1. Introduction
Radio frequency spectrum is a precious resource for wireless communication systems. With the rapid development of wireless communication services, there is an increasing demand for spectrum. Existing static spectrum allocations policies have resulted in the low utilization of spectrum[1-4]. The dynamic spectrum access (DSA) policy is proposed as an alternative to efficiently use radio spectrum[5-8]. In DSA, portions of the spectrum are allocated to one or more users, known as primary users (PUs). Spectrum use is not exclusively granted to these users, although they have a higher priority. Other users, referred to as secondary users (SUs), can also access the allocated spectrum, provided the PUs are properly protected. By doing so, the radio spectrum is reused opportunistically, thereby significantly improving the spectrum utilization[5-8].
Cognitive radio (CR) technology is an important means to realize DSA. Users with cognitive functions can sense the spectrum environment using intelligent means. They can automatically search and use available spectrum, thereby realizing authorized spectrum sharing[5-8]. In[9], a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining interference with all primary systems within an acceptable level.
In order to reuse the spectrum, a secondary user must be able to reliably identify a spectrum hole. In the above definition of a spectrum hole, the key factor is the impact of SUs on PUs. For a temporal spectrum hole, the impact refers to the probability when PUs and SUs simultaneously use the same spectrum. This has been referred to as the collision probability[10]. The collision probability ignores the position relationship between SUs and PUs, which is essential for exploiting spatial spectrum opportunities. For a spatial spectrum hole, this impact refers to power which is received by primary receriver from secondary transmitters, referred to as interference [11-13]. It alternately refers to the outage probability of the primary receiver, which is a function of the interference. The interference and the outage probability only reflect the intensity of the interfering signal. They does not reflect the duration of the interference. It also cannot fully reflect the impact of SUs on PUs. In [14], the Bayesian risk function was minimized by selecting the sensing threshold. This was a tradeoff between the risk of collision probability and secondary users losing communication opportunity.This tradeoff exploited both the temporal and spatial spectrum opportunity, and greatly improved the spectrum utilization. However, it lacks a theoretical basis. In [15], a three-region scheme for space-time spectrum sensing and access was designed with one primary transmitter at the center. This includes the black, grey, and white region. However, the authors have not jointly considered the interference and collision probability, as above, which doesn’t fully reflect the impact of SUs on PUs.
In this paper, the average throughput loss percentage (hereafter referred to as throughput loss) of the PUs reflects the impact of SUs on PUs. The throughput loss is a comprehensive indicator, which contains the collision probability and intensity of interference. It unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. Considering the throughput loss improves the spectrum utilization .In addition, the throughput loss is more intuitive, compared to Bayesian risk criteria. In this paper we design networks and channel models. Through theoretical analysis and numerical simulations, it is shown that the throughput loss is a more effective impact indicator than conventional indicators (e.g., collision probability, interference, and Bayesian risk) in terms of spectrum utilization.
The remainder of this paper is organized as follows. In section 2, we propose the spectrum holes definition with throughput loss as an impact indicator. In section 3, we introduce the networks and channel models to verify the definition. In section 4, we derive the optimal scheme of spectrum hole utilization in the models. In section 5, this definition is compared to conventional definitions of spectrum holes. In section 6, the numerical simulations and analysis are presented. In section 7, we conclude this research.
2. Spectrum Holes Definition
The definition of spectrum holes determines how to detect and exploit them. In this definition, the impact of SUs on PUs is a key factor. Conventional definitions of spectrum holes have many shortcomings. In this section, we first define spectrum holes with throughput loss as an impact indicator.
The average throughput loss percentage of PUs indicates the impact of SUs on PUs as
where Tpmax is the maximum average throughput of PUs and Tpave is the average throughput of PUs. This can be predicted through channel models, provided a secondary transmitter (ST) is used.
The proposed definition of a spectrum holes is as follows:
Definition: a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining the throughput loss to all primary users in the specified frequency band within an acceptable level.
