Analysis of Distributed Dynamic Spectrum Access Scheme in Cognitive Radios Muthumeenakshi.K and Radha.S Abstract The problem of distributed Dynamic Spectrum Access (DSA) using Continuous Time Markov Model (CTMC) in Cognitive Radio (CR) is considered in this paper. DSA is an approach which facilitates the opportunistic use of licensed spectrum for the unlicensed (secondary) users without casing harmful interference to the licensed (primary) users. In the proposed distributed DSA scheme, each secondary user perceives the spectrum dynamics as a CTMC and access the spectrum. This scheme is a heuristics based approach which makes use of the estimated spectrum idle-probability and the interference each user experiences, to iteratively update user statistics. Here the main objective of this scheme is to attain a best set of access probabilities based on instantaneous interference rather than attaining a single set of optimum access probabilities. Simulation results show the effectiveness of the proposed algorithm in terms of throughput and establish the access probability variations of the secondary users. Keywords Cognitive Radio, CTMC, distributed scheme Dynamic Spectrum Access. I. INTRODUCTION adio spectrum is a limited source and is completely Rregulated by authorized bodies like Federal Communication Commission (FCC) [1]. CR Technology is proposed as a novel solution [1] for the conflicts between the spectrum scarcity in unlicensed band and low spectrum utilization in licensed band. This technology could be made use of in the future to make opportunistic use of the licensed spectra by unlicensed users. Unlicensed users equipped with CRs may in future be able to sense and opportunistically utilize a licensed spectrum when the corresponding licensed user is not making use of it. This is known as opportunistic spectrum access /DSA. In the existing DSA/CR terminology, licensed users are called the primary users and unlicensed users are called the secondary users [2]. Secondary users are allowed to share the licensed spectrum only when the primary users are unoccupied. This spectrum occupancy awareness can be achieved by spectrum sensing algorithms such as energy detection, matched filtering and feature detection [3]. Upon identifying the free spectrum, the secondary users can use it for their own communication without causing interference to the primary users. Muthumeenakshi. K is with the SSN College of Engineering, Chennai, Tamil Nadu, India. (phone: +919444320048; e-mail: muthumeenakshik@ssn.edu.in). Radha.S is with the SSN College of Engineering, Chennai, Tamil Nadu, India, (e-mail: radhas@sn.edu.in). The application of CR technology to dynamic spectrum access has led to interest in developing spectrum access algorithms and policies for making efficient use of idle spectrum. In this context, there are many existing contributions which model the primary user secondary user interactions using Markov models for dynamic spectrum sharing [4-9]. In [4] [5], the authors proposed a centralized scheme for dynamic spectrum access using CTMC model of primary user secondary user interactions. The authors of [6] proposed spectrum access schemes using CTMC with optimal channel reservation for secondary users. In [7] the authors evaluated the performance of opportunistic spectrum access using a two dimensional Markov model for a military environment. In [8], a framework based on Discrete Time Markov Chain for spectrum channelization between primary-secondary spectrum sharing was proposed. Their work also includes errors resulting from spectrum sensing for the performance evaluation and extended in [9] for flexible spectrum channelization schemes. CR networks of the future may consist of U and SUs belonging to multiple networks operated by different service providers. This led to the distributed access coordination solutions as opposed to centralized ones. To this end, there are several distributed schemes proposed in the literature. In [10], the authors proposed a distributed algorithm for learning and cognitive medium access using a Multi Armed andit model was proposed based on the assumption of an i.i.d distribution of primary user transmissions. In [11], a game theoretic framework and no regret learning algorithm was proposed for distributed adaptive channel allocation. Another distributed approach to optimize the efficiency of spectrum allocation using a local bargaining mechanism was proposed in [12]. Thus in the literature, several centralized and distributed DSA schemes [13] showing successful enhanced performance to increase the spectrum efficiency were found. A first step towards a fully distributed DSA using Markovian model was proposed in [14] both for perfect sensing and imperfect sensing. In this paper, the access probability variations and the estimated statistics for the distributed DSA scheme [13-14] are analyzed. Further this paper is organized as below: in Section II the System Overview is discussed; in Section III, the CTMC model and the distributed DSA scheme is discussed; Simulation results and analysis are discussed in Section IV and Section V is the conclusion part of the paper. 42
