Improved Spectrum Access Control of. Cognitive Radios based on Primary ARQ Signals
|
|
- Meredith Phoebe Benson
- 5 years ago
- Views:
Transcription
1 Improved Spectrum Access Control of 1 Cognitive Radios based on Primary ARQ Signals Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California felap@ucdavis.edu zding@ucdavis.edu liu@cs.ucdavis.edu Abstract Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilization. In this work, we present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme constitutes a non-trivial generalization of the more traditional Listen-Before-Talk (LBT) strategy that merely listens to and yields to primary transmissions regardless of primary receiver responses. Our new method exploits the bi-directional and interactive nature of most wireless communication links to facilitate better opportunistic secondary access while achieving primary receiver protection. By allowing the secondary users to learn from both primary transmissions and the corresponding receiver confirmations, our approach allows secondary cognitive users to exploit critical information that primary receivers regularly send to their transmitters. We show that, by monitoring both primary transmissions and receiver feedback signals, secondary radio access can improve throughput over the traditional LBT while limiting the probability of collision with primary user signals. 1. INTRODUCTION The topic of opportunistic spectrum access for cognitive radios has recently attracted substantial research interest in wireless research community as a new paradigm for overcoming the dilemma of spectrum overcrowding and underutilization due to static spectrum allocation. As pointed by the FCC (of US) in [1], much of the spectrum suitable for wireless communications has been licensed to primary users. In many applications, sporadic channel access by licensed users leads to underutilization
2 2 of their allocated spectra. By allowing secondary users to opportunistically access the bandwidth allocated to but underutilized by primary users, cognitive radio networks have been championed as an enabling new technology to overcome the current spectrum scarcity caused from the traditional static spectrum allocation. A main challenge of opportunistic spectrum access (OSA) is the need to ensure that cognitive users avoid detrimental disruption to licensed user communications when they are active. To achieve such primary user protection, Listen-Before-Talk (LBT) opportunistic spectrum access scheme has been studied extensively with significant progress both in theory and in practice. For example, LBT strategy is shown to protect incumbent TV users during the second FCC experimentation phase [2] over TV bands. Although conceptually simple, LBT exhibits several drawbacks. First, it only senses primary transmission signals. Thus, to protect potential primary receivers, LBT-based cognitive radios must be designed very conservatively and typically needs a listening sensitivity well below 100dBm. Such extreme sensitivity may leave very little room for cognitive access [3]. Second, many robust primary user (PU) systems can withstand some concurrent interference. This robustness to interference provides room for concurrent SU access without disrupting PU communications. LBT does not allow SU access to fully exploit link robustness offered by error protection in such PU systems. Third, LBT does not provide any information regarding the aggregated effect of multiple cognitive transmitters on the primary receivers; hence making distributed cognitive access protocol difficult. To overcome the aforementioned weaknesses of LBT, we advocate a different strategy that incorporates the intrinsic feedback information in typical two-way PU communication links. More specifically, our principle is to exploit data-link-control (DLC) feedback information in PU systems for cognitive access. Because DLC messages carry important information about the quality of the link between the primary sender and its receiver, they reflect the sum interference effect of secondary user transmissions on the primary receiver. By observing such feedback information, secondary users (SUs) can devise more intelligent decisions with respect to spectrum access. As a generalization of Listen-Before-Talk, we develop a new sensing-and-confirmation OSA control algorithm by allowing secondary users to exploit information sensed from both primary transmissions and receiver responses. In particular, beyond the traditional sensing of primary transmitter, the SU also listens to the primary receiver ARQ signals; i.e., ACK/NAK. The successful decoding of an ACK/NAK packet from PU receiver indicates (with high accuracy) the presence of PU transmission, and thus enhances (or confirms) the detection of primary idle/busy state. It is important to note that opportunistic access is not necessary unlicensed. In fact, secondary users may belong to the same legacy as the primary
3 3 ones. For example, in this work the SU transmitter could be a femto base-station in a 4G network, opportunistically serving its user provided that the macro cell users are protected. We, therefore, advocate that secondary users should be allowed to decode encrypted packets such as DLC feedback packets to increase the average system performance. Opportunities to exploit DLC information exist widely in bidirectional digital communication systems. Examples include the 1-bit closed-loop-power-control (CLPC) information in IS-95, the ACK/NAK feedback-packets in WiFi networks, or the CQI feedback in LTE and HSDPA. Also, most standards include feedback control channel to communicate ACK/NAK feedback packets. In the present work, we focus on the ACK/NAK information that primary receivers (PRxs) send to primary transmitters (PTxs) to indicate whether or not the latest data packet was correctly received. The main scope of this work is to show that exploiting DLC information, specifically, ACK/NAK packets from the PRx, can be beneficial to secondary users to achieve improved channel access and, consequently secondary throughput-performance, while preserving primary protection. The work is not limited to a particular wireless network standard or protocol, but applies to systems that fit the descriptions in Section 3. Our scheme can be viewed as a special case of cooperative sensing in which multiple signal observations are used to better detect the presence of spectrum opportunities. In this special case, we are not using multiple cooperative secondary users. Instead, we exploit multiple sources of information received by the same secondary transmitter. Moreover, integrating the detection information from sensing-and-confirmation (SAC) with past observations as well as prior knowledge of primary user characteristics in terms of idle and busy distribution, we present an effective channel access control algorithm that can optimize the utility of spectrum idle periods of the primary users. Our work will be presented as follows. Section 2 details some of the related works in cognitive networks. In Section 3, we describe in detail the system model that underlies the cognitive sensing and channel access of primary user channels. In Section 4, we define our problem formulation and in Section 5 we develop an optimized spectrum access policy based on dynamic programming with information collection through sensing-and-confirmation (SAC). We present simulation results in section 6 to illustrate the performance of the optimized spectrum access policy. Section 7 summarizes the current work and discusses future research directions. 2. RELATED WORKS Existing works on cognitive radio access are mostly based on LBT and, particularly, on spectrum sensing of primary transmissions. Spectrum sensing may involve energy detection and cyclostationary