Choosing a suitable value for k is important. In a practical system, PUs cannot always work at the maximum average throughput. There is spare throughput against all kinds of interference. We choose a suitable value for k to guarantee QoS of the PUs and make the SUs attain the maximum throughput.
3. Network and Channel Models
3.1 Networks Model
As shown in Fig. 1, we consider a network model consisting of a pair of fixed PUs (including a primary transmitter (PT) and a primary receiver (PR)) and a pair of SUs (including a secondary transmitter (ST) and a secondary receiver (SR)). The SUs opportunistically exploit a spectrum band licensed to the PUs. Assume that the PUs are rate-adaptive digital communication systems, and occupy the spectrum band with a probability q .
Fig. 1.Network model
In Fig. 1, PT is located in the origin of coordinates. The coordinates of PR, ST, and SR are labeled in the respective brackets. The angle between the communication direction from ST to SR and the X-axis is f . The angle between the communication direction from PT to PR and the X-axis is q . r is the distance from PT to ST. rp and rs denote the communication distance of the PUs and SUs, respectively. dps denotes the distance from PT to SR. dsp denotes the distance from ST to PR.
In Fig. 1, the circles with radius dare the protected regions. Any active transmitter cannot be inside this region, to exclude the possibility that the receive signal and interference power reaches infinity. It's worth noting that the protected region of ST is used to exclude the possibility that the sensing receive power reaches infinity.
3.2 Channel Model
Consider a wireless channel model with both large-scale path loss and small-scale fading. Free-space path loss, hPL , models the average power changing with distance. Rayleigh fading hFD is adopted for small-scale variation. The channel model between any Tx-Rx pair can then be written as follows:
where hFD ~ CN(0.1) is a complex circular Gaussian random variable with independent real and imaginary parts with equal variance; and
where A is a constant dependent upon the frequency and transmitter/receiver antenna gain, r is the distance between the Tx-Rx pair, and a is the path loss exponent. Without loss of generality, we normalize A=1 for simplicity and consider a³ 2, which is typical in practical applications.
3.3 Signal and Sensing Models
To sense the primary transmission, ST must perform a hypothesis test between the following two hypotheses: H0 (primary signal absent) and H1 (primary signal present). This test is conducted as follows:
where N is the number of samples, y(i) is the received samples at ST, x(i) CN(0,S2x) is the signal received at ST from PT after path loss and fading, and w(i) is assumed to be a circularly-symmetric complex Gaussian random variable with mean zero and one-sided power spectral density S2w , namely, w(i)CN(0,S2w) . Based on the channel model in (4), Sx2=Pph2PLd where Pp is transmit power of PT. The primary signal x(i) is independent of the noise w(i).
The decision statistic is . The probabilities of miss detection pm=Pr{H0/H1} and false alarm pf=Pr{H1/H0} are [16]:
where g is the signal to noise ratio (SNR) at ST, g=Ppr-aSw-2 in the above channel model, and e is the decision threshold. is the tail probability of the standard normal distribution.
4. Optimization of Spatial-Temporal Spectrum
4.1 Channel States
In DSA, for a temporal spectrum hole, SUs cannot simultaneously operate in the same channel with the PUs. Collision between the SUs and PUs may only occur due to sensing errors. But for a spatial-temporal spectrum hole, we allow for it if the distance from PR is far enough. So, we model the spectrum access process as a four-state process, where state 0 means no user operates in the channel. State 1 means the PUs operate in the channel. State 2 means the SUs operate in the channel. State 3 means both the PUs and the SUs operate in the channel. The channel state set is S {0,1,2,3} . It is assumed that PUs occupy the spectrum band with a probability q and SUs opportunistically occupy it. The probability in every channel state is, respectively:
4.2 Throughput Achieved in Every Channel State
In the system models described above, we assume the bandwidth is 1Hz. As the network model only consists of a pair of PUs and SUs, we replace the throughput with channel capacity [17]. The throughput of the PUs achieved in state1 is
The throughput of the SUs achieved in state2 is
where sw2 is power of the additive white Gaussian noise (AWGN), Pp is the transmission power for the PUs, and Ps is the transmission power for the SUs.
