)

Note that P2ft is the ratio of the forced termination rate to the acceptance rate. Finally, the SUs throughput, that is, the successful completion rate of SUs is determined by 



Th2 = λ2 (1 − P2 ) 1 − P2ft .

(9)

2.1.2. System 2. This system is characterized by supporting SH, deploying the Fractional Guard Channel admission policy and deploying the random channel allocation scheme with no repacking.

4

EURASIP Journal on Wireless Communications and Networking x + e1 − ke2

The coefficients a1 (x) and a2 (x) denote the probabilities of accepting a PU arrival and a SU arrival in state x, respectively. It is clear that a1 (x) = 1, if x + e1 − k(x), e2 ∈ S, and 0 otherwise. Given a policy setting t, a2 (x) is determined as follows:

λ1

x − e2

x2 μ2

λ2

x

x + e2

⎧ ⎪ 1 ⎪ ⎪ ⎪ ⎨

if C − b(x + e2 ) >  t ,

a2 (x) = ⎪1 − (t −  t ) if C − b(x + e2 ) =  t , ⎪ ⎪ ⎪ ⎩0

x1 μ1

(13)

otherwise.

x − e1

Figure 1: State transition rates of the CTMC from a generic state x ∈ S.

When a SU new setup request arrives and finds the system in state x, an admission decision is taken according to the number of free resource units available: ⎧ ⎪ ⎪ ⎪>  t  ⎪ ⎨ C − b(x + e2 )⎪=  t  ⎪ ⎪ ⎪ ⎩<  t 

accept, reject with probability t −  t , reject, (10)

where we denote by t ∈ [0, C], the admission control threshold; that is, the average number of resource units that must remain free after accepting the new SU requests must be t or higher. Clearly, these resources are reserved for SUs performing SH. Then, increasing t causes a reduction of the forced termination probability but, at the same time, increases the blocking probability perceived by new SU requests and vice versa. Note also that PUs are unaffected by the admission policy, as SUs are transparent to them. A PU arrival in state x will not force the termination of SUs when the system state complies with C − b(x) ≥ N, as the execution of SH will allow SUs to continue their ongoing session in a new unused channel, which are guaranteed to exist given the condition above. On the other hand, when C − b(x) < N, x1 < M, a PU arrival will preempt b(x +e1 ) − C SUs. Let k(x) be the number of preemptions in state x, then k(x) = min{r ∈ N | b(x + e1 − re2 ) ≤ C }.

(11)

Note that k(x) = 0 when C − b(x) > N, that is, it will be null for a high portion of the state space. As before, let rxy be the transition rate from x to y, x ∈ S, then ⎧ a1 (x)λ1 ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨

rxy = ⎪a2 (x)λ2 ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪xi μi ⎪ ⎪ ⎪ ⎩

0

if y = x + e1 − k(x)e2 , k = 0, . . . , min(x2 , N), if y = x + e2 , if y = x − ei , otherwise.

(12)

Figure 1 shows the state transition rates of the CTMC that models the system dynamics. The stationary distribution, {π(x)}, is obtained by solving the global balance equations (5) together with the normalization equation. The blocking probability for SU requests, P2 , the SUs forced termination probability, P2ft , and the SUs throughput, Th2 , are then computed using (7), (8) and (9), respectively. The analytical models described above have been validated through computer simulations. The simulation models we designed mimic the behavior of the physical system, in other words, the original system itself is simulated instead of simulating just the CTMC. Thus, the validation offers a guarantee on the correctness of the whole modeling process, and not only about the generation and solution of the global balance equations of the CTMC. 2.2. CAP Scheme to Limit the Interference Caused to PUs. We assume that the SUs vacating rate induced by the arrival of new PU sessions is a measure of the interference caused by SUs to PUs, and we pursue to determine its value when deploying the spectrum access and channel repacking algorithms described in Section 1. Besides, we compare it to the one obtained when deploying the conventional random allocation scheme. A similar metric was used in [13] to measure the interference. When the system supports SH the channel allocation and repacking algorithms have no impact on the performance perceived by the SUs; that is, their blocking and forced termination probabilities are not affected. Clearly, the finding of free channels by arriving or vacated SUs depends only on the number of ongoing PU and SU sessions and not on their physical disposition on the spectrum. It should be noted that repacking for PUs is not considered. If the system deploys SH, CAP and repacking for SUs, doing repacking for PUs would only affect the algorithm followed to find a free channel upon the arrival of a SU, but not to the system performance (P2ft and interference). As described above, P2ft is not affected by the channel allocation and repacking algorithms used. In the same system, a PU arrival will experience interference when there are SUs occupying the PU band with the lowest order available. Clearly, this occurs when there are not enough free channels to accommodate the newly arrived PU without some SUs vacating the channel they are using (C − b(x) < N) then a previous repacking of PUs would have not helped.

EURASIP Journal on Wireless Communications and Networking Table 2: Transition rates in system 3b with M = 2. Current state (i, j)

Next state (P, k) k = min( j + i, N) (P, P) (P, P) (i, j + 1) (i + 1, N) (P, j + 1) (i + 1, P) (i, 0) (0, j) (0, P), (P, 0) (i − 1, j), (i, j − 1) (i − 1, P) (P, j − 1)

(i, P) (P, j) (i, j), j < N (i, N), i < N (P, j), j < N (i, P), i < N (i, P) (P, j) (P, P) (i, j) (i, P) (P, j)

Transition rate λ1





contribution to the SUs forced termination rate of states with no PUs in the system. Note that if i SUs are found in the first band, the arrival of a PU will force the termination of one SU when there are N − i + 1 SUs in the second band, of two SUs when there are N − i + 2 SUs in the second band, and so on. The second and third terms clearly account for the contribution of states where there is a PU in the first and second band, respectively, ⎡

γ = λ1 ⎣

λ2

v

N  N 





μ1 2μ1 (i + j)μ2 iμ2 jμ2

S := y = y1 , y2 : y1 , y2 ∈ {P, 0, . . . , N } ,

(14)

where y1 (y2 ) describes the state of the N leftmost (rightmost) channels. When yi = 0 the band is empty, when yi = P it is occupied by a PU, otherwise the number of SUs in the band can be yi = 1, . . . , N. The transition rates of the CTMC that models system 3b are displayed in Table 2. Note that, for example, at state (1, P), where there is one SU occupying one channel (out of N) in the first band of N channels and one PU occupying the second band, the actual channel allocated to the SU cannot be determined, but this information is irrelevant for the performance parameters of interest. When N = 2, the system has 16 states, independently of SH being supported or not. As an example, for a system supporting SH and CAP, the vacating rate γv and the forced termination rate γft can be determined from (15) and (16). The first term in (15) accounts for the contribution to the SUs vacation rate of states with no PUs in the system. In these states, a PU arrival will occupy the first band, vacating i SUs. The second and third terms account for the contribution of the states where there is a PU in the first or the second band, respectively. Then, the arrival of a new PU would vacate j or i SUs, respectively. The first term in (16) accounts for the

γft = λ1 ⎣

N  i  i=0 j =0



iπ i, j +

i=0 j =0

2.2.1. System 3. System 3b (3a) is characterized by supporting (not supporting) SH, deploying the Complete Sharing admission policy, deploying CAP and no repacking. For the type of system under study, the state space of its CTMC model grows very quickly with the number of channels, as the state representation must describe not only the number of ongoing PU and SU sessions, but also the disposition of the allocated channels on the spectrum. More specifically, the number of states is (N + 2)M . This makes the solution of the CTMC intractable for any practical scenario. Instead, we developed a simulation model and validated it with the analytical model of a simple scenario. This scenario has M = 2 bands for PUs and M × N subbands or channels for SUs. The set of feasible states is

5

N 





jπ P, j +

j =0





N 

iπ(i, P)⎦,

(15)

i=0



jπ i, N − i + j +

N  j =0





jπ P, j +



N 

iπ(i, P)⎦.

i=0

(16) To compare the results of the analytical and simulation models we selected three parameters: the blocking probabilities of PUs and SUs, and the forced termination probability of SUs. For both systems, with and without SH support, results clearly indicate a close agreement between the analytical and simulation models. 2.2.2. System 4. This system is characterized by supporting SH, deploying the Complete Sharing admission policy, deploying CAP and repacking (CAP+RP). Clearly, repacking can be triggered when either a PU or a SU leaves the system. Using the notation defined in the previous section for a system with M = N = 2, repacking would take place, for example, when a SU leaves from the upper band and the system state changes from (1, 2) to (1, 1). Note that as N = 2, a maximum of two SUs fit into the upper band. At this point, it is more convenient to move the SU in the lower band to the empty channel in the upper band, avoiding in this way future interference if a PU arrives. Then, repacking would make the system move from state (1, 1) to state (0, 2) instantaneously. As in the previous section, we evaluate the system by simulation and validate the simulation model by a simple analytical model. For M = N = 2, the analytical model has 12 states, clearly less states than in a system without repacking, as now some states are not feasible, as shown in the previous example. To compare the results of the analytical and simulation models we selected the same parameters of merit. Again, these results indicate an excellent agreement between the analytical and simulation models.

3. Effectiveness of the Proposed Mechanisms In this section we evaluate the effectiveness of incorporating the Fractional Guard Channel admission policy to limit the P2ft , as well as the effectiveness of incorporating CAP and repacking to limit the interference caused to PUs. Unless otherwise specified, the reference scenario for the numerical evaluation is defined by: M = 10, N = 8, C = M × N = 80, μ1 = 1 and μ2 = 1. In some scenarios, we consider that the load offered by PUs is such that their

EURASIP Journal on Wireless Communications and Networking

blocking probability is P1 = 0.01, which is achieved at λ1 = 4.4612. Following common conventions, we do not specify the unit of the rates although typical values are expressed in s−1 . For the simulation result 95% confidence intervals are represented. The confidence intervals have been computed using 15 different simulation runs initialized with different seeds.

25

20

15 Th2

6

ft

3.2. Effectiveness of CAP and Repacking to Limit γv . To evaluate the effectiveness of CAP and repacking we obtained the evolution of the SUs vacating rate γv with λ1 in systems 2, 3a, and 4, when λ2 = 20. We chose λ2 = 20 as the P2ft is around 0.1 for a system with SH and λ1 = 4.4612, which we consider a practical value. Recall that system 2 (S2) deploys the conventional random channel allocation algorithm, while systems 3a (S3a) and 4 (S4) deploy CAP and CAP and repacking (CAP+RP), respectively. To highlight the results of the study, we represent in Figure 4 what we define as the interference reduction factor; that is, the ratios γv (S2)/γv (S3a) and γv (S2)/γv (S4).