4 4 feature detection. These sensing schemes are presented, among others, in [4] and [5] respectively. A survey on spectrum sensing for cognitive radios is given by [6]. Distributed spectrum sensing schemes have been studied in [7] and [8]. A fundamental result of spectrum sensing was given in [9], where the authors described the concept of SNR-walls. To overcome such impairment, cooperative spectrum sensing among multiple nodes has been proposed. Among others, [11] demonstrated that the sensitivity-requirement changes under fading channels for spectrum opportunity detection. Also, [12] presented a multi-band joint detection algorithm for cooperative secondary users to mitigate the effect of possibly degraded channel conditions between the primary transmitter and some of the cognitive radios. The authors of [13], among others, tackled the design of optimum sensing time to maximize secondary users throughput under a primary user protection constraint. Different sensing techniques to help secondary users designers to implement the reliable sensors can be found in [14]. It is important to note that both [11] and [14] stress the need for cooperation among SUs to improve detection reliability. For this reason, we consider a special type of cooperation where each secondary transmitter (STx), instead of sharing its observation with the other SUs, collects observations from both the primary transmitter (PTx) and the primary receiver (PRx). This approach enables improved detection of channel vacancies and also makes it possible to more accurately assess STx s interference effect at the PRx, thereby improving the average secondary throughput performance. Since we assume that PRx feedback transmission time is very short compared to PTx data packet duration, channel usage during PRx feedback exchange does not constitute a significant opportunity for the STx. An information theoretic viewpoint for OSA appeared in [15], [16] and [17]. Secondary user policies to maximize primary channel access time have been studied in [18] and [19]. A generalization of those works for optimal single-su channel access with primary exponential or general idle time distributions is presented in [23]. The authors of [24] used a partially observable Markov decision process (POMDP) framework to devise a distributed MAC protocol for cognitive radios. Closely related to our SAC proposal are the works in [25] and [26]. In [25], the authors used a 1-bit CINR (carrier-to-interference plus noise ratio) feedback to optimize an SU power control strategy, whereas [26] proposed to maximize cognitive user data rate by exploiting the primary closed-looppower-control. Finally, in [27] the authors proposed another POMDP framework for dual sensing to utilize the ACK/NAK feedback that SUs can collect from the primary receiver in order to achieve distributed-collective primary receiver protection. There are a number of works assuming prior knowledge of primary busy-idle time duration at the
5 5 STx e.g, in [20], [21] and [22]. Such information can be obtained at STx by observing the primary channel long-enough and by using historic information. The authors of [28] apply a Markov-decision-process framework for devising an optimal opportunistic channel access policy, subject to limits on primary s performance loss. In [29], the authors allow primary H-ARQ feedback exploitation by secondary users to realize overlay opportunistic communications. 3. SYSTEM MODEL 3.1. Cognitive Overlay atop Random Access Networks DATA PACKETS PU Tx FEEDBACK PU Rx SU Rx SU Rx SU TX SU TX Fig. 1. System model Figure 1 illustrates a typical scenario in our study, where a cognitive radio network is overlaid on top of a primary user network that hosts random transmissions of primary subscribers when needed. As shown, a primary transmitter (PTx) and a primary receiver (PRx) communicate by transmitting packets of variable lengths by randomly access their assigned channel. The PRx responds to the packet transmission by feeding back ACK for success and NAK for failure. Our objective is to allow the overlay of secondary users that include secondary transmitters (STx) and secondary receivers (SRx) such that, when the primary pairs are silent, the STx can activate and transmit data packets to their receivers (SRx). More specifically, we consider the case when the primary system consists of a transmitter (PTx) and a receiver (PRx). They communicate through two logically distinct channels (i.e., through TDD or FDD). Figure 3 illustrates a TDD PU channel access in which the data frame from the PTx is followed by an acknowledgment from the PRx via the reverse link. As shown in Figure 2, in the forward channel (FCH), data packets are sent from the primary transmitter to the primary receiver, whereas the reverse channel (RCH) is a feedback channel where DLC packets are sent from PRx to PTx. The primary transmitter gains channel-access at will (whenever a packet is ready for transmission), following an
6 6 ON/OFF traffic pattern with known Idle/Busy-period distributions. We assume the access time to be slotted and that the secondary time slots have the same duration and timing of the primary ones. We associate the slot t to the time interval: [t t s,(t + 1) t s ) and we denote t s as the slot duration. The objective of the secondary transmitter is to maximize its channel access while maintaining the desired PU collision rate. Fig. 2. Distance model for secondary transmitter and primary pair. In this work, we make the following assumptions: A wireless scenario that includes one pair of primary does and one secondary pair. STx has prior knowledge on the primary busy/idle distribution. Primary traffic statistics does not change in the considered time-scale. The PTx is oblivious to secondary activity such that its channel access policy does not consider secondary activity. The STx always has packets to send. STx is allowed to decrypt the feedback-packets from the PRx. The transmission of the ACK/NAK packets from the PRx are short enough not to constitute a significant opportunity for increasing secondary throughput. Primary and secondary time slot synchronization. The STx cannot sense while transmitting. We assume that the SU only attempts to access PU forward channel and always listens to the PU reverse channel. When the SU correctly decoded a feedback packet, it can be used to enhance its detection of the primary transmitter s ON/OFF activity. For simplicity, we apply the following notations P, P 0, P 1, P 2 : PTx transmission power, PTx signal power at the STx, PRx transmission power,
7 7 and STx transmission power, respectively; d 0, g 0 : distance and channel (fading) gain between the PTx and the STx, respectively; d 1, g 1 : distance and channel (fading) gain between the PRx and the PTx, respectively; d 2, g 2 : distance and channel (fading) gain between the PRx and the STx, respectively; δ: path-loss factor, typically between 2 and 5; N 0 : background noise power at the PRx; N s : the number of samples used for the radiometer detector; γ: the likelihood-ratio test threshold; The secondary transmitter applies a sensing-based detection (e.g. energy detection) characterized by: P F = Pr[false alarm], P M = Pr[missed detection]. Note that, for a target probability of missed detection P M, we can calculate the corresponding false-alarm probability P F, through a Neyman-Pearson test. Specifically for Gaussian noise and approximately Gaussian signals, the probability of false alarm and missed-detection P F and P M can be expressed as follows, [10]: γ N 0 P F = Q (1) 2 N 0 N s γ (P 0 +N 0 ) P M = 1 Q. (2) 2 (P 0 +N 0 ) N s where Q( ) is the standard Gaussian integral function while P 0 = P d δ 0. In our algorithm, given a target value of P M, we can derive the corresponding likelihood ratio test γ and the false alarm probability P F. In our work, we assume imperfect STx reception of primary receiver s feedback characterized by: η = Pr[correctly decoding PRx feedback].
