Next Article in Journal
UHF Signal Processing and Pattern Recognition of Partial Discharge in Gas-Insulated Switchgear Using Chromatic Methodology
Previous Article in Journal
A Differential Resonant Accelerometer with Low Cross-Interference and Temperature Drift
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Opportunistic Capacity-Based Resource Allocation for Chunk-Based Multi-Carrier Cognitive Radio Sensor Networks

College of Communication Engineering, Chongqing University, Chongqing 400044, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(1), 175; https://doi.org/10.3390/s17010175
Submission received: 25 November 2016 / Revised: 30 December 2016 / Accepted: 12 January 2017 / Published: 18 January 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
The spectrum allocation for cognitive radio sensor networks (CRSNs) has received considerable research attention under the assumption that the spectrum environment is static. However, in practice, the spectrum environment varies over time due to primary user/secondary user (PU/SU) activity and mobility, resulting in time-varied spectrum resources. This paper studies resource allocation for chunk-based multi-carrier CRSNs with time-varied spectrum resources. We present a novel opportunistic capacity model through a continuous time semi-Markov chain (CTSMC) to describe the time-varied spectrum resources of chunks and, based on this, a joint power and chunk allocation model by considering the opportunistically available capacity of chunks is proposed. To reduce the computational complexity, we split this model into two sub-problems and solve them via the Lagrangian dual method. Simulation results illustrate that the proposed opportunistic capacity-based resource allocation algorithm can achieve better performance compared with traditional algorithms when the spectrum environment is time-varied.

1. Introduction

A wireless sensor network (WSN) is a wireless network that consists of a large number of sensor nodes that can be applied to environmental monitoring, invasion detection, disaster aid and various other fields [1,2]. Current WSNs operate in the industrial, scientific and medical (ISM) band, which is shared by many other successful communication technologies. With emerging broadband applications of wireless communications, the radio spectrum resources for WSNs in the ISM band are currently suffering from serious shortages, which degrades the performance of the WSNs [3]. This frequency band problem is exacerbated because radio spectrum is becoming an increasingly important and scarce resource in wireless communication systems. However, because of the current fixed spectrum assignment policy, the spectrum utilization efficiency in the licensed spectrum is very low, which generates many non-continuous vacant frequency bands, referred to as spectrum holes [4,5]. To overcome the spectrum resource limitation experienced by current WSNs and improve the spectrum utilization, cognitive radio (CR), which allows secondary users (SUs) to opportunistically utilize the frequency spectrum originally assigned to licensed primary users (PUs), has been used in WSNs as a promising approach to alleviate spectrum scarcity [6,7,8]. A WSN in which the sensor nodes are equipped with cognitive radios is called a cognitive radio sensor network (CRSN) [9,10,11]. CRSNs are a candidate area in which cognitive techniques can be used to provide opportunistic spectrum access.
In CRSNs, resource allocation is an important and challenging task that aims to assign discrete spectrum resources to achieve efficient frequency utilization and maximize the capacity. In the existing literature, considerable achievements have been made for resource allocation in CRSNs by applying methods from game theory [12,13], graph theory [14,15] and linear programming [16,17,18]. These studies laid the foundation for the researches of resource allocation, but few of them consider the dynamic available capacity of spectrum resources. Recently, the dynamic available capacity of spectrum resources have received considerable attention from academia, which has focused mainly on the time-varied available resources of the sub-carrier, also known as opportunistic capacity [19]. In [20], the authors modeled the PU activity in a sub-carrier as a semi-Markov ON/OFF process using varying distributions of holding times (ON and OFF states) and studied the impact of activity model parameters on spectrum efficiency. Subsequently, [21] studied the PU and SU activity and modeled the busy/idle times in a sub-carrier using two-state Markov chains. In [22], the authors modeled the PUs as independent M/G/1 queues with Poisson packet arrival rates and investigated the channel access problem by deriving the probabilities of collisions vs. successful transmissions for the PUs and SUs. In summary, most existing works focus more on the opportunistic capacity of a single sub-carrier. However, in practice, a set of contiguous sub-carriers is often grouped into one chunk and then allocated in a chunk-by-chunk manner to users for simplification, because the number of sub-carriers is very large in a multi-carrier communication system [23,24,25,26,27]. Similar to the time-varied available resources of a single sub-carrier, the available resources of chunks are also time-varied in chunk-based multi-carrier CRSNs. Therefore, exploring a resource allocation algorithm by considering the opportunistic capacity of chunks is necessary for chunk-based multi-carrier CRSNs. Achieving such resource allocation will reduce spectrum collisions and greatly improve spectrum efficiency. To the best of our knowledge, resource allocation in chunk-based multi-carrier CRSNs by considering opportunistic capacity of chunks has not been studied in previous works.
This paper studies the resource allocation for chunk-based multi-carrier CRSNs where the available spectrum resources are time-varied due to PU/SU activity and mobility. We present a novel opportunistic capacity model through continuous time semi-Markov chain (CTSMC) to describe the time-varied spectrum resources of chunks. This model is different from existing studies that focus primarily on the opportunistic capacity of a single sub-carrier. Using our method, a joint power and chunk allocation model based on the opportunistic capacity of chunks is established for chunk-based multi-carrier CRSNs with time-varied spectrum resources. To reduce the computational complexity, we split this model into two sub-problems and solve them using the Lagrangian dual method. Simulation results illustrate that the proposed opportunistic capacity-based resource allocation can achieve better performance compared with traditional algorithms when the spectrum environment is time-varied.
The remainder of this paper is organized as follows. The system model is described in Section 2. Section 3 presents the opportunistic capacity model for chunks. In Section 4, the resource allocation algorithm based on the opportunistic capacity of chunks is proposed. Numerical results are provided in Section 5 to demonstrate the advantages of the proposed scheme. We conclude this paper in Section 6.