10

5

0 1

5

10

15 λ2

Simulation, no SH Simulation, SH, t = 0 Simulation, SH, t = 5 Simulation, SH, t = 10

20

25

30

Analytical, no SH Analytical, SH, t = 0 Analytical, SH, t = 5 Analytical, SH, t = 10

Figure 2: Throughput of SUs with the arrival rate of SUs when λ1 = 4.4612. 0.45 0.4 0.35 0.3 P2ft

3.1. Effectiveness of AC to Limit the P2 . The throughput achieved by SUs in systems 1 and 2 is shown in Figure 2, where we depict both the results of the analytical and the simulation models. Note the excellent agreement between the analytical and simulation results. Note also that the diameter of the confidence intervals are really small. This is the reason why confidence intervals will not be shown in the rest of the figures. The authors of [9] suggest that a natural way of configuring a DSA system of similar characteristics to ours is to choose t for each SU arrival rate, such that the Th2 is maximized. As observed in previous figures, it is not possible to determine an optimum operating point beyond the obvious one that is to deploy SH and t = 0. We believe that the role of reservation in DSA systems might be the same as its classical role in cellular systems; that is, to limit the forced termination probability of SUs. Note also that for the reservation values deployed, Th2 is always higher when deploying SH and reservation than when not deploying SH. Deploying SH reduces the forced termination rate, which increases the successful completion rate. One of the most interesting results of the study is the evolution of P2ft with the SUs arrival rate, which is shown in Figure 3. Observe that it seems to have a counterintuitive behavior. Intuitively, one would expect that P2ft should increase with the SUs arrival rate. However in a system without SH it has the opposite behavior. Note also that in a system with reservation, and particularly for some reservation values like t = 10 or higher, the forced termination first decreases, attaining a minimum, and then increases. The P2ft depends on the ratio of forced terminations to accepted sessions. By comparing the evolution of the forced termination rate with the SUs acceptance rate for the interval of arrival rates of interest (not shown here), these phenomena can be easily explained. As expected, the P2ft can be controlled by adapting the threshold t according to the system traffic load.

0.25 0.2 0.15 0.1 0.05 0

0

5

No SH SH, t = 0

10

15 λ2

20

25

30

SH, t = 5 SH, t = 10

Figure 3: Forced termination of SUs with the arrival rate of SUs, when λ1 = 4.4612.

Clearly, the proposed mechanisms are quite effective as they reduce the vacating rate induced by the arrival of PUs by approximately one order of magnitude or more for practical operating values. Note also that, as expected, the interference reduction factor is higher when repacking is used.

4. Adaptive Admission Control Scheme In this section, we describe an adaptive admission control scheme that is able to limit simultaneously both the forced

EURASIP Journal on Wireless Communications and Networking

Given that the MGC policy uses integer values for the threshold parameters, to limit P2ft to its objective B2ft = nft /dft , we propose to perform a probabilistic adjustment in the following way.

104

γv (S2)/γv (S3a, S4)

103

(i) At the arrival of a PU, if it forces the termination of m SUs, do {t ft ← t ft − m} with probability 1/nft .

102

(ii) When a SU session is accepted, do {t ft ← t ft + 1} with probability 1/dft .

101

100

7

1

2

3

4

4.46

5

6

λ1 S3a (CAP) S4 (CAP + RP)

Figure 4: Interference reduction factor with the arrival rate of primary users when λ2 = 20.

Intuitively, under stationary traffic conditions, if P2ft = B2ft then, on average, t ft will be increased by 1 and decreased by 1 every dft accepted requests, that is, its mean value is kept constant. We define a new measure for the interference by considering the fraction of PU arrivals that vacate exactly n SUs, n > 0, and denote it by P if (n). Let us denote its objective by Bif (n) = nifn /dnif and the admission control threshold associated to it by tnif . Then, to limit P if (n) to its objective, we propose to perform the following probabilistic adjustment at the arrival of each PU. (i) With probability 1/dnif do {tnif ← tnif + 1}.

termination probability of SUs and the interference caused to PU communications by the operation of the SUs. Our scheme generalizes a novel adaptive AC strategy introduced in [18] and developed further in [19], which operates in coordination with the well-known trunk reservation policy named Multiple Guard Channel (MGC). However, one of the novelties of the new proposal is that now the adaptive scheme is able to control simultaneously multiple objectives for the same arrival flow (SU arrivals), as opposed to only one objective per flow in previous proposals. The definition of the MGC policy is as follows. One threshold parameter is associated with each objective. For example, in a system with two objectives, one for the P2ft and another for the interference. Let t ft , t if ∈ N be their associated thresholds. Then, a SU arrival in state x is accepted if b(x + e2 ) ≤ t, t = min{t ft , t if }, and blocked otherwise. Therefore, t is the amount of resources that SUs have access to and decreasing (increasing) it reduces (augments) the acceptance rate of SU requests, which will in turn decrease (increase) both P2ft and the interference. Note that the definition of t in this section and in Section 2 are different. For the sake of clarity, the operation of our scheme is described assuming that arrival processes are stationary and the system is in steady state. We denote by B2ft the objective for the forced termination probability perceived by SUs (P2ft ). In practice, we can assume without loss of generality that B2ft can be expressed as a fraction nft /dft , nft , dft ∈ N. When P2ft = B2ft , it is expected that, in average, nft forced termination events and (dft − nft ) successfully completed SU session events, will occur out of dft accepted SU session events. For example, if the objective is B2ft = 1/100, then nft = 1 and dft = 100. It seems intuitive to think that the adaptive scheme should not change t ft when the system is meeting its forced termination probability objective and, on the contrary, adjust it on the required direction when the perceived P2ft is different from its objective.

(ii) Additionally, if it vacates exactly n SUs, then with probability 1/nifn do {tnif ← tnif − 1}. Again, under stationary traffic, if P if (n) = Bif (n) then, on average, tnif is increased by 1 and decreased by 1 every dnif offered PU requests, that is, its mean value is kept constant. When the traffic is nonstationary, the adaptive scheme will continuously adjust the thresholds in order to meet the objectives if possible, adapting to any mix of traffic. Clearly, in the operation of this simple scheme no assumptions have been made concerning the arrival processes or the distributions of the session duration. An important consequence of the definition of the interference probabilities {P if (n)} is that now we have the possibility to limit what we call the interference distribution. That is, we can define one objective for each of the elements of {P if (n)}, n = 1, . . . , N, or combinations of them, in order to give less importance (allow higher probabilities) to events that create lower interference (small values of n) and more importance (allow smaller probabilities) to events that create higher interference (high values of n). Figure 5 describes the procedure followed at a SU arrival to decide upon the acceptance or rejection of the new request. If the system defines multiple objectives for the interference and therefore manages multiple thresholds, then t if would be the minimum of all these thresholds. 4.1. Numerical Results. The adaptive scheme has been evaluated in systems 5a and 5b by simulation. We used the parameter values defined in Section 3. As an example, let us consider P if (n ≤ N) = Nn=1 P if (n); that is, the fraction of PU arrivals that are interfered by SUs. Figure 6 shows the variation of P2ft and the interference with the SUs arrival rate when the objectives are B2ft ≤ 0.05 and Bif (n ≤ N = 8) ≤ 0.1. As observed, the scheme is able to limit P2ft and P if (n ≤ N) to their objectives or below, and

8

EURASIP Journal on Wireless Communications and Networking 40 (1) D, Dft and Dif are internal flags. (2) Execute at every SU arrival: (3) if x1 N + x2 < C: (free resources available) (4) if b(x) + b2 ≤ t ft then Dft = 1 else Dft = 0 (5) if b(x) + b2 ≤ t if then Dif = 1 else Dif = 0 (6) D = Dft &Dif (7) if D = 1 then accept SU request else reject SU request (8) else reject SU request

35 30

Th2

25 20 15 10 5

Figure 5: Admission control scheme for SUs.

0

01

10

20

0.05

40

50

S3a S4

S5b S5a

0.04 Probability

30 λ2

Figure 7: SUs throughput with λ2 in S5a, S5b, S3a and S4. 0.03 0.06

0.02

0.05 0.01 10

20

30

40

50

λ2 P2ft , S5b

P if (n ≤ N), S5b

P2ft ,

P if (n ≤ N), S5a

S5a

Figure 6: P2ft and interference (P if (n ≤ N)) with λ2 in S5a and S5b.

Probability

0.04 01

0.03 0.02 0.01 0

the interference is lower when repacking is used. Note that the limiting objective in both systems is B2ft , as P if (n ≤ N) remains below its objective. In other words, t ft is lower than t if (n ≤ N) in both systems for the load range considered. Note also that we have chosen a wide arrival rate range to show the effectiveness of the adaptive scheme. However, if the system does not reserve resources to accommodate SHs then P2ft > 0.05 even for small values of λ2 . Figure 7 shows the variation of the SUs throughput with the SUs arrival rate. As a reference, we also plot the results obtained for systems 3a and 4. Recall that systems 3a and 5a do not support SH, deploy CAP but no repacking, while systems 4 and 5b do support SH, deploy CAP and repacking. However, S5a and S5b deploy the adaptive AC scheme, while S3a and S4 do not. We consider that system loads that make P2ft > 0.1 are of no practical interest. Although not shown, in systems 3a and 4, P2ft > 0.1 for λ2 > 20. Then, restricting to the load range of interest for S3a and S4, Th2 is higher in S5a and S5b than in S3a and S4. The improvement comes from the fact that limiting P2ft increases the rate of SUs that complete service successfully. As λ2 keeps on growing, the blocking of SU setup

01

10

30

20

40

50

λ2 P2ft , S5b

P if (n ≤ 3), S5a

P2ft , S5a P if (n ≤ 3),

P if (n > 3), S5b P if (n > 3), S5a

S5b

Figure 8: P2ft and interference with λ2 in S5a and S5b.