We assume that the SUs and PUs can vary their data rate through a combination of adaptive modulation and coding. This allows the transmitter and receiver to employ the most reliable communication at the highest rate permitted, given the signal-to-interference-plus-noise ratio (SINR).We assume that they use random Gaussian codebooks. As a result, their transmitted signals can be treated as white Gaussian processes. The transmission of other users is treated as Gaussian noise. The maximal rate of users when the secondary user and the primary user share the spectrum can be represented as follows:
The throughput of the SUs achieved in state3 is
The throughput of the PUs achieved in state3 is
4.3 Optimization of Spatial-Temporal Spectrum for Proposed Definition
The average throughput of the SUs is
The average throughput of the PUs is
The maximum average throughput of the PUs is Tpmax=qRp1 .
Maximizing the available spatial-temporal spectrum opportunity using the spectrum holes definition in this paper can be formulized as follows:
where 0 #k 1 is a scaling factor that denotes the maximum average throughput loss ratio that is acceptable for PUs due to interference of the SUs. We first introduce the following proposition to solve this problem:
Proposition1: pf is a decreasing function of pm .
Proof: According to (7) and (8), we can obtain:
So,
Therefore pf is a decreasing function of pm . Proposition 1 is proved.
The objective function in equation (19) is a decreasing function of pf .
We can obtain from the constraint condition (20):
where pm* denotes the optimal miss detection probability. Because pm is a decreasing function of pf , the optimal false alarm probability is:
It is worth noting that kRp1(Rp1-Rp3)-1 > 1 can occur when r is large enough. However, miss detection probability is not greater than 1. In this case, we order pm*=1 and pf*=0 to maximize the SUs throughput.
The maximum average throughput of the SUs is:
5. Comparison of the Proposed and Conventional Definitions
As stated in the introduction, the interference only reflects the intensity of the interfering signal. It does not reflect the duration of the interference signal. So, it cannot fully reflect the impact of SUs on PUs. We only consider the definition based on the collision probability constraint and the Bayesian risk in this section.
5.1 Comparison to the Collision Probability Constraint
We maximize the available spatial-temporal spectrum using the spectrum holes definition as follows [10]:
where is the minimum miss detection probability. The inequality (28) constrains the collision probability between the PUs and the SUs. We easily obtain the optimal false alarm probability to maximize the SUs throughput as follows:
The maximum average throughput of the SUs is:
In this case, the maximum value of k is:
where Rp3min is the minimum value of Rp3 in the case of dsp=max(rp|sinq|,d) . Substituting km into (24), we obtain
Substituting (32) into (26), we obtain the maximum average throughput of the SUs in the case of k=km in the proposed definition:
where is obtained by substituting into (25).
Subtracting (30) from (33), we obtain the following:
It is easy to prove (34) is greater than zero. That is, the definition of spectrum holes based on the throughput loss is more advantageous than the one based on the collision probability constraint in terms of spectrum utilization.
The traditional scheme uses (29), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than that of the traditional scheme. However, the overhead in the proposed scheme is more than the traditional schemes due to the information required to transmit. The additional overhead is limited in small-scale network.
5.2 Comparison to the Bayesian Criteria
Using Bayesian criterion, the optimization objective is defined as a risk function involving the miss detection and false alarm probabilities as follows [14]:
where Ips is the interference power from the PT to the SR, Isp is the interference power from the ST to the PR, and Ls is the signal power received by the SR. Both pm and pf are a function of the detection threshold e. b³ 1 is the penalty parameter to place a higher priority on the PUs link.
The sensing threshold is designed to minimize the risk in the different cases of location information:
and
Substituting (31) and (32) into (36), we obtain
where
We obtain the optimal detection threshold:
Substituting e* into (7) and (8), we obtain pm(e*) and pf(e*) . From (17), we obtain the optimal throughput of the SUs.