8 8 Note that a value of η = 0 means that the STx has no feedback information from the PRx and that its access strategy degenerates to the LBT strategy Primary Transmission Outage Because the essential objective of secondary user access is to minimize its negative impact on primary data transmission, the primary transmission outage probability must be kept low. To quantify the impact of SU access on PU channel quality, we define probabilities ξ 0 = Pr[PRx outage STx not transmitting] ξ 1 = Pr[PRx outage STx transmitting]. Whenever an outage event occurs at the primary receiver, the PRx sends a NAK packet to the primary transmitter. Note that the error (outage) probability at the PRx is based on the detection SNR threshold γ p. Following the exponential path model and the assumption of Rayleigh fading channel with unit variance, the error probability ξ 0 without STx transmission is: Pd δ 1 ξ 0 = P g 1 2 γ p, N 0 γ p N 0 = 1 exp ; Pd δ 1 Similarly, the outage probability when STx is active is: Pd δ 1 ξ 1 = P g 1 2 P 2 d δ 2 g γ p, 2 2 +N 0 = γ p P 1 d δ 1 P 2d δ 2 exp γ pn 0 ; Pd δ 1 (3) (4) Naturally, ξ 0 ξ 1. We note that both ξ 0 and ξ 1 can be estimated by the STx. In particular, we require the secondary transmitter to be able to decode primary receiver s ARQ packets and estimate the values of ξ 0 and ξ 1 over time Cognitive User Utilization of PU Signals In what follows, we detail the stochastic dynamic programming formulation used to devise the optimal channel access policy applied in this paper. Stochastic dynamic programming deals with
9 9 problems where decisions are made in stages. Dynamic programming captures the trade-offs between the instantaneous outcome and future ones. In this work, the objective of the decision-maker (the STx) is to find an optimal decision-selection policy that maximizes the expected reward (13). Note that we make use of the terms action and decision interchangeably. To devise an optimal action-policy at each stage, we consider a discrete-time dynamic-system for which the result of every decision is not fully predictable, but can be estimated through sensing and through collecting DLC feedback information from the PRx. Since we value more the reward from earlier stages than rewards that can be accrued in the future, we define a discount factor 0 < α < 1 that exponentially discounts the rewards collected in the future (see [31] and [32]). Given a policy, that is a set of actions to be performed at every stage of the algorithm, we define the average future-discounted total reward that the STx accrues as the value function associated to the policy in Eq. (15). In this section, we quantify: The per-stage reward function in Eq. (13). The per-stage action set in Eq. (5). The per-stage observation set in Eqs. (7) and (8). The STx value-function in Eq. (15). The optimal policy of Eq. (16) that maximizes Eq. (15). At time slot t, we let the secondary transmitter take the following three potential actions 0, stay idle, with unit cost c 0 a t = S, sense, with unit cost c S (5) T, transmit, with unit cost c T The implicit assumption is that the STx cannot transmit and sense at the same time. Thus, we define the STx action space as A = {0, S, T}. At the start of each time slot t, the secondary transmitter can decide whether or not to sense primary transmitter s activity. Following the forward channel sensing of primary transmission, regardless of the outcome, our secondary transmitter always listens to the reverse channel to over-hear possible primary receiver s DLC signals addressed to the primary transmitter. Our STx can utilize these signals
10 10 Fig. 3. Sequences of primary states, secondary actions and relative observation sets. for sensing confirmation. The probability η of correctly decode PU-PRx s feedbacks is: P 1 d δ 2 η = P g 2 2 > γ s = exp γ sn 0 N 0 P 1 d δ ; (6) where γ s is the SNR threshold for packet reception at the STx. We note that DLC packets are typically easier to decode than data packets. We let there be an adequate CRC to protect the feedback packet. Hence, if the SU correctly decodes the feedback packet, it is accurate and it confirms with certainty that PU is active in the preceding time slot, thereby allowing the secondary user to adapt its policy. Let denote the event that STx did not decode any feedback packet while denotes the complement event. Failure to decode may indicate an idle PTx or a severely degraded channel between the PRx to the STx. After performing action a t A, the STx will collect an observation O(a t ). Clearly, the observation space is action-dependent. For a = S, the observation space is idle (I) or busy (B) followed by the ACK/NAK decoding result: 2 Ω(S) = {I; B} { ; }. (7) On the other hand, the observation space for a = 0 or a = T is limited to the ACK/NAK decoding result: Ω(T) = Ω(0) = { ; }. (8) Figure 3 shows a possible realization of primary channel states and the relative secondary transmitter actions and corresponding observation spaces. Because we have imperfect sensing, the PTx may be sensed as idle but a feedback ACK/NAK may instead be correctly decoded at the end of the time slot, informing the STx that there was a sensing error on the PTx activity. This allows sensing-and-
11 11 confirmation (SAC) to improve the STx s knowledge on the PTx s activity Partially Observable Markov Model In order to determine an optimized action to take at the STx, we apply a partially observable Markov decision framework to devise an optimal opportunistic spectrum access strategy that achieves primary receiver protection in terms of collision probability while maximizing secondary transmitter s channel access opportunities. In particular, define the true state of the forward channel at t as 0 : PTx = B (busy), s t = 1 : PTx = I (idle). (9) Define S = {0;1}. This binary state s t S is partially observable at the cognitive user through PTx sensing and through PRx feedback decoding. Clearly, if the STx is fully aware of s t, then its access strategy can be optimized accordingly to maximize a user defined utility function. However, both PTx s activity sensing and PRx s feedback decoding are imperfect and prone to errors. For this reason, we define σ t = P[s t = 1 STx observations] (10) as the STx s information state on the PTx state s t based on current O(a t ) and past observations. Observations are collected by the STx to estimate the primary channel state [31]. In order to update σ t, the STx collects the observations up to time t 1 in a vector O <t = [O(a 0 ),O(a 1 ),...,O(a t 1 )]. Our access algorithm depends on the state information estimate σ t. Hence, we must determine how the estimate σ t can be updated, given each new observation before a new action a t+1. We outline the development of this optimized access control based on the partially observable Markov process in the next section. 4. ACCESS CONTROL OPTIMIZATION Let us define D I, D B as two discrete random variables representing the number of slots the FCH has been in the idle or the busy state, respectively. In this work, we assume that the secondary
