Optimal Sensing Time Strategy Under Primary Outage Constraint in

Chinese Journal of Electronics
Vol.25, No.5, Sept. 2016
Optimal Sensing Time Strategy Under Primary
Outage Constraint in Cognitive Radio Networks∗
LIU Xinyi1,2 , LI Jiandong2 and JIANG Jian2,3
(1. School of Information Engineering, Chaug’an University, Xi’an 710071, China)
(2. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China)
(3. China Academy of Telecommunication Research of MIIT, Beijing 100191, China)
Abstract — With the underlay approach, Secondary
users (SUs) can utilize the same frequency bands simultaneously with Primary users (PUs) in Cognitive radio
networks (CRNs). How to choose the appropriate transmission power of SUs under the influence caused by other
cells is a problem. To solve this problem, spectrum sensing
is introduced to identify the existence of interference which
using pilot signal to perform coherent processing. Consider
the probability of detection of SUs, there exists a trade-off
between the sensing time and the achievable throughput
of CRNs. When the prior probability of other cells’ activity is unknown to SUs, throughput of the CRNs can be
viewed as a concave function. According to solving the optimization problem, the optimal sensing time is obtained.
Simulation results show the feasibility and correctness.
Key words — CRNs, Underlay approach, Inter-cell interference, Sensing-throughput tradeoff.
I. Introduction
Cognitive radio attracts much attention due to the advantage in improving the spectrum usage efficiency[1−3] .
To ensure the Quality of service (QoS) of PUs, interference received at PUs must be controlled with certain qualifications. In CRNs, diminishing the interference introduced by spectrum sensing is a hot topic which is very important. Critical interference is caused by the poor sensing
performance.
SUs need to scan and detect the usage condition of
spectrum periodically. There are many spectrum sensing
methods, such as energy detection, matched filter, cyclostationary feature detection, etc. Energy detection is easy
to implement and has been commonly used[4] . But sensing
with energy detection does not work well when the Signalto-interference-plus-noise ratio (SINR) of received signal
is very low. Similarly, energy detection cannot be used
to distinguish the specific signal from the complex environment. If the prior information of the objective signal
is known, the pilot sensing will have better performance
which is referred to Refs.[5,6].
The interference should be limited under a threshold
to guarantee the PUs’ performance. Ref.[7] represents the
interference problem through controlling the miss detection probability in the overlay model. The probability of
the false decision when PUs are using the spectrum will
generate extra collision to effect the PUs’ transmission.
Underlay technique is also used widely in CRNs. The authors of Ref.[8] proposed the outage constraint model to
maximize the throughput of SUs with underlay approach
in the CRNs. In Ref.[9], the authors proposed an auctionbased power allocation framework for spread spectrum
users to share spectrum with an interference temperature sensed at a measurement point, whereas a central
manager needs to collect bids from distributed users. The
authors of Ref.[10], formulated a power allocation game
considering both the interference temperature constraint
at the PUs and the QoS requirement at the SUs. These
previous works do not focus on the transmission of SUs
when there exists other interference source with underlay
approach. To justify the transmission power, SUs have to
acquire the interference information through sensing.
In this paper we focus on the scheme that SUs and
interference source effect the PUs commonly. SUs need to
sense the activity of interference source to change their
transmission power.
II. System Model and Pilot-Energy
Sensing
∗ Manuscript Received July 4, 2014; Accepted Oct. 30, 2014. This work is supported by the Fundamental Research Funds for the
Central Universities (No.310824161008), the National Natural Science Foundation of China (No.61231008, No.61101143), the Program for
Changjiang Scholars and Innovative Research Team in University (No.IRT0852), and the 111 Project (No.B08038).
c 2016 Chinese Institute of Electronics. DOI:10.1049/cje.2016.08.023
908
Chinese Journal of Electronics
We consider that the primary network is a macro-cell
which consist of a Primary transmitter (PU-T) and a Primary receiver (PU-R), as shown in Fig.1. In the CRN,
secondary users’ Transmitters (SU-Ts) send data packet
to secondary users’ Receivers (SU-Rs) using underlay approach which allows SUs occupy the same spectrum with
PUs. SU-Ts will cause interference to primary network by
this approach. Users in other cells will also causes interference by occupying the same spectrum with probability. In
order to ensure the transmission of PUs, the interference
received at PU-R must be controlled under a threshold.
Consider the simplest sense, we set only one active SU
pair and one interference source transmitter (I-T). We
also assume that the information about the pilot signal of
I-T is known at SU-T.