The traditional scheme uses (40), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than the traditional scheme. Additionally, the overhead in the proposed scheme is nearly equivalent to the traditional schemes, as both needs to transmit more information.
6. Numerical Simulation and Analysis
Numerical simulations in Fig. 2, Fig. 3, and Fig. 4 were conducted using the conditions described in Table 1.
Table 1.the Parameters and Their Value in the Following Numerical Simulations
Fig. 2.Throughput comparison of SUs
Fig. 3.Throughput comparison of SUs vs. q
Fig. 4.Throughput comparison of SUs vs. N
Fig. 2 shows that the throughput of the SUs for different definitions varies with the distance, r . It is worth noting the selection of the throughput loss percentage of PUs, k . Let the penalty parameter b=1 . We obtain the optimal threshold e* from (40). We then obtain pm(e*) and pf(e*) from (6) and (7). By substituting them into (17) we obtain the throughput of the SUs. At the same time, we calculate the throughput loss percentage k . With r varying from 0.1m to 20m, we select the maximum value of k as the throughput loss percentage. The throughput of the SUs is optimized as described in section4.3, with the maximum value of k . is obtained from (31). The throughput of the SUs is optimized as described in section5.1 using .
Fig. 2 shows that the throughput of the SUs for the proposed definition is greater than that of the definitions in [10] and [14]. As r increases, the advantage of the proposed definition is more obvious compared to other definitions. This is because the definition in [10] is for temporal spectrum holes. However, as r increases, the SNR decreases. The false probability increases to satisfy the relatively small collision probability. As a result, the SUs lose spatial spectrum. When r>10, the throughput sharply decreases. However, for the definition in [14] and the proposed definition, the SUs utilize both temporal and spatial spectrum holes. As r increases, the influence of ST on the PR decreases. We increase the collision probability P3 to utilize more spatial spectrum opportunity. There is obvious improvement in the throughput of the SUs. In [14], the optimization objective is a risk function R , not the throughput of SUs. Therefore, compared with the Bayesian criterion, the throughput of the SUs increases significantly with the proposed definition.
Fig. 3 shows the throughput of SUs for different definitions varies with the probability q . As shown, the throughput of the SUs for all definitions decreases as q increases. This is because the increase in q results in less temporal spectrum holes for SUs to utilize. In this process, the throughput for the proposed definition decreases less than that of the other definitions. This is because, in the case of r=12 , the SUs mainly utilize spatial spectrum holes.
Fig. 4 shows the throughput of SUs for different definitions with various numbers of samples N . It is shown that the throughput of the SUs for all definitions vary as N increases. For the proposed definition, it nearly remains unchanged. For the definition in [10], the throughput increases. However, for the definition in [14], it decreases. This shows that the proposed definition is insensitive to sensing accuracy.
7. Conclusion
In this paper, throughput loss is used to indicate the impact of SUs on PUs. This specifies the definition of spectrum holes, and unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. In a typical cognitive radio system, theoretical analysis and numerical simulations show that, when compared to previous definitions of spectrum holes, the proposed definition significantly improves the spectrum utilization, and is insensitive to sensing accuracy.