II. SYSTEM MODEL A rudimentary CR system which employs the proposed scheme is shown in Fig 1. The main objective of the proposed scheme is to optimize the throughput for multiple secondary users operating in the licensed spectrum of a single primary user. To do this, best set of access probabilities must be calculated. Access probabilities are the probabilities with which the secondary users access the spectrum when it is being used by other secondary users. In other words, access probabilities provide control over the amount of interference experienced by secondary users on an average. The challenge is to optimize the access probabilities such that interference is not high enough to cause severe loss of throughput, while at the same time not being low enough to result in loss of transmission opportunities. and λ respectively. Similarly the service rates for, A and are µ, µ A and µ. Fig.2. shows the CTMC state transition diagram for DSA with one primary user and two secondary users A and. This can also be extended to one primary and N number of secondary users as discussed in [5]. State S 0 is defined as the idle state of the spectrum. When secondary user A (or ) wants to start its communication, it first senses the spectrum. If the spectrum is found idle, the state transits from S 0 to S A (or S ) at a rate of λ A (or λ ). If user A (or ) completes its service before any request from user (or A), the CTMC transits to state S 0 with a rate of µ A (or µ ). Otherwise the state transition will be to state S A with a rate of λ (or λ A ) where both secondary users share the spectrum. However, when the primary user appears, the CTMC transits to state S with an arrival rate of λ. α A1, α A2, α 1, α 2 are the access probabilities of the secondary users. The secondary users access with probabilities α A1 = α A2 =1, when the spectrum is in idle state. When other secondary user is utilizing the spectrum, the secondary user estimates the access probabilities so as to minimize the interference. Fig. 1 CR System Model [14] The access probability of each secondary user is time varying and is given by the spectrum idle probability estimate from the perspective of that secondary user. It is controlled by a part of the spectrum access algorithm called the update rule. The update rule in turn makes use of the information provided by the interference measurement unit to update the access probability. At any point of time, it is the instantaneous interference experienced by a secondary user that determines the access probability. Thus the proposed scheme is therefore not a scheme that results in convergence to a single set of optimum access probabilities, but is rather an adaptive scheme which approximates the best of access probabilities based on instantaneous interference information. This will be apparent in the simulation results shown in section V. III. CTMC MODEL AND DISTRIUTED DSA FOR SECTRUM ACCESS In this section, the CTMC model for dynamic spectrum access involving one primary user and multiple secondary users is described. A system with single primary user () and two secondary users (A and ) is taken for illustration as in [4]. The primary-secondary spectrum sharing is modeled as CTMC based on the assumptions of oisson arrival of service requests (λ) and exponentially distributed service rates (µ). The arrival rates of the users, A and are denoted by λ, λ A Fig. 2 CTMC State diagram with access probabilities [4] ased on the above model, we can derive mathematical expressions relating the state probabilities [4], S 0, S, S A,S and S A and as given below. ( ) ( ) µ AA +µ +µ = αaλ A +αλ +λ 0 (1) αaλ A0 +µ 2 = µ A + αλ +λ A (2) λ (0 + A + + A) =µ (3) αλ 0 +µ A2 = ( µ + λ +αaλa) (4) αλ A +αaλ A = ( µ +λ +αaλa) A (5) + + + + = 1 (6) 0 A A 2 To obtain the state probabilities = [ 0 A A ], we solve the equations, Q = 0 & = 1 (7) where Q is the infinitesimal generator matrix given by eqn (8) and can be constructed from eqn (1) - (5), 43