Fig. 1. The system model of the CRN with interference source
To maximize throughput of the CRN, SU-T must adjust the transmit power according the activity of I-T. SUs
should sense whether I-T is using the spectrum. If SUs
have no data to broadcast sometimes, they can be used
to sense spectrum without causing interference. The SUs
at this state are called inactive SUs[11] . We set N SUs to
sense cooperatively, which consist of one active SU pair
and N − 1 inactive SU pairs. The signal received at SU-Ts
contain the primary signal and the interference signal. So
the energy detection is not applicable at this case. The
signal of I-T should be isolated that we need to use pilot
signal to perform coherent processing[12]. Consider the M
as the number of samples at each SU-T, which equals the
product of the sensing time τ and the sampling frequency
f.
Let Yn = [[Yn [0], Yn [1], · · · , Yn [M − 1]]T . The two hypothesis results of n-th SU-T can be represented by:
H0 :Yn [m] = Zn [m],
m = 0, 1, 2, · · · , M − 1
H1 :Yn [m] = gn Xnp [m] + Zn [m], m = 0, 1, 2, · · · , M − 1
(1)
where Xnp [m] denotes the known pilot data with variance
σx2 which modulated by complex PSK, Zn [m] is circularly
symmetric complex Gaussian noise with mean 0 and variance σ 2 , gn means the uncorrelated circularly symmetric complex Gaussian gain coefficient with zero-mean and
unit variance. After processed the pilot signal by using
the energy detector, each SU-T sums the sensing results
2016
M−1
which equal Xn (Yn ) = (1/M ) m=0 |Yn [m]|2 . In the reporting phase, each SU sends the data to the fusion center through control channel. In a time slot only one SU-T
should send its local decision. Since the number of the cooperative SUs is not great, the reporting phase is far less
than the sensing period. The report overhead and interference of adjacent-channel signals can be ignored. After all
the test statistics are collected, the fusion center makes
the final decision by comparing the global test statistic
N −1
X = (1/N ) n=0 |Xn (Yn )|2 to the global threshold φs .
If X < φs , H0 is considered as true; otherwise, we think
the interference signal exists.
Since the number of sensing samples is enormous
enough to fit the central limit theorem, we can obtain
the probability of false alarmPF and the probability of
detectionPD , respectively.
φs
−
1
N
τ
f
(2)
PF (τ ) = Q
σ2
γs
φs
Nτf
−1
(3)
−
PD (τ ) = Q
σ2
N
1 + (2γs /N )
N −1
where γs = n=0 |gn |2 σx2 /σ 2 denotes the average SINR.
Q(·) denotes the right tail probability of the normalised
Gaussian distribution. After substituting Eq.(2) into
Eq.(3), the probability of detection is obtained with the
given probability of false alarm PF :
τf
1
Q−1 (PF ) − γs
(4)
PD (τ ) = Q N
1 + 2γs /N
III. Outage Constraint with Unknown
Prior Probability
It will arouse additional interference to the PU when
the active SU-T sends package with underlay approach.
Consider the influence caused by other cells, and the interference received at primary receivers, which consisting of
the cognitive interference and the inter-cell interference,
should be limited under the primary outage constraint.
To ensure a normal operation of the transmission of the
PU, the influence caused by interference should be controlled under the special level. We need to constraint the
probability that the SINR received at PU-R, represented
by γr , is lower than its desired SINR γth . It should stay
below a certain threshold φ, which can be represented by:
Pro (γr < γth ) ≤ φ
(5)
Pro(·) means the probability of a random event. Consider the channel between PU-R and other devices is frequency selective channel, which gain can be denoted by
G = αd−β , with d is the distance, β is the loss exponent, α denotes the Rayleigh distributed fading ampli-
Optimal Sensing Time Strategy Under Primary Outage Constraint in Cognitive Radio Networks
tude which follows the independent exponential distribution with mean of 1. Then Eq.(5) becomes:
Pp Gp
Pro
< γth ≤ φ
(6)
N0 + PI GI + Pc Gc
where Pp ,PI ,Pc denote the transmit powers of PU-T, I-T
and SU-T, Gp ,GI ,Gc express the channel gains from PU-R
to PU-T, I-T and SU-T, N0 is the white Gaussian noise
power received at PU-R. As mentioned in Ref.[13], the
outage probability of PU-R can be denoted by:
Pro [γ < γth ] = 1 − b0 [(1 + bc Pc )−1 (1 + bi Pi )−1 ] ≤ φ
Gc γth
Gi γth
γth N0
(7)
, bi =
, b0 = exp(
)
bc =
Pp Gp
Pp Gp
Pp Gp
The PU-R has different outage probabilities based on
the activity of I-T when SU-T transmits with a constant
power. When the transmit power of SU-T makes the outage probability of PU satisfy the limit with the active I-T,
it will have comfortable margin to the outage probability
limit with the inactive I-T. It is necessary to spend time
on sensing the activity of I-T for effectiveness. Using Pc0
and Pc1 to describe the transmit powers of SU-T when I-T
are active and inactive, respectively. Obviously, Pc0 > Pc1 .