requests increases as the AC scheme must keep on limiting P2ft . This higher SUs blocking limits the SUs acceptance rate and therefore the growth of Th2 . As another example, let us consider P if (n ≤ 3) and if P (n > 3); that is, the fraction of PU arrivals that perceive low interference (n ≤ 3) and the fraction that perceive high interference (n > 3). Figure 8 plots P2ft and the interference as a function of the SUs arrival rate, when the objectives are B2ft ≤ 0.05, Bif (n ≤ 3) = 0.03 and Bif (n > 3) = 0.01. The scheme is able to limit P2ft , P if (n ≤ 3) and P if (n > 3) to their objectives or below. For λ2 ≤ 20 the limiting objective in S5a and S5b is Bif (n > 3), as P2ft and P if (n ≤ 3) are below their

EURASIP Journal on Wireless Communications and Networking

9

0.25

0.06 0.05

0.2

0.04 P2ft

P2ft

0.15 0.03

0.1 0.02 0.05

0

0.01 0 0.5

0.75

1

1.5

2

5

10

0.5

0.75

1

1.5

2

μ2 λ2 = 10, CV(s2 ) = 1 λ2 = 10, CV(s2 ) = 0.5 λ2 = 10, CV(s2 ) = 2

5

10

μ2 λ2 = 20, CV(s2 ) = 1 λ2 = 20, CV(s2 ) = 0.5 λ2 = 20, CV(s2 ) = 2

λ2 = 10, CV(s2 ) = 1 λ2 = 10, CV(s2 ) = 0.5 λ2 = 10, CV(s2 ) = 2

λ2 = 20, CV(s2 ) = 1 λ2 = 20, CV(s2 ) = 0.5 λ2 = 20, CV(s2 ) = 2

Figure 10: P2ft with μ2 and CV[s2 ] in S5a.

Figure 9: Sensitivity of P2ft to E[s2 ] and CV[s2 ] in system 3a. 0.035

objectives. However, for λ2 > 20 the limiting objective in S5a is Bif (n ≤ 3), while in S5b is still Bif (n > 3).

0.03

P if (n ≤ 3)

0.025

4.2. Adaptivity of the AC Scheme. As discussed above, the adaptive scheme can operate with any arrival process and distribution of the session duration. As an example, we study in system 5a the adaptivity of the scheme to different distributions of the SUs session duration random variable (s2 ). We consider three distributions: exponential (CV[s2 ] = 1), Erlang (CV[s2 ] < 1) and hyperexponential (CV[s2 ] > 1). Please refer to any textbook, for example [20], for the definition of the probability density functions of these distributions. For an Erlang-k distribution with E[s2 ] = 1/μ2 , the standard of variation are: √ deviation and the coefficient √ σ2 = 1/(μ2 k) and CV[s2 ] = 1/ k. We set k = 4 to obtain CV[s2 ] = 1/2. We use a special type of a two stage hyperexponetial distribution that requires only two parameters (mean and standard deviation) for characterization [21]. The standard deviation is selected to obtain CV[s2 ] = 2. Note that in our results we also vary the mean (E[s2 ] = 1/μ2 ), then the offered load (λ2 /μ2 ) is maintained constant to make results comparable. To motivate the interest of deploying adaptive schemes, Figure 9 shows the variation of P2ft in system 3a. Note that both the CV and the mean of s2 have a great impact on P2ft . In fact, in Figure 9 we get one order of magnitude variation in the values of P2ft for a constant offered load. The effectiveness of the adaptive scheme to cope with traffic having different characteristics is clearly shown in Figures 10, 11 and 12. The forced termination and interference objectives have been set to B2ft ≤ 0.05, Bif (n ≤ 3) = 0.03 and Bif (n > 3) = 0.01. As in other scenarios, the load of PUs is adjusted such that their blocking probability is 0.01. Observe

0.02 0.015 0.01 0.005 0

0.5

0.75

1

1.5

2

5

10

μ2 λ2 = 10, CV(s2 ) = 1 λ2 = 10, CV(s2 ) = 0.5 λ2 = 10, CV(s2 ) = 2

λ2 = 20, CV(s2 ) = 1 λ2 = 10, CV(s2 ) = 0.5 λ2 = 10, CV(s2 ) = 2

Figure 11: Interference (P if (n ≤ 3)) with μ2 and CV[s2 ] in S5a.

that the proposed scheme is able to adapt and limit the forced termination and the interference under all conditions. In Figure 10, we observe that for μ2 < 0.75 the limiting objective is B2ft , as the interference probabilities are below their objectives. However, for μ2 > 0.75 this behavior is reversed. This is due to the fact that to meet one of the interference objectives the rate of admitted SUs into the system is reduced (the threshold is reduced), as observed in Figures 11 and 12. Note that a similar phenomenon was described in Figure 8. Clearly, for λ2 = 10 and μ2 ∈ [1, 5] the limiting objective is Bif (n > 3), while for μ2 > 5 the limiting objective is Bif (n ≤ 3). For λ2 = 20 and μ2 > 1 the limiting

10

EURASIP Journal on Wireless Communications and Networking Finally, we proposed and evaluated a novel adaptive admission control scheme for SUs that is able to limit simultaneously the probability of forced termination of SUs and the interference. The operation of our scheme is based on simple balance equations which hold for any arrival process and holding time distribution. Our proposal has two relevant features, its ability to guarantee a certain degree of QoS for PUs and SUs under any traffic characteristics, and its implementation simplicity.

0.0125

P if (n > 3)

0.01

0.0075

0.005

Acknowledgments

0.0025 0.001 0 0.5

0.75

1

1.5

2

5

10

μ2 λ2 = 10, CV(s2 ) = 1 λ2 = 10, CV(s2 ) = 0.5 λ2 = 10, CV(s2 ) = 2

λ2 = 20, CV(s2 ) = 1 λ2 = 20, CV(s2 ) = 0.5 λ2 = 20, CV(s2 ) = 2

Figure 12: Interference (P if (n > 3)) with μ2 and CV[s2 ] in S5a.

objective is Bif (n ≤ 3), that is, the fraction of PU arrivals experiencing low interference (P if (n ≤ 3)) is at its objective or close, while the fraction experiencing high interference (P if (n > 3)) is considerably below its objective. Finally, if we compare Figures 9 and 10 we conclude that the operation of the adaptive scheme makes P2ft insensitive to the distribution of the SUs service time, which is an additional robustness advantage. A similar conclusion can be obtained for P if (n ≤ 3) and partially for P if (n > 3).

5. Conclusions We studied the effectiveness of the Fractional Guard Channel admission policy to guarantee the QoS perceived by SUs, defined in terms of their forced termination probability. We modeled the system as a CTMC which was validated by computer simulation. Results showed that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also showed that the probability of forced termination can be limited by setting appropriately the reservation threshold. We also studied the QoS perceived by PUs, defined in terms of the interference caused to PU communications by the operation of SUs. We proposed and evaluated different mechanisms to reduce the interference based on simple spectrum access and channel repacking algorithms. In this case, to cope with the state explosion as the number of system channels grows, we resorted to simulation models that were validated by developing analytical models for systems of manageable size. We compared the interference in a system that uses the proposed mechanisms with the interference in a system that uses the common random access scheme. Numerical results showed that the interference reduction can be of one order of magnitude or higher when using the new mechanisms with respect to the random access case.

This work has been supported by the Spanish Ministry of Science and Innovation and the European Commission (30% PGE, 70% FEDER) under Projects TSI2007-66869-C02-02 and TIN2008-06739-C04-02.

References [1] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005. [2] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006. [3] S. S. C. (SSC), “Spectrum occupancy measurements,” Tech. Rep. 1595, SSC, Va, USA, 2005, http://www.sharedspectrum .com/measurements/. [4] M. A. McHenry, P. A. Tenhula, D. McCloskey, D. A. Roberson, and C. S. Hood, “Chicago spectrum occupancy measurements and analysis and a long-term studies proposal,” in Proceedings of the 1st International Workshop on Technology and Policy for Accessing Spectrum (TAPAS ’06), p. 1, ACM, New York, NY, USA, 2006. [5] A. Attar, S. A. Ghorashi, M. Sooriyabandara, and A. H. Aghvami, “Challenges of real-time secondary usage of spectrum,” Computer Networks, vol. 52, no. 4, pp. 816–830, 2008. [6] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 40–48, 2008. [7] A. Sgora and D. Vergados, “Handoff prioritization and decision schemes in wireless cellular networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 57– 77, 2009. [8] V. Pla and V. Casares-Giner, “Analysis of priority channel assignment schemes in mobile cellular communication systems: a spectral theory approach,” Performance Evaluation, vol. 59, no. 2-3, pp. 199–224, 2005. [9] X. Zhu, L. Shen, and T.-S. P. Yum, “Analysis of cognitive radio spectrum access with optimal channel reservation,” IEEE Communications Letters, vol. 11, no. 4, pp. 304–306, 2007. [10] R. Ramjee, D. Towsley, and R. Nagarajan, “On optimal call admission control in cellular networks,” Wireless Networks, vol. 3, no. 1, pp. 29–41, 1997. [11] A. Ghasemi and E. S. Sousa, “Spectrum sensing in cognitive radio networks: requirements, challenges and design tradeoffs,” IEEE Communications Magazine, vol. 46, no. 4, pp. 32–39, 2008.