Q - (α λ + α λ + λ ) α λ α λ 0 λ μ - (μ + α λ + λ ) 0 α λ λ A A A A A A = μ 0 - (μ + αaλa + λ ) αaλ A λ 0 μ μ - (μ + μ + λ ) λ μ A A 0 0 0 - μ (8) If we denote R, R A, R as the maximum achievable capacity values of primary user, secondary users A and respectively, we can express the average throughput per user as, r = R (9) ra = R AA + R A' A (10) r = R + R ' A (11) where R A and R are the capacities of the unlicensed users A and when they coexist. The CTMC state diagram presented here for one primary user and two secondary users can be generalized for N secondary users [5]. In such scenario, the CTMC will have 2 N +1 states and the state probabilities can be solved by constructing the infinitesimal generator matrix for N users and solving equation (8). If the number of secondary user increases, the contention for spectrum also increases and the average throughput per secondary user is reduced. In this model, the secondary network is distributed and does not have a centralized authority for their spectrum access coordination. In such a distributed scheme, each secondary user should learn the statistics from the environment and accordingly they should increase their spectrum access opportunities. Thus, each secondary user in the network perceives the spectrum dynamics as a CTMC and accordingly calculates the spectrum access probability. The main objective of the proposed distributed scheme is to calculate the access probability for secondary user from the perspective of this user. The CTMC model makes it easy using the infinitesimal generator matrix to calculate the probabilities of spectrum utilization by primary and other secondary users if the arrival and departure rates are known. More significantly, it is possible to directly calculate the probability 0, the spectrum idle probability using only the arrival and departure rates. The importance of 0 is that it is a function of all other probabilities and therefore constitutes a single easily computable parameter on the basis of which spectrum access decisions can be made by the secondary user. Thus, we use the estimate of 0, denotes as 0_ of each secondary user as that user s access probability. The assumptions, heuristics and definitions incorporated for the design of this scheme are discussed [14]. Assumption 1: The primary user statistics are known to all secondary users. The network service provider of a licensed user may, reasonably, be expected to have spectrum utilisation records and hence the usage statistics. Assumption 2: The statistics of the secondary users are comparable. The secondary users are expected to possess similar behaviour patterns. This is considered for each secondary user, so that the secondary user can reasonably assume an initialisation strategy. The initialization would be that any secondary user (say, user A) assigns the initial estimate of the other secondary users as its own. Heuristic 1: Interference for more than a certain fraction of time during a given transmission slot indicates an overestimated spectrum idle probability ( 0 ) i.e., underestimated arrival rates and overestimated service rates. For example, if a user does not experience interference for a prolonged period of time, it would be an advantageous strategy to increase its access probability until it experiences a minimum amount of interference. This can be achieved by increasing the service rate and reducing the arrival rate. We use this as a rule to update the estimates initialised on the basis of the above assumption over time. Unlike a centralised scheme, the decision of one secondary user to interfere with another has to be made by the secondary user itself. Finally, we define the time-evolving access probability and the interference ratio which is used for updating the user s statistics in a distributive manner as given below: Definition 1: The time-evolving access probability of each secondary user is the 0 estimate, ( 0 _) which is calculated from the perspective of that user. Definition 2: Interference Ratio (IR) is the ratio of cumulative time period for which interference occurs during a transmission slot (T i ) to the total duration of a transmission slot (T). IR = T i / T (12) The proposed scheme designed on the basis of the above definitions and the previously formulated assumptions and heuristics are summarised in Table I and Table II [14]. The constants b 1j and b 2j represent the control parameters TALE I ROOSED ALGORITHM FOR DSA SCHEME Distributed DSA Algorithm For each secondary user i, 1. Initialize: λ j_ λ i ; µ j_ µ i for all j i 2. Calculate p 0i_ using (λ p, µ p) and all (λ j_, µ j_), j i If there is a need to transmit, 3. Sense the spectrum. If the primary user is not transmitting, then access the spectrum with a probability 0i_. Else keep sensing. 