2. System Model

In this work, we consider chunk-based multi-carrier CRSNs, where a set of sensor nodes are communicating with a centralized secondary user sink (SU sink) that is either the cluster head or a secondary base station. Because the sensor nodes communicate using the frequency band licensed to the PU, we call these secondary sensor nodes SUs. The CRSNs we consider are shown in Figure 1, which includes PUs, SUs, PUs’ base stations and an SU sink. In this system, the SUs adopt a centralized chunk-based resource allocation scheme and opportunistically utilize the holes in the spectrum through spectrum sensing [28]. In the spectrum sensing phase, SUs periodically detect information concerning the local frequency spectrum and send it to the SU sink. Then, the SU sink summarizes all the detection information sent by the SUs to find the spectrum holes and divide them into chunks, the minimum units for allocation. It allocates spectrum to SUs in a chunk-by-chunk manner by considering the different needs of SUs. We assume that the spectrum environment is time-varied due to PU/SU activity and mobility, which will lead to frequent busy/idle changes in each sub-carrier and a time-varied number of idle sub-carriers in the chunk. These time-varied spectrum resources make resource allocation quite difficult. To address this issue, we formulate an opportunistic capacity model for chunks that describes the time-varied spectrum resources. Then, based on this, we propose a joint power and chunk allocation algorithm for chunk-based multi-carrier CRSNs.