References
- Federal Commun. Comm., Spectrum Policy Task Force Report, Washington, DC, ET Docket No. 02-135, Nov. 2002. http://www.fcc.gov/sptf
- M.Islam, C. Koh, S. Oh, X. Qing, Y. Lai, C. Wang, Y.-C. Liang, B. Toh, F. Chin, G. Tan, and W. Toh, "Spectrum survey in Singapore: Occupancy measurements and analysis," in Proc. of 3rd Int. Conf. CROWNCOM, pp. 1-7, May 2008. http://www.pwtc.eee.ntu.edu.sg/News/Documents/Spectrum%20survey%20in%20Singapore_%20Occupancy%20measurements%20and%20analyses.pdf
- D. Datla, A. M. Wyglinski, G. J. Minden, "A spectrum surveying framework for dynamic spectrum access networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4158-4168, Oct. 2009. http://dx.doi.org/10.1109/TVT.2009.2021601
- Y.Xu, A. Anpalagan, Q.Wu, et al., "Decision-theoretic distributed channel selection for opportunistic spectrum access: Strategies, challenges and solutions," IEEE Communications Surveys and Tutorials, to be published. http://dx.doi.org/10.1109/SURV.2013.030713.00189
- J. Mitola, G. Q. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999. http://dx.doi.org/10.1109/98.788210
- J. Mitola, "Cognitive radio-An integrated agent architecture for software-defined radio," Ph.D. dissertation, Roy. Inst. Technol., Stockholm, Sweden, May, 2000. http://web.it.kth.se/-maguire/jmitola/Mitola_Dissertation8_Integrated.pdf
- Y.Xu, J. Wang, Q. Wu, et al, "Opportunistic spectrum access in cognitive radio networks: Global optimization using local interaction games," IEEE Journal of Selected Topics in Signal Processing, vol. 6, no. 2, pp. 180-194, 2012. http://dx.doi.org/10.1109/JSTSP.2011.2176916
- Y.Xu, J. Wang, Q. Wu, et al, "Opportunistic spectrum access in unknown dynamic environment: A game-theoretic stochastic learning solution," IEEE Transactions on Wireless Communications, vol. 11, no. 4, pp. 1380-1391, 2012. http://dx.doi.org/10.1109/TWC.2012.020812.110025
- R. Tandra, M. Mishra, A. Sahai, "What is a spectrum hole and what does it take to recognize one?" Proc. IEEE, vol. 97, no. 5, pp. 824-848, May 2009. http://dx.doi.org/10.1109/JPROC.2009.2015710
- G.Ding, Q.Wu, F.Song, et al, "Joint exploration and exploitation of spatial-temporal spectrum hole for cognitive vehicle radios," in Proc. of IEEE ICSPCC. Conf., pp. 1-4, Sep. 2011. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6061606
- V. Mai, N. Devroye, V. Tarokh, "On the primary exclusive region of cognitive networks," IEEE Transactions on Wireless Communications, vol.8, pp. 3380-3385, 2009. http://dx.doi.org/10.1109/TWC.2009.080454
- Q Wu, G Ding, J Wang, Y Yao, "Spatial-temporal opportunity detection for spectrum heterogeneous cognitive radio networks: Two-dimensional sensing," IEEE Transactions on Wireless Communications, vol. 12, no.2, pp. 516-526, Feb. 2013. http://dx.doi.org/10.1109/TWC.2012.122212.111638
- G Ding, J Wang, Q Wu, F Song, Y Chen, "Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?" IEEE Sensors Journal, 2013. http://dx.doi.org/10.1109/JSEN.2013.2264161
- P. Jia, M. Vu, T. Le-Ngoc. S.-C. Hong, and T. Basar, "Capacity-and Bayesian-based cognitive sensing with location side information," IEEE Journal on Selected Areas in Communications, vol. 29, pp. 276-289, Feb. 2011. http://dx.doi.org/10.1109/JSAC.2011.110202
- Z. Wei, Z. Feng, Q. Zhang, W. Li, "Three regions for space-time spectrum sensing and access in cognitive radio networks," IEEE Global Communications Conference, pp. 1283 - 1288, 2012. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6503290
- Y.-C. Liang, Y. Zeng, ECY Peh, and AT Hoang, "Sensing- Throughput Tradeoff for Cognitive Radio Networks," IEEE Transactions on Wireless Communications, vol. 7, pp. 1326 - 1337, Apr. 2008. http://dx.doi.org/10.1109/TWC.2008.060869
- T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley-Interscience, 1990. http://jpkc2010.nudt.edu.cn/xxlybmjc/jishuwenxian/wenxian/Elements%20%20of%20%20Information.PDF