After taking the prior probability of I-T’s activity and the
sensing performance into account, Eq.(7) can be changed
to Eq.(8).
b0
)
(1 + bi Pi )(1 + bc Pc1 )
b0
)]
+Pro(H0 |H1 )(1 −
(1 + bi Pi )(1 + bc Pc0 )
b0
)
+Pro(H0 )[Pro(H0 |H0 )(1 −
(1 + bc Pc0 )
b0
+Pro(H1 |H0 )(1 −
)] ≤ φ
(1 + bc Pc1 )
Pro(H1 )[Pro(H1 |H1 )(1 −
(8)
Pro(H1 ) and Pro(H0 ) denote the prior probability of
active I-T and inactive I-T, respectively. Since the prior
probability changes over time, it is unknown to the SUs.
To maintain the QoS of the PU, the transmit power of
SU-T must fit PU’s outage probability goal prior whatever prior probability is known to the SUs. The restraint
condition Eq.(8) can be split into two after removing the
element of prior probability:
b0
Pro(H0 |H0 ) 1 −
(1 + bc Pc0 )
b0
≤φ
(9)
+Pro(H1 |H0 ) 1 −
(1 + bc Pc1 )
Pro(H1 |H1 ) 1 −
b0
(1 + bi Pi )(1 + bc Pc1 )
b0
≤ φ (10)
+Pro(H0 |H1 ) 1 −
(1 + bi Pi )(1 + bc Pc0 )
909
It is easy to find the suited Pc0 and Pc1 with perfect
sensing results: Pro(H1 |H0 ) = 0, Pro(H0 |H1 ) = 0. Because the active SU-T has to control the transmit power
due to its interference, the accuracy of sensing affects
the transmitting rate of the SU-T. Eq.(9) shows affection
of the probability of false alarm to the outage probability. When false alarm happens, the SU-T makes a wrong
judgement that I-T is sending data. So it transmits with
power Pc1 which is lower than Pc0 . In this case, the inaccuracy of sensing leads a decreased performance, but not
extra interference for the PU. Pc0 can be set as a fixed
value which not only fit the Eq.(8) at any time but also
achieve a high transmitting rate. Apparently, we get
Pc0 =
b0 /(1 − φ) − 1
bc
(11)
Eq.(10) shows the restraint condition under the influence of probability of miss detection. SU-T will transmit
with power Pc0 based on the incorrect sensing result when
I-T is sending data. PU’s outage probability may exceed
the limit because of the extra interference. SU-T need
to decrease the transmit power to fit the requirement of
CRN. Since the length of time slot T is fixed, the longer
sensing time means the transmission period will be deduced. To maximize the throughput of SU, the optimisation problem can be expressed as:
T −τ
log(1+ν ∗ Pc1 )
C(τ, Pc1 ) = Tt (τ )R(Pc1 ) =
max
1
τ,Pc
T
b0
s.t. Pro(H1 |H1 ) 1 −
1
(12)
(1+bi Pi )(1+bc Pc ) b0
+ Pro(H0 |H1 ) 1 −
≤ φ,
(1+bi Pi )(1+bc Pc0 )
0≤τ ≤T
ν denotes the SINR of received useful signal at SU-R when
SU-T transmits with unit power. The sensing performance
can be enhanced by increasing the sensing time. As sensing time increase, we can choose a higher Pc1 which satisfies the Eq.(10). There exists a sensing-throughput tradeoff problem which needs to balance the transmission period and transmission power. Obviously, the outage probability increases when Pc1 is selected as a higher value.
While the outage probability equals φ, Pc1 achieves the
maximum value. Using the Eq.(10) and Eq.(11), we can
see that the throughput of the SU pair is a function of
sensing time τ :
max C(τ ) = T (τ )R(τ ) =
τ
T −τ
log(1 + ν ∗ Pc1 )
T
s.t. Pc1 (τ )
(13)
0
1 + b c pc
=
− 1 /bc ,
(1 + bc Pc0 )(1 + bi Pi )(1 − φ) − b0
b0 Pd (τ ) + 1
0≤τ ≤T
Chinese Journal of Electronics
910
To ensure the system is working successfully, the detection probability is set to a value which is larger than
0.5 in practice. We will show the probability is concave
at this case.