4. Sense the spectrum. If secondary user j (j i) is transmitting, then access the spectrum with a probability 0i_. Update all (λ j_, µ j_), j i, based on the interference encountered during transmission (Refer update rule in Table II). TALE II UDATE RULE FOR DSA Update Rule for Distributed DSA Algorithm 1. Calculate the Interference Ratio (IR). 2. If [IR >= IR ref] Then go to Step 3 Else Step 4. 3. λ j_ = λ j_ + b 1j ; µ j_ = µ j_ + b 2j for all j i. Go to Step 5. 4. λ j_ = λ j_ - b 1j ; µ j_ = µ j_ - b 2j for all j i. 5. Recalculate 0i_ using the estimates calculated in Steps 3 and 4 on the assumption that the other secondary users access the spectrum with a probability 0i_ from the previous iteration. Use 0i_ as the new access probability 44
of the algorithm, the magnitudes and signs of which have to be chosen on the basis of the condition we place on IR in the form of the reference value IR ref. IV. SIMULATION RESULTS For simulation purposes, the maximum achievable throughput of the secondary users is set to 4.45 Mbps. Spectrum occupancy measurements [15] show that licensed users typically utilise the spectrum about 45% of the time. Hence the arrival rate, service rate pair [14] of the primary user (λ p, µ p ) is set to (85, 100) s -1. The arrival rate of secondary user is assumed to be λ = 85 s -1 and the arrival rate of secondary user A λ A is varied from 70 to 100 s -1 for analysis. The departure rates of both the secondary users are set to 100s -1. A. Secondary User Throughput Analysis The throughput analysis for the primary user and the secondary users for the proposed scheme is shown in Fig.3. It is evident that when λ A < 85s -1, the throughput of the secondary user A is less than the throughput of the secondary user. When λ A > 85s -1, the throughput of secondary user decreases. This is because the estimated access probability is more for user till λ A = 85s -1, and decreases when the arrival rate of user A increases beyond 85s -1. Throughput in Mbps 2.5 2 1.5 1 0.5 Throughput Vs Arrival Rate Secondary User A Secondary User rimary User 0 Arrival Rate of User A Fig. 3 Each user s throughput Vs arrival rate. Access robability Fig.4 and Fig.5 shows the access probability estimates of User A and User for varying arrival rates of User A and rimary User respectively. The access probability estimate of User A decreases as its arrival rate increases and the access probability estimate of User is almost constant as the arrival rate of User is constant. When the arrival rate of primary user is varied, the access probabilities of both the secondary users are reduced. Here, the access probability of User A is more than User as the actual arrival rate of User A is fixed at 70s -1 and that of User is fixed at 85s -1. C. Estimated Arrival Rates The arrival rate estimate of User A and User for varying actual arrival rates of User A is shown in Fig.6. The arrival rate estimate of User A is actually the estimated value by User in order to determine its access probability based on the interference encountered when both users access the spectrum at the same time. Similarly the arrival rate estimate of User is actually the value estimated by User A to determine its own access probability. It can be seen estimated values closely match with the actual values. Access robabilty Estimate Access robability Estimate 0.3 0.29 0.28 0.27 0.26 0.25 Access robability Estimate Vs Arrival Rate of User A User User A 0.24 Arrival rate of user A Fig. 4 Access robability Variations Vs arrival rate of user A 0.32 0.31 0.3 0.29 0.28 0.27 Access robability Vs Arrival Rate of rimary User User A User 0.26 Arrival Rate of rimary User Fig. 5 Access robability Variations Vs arrival rate of rimary User - Fig. 6 Estimated arrival rates Vs arrival rate of user A V. CONCLUSION This paper describes the access probability variations and estimated statistics for the distributed DSA scheme based on CTMC model for the spectrum access of secondary users, so as to maximize the throughput of the secondary users. Secondary users perceive the behavior of the spectrum occupancy as a CTMC model. They learn the statistics from the environment based on the interference countered during transmission and calculate their own access probabilities. Simulation results show the throughput attained by the secondary users and the variations in access probabilities and estimates statistics for the distributed DSA scheme. 45