12 12 transmitter knows the probability distribution of the idle and busy durations: P I (k) = P [D I = k], (11) P B (k) = P [D B = k]. (12) Assuming a stationary PU activity distribution, this knowledge can be acquired either directly from the PU hosts or by monitoring PU activities prior to channel access. Note that we are implicitly considering a time-scale during which the primary Busy/Idle distributions do not change. This assumption is reasonable because traffic patterns do not dramatically change, e.g., in cellular systems traffic patterns are normally assumed to stay constant for periods as long as 1 hour. For estimating the duration of a primary idle or busy period upon deployment, the STx senses the forward channel to detect the first idle to busy transition in primary traffic. This kind of transition is easier to detect than a busy-to-idle transition because, in practice, the start of each packet typically contains a preamble and/or a pilot sequence for receiver synchronization. Such preamble has unique characteristics and can be more easily detected by the cognitive radios to detect the beginning of the first busy period upon their deployment. To optimize STx control, we define a reward function for each stage (slot). Recall the STx information state σ t [0,1] and its action a t A. We specify a reward function as c 0, a t = 0, R(σ t,a t ) = c S, a t = S, (13) r T (1 P NAK ) c T P NAK, a t = T. where the probability of P NAK = (1 σ) ξ 1 is an outage, or collision, probability estimate at the PRx. Note that c 0 is a constant cost associated to the feedback packet overhearing in case of idle action; c S is a constant sensing cost; r T is a constant reward that the STx gets after every successful transmission whereas c T is the penalty of collision with a primary transmission. We define an access control policy as a sequence of functions π = {µ 0,...,µ t,...}, in which µ t (σ t ) is the action taken according to the result in σ t µ t : [0,1] A. (14) Let us define τ 0 (t 0 ) as the first forward channel state transition from busy to idle from time t 0. Given
13 13 a policy π, we define the corresponding value function as: V π (σ,t 0,τ 0 (t 0 )) = E π [ + t=t 0 α t r(σ t,a t ) σ t0 = σ ]. (15) The optimized access control policy π is an admissible policy that maximizes the value function (15) via π = argmax{v π (σ,t s,τ 0 (t s ))}. (16) π 5. DYNAMIC PROGRAMMING FOR OPTIMIZING SPECTRUM ACCESS We now present the details of our dynamic programming formulation for optimizing spectrum access PTx Transition Estimation In order to estimate σ t, the secondary transmitter needs to know the number of time slots in the same busy or idle state. For this reason, if, at time t, the STx believes that the PU channel is in state q {0;1}, it uses the past and current observations to estimate the next PU traffic instant τ 1 q (t) that marks the transition from state q to state 1 q. In order to do so, at every time slot, upon performing an action and collecting corresponding observation, our STx uses a maximum a posterior (MAP) estimator to estimate τ 1 q (t). At time t, after collecting the observation O(a t ) corresponding to the action a t A, the STx estimates the transition epoch from state q {0,1} to state 1 q via τ 1 q (t) = argmax {ln(p[o(a t ),O <t τ 1 q (t) = x])+ln(p[τ 1 q (t) = x)}. (17) x>τ q(t 1) Note that there are two possible outcomes of the MAP estimate τ 1 q (t). I) τ q (t 1) < τ 1 q (t) < t: this MAP outcome suggests that the transition from state q to 1 q happened before t. In this case, if the posterior probability associated with the MAP estimation is above a given threshold, the traffic distribution used to determine when the information state σ t changes from P q (k) = P[D q = k] to P 1 q (k) = P[D 1 q = k]. Moreover, the STx will erase the vector O <t and start a new one associated to τ 1 q (t). II) τ 1 q (t) t: this MAP estimate suggests that the PU channel state will stay in state q at time t; Hence, STx discards the estimate τ 1 q (t). When τ 1 q (t) < t, it is still risky to conclude that a PU state transition took place in order to update the distribution associated to the PU channel state. It is in fact important to take into account the reliability of this MAP estimate by evaluating its corresponding posterior probability σ t.
14 Information State Update Consider that, at time t, the STx performed an action a t and collected O(a t ) and O <t. The STx then will use the current and past observations to determine the next PU traffic transition via the MAP estimator of Eq. (17). Since the MAP estimator is not perfect, the STx would exploit the information state σ t to decide the next action to take. Let us assume that, at the end of time slot t, τ 1 q (t) t. In this case (known as case II), the STx assumes the primary forward channel state did not change. Note that the primary traffic transition estimate τ 1 q (t) is discarded and that the STx will conclude that the FCH is in state q, storing the value of τ q (t 1) in τ q (t). In the dynamic programming implementation, we use the following information state approximation: σ t ρ t = E[s t = 1 O(a t 1 ),τ q (t)], t > 0. (18) Note that, in (18), the information of the vector O <t, contained in σ t (10), is carried over by the transition epoch estimate τ q (t). Upon performing action a t A and collecting observation O(a t ), the STx calculates ρ t+1 using two steps: 1) Determining the posterior probability: β t = P[s t = 1 O(a t ),τ q (t)]. (19) In order to find β t, the STx determines first the probabilities v 1 = P[O(a t ) s t = 1], v 0 = P[O(a t ) s t = 0]. (20) The posterior probability (19) is defined as β t = v 1 ρ t v 1 ρ t +v 0 (1 ρ t ). (21) 2) Calculating the information vector ρ t+1. Let K q be the estimate of the number of time slots the PU channel has been in state q {0;1}. Let D q be a random variable denoting the number of time slots in state q. For computational tractability, we assume that since τ q (t), at most one transition may take place. Hence, the