Theorem 1 Based on the assumptions of system
model, PD (τ ) is increasing and convex for the range of τ
at PD (τ ) > 0.5.
Proof Since the probability of detection is a Q function and Q(x) = 1 − Q(−x), we have:
τf
1
−1 PD (τ ) = 1 − Q − Q (PF )
γs
N
1 + 2γs /N
(14)
It is increasing when PD (τ ) > 0.5, obviously. According to Eq.(4), differentiating PD (τ ) to τ :
γs f /N −1/2
1
√
PD (τ ) =
τ
exp − 2 2π
1 + 2γs /N
2
τf
−1 − Q (PF )
· γs
2
(15)
N
2016
In this section, we present the simulation results about
the performance of sensing-throughput tradeoff problem
with MATLAB software system. We set the system with
multiple SU pairs, one interference source and one PU
pair with their locations are shown in Fig.2. The desired
probability of false alarm was set to 0.05. The power of the
pilot accounts for 10 percent in transmission power. We
set T = 10ms. The bandwidth of SU is 20MHz. Following
the setting in Ref.[8], φ = 0.1 and γth = 6.
Fig. 2. Interference source and users locations
It implies PD (τ ) is monotonically decreasing with τ
when PD (τ ) > 0.5. So PD (τ ) is increasing and convex for
the range of τ when PD (τ ) > 0.5.
It is clear that PD (τ ) < 0 based on Theorem 1. Since
Pc1 τ can be transformed from PD (τ ) through linear operation, we can drive Pc1 (τ ) is increasing and convex. The
function log(1 + αx), a > 0 is also increasing and convex.
So R(τ ) is increasing and convex.
Theorem 2 There exists an optimal sensing time
which yields the maximum achievable throughput for the
active SU pair.
Proof From Eqs.(13)–(15) we can get the derivative
of C :
1
lim C (τ ) = − ((T − τ )R (τ ) − R(τ )) ≤ 0
τ →T
T
lim C (τ ) = ∞
τ →0
(16)
(17)
Hence, there is a maximum point of C(τ ) within interval (0, T ). The secondary derivative of C(τ ) can be shown
as:
1
C (τ ) = − ((T − τ )R (τ ) − 2R (τ ))
(18)
T
Because R(τ ) is increasing and convex, R (τ ) > 0 and
R (τ ) ≤ 0. It can be derived that C (τ ) ≤ 0. The maximum point of C(τ ) is unique.
The optimal sensing time is a convex problem which
can develop plenty efficient search algorithms such as
Newton’s iteration method to obtain the optimal sensing
time.
IV. Simulation Results
Fig. 3. Throughput of SU against the sensing time with different inactive cooperative SUs
Fig.3 represents the throughput of SU against the
sensing time with different inactive cooperative SUs. The
transmission power of PU and interference is 36dBm and
30dBm, respectively. It is clear the throughput of SU is
a convex function with τ . The optimal sensing time decreases with the increasing of number of cooperative SUs.
At the beginning, the throughput of the SU is increasing
with the longer sensing time. It is because that the probability of detection is increasing which makes SU send
data with a higher power. When probability of detection
is large enough, the benefit of the increasement of sensing time is less than the loss which make the transmission
time short. The more inactive cooperative SUs will bring
the better sensing performance, the throughput of SU will
have a higher value with the same sensing time.
Fig.4 represents throughput of SU against the sensing time with different transmission power of PU-T and
interference. It is clear that the throughput of SU and
the optimal sensing time will decrease when transmission
power of interference increases. At this case, I-T will generate much interference to PU-R. SU need to transmit
Optimal Sensing Time Strategy Under Primary Outage Constraint in Cognitive Radio Networks
with lower power. The higher transmission power of I-T
makes SUs easy to sense. So the optimal sensing time will
decrease. When PU transmits with a lower power, the
throughput of SU will decrease. It is because that interference received at PU-R though the γth is fixed. SU-T
have to transmit with lower power. It also needs much
sensing time to satfiy the outage probability.
[8]
[9]
[10]
[11]
[12]
[13]
Fig. 4. Throughput of SU against the sensing time with different transmission power of PU-T and interference
V. Conclusion
The sensing time against throughput trade-off was optimised using a probabilistic constraint on the channeldependent probability of detection. After we developed
the pilot sensing scheme, the active SU can transmit with
the proper power. Consider the probability of interference source’s activity is unknown, the relationship between throughput of the SU pair and the sensing time is
established. Simulation results show that the maximum
throughput of CRN can be obtained by using the optimal
sensing time.