EURASIP Journal on Wireless Communications and Networking [12] W.-Y. Lee and I. F. Akyildiz, “Optimal spectrum sensing framework for cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3845–3857, 2008. [13] L. Yang, L. Cao, and H. Zheng, “Proactive channel access in dynamic spectrum networks,” Physical Communication, vol. 1, no. 2, pp. 103–111, 2008. [14] A. T. Hoang, Y.-C. Liang, and M. H. Islam, “Power control and channel allocation in cognitive radio networks with primary users’ cooperation,” IEEE Transactions on Mobile Computing, vol. 9, no. 3, pp. 348–360, 2010. [15] C. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. Shellhammer, and W. Caldwell, “IEEE 802.22: the first cognitive radio wireless regional area network standard,” IEEE Communications Magazine, vol. 47, no. 1, pp. 130–138, 2009. [16] S. K. Biswas and B. Sengupta, “Call admissibility for multirate traffic in wireless ATM networks,” in Proceedings of the 16th IEEE Annual Conference on Computer Communications (INFOCOM ’97), vol. 2, pp. 649–657, April 1997. [17] J. S. Evans, “Effective bandwidth-based admission control for multiservice CDMA cellular networks,” IEEE Transactions on Vehicular Technology, vol. 48, no. 1, pp. 36–46, 1999. [18] D. Garcia-Roger, M. A. J. Domenech-Benlloch, and V. Pla, “Adaptive admission control in mobile cellular networks with streaming and elastic traffic,” in Proceedings of the 20th International Teletraffic Congress (ITC ’07), vol. 4516 of Lecture Notes in Computer Science, pp. 925–937, Ottawa, Canada, 2007. [19] J. Martinez-Bauset, D. Garcia-Roger, M. J. DomenechBenlloch, and V. Pla, “Maximizing the capacity of mobile cellular networks with heterogeneous traffic,” Computer Networks, vol. 53, no. 7, pp. 973–988, 2009. [20] R. Nelson, Probability, Stochastic Processes and Queueing Theory, Springer, Berlin Germany, 1995. [21] P. Morse, Queues, Inventories and Maintenance, John Wiley & Sons, New York, NY, USA, 1995.

11

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 482975, 13 pages doi:10.1155/2010/482975

Research Article The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow Gaoning He,1 Laura Cottatellucci,2 and M´erouane Debbah3 1 Research

& Innovation Center, Alcatel-Lucent Shanghai Bell, 388 Ningqiao Road, Pudong, Shanghai 201206, China of Mobile Communications, EURECOM, 06904 Sophia-Antipolis Cedex, France 3 Alcatel-Lucent Chair on Flexible Radio, 3 Rue Joliot-Curie, 91192 Gif sur Yvette, France 2 Department

Correspondence should be addressed to Gaoning He, [email protected] Received 1 October 2009; Revised 13 May 2010; Accepted 2 July 2010 Academic Editor: Zhi Tian Copyright © 2010 Gaoning He et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We present a general game-theoretical framework for power allocation in the downlink of distributed wireless small-cell networks, where multiple access points (APs) or small base stations send independent coded network information to multiple mobile terminals (MTs) through orthogonal channels. In such a game-theoretical study, a central question is whether a Nash equilibrium (NE) exists, and if so, whether the network operates efficiently at the NE. For independent continuous fading channels, we prove that the probability of a unique NE existing in the game is equal to 1. Furthermore, we show that this power allocation problem can be studied as a potential game, and hence efficiently solved. In order to reach the NE, we propose a distributed waterfilling-based algorithm requiring very limited feedback. The convergence behavior of the proposed algorithm is discussed. Finally, numerical results are provided to investigate the price of anarchy or inefficiency of the NE.

1. Introduction Recently, there has been an increasing interest for small-cell networks. In fact, they have been recognized as an effective and low-cost architecture to provide wireless data rate access to Internet users [1, 2]. These networks consist of numerous and densely deployed APs, known as outdoor femto cells or small-cells, connected to an existing backbone network with heterogeneous links, for example, fibers, ADSLs, and power lines. The general idea is to provide signal coverage and high data rates in dense environments, that is, areas with high user concentrations, by installing low-cost wireless access nodes and exploiting the existing heterogeneous wired infrastructures without a new high-cost cabling. In reality, the femto nodes may belong to different service providers eventually organized in coalitions to maximize their own revenues. In such a context, there is a critical trade-off between cooperation and competition among different providers who may share information and resources to maximize their own revenues. In order to enable both cooperation among providers and network scalability, the femto nodes need selforganizing mechanisms to perform communications and

network control functions. Thus, distributed algorithms accounting for the revenues of different providers play a key role in this context. In contrast to the legacy cell networks, in a small-cell network a user may be served by more than one femto node. This feature is strategic to cope with the heterogeneity of the core network. In fact, if a user were only connected to a single out-door femto-cell, it would suffer from low throughput from time to time due to the limited-backhaul capacity, despite the presence of a high-speed wireless link. As a result, users would access simultaneously to different femto-cells in order to aggregate the sum capacity of the backhaul links. In this paper, we describe a small-cell network with N MTs served simultaneously by M femto nodes over N orthogonal channels, for example, FDMA, TDMA, and OFDM. For such a system, and we study the power allocation problem under the constraint of maximum transmit power at each femto node (The issue of load balancing [3] in the wired network, and how the different packets are split with respect to the backhaul capacity from a main decentralized scheduler, although important, is not investigated in this paper. We assume that perfect load balancing holds). This

2

EURASIP Journal on Wireless Communications and Networking

system is substantially different from the ones typically analyzed in literature. In fact, it does not reduce to a classical downlink of a cellular network modeled as a broadcast channel since there are several APs transmitting information simultaneously to the same MT. Nor does it reduce to N independent multiple access channels when considering each mobile as a receiver because of the power constraints at the APs. Finally, the considered system does not reduce to a multicellular or an adhoc network modeled as an interference channel since all the signals received at each MT carry useful information to be decoded. In this paper we assume that each signal of interest is decoded considering the remaining signals as interference. This scheme is susceptible to improvement by joint decoding of all the received signals. However, this decoding approach exceeds the scope of this paper. In traditional wireless cellular networks, the power allocation is often implemented with centralized algorithms aiming at maximizing the sum of the Shannon transmission rate [4]. The maximization problem is solved by waterfilling algorithms [5–8] extended to multiuser contexts. The optimization is in general nonconvex but algorithms that reach local maximum are available [9–11]. Such a centralized power control scheme usually requires a unique shared resource allocation controller and complete channel state information (CSI) with consequent feedback and overhead. It is worth noting that this overload scales exponentially with the number of transmitters and receivers. Thus, such a fully centralized approach is not suitable for small-cell networks without centralized devices and with multiple service providers interested in their own revenues. Additionally, it is not scalable in dense networks. Game theory [12] provides a possible analytical framework to develop decentralized and/or distributed algorithms for resource allocation in the context of interacting entities having eventually conflicting interests. Recently, noncooperative game theory and its analytical methodologies have been widely applied in wireless systems to solve communication control problems [13]. Distributed power allocation algorithms based on noncooperative games have been proposed for uplink single cell systems, that is, multiple access channels, and downlink multicellular networks or ad hoc networks, that is, interference channels. In [14], general results on potential games are provided and specialized to an uplink single-cell system with multiple access channel based on code division multiple access (CDMA). In [15], a digital subscriber line (DSL) is modeled as a multiple access system based on an OFDM scheme and an iterative waterfilling algorithm is proposed along the lines of the results in [16]. The classical uplink single-cell scenario is relaxed in [17] to include a jammer in the system and an iterative waterfilling algorithm is proposed. In [16], power allocation on the interference channel is modeled as a noncooperative game, and the conditions for the existence and uniqueness of Nash equilibrium (NE) are established for a two-player version of the game. Similar conditions for the existence and uniqueness have been extended to the multiuser case in [18], where the authors focus on the practical design of distributed algorithms to

compute the NE and propose an asynchronous iterative waterfilling algorithm for an interference channel. In [9], the so-called symmetric waterfilling game was studied. The authors assume that for a set of subchannels and receivers the channel gains from all transmitters are the same. The game is shown to have an infinite number of equilibria. The framework of the interference channel has been relaxed in [19] to include cognitive radio systems with transmitters and receivers equipped with multiple antennas, that is, multiple input multiple output (MIMO) systems. A distributive algorithm for the design of the beamformers at each secondary transmitter based on a noncooperative game is developped. Uniqueness and global stability of the Nash equilibrium are studied. Finally, it is worth to note that the DSL power allocation game in [15] is similar to our game from the mathematical point of view. However, it can be shown that with DSL crosstalk link channel coefficients the game in [15] is not a potential game. Therefore, in general, all the nice properties from potential games do not necessarily hold in their case. In this paper, we adopt game-theoretical methodologies for power allocation problem in the downlink of small-cell networks (Note that a similar power allocation game can be considered for the uplink where MTs are the players taking decisions. However, it is impractical for MTs to have complete uplink CSI. Then, realistic models should take into account the assumption of knowledge reduction at the transmitters. The interested readers are referred to [20] for the framework of Bayesian games). We model femto cells of different operators as players who adaptively and rationally choose their transmission strategies, that is, their transmit power levels, with the aim of maximizing their own transmission sum-rates under maximum power constraints. We first consider the case where each femto cell decides its own power allocation based on the assumption of complete CSI. Later we remove this assumption, and we show that the same equilibrium can still be reached. In such a context it is important to characterize the NE set, for example, the existence and uniqueness of NE. This aspect plays a key role for the application of a distributed game-theoretical-based algorithm. In fact, the existence and uniqueness of an NE guarantees a predictable power allocation and the behavior of a self-organizing network. An answer to this relevant issue depends strongly on the channel fading statistics and the number of players of the investigated channel setting, as is apparent from the comparison of the results in [9– 11]. We show that, for a quasi-static fading channel (a fading channel is quasi-static if it is constant during the transmission of a codeword but it may change from a codeword to the following one) with continuous probability density functions of the channel power attenuations, an NE exists and is unique with unit probability. Additionally, we point out that the considered game is a potential game and a simple decentralized algorithm based on the bestresponse algorithm can be readily proposed. However, a straightforward decentralized algorithm based on complete CSI would not be scalable since the required overhead would scale exponentially with the number of transmitters and receivers. Then, we propose a distributed iterative algorithm

EURASIP Journal on Wireless Communications and Networking

3 AP 1

AP M

AP 2 ···

r ne t Inte

···

A 1 AP

e to-c Fem

P2

MT 1

MT N

MT 2

oup ll g r

Subcarrier

1

N

···

2

Figure 2: The multiuser OFDM model. Figure 1: Illustration of femto-cell group with distributed network information flow.

which requires the transmission of the total received power at each MT at each iteration step. With this distributed algorithm, the overhead scales only linearly with the number of receivers. The convergence rate of the proposed algorithm is analyzed. The price of anarchy is also investigated by numerical analysis. The paper is organized as follows. In Section 2, we introduce the system model and formulate the problem. In Section 3, we study the existence and uniqueness of NE and characterize the NE set. In Section 4, we show that the game at hand is a potential game. Based on the property of potential games and observations on the required information, we propose a distributed algorithm converging to the NE. We investigate the convergence issue. Numerical analysis of the price of anarchy and the convergence rate are provided in Section 5. Section 6 concludes the paper by summarizing the main results and insights on the system behaviour acquired in this work.

