Professional Documents
Culture Documents
I. I NTRODUCTION
Public mobile radio spectrum has become a scarce resource
due to the recent boom in wireless technologies. The unlicensed spectrums has been extremely crowded since most
of the wireless technological innovations happen in these
frequency ranges. On the contrary, actual measurements show
that most of the licensed frequency ranges are vastly underutilized at some specific location and time [1]. Cognitive radio
(CR) [2], [3], is proposed as a key technology to deal with
this increasingly tense situation in spectrum use. It enables
public access to those unused spectral bands by allowing the
unlicensed (cognitive) users to opportunistically exploit the
licensed spectrum, and therefore the overall spectral efficiency
can be economically increased [4].
As the cognitive radio has lower priority of the licensed
spectrum, it should transmit without causing any significant
interference to the licensed user (the primary user). How
to sense the spectrum in a reliable manner becomes one of
the major challenges that confront the cognitive radio. Due
to channel fading and shadowing effects, the received signal
strength at the cognitive user may be severely degraded, and
the sensing performance of the single detector is limited. Thus,
cooperative spectrum sensing, which can enhance the sensing
performance, has attracted extensive attention. It has been
proved that relying on the variability of signal strength at
This work was supported by National Basic Research Program of China
(973 Program) (No. 2009CB320405), National Natural Science Foundation of
China (No. 60802012),National High Technology Research and Development
Program (No. 2007AA01Z257), and Natural Science Foundation of Zhejiang
Province (No. Z104252), China.
Frequency
t=1
t=2
t=3
...
...
Channel 1
Channel 2
...
t=T
...
...
...
...
...
...
Channel M
Time
Occupied by the primary network
Spectrum opportunities
Fig. 1.
Channel model.
(1)
where SN Rtrans,i is the received signal to noise ratio of cognitive transmission using channel i. Therefore if the cognitive
network can exploit more channels and fully utilize them,
significant throughput increase can be achieved.
For the protection of the primary network, a reliable spectrum sensing must be performed before cognitive transmission.
For a given channel i, the goal of spectrum sensing is to decide
between the flowing two hypotheses:
0, H0
(2)
Si =
1, H1
Due to some certain constraints, such as hardware limitation, time consumption limitation, etc., it is difficult for a
single sensor to achieve wide-band spectrum sensing. One cognitive user is able to sense limited bandwidth of spectrum at
one time. This bandwidth varies for different spectrum sensing
approaches and different hardware limitations. Without loss
of generality, in the following discussion we assume that a
cognitive user can sense only one channel once. Moreover,
the sensing performance of single cognitive user may be
degraded due to the channel fading and the shadowing effects.
Therefore, the cognitive network uses cooperative spectrum
sensing to achieve wide-band spectrum sensing and increase
the probability of detection.
In such a cognitive network, each time slot is divided
into three successive stages: sensing stage, reporting stage
and transmission stage.1 At the sensing stage, each cognitive
user performs spectrum sensing independently using the same
detection approach. These local sensing results are then transmitted to the fusing center through a control channel at the
reporting stage. For the bandwidth limitation of the control
channel [5], all the cognitive users only transmit the final
sensing results (H0 or H1 ) instead of the raw data of sensing
observations. According to these local sensing results, the
fusing center makes the cooperative sensing results. To further
limit the interference to the primary user and to simplify the
following discussion, the OR-rule (1-out-of-n rule) [11] is used
as the fusion rule. It can be described as follow: if any of the
individual sensing results is H1 , the cooperative sensing result
is H1 ; otherwise, H0 is decided. Finally, at the transmission
stage, the cognitive network transmits using a set of channels
according to the cooperative sensing results and the access
policy. The access policy specifies the access decision of each
channel based on the cooperative sensing results. As the M
channels are independent of each other, the access policy can
be modelled as the accessing probability of each channel when
its cooperative sensing result is given.
B. Problem formulation
Let n = [n1 , n2 , ..., nM ] be the number of cognitive users
choosing each channel to sense. In practical system, the distance from the primary user to the cognitive network is much
greater than the radius of the cognitive network. Therefore, the
primary signal received by each cognitive user experiences
almost identical path loss, and the average receiving SINRs
are equal. And it is reasonable to assume that all the ni
cognitive users sensing channel i have the same miss-detection
probability Pmiss,i and false-alarm probabilities Pfalse,i . As the
cooperative sensing result is decided using the OR-rule, the
miss-detection and false-alarm probabilities of the cooperative
sensing result for channel i can be obtained as follows:
Qmiss,i = Pmiss,i ni ;
(3)
ni
Qfalse,i = 1 (1 Pfalse,i )
(4)
(6)
max
i=1
s.t.
(1 Qmiss,i ) fi (1) + Qmiss,i fi (0) i
ni
Qmiss,i = Pmiss,i
ni
Qf alse,i = 1 (1 Pf alse,i )
M
ni N.
(7)
i=1
Qmiss,i i
Qmiss,i , 0 ,
2 We assume that the primary network is delay-insensitive, and no constraints are imposed on the average delay in the following discussion.
log i
ni =
,
(9)
log Pmiss,i
where x is the greatest integer less than or equal to x.
Applying the optimal access policy (fi (0) , fi (1)) given in
(8) to the optimization problem (7), it is easy to obtain the
average transmission throughput of channel i when there are
ni cognitive users choosing channel i to sense:
n
f alse,i ) i )
1 (1i )(1(1P
(1i )Ri , ni > i
ni
1Pmiss,i
Gi (ni )=
ni
i (1Pf alse,i )
(1 i ) Ri ,
ni i
ni
Pmiss,i
(10)
where i is used to denote the turning point of channel i shown
in (9).