References
[1] S. Haykin, “Cognitive radio: Brain-empowered wireless communications”, IEEE Journal on Selected Areas in Communications, Vol.23, No.2, pp.201–220, 2005.
[2] A. Ghasemi and E.S. Sousa, “Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs”,
IEEE Communication Magazine, Vol.46, No.4, pp.32–39, 2008.
[3] J.H. Zhao, X. Guan and X.P. Li, “Power allocation based on
genetic simulated annealing algorithm in cognitive radio networks”, Chinese Journal of Electronics, Vol.22, No.1, pp.177–
180, 2013.
[4] Y.C. Liang, Y. Zeng and E.C.Y. Peh, “Sensing-throughput
tradeoff for cognitive radio networks”, IEEE Transactions on
Wireless Communications, Vol.7, No.4, pp.1326–1337, 2008.
[5] H.T. Cheng and W.H. Zhuang, “Simple channel sensing order
in cognitive radio networks”, IEEE Journal on Selected Areas
in Communications, Vol.29, No.4, pp.676–688, 2011.
[6] H. Su and X. Zhang, “Cross-layer based opportunistic MAC
protocols for QoS provisionings over cognitive radio wireless networks”, IEEE Journal on Selected Areas in Communications,
Vol.26, No.1, pp.118–129, 2008.
[7] Q. Zhao, L. Tong and A. Swami, “Decentralized cognitive
mac for opportunistic spectrum access in ad hoc networks: A
911
POMDP framework”, IEEE Journal on Selected Areas in Communications, Vol.25, No.3, pp.589–600, 2007.
Q.C. Zhao, S. Geirhofer and L. Tong, “Opportunistic spectrum
access via periodic channel sensing”, IEEE Transactions on Signal Process, Vol.36, No.2, pp.785–796, 2008.
B. Wang, Z. Feng and P. Zhang, “Prioritized spectrum sensing
scheme based on semi-Markov process”, Proc. of IEEE Vehicular Technology Conference, Yokohama, Japan, pp.1–5, 2012.
X. Li, Q. Zhao and X. Guan, “Optimal cognitive access of
markovian channels under tight collision constraints”, Proc.
of IEEE International Conference on Communications, Cape
Town, South Africa, pp.1–5, 2010.
X.Y. Liu, J. D Li and J. Jiang, “Optimal cooperative sensing order using inactive secondary users in cognitive radio networks”,
Chinese Journal of Electronics, Vol.23, No.2, pp.394–398, 2014.
D. Cabric and A. Tkachenko, “Spectrum sensing measurements
of pilot, energy, and collaborative detection”, Proc. of IEEE
Military Communications Conference, pp.1–7, 2006.
S. Huang and X. Liu, “Decentralized cognitive radio control
based on inference from primary link control information”,
IEEE Journal on Selected Topics Signal Process, Vol.29, No.2,
pp.394–406, 2011.
LIU Xinyi was born in 1986, he received the Ph.D degree at State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China. He received
the B.E. degrees in 2004 in information and
communication engineering. He was a visiting student to the Texas A&M University
from 2010 to 2011. His research interest is
the cooperative sensing policy in cognitive
radio system. (Email: [email protected])
LI Jiandong was born in 1962, he
received the B.E., M.S. and Ph.D. degrees
from Xidian University, Xi’an, China, in
1982, 1985 and 1991 respectively, all in information and communication engineering.
He has been a faculty member of Telecommunications Engineering at Xidian University since 1985, where he is currently a vice
president of Xidian University and director of State Key Laboratory of Integrated
Service Networks. Prof. Li is a senior member of IEEE. He was
a visiting professor to the Department of Electrical and Computer
Engineering at Cornell University from 2002 to 2003. He was a member of Personal communication networks (PCN) specialist group for
China 863 Communication High Technology Program during 1993–
1994 and again 1999-2000. He also served as the General Vice Chair
for COMSOCs Chinacom 2009. He was awarded as Distinguished
Young Researcher and Changjiang Scholar from Ministry of Science
and Technology, China. His major research interests include wireless
communication theory, cognitive radio and signal processing.
JIANG Jian was born in 1986, she
received the Ph.D degree at State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China. She received
the B.E. degrees in 2004 in information and
communication engineering. Her main area
of research includes performance analysis
for the network selection strategy based on
the delay and prediction in heterogeneous
wireless networks.