2. System Model and Problem Statement 2.1. MultiSource MultiDestination System Model. We consider a wireless system in downlink with M noncooperative APs simultaneously sending information to N MTs over N orthogonal channels, for example, different time slots, frequency bands, or groups of subcarriers in time division multiple access (TDMA), frequency division multiple access (FDMA), or OFDM systems, respectively, as shown in Figure 2. Each channel is preassigned to a different MT by a scheduler and each MT receives signals only on the assigned channel. Without loss of generality, throughout this paper we assign channel n to MT n, for n = 1, . . . , N. This implies that both the MT set and the channel set share the same index in our model. Note that the system model at hand does

not reduce to a classical multiple access channel, a broadcast channel, or an interference channel [6]. We assume that the channels are block fading (in different scientific communities these channels are also referred to as quasi-static fading or delay constrained channels), that is, the fading coefficients are constant during the transmission of a codeword or block. Within a given transmission block, ×N be the channel gain matrix whose (m, n) entry let G ∈ RM ++ is gm,n , the channel gain of the link from AP m to MT n on the preassigned channel n. The matrix G is random with independent entries. We further assume that the distribution function of each positive entry gm,n is a continuous function. By assuming that the MTs use low-complexity singleuser decoders [6], the signal-to-interference-plus-noise-ratio (SINR) of the signal from AP m received at MT n is given by γm,n =

σ2

gm,n pm,n + j =1, j =/ m g j,n p j,n , M

(1)

where pm,n is the power transmitted from AP m on subchannel n, and σ 2 is the variance of the white Gaussian noise. For AP m, write the maximum achievable sum-rate as [6] Rm =

N 





log 1 + γm,n ,

∀m,

(2)

n=1

and the power constraint as N  n=1

max pm,n ≤ Pm ,

∀m,

(3)

max is maximum transmit power of AP m and P max > where Pm m 0, for all m.

2.2. Power Allocation as a NonCooperative Game. Here, we introduce the power allocation problem as a noncooperative

4

EURASIP Journal on Wireless Communications and Networking

strategic game. Because of the competitive nature of the APs, belonging in general to different service providers, AP m aims to maximize its own transmission rate Rm (2) by choosing its transmit power vector pm  [pm,1 , . . . , pm,N ]T , subject to its power constraint (3). Denote by vector p = [pT1 , . . . , pTM ]T the outcome of the game in terms of transmit power levels of all M APs on the N channels. We can completely describe this noncooperative power allocation game as

from the system design perspective of wireless networks. In the rest of the paper, we focus on characterizing the set of NEs. The following questions are addressed one by one.

G  [M, {Pm }m∈M , {um }m∈M ],

(i) Player set: M = {1, . . . , M };

Throughout this section we investigate the existence and uniqueness of a Nash equilibrium. It is known that in general an NE point does not necessarily exist. In the following theorem we establish the existence of a Nash equilibrium in our game.

(ii) Strategy set: {P1 , . . . , PM }, where the strategy set of player m is

Theorem 1. A Nash equilibrium exists in game G.

(4)

where the elements of the game are

⎧ ⎨

N 

Pm = ⎩pm : pm,n ≥ 0, ∀n,

pm,n ≤

n=1

⎫ ⎬

max Pm ; ⎭

(5)

(iii) Utility or payoff function set: {u1 , . . . , uM }, with 



um pm , p−m =

N 



log 1 +

n=1

gm,n pm,n σ 2 + j =/ m g j,n p j,n 

= Rm ,

(6) where p−m denotes the power vector of length (M − 1)N consisting of elements of p other than the mth element, that is, 

p−m = pT1 , . . . , pTm−1 , pTm+1 , . . . , pTM

T

.

(7)

In such a noncooperative game setting, each player m acts selfishly, aiming to maximize its own payoff, given other players’ strategies and regardless of the impact of its strategy may have on other players and thus on the overall performance. The process of such selfish behaviors usually results in Nash equilibrium, a common solution concept for noncooperative games [21].

(i) Does an NE exist in our game? (ii) Is the NE unique or there exist multiple NE points? (iii) How to reach an NE if it exists? (iv) How does the system perform at NE?

Proof. Since Pm is convex, closed, and bounded for each m; um (pm , p−m ) is continuous in both pm and p−m ; and um (pm , p−m ) is concave in pm for any set p−m , at least one Nash equilibrium point exists for G [12, 22]. Once existence is established, it is natural to consider the characterization of the equilibrium set. The uniqueness of an equilibrium is a rare but desirable property, if we wish to predict the network behavior. In fact, many game problems have more than one NE [12]. As an example of games with infinite NEs, we could consider a special case of our game G, namely, the symmetric waterfilling game [9] where the channel coefficients are assumed to be symmetric. Then, in general, our game G does not have a unique NE. But with the assumption of independent and identically distributed (i.i.d.) continuous entries in G, we will show that the probability of having a unique NE is equal to 1. For any player m, given all other players’ strategy profile p−m , the best-response power strategy pm can be found by solving the following maximization problem: pm

Definition 1. A power strategy profile p is a Nash equilibrium If, for every m ∈ M, 







  u m p m , p−m ≥ um pm , p−m ,



um pm , p−m

max

N 

s.t.

n=1

for all pm ∈ Pm . From the previous definition, it is clear that an NE simply represents a particular “steady” state of a system, in the sense that, once reached, no player has any motivation to unilaterally deviate from it. The powers allocated in our system correspond to an NE.

In many cases, an NE results from learning and evolution processes of all the game participants. Therefore, it is fundamental to predict and characterize the set of such points

∀n

which is a convex optimization problem, since the objective function um is concave in pm and the constraint set is convex. Therefore, the Karush-Kuhn-Tucker (KKT) conditions for optimization are sufficient and necessary for the optimality [5]. The KKT conditions are derived from the Lagrangian for each player m, 

3. Characterization of Nash Equilibrium Set

(9)

max pm,n ≤ Pm

pm,n ≥ 0,

(8)





Lm p, λ, ν =

N  n=1



log 1 + ⎛

− λm ⎝

N  n=1

gm,n pm,n σ 2 + j =/ m g j,n pj,n



⎞ max ⎠ pm,n − Pm +

N  n=1

(10) νm,n pm,n

EURASIP Journal on Wireless Communications and Networking and are given by σ2 +

gm,n − λm + νm,n = 0, j =1 g j,n p j,n

∀n,

M



λm ⎝

N 

n=1

(11)

M 

max ⎠ pm,n − Pm = 0,

(12)

∀n,

(13)

where λm ≥ 0, νm,n ≥ 0, for all m and for all n are dual variables associated with the power constraint and transmit power positivity, respectively. The solution to (11)–(13) is known as waterfilling [6]: pm,n =

σ2 + 1 − λm



j= / m g j,n p j,n

+

,

gm,n

∀n,

(14)



n=1

σ2 + 1 − λm



j= / m g j,n p j,n

+

gm,n

max = Pm .

(15)

In order to analyze the equilibrium set, we establish necessary and sufficient conditions for a point being an NE in the game G.  {p 1 , . . . , pM }

is a Nash Theorem 2. A power strategy profile equilibrium of the game G if and only if each player’s power p m is the single-player waterfilling result (9) while treating other players’ signals as noise. The corresponding necessary and sufficient conditions are: σ2 +

gm,n − λm + νm,n = 0, j =1 g j,n p j,n

M



λm ⎝

N 

n=1

∀m ∀n,

(16)

∀m,

(17)

⎞ max ⎠ pm,n − Pm

νm,n pm,n = 0,

= 0,

∀m ∀n.

(18)

The proof can be found in Appendix A. From (16), it is easy to verify that necessarily λm > 0, since νm,n ≥ 0 and gm,n > 0, for all m and for all n. Also, from (17), we have N  n=1

max pm,n = Pm ,

∀m.

gm,n pm,n  sn ,

∀n.

(20)

m=1

The proof can be found in Appendix B. Now, let Z be the following (M + N) × MN matrix: ⎡

IM IM ⎢ T T ⎢ g1 0M ⎢ T ⎢0M g2T Z=⎢ ⎢ . .. ⎢ . . ⎣ . 0TM 0TM

⎤ · · · IM ⎥ · · · 0TM ⎥ T⎥ · · · 0M ⎥ ⎥ , . ⎥ .. . .. ⎥ ⎦ T · · · gN (M+N)×MN

(21)

where gn is the nth column of G, IM is the M × M identity matrix, and 0M is the zero vector of length M. Let c be the following vector of length M + N:

where (x)+  max{0, x} and λm satisfies N 

Nash equilibrium of the game G. Furthermore, there is a unique vector s = [s1 , . . . , sn ]T such that any vector p corresponding to a Nash equilibrium satisfies



νm,n pm,n = 0,



5

(19)

This equation implies that, at the NE, all APs transmit at their maximum power by conveniently distributing the power over all the orthogonal channels. However, it is still difficult to find an analytical solution from (16)–(18), since the system consisting of (14) and (15) is nonlinear. To simplify this problem, we could consider linear equations instead of nonlinear ones. The following lemma provides a key step in this direction. Lemma 1. For any realization of channel matrix G, there exist unique values of the Lagrange dual variables λ and ν for any





T max s1 s2 · · · sN . c = P1max P2max · · · Pm

(22)

Then, (19) and (20) can be written in the form of linear matrix equation Zp = c.

(23)

Define the following sets: 



X  (m, n) : νm,n = 0 , N  {n : ∃m such that (m, n) ∈ X},

(24)

and denote by |X| and |N | their cardinalities. From (18), if an index (m, n) ∈ / X we must have pm,n = 0. Without loss of  generality, we assume that N = {1, . . . , N } for N ≤ N. Let Z    be the (M+N)×M N matrix formed from the first M+N rows and first M N columns of Z, p is formed from the first M N elements of p, and c is formed from the first M + N elements of c. Then, any NE solution must satisfy  = c. Zp

(25)

 be the (M + N)  × |X| matrix formed from the Let Z  columns of Z that correspond to the elements of X. Similarly, let p be the vector of length |X| with entries pm,n such that (m, n) ∈ X (same order as they were in p). Then, any NE solution satisfies  = c. Zp

(26)

Lemma 2. For any realization of a random M × N channel  gain matrix G with i.i.d. continuous entries, if M N > M + N,  the probability that |X| ≤ M + N is equal to 1.  the Lemma 3. (1) If M N > M + N and |X| ≤ M + N,  probability that rank(Z) = |X| is equal to 1.  = MN  the probability that rank(Z)  (2) If M N ≤ M + N, is equal to 1.