15 15 probability that s t remains in state q at t+1 is P[D q K q +1 D q K q ] = P[D q K q +1]. (22) P[D q K q ] To update the probability estimate that s t+1 = 1, we need to define this probability: K q [ = p(d q = k) 1 P[D ] 1 q K q k+1]. (23) P[D 1 q K q k] k=1 Hence, the updated information vector is ρ t+1 = P[Dq Kq+1] P[D q K q] β t + (1 β t ). (24) For the sake of simplicity, we will simply denote this update procedure by ρ t+1 = UPDATE(O(a t ),ρ t,t,τ q (t)). (25) 5.3. Value Iteration and Policy Decision Based on dynamic programming, we define V(ρ,t,τ q (t)) as the maximum mean discounted value function that the STx can get at time slot t with ρ t = ρ. Without loss of generality, let the latest PU state transition be to state q. From [30], [31] and [32], we have: V(ρ,t,τ q (t)) = max a {0, T, S} V a(ρ,t,τ q (t)), (26) where V 0 (ρ,t,τ q (t)), V S (ρ,t,τ q (t)), V T (ρ,t,τ q (t)) are the value function associated with actions a t = 0, a t = S, and a t = T, respectively. These value functions are defined by where V 0 (ρ,t,τ q (t)) = R(ρ,a t = 0)+α ω Ω(0) V S (ρ,t,τ q (t)) = R(ρ,a t = S)+α ω Ω(S) V T (ρ,t,τ q (t)) = R(ρ,a t = T)+α ω Ω(T) P [O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); P[O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); P[O(a t ) = ω]v(ρ t+1 (ω),t+1,τ 1 q (t+1)); ρ t+1 (ω) = UPDATE(O(a t ) = ω,ρ t = ρ,t,τ q (t))) Note that R(ρ t,a) is the per-stage reward function associated with the action a; τ q (t+1) is the MAP estimate of the PU traffic transition-epoch at time t+1 to state 1 q,
16 16 6. SIMULATION RESULTS We now present test results of our optimized access policy based on SAC. Our test scenario involves a single pair primary nodes and a single pair secondary nodes. Throughout our tests, we set the path loss δ = 4, to account for surface reflections. Additionally, we set P B (k), P I (k) as uniform in [1,10] and [1, 20], respectively. Performance evaluation is in terms of secondary average channel utilization rate (28), and of collision probability at the primary receiver (27). Since our scheme applies sensing-and-confirmation (SAC), we wish to analyze the effect of each detection outcome on secondary performance. For this reason, we took into consideration a scenario such as the one depicted in Fig. 2, where primary transmitter s activity detection performance depends on the distance between the primary and secondary transmitters d 0 ; whereas the probabilities η of correctly decoding a feedback packet from the primary receiver and ξ 1 of outage in case of concurrent primary-secondary transmissions depend on the distance d 2 between the STx and the PRx. As d 0 increases, the PTx activity detection performance by the STx becomes worse either in terms of false alarm or missed detection; as d 2 increases, the feedback decoding probability decreases together with the collision probability ξ 1 at the primary receiver. The collision probability at the primary receiver, P coll, and the secondary average channel utilization rate, (SACUR), are defined as: P coll = SACUR = N t=0 I(a t = T,f t = NAK), N +1 (27) N t=0 I(a t = T,f t NAK), N +1 (28) where f t {ACK, NAK, } is the primary receiver s feedback at time t; N s is the simulation run time and I( ) is the standard indicator function. Note that the above metric counts the effective percentage of time the STx causes a NAK at the PRx. The parameters η, P M and P F directly affect the belief-vector dynamics through the information-state update procedure summarized in Eq. (25). The performance metrics SACUR and P coll are determined by an optimal action-selection policy derived through Eqs. (16) and (26). In particular, a collision is expected by the action of STx a t = T followed by an NAK reception. In our experiments, the performance estimates are averaged over N = 100 time slots. This value is large enough since, as will be shown in Fig. 4, averaging over larger N does not noticeably change our results.
17 N=500 N= SACUR P coll η Fig. 4. SACUR and P coll as functions of η Impact of η. Before checking the effect of d 0 and d 2 on the secondary pair, we show the impact of different values of η for ξ 1 = 0.99, P F = 0.2 and P M = 0.1. Our goal is to show that the probability of correctly decoding PRx feedbacks plays a fundamental role in SUs performance. We expect that, as the value of η grows to one, the SUs take more advantage of the information on FCH activities, thereby improving their throughput while keeping the collision probability low. We also expect that, for high value of η, the SUs performance will be significantly higher than the case with η = 0. We kept the value of ξ 1 as a constant equal to 0.99 to favor a conservative behavior at the STx. The results are shown in Figure 4. Note that we adjusted the collision cost c T, to keep the collision probability at the primary receiver at a nearly-constant level. For constant P coll, the SACUR is a non-decreasing function of η, as expected. Note that our policy for η = 0 is equivalent to a LBT strategy. From the simulation results, we can see that, as long as the probability of correctly decoding a feedback from the primary receiver is reasonably high, sensing-and-confirmation (SAC) significantly outperforms the basic LBT access not taking into account the receiver feedback. These results validate our motivation that PRx feedbacks give confirmation information about the primary channel state and therefore helps improve opportunistic spectrum access.
18 18 The results are shown for both N = 100 and N = 500. From the simulation comparison, N = 100 is a sufficiently large Impact of d ξ 1 =0.6 ξ 1 =0.7 ξ 1 =0.8 ξ 1 = P coll SACUR d 0 [m] Fig. 5. SACUR and P coll as functions of d 0, where η = 0.2. To inspect the effect of primary transmitter s activity detection on the SACUR, we fixed the parameter η to 0.2 and compiled results in Figure 2 for different values of d 0. In this set of simulations, P M is kept at 0.1 while the false alarm rate P F varies as determined by a Neyman-Pearson energy based test as shown in Eqs. (1), (2). This scenario happens when the PU systems impose a constraint on the missed detection probability for protecting primary communications as the secondary energy detector experiences different P F due to different SNR conditions. Figure 5 shows that SU performance varies in terms of SACUR for different P F values. It can be seen that, for high values of ξ 1, the SACUR dramatically decreases as d 0 increases. This effect is due to the fact that, when the estimation of the collision probability is high while the channel conditions between the STx and the PTx do not guarantee a good P F, the STx policy tends to be more conservative.