3. Opportunistic Capacity Model for Chunks

In this section, the time-varied spectrum resources of chunks have been formulated mathematically. Each chunk is assumed to have n sub-carriers that support a certain frequency range. Due to the time-varied spectrum environment, each sub-carrier can be in one of two states, busy or idle, and the number of idle sub-carriers in each chunk changes over time. We consider the number of available idle sub-carriers in a chunk as the chunk state; then, based on the properties of the state transition model, we can derive the opportunistic capacity for the chunk. We assume the number of idle sub-carriers in a chunk at a certain time t is X ( t ) = S i = i ,   ( 0 i n ) , which also represents the instantaneous available capacity in the chunk at time t. Because i sub-carriers are not being used by the PUs in state S i , S i is decremented to S i 1 if a PU transmission arrives at any of these sub-carriers. In contrast, S i can be incremented to S i + 1 if one of the n i PUs in service completes its transmission and releases the sub-carrier. Based on this, a chunk can transition between states only during PU arrivals or departures in the chunk. This state transition model can be described by the embedded Markov method, whose expectation of the number of idle sub-carriers in a chunk is that chunk’s opportunistic capacity.
The state transition model for the number of idle sub-carriers in a chunk is depicted in Figure 2. The state space S = { S 0 , S 1 , S n } consists of the state S i = i where 0 i n , which denotes that the number of idle sub-carriers in the chunk is i . P i , i 1 denotes the transition probability that a PU arrival in any of i idle sub-carriers in state S i , while P i , i + 1 represents the transition probability that one of the n i PUs in a busy sub-carrier completes its service and releases the sub-carrier. We can assume that the holding time of the PUs in each sub-carrier follows an exponential distribution with expectation 1 λ and that the idle time in each sub-carrier follows a Pareto distribution P a ( a , t m ) because [29] analyzed real-world empirical data and concluded that a Pareto distribution function can easily describe the idle time for all the considered bands at long timescales. The memory property of the Pareto distribution transmits the state transition model into a CTSMC model, which makes it quite complicated, because the remaining idle time of the idle period at a given idle time, t , is related to the past idle time for each sub-carrier. These kinds of CTSMC models do not have a general solution at present. Thus, to reduce the complexity, we tackle this issue by approximating the probability density function (PDF) of the remaining idle time of the idle period in the sub-carrier. According to the method in [30], the cumulative distribution function (CDF) of the remaining idle time t can be approximated as follows:
G e ( t ) = 0 t [ 1 G ( u ) ] d u E [ G ( t ) ] ,
where G ( t ) indicates the CDF of the idle period in the sub-carrier, and E [ G ( t ) ] denotes the expectation of the idle period. Substituting the Pareto distribution P a ( a , t m ) into Equation (1) yields
G e ( t ) = { a 1 a + 1 a ( 1 t m a 1 t a 1 ) t > t m ( a 1 ) t a t m t < t m .
Now G e ( t ) can denote the CDF of the remaining idle time t , and the PDF of the remaining idle time can be given as follows:
g e ( t ) = { ( a 1 ) t m a 1 a t a t > t m a 1 a t m t < t m .
Therefore, the expectation of the remaining idle time can be achieved by calculating
E [ G e ( t ) ] = 0 + t g ( t ) d t = 0 t m a 1 a t m t d t + t m + ( a 1 ) t m a 1 a t a 1 d t = ( a 1 ) t m 2 ( a 2 ) .
Then, the transition rate of the idle sub-carrier, which is the reciprocal of the remaining idle time, can be approximated by
ν = 2 ( a 2 ) ( a 1 ) t m .
Based on the memorylessness property of exponential distribution, the transition rate of the busy sub-carrier is λ . Therefore, P i , i + 1 and P i , i 1 in state S i can be expressed as follows:
P i , i + 1 = λ t m ( a 1 ) ( n i ) λ t m ( a 1 ) ( n i ) + 2 i ( a 2 ) ,
and
P i , i 1 = 2 i ( a 2 ) λ t m ( a 1 ) ( n i ) + 2 i ( a 2 ) .
Then, the state transition matrix P can be given:
P = [ 0 1 0 P 1 , 0 0 P 1 , 2 0 P i , i 1 0 P i , i + 1 1 0 ] .
Therefore, the stationary probability π = ( π 1 , π 2 , , π n ) , which represents the proportion of transitions that take the process into state S i , ( 0 i n ) can be obtained by solving the following equations:
π P = π ,
and
i = 0 n π i = 1 .
Subsequently, according to [31], the limiting probability P i , which represents the proportion of time that the process is in state S i , can be calculated by
P i = π i μ i j = 1 n π j μ j ,
where μ i is the expectation of residence time in state S i during each visit. Because the end of state S i can occur only at times of PU arrival and PU departure in the chunk, μ i can be written as
μ i = p i , i + 1 E [ h i , i + 1 ( t ) ] + p i , i 1 E [ h i , i 1 ( t ) ] ,
where h i , i + 1 ( t ) and h i , i 1 ( t ) are the PDFs of residence times in state S i before transition to the states S i + 1 and S i 1 , respectively, and E [ h i , i + 1 ( t ) ] and E [ h i , i 1 ( t ) ] represent the expectations of residence time in state S i before transition to the states S i + 1 and S i 1 , respectively. The residence time in state S i before transition to state S i 1 can be expressed by the minimum remaining idle time of i idle sub-carriers, because transition can occur only at the time that a PU arrives at one of the idle sub-carriers. Assume that the remaining idle time of each idle sub-carrier be a random variable. Then h i , i 1 ( t ) can be given as the PDF of the minimum order statistic of i random variables. Similarly, h i , i + 1 ( t ) can be given as the PDF of the minimum order statistic of n i random variables, representing the remaining busy time of busy sub-carriers. According to the minimum order statistic [32], h i , i + 1 ( t ) and h i , i 1 ( t ) can be written as
h i , i 1 ( t ) = { i ( a 1 ) t m i ( a 1 ) a i t i ( a 1 ) + 1 t > t m i q [ 1 q t ] i 1 t t m ,
and
h i , i + 1 ( t ) = ( n i ) λ e λ ( n i ) t ,
respectively, where q = a 1 a t m . Then, E [ h i , i + 1 ( t ) ] and E [ h i , i 1 ( t ) ] can be obtained as follows:
E [ h i , i 1 ( t ) ] = 0 t m i q t [ 1 q t ] i 1 d t + t m + i ( a 1 ) t m i ( a 1 ) a i t i ( a 1 ) d t = i q 0 t m t k = 0 i i ! ( q ) k t k ( i k ) ! k ! d t + i ( a 1 ) t m i ( a 1 ) a i t m + 1 t i ( a 1 ) d t = i q k = 0 i i ! ( q ) k t m k + 2 ( i k ) ! k ! ( k + 2 ) + i ( a 1 ) t m a i ( i a i 1 ) ,
E [ h i , i + 1 ( t ) ] = 0 + ( n i ) λ e λ ( n i ) t d t = 1 λ ( n i ) .
Substituting Equations (6), (7), (15) and (16) into Equation (12) yields
μ i = ( a 1 ) { a t m + 2 i 2 ( a 2 ) [ k = 0 i i ! ( q ) k t m k + 1 ( i k ) ! k ! ( k + 2 ) + i ( a 1 ) a i ( i a i 1 ) ] } a [ λ t m ( a 1 ) ( n i ) + 2 i ( a 2 ) ] .
By bringing μ i and π i into Equation (11), the result is
P i = π i ( a 1 ) { a t m + 2 i 2 ( a 2 ) [ k = 0 i k ! ( q ) k t m k + 1 ( i k ) ! k ! ( k + 2 ) + i ( a 1 ) a i ( i a i 1 ) ] } a [ λ t m ( a 1 ) ( n i ) + 2 i ( a 2 ) ] j = 1 n π j ( a 1 ) { a t m + 2 j 2 ( a 2 ) [ k = 0 j j ! ( q ) k t m k + 1 ( j k ) ! k ! ( k + 2 ) + j ( a 1 ) a j ( j a j 1 ) ] } a [ λ t m ( a 1 ) ( n j ) + 2 j ( a 2 ) ] .
Based on this, the opportunistic capacity that denotes the expectation of the number of idle sub-carriers in a chunk can be calculated as follows:
C = i = 0 n i P i = i = 0 n i π i ( a 1 ) { a t m + 2 i 2 ( a 2 ) [ k = 0 i k ! ( q ) k t m k + 1 ( i k ) ! k ! ( k + 2 ) + i ( a 1 ) a i ( i a i 1 ) ] } a [ λ t m ( a 1 ) ( n i ) + 2 i ( a 2 ) ] j = 1 n π j ( a 1 ) { a t m + 2 j 2 ( a 2 ) [ k = 0 j j ! ( q ) k t m k + 1 ( j k ) ! k ! ( k + 2 ) + j ( a 1 ) a j ( j a j 1 ) ] } a [ λ t m ( a 1 ) ( n j ) + 2 j ( a 2 ) ] .