6

EURASIP Journal on Wireless Communications and Networking

The proofs of Lemmas 2 and 3 can be found in Appendices C and D, respectively. Based on Lemmas 1, 2, and 3, we derive the following theorem. Theorem 3. For any realization of a random M × N channel gain matrix G with statistically independent continuous entries, the probability that a unique Nash equilibrium exists in the game G is equal to 1. The proof can be found in Appendix E. Thus, from Theorems 1 and 3, we have established the existence and uniqueness of NE in our game G.

4. Distributed Power Allocation and Its Convergence to the Nash Equilibrium

Definition 2. A strategic game G is an exact potential game if → R satisfying there exists a function v : P  





    = um pm , p−m − um qm , p−m ,

∀m,







pm , p−m =

N 



log⎝σ + 2

n=1

4.1. Potential Game Approach. Fortunately, our game G can be studied as a potential game (The notation of potential games was firstly used for games in strategic form by Rosenthal (1973) [24], and later generalized and summarized by Monderer (1996) [25]). Potential games are known to have appealing properties for the convergence of the bestresponse or greedy algorithms to the equilibrium. All the potential games admit a potential function. This potential function is a unique global function that all the players optimize when they optimize their own utility functions. Thus, the set of pure Nash equilibria can be found by simply locating the local optima of the potential function. Such games have received increasing attention recently in wireless networks [14, 26, 27], since the existence of potential function enables the design of fully distributed algorithms for resource allocation problems. In fact, there are various notions of potential games such as exact potential, weighted potential, ordinal potential, generalized ordinal potential, pseudo potential, and so forth. These potential games could possess slightly different properties for the existence and convergence of NE. Here, we consider only the exact potential games, since they are closely related to our game. Exact potential games are defined in the following statement.



Lemma 4. The game G is an exact potential game with the following potential function: v

An equilibrium has practical interests only if it is reachable from nonequilibria states. In fact, there is no reason to expect a system to operate initially at equilibrium. The convergence of an algorithm to an equilibrium is in general a very hard problem usually related to the specific algorithm and requiring the analysis of synchronous or asynchronous update mechanisms (for power allocation algorithms in interference channels see [18, 23]).

v pm , p−m − v qm , p−m

Equation (27) implies that the NE of the original game G must coincide with the NE of the potential game, which is defined as a new game with v as an identical utility function for all the players. Therefore, we can transform the noncooperative strategic game G into a potential game, if we can find a potential function that quantifies the variation in terms of utility due to unilateral perturbation of each player’s strategy, as indicated in (27). Taking inspiration from the result derived in the single channel case [14], we have the following lemma.

(27)

for all (pm , p−m ), (qm , p−m ) ∈ P . The function v is referred to as exact potential of the game.

M 



gm,n pm,n ⎠

m=1





⎢ ⎛ ⎞⎥ ⎢ ⎥ N   ⎢ ⎥ 2 ⎢ ⎝ ⎠ log⎢gm,n pm,n + σ + g j,n p j,n ⎥ = ⎥. ⎢ ⎥ n=1 j= /m ⎣ !" #⎦ aggregate interference + noise

(28) Proof. From (28) and (6), we observe that the first derivatives of v and um are equal, that is, N gm,n ∂um  ∂v = = ,  ∂pm ∂pm n=1 σ 2 + Nj=1 g j,n p j,n

∀m

(29)

which implies that the property of exact potential (28) is satisfied. This completes the proof. 

We denote by ζm,n the term (σ 2 + j =/ m g j,n p j,n ) which stands for the aggregate interference plus noise of user m on subchannel n. In order to find user m’s single-user bestresponse in the potential game, one needs to solve the following maximization problem: 



max v pm , p−m ⇐⇒ max pm

pm

s.t.

N 



log ζm,n + gm,n pm,n



n=1 N  n=1

max pm,n ≤ Pm

pm,n ≥ 0,

(30)

∀n.

Note that the problem (30) can be solved as a convex optimization, when the private channel gain gm = {gm,1 , . . . , gm,N } and the aggregate interference plus noise ζm = {ζm,1 , . . . , ζm,N } are both known to player m. It is easy to verify that this single-user best-response is the same waterfilling solution expressed in (14), due to the property of potential function. 4.2. Distributed Algorithm and Convergence Property. Note that if each AP has complete CSI, that is, knowledge of the channel gain matrix G, defined as in Section 2,

EURASIP Journal on Wireless Communications and Networking the uniqueness of the NE guaranties that each AP can determine independently the power allocation at the NE in a decentralized manner. In order to acquire information about the whole matrix G at each AP, a feedback channel is usually needed to transmit the channel estimations from MTs to APs. With this information, each AP can solve locally the system of equations (16)–(18) or perform locally a bestresponse algorithm based on the repeated maximization of problem (30) by starting from a random point p−m ∈ $ P . j= / m j However, the structure of problem (30) suggests an alternative distributed approach to reduce eventually the signalling on the feedback channel. In fact, the repeated optimization of problem (30) can be performed in a distributed way by feeding back at each AP m only the private channel gain gm and the aggregate interference plus noise ζm . Nevertheless, note that such a distributed implementation of the algorithm would lead to a transition phase where the APs are not transmitting at an equilibrium point. In our numerical results, we ignore the cost of feedback, and we focus on analyzing the theoretical upper-bound. The above discussion yields a simple algorithm based on the iterative waterfilling [28] detailed in the following. In this algorithm, we assume that the same game could be myopically played repeatedly: in each round, every myopic player (a myopic player has no memory of past gamerounds) chooses its best-response according to the singleplayer waterfilling that depends on the current state of the game. The following theorem shows the convergence and optimality of the algorithm. Theorem 4. The DPIWF algorithm converges to a unique Nash equilibrium of the noncooperative game G. The proof can be found in Appendix F. A more general discussion about the convergence and stability properties of potential games can be found in [25, 29]. In [25], it shows that every bounded potential game (a game is called a bounded game if the payoff functions are bounded) has the approximate finite improvement property (AFIP), that is, for every  > 0, every -improvement path is finite. Then, it is obvious that every such finite improvement path of the exact potential games terminates in an equilibrium point (an -equilibrium is a strategy profile that approximately satisfies the condition of Nash equilibrium). In other words, the sequential best-response (players move in turn and always choose a best-response) converges to the equilibrium independent of the initial point. Note that this is a very flexible condition for the convergence, since order of playing can be deterministic or random and need not to be synchronized. It is one of the most interesting properties of the potential games, especially in order to distributively find the equilibrium in self-organizing systems. In [29], it shows that potential games are characterized by strong stability properties (Lyapunov stable, see its definition in Theorem 5.34 of [29]). Also note that if the game has a unique NE, then it is globally stable. In the simultaneous best-response algorithm all the players choose their best-responses simultaneously at each iteration. It is not difficult to verify that, in the general case, it

7

does not necessarily converge, due to the “ping-pong” effect generated by myopic players. However, [30] has shown that for infinite pseudopotential games, a general class of games including also exact potential games, with convex strategy space and single-valued best-response (games with strictly multiconcave potential, concave in each players’ unilateral deviation, have single-valued best-response), the sequence of simultaneous best-responses, reminiscent of fictitious play, also converges to the equilibrium. It is interesting to note that for many practical systems with finite transmit power states, similar results still hold for the convergence of the sequential best-response. The only difference is that, in the finite case, the existence of exact potential function implies the finite improvement property (FIP), and therefore, the sequential best-response converges to the exact NE instead of an -equilibrium. Although the final convergence of the DPIWF algorithm is proved, one may wonder whether the optimum of the potential function (28) coincides with the optimum social welfare, that is, the optimal total information rate transmitted in the network. We discuss the price of anarchy in the following section.

5. Numerical Evaluation In this part, numerical results are provided to validate our theoretical claims and assess the price of anarchy, that is, the performance loss in terms of the transmit sum-rate of all APs in the network due to a noncooperative game compared to the maximum social welfare. We denote this transmit sumrate in the network as the actual total network rate, and defined it as  

u p =

M 

 

um p .

(31)

m=1

We consider frequency-selective fading channels with channel matrix G of size M × N, where M is the total number of transmitters (players) and N is the total number of receivers. We assume that the Rayleigh fading channel gain gm,n are i.i.d. among players and channels. The maximum power constraint for each player m is assumed to be identical and normalized to P m = 1. In Figure 3, we show the convergence behaviors of potential function and the actual total network rate, shortly referred to as “actual rate”, by using the proposed DPIWF algorithm for a random channel realization. We set the number of transmitters to M = 10 and the number of receivers to N = 10. As expected, in both Figures 3(a) and 3(b) the potential function converges rapidly (at the 4th iteration). In Figure 3(a), the actual rate converges slightly slower (at the 6th iteration) and maintains a monotonically increasing slope. However, in Figure 3(b), the actual rate finally converges, but unfortunately it does not increase monotonically and it converges only at the 34th iteration with a convergence rate much slower than the potential function. Note that we use this example to show that a “defective” convergence may happen during the iteration steps.

8

EURASIP Journal on Wireless Communications and Networking

(0) initialize t = 0, pm,n = 0, ∀m ∀n repeat t =t+1 for m = 1 to M do for n = 1 to N do  (t) ζm,n = σ2 + g j,n p(t) j,n j= /m

end for  (t+1) (t+1) (t) [pm,1 , . . . , pm,N ] = arg maxpm ≥0n pm,n ≤Pm log(ζm,n + gm,n pm,n ) n

end for until convergence Algorithm 1: DPIWF algorithm. 45

40 38 36 Total network rate (bits/s)

Total network rate (bits/s)

40 35 30 25

34 32 30 28 26 24

20

22 15

0

10

20

30

40

50

20

0

10

20

30

40

50

Iterations

Iterations Actual rate Potential

Actual rate Potential

(a) An example of “ideal” convergence

(b) An example of “defective” convergence

Figure 3: Convergence and performance of potential function and actual total network rat.