Obviously, Gi (ni ) is non-convex. However, it has a nice
property as stated in the following proposition:
Proposition 1: For a chosen channel i, its average transmission throughput Gi (ni ) is increasing and concave when
the number of cooperative users ni i . And the maximum
average transmission throughput is reached when ni = i or
ni = i + 1.
Proof: See Appendix.
Then we can easily obtain the following corollary:
Corollary 1: Let n = [n1 , ..., nM ] be the optimal number
of cognitive users choosing each channel to sense. There is at
most one channel k, 1 k M , satisfying 0 < nk < k .
And for all the other i = k, ni {0, i , i + 1}.
Proof: Firstly, if there is any channel l satisfying nl >
l + 1, according to Proposition 1, it is obviously that
Gl (nl ) < Gl (l + 1) .
(11)
10
+1
8
10
12
14
the number of the cognitive users
16
18
20
1
0.8
f (0)
0.6
f (1)
i
i
0.4
+1
0.2
2
8
10
12
14
the number of the cognitive users
16
18
20
15
140
the proposed strategy
the exhaustive search
the randomchoosing strategy
120
100
80
60
40
20
0.05
0.1
0.15
0.2
the collision probability constraint
0.25
0.3
is easy to extend to the case when there are more than two
channels. Therefore, there is at most one channel k, 1 k
M , and 0 < nk < k .
As a result, the optimal number of cognitive users for each
channel can be obtained by a search over all the possible
combinations of [n1 , n2 , ..., nM ] satisfying Proposition 2. And
the optimization problem shown in (7) can be solved by the
following strategy:
detection for local spectrum sensing in the following simulations, and the miss-detection probability and false-alarm
probability of energy detector in a Rayleigh fading channel
have been given by [12]. Moreover, we assume that all the
channels have the same theoretical throughput upper bond
R = 100 bits/slot.
Fig. 2 is the average transmission throughput Gi and the
optimal access policy (fi (0) , fi (1)) of a single channel versus
the number of cognitive users choosing this channel to sense.
The collision probability constraint is i = 0.1, and the
occupied probability of this channel is i = 0.5. The missdetection probability and the false-alarm probability are set
as: Pmiss,i = 0.70, Pf alse,i = 0.17. As proved by Proposition
1, Gi is increasing and concave when the number of cognitive
users ni i . And when ni > i , Gi decreases as ni
increases. So its maximal value is reached when ni = i
or ni = i + 1. The optimal access policy (fi (0) , fi (1))
also changes with ni : When ni i , the miss-detection
probability of the cooperative sensing result is high, and
the cognitive network adopts a conservative access policy to
protect the primary transmission. On the other hand, when
ni > i , the cooperative sensing result tends to overlook the
idle channel, thus the access policy should be aggressive to
get more transmission opportunity.
Fig. 3 shows the average transmission throughput of the
proposed opportunistic spectrum access strategy versus the
collision probability constraint. We consider four channels
with the same collision probability constraint . The occupied
probabilities of these channels are: 1 = 0.2, 2 = 0.3, 3 =
0.4 and 4 = 0.5. A cognitive system containing 8 cognitive
users attempts to use the idle channels. For comparison,
the performances of other two opportunistic spectrum access
strategies are also given: a) the exhaustive search, in which
the optimal number of cooperative users for each channel is
obtained by an exhaustive search; b) the random-choosing
strategy, which assumes that each cognitive user randomly
chooses a channel to sense. The access policies of these two
strategies are both calculated using (3) and (8). It can be
observed from the graph that the performances of all the three
strategies increase as increases. And as we expected, the
proposed opportunistic spectrum access strategy has the same
average transmission throughput as the exhaustive search, and
outperforms the random-choosing strategy. Considering its
lower computational complexity, the proposed opportunistic
spectrum access strategy is more suitable for implementation.
V. C ONCLUSION
In this paper, the design of opportunistic spectrum access in cognitive network is considered. We investigate the
average transmission throughput of the cognitive network
when cooperative spectrum sensing is employed. The optimal
opportunistic spectrum access problem is formulated, and a
reduced search algorithm is proposed to solve this optimization
problem. Simulation results are also presented to show the
promising performances of the proposed opportunistic spectrum access strategy. We hope this analysis will shed some
light on the research and application of opportunistic spectrum
access.
A PPENDIX : P ROOF OF P ROPOSITION 1
As shown in (10), when the number of cooperative users
ni > i , the average transmission throughput function of
channel i can be expressed as:
n
(1 i ) (1 (1 Pf alse,i ) i )
1
(1 i ) Ri .
Gi (ni ) = 1
ni
1 Pmiss,i
(14)
The first derivative of G1i (x) is
d 1
(1i ) (1i ) Ri
G (x) =
2
x
dx i
1 Pmiss,i
x
x
(1Pf alse,i ) ln (1Pf alse,i )
1Pmiss,i
x
x
(1 (1 Pf alse,i ) ) Pmiss,i
ln Pmiss,i .
(15)
It should be noted that no matter what the channel state is,
the sensor can always choose H0 with a probability of Pmiss,i .
And in this case, its miss-detection probability and false-alarm
probability are Pmiss,i and 1Pmiss,i respectively. Therefore,
for practical sensor, there is:
Pmiss,i < 1 Pf alse,i .
Furthermore, when x 0 and 0 < y < 1, we have
y x ln y
y x1 (x ln y + 1 y x )
< 0.
=
2
x
y 1 y
(1 y x )
(16)
(17)
i (1 Pf alse,i )
ni
Pmiss,i
ni
(1 i ) Ri .
(19)
(20)
(21)