4. Opportunistic Capacity-Based Resource Allocation for Chunk-Based Multi-Carrier CRSNs

4.1. Opportunistic Capacity-Based Resource Allocation Model

We assume that the CRSNs consist of m SUs and k idle chunks with total transmit power constraint P T . Among these, each chunk contains n sub-carriers, and each SU i ( i = 1 , 2 , 3 , , m ) can utilize multiple chunks to ensure that its data rate requirements indicated by Q = { q 1 , , q m } can be met. To consider the statistical property of available capacity in the chunk at long timescales, we introduce C = { c 1 , , c k } ( c j n , j = 1 , 2 , 3 , , k ) as the opportunistic capacity of chunks and make the total opportunistic capacity assigned to each SU satisfy that SU’s data rate requirement. This opportunistic capacity-based resource allocation can reduce spectrum collisions and greatly improve spectrum efficiency under a time-varied spectrum environment (e.g., allocating chunks with small opportunistic capacity to SUs that have small data rates demands to make full use of spectrum fragments). The joint power and chunk allocation model can be transformed into a combinatorial optimization problem to achieve the maximum transmission rate:
max   i = 1 m j = 1 k c j r i , j x i , j ,
s . t .   i = 1 m j = 1 k x i , j p i , j P T ,
j = 1 k c j r i , j x i , j q i ,
and
i = 1 m x i , j 1 .
Let x i , j indicate whether chunk j is allocated to SU i . If chunk j is allocated to SU i , x i , j = 1 ; otherwise, x i , j = 0 . Then, p i , j denotes the transmit power allocated to SU i when SU i transmits on chunk j , and r i , j represents the data rate per sub-carrier in chunk j for SU i because the channel fading within the same chunk is assumed to be the same. Constraint (21) ensures that the total transmit power satisfies the power constraint. Constraint (22) ensures that the total opportunistic capacity assigned to each SU satisfies SU’s data rate requirement. Let c j , t be the number of idle sub-carriers in chunk j detected by the SU sink at time t , and let C j = { c j , t g + 1 , c j , t g + 2 , , c j , t } represent the number of idle sub-carriers in chunk j over the recent g times spectrum-sensing operations. Then, we can determine the parameter for the opportunistic capacity model by applying the point estimation method [32] to achieve the opportunistic capacity of chunk j . Moreover, by adopting the adaptive modulation and coding (AMC) scheme, SUs at different positions can achieve different data rates in the same chunk due to differences in the environment. According to G. J. Foschini’s inference [33], r i , j can be calculated as follows:
r i , j = b log 2 ( 1 + γ i , j 2 3 ln P b 2 ) ,
where P b is the maximum tolerable error rate, b denotes the bandwidth of the sub-carrier, and γ i , j = p i , j H i , j , which indicates the signal-to-interference plus noise ratio (SINR) when SU i transmits on chunk j . Here, p i , j and H i , j represent the transmit power and the channel factor, respectively.
To explore in which case the proposed allocation model can be used, we analyze the feasibility for it. This analysis also can be used to determine the relationship between the available resources and SUs’ requirements. For the proposed model, the conditions to acquire a feasible solution can be achieved by using expectation constraint method which mainly used in stochastic programming [34]. Due to the randomness of channel condition, the data rate per chunk can achieve different values by adopting the AMC scheme. Thus, we can use random variable to express the data rate of chunks. Based on this, Equations (22) and (23) can be integrated into an expectation constraint which is as follows
j = 1 k c j r j , a v g Q ,
where r j , a v g represents the expectation of the data rate for chunk j and Q = i = 1 m q i . Now we can get the relationship between the available resources and SUs’ requirements. This can help us to set model parameters and determine under which condition the feasible solution exists. When the SUs’ requirements are beyond the available resources, Equation (25) cannot be satisfied, and we gradually reduce the access number of SUs to obtain feasible allocation scheme.