In order to measure the performance efficiency of distributed networks operating at the unique NE, we provide here the optimal centralized approach as a target upperbound for the total network rate. We ignore the performance loss caused by the necessary uplink and downlink signalling transmission. The total network rate maximization problem can be formulated as max p

s.t.

 

u p 

pm,n ≤ P m ,

∀m

(32)

n

pm,n ≥ 0,

∀m ∀n.

The optimization problem (32) is difficult to solve since the objective function is nonconvex in p. However, a relaxation of this optimization problem [11] can be considered as a geometric programming problem [31]. As well known, a geometric programming can be transformed into a convex optimization problem and then solved in an efficient way. A

low-complexity algorithm was proposed in [11] to solve the dual problem by updating dual variables through a gradient descent. Note that the algorithm always converges, but may converges to a local maximum point in a few cases. We use this algorithm in our simulations. In the following part, we address two main practical questions through numerical results. (1) How does the network performance behave in average at the unique NE in comparison to the global optimal solution or global welfare? More precisely, we are interested in comparing the average total network rate instead of the instantaneous total network rate. We denote by u(M, N) the average total network rate for a M transmitters and N receivers system, that is, ⎡

M  N 





pm,n gm,n ⎦, u(M, N) = EG ⎣ log 1 + 2  σ + j= / m p j,n g j,n m=1n=1 (33)

9

90

45

80

40

70

35

Total network rate (bps/Hz)

Total network rate (bps/Hz)

EURASIP Journal on Wireless Communications and Networking

60 50 40 30 20

25 20 15 10 5

10 0

30

0

5

10 15 20 M - total number of transmitters

N = 15 (centralized) N = 15 (decentralized) N = 10 (centralized)

0

25

0

5

10

15

20

25

M - total number of transmitters N = 15 (centralized) N = 15 (decentralized) N = 10 (centralized)

N = 10 (decentralized) N = 5 (centralized) N = 5 (decentralized)

(a) σ 2 = 0.1

N = 10 (decentralized) N = 5 (centralized) N = 5 (decentralized)

(b) σ 2 = 1

Figure 4: Average total network rate, decentralized versus centralized optimality.

1.002 Probability of convergence within 5 iterations

Probability of convergence within 5 iterations

1.002 1 0.998 0.996 0.994 0.992 0.99 0.988 0.986 0.984 0.982

1 0.998 0.996 0.994 0.992 0.99 0.988 0.986 0.984

0

5

10 15 20 M - total number of transmiters

25

0

5

10

15

20

25

M - total number of transmiters N =5 N = 10 N = 15

N =5 N = 10 N = 15 (a) σ 2 = 0.1

(b) σ 2 = 1

Figure 5: Probability of convergence within 5 iterations.

(2) What about the convergence behavior for the actual total network rate when using DPIWF algorithm? Does it converge as rapidly as in Figure 3(a) for the most of the cases? Let us consider the first question. In Figure 4, we compare the average total network rate of both decentralized and

centralized networks for two different channel noise levels σ 2 = 0.1 and 1, respectively. The plots are obtained through Monte-Carlo simulations over 104 realizations for the channel gain matrix G. Figures 4(a) and 4(b) show the total network rate as a function of the number of transmitters M for different number of receivers N. More specifically, N = 5, 10, 15. We note that in both Figures 4(a) and 4(b), the

10

EURASIP Journal on Wireless Communications and Networking

centralized optimal approach always outperforms the decentralized noncooperative algorithm. Additionally, for a fixed number of transmitters N, when we increase the number of receivers M, the performance loss of decentralized systems compared to the centralized social welfare becomes greater and greater. This phenomenon can be intuitively understood as follows: when there is a great number of selfish players, the hostile competition turns the multiuser communication system into an interference-limited environment, where interference significantly degrade the performance efficiency. In Figure 4, we also note that for a fixed N the average performance of centralized systems is an increasing function of M, and the average performance of decentralized systems corresponding to NE reaches a maximum and then decreases flatting out. For the typical values of N, that is, N = 5, 10, 15, in Figure 4(a), when σ 2 = 0.1 the average performance of decentralized systems are maximized at M = 4, 9, 14, respectively; in Figure 4(b), when σ 2 = 1 the average performance of decentralized systems are maximized at M = 6, 11, 16, respectively. This comparison simply shows that different noise variance (in general channel condition) have a different impact on the decentralized system performance. This observation is fundamental for improving the spectral efficiency of a distributed multiuser small cell networks: For a given area, that is, a given number of receivers N and given channel conditions, there exists an optimal number of access points, denoted as M  , to be installed in the network. Roughly speaking, when M > M  , the system is saturated due to the increasing competition for the shared limited resources; when M < M  , the system operates in a unsaturated state, since system resources are not fully exploited. Let us now consider the second question. In Figure 5, we show the probability of convergence to the NE within 5 iterations for σ 2 = 0.1 and 1, respectively. To be more precise, we say that the algorithm converges at the fifth iteration if the total network rate exceeds 99% of the rate at the NE. We find that the probability of convergence is satisfactory. It is greater than 0.982 in all cases and tends to 1 when M N and M N. Another interesting observation is that the minimal convergence probability always occurs when M = N, regardless of the noise value σ 2 .

Appendices A. Proof of Theorem 2 Proof. We prove the necessary and sufficient parts separately. (1) Proof of necessary condition (the only if part). From the definition of NE (Definition 1), if a power set {pm } is an NE, it must satisfy all the best-response conditions in (8) simultaneously. Suppose a situation that all the players’ power except player m’s power reaches    the NE point: { p1 , . . . , pm −1 , pm , pm+1 , . . . , pM }. In this case when all other players’ powers are fixed, as shown in (9), the best-response of player m is to set its power according to (14). This is exactly given by the single-player waterfilling treating all other players’ signals as noise. (2) Proof of sufficient condition (the if part). From convex optimization theory [5], we know that the KKT conditions of the convex optimization problem are necessary and sufficient conditions for optimality. Therefore, we can say that a power strategy pm satisfies the best-response condition if and only if it satisfies the single-player KKT conditions (11)–(13). Then collectively, we say a set {pm } satisfies all the best-response conditions simultaneously if and only if it satisfies (16)–(18). From Definition 1, if a set {pm } satisfies all the best-response conditions, it must be an NE. This completes the proof.

B. Proof of Lemma 1 Proof. Consider an NE p ∈ RKN ×1 . Theorem 2 yields the following equation:  

φ p + ν − λ = 0, where ⎡

6. Conclusions and Future Works In this paper, we study the power allocation problem in the wireless small-cell networks as a strategic noncooperative game. Each transmitter (AP) is modeled as a player in the game who decides, in a distributed way, how to allocate its total power through several independent fading channels. We studied the existence and uniqueness of NE. Under the condition of independent continuous fading channels, we showed that the probability of having a unique equilibrium is equal to 1. The game at hand is shown to be a potential game. A distributed algorithm requiring very limited feedback has been proposed based on the potential game analysis. The convergence and stability issues have been addressed. Numerical studies have shown that the DPIWF algorithm can converge rapidly within 5 iterations with very high probability.

(B.1)

⎤ g1,1 + j p j,1 g j,1 ⎥ ⎥ 

⎢ ⎢ ⎢ ⎢ g1,2 ⎢ ⎢ 2  ⎢ σ + j p j,1 g j,1   ⎢ φ p =⎢ ⎢ ⎢ .. ⎢ . ⎢ ⎢ ⎢ g K,N ⎣ 

σ2

σ2 + ⎡

j

ν1,1

p j,N g j,N



⎥ ⎢ ⎥ ⎢ ⎢ ν1,2 ⎥ ⎥ ⎢ ⎢ ν=⎢ . ⎥ ⎥ ⎢ . ⎥ ⎢ . ⎥ ⎦ ⎣

νK,N

,

KN ×1

⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ KN ×1

,

EURASIP Journal on Wireless Communications and Networking ⎡



(λ1 )N ×1

⎢ ⎥ ⎢ (λ ) ⎥ ⎢ 2 N ×1 ⎥ ⎢ ⎥ ⎥ λ=⎢ .. ⎢ ⎥ ⎢ ⎥ . ⎣ ⎦

(λK )N ×1

11

From the previous expressions, it is easy to see that (B.3) holds if and only if we have αT β = 0 and αT γ = 0. These conditions are equivalent to the following:

.

K  KN ×1

k=1

(B.2) Now, let us assume that there exist two different Nash equilibria, for example, p0 , p1 (p0 = / p1 ). Then, the following equation must also hold: ⎛ 

1

p −p

  0 T 0 !"

p −p



⎜  0 ⎟ ⎜ p ν0 − λ0 ⎟ ⎟ ⎜  + ⎟ = 0. 1⎟ #⎜ p1 ν 1 − λ ⎝φ !" ⎠ !" # #

 φ 1 T⎜

αT

(B.3)

γ

β

0 gk,n pk,n −

K 

1 gk,n pk,n = 0,

∀n,

(B.5)

k=1

0 1 1 0 pk,n νk,n = pk,n νk,n = 0,

∀n ∀k.

First, from (B.5), we observe that the value of sn , with sn = 

k gk,n pk,n , is fixed for any NE point. Second, for a specific positive power coefficient, for example, pk0∗ ,n∗ > 0, we must have ν0k∗ ,n∗ = 0 due to (13). Therefore, from (25) we must also have ν1k∗ ,n∗ = 0. This implies λ1k∗ = λ0k∗ because of (11). Finally, since sn is fixed for any NE point, we obtain ν0k∗ ,n = ν1k∗ ,n , for all n. The same proof holds for any other index k∗ .