19 SACUR P coll d 2 [m] Fig. 6. SACUR and P coll as functions of d 2, where d 0 = 875[m] Impact of d 2 To inspect the effect of the distance d 2 between the PRx and the STx, we allowed the feedback decoding probability η, and the outage probability ξ 1 to be determined by (6), and (4) respectively. We let the detection performance be determined by the distance between the PTx and STx: d 0. We expect that, as d 2 increases, the STx experience more spectrum opportunities increasing its throughput. Figure 6 shows the SACUR and collision rate as functions of the distance d 2. This result confirms that the performance of both PRx and STx depend on their mutual interferences. Smallerd 2 allows STx to more accurately estimate the FCH state but also leads to a stronger interference and consequently higher collision probability. As d 2 increases, the SU throughput increases because its effect on the PRx is less detrimental. This result confirms our hypothesis that secondary users opportunistic access is largely improved by our SAC strategy taking into account the primary receiver reception conditions Algorithm comparison Since our scheme collects past observations to employ a MAP estimator for primary transmitter s traffic transitions forecasting, we compared our channel access algorithm to a pure dual-sensing channel access strategy that can be viewed as a special Cooperative-Listen-Before-Talk. We provide dynamic programming results achieved under two different scenarios: the first assuming
20 MAP GENIE CLBT SACUR P coll η Fig. 7. SACUR and P coll comparison: P F = 0.4, P M = 0.4. perfectly known primary channel state transitions; the second when the dynamic programming is carried over through the help of the MAP estimator of Eq. (17). The purpose of this test is owing to the fact that, when the primary state transition epochs are estimated through the MAP estimator of Eq. (17), the value function resulting from the dynamic programming is not optimal. For the same value of the collision probability, we compared the STx throughput of the three schemes. We expect the MAP-based opportunistic channel access not to be worse than the pure dual-sensing algorithm, where the FCH is accessed only based on the current observations from both the primary receiver and transmitter and not on the observation history. This expectation is confirmed by the results of Figure 7, where CLBT stands for Cooperative-Listen-Before-Talk, Genie is the dynamic programming formulation with perfectly known channel transitions, and MAP is the dynamic programming carried over the help of the MAP estimator. It can be seen that the MAP scheme is always better than pure CLBT. For larger η, the MAP channel access outperforms CLBT by up to 50%, since the channel state transition estimations becomes more reliable as the decoding probability increases. 7. CONCLUSIONS In this paper, we introduced a MAP-based opportunistic spectrum access scheme that intelligently exploits the bi-directional nature of most wireless communication systems. We assumed that the primary system follows an ON/OFF traffic pattern and that the SU is able to sense the PU forward
21 21 channel and to detect PU receiver feedbacks. We demonstrated the advantage of listening to the primary receiver feedback to improve SUs performance in terms of opportunistic channel access rate. Moreover, we established a link between our algorithm and cooperative sensing, where we collect at the same node observations relative to the primary transmitter s activity and primary receiver s reception quality. We showed that, by exploiting historic observations, even sub-optimally through the use of a MAP estimator, our new strategy can outperform the traditional cooperative sensing schemes. 8. ACKNOWLEDGMENTS This material is based upon work supported by the National Science Foundation under Grant CNS REFERENCES [1] Federal communications commission: spectrum policy task force report, Federal Communications Commission ET Docket , Nov [2] Federal communications commission: office of engineering and technology releases TV white space phase II test report, Nov [3] Woyach K., Pyapali P., and Sahai A.: Can we incentivize sensing in a light-handed way?, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, Singapore, Apr pp [4] Digham F.F., Alouini M.S., and Simon M.K., On the energy detection of unknown signals over fading channels, IEEE ICC, May 2003 pp [5] Lunden J., Koivunen V., Huttunen A., and Poor H.V.: Spectrum sensing in cognitive radios based on multiple cyclic frequencies, IEEE CrownCom, USA, Orlando FL, Aug pp [6] Yücek T., and Arslan H.: A survey of spectrum sensing algorithms for cognitive radios, IEEE Comm. surv. and tut., 11, (1), 2009 pp [7] Tsitsiklis J.N.: Decentralized detection, Adv.in Statistical Signal Processing, 2, [8] da Silva C.R.C.M., Choi B., and K. Kim: Distributed spectrum sensing for cognitive radio systems, ITA Workshop, USA, San Diego CA, Feb pp [9] Tandra R., and Sahai A.: Fundamental limits on detection in low SNR under noise uncertainty, IEEE WirelessCom Symp. on Emerging Networks, Technologies and Standards, USA, Hawaii, June 2005, pp [10] Tandra R., Sahai A., SNR Walls for Signal Detection, IEEE Journal of Selected Topics in Signal Processing, 2, (1), 2008, pp [11] Mishra S.M., Sahai A., and Brodersen R.W., Cooperative sensing among cognitive radios, IEEE ICC, Turkey, Istanbul, June 2006 pp [12] Quan Z., Cui S., Sayed A.H., Poor H.V., Optimal multiband joint detection for spectrum sensing in cognitive radios, IEEE Transactions on Signal Processing, 57, (3), 2009 pp [13] Liang Y.C., Zeng Y., Peh E.C.Y., and Hoang A.T., Sensing-Throughput Tradeoff for Cognitive Radio Networks, IEEE Transactions on Wireless Communications, 7, (4), Apr. 2008
22 22 [14] Cabric D., Mishra S.M., and Brodersen R.W.: Implementation Issues in Spectrum Sensing for Cognitive Radios, Asylomar Conf. on Signals, Systems and Computers, USA, Monterey CA, Nov. 2004, pp [15] Devroye N., Mitran P., and Tarokh V.: Achievable rates in cognitive radio channels, IEEE Trans. on Information Theory, 52, (5), May 2006, pp [16] Simeone O., Bar-Ness Y., and Spagnolini U.: Stable throughput of cognitive radios with and without relaying capability, IEEE trans. on Communications, 55, (12), Dec. 2007, pp [17] Devroye N., Mitran P., and Tarokh V.: Cognitive multiple access networks, International Symposium on Information Theory, Australia, Adelaide, SA, Sep pp [18] Huang S., Liu X., and Ding Z.: Opportunistic spectrum access in cognitive radio networks, IEEE INFOCOM, USA, Phoenix AZ, April 2008 pp [19] Huang S., Liu X., and Ding Z.: Optimization of transmission strategies for opportunistic access in cognitive radio networks, UC Davis report, April 2008 [20] Zhao Q., Geirhofer S., Tong L., Sadler B.M.: Optimal Dynamic Spectrum Access via Periodic Channel Sensing, IEEE Conf. on Wir. Comm. and Networking, China, Kowloon, Mar pp [21] Zhao Q., Tong L., and Swami A.: Decentralized Cognitive MAC for Dynamic Spectrum Access, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Baltimore MD, Nov pp [22] Geirhofer S., Tong L., and Sadler B.M.: A measurement-based model for dynamic spectrum access, IEEE MILCOM, USA, Washington DC, Oct. 2006, pp. 1-7 [23] Jung E., and Liu X.: Opportunistic spectrum access in heterogeneous user environments, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Chicago IL, Oct. 2008, pp [24] Zhao Q., Tong L., Swami A., and Chen Y.: Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework, IEEE Journal Selected Areas in Communications, 2007, 25, (3), pp [25] Huang S., Liu X., and Ding Z.: Optimal Sensing-Transmission Structure for Dynamic Spectrum Access, IEEE INFOCOM, Brasil, Rio de Janeiro, Apr., 2009 pp [26] Zhang R., and Liang Y.C.: Exploiting hidden power feedbacks in cognitive radio networks, IEEE Symp. on New Fron. in Dyn. Spect. Access Networks, USA, Chicago IL, Oct. 2008, pp. 1-5 [27] Lapiccirella F.E., Huang S., Liu X., and Ding Z.: Feedback-based access and power control for distributed multiuser cognitive networks, Info. Theo. and Appl. Work., USA, San Diego CA, Feb. 2009, pp [28] Levorato M., Mitra U., and Zorzi M.: Cognitive Interference Management in Retransmission-Based Wireless Networks, Allerton conf. on Comm. Cont. and Comp., USA, Monticello IL, Sep. 2009, pp [29] Levorato M., Mitra U., and Zorzi M.: Cooperation and Coordination in Cognitive Networks with Packet Retransmission, Info. Theo. Work., Italy, Taormina, Oct. 2009, pp [30] Bellman R.: Dynamic programming, (Princeton University Press, 1957) [31] Bertsekas D.P.: Dynamic programming and optimal control, (Athena scientific, 1995) [32] Ross S.: Introduction to Stochastic Dynamic Programming, (Academic press, 1983)
Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009
Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationFULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL
FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)
More informationA Quality of Service aware Spectrum Decision for Cognitive Radio Networks
A Quality of Service aware Spectrum Decision for Cognitive Radio Networks 1 Gagandeep Singh, 2 Kishore V. Krishnan Corresponding author* Kishore V. Krishnan, Assistant Professor (Senior) School of Electronics
More informationCooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationShort Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access
Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California Davis Davis, CA 95616, USA Email: senhua@ece.ucdavis.edu
More informationIMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS
87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)
More informationMaximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users
Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Ahmed El Shafie and Tamer Khattab Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt. Electrical
More informationAchievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying
Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,
More informationDecentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework
Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University
More informationSequential Multi-Channel Access Game in Distributed Cognitive Radio Networks
Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College
More informationCognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels
Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133
More informationOPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS
9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationOverview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space
Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods
More informationEfficient Method of Secondary Users Selection Using Dynamic Priority Scheduling
Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri
More informationImplementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN
More informationSpectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio
5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy
More informationReview of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications
American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0
More informationCooperation and Coordination in Cognitive Networks with Packet Retransmission
Cooperation and Coordination in Cognitive Networks with Packet Retransmission Marco Levorato, Osvaldo Simeone, Urbashi Mitra, Michele Zorzi Dept. of Information Engineering, University of Padova, via Gradenigo
More informationAdaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks
APSIPA ASC Xi an Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks Zhiqiang Wang, Tao Jiang and Daiming Qu Huazhong University of Science and Technology, Wuhan E-mail: Tao.Jiang@ieee.org,
More informationScaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous
More informationSIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB
SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER
More informationCOGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio
Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationCognitive Radio: a (biased) overview
cmurthy@ece.iisc.ernet.in Dept. of ECE, IISc Apr. 10th, 2008 Outline Introduction Definition Features & Classification Some Fun 1 Introduction to Cognitive Radio What is CR? The Cognition Cycle On a Lighter
More informationCooperative Spectrum Sensing in Cognitive Radio
Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive
More informationA Secure Transmission of Cognitive Radio Networks through Markov Chain Model
A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,
More informationEffect of Time Bandwidth Product on Cooperative Communication
Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to
More informationJournal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
More informationPower Allocation with Random Removal Scheme in Cognitive Radio System
, July 6-8, 2011, London, U.K. Power Allocation with Random Removal Scheme in Cognitive Radio System Deepti Kakkar, Arun khosla and Moin Uddin Abstract--Wireless communication services have been increasing
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationPERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR
Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,
More informationCooperative communication with regenerative relays for cognitive radio networks
1 Cooperative communication with regenerative relays for cognitive radio networks Tuan Do and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University
More informationCognitive Ultra Wideband Radio
Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationInternet of Things Cognitive Radio Technologies
Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento
More informationImperfect Monitoring in Multi-agent Opportunistic Channel Access
Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements
More informationEnergy Detection Technique in Cognitive Radio System
International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal
More informationCognitive Radio: Smart Use of Radio Spectrum
Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,
More informationPerformance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing
Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree
More informationPerformance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel
Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel Yamini Verma, Yashwant Dhiwar 2 and Sandeep Mishra 3 Assistant Professor, (ETC Department), PCEM, Bhilai-3,
More informationINTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang
INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China
More informationCooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
More informationPerformance Evaluation of Energy Detector for Cognitive Radio Network
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationTwo-Phase Concurrent Sensing and Transmission Scheme for Full Duplex Cognitive Radio
wo-phase Concurrent Sensing and ransmission Scheme for Full Duplex Cognitive Radio Shree Krishna Sharma, adilo Endeshaw Bogale, Long Bao Le, Symeon Chatzinotas, Xianbin Wang,Björn Ottersten Sn - securityandtrust.lu,
More informationDistributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding
Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding 1 Zaheer Khan, Janne Lehtomäki, Simon Scott, Zhu Han, Marwan Krunz, and Alan Marshall Abstract Channel bonding (CB)
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationContinuous Monitoring Techniques for a Cognitive Radio Based GSM BTS
NCC 2009, January 6-8, IIT Guwahati 204 Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of
More informationA Brief Review of Cognitive Radio and SEAMCAT Software Tool
163 A Brief Review of Cognitive Radio and SEAMCAT Software Tool Amandeep Singh Bhandari 1, Mandeep Singh 2, Sandeep Kaur 3 1 Department of Electronics and Communication, Punjabi university Patiala, India
More informationSecondary Transmission Profile for a Single-band Cognitive Interference Channel
Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu
More informationA new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks
A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,
More informationarxiv: v1 [cs.it] 24 Aug 2010