4.2. Simplification and Solution

The joint power and chunk allocation causes the model to become a mixed integer programming problem, which is hard to solve because the chunk allocation involves 0-1 integer programming and the power allocation involves non-integer programming. One of the direct solution methods is using the heuristic algorithm to realize chunk and power allocation for SUs. The heuristic algorithm exhaustively searches over all possible chunk combinations for SUs and implements power allocation algorithm for each combination. The computational complexity of this algorithm is very high, because the number of combinations is very large and each power allocation is a NP-hard problem. For m SUs and k idle chunks, there exist m k possible combinations. Thus, the heuristic algorithm needs O ( m k ) operations which have NP-hard computational complexity. To reduce the computational complexity, we simplify the model described above by splitting it into two sub-problems. The first step is chunk allocation, which allocates a chunk so a particular user can transmit its data over the chunk. Chunk allocation is based on chunk channel quality, without considering information concerning the transmit power. The second step is power allocation, which allocates the required transmit power over the allocated chunk.
In the chunk allocation part, we introduce a suboptimal algorithm with low complexity because the integer programming problem with large numbers of variables is difficult to solve. We assume the total transmit power is assigned equally to each chunk with the average power p v and allocate a chunk to a particular SU with the best channel quality to achieve the maximum transmission rate. This procedure is shown in Figure 3. The proposed chunk allocation needs O ( k m log m ) operations. After that, the power allocation algorithm only needs to be implemented once. Thus, it has lower computational complexity than the heuristic algorithm.
After all chunks have been allocated, the original objective in Equation (20) leads to power allocation for all chunks based on the previous chunk allocation result. Denoting the chunk allocation result as X = { x 1 , 1 , , x 1 , k , , x m , k } , the optimization problem can be solved by using the Lagrangian dual method [35,36]. For Equation (20), consider the following Lagrangian function:
L ( P , λ , μ ) = i = 1 m j = 1 k c j r i , j x i , j + λ ( P T i = 1 m j = 1 k p i , j x i , j ) + i = 1 m μ i ( j = 1 k c j r i , j x i , j q i ) ,
where P = [ p 1 , 1 , , p m , k ] T 0 . λ 0 and μ = [ μ 1 , , μ m ] T 0 are the Lagrange multipliers for Constraints (21) and (22), respectively. The Lagrangian dual objective function is
θ ( λ , μ ) = max λ , μ 0   L ( P , λ , μ ) .
Hence, the Lagrange dual problem can be obtained as follows
min θ ( λ , μ ) = min max λ , μ 0   L ( P , λ , μ ) .
The derivative of L ( P , λ , μ ) is
L p i , j = c j x i , j d r i , j d p i , j λ x i , j + μ i c j x i , j d r i , j d p i , j ,
where d r i , j d p i , j can be obtained by differentiating Equation (24) with p i , j .
d r i , j d p i , j = b H i , j ( 2 3 ln P b 2 + p i , j H i , j ) ln 2 .
Substituting Equation (30) into Equation (29) yields
L p i , j = c j b H i , j x i , j ( 2 3 ln P b 2 + p i , j H i , j ) ln 2 λ x i , j + μ i c j b H i , j x i , j ( 2 3 ln P b 2 + p i , j H i , j ) ln 2 .
Thus, the solution for the optimal power allocation based on the chunk allocation result can be derived by setting L p i , j = 0 . Then, the transmit power of chunk j for SU i is
p i , j = C j b H i , j ( 1 + μ i ) + 2 3 λ ln 2 ln P b 2 λ H i , j ln 2 .
Taking Equation (32) into Equation (28), the result is
min θ ( λ , μ ) = min λ , μ 0 L ( λ , μ ) .
Subsequently, the problem can be solved by using gradient method. According to the gradient method and Equation (32), the iterative formulas for μ and λ are
λ ( t + 1 ) = [ λ ( t ) α ( t ) ( P T i = 1 m j = 1 k p i , j x i , j ) ] + ,
and
μ i ( t + 1 ) = [ μ i ( t ) β i ( t ) ( j = 1 k c j r i , j x i , j q i ) ] + ,
respectively, where [ · ] + = max ( 0 , · ) , t is the iteration number, and α ( t ) and β i ( t ) denote the step sizes for each iteration. Based on this, by selecting a sufficiently small step size, the gradient method convergence is guaranteed and the optimal power allocation will be achieved [37]. The pseudocode for solving algorithm shown in Algorithm 1.
Algorithm 1: The pseudocode for solving algorithm: two step solving algorithm
Sensors 17 00175 i001