Equation (B.3) implies that 

T 





T 

αT β = p1 − p0 φ p0 + p0 − p1 φ p1 =

K N   n=1k=1

⎡ ' ( ⎣ p1 − p0 k,n k,n

C. Proof of Lemma 2



Proof. When νm,n = 0, from (11) we have

gk,n

σ2

0 j =1 p j,n g j,n

+

'

0 1 + pk,n − pk,n

λm − gm,n dn = 0,

K



(

gk,n

σ2 +

K

j =1

p1j,n g j,n



' (  ' ( K 0 0 1 1 K g N   k,n pk,n − pk,n j =1 g j,n p j,n − p j,n ' (' ( = K K 0 1 n=1k=1

=

σ2 +



N 

'

n=1

σ2 +



αT γ = p1 − p0 =

j =1

K ' N   n=1k=1

K

K j =1 g j,n

j =1

σ2 +

p j,n g j,n '

p0j,n g j,n

T 



p0j,n − p1j,n

('

σ2 +

j =1



0 1 pk,n − pk,n

'

ν0k,n − λ0k

0 1 + pk,n − pk,n

('

p j,n g j,n

(2

K

ν0 − λ0 + p0 − p1 ('

j =1

T 

p1j,n g j,n

ν1 − λ1

( ≥ 0,



(

)

⎥ ⎢⎛ ⎞ N N ' (⎥  ⎥ ⎢  0 0 1 1 ⎢⎝ p − pk,n ⎠ λk − λk ⎥ = ⎥ ⎢ k,n ⎥ n=1 k=1⎢ ⎦ ⎣ n=1 !" # K ⎢ 

 column Z −→

K ' N   n=1k=1

=

K ' N   n=1k=1

0 1 1 0 pk,n νk,n + pk,n νk,n

Iτ Bξ1 ×τ

) row

−→

P k −P k =0

+

where dn  1/(σ 2 + sn ). From Lemma 1, we know that all the Nash equilibria must satisfy (C.1), with the same λm and dn . In (C.1), the number of independent linear equations is |X|,  since while the number of unknown parameters is M + N, the remaining dn , n ∈ / N are known to be dn = 1/σ 2 . It is well known that the set of solutions to a system of linear equations is empty, if the number of independent equations is larger than the number of variables [32]. Since each random entry gm,n is independently distributed with continuous distribution function, it is obvious that, with probability 1, the equations of the system (C.1) are independent from each  other. Therefore, we must have |X| ≤ M + N.

 Proof. We only give the proof for the case as M N > M + N. The case as M N ≤ M + N can be proved in a similar way.  can be transformed into a 2 × 2 block matrices, Matrix Z by applying some elementary column and row operations, as follows:





(C.1)

D. Proof of Lemma 3

(

ν1k,n − λ1k

∀(m, n) ∈ X,

(

Iτ 0ξ1 ×τ

Aτ ×ξ2 Cξ1 ×ξ2

*

)

column

−→

*

Iτ Bξ1 ×τ

0τ ×ξ2  ξ1 ×ξ2 C

*

(D.1)

0τ ×ξ2  ξ1 ×ξ2 , C

where τ = min{M, N }, ξ1 = M + N − τ ≥ τ, and ξ2 =  is a ξ1 × ξ2 matrix, where each column contains |X| − τ. C

(

0 1 1 0 pk,n νk,n + pk,n νk,n ≥ 0.

(B.4)

one or two random variables, and each row contains at  in least one random variable. Again we can transform C  r row echelon form, denoted as Cr . Note that the rank of C is ξ2 with probability 1, since each leading coefficient of a row is a random variable or the linear combination of two

12

EURASIP Journal on Wireless Communications and Networking

i.i.d. random variables. So, with probability 0, any leading  = coefficient takes the value of 0. Therefore, we have rank(Z) τ + ξ2 = |X| with probability 1.

[4]

E. Proof of Theorem 3

[5]

 we have from Lemma 2 that, with Proof. If M N > M + N,  = |X|. Any NE must satisfy (26); probability 1, rank(Z) assume that two different power strategies p and p are both  − p ) = 0. Since the rank of Z  is solutions to (26). Then Z(p equal to the number of its columns, the rank-nullity theorem [32] implies p − p = 0. Then, if the NE exists it is unique.  we have from Lemma 3 that, with If M N ≤ M + N, probability 1, there is at most one solution to (25). Since any NE must satisfy (25) and we know that there is at least one NE solution, we conclude that NE is unique.

F. Proof of Theorem 4

[6] [7]

[8] [9]

[10]

Proof. We prove this theorem in two steps. (1) Algorithm convergence. It is easy to see that the potential function v (P) is nondecreasing within each round of the single-player waterfilling. Moreover, since each player’s transmit power is limited by a maximum but finite power constraint, there must exist an upper-bound for the potential function v (P). This confirms the convergence. (2) Converge to NE. From the discussions above, we directly have that the KKT condition of the potential game coincide with the KKT condition of the original OFDM game G, due to the property of potential function (27). By using the sufficient part of Theorem 2, we know that if each player’s power allocation pm is given by the single-player waterfilling while treating other players’s signals as noise, the set {pm } must be an NE of the original game G. Therefore, we can conclude that if the algorithm DPIWF converges (through the process of iterating single-player waterfilling), it converges to an NE point.

[11]

[12] [13]

[14]

[15]

[16]

[17]

This completes the proof.

Acknowledgment This paper was supported by the French research agency ANR by the Project ANR-09-VERS0: ECOSCELLS.

References [1] M. Debbah, “Mobile flexible networks: the challenges ahead,” in Proceedings of International Conference on Advanced Technologies for Communications (ATC ’08), pp. 3–7, Hanoi, Vietnam, October 2008, invited paper. [2] http://iosc-workshop.homeip.net/. [3] S. Kandula, D. Katabi, S. Sinha, and A. Berger, “Dynamic load balancing without packet reordering,” ACM Journal of

[18]

[19]

[20]

[21]

Computer and Communication Review, vol. 37, no. 2, pp. 51– 62, 2007. C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, Cambridge, UK, 2004. T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons, New York, NY, USA, 1991. A. J. Goldsmith and P. P. Varaiya, “Capacity of fading channels with channel side information,” IEEE Transactions on Information Theory, vol. 43, no. 6, pp. 1986–1992, 1997. D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, Cambridge, UK, 2005. E. Altman, K. Avrachenkov, and A. Garnaev, “Closed form solutions for symmetric water filling games,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM ’08), pp. 673–681, Phoenix, Ariz, USA, April 2008. K. B. Song, S. T. Chung, G. Ginis, and J. M. Cioffi, “Dynamic spectrum management for next-generation DSL systems,” IEEE Communications Magazine, vol. 40, no. 10, pp. 101–109, 2002. J. Papandriopoulos and J. S. Evans, “Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks,” in Proceedings of the IEEE International Conference on Communications (ICC ’06), pp. 3270–3275, July 2006. D. Fudenberg and J. Tirole, Game Theory, MIT Press, Cambridge, Mass, USA, 1991. S. Lasaulce, M. Debbah, and E. Altman, “Methodologies for analyzing equilibria in wireless games: a look at pure, mixed, and correlated equilibria,” IEEE Signal Processing Magazine, vol. 26, no. 5, pp. 41–52, 2009. G. Scutari, S. Barbarossa, and D. P. Palomar, “Potential games: a framework for vector power control problems with coupled constraints,” in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’06), pp. 241– 244, Toulouse, France, May 2006. Z.-Q. Luo and J.-S. Pang, “Analysis of iterative waterfilling algorithm for multiuser power control in digital subscriber lines,” EURASIP Journal on Applied Signal Processing, vol. 2006, Article ID 24012, 10 pages, 2006. W. Yu, G. Ginis, and J. M. Cioffi, “Distributed multiuser power control for digital subscriber lines,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 5, pp. 1105–1115, 2002. R. H. Gohary, Y. Huang, Z.-Q. Luo, and J.-S. Pang, “A generalized iterative water-filling algorithm for distributed power control in the presence of a Jammer,” IEEE Transactions on Signal Processing, vol. 57, no. 7, pp. 2660–2674, 2009. G. Scutari, D. P. Palomar, and S. Barbarossa, “Asynchronous iIterative water-filling for Gaussian frequency-selective interference channels,” IEEE Transactions on Information Theory, vol. 54, no. 7, pp. 2868–2878, 2008. G. Scutari and D. P. Palomar, “MIMO cognitive radio: a game theoretical approach,” IEEE Transactions on Signal Processing, vol. 58, no. 2, pp. 761–780, 2010. G. He, M. Debbah, and E. Altman, “A Bayesian gametheoretic approach for distributed resource allocation in fading multiple access channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 391684, 10 pages, 2010. N. John, “Equilibrium points in N-person games,” Proceedings of the National Academy of Sciences, vol. 36, no. 1, pp. 48–49, 1950.

EURASIP Journal on Wireless Communications and Networking [22] J. B. Rosen, “Existence and uniqueness of equilibrium points for concave N-person games,” Econometrica, vol. 33, pp. 520– 534, 1965. [23] G. Scutari, D. P. Palomar, and S. Barbarossa, “Simultaneous iterative water-filling for Gaussian frequency-selective interference channels,” in Proceedings of IEEE International Symposium on Information Theory (ISIT ’06), pp. 600–604, July 2006. [24] R. W. Rosenthal, “A class of games possessing pure-strategy Nash equilibria,” International Journal of Game Theory, vol. 2, no. 1, pp. 65–67, 1973. [25] D. Monderer and L. S. Shapley, “Potential games,” Games and Economic Behavior, vol. 14, no. 1, pp. 124–143, 1996. [26] J. O. Neel, J. H. Reed, and R. P. Gilles, “Convergence of cognitive radio networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC ’04), vol. 4, pp. 2250–2255, Atlanta, Ga, USA, March 2004. [27] T. Heikkinen, “A potential game approach to distributed power control and scheduling,” Computer Networks, vol. 50, no. 13, pp. 2295–2311, 2006. [28] W. Yu, Competition and cooperation in multi-user communication environements, Ph.D. thesis, Stanford University, June 2002, http://www.comm.utoronto.ca/∼weiyu/thesis 2.pdf. [29] J. Neel, Analysis and design of cognitive radio networks and distributed radio resource management algorithms, PhD dissertation, September 2006, http://scholar.lib.vt.edu/theses/ available/etd-12082006-141855/. [30] P. Dubey, O. Haimanko, and A. Zapechelnyuk, “Strategic complements and substitutes, and potential games,” Games and Economic Behavior, vol. 54, no. 1, pp. 77–94, 2006. [31] M. Chiang, “Geometric programming for communication systems,” Foundations and Trends in Communications and Information Theory, vol. 2, no. 1-2, pp. 1–153, 2005. [32] C. D. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, Philadelphia, Pa, USA, 2000.

13

Suggest Documents