REFERENCES [1] J. Mitola III, Cognitive Radio: an integrated architecture for software defined radio, h.d thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2000. [2] F.Akyildiz, W.Y.Lee and S.Mohanty. Next generation / dynamic spectrum access / cognitive radio wireless networks: A survey, Computer Networks Journal (Elsevier), vol. 50, pp. I 2127-2159, Sept. 2006. [3] T, Arslan. H, "A survey of spectrum sensing algorithms for cognitive radio applications," Communications Surveys & Tutorials IEEE, vol.11, no.1, pp.116-130, First Quarter 2009 doi: 10.1109/SURV.2009.090109. [4] Z. Ji, and K. J. R. Liu, rimary-prioritized Markov approach for dynamic spectrum access," in roc. IEEE DySAN 2007, pp. 507-515, Dublin, Ireland, April, 2007. [5] Z. Ji, K. J. R. Liu, and T. C. Clancy, "rimary-prioritized Markov approach for dynamic spectrum allocation," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1854-1865, April 2009. [6] X.Zhu, L.Shen, T.S..Yum, Analysis of cognitive radio spectrum access with optimum channel reservation, IEEE communication letters vol. 11, no. 4, pp 304-306, April 2007. [7] S.Tang, rain.l.mark, an analytical performance of Oppurtnistic Spectrum Access in a Military Environment, in roc of Wireless Communication and Networking Conference, pp 2681 2686, April 2008. [8] X.Gelabert, O.Sallent, J.erez-Romero, Ramon Agusti, Spectrum Sharing in cognitive radios with imperfect spectrum sensing: A discrete time markov model, Computer Networks Journal (Elsevier), pp. 2519 2536, 2010. [9] X.Gelabert, O.Sallent, J.erez-Romero, Ramon Agusti, Flexible spectrum access for opportunistic secondary operation in cognitive radio networks, IEEE transactions on communications, vol. 59, no.10, pp. 2659 2664, October 2011. [10] A.Anandkumar N. Michael, A. K. Tang, and A. Swami, Distributed algorithms for learning and cognitive medium access with logarithmic regret, IEEE Journal on Selected Areas in Communications, vol.29, no.4, pp.731-745, April 2011. [11] N. Nie and C. Comaniciu, Adaptive channel allocation spectrum etiquette for cognitive radio networks, Mobile Networks and Applications, vol. 11, pp. 779-797, Dec. 2006. [12] L.Cao, H.Zheng, Distributed spectrum allocation via local bargaining, in roc. of IEEE SECON 2005, pp 475-486, Santa Clara, CA, Sep. 2005. [13] Surendran.R, Muthumeenakshi.K, Radha.S, A distributed algorithm for dynamic spectrum access using primary-prioritized markov model, in roc. of IEEE International conference on rocess Automation, Control and Computing, pp 1-5, Sep. 2011. [14] K. Muthumeenakshi and S. Radha, Distributed Cognitive Radio Spectrum Access with Imperfect Sensing Using CTMC, International Journal of Distributed Sensor Networks, vol. 2013, Article ID 257801, 11 pages, 2013. doi:10.1155/2013/257801. [15] M. A. McHenry, NSF spectrum occupancy measurements project summary, Aug. 2005. research include security and architecture issues of mobile ad hoc and sensor networks, spectrum sharing in cognitive radios. She received the ISTE S.K.Mitra Memorial Award in October 2006 for the est Research paper published in the IETE Journal of Research and the CTS SSN est Faculty Award 2007 and 2009for the outstanding performance in the academic year 2006-07 and 2008-09. K.Muthumeenakshi graduated with a.e in Electronics and Communication Engineering from harathiar University in 1999. She received her M.E in Applied Electronics from Anna University, Chennai, India in 2004. At present, she is working as an Assistant professor in the Department of ECE, SSN College of Engineering, Chennai, Tamil Nadu. She is currently pursuing her hd in Anna University, Chennai. Her area of research interests are spectrum sensing and dynamic spectrum access in cognitive radios. S. Radha graduated with a.e in Electronics and Communication Engineering from Madurai Kamaraj University, India in 1989. She obtained her M.E in Applied Electronics from Government College of Technology, Coimbatore, India and her hd in the area of mobile ad hoc networks from Anna University, Chennai, India. At present, she is working as a rofessor and Head of the Department of ECE, Sri Sivasubramaniya Nadar College of Engineering, Kalavakkam, India. She has published more than 45 papers in international and national journals and conferences. Her current areas of 46