5. Simulation Results

This section investigates the performance of the proposed opportunistic capacity-based resource allocation algorithm using numerical simulations. We assume that all SUs are randomly located around the SU sink and that the simulation parameters are set as shown in Table 1. To simulate the time-varied spectrum environment caused by PU/SU activity and mobility, we randomly generate spectrum holes and divide them into chunks in which the available capacity changes based on a chunk capacity change rate p (which denotes the probability of the chunk capacity changing in the next moment). Then, we compare the performance of the proposed opportunistic capacity-based resource allocation algorithm with the traditional chunk-based resource allocation [24] and the sub-carrier-based resource allocation algorithm ( n = 1 ).
Figure 4 depicts the average throughput with different chunk capacity change rates p for different chunk sizes ( n = 10 and n = 20 ). In Figure 4, as p increases, the average throughput decreases noticeably due to bandwidth collisions caused by the fast spectrum changes. The sub-carrier-based allocation has similar behavior as the opportunistic capacity-based allocation ( n = 10 ) in p < 0.3 part because of the flexible sub-carrier allocation. However, as p increases, the sub-carrier-based allocation has a serious performance degradation because it only considers current static optimization and can hardly adapt the dynamic spectrum environment. Moreover, compared with the chunk-based allocation, the sub-carrier-based allocation introduces more computational complexity since the assignable units increased by n times. The traditional chunk-based allocation method achieves lower average throughput than does the opportunistic capacity-based allocation method because the former considers only the current static optimal, and it uses constant allocation parameters, which leads to more bandwidth collisions. In the n = 10 scenario, the throughput gap between the opportunistic capacity-based allocation and traditional chunk-based allocation is small when p = 0.1 . However, as p increases, the opportunistic capacity-based allocation method increasingly outperforms the traditional chunk-based allocation, which shows that the opportunistic capacity-based allocation method adapts better to situations with frequency time-varied spectrum environments and can achieve high spectrum efficiency. This occurs because the traditional chunk-based allocation method is unable to follow the fast-changing spectrum environment in real time. The spectrum changes occur quickly, but the opportunistic capacity-based allocation, using its dynamic optimization method, reduces bandwidth collisions by considering the statistical properties of chunks. In addition, when the number of sub-carriers in chunks increase (the n = 20 scenario), the average throughput is lower than when n = 10 , showing that large chunks reduce the throughput because they are less flexible. Besides, because there are massive rounds of spectrum changes (1000 rounds in our simulation), the average throughput will approach the values achieved by taking the expectation of chunk capacity as the changed chunk capacity. So the average throughput approaches a linear manner since p changed in a linear manner.
Figure 5 shows the number of SUs accessing the network at different chunk capacity change rates p and different chunk sizes ( n = 10 and n = 20 ). In the figure, as p increases, the SU access number decreases due to bandwidth collisions. The sub-carrier-based allocation achieves well performance in p < 0.3 part due to the flexible sub-carrier allocation, but its performance decreased rapidly as p increased. This is because the spectrum changes will cause the sub-carrier collisions and greatly degrade its performance. The opportunistic capacity-based allocation scheme behaves well in this scenario, which has a time-varied spectrum environment. This occurs because compared with the traditional chunk-based allocation and the sub-carrier-based allocation methods, opportunistic capacity-based allocation takes the opportunistic capacity of chunks into consideration and, thus, can ensure that the SUs’ data rate requirements are met and also reduce the impact of bandwidth collisions when the spectrum environment changes. In addition, the number of SUs accessing the network under the opportunistic capacity-based allocation method falls less as p increases in both the n = 10 and n = 20 scenarios. This result shows that the proposed method can obtain good performance with different chunk sizes.
Figure 6 shows the average spectrum collision rate with different chunk capacity change rates p for different chunk sizes ( n = 10 and n = 20 ). From Figure 6, we can see that as p increases, the spectrum collision rate increases dramatically due to the fast-changing spectrum environment. In such scenarios, the opportunistic capacity-based allocation method achieves a lower collision rate than the traditional chunk-based allocation and sub-carrier-based allocation. This occurs because the opportunistic capacity-based allocation reduces bandwidth collisions by assigning spectrum resources while considering the statistical properties of chunks. This result shows that opportunistic capacity-based allocation can effectively minimize the spectrum collision rate when the spectrum environment changes. In the n = 20 scenario, the spectrum collision rate of the opportunistic capacity-based allocation almost the same as when n = 10 , which also implies that the spectrum collision rate is not susceptible to variations in chunk size. In addition, the average spectrum collision rate approaches a linear manner because of the similar reasons for the average throughput.

6. Conclusions

In this paper, we investigated resource allocation for chunk-based multi-carrier CRSNs, where the available spectrum resources vary over time due to PU/SU activity and mobility. We presented a novel opportunistic capacity model using a CTSMC to describe the time-varied spectrum resources of chunks. This approach established a joint power and chunk allocation model based on the opportunistic capacity of chunks for chunk-based multi-carrier CRSNs with time-varied spectrum resources. To reduce the computational complexity, we split this model into two sub-problems and solved them via the Lagrangian dual method. Simulation results showed that the proposed opportunistic capacity-based resource allocation achieves better performance than the traditional chunk-based allocation algorithms in time-varied spectrum environments.

Acknowledgments

This work was funded by the National Natural Science Foundation of China (No. 61501065, 61601067, No. 61571069 and No. 91438104), the Fundamental Research Funds for the Central Universities (No. 106112015CDJXY160002, No. 106112016CDJXY160001) and the Chongqing Research Program of Basic Research and Frontier Technology (No. CSTC2016JCYJA0021).