Cognitive Radio Transmission Strategies for Primary Erasure Channels Ahmed El-Samadony, Mohammed Nafie and Ahmed Sultan Wireless Intelligent Networks Center (WINC) Nile University, Cairo, Egypt Email:
More informationEvaluation of spectrum opportunities in the GSM band
21 European Wireless Conference Evaluation of spectrum opportunities in the GSM band Andrea Carniani #1, Lorenza Giupponi 2, Roberto Verdone #3 # DEIS - University of Bologna, viale Risorgimento, 2 4136,
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationExploiting Interference through Cooperation and Cognition
Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of
More informationarxiv: v1 [cs.ni] 30 Jan 2016
Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng
More informationResource Management in QoS-Aware Wireless Cellular Networks
Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless
More informationData Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks
Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networs D.Teguig ((2, B.Scheers (, and V.Le Nir ( Royal Military Academy Department CISS ( Polytechnic Military School-Algiers-Algeria
More informationDistributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach
2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and
More informationCognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
Cognitive Medium Access: A Protocol for Enhancing Coexistence in Bands Stefan Geirhofer and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 4853 Email: {sg355, lt35}@cornell.edu
More informationPerformance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment
Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,
More informationOFDM Based Spectrum Sensing In Time Varying Channel
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 3, Issue 4(April 2014), PP.50-55 OFDM Based Spectrum Sensing In Time Varying Channel
More informationAmplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes
Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,
More informationPERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY
PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY 1 MOHAMMAD RIAZ AHMED, 1 MD.RUMEN AHMED, 1 MD.RUHUL AMIN ROBIN, 1 MD.ASADUZZAMAN, 2 MD.MAHBUB
More informationOptimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks
Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan, Halim Yanikomeroglu, and John S. Thompson Broadband
More informationCatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University of Rhode
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More informationRandom access on graphs: Capture-or tree evaluation
Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual
More informationCooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach
Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao
More informationSensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels
Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Marov Channels Xin Li, Qianchuan Zhao, Xiaohong Guan Center for Intelligent and Networed System Department of Automation and TNLIST
More informationInterference Model for Cognitive Coexistence in Cellular Systems
Interference Model for Cognitive Coexistence in Cellular Systems Theodoros Kamakaris, Didem Kivanc-Tureli and Uf Tureli Wireless Network Security Center Stevens Institute of Technology Hoboken, NJ, USA
More informationCognitive Radio Techniques for GSM Band
Cognitive Radio Techniques for GSM Band Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of Technology Madras Email: {baiju,davidk}@iitm.ac.in Abstract Cognitive
More informationLearning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer
Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of
More informationTransmitter Power Control For Fixed and Mobile Cognitive Radio Adhoc Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 4, Ver. I (Jul.-Aug. 2017), PP 14-20 www.iosrjournals.org Transmitter Power Control
More informationBayesian Approach for Spectrum Sensing in Cognitive Radio
6th International Conference on Recent Trends in Engineering & Technology (ICRTET - 2018) Bayesian Approach for Spectrum Sensing in Cognitive Radio Mr. Anant R. More 1, Dr. Wankhede Vishal A. 2, Dr. M.S.G.
More informationCognitive Radio network with Dirty Paper Coding for Concurrent access of spectrum by Primary and Secondary users
Research Journal of Engineering Sciences ISSN 2278 9472 Cognitive Radio network with Dirty Paper Coding for Concurrent access of spectrum by Primary and Secondary users Acharya Nashib 1, Adhikari Nanda
More informationSpectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks
Spectrum Sensing Data Transmission Tradeoff in Cognitive Radio Networks Yulong Zou Yu-Dong Yao Electrical Computer Engineering Department Stevens Institute of Technology, Hoboken 73, USA Email: Yulong.Zou,
More informationCooperative Compressed Sensing for Decentralized Networks
Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is
More informationPerformance of OFDM-Based Cognitive Radio
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 4 ǁ April. 2013 ǁ PP.51-57 Performance of OFDM-Based Cognitive Radio Geethu.T.George
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationSPECTRUM resources are scarce and fixed spectrum allocation
Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,
More informationOPPORTUNISTIC spectrum access (OSA), first envisioned
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2053 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Student Member,
More informationLow Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks
Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China
More informationAdaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks
Adaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks Bechir Hamdaoui School of EECS, Oregon State University E-mail: hamdaoui@eecs.oregonstate.edu Abstract Studies showed that
More informationFuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing
Open Access Journal Journal of Sustainable Research in Engineering Vol. 3 (2) 2016, 47-52 Journal homepage: http://sri.jkuat.ac.ke/ojs/index.php/sri Fuzzy Logic Based Smart User Selection for Spectrum
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationBeamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks
1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationDYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO
DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO Ms.Sakthi Mahaalaxmi.M UG Scholar, Department of Information Technology, Ms.Sabitha Jenifer.A UG Scholar, Department of Information Technology,
More informationOptimal Power Control in Cognitive Radio Networks with Fuzzy Logic
MEE10:68 Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic Jhang Shih Yu This thesis is presented as part of Degree of Master of Science in Electrical Engineering September 2010 Main supervisor:
More informationarxiv: v2 [cs.it] 29 Mar 2014
1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink
More informationLow-Complexity Approaches to Spectrum Opportunity Tracking
Low-Complexity Approaches to Spectrum Opportunity Tracking (Invited Paper) Qing Zhao University of California Davis, CA 95616 Email: qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern
More informationPerformance Comparison of the Standard Transmitter Energy Detector and an Enhanced Energy Detector Techniques
International Journal of Networks and Communications 2016, 6(3): 39-48 DOI: 10.5923/j.ijnc.20160603.01 Performance Comparison of the Standard Transmitter Energy Detector and an Enhanced Energy Detector
More informationPareto Optimization for Uplink NOMA Power Control
Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,
More informationarxiv: v1 [cs.it] 21 Feb 2015
1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical
More informationSpectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio
ISSN: 2319-7463, Vol. 5 Issue 4, Aril-216 Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio Mudasir Ah Wani 1, Gagandeep Singh 2 1 M.Tech Student, Department
More informationCooperative Diversity Routing in Wireless Networks
Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca
More information