Author Contributions

Huang Jie wrote this paper and did most of the theoretical derivation and simulations. Zeng Xiaoping and Jian Xin offered the idea of this research. Tan Xiaoheng and Zhang Qi analyzed the simulation result and revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Iqbal, M.; Naeem, M.; Anpalagan, A.; Ahmed, A.; Azam, M. Wireless Sensor Network Optimization: Multi-Objective Paradigm. Sensors 2015, 15, 17572–17620. [Google Scholar] [CrossRef] [PubMed]
  2. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless Sensor Network Survey. Comput. Netw. 2008, 12, 2292–2330. [Google Scholar] [CrossRef]
  3. Mustapha, I.; Mohd, A.B.; Rasid, M.F.; Sali, A.; Mohamad, H. An Energy-Efficient Spectrum-Aware Reinforcement Learning-Based Clustering Algorithm for Cognitive Radio Sensor Networks. Sensors 2015, 15, 19783–19818. [Google Scholar] [CrossRef] [PubMed]
  4. Lin, Y.; Wang, C.; Wang, J.X.; Dou, Z. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks. Sensors 2016, 16, 1675. [Google Scholar] [CrossRef] [PubMed]
  5. Zhao, Y.X.; Hong, Z.M.; Wang, G.D.; Huang, J. High-Order Hidden Bivariate Markov Model: A Novel Approach on Spectrum Prediction. In Proceedings of the 2016 International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 27–31.
  6. Ding, G.R.; Wu, Q.H.; Yao, Y.D.; Wang, J.L.; Chen, Y.Y. Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions. IEEE Signal Process. Mag. 2013, 4, 126–136. [Google Scholar] [CrossRef]
  7. Sun, H.J.; Nallanathan, A.; Wang, C.X.; Chen, Y.F. Wideband Spectrum Sensing for Cognitive Radio Networks: A Survey. IEEE Wirel. Commun. 2013, 2, 74–81. [Google Scholar]
  8. Sharma, S.K.; Bogale, T.E.; Chatzinotas, S.; Ottersten, B.; Le, L.B.; Wang, X.B. Cognitive Radio Techniques Under Practical Imperfections: A Survey. IEEE Commun. Surv. Tutor. 2015, 4, 1858–1884. [Google Scholar] [CrossRef]
  9. Akan, O.B.; Karli, O.B.; Ergul, O. Cognitive Radio Sensor Networks. IEEE Netw. 2009, 4, 34–40. [Google Scholar] [CrossRef]
  10. Goh, H.G.; Kwong, K.H.; Shen, C.; Michie, C.; Andonovic, I. CogSeNet: A Concept of Cognitive Wireless Sensor Network. In Proceedings of the 2010 IEEE Conference on Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2010; pp. 939–940.
  11. Ding, G.R.; Wang, J.L.; Wu, Q.H.; Song, F.; Chen, Y.Y. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate? IEEE Sens. J. 2013, 11, 4247–4255. [Google Scholar] [CrossRef]
  12. Filio, O.; Primak, S.; Kontorovich, V.; Shami, A. On a Cognitive Radio Network’s Random Access Game with a Poisson Number of Secondary Users. IEEE Commun. Lett. 2015, 10, 1818–1821. [Google Scholar] [CrossRef]
  13. Namvar, N.; Afghah, F. Spectrum Sharing in Cooperative Cognitive Radio Networks: A Matching Game Framework. In Proceedings of the 2015 Information Sciences and Systems (CISS), Baltimore, MD, USA, 18–20 March 2015; pp. 309–413.
  14. Li, Y.; Zhao, L.L.; Wang, C.G.; Daneshmand, A.; Hu, Q. Aggregation-Based Spectrum Allocation Algorithm in Cognitive Radio Networks. In Proceedings of the 2012 Network Operations and Management Symposium (NOMS), Maui, HI, USA, 16–20 April 2012; pp. 506–509.
  15. Teotia, V.; Kumar, V.; Minz, S. Conflict Graph Based Channel Allocation in Cognitive Radio Networks. In Proceedings of the 2015 Reliable Distributed Systems Workshop (SRDSW), Montreal, QC, Canada, 28–30 September 2015; pp. 52–56.
  16. Wu, F.; Mao, Y.; Leng, S.; Huang, X. A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless Networks. In Proceedings of the 2011 Autonomic and Secure Computing (DASC), Sydney, Australia, 12–14 December 2011; pp. 196–201.
  17. Li, C.B.; Liu, W.; Liu, Q.; Li, C. Spectrum Aggregation Based Spectrum Allocation for Cognitive Radio Networks. In Proceedings of the 2014 Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 1626–1631.
  18. Jalaeian, B.; Zhu, R.; Motani, M. An Optimal Scheduling Framework for Concurrent Transmissions in Wireless Cognitive Radio Networks. Telecommun. Syst. 2015, 1, 169–177. [Google Scholar] [CrossRef]
  19. Saleem, Y.; Rehmani, M.H. Primary Radio User Activity Models for Cognitive Radio Networks: A Survey. J. Netw. Comput. Appl. 2014, 1, 1–16. [Google Scholar] [CrossRef]
  20. Riihijärvi, J.; Nasreddine, J.; Mähönen, P. Impact of Primary User Activity Patterns on Spatial Spectrum Reuse Opportunities. In Proceedings of the 2010 European Wireless Conference (EW), Lucca, Italy, 12–15 April 2010; pp. 962–968.
  21. Csurgai, L.; Bito, J. Primary and Secondary User Activity Models for Cognitive Wireless Network. In Proceedings of the 2011 International Conference on Telecommunications (ConTEL), Zagreb, Croatia, 15–17 June 2011; pp. 301–306.
  22. Khabazian, M.; Aissa, S.; Tadayon, N. Performance Modeling of a Two-Tier Primary-Secondary Network Operated with IEEE 802.11 DCF Mechanism. IEEE Trans. Wirel. Commun. 2012, 9, 3047–3057. [Google Scholar] [CrossRef]
  23. Zhu, H.; Wang, J. Chunk-Based Resource Allocation in OFDMA Systems—Part I: Chunk Allocation. IEEE Trans. Commun. 2009, 9, 2734–2744. [Google Scholar]
  24. Zhu, H.; Wang, J. Chunk-Based Resource Allocation in OFDMA Systems—Part II: Joint Chunk, Power and Bit Allocation. IEEE Trans. Commun. 2012, 2, 499–509. [Google Scholar] [CrossRef]
  25. Zhao, Y.X.; Anjum, M.N.; Song, M.; Xu, X.H.; Wang, G.D. Optimal Resource Allocation for Delay Constrained Users in Self-Coexistence WRAN. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), Austin, TX, USA, 6–10 December 2015; pp. 387–391.
  26. Xu, D.; Li, Q. Energy Efficient Joint Chunk and Power Allocation for Chunk-Based Multi-Carrier Cognitive Radio Networks. In Proceedings of the 2015 Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; pp. 568–572.
  27. Xu, D.; Li, Q.; Sun, X. Resource Allocation for Chunk-Based Multi-Carrier Cognitive Radio Networks. In Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC), Sydney, Australia, 7–10 September 2014; pp. 445–450.
  28. Zhao, Y.X.; Pradhan, J.; Wang, G.D.; Huang, J. Experimental Approach: Two-Stage Spectrum Sensing Using GNU Radio and USRP to Detect Primary User’s Signal. In Proceedings of the 2016 Annual ACM Symposium on Applied Computing (SAC), Pisa, Italy, 4–8 April 2016; pp. 2165–2170.
  29. López, M.; Casadevall, F. Time-Dimension Models of Spectrum Usage for the Analysis, Design, and Simulation of Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2013, 5, 2091–2104. [Google Scholar] [CrossRef]
  30. Chen, X.L. Queue Theory in Modern Communications; Electronic Industry Press: Beijing, China, 1999; pp. 145–146. [Google Scholar]
  31. Ibe, O. Markov Processes for Stochastic Modeling; Chapman & Hall: London, UK, 2013; pp. 173–174. [Google Scholar]
  32. Casella, G.; Berger, R.L. Statistical Inference; Duxbury: Belmont, MA, USA, 2002; pp. 284–287. [Google Scholar]
  33. Foschini, G.J.; Salz, J. Digital Communications over Fading Radio Channels. Bell Syst. Tech. J. 1983, 2, 429–456. [Google Scholar] [CrossRef]
  34. Liu, B.D.; Zhao, R.Q. Stochastic Programming and Fuzzy Programming; Tsinghua University Press: Beijing, China, 1998; pp. 66–67. [Google Scholar]
  35. Wang, R.; Lau, V.K.N.; Lv, L.J.; Chen, B. Joint Cross-Layer Scheduling and Spectrum Sensing for OFDMA Cognitive Radio Systems. IEEE Trans. Wirel. Commun. 2009, 5, 2410–2416. [Google Scholar] [CrossRef]
  36. Ding, G.R.; Wu, Q.H.; Wang, J.L. Sensing Confidence Level-Based Joint Spectrum and Power Allocation in Cognitive Radio Networks. Wirel. Pers. Commun. 2013, 1, 283–298. [Google Scholar] [CrossRef]
  37. Stephen, B.; Lieven, V. Convex Optimization; Cambridge University Press: London, UK, 2004; pp. 445–454. [Google Scholar]
Figure 1. System model of cognitive radio sensor networks (CRSNs).
Figure 1. System model of cognitive radio sensor networks (CRSNs).
Sensors 17 00175 g001
Figure 2. The state transition model for the number of idle sub-carriers in a chunk.
Figure 2. The state transition model for the number of idle sub-carriers in a chunk.
Sensors 17 00175 g002
Figure 3. The procedure for chunk allocation.
Figure 3. The procedure for chunk allocation.
Sensors 17 00175 g003
Figure 4. Average throughput with different chunk capacity change rates p .
Figure 4. Average throughput with different chunk capacity change rates p .
Sensors 17 00175 g004
Figure 5. Number of secondary users (SUs) accessing the network with different chunk capacity change rates p .
Figure 5. Number of secondary users (SUs) accessing the network with different chunk capacity change rates p .
Sensors 17 00175 g005
Figure 6. Average spectrum collision rate with different chunk capacity change rates p .
Figure 6. Average spectrum collision rate with different chunk capacity change rates p .
Sensors 17 00175 g006
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Maximum tolerable error rate P b 10 6
SU number A M U N 40
Sub-carrier bandwidth B W 20 KHz
Sub-carrier number S 400
Sub-carrier number in each chunk n 10–20
Rician fading channel factor K 3
Noise power N 0 B −111 dBm
Chunk capacity change rate p 0.1~1

Share and Cite

MDPI and ACS Style

Huang, J.; Zeng, X.; Jian, X.; Tan, X.; Zhang, Q. Opportunistic Capacity-Based Resource Allocation for Chunk-Based Multi-Carrier Cognitive Radio Sensor Networks. Sensors 2017, 17, 175. https://doi.org/10.3390/s17010175

AMA Style

Huang J, Zeng X, Jian X, Tan X, Zhang Q. Opportunistic Capacity-Based Resource Allocation for Chunk-Based Multi-Carrier Cognitive Radio Sensor Networks. Sensors. 2017; 17(1):175. https://doi.org/10.3390/s17010175

Chicago/Turabian Style

Huang, Jie, Xiaoping Zeng, Xin Jian, Xiaoheng Tan, and Qi Zhang. 2017. "Opportunistic Capacity-Based Resource Allocation for Chunk-Based Multi-Carrier Cognitive Radio Sensor Networks" Sensors 17, no. 1: 175. https://doi.org/10.3390/s17010175

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop