Next Article in Journal
Energy-Saving Traffic Scheduling in Hybrid Software Defined Wireless Rechargeable Sensor Networks
Next Article in Special Issue
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Previous Article in Journal
Resonance Frequency Readout Circuit for a 900 MHz SAW Device
Previous Article in Special Issue
On Optimal Cooperative Sensing with Energy Detection in Cognitive Radio
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks

1
School of Information and Electrical Engineering, Hebei University of Engineering, Handan 056038, China
2
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
3
China Telecommunication Technology Labs-Terminals, China Academy of Information and Communications Technology, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(9), 2132; https://doi.org/10.3390/s17092132
Submission received: 13 August 2017 / Revised: 9 September 2017 / Accepted: 13 September 2017 / Published: 15 September 2017
(This article belongs to the Special Issue Cognitive Radio Sensing and Sensor Networks)

Abstract

:
The data sequence of spectrum sensing results injected from dedicated spectrum sensor nodes (SSNs) and the data traffic from upstream secondary users (SUs) lead to unpredictable data loads in a sensor network-aided cognitive radio ad hoc network (SN-CRN). As a result, network congestion may occur at a SU acting as fusion center when the offered data load exceeds its available capacity, which degrades network performance. In this paper, we present an effective approach to mitigate congestion of bottlenecked SUs via a proposed distributed power control framework for SSNs over a rectangular grid based SN-CRN, aiming to balance resource load and avoid excessive congestion. To achieve this goal, a distributed power control framework for SSNs from interior tier (IT) and middle tier (MT) is proposed to achieve the tradeoff between channel capacity and energy consumption. In particular, we firstly devise two pricing factors by considering stability of local spectrum sensing and spectrum sensing quality for SSNs. By the aid of pricing factors, the utility function of this power control problem is formulated by jointly taking into account the revenue of power reduction and the cost of energy consumption for IT or MT SSN. By bearing in mind the utility function maximization and linear differential equation constraint of energy consumption, we further formulate the power control problem as a differential game model under a cooperation or noncooperation scenario, and rigorously obtain the optimal solutions to this game model by employing dynamic programming. Then the congestion mitigation for bottlenecked SUs is derived by alleviating the buffer load over their internal buffers. Simulation results are presented to show the effectiveness of the proposed approach under the rectangular grid based SN-CRN scenario.

1. Introduction

Cognitive radio (CR) [1] has newly emerged as a promising solution to improve the spectrum utilization by allowing unlicensed secondary users (SUs) to access the idle licensed spectrum. In a CR network (CRN), SUs can periodically sense the licensed spectrum and opportunistically access the spectrum holes or spectrum opportunities (SOPs) unoccupied by primary users (PUs). Most of the existing research efforts in CRNs mainly focus on the issues of the physical and MAC layers for an infrastructure-based single hop scenario, such as spectrum sensing, spectrum access and sharing techniques [2,3,4]. In addition, SUs can also form a multi-hop ad hoc network without the support of infrastructure. In a cognitive radio ad hoc network (CRANET) [5], SUs can only access the SOPs by seeking to underlay, overlay, or interweave their signals with those of the existing PUs without significantly impacting their communications.
Spectrum sensing is one of the key enabling technologies for the establishment of CRNs, because it constantly allows for the opportunistic identification and use of the SOPs from a licensed primary network without causing harmful interference to the PUs. In order to improve the sensing performance, collaborative spectrum sensing has been proposed as an effective way to reliably detect the activity of PUs by addressing the issues imposed by the hidden PU terminal problem and the wireless channel impairments, such as the heavy shadowing and fading [6,7,8]. In this way, cooperation is achieved by allowing different SUs to collaborate and share their spectrum sensing results (SSR) through a fusion center (FC), which makes a global decision on the occupancy status of the licensed band. However, this centralized FC is not available in decentralized CRANETs. Clearly, each SU under this scenario must perform the distributed collaborative spectrum sensing, which is preferred to the centralized FC scheme because of its scalability, fault tolerance and flexibility [9].
In order to facilitate the spectrum sensing functionality, high sampling rates, high resolution analog to digital converters with large dynamic range, and high speed signal processors are required to be incorporated into an individual SU transceiver [10], which increases hardware cost and power consumption, especially for the double-radio sensing architecture of SU transceiver. An alternative approach is to adopt the cost-effective and dedicated spectrum sensor nodes (SSNs) that perform distributed collaborative spectrum sensing and report SSR to SUs acting as FCs in CRANETs [11]. Technically, s wireless sensor network can be naturally exploited to assist a CRANET by providing SSR about the current spectrum occupancy of PUs in a cooperation fashion. The concept of sensor network embedded into CRANETs has further called sensor network-aided CRANETs (SN-CRNs), which has been considered as one of the most appealing approaches to perform cost-effective spectrum sensing in CR systems [7,11,12].
Similar to most other traditional wireless networks or wireline Internet, network congestion in SN-CRNs will also occur when offered data load that exceed the available capacity of a SU due to buffer overflow caused by the data sequence of the SSR injected from SSNs together with the data traffic from upstream SUs. This therefore leads to energy consumption of SSNs, aggressive retransmission, queuing delay, and blocking of new flows from upstream SUs. Indubitably, a congestion control technique in the transport layer is essential to balance resource loads and avoid excessive congestion. However, the congestion control mechanism for the traditional Transmission Control Protocol (TCP) via the acknowledgement-triggered or window-based methods was initially designed and optimized to perform in reliable wired links with constrained bit error rates and round trip times (RTTs) [13]. A recent study [14] has reported that the performance of HTTP download deteriorates as much as about 40% under the TCP window control in an IEEE P1900.4 based cognitive wireless system by using User Datagram Protocol (UDP) and TCP transport protocols. On the other hand, some other research efforts about congestion control have also been conducted from the perspective of finding methods to modify the TCP protocol, such as TCP monitoring delayed acknowledgment, segment-based selective acknowledgement, TCP adaptive delayed-acknowledgment window, etc. [15], aiming to accommodate the challenging multi-hop wireless environments. Unfortunately, it has been shown that these methods of TCP modification and extension cannot be directly applied into SN-CRNs due to sudden large-scale bandwidth fluctuation, periodic interruption caused by spectrum sensing and channel switching [16].
Recently, there have also been previous works on congestion control for multi-hop CRANETs from a cross-layer design perspective. In [17], an end-to-end congestion control framework was proposed under the constraint of the non-uniform channel availability by taking into account the interactions from the physical layer to the transport layer. In [18], a cross-layer framework for joint optimization of MAC, scheduling, routing and congestion control was presented to maximize the throughput of a set of multi-hop end-to-end packet flows. However, the end-to-end control policy in [17,18] is ill suited for operation over wireless links characterized by higher RTTs. On the contrary, the hop-by-hop control reacts to congestion faster where the rates are adjusted at intermediate SUs by feedback information about the congestion state of congested SUs. A cross-layer framework to jointly achieve both congestion and power control through a non-convex optimization method was proposed in [19]. In [20], an optimization framework achieving tradeoff between energy efficiency and network utility maximization was devised, which can jointly balance interference, collision, and congestion among SUs by adjusting transmit power, persistence probability, together with data rate simultaneously via interaction between MAC and other layers. However, the proposed frameworks in [19,20] are just suited to mitigate the congestion caused by the data traffic from upstream SUs in multi-hop CRANETs, ignoring the impact of the data sequence of the SSR injected from SSNs on the congestion of SUs.
To the best of our knowledge, aside from some studies on congestion control for CRANETs as mentioned before, there is no related work reported in the literature related to congestion control over SN-CRNs. As a result, there is a strong motivation to explore congestion mitigation approach in SN-CRNs. Under this scenario, it is certainly not a surprise that the channel capacity between any SSN and FC is a concave function of the transmit power of this SSN and channel conditions [21]. In principle, effective transmit power control strategies have been widely used to maximize the total system capacity in conventional celluar wireless networks while adapting to the changing channel and interference conditions. Recent research efforts have achieved the capacity and energy efficiency maximization by devising the optimal power allocation on subchannels in two-tier femtocell networks based on orthogonal frequency division multiple access (OFDMA) [22], together with the optimal power control allocation and sensing time optimization in OFDMA cognitive small cell networks [23]. In addition, the transmission rate of this SSN always depends on channel capacity and is also a function of the transmit power according to the Shannon channel theorem. Thus, the congestion at FC can be controlled and mitigated through the transmission rate adjustment with the help of an optimal power allocation policy for this SSN in the physical layer. During a time interval, the amount of bits of the data sequence of SSR transmitted from this SSN to FC also approximately depends on the channel capacity [24]. For this observation it turns out that we can fully achieve the congestion mitigation for FC by reducing the amount of bits of the data sequence of the SSR transmitted from this SSN, aiming to release the capacity of the internal buffer for FC. In this paper, we propose a congestion mitigation approach by constructing a distributed power control framework for SSNs over the rectangular grid based SN-CRN. The main contributions of this paper are summarized as follows:
  • To evaluate the performance of local spectrum sensing, we present the relative divergence between the detection probability and the false alarm probability for each SSN under any uplink channel via the Kullback-Leibler divergence framework. By the aid of mathematical statistics, we obtain the detection probability and false alarm probability distributions for each SSN, and also model the stability metric of local spectrum sensing as the relative divergence by applying the entropy modeling framework.
  • We propose a distributed power control framework for SSNs from the interior tier (IT) and middle tier (MT) perspective in order to achieve the tradeoff between channel capacity and energy consumption. In particular, the power control problem is formulated as a differential game model by taking into account the utility function maximization together with the linear differential equation constraint with respect to energy consumption. We further present the theoretical results of the optimal solutions to this differential game model in a cooperative or noncooperative manner by using dynamic programming.
  • With the help of the proposed distributed power control framework, we attain the congestion mitigation for bottleneck SU by alleviating its buffer load over its internal buffer. We also rigorously analyze the impact of noncooperative and cooperative optimal transmit power for IT and MT SSNs on the internal buffer of bottleneck SU, respectively.
The rest of paper is organized as follows: Section 2 describes the system model. In Section 3, we present the spectrum sensing quality analysis method based on local spectrum sensing by SSNs. In Section 4, we formulate the distributed power control for IT and MT SSNs as a differential game model, and derive the noncooperative and cooperative optimal solutions. The congestion mitigation approach for bottleneck SU is analyzed rigorously in Section 5. Section 6 presents the simulation results. Finally, Section 7 concludes the paper.

2. System Model

2.1. Primary Network and Cognitive Radio ad hoc Network Model

We consider an underlay SN-CRN coexisting with a cellular primary network involving N P PUs and N S SUs in a torus area Ω S = [ 0 , N S / ρ ] 2 ( ρ is the spatial density of SUs) sharing the spectrum within the same frequency band simultaneously, as depicted in Figure 1. Particularly, PUs have the full privilege of accessing their allocated frequency band whereas SUs can opportunistically utilize idle channels unoccupied by the PUs. In the cellular primary network, PUs send their data traffic to the primary base station (PBS) via the licensed uplink channels constituting a channel set C = { 1 , 2 , , N c } . We employ the independent and identically distributed alternating ON-OFF process to model the occupation time length of PUs in uplink channels. Specifically, the OFF state indicates the idle state where the unoccupied uplink channels or the SOPs can be freely occupied by SUs.
In CRANET, SUs denoted by a set N S = { 1 , 2 , , N S } can only leverage the OFF state to access the SOPs over the idle authorized uplink channels. Due to the randomness of data traffic and the dynamic behavior of PUs, we suppose that the SOPs are available for usage by SU i with a probability of δ i , for i N S . With the aid of the ON-OFF process to characterize the status of the uplink channels, the occupancy probability of the k-th uplink channel by PUs can be given by α k / ( α k + β k ) , where α k is probability that the k-th uplink channel transits from OFF to ON state, and β k is probability that the k-th uplink channel transits from ON to OFF state, for k C . We also assume that the occupancy probability of uplink channels by PUs can be acquired by SUs through a priori knowledge of the local spectrum sensing. By bearing in mind the mutually independent occupancy probability of the k-th uplink channel, the SOP usage probability δ i of SU i during time interval [ t 0 , T ] is formulated as follows:
δ i = k = 1 N c ( 1 α k α k + β k ) , i = 1 , , N s
Let ϑ i ( t ) and B i denote the amount of data traffic in the buffer of SU i at time t [ t 0 , T ] and the buffer size of SU i, respectively. The buffer of SU i generally consists of two buffer segments that can hold the offered data load including data traffic injected from upstream SUs and the data sequence of SSR transmitted from SSNs, respectively. Given a time interval Δ t , the first buffer segment of SU i called as the forward buffer holds the amount of data traffic injected from upstream SUs denoted by ϑ i F ( Δ t ) . Meanwhile, the second buffer segment of SU i known as the internal buffer is used to store the amount of the data sequence of SSR transmitted from SSNs denoted by ϑ i I ( Δ t ) . Thus, the amount of aggregate data traffic from upstream SUs and SSNs in the buffer of SU i with a time interval Δ t can be formulated as φ i ( Δ t ) = ϑ i F ( Δ t ) + ϑ i I ( Δ t ) . Then, for a given time interval Δ t , the amount of data traffic ϑ i ( t ) in buffer of SU i at time t evolves as follows:
ϑ i ( t + Δ t ) = min { ϑ i ( t ) + φ i ( Δ t ) , B i } ( Λ i ( Δ t ) + χ i ( Δ t ) )
where Λ i ( Δ t ) and χ i ( Δ t ) stand for the amount of data traffic successfully delivered by SU i and the amount of the data sequence of SSR removed by SU i within a time interval Δ t , respectively. It is worth noting that the received data sequence of SSR will be removed by SU i within a time interval Δ t in order to free storage capacity of the internal buffer.
Remark 1.
From Figure 1, there are | N I T | + | N E T | hop-by-hop fluid flows of the data sequence of SSR injected from SSNs to a single SU (i.e., FC), in addition to the amount of data traffic from upstream SUs. Apparently, this single SU, also known as a possible bottlenecked SU, is a little more inclined to be a congested SU node as a consequence of its buffer overflow. For convenience, the terms bottlenecked SU is used in the following to describe a possible congested SU. It is worth noting that our work in this paper mainly concentrates on how to attain effective congestion mitigation for a single possible congested SU due to buffer overflow caused by the data sequence of SSR injected from SSNs by means of the proposed distributed power control framework for SSNs. However, it is conceivable that the amount of data traffic from upstream SUs may also lead to the congestion of bottlenecked SUs. This problem can be resolved by the specific congestion control technique (e.g., [25]) which is out of the scope of this work.

2.2. Sensor Network Model

As shown in Figure 1, we consider a rectangular grid based sensor network deployed in Ω S to provide the SSR about real-time spectrum availability information to SUs. Each SSN is equipped with a single omnidirectional antenna, a predefined common control channel (CCC), and an energy detector that continuously senses the entire primary licensed uplink channels through individual local real-time measurement. We suppose that the distributed collaborative spectrum sensing is carried out by multiple collaborating SSNs to enhance the sensing performance. Also, each SU serves as the FC collecting the SSR and then makes a global decision on the availability of the monitored uplink channels via a decision fusion rule, e.g., OR-rule fusion mechanism [7]. All SSNs simultaneously communicate to SUs over a narrowband additive white Gaussian noise (AWGN) multiple-access channel with the channel bandwidth denoted by W . The horizontal or vertical distance between any SSNs in rectangular grid is initialized to be d . According to the location of each SU along with the distance between SSN and the corresponding SU, we define the set of SSNs center around the SU as a tier in rectangular grid. More specifically, the three-tier structure is exploited to organize SSNs into three groups due to the simplicity of implementation as shown in Figure 1, including an interior tier (IT) denoted by a set N I T = { 1 , , n I T } with n I T = 4 , a middle tier (MT) denoted by a set N M T = { 1 , , n M T } with n M T = 8 , and an exterior tier (ET) denoted by a set N E T = { 1 , , n E T } with n E T = 12 .
Remark 2.
Because of multiple SUs sharing the authorized uplink channels with PUs, one SSN may also belong to the different tiers based on the presented division criterion to devise the three-tier structure as stated previously. It is important to emphasize that our work in this paper is mainly aimed to study congestion mitigation approaches for one single possible congested SU under the scenario of the single three-tier structure of SSNs. The underlying scenario of the superimposed three-tier structures to organize SSNs is beyond the scope of this work. However, the results about our proposed distributed power control framework for SSNs are easily extendable to the superimposed three-tier structures.
We devise a time-slotted frame structure for sensor network, as illustrated in Figure 2, where each frame with duration T F is divided into different slots according to the types of tiers. Let φ be the number of time-slotted frames within time interval [ t 0 , T ] . Clearly, the time-slotted frame duration is given by T F = ( T t 0 ) / φ . We assume that all SSNs from three tiers perform their operations simultaneously from the beginning of each time-slotted frame. We denote by τ s the fraction of frame duration T F for the slot of spectrum sensing, and denote by τ r p the fraction of frame duration T F for the slot of SSR reporting to the bottlenecked SU. We also use τ f E T to represent the slot of SSR forwarding from ET SSNs to neighbor MT SSNs, and use τ r c M T to denote the slot of SSR receiving by MT SSNs. During the remaining time, i.e., T F τ s τ f E T for ET, T F τ s τ r c M T τ r p for MT, and T F τ s τ r p for IT, SSNs will go into sleep mode to save energy.
During the slot τ r p , the data sequence of the SSR will be transmitted by IT and MT SSNs to bottleneck SU. For analytical simplicity, we assume that the starting time and the terminal time of the slot τ r p are equal to t 0 and t 0 + τ r p for both IT and MT SSNs, respectively. The instantaneous transmit power of the m-th SSN from IT or MT at time t [ t 0 , t 0 + τ r p ] , denoted by p m ( t ) , can be adjusted in a continuous way but is also limited by a maximum value P m max , i.e., 0 p m ( t ) P m max . In the case of the simultaneous communications by IT and MT SSNs over an AWGN multiple-access channel, p m ( t ) should satisfy an average power constraint given as follows to mitigate the interference among IT and MT SSNs [26]:
{ 1 n I T m = 1 n I T p m ( t ) P a v I T , m N I T 1 n M T m = 1 n M T p m ( t ) P a v M T , m N M T
where P a v I T and P a v M T are the total average power assigned to IT and MT SSNs, respectively. We assume that each SSN knows its distance d m b from bottleneck SU b via the CCC and the channel path gain h m b from the m-th SSN to the bottlenecked SU b can be expressed as h m b = ( d m b ) κ , where κ 2 is the path-loss exponent and b N S . Thus, the channel capacity between the m-th SSN and bottlenecked SU b can be characterized by a concave function of the transmit power and channel conditions as follows [27]:
C m b = W log 2 ( 1 + p m ( t ) K | h m b | 2 N 0 W )
where K is a constant that depends on the transmission frequency and N 0 is the noise power spectral density. Under this channel capacity formulation, the signal-to-noise ratio (SNR) between the m-th SSN and bottlenecked SU b is given by:
γ m = p m ( t ) K | h m b | 2 N 0 W
Remark 3.
It is assumed that the data sequence of the SSR will be forwarded by ET SSNs to neighbor MT SSNs via a single-hop fashion during the slot τ f E T . Let t 0 and t 0 + τ f E T denote the starting time and the terminal time of the slot τ f E T , respectively. The transmit power p n ( t ) of the n-th SSN from ET at time t [ t 0 , t 0 + τ f E T ] is limited to a maximum transmit power P n max , for 0 p n ( t ) P n max and n N E T . It is clear that the neighbor MT SSN with the shortest distance will be selected by an ET SSN as the next-hop SSN to save energy during the SSR forwarding period. In other words, the selection metric for the next-hop SSN by an ET SSN is only dependent on the distance between neighbor MT SSN and itself. Owing to the scenario of the rectangular grid based sensor network, it should be admitted that the shortest distance between ET SSN and neighbor MT SSN is equal to d for any ET SSN. Therefore, the n-th SSN from ET is inclined to hold the same transmit power p n ( t ) at time t . Under an AWGN multiple-access channel, the average power constraint should also be satisfied for all ET SSNs, i.e., n N E T p n ( t ) n E T P a v E T , where P a v E T is the total average power assigned to ET SSNs. Thus, our work in this paper primarily focuses on the distributed power control for IT and MT SSNs.
Remark 4.
The channel capacity C m b in Equation (4) will be rigorously guaranteed if the channel state information (CSI) including the channel path gain h m b and constant K is perfectly known at the m-th SSN which transmits the data sequence of the SSR. In practice, the perfect knowledge of the CSI measured at the m-th SSN side cannot be available because of time-varying wireless channel impairments along with hardware limitations [28,29]. How to model the uncertain relation between the channel path gain h m b or constant K and their estimates by taking into account the effect of imperfect CSI and outage constraint on distributed power control for IT and MT SSNs will be our further work in future.

2.3. Local Spectrum Sensing Model

We denote by 1 and 0 the binary hypotheses of the presence and absence of the PU on the uplink channel, respectively. Without loss of generality, we choose the m-th SSN from the three-tier structure of sensor network to describe its local spectrum sensing model during the slot τ s . This formulation can be easily extendable to the general case for any SSN from one of the tiers including IT, MT, and ET. The sampled signals that are received at the m-th SSN on the k-th uplink channel during the slot of spectrum sensing τ s are given as:
y m , k ( u ) = { h m , k s ( u ) + υ m , k ( u ) , 1 υ m , k ( u ) , 0
where s ( u ) denotes the signal from the PU on the k-th uplink channel with a sampling frequency f s , υ m , k ( u ) is the noise at the m-th SSN on the k-th uplink channel, h m , k is the channel gain between the PU and the m-th SSN on the k-th uplink channel implying Rayleigh fading. Then the number of samples that is collected by the m-th SSN on the k-th uplink channel can be defined as U s = f s τ s . We assume that the PU signal s ( u ) satisfies an independent identically distributed (i.i.d.) random process with zero mean and variance σ s 2 , and the noise υ m , k ( u ) is i.i.d. circularly symmetric complex Gaussian with zero mean and variance σ υ 2 [8]. Thus, the received SNR from the PU at the m-th SSN on the k-th uplink channel is given by γ m , k = | h m , k | 2 σ s 2 / σ υ 2 . After collecting U s received signal samples on the k-th uplink channel, the m-th SSN obtains its test statistics given as Y ( m , k ) = ( 1 / U s ) u = 1 U s | υ m , k ( u ) | 2 . Let ε m denote a decision threshold by the m-th SSN to decide whether the channel is occupied by the PU. For the m-th SSN, the probabilities of detection and false alarm on the k-th uplink channel are approximately formulated as follows [8]:
p d ( m , k ) = Pr ( Y ( m , k ) > ε m | 1 ) = Q ( ( ε m σ υ 2 γ m , k 1 ) U s 2 γ m , k + 1 )
p f ( m , k ) = Pr ( Y ( m , k ) > ε m | 0 ) = Q ( ( ε m 1 ) U s )
where Q ( ) denotes the right-tail probability of a normalized Gaussian distribution. Hence, the detection probability set P d and the false alarm probability set P f for the m-th SSN over the entire uplink channels can be further expressed as:
P d = { p d ( m , 1 ) , p d ( m , 2 ) , , p d ( m , k ) , , p d ( m , N c ) }
P f = { p f ( m , 1 ) , p f ( m , 2 ) , , p f ( m , k ) , , p f ( m , N c ) }

3. Spectrum Sensing Quality Analysis

In this section, our objective is to analyze the spectrum sensing quality of each SSN via a local spectrum sensing model, aiming to provide the quantification result with the emphasis to evaluate the spectrum sensing performance of each SSN. More importantly, the analysis results will be employed to formulate the distributed power control framework for IT and MT SSNs. By revisiting Equations (9) and (10) in local spectrum sensing model, we can observe that the detection probability p d ( m , k ) in P d and the false alarm probability p f ( m , k ) in P f can be referred to the random variables for the m-th SSN under the k-th uplink channel due to the uncertainty of the presence and absence of the PU. It is worth noting that the errors in spectrum sensing for a SSN will be generally considered negligible due to imperfect spectrum sensing [27], e.g., misdetection and false alarm caused by hardware capability of SSN and practical time-varying channel conditions. So the errors in spectrum sensing for a SSN will further incur the fact that different uplink channels will hold different probabilities of detection and false alarm. In particular, the higher the detection probability in P d , the better the PUs are protected; the lower the false alarm probability in P f , the more efficiently the uplink channel can be reutilized by SUs [7]. Based on this observation, the higher the relative divergence between p d ( m , k ) and p f ( m , k ) , the better the performance of local spectrum sensing. It has been revealed that the Kullback–Leibler divergence is an effective measure of how one probability diverges from a second probability [30]. Hence, the relative divergence between p d ( m , k ) and p f ( m , k ) for the m-th SSN under the k-th uplink channel can be defined as follows based on a Kullback–Leibler divergence framework:
D ( p d ( m , k ) p f ( m , k ) ) p d ( m , k ) log 2 p d ( m , k ) p f ( m , k )
With respect to the entire set of uplink channels, the relative divergence between P d and P f for the m-th SSN can be denoted as:
D m ( P d P f ) = k = 1 N c p d ( m , k ) log 2 p d ( m , k ) p f ( m , k )
It is noticeable that the relative divergence between the detection probability and the false alarm probability just reflects the performance of local spectrum sensing by each SSN. Viewed from the SU perspective, we are also interested in the impact of the SOP usage probability on the spectrum sensing quality. To this end, we characterize the spectrum sensing quality factor which can be expressed by a function of two parameters including the relative divergence between P d and P f along with the SOP usage probability δ b for bottleneck SU b. Specifically, the spectrum sensing quality factor m b of the m-th SSN with respect to bottleneck SU b can be defined as:
F m b δ b D m ( P d P f ) , b N S
By using mathematical statistics theory, next we start by formulating the detection probability distribution ϒ d ( m ) and the false alarm probability distribution ϒ f ( m ) , which have been derived from Algorithm 1.
Algorithm 1: Generation Procedure of Distribution ϒ d ( m ) and Distribution ϒ f ( m )
1:Input: The detection probability set P d and the false alarm probability set P f .
2:Output: The detection probability distribution ϒ d ( m ) = { ϒ 1 d ( m ) , ϒ 2 d ( m ) , , ϒ ξ d ( m ) }
  The false alarm probability distribution ϒ f ( m ) = { ϒ 1 f ( m ) , ϒ 2 f ( m ) , , ϒ ς f ( m ) } .
The detection probability distribution generation:
1:Sort the detection probability p d ( m , 1 ) , p d ( m , 2 ) , , p d ( m , N c ) in ascending order and constitute the sorted sequence as p ^ d ( 1 ) , p ^ d ( 2 ) , , p ^ d ( N c ) .
2: X d , Y d > 0 , for X d < p ^ d ( 1 ) and Y d > p ^ d ( N c ) .
3:Divide interval [ X d , Y d ] into ξ equal subintervals, i.e., X d = μ 0 d < μ 1 d < μ 2 d < μ ξ 1 d < μ ξ d = Y d .
4:for = 1 ξ do
5: μ d μ 1 d = ( Y d X d ) / ξ .
6: Calculate the number of the detection probabilities within subinterval ( μ 1 d , μ d ] denoted by n d .
7: Calculate the probability ϒ d ( m ) = n d / N c .
8:end for
9:Return: ϒ d ( m ) = { ϒ 1 d ( m ) , ϒ 2 d ( m ) , , ϒ ξ d ( m ) } .
The false alarm probability distribution generation:
1:Sort the false alarm probability p f ( m , 1 ) , p f ( m , 2 ) , , p f ( m , N c ) in ascending order and constitute the sorted sequence as p ^ f ( 1 ) , p ^ f ( 2 ) , , p ^ f ( N c ) .
2: X f , Y f > 0 , for X f < p ^ f ( 1 ) and Y f > p ^ f ( N c ) .
3:Divide interval [ X f , Y f ] into ς equal subintervals, i.e., X f = μ 0 f < μ 1 f < μ 2 f < μ ς 1 f < μ ς f = Y f .
4:for = 1 ς do
5: μ f μ 1 f = ( Y f X f ) / ς .
6: Calculate the number of the false alarm probabilities within subinterval ( μ 1 f , μ f ] denoted by n f .
7: Calculate the probability ϒ f ( m ) = n f / N c .
8:end for
9:Return: ϒ f ( m ) = { ϒ 1 f ( m ) , ϒ 2 f ( m ) , , ϒ ς f ( m ) } .
Owing to the fact that the number of the detection probabilities or the false alarm probabilities is calculated under the constraint of N c , it is clear that the distributions ϒ d ( m ) and ϒ f ( m ) fall into the complete probability distributions, i.e., = 1 ξ ϒ d ( m ) = 1 and = 1 ς ϒ f ( m ) = 1 . Apparently, the entropy paradigm should be used for a measure of the uncertainty associated with a random variable of a distribution in information theory [31], and can be also applied to measure the uncertainty of the distributions ϒ d ( m ) and ϒ f ( m ) . As a result, for the m-th SSN over the entire uplink channels, the uncertainty characterization of the distributions ϒ d ( m ) and ϒ f ( m ) can be respectively described as based on the entropy modeling framework:
H ( ϒ d ( m ) ) = = 1 ξ ϒ d ( m ) log 2 ϒ d ( m )
H ( ϒ f ( m ) ) = = 1 ς ϒ f ( m ) log 2 ϒ f ( m )
In what follows, we are also interested in gaining a better understanding of how to apply this entropy measurement to evaluate the stability of local spectrum sensing. It should be admitted that the entropy tends to be larger when the change of the random variable values in given distribution is disorder or randomness [32]. That is, a more disordered probability distribution will result in larger entropy. Thus, the better performance of spectrum sensing for the m-th SSN will bring about the more ordered probability distributions ϒ d ( m ) and ϒ f ( m ) . In this way, the stability of the distributions ϒ d ( m ) and ϒ f ( m ) will decrease because of more disorder for the values of the detection probability and false alarm probability in the distributions ϒ d ( m ) and ϒ f ( m ) . Based on the insight, we model the stability metric of local spectrum sensing by the relative divergence between the entropy of the detection probability distribution and the entropy of the false alarm probability distribution. Thus, the stability metric of local spectrum sensing for the m-th SSN over the entire uplink channels denoted by H m ( ϒ d ( m ) ϒ f ( m ) ) can be calculated as follows:
H m ( ϒ d ( m ) ϒ f ( m ) ) = | H ( ϒ d ( m ) ) H ( ϒ f ( m ) ) |

4. Distributed Power Control for Spectrum Sensor Nodes

4.1. Problem Formulation

It is considered that the channel capacity between the SSNs from IT or MT and a bottlenecked SU is a concave function of the transmit power and channel conditions. Therefore, each SSN is expected to increase the transmit power in the physical layer to provide as much channel capacity that each flow of the data sequence of the SSR requires. However, the higher transmit power will result in the more energy consumption for SSN. Meanwhile, the average power constraint will not be guaranteed for all SSNs if each SSN aims to increase the transmit power. As a consequence, it is necessary to require a tradeoff between channel capacity and energy consumption by achieving an optimal power allocation for all IT and MT SSNs in the physical layer during the slot τ r p . Under the constraint of path-loss of wireless channel, the maximum transmit power of the m-th SSN at a distance d m b is approximately equal to [33]:
P m max ( dBm ) = P 0 ( dBm ) 10 κ l o g 10 ( d m b / d 0 )
where P 0 is the receiving reference power of bottlenecked SU b at a reference distance d 0 . Because of the limitation by a maximum value P m max , the value of power reduction for the m-th SSN at time t [ t 0 , t 0 + τ r p ] can be expressed by P m max p m ( t ) . Then the power reduction efficiency for the m-th SSN can be written as ( P m max p m ( t ) ) / P m max . To formulate the revenue for power reduction by the m-th SSN, we firstly define a pricing factor for power reduction by taking into account both the power reduction efficiency and the stability metric of local spectrum sensing according to the distributions ϒ d ( m ) and ϒ f ( m ) . More precisely, we define a pricing factor by characterizing an efficiency-to-stability ratio for the m-th SSN at time t [ t 0 , t 0 + τ r p ] , denoted by m R , to describe the power reduction efficiency under the stability of local spectrum sensing, which can be defined as:
m R ( P m max p m ( t ) ) / P m max H m ( ϒ d ( m ) ϒ f ( m ) )
Thus, the revenue of the power reduction for the m-th SSN at time t [ t 0 , t 0 + τ r p ] by attaining the product of the pricing factor together with the power reduction value, i.e.,
U m R = m R ( P m max p m ( t ) )
From Equations (18) and (19), it is worth remarking that the smaller of stability metric of local spectrum sensing will generate more pricing m R and also yield more revenue U m R of the power reduction for the m-th SSN. On the other hand, it is also a natural idea for the m-th SSN to reduce its transmit power to obtain more revenue U m R according to Equation (19). To depict the cost of energy consumption for the m-th SSN, we further define another pricing factor for energy consumption, denoted by m C , by considering the spectrum sensing quality factor m i as:
m C e δ i D m ( P d P f )
Recall that the higher spectrum sensing quality factor will result in the better performance of local spectrum sensing by each SSN. As can be seen from Equation (20), it will be far more realistic to reduce the pricing m C for energy consumption for the m-th SSN with respect to the better performance of its local spectrum sensing, aiming to balance local spectrum sensing and the energy efficiency of SSN [34]. Let E m ( t ) and E A ( t ) represent the energy consumption value and the available energy value of the m-th SSN at time t , respectively. It is assumed that the available energy of the m-th SSN is derived from its battery of limited capacity and the harvesting energy from the renewable energy sources by exploiting the energy harvesting technology. Thus, the energy consumption of the m-th SSN evolves according to a linear differential equation given as:
d E m ( t ) d t = E A ( t ) τ r p p m ( t ) E m ( t )
Then the cost of energy consumption for the m-th SSN at time t [ t 0 , t 0 + τ r p ] can be given as:
U m C = m C E m ( t )
Therefore, based on the revenue and the cost formulated in Equations (19) and (22), the utility function of the m-th SSN at time t [ t 0 , t 0 + τ r p ] can be constructed as follows:
U m = U m R U m C = m R ( P m max p m ( t ) ) m C E m ( t )
We denote the discount factor by r , for 0 < r < 1 . Our optimization objective is to maximize the utility function U m by choosing optimal transmit power p m O P ( t ) of the m-th SSN during the slot τ r p according to m R and m C , at time t [ t 0 , t 0 + τ r p ] , i.e.,
Maximize :    t 0 t 0 + τ r p ( m R ( P m max p m ( t ) ) m C E m ( t ) ) e r ( t t 0 )
It is noteworthy that the discount factor r is an exponential factor between 0 and 1 by which the future utility must be multiplied in order to obtain the present value with the underlying structure of differential game theory in mind. Therefore, each SSN is required to maximize its discounted utility U m function by discount factor r , implying that discount factor will have a stronger impact on the utility obtained by each SSN in the future. To this end, the power control problem for all IT and MT SSNs in the physical layer can be formulated as a differential game model defined by G = { N , { p m O P ( t ) } m N , E m O P ( t ) , { U m } m N } , where N = N I T N M T is the set of players involving all IT and MT SSNs, p m O P ( t ) is the strategy of player m, { p m O P ( t ) } m N is the set of strategies or strategy space related to all players, E m O P ( t ) is the state variable associated with optimal transmit power p m O P ( t ) , and { U m } m N is the set of utility function of all players with their strategies.

4.2. Noncooperative Optimal Solution

We formulate a dynamic optimization problem P 1 to derive the optimal solution to the differential game model G with the objective of the utility function maximization problem under the linear differential equation constraint of the energy consumption for the m-th SSN. From Equations (21) and (24), the problem P 1 can be formulated as:
P 1 : max p m ( t ) , m N t 0 t 0 + τ r p ( m R ( P m max p m ( t ) ) m C E m ( t ) ) e r ( t t 0 ) d t s . t . d E m ( t ) d t = E A ( t ) τ r p p m ( t ) E m ( t )
For the noncooperation scenario if all the players play noncooperatively, we aim at deriving an optimal solution to the problem P 1 in the distributed noncooperative power control (NoCoPC) problem for all IT and MT SSNs by employing the theory of dynamic programming developed by Bellman. Note that the players can abandon the cooperation due to their selfishness and own interests in the NoCoPC problem, e.g., the selfish behavior in forwarding the data sequence of the SSR to bottleneck SU. Specifically, we employ p m N C ( t ) to represent the noncooperative optimal solution to the problem P 1 , and assume that there exists a continuously differentiable function V m N C ( p m , E m ) satisfying the following partial differential equation:
r V m N C ( p m , E m ) = max ( m R ( P m max p m ( t ) ) m C E m ( t ) + V m N C ( p m , E m ) E m ( E A ( t ) τ r p p m ( t ) E m ( t ) ) )
Proposition 1.
The function V m N C ( p m , E m ) for the m-th SSN in Equation (26) should be subject to the partial differential equation constraint as follows:
V m N C ( p m , E m ) E m = m C r + 1
Proof. 
See Appendix A. ☐
Proposition 2.
The noncooperative optimal solution p m N C ( t ) constitutes a Nash equilibrium solution to the problem P 1 if and only if the optimal transmit power for the m-th SSN can be expressed as:
p m N C ( t ) = P m max ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) e δ i D m ( P d P f ) )
Proof. 
Recall the following expression of the noncooperative optimal solution in Equation (A1) on the basis of Proposition 1. By substituting the expression of function V m N C ( p m , E m ) in Equation (27) into Equation (A1), we can easily obtain the noncooperative optimal transmit power p m N C ( t ) which constitutes a Nash equilibrium solution to the problem P 1 can be formulated by Equation (28). ☐
By observing Proposition 2, it is clear that an increased discount factor r will enhance the noncooperative optimal transmit power p m N C ( t ) for the m-th SSN. From Equation (28), the noncooperative optimal transmit power vector P N C for all IT and MT SSNs in the NoCoPC problem can be further combined as:
P N C = { p 1 N C ( t ) , , p | N I T | N C ( t ) for n I T IT SSNs , p | N I T | + 1 N C ( t ) , , p | N I T | + | N M T | N C ( t ) for n M T MT SSNs }
Given the noncooperative optimal solution p m N C ( t ) , by substituting V m N C ( p m , E m ) and p m N C ( t ) into Equation (26), the function V m N C ( p m N C ( t ) , E m N C ( t ) ) for the m-th SSN is further given by:
V m N C ( p m N C ( t ) , E m N C ( t ) ) = m C r ( r + 1 ) ( τ r p P m max P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 m C 4 ( r + 1 ) E A ( t ) r E m N C ( t ) )
where E m N C ( t ) is the noncooperative optimal energy consumption value of the m-th SSN at time t .

4.3. Cooperative Optimal Solution

In this subsection, we move on to explore the distributed cooperative power control (CoPC) problem for all IT and MT SSNs by building up the cooperation scenario if all the players play cooperatively via the differential game model G . Note that this is a natural idea for the players aiming to achieve an optimal power allocation through full cooperation for their common interests. Under this scenario, our optimization objective is to maximize the sum of the utility functions of all players (i.e., m N U m ) while the linear differential equation constraint of the energy consumption should also be satisfied for the m-th SSN. To be specific, we formulate a dynamic optimization problem P 2 as follows to attain the objective of maximizing the sum of the utility functions of all players:
P 2 : max p 1 ( t ) , , p m ( t ) , , p | N | ( t ) , m N m N t 0 t 0 + τ r p ( m R ( P m max p m ( t ) ) m C E m ( t ) ) e r ( t t 0 ) d t s . t . d E m ( t ) d t = E A ( t ) τ r p p m ( t ) E m ( t )
Under the cooperation scenario, we use p m C ( t ) to represent the cooperative optimal solution to the problem P 2 , and assume that there exists a continuously differentiable function W m C ( p m , E m ) satisfying the following partial differential equation:
r W m C ( p m , E m ) = max ( m N ( m R ( P m max p m ( t ) ) m C E m ( t ) ) + W m C ( p m , E m ) E m ( E A ( t ) τ r p p m ( t ) E m ( t ) ) )
Proposition 3.
The function W m C ( p m , E m ) for the m-th SSN in Equation (32) should be subject to the partial differential equation constraint as follows:
W m C ( p m , E m ) E m = m N m C r + 1
Proof. 
See Appendix B. ☐
Proposition 4.
The cooperative optimal solution p m C ( t ) to the problem P 2 if and only if the optimal transmit power for the m-th SSN can be expressed as:
p m C ( t ) = P m max ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) m N e δ i D m ( P d P f ) )
Proof. 
Substituting the expression of function W m C ( p m , E m ) in Equation (33) into Equation (A4), and applying the result of the indicated maximization operation in Equation (A4), we derive the cooperative optimal solution p m C ( t ) to the problem P 2 as in Equation (34). ☐
Similar to Proposition 2, it is also revealed that an increased discount factor r will enhance the cooperative optimal transmit power p m C ( t ) for the m-th SSN. According to Equation (34), the cooperative optimal transmit power vector P C for all IT and MT SSNs in the CoPC problem can be also combined as follows:
P C = { p 1 C ( t ) , , p | N I T | C ( t ) for n I T IT SSNs , p | N I T | + 1 C ( t ) , , p | N I T | + | N M T | C ( t ) for n M T MT SSNs }
Define the notation Ψ m = P m max H m ( ϒ d ( m ) ϒ f ( m ) ) for simplicity in the following. Given the cooperative optimal solution p m C ( t ) , by plugging W m C ( p m , E m ) and p m C ( t ) into Equation (32), the function W m C ( p m C ( t ) , E m C ( t ) ) for the m-th SSN is further given by:
W m C ( p m C ( t ) , E m C ( t ) ) = τ r p 2 4 r ( r + 1 ) 2 ( m N ( Ψ m ( m N m C ) 2 ) 2 Ψ m ( m N m C ) 2 ) + ( E m C ( t ) E A ( t ) ) m N m C r ( r + 1 ) + τ r p P m max m N m C r 1 r m N ( m C E m C ( t ) )
where E m C ( t ) is the cooperative optimal energy consumption value of the m-th SSN at time t .
By using P N C of the NoCoPC problem and P C of the CoPC problem, we then design a distributed optimal transmit power adjustment (OTPA) algorithm as stated in Algorithm 2. Recall that the pricing factor m R is employed to characterize the efficiency-to-stability ratio for the m-th SSN, for m N , aiming to describe the power reduction efficiency under the stability of local spectrum sensing. Thus, in order to ensure the convergence of optimal transmit power adjustment, we design the average efficiency-to-stability ratio ϖ ¯ m as a scaling coefficient in Algorithm 2 as follows:
ϖ ¯ m = { m R m = 1 n I T m R , m N I T m R m = n I T + 1 n I T + n M T m R , m N M T
It is worth remarking that the adjusted optimal transmit power will be updated with respect ro the scaling coefficient ϖ ¯ m . In particular, the adjusted optimal transmit power for all IT and MT SSNs via OTPA algorithm can be made locally while guaranteeing that the condition of the average power constraint as given in Equation (3) is satisfied.
Algorithm 2: Distributed Optimal Transmit Power Adjust Algorithm
1:Input: P N C and P C .
2:Output: { p ˜ 1 N C ( t ) , , p ˜ n I T N C ( t ) 1 n I T , p ˜ n I T + 1 N C ( t ) , , p ˜ n I T + n M T N C ( t ) n I T + 1 n I T + n M T } and { p ˜ 1 C ( t ) , , p ˜ n I T C ( t ) 1 n I T , p ˜ n I T + 1 C ( t ) , , p ˜ n I T + n M T C ( t ) n I T + 1 n I T + n M T } .
3:Initialization: { P 1 max , , P m max , , P | N | max } , { 1 R , , m R , , | N | R } , { 1 C , , m C , , | N | C } .
4:for m = 1 | N | do
5: p ˜ m N C ( t ) p m N C ( t ) using Equation (28), and p ˜ m C ( t ) p m C ( t ) using Equation (34).
6:end for
7:if m = 1 n I T p ˜ m N C ( t ) > n I T P a v I T or m = 1 n I T p ˜ m C ( t ) > n I T P a v I T then
8:repeat
9:  for m = 1 n I T do
10:    p ˜ m N C ( t ) ( m R / m = 1 n I T m R ) × p ˜ m N C ( t ) when m = 1 n I T p ˜ m N C ( t ) > n I T P a v I T .
11:    p ˜ m C ( t ) ( m R / m = 1 n I T m R ) × p ˜ m C ( t ) when m = 1 n I T p ˜ m C ( t ) > n I T P a v I T .
12:  end
13:until m = 1 n I T p ˜ m N C ( t ) > n I T P a v I T and m = 1 n I T p ˜ m C ( t ) > n I T P a v I T
14:end if
15:if m = n I T + 1 n I T + n M T p ˜ m N C ( t ) > n M T P a v M T or m = n I T + 1 n I T + n M T p ˜ m C ( t ) > n M T P a v M T then
16:repeat
17:  for m = n I T + 1 n I T + n M T do
18:    p ˜ m N C ( t ) ( m R / m = n I T + 1 n I T + n M T m R ) × p ˜ m N C ( t ) when m = n I T + 1 n I T + n M T p ˜ m N C ( t ) > n M T P a v M T .
19:    p ˜ m C ( t ) ( m R / m = n I T + 1 n I T + n M T m R ) × p ˜ m C ( t ) when m = n I T + 1 n I T + n M T p ˜ m C ( t ) > n M T P a v M T .
20:  end
21:until m = n I T + 1 n I T + n M T p ˜ m N C ( t ) > n M T P a v M T and m = n I T + 1 n I T + n M T p ˜ m C ( t ) > n M T P a v M T
22:end if

5. Congestion Mitigation for Bottlenecked Secondary User

We have shown that the bottlenecked SU is a little more inclined to be a congested SU node during the slot τ r p due to its buffer overflow under the scenario of the hop-by-hop fluid flows of the data sequence of the SSR injected from | N I T | + | N E T | IT and MT SSNs to this bottlenecked SU. We use the buffer size B b to denote the buffer saturation value of bottlenecked SU b. Recall that the amount of data traffic ϑ b ( t 0 ) in buffer of SU b at time t 0 evolves according to Equation (2) for the given slot τ r p . As depicted in Figure 3a, the buffer of bottlenecked SU b is composed of two buffer segments, i.e., the forward buffer that holds data traffic injected from upstream SUs denoted by ϑ b F ( τ r p ) , and the internal buffer that stores the data sequence of SSR transmitted from IT and MT SSNs denoted by ϑ b I ( τ r p ) . Normally, there exist idle segments within the forward buffer or the internal buffer of bottlenecked SU b when ϑ b ( t 0 + τ r p ) < B b . This phenomenon is referred to the normal status where the offered data load does not exceed available buffer capacity of bottleneck SU b because of its higher data rate to deliver the amount of data traffic to other SUs and remove the amount of the data sequence of SSR during the slot τ r p .
However, congestion in bottlenecked SU b will occur when the offered data load exceeds its available buffer capacity due to buffer overflow imposed by the data load involving the data sequence of the SSR injected from IT and MT SSNs together with the data traffic from upstream SUs. We assume that the congestion detection information of bottlenecked SU b can be transferred back to the m-th SSN by means of a hop-by-hop backpressure signal via the CCC form bottlenecked SU b to the m-th SSN. As a result, bottlenecked SU b is said to be a congested SU if and only if the amount of its current data traffic ϑ b ( t 0 + τ r p ) B b during the slot τ r p , as shown in Figure 3b. We further assume that the m-th SSN has the data sequence of the SSR with Ξ m bits to transmit at time t [ t 0 , t 0 + τ r p ] . According to [24], the data sequence of SSR with Ξ m bits to transmit from the m-th SSN to bottlenecked SU b during the slot τ r p under the transmit power p m ( t ) can be approximately expressed as follows based on channel capacity C m b given by Equation (4):
Ξ m = τ r p W log 2 ( 1 + p m ( t ) K | h m b | 2 N 0 W )
Clearly, Ξ m depends on channel capacity C m b and is also a function of the transmit power p m ( t ) . For ease of exposition, we use Ξ m ( p m ( t ) ) to denote the amount of bits of the data sequence of SSR transmitted from the m-th SSN to bottlenecked SU b under transmit power p m ( t ) . Therefore, the aggregated amount of bits of the data sequence of SSR from all | N I T | + | N E T | IT and MT SSNs to bottleneck SU b during the slot τ r p under transmit power p m ( t ) is given as m N Ξ m ( p m ( t ) ) , for N = N I T N M T . Recall that the internal buffer of bottlenecked SU b is used to store the amount of the data sequence of SSR transmitted from SSNs denoted by ϑ b I ( τ r p ) during the slot τ r p by using Equation (2). Hence, within the time interval τ r p , ϑ b I ( τ r p ) of bottlenecked SU b can be further formulated by:
ϑ b I ( τ r p ) = m N Ξ m ( p m ( t ) ) χ b ( τ r p )
where χ b ( τ r p ) is the amount of the data sequence of SSR removed by bottlenecked SU b within a time interval τ r p .
So far, we have mathematically derived the amount of the data sequence of SSR transmitted from SSNs to bottlenecked SU b under the condition that the m-th SSN employs the transmit power p m ( t ) , for m N . Next, we are concerned with how to mitigate the congestion of bottlenecked SU b by the aid of the proposed distributed power control framework for IT and MT SSNs. The basic idea of congestion mitigation for bottlenecked SU b is to alleviate its buffer load because of the accumulated amount of the data sequence of the SSR transmitted from IT and MT SSNs. It is uncovered that the transmit power of the m-th SSN may have a bearing on Ξ m from Equation (38). Our objective is to leverage the distributed power control to reduce the amount of bits of the data sequence of the SSR transmitted from the m-th SSN to bottlenecked SU b, in order to lower the amount of the data sequence of the SSR in the internal buffer of bottlenecked SU b. This operation will further ensure that offered data load does not exceed available buffer capacity of bottlenecked SU b, i.e., ϑ b ( t 0 + τ r p ) < B b . The key point to achieve congestion mitigation for bottlenecked SU b is established with a block diagram shown in Figure 4. It is worth remarking that the amount of the data sequence of SSR in the internal buffer of bottlenecked SU b can be effectively reduced by the proposed distributed power control framework for IT and MT SSNs under the noncooperation and cooperation scenarios. Conceptually, the reduction of the amount of the data sequence of SSR will release the capacity of the internal buffer for bottlenecked SU b, which naturally further attains the congestion mitigation for bottlenecked SU b. In the following, we analyze the impact of optimal transmit power for the m-th SSN on the reduction of the amount of the data sequence of SSR in the internal buffer of bottleneck SU b rigorously from the noncooperation and cooperation cases.
(1) Noncooperative Optimal Transmit Power Case: In this case, suppose, without loss of generality, that τ r p W 1 . By replacing p m ( t ) in Equation (38) with p m N C ( t ) in Equation (28), Ξ m ( p m N C ( t ) ) for the m-th SSN within a time interval τ r p can be expressed as:
Ξ m ( p m N C ( t ) ) = τ r p W log 2 ( 1 + p m N C ( t ) K | h m b | 2 N 0 W ) log 2 ( p m N C ( t ) K | h m b | 2 N 0 W ) log 2 ( P m max ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) e δ i D m ( P d P f ) ) K | h m b | 2 N 0 W )
By plugging Ξ m ( p m N C ( t ) ) into Equation (39), we have:
ϑ b I ( τ r p ) = m = 1 n I T Ξ m ( p m N C ( t ) ) for n I T IT SSNs + m = n I T + 1 n I T + n M T Ξ m ( p m N C ( t ) ) for n M T MT SSNs χ b ( τ r p )
Thus, the reduction of the amount of the data sequence of SSR in the internal buffer of bottlenecked SU b, denoted by Δ ϑ b I ( τ r p ) , is equivalent to:
Δ ϑ b I ( τ r p ) = m = 1 n I T ( Ξ m ( p m ( t ) ) Ξ m ( p m N C ( t ) ) ) + m = n I T + 1 n I T + n M T ( Ξ m ( p m ( t ) ) Ξ m ( p m N C ( t ) ) ) m N log 2 ( p m ( t ) p m N C ( t ) )
Proposition 5.
Under the condition of the transmit power p m ( t ) = P m max for the m-th SSN, Δ ϑ b I ( τ r p ) satisfies the following upper bound:
Δ ϑ b I ( τ r p ) m N log 2 ( 1 / ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) e δ i D m ( P d P f ) ) )
Proof. 
Since p m ( t ) = P m max . Under this condition, using Equation (28), we have:
Δ ϑ b I ( τ r p ) m N log 2 ( p m ( t ) p m N C ( t ) ) m N log 2 ( P m max p m N C ( t ) ) = m N log 2 ( 1 / ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) e δ i D m ( P d P f ) ) )
Then we obtain the upper bound in Equation (43), thus completing the proof. ☐
(2) Cooperative Optimal Transmit Power Case: In this case, with the assumption τ r p W 1 , by replacing p m ( t ) in Equation (38) with p m C ( t ) in Equation (34), Ξ m ( p m C ( t ) ) for the m-th SSN within a time interval τ r p can be given by:
Ξ m ( p m C ( t ) ) = τ r p W log 2 ( 1 + p m C ( t ) K | h m b | 2 N 0 W ) log 2 ( p m C ( t ) K | h m b | 2 N 0 W ) log 2 ( P m max ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) m N e δ i D m ( P d P f ) ) K | h m b | 2 N 0 W )
By substituting Ξ m ( p m C ( t ) ) into Equation (39), we obtain:
ϑ b I ( τ r p ) = m = 1 n I T Ξ m ( p m C ( t ) ) for n I T IT SSNs + m = n I T + 1 n I T + n M T Ξ m ( p m C ( t ) ) for n M T MT SSNs χ b ( τ r p )
Therefore, similar to Equation (42), Δ ϑ b I ( τ r p ) is also approximately formulated as:
Δ ϑ b I ( τ r p ) m N log 2 ( p m ( t ) p m C ( t ) )
Proposition 6.
Under the condition of the transmit power p m ( t ) = P m max for the m-th SSN, Δ ϑ b I ( τ r p ) satisfies the following upper bound:
Δ ϑ b I ( τ r p ) m N log 2 ( 1 / ( 1 H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ( r + 1 ) m N e δ i D m ( P d P f ) ) )
Proof. 
Similar to the proof of Proposition 5, it is easy to identify the upper bound in Equation (48), thus completing the proof. ☐

6. Simulation Results

In this section, we provide simulation results to evaluate the performance of the proposed congestion mitigation approach by using the distributed power control framework for IT and MT SSNs in the rectangular grid based SN-CRN, and investigate the impact of key system parameters on the performance. Particularly, our simulations pay more attention to evaluate the effect of the proposed distributed power control framework for IT and MT SSNs on the reduction of the amount of the data sequence of SSR in the internal buffer of bottlenecked SU b. Technically, the reduction of the amount of the data sequence of SSR in the internal buffer will free the buffer capacity of bottlenecked SU b, which can bring about the congestion mitigation for bottlenecked SU b. As illustrated in Figure 5, all the simulations are carried out on a rectangular grid topology within a torus area of 100 m × 100 m where one bottlenecked SU is randomly placed within the area of IT over three-tier structure. It suffices to mention that the horizontal or vertical distance between any SSNs is initialized to be d = 20 m. For convenience, the IT SSN and the MT SSN are marked by IT-m and MT-n in sequence for m N I T and n N M T , respectively, as shown in Figure 5. We assume that there are N c = 12 licensed uplink channels allocated to PUs. The SOP usage probability δ b is set to 0.65 for the bottlenecked SU. Also, the total average power constraint assigned to IT and MT SSNs are assumed to P a v I T = 18 dBm and P a v M T = 8 dBm, respectively, to mitigate the interference among IT and MT SSNs. As for the AWGN multiple-access channel, the path-loss exponent κ has been set to 8, and the channel bandwidth used for SSNs is assumed to be 2 MHz according to IEEE 802.15.4a channel model. The constant K under the channel capacity formulation given in Equation (4) is defined as 0.005. In addition, the noise power spectral density N 0 under this channel model is initialized as −3 dBm. We also adopt the receiving reference power by bottleneck SU b P 0 = 20 dBm under the reference distance d 0 = 20 m.
In all the simulations, the detection and false alarm probabilities for IT and MT SSNs over N c = 12 licensed uplink channels have been initialized as in Figure 6. We also set the number of subintervals in Algorithm 1 to be the same value for all SSNs, i.e., ξ = ς = 8 . We also assume that the minimum value X d and the maximum value Y d in derivation of the detection probability distribution are set to 0.6 and 1, respectively. Likewise, the minimum value X f and the maximum value Y f in derivation of the false alarm probability distribution are set at 0 and 0.3, respectively.
For simplicity, we deliberately choose some of the IT and MT SSNs in the simulation including IT-1, MT-2, MT-5, and MT-7, to evaluate the performance of our developed approach. Specifically, the detection probability and false alarm probability distributions of the selected SSNs from IT and MT generated from Algorithm 1 are assumed to comply with the corresponding distributions as given by Figure 7.
The proposed OTPA algorithm for both the NoCoPC problem and the CoPC problem under the distributed power control framework for IT and MT SSNs is compared with the well-known power balancing (PB) algorithm in [35]. The PB algorithm is also a SNR balancing constrained power control iterative method which iteratively searches for decentralized transmit power level updated from the l-th iteration to the (l + 1)-th iteration. Let γ m t a r denote the target SNR for the m-th SSN to maintain a certain QoS requirement, for m N . In this simulation, the target SNR can be set to γ m t a r = 7 dB. Therefore, the PB algorithm iteratively updates the transmit power for the m-th SSN according to [35]:
p m ( l + 1 ) = min { P m max , ( γ m t a r γ m ( l ) ) p m ( l ) }
First the optimal transmit power is compared between PB algorithm with 250 iterations and our proposed distributed power control framework via the noncooperation and cooperation scenarios under the slot τ r p = 12 ms with the evolution of discount factor r, as exhibited in Figure 8. It is shown that an increased discount factor from 0.1 to 0.9 will enhance the optimal transmit power of selected SSNs (i.e., IT-1, MT-2, MT-5, and MT-7) under the proposed OTPA algorithm for both the NoCoPC problem and the CoPC problem within the slot τ r p = 12 ms. This is due to the fact that the discount factor r has an affect on the optimal transmit power of selected SSNs via Equations (28) and (34). Specifically, the optimal transmit power of selected SSNs grows in proportion to discount factor r. It is also revealed that the optimal transmit power of selected SSNs under a given discount factor satisfy the average power constraint of P a v I T = 18 dBm and P a v M T = 8 dBm. Thus, the optimal transmit power of selected SSNs will not be adjusted through OTPA algorithm. Comparing the performance of the NoCoPC problem and CoPC problem with the slot τ r p = 12 ms, we can also observe that the optimal transmit power of selected SSNs by using PB algorithm presents a fixed constant value. The reason for this is that the optimal transmit power of the selected SSN by using PB algorithm converges to an expected equilibrium point after 250 iterations. It is also interesting that Proposition 2 has turned out that the optimal transmit power of selected SSNs derived by NoCoPC problem converges to a fixed Nash equilibrium point. Moreover, Proposition 4 has also guaranteed that the optimal transmit power of selected SSNs under the CoPC problem will reach to a fixed value. From Figure 8, it is implicitly revealed that the optimal transmit power of selected SSNs by the OTPA algorithm is obviously lower than that of PB algorithm. This observation is reasonable since PB algorithm generates more power consumption to maintain the target SNR. However, the optimal transmit power of selected SSNs via the proposed OTPA algorithm fully depends on the maximum transmit power of the selected SSNs and the pricing factors in differential game model.
Figure 9 displays the optimal transmit power comparison between PB algorithm with 250 iterations and our proposed distributed power control framework under discount factor r = 0.5 with the evolution of the slot τ r p from 10 ms to 15 ms. As can be seen, the proposed OTPA algorithm for both the NoCoPC problem and CoPC problem under the condition of discount factor r = 0.5 outperforms PB algorithm with 250 iterations significantly in terms of the optimal transmit power of selected SSNs with the growth of the slot τ r p . This result further validates PB algorithm will result in much more power consumption aiming to maintain the target SNR. However, the optimal transmit power of selected SSNs by using the proposed OTPA algorithm entirely depends upon maximum transmit power of selected SSNs and pricing factors in differential game model. We can also observe that the optimal transmit power of selected SSNs of the proposed OTPA algorithm for the CoPC problem under discount factor r = 0.5 is considerably lower than that of the NoCoPC problem. That is, the proposed OTPA algorithm for the CoPC problem outperforms that of the NoCoPC problem. This can be intuitively explained by the fact that there exists an operation of summing with respect to e δ i D m ( P d P f ) in the denominator of the analytical cooperative optimal transmit power p m C ( t ) . Moreover, the increase of the slot τ r p will generate lower transmit power for both the NoCoPC problem and CoPC problem with discount factor r = 0.5. This is because based on Equations (28) and (34), the optimal transmit power for both the NoCoPC problem and CoPC problem is inversely proportional to the slot τ r p . This observation emphasizes the importance of selecting the proper time interval of slot τ r p on the optimal transmit power.
In Figure 10, we look at the performance of the transmitted data sequence of SSR from selected SSNs to bottlenecked SU b during the slot τ r p = 12 ms with the evolution of discount factor r from 0.1 to 0.9. From the results, we can see the transmitted data sequence of SSR for selected SSNs gradually increase with the growth of discount factor r. Meanwhile, the transmitted data sequence of SSR for PB algorithm with 250 iterations and our proposed distributed power control framework under the condition of the slot τ r p = 12 ms tends to be close when discount factor r = 0.9. The reason for this is that the transmitted data sequence of SSR can be approximately expressed as a function of channel capacity according to Equation (38), which is in direct proportion to the optimal transmit power of selected SSNs. It has also been shown that an increased discount factor from 0.1 to 0.9 will increase the optimal transmit power of selected SSNs under the proposed OTPA algorithm for both the NoCoPC problem and CoPC problem with the slot τ r p = 12 ms. Consequently, higher optimal transmit power yields more transmitted data sequence of SSR.
In Figure 11, we examine the impact of discount factor r from 0.1 to 0.9 on the reduction of data sequence of SSR with respect to selected SSNs in the internal buffer of bottleneck SU b. It can be observed from the figure that the reduction of data sequence of SSR by our proposed congestion mitigation approach under the slot τ r p = 12 ms will gradually decrease with the growth of discount factor r, except that the reduction result by PB algorithm with 250 iterations appears to a fixed constant value. This trend is the result of the inverse relationship between the reduction of the data sequence of SSR Δ ϑ b I ( τ r p ) and the optimal transmit power of selected SSNs p m N C ( t ) for the NoCoPC problem or p m C ( t ) for the CoPC problem according to Equations (42) and (47). Additionally, in Figure 11, we can also observe that the proposed congestion mitigation approach by using the OTPA algorithm for the CoPC problem with the slot τ r p = 12 ms achieves the higher reduction of the data sequence of SSR compared with those of the NoCoPC problem and PB algorithm with 250 iterations. In other words, through cooperation among all IT and MT SSNs, the reduction of the data sequence of SSR in the internal buffer of bottlenecked SU b can be further improved. This observation has verified the analytical derivation of the proposed congestion mitigation approach. The explanation is twofold: (i) The proposed OTPA algorithm for the CoPC problem outperforms that of the NoCoPC problem owing to the lower cooperative optimal transmit power p m C ( t ) obtained by the CoPC problem compared with the noncooperative optimal transmit power p m N C ( t ) by the NoCoPC problem; (ii) The reduction of the data sequence of SSR is inversely proportional to the optimal transmit power of selected SSNs.
Figure 12 shows the comparison of the reduction of data sequence of SSR with respect to selected SSNs in the internal buffer of bottlenecked SU b, versus the slot τ r p under the condition of discount factor r = 0.3, for the proposed congestion mitigation approach and PB algorithm with 250 iterations. As seen from Figure 11, the reduction of data sequence of SSR through PB algorithm has converged to the same constant value after the 250 iterations. This is the direct influence that the optimal transmit power of selected SSN will converge to an expected equilibrium point by using PB algorithm. As expected, the reduction of data sequence of SSR by the proposed congestion mitigation approach with discount factor r = 0.3 is larger than that of PB algorithm with 250 iterations. This is because our proposed approach can obtain smaller optimal transmit power than PB algorithm. According to Equations (42) and (47), the smaller optimal transmit power will lead to the more reduction of data sequence of SSR with respect to selected SSNs. It is also interesting that with the growth of the slot τ r p the reduction of data sequence of SSR by our proposed approach will gradually increase, and the reduction by the CoPC problem is much higher than that of the NoCoPC problem. This result can be interpreted by the fact that the optimal transmit power of selected SSNs by the CoPC problem under discount factor r = 0.3 is clearly lower than that of the NoCoPC problem with the growth of the slot τ r p . This result further gives rise to the larger reduction of data sequence of SSR.

7. Conclusions and Future Work

In this paper, we have developed a congestion mitigation approach by employing the distributed power control framework for SSNs in the rectangular grid based SN-CRN. Particularly, we defined the relative divergence between the detection probability and false alarm probability for a SSN under any uplink channel by adopting a Kullback-Leibler divergence framework. After deriving the detection probability and false alarm probability distributions for SSN according to mathematical statistics, we characterized the stability metric of local spectrum sensing based on entropy modeling framework. Aiming to gain the tradeoff between channel capacity and energy consumption, the distributed power control framework for IT and MT SSNs was proposed, and the power control problem was formulated as differential game model by taking into account the utility function maximization with linear differential equation constraint in regard to energy consumption. Further, we derived the theoretic optimal solutions to this game model under the scenario of cooperation or noncooperation via dynamic programming. Based on the obtained optimal transmit power of SSNs, we devised the congestion mitigation approach for bottleneck SU by alleviating buffer load over its internal buffer, and validated its performance with simulations.
What we have discussed in this paper is the portion of the foundation for SN-CRN. Possible directions for future work within this research involve examining the effect of imperfect CSI and outage constraint on distributed power control for SSNs by formulating the uncertain relation between the wireless channel conditions and the corresponding estimates. As another future work, we will try to investigate congestion mitigation approaches in future 5G mobile systems with the novel network architecture and networking technologies [36], e.g., fog computing-based radio access networks and network slicing-based mobile networks in currently practical applications.

Acknowledgments

The authors gratefully acknowledge the financial support from the National Natural Science Foundation of China under Grant No. 61402147 and No. 61501026, the Research Program for Top-notch Young Talents in Higher Education Institutions of Hebei Province, China under Grant No. BJ2017037, the Research and Development Program for Science and Technology of Handan, China under Grant No. 1621203037, and the Natural Science Foundation of Hebei Province of China under Grant No. F2017402068.

Author Contributions

Long Zhang conceived the idea of this paper and determined the structure of research work; Haitao Xu provided valuable insights for the scheme and revised the manuscript; Long Zhang and Fan Zhuo performed the simulations and wrote the paper; Hucai Duan contributed to data analysis.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1.
For mathematical tractability, the problem P 1 can be converted into an finite horizon differential game model by relaxing the terminal time t 0 + τ r p to explore when t 0 + τ r p approaches (i.e., t 0 + τ r p ) as infinite time horizon. Under this conversion, we then perform the maximization operation of the right hand side of Equation (25) with respect to p m ( t ) . After some simplifications, we have the following expression of the noncooperative optimal solution:
p m N C ( t ) = P m max + V m N C ( p m , E m ) E m P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2
By substituting p m N C ( t ) into Equation (25), after some algebraic manipulations, we have:
    r V m N C ( p m , E m ) P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 4 ( V m N C ( p m , E m ) E m ) 2 + m C E m ( t ) = V m N C ( p m , E m ) E m ( E A ( t ) τ r p ( P m max + V m N C ( p m , E m ) E m P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ) E m ( t ) )
To proceed, we derive the derivative of V m N C ( p m , E m ) with respect to E m ( t ) in Equation (A2). Upon solving the partial differential equation, after some simplifications, we now can express the function V m N C ( p m , E m ) as the partial differential equation constraint given by:
V m N C ( p m , E m ) E m = m C r + 1
This completes the proof. ☐

Appendix B

Proof of Proposition 3.
The proof is similar to Proposition 1. The only difference is that the objective function of the cooperative power control problem is to maximize the sum of the utility functions of all players. For convenience of derivation, we also relax the time interval of the game and discuss the infinite-horizon differential game (i.e., τ r p ), and we also set t 0 = 0 . By performing the maximization operation of the right hand side of Equation (31) with respect to the transmit power of all players p 1 ( t ) , p 2 ( t ) , , p | N | ( t ) , after some simplifications, we have:
p m C ( t ) = P m max + W m C ( p m , E m ) E m P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2
By substituting p m C ( t ) into Equation (31), after some algebraic manipulations, we obtain:
    W m C ( p m , E m ) m N ( P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 4 r ( W m C ( p m , E m ) E m ) 2 m C E m ( t ) r ) = W m C ( p m , E m ) E m ( E A ( t ) r τ r p r ( P m max + W m C ( p m , E m ) E m P m max H m ( ϒ d ( m ) ϒ f ( m ) ) τ r p 2 ) E m ( t ) r )
Next, we try to derive the derivative of W m C ( p m , E m ) with respect to E m ( t ) in Equation (A5). Upon solving the partial differential equation, after some basic mathematical manipulations, we obtain the final result in Equation (32), thus completing the proof. ☐

References

  1. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  2. Rakovic, V.; Denkovski, D.; Atanasovski, V.; Mahonen, P.; Gavrilovska, L. Capacity-aware cooperative spectrum sensing based on noise power estimation. IEEE Trans. Commun. 2015, 7, 2428–2441. [Google Scholar] [CrossRef]
  3. Zhang, N.; Liang, H.; Cheng, N. Dynamic spectrum access in multi-channel cognitive radio networks. IEEE J. Sel. Areas Commun. 2014, 32, 2053–2064. [Google Scholar] [CrossRef]
  4. Sharma, P.K.; Upadhyay, P.K. Performance analysis of cooperative spectrum sharing with multiuser two-way relaying over fading channels. IEEE Trans. Veh. Technol. 2017, 66, 1324–1333. [Google Scholar] [CrossRef]
  5. Akyildiz, I.F.; Lee, W.-Y.; Chowdhury, K.R. CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Netw. 2009, 7, 810–836. [Google Scholar] [CrossRef]
  6. Ghasemi, A.; Sousa, E.S. Collaborative spectrum sensing for opportunistic access in fading environments. In Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Baltimore, MD, USA, 8–11 November 2005; pp. 131–136. [Google Scholar]
  7. Deng, R.; Chen, J.; Yuen, C.; Cheng, P.; Sun, Y. Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks. IEEE Trans. Veh. Technol. 2012, 61, 716–725. [Google Scholar] [CrossRef]
  8. Peh, E.C.Y.; Liang, Y.-C.; Guan, Y.L.; Zeng, Y. Cooperative spectrum sensing in cognitive radio networks with weighted decision fusion schemes. IEEE Trans. Wirel. Commun. 2010, 9, 3838–3847. [Google Scholar] [CrossRef]
  9. Vosoughi, A.; Cavallaro, J.R.; Marshall, A. Trust-aware consensus-inspired distributed cooperative spectrum sensing for cognitive radio ad hoc networks. IEEE Trans. Cogn. Commun. Netw. 2016, 2, 24–37. [Google Scholar] [CrossRef]
  10. Yucek, T.; Arslan, H. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 2009, 11, 116–130. [Google Scholar] [CrossRef]
  11. Weiss, M.B.H.; Delaere, S.; Lehr, W.H. Sensing as a service: An exploration into practical implementations of DSA. In Proceedings of the IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), Singapore, 6–9 April 2010; pp. 1–8. [Google Scholar]
  12. Fodor, V.; Glaropoulos, I.; Pescosolido, L. Detecting low-power primary signals via distributed sensing to support opportunistic spectrum access. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; pp. 1–6. [Google Scholar]
  13. Chowdhury, K.R.; Di Felice, M.; Akyildiz, I.F. TCP CRAHN: A transport control protocol for cognitive radio ad hoc networks. IEEE Trans. Mob. Comput. 2013, 12, 790–803. [Google Scholar] [CrossRef]
  14. Sarkar, D.; Narayan, H. Transport layer protocols for cognitive networks. In Proceedings of the INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA, 15–19 March 2010; pp. 1–6. [Google Scholar]
  15. Soelistijanto, B.; Howarth, M.P. Transfer reliability and congestion control strategies in opportunistic networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 538–555. [Google Scholar] [CrossRef]
  16. Al-Ali, A.K.; Chowdhury, K. TFRC-CR: An equation-based transport protocol for cognitive radio networks. Ad Hoc Netw. 2013, 11, 1836–1847. [Google Scholar] [CrossRef]
  17. Song, Y.; Xie, J. End-to-end congestion control in multi-hop cognitive radio ad hoc networks: To timeout or not to timeout? In Proceedings of the 2013 IEEE Globecom, Atlanta, GA, USA, 9–13 December 2013; pp. 1–6. [Google Scholar]
  18. Cammarano, A.; Presti, F.L.; Maselli, G.; Pescosolido, L.; Petrioli, C. Throughput-optimal cross-layer design for cognitive radio ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 2599–2609. [Google Scholar] [CrossRef]
  19. Nguyen, M.V.; Hong, C.S.; Lee, S. Cross-layer optimization for congestion and power control in OFDM-based multi-hop cognitive radio networks. IEEE Trans. Commun. 2012, 60, 2101–2112. [Google Scholar] [CrossRef]
  20. Nguyen, M.V.; Lee, S.; You, S.; Hong, C.S.; Le, L.B. Cross-layer design for congestion, contention, and power control in CRAHNs under packet collision constraints. IEEE Trans. Wirel. Commun. 2013, 12, 5557–5571. [Google Scholar] [CrossRef]
  21. Chiang, M. Balancing transport and physical layers in wireless multihop networks: Jointly optimal congestion control and power control. IEEE J. Sel. Areas Commun. 2015, 23, 104–116. [Google Scholar]
  22. Zhang, H.; Jiang, C.; Beaulieu, N.C.; Chu, X.; Wen, X.; Tao, M. Resource allocation in spectrum-sharing OFDMA femtocells with heterogeneous services. IEEE Trans. Commun. 2014, 62, 2366–2377. [Google Scholar] [CrossRef]
  23. Zhang, H.; Nie, Y.; Cheng, J.; Leung, V.C.M.; Nallanathan, A. Sensing time optimization and power control for energy efficient cognitive small cell with imperfect hybrid spectrum sensing. IEEE Trans. Wirel. Commun. 2017, 16, 730–743. [Google Scholar] [CrossRef]
  24. Yao, Y.; Giannakis, G.B. Energy-efficient scheduling for wireless sensor networks. IEEE Trans. Commun. 2005, 53, 1333–1342. [Google Scholar] [CrossRef]
  25. Xiao, K.; Mao, S.; Tugnait, J.K. MAQ: A multiple model predictive congestion control scheme for cognitive radio networks. IEEE Trans. Wirel. Commun. 2017, 16, 2614–2626. [Google Scholar] [CrossRef]
  26. Bajwa, W.U.; Haupt, J.D.; Sayeed, A.M.; Nowak, R.D. Joint source–channel communication for distributed estimation in sensor networks. IEEE Trans. Inf. Theory 2007, 53, 3629–3653. [Google Scholar] [CrossRef]
  27. Nama, H.; Chiang, M.; Mandayam, N. Utility-lifetime trade-off in self-regulating wireless sensor networks: A cross-layer design approach. In Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey, 11–15 June 2006; pp. 1–6. [Google Scholar]
  28. Zhang, H.; Jiang, C.; Mao, X.; Chen, H.-H. Interference-limited resource optimization in cognitive femtocells with fairness and imperfect spectrum sensing. IEEE Trans. Veh. Technol. 2016, 65, 1761–1771. [Google Scholar] [CrossRef]
  29. Zhang, H.; Jiang, C.; Beaulieu, N.C.; Chu, X.; Wang, X.; Quek, T.Q.S. Resource allocation for cognitive small cell networks: A cooperative bargaining game theoretic approach. IEEE Trans. Wirel. Commun. 2015, 14, 3481–3493. [Google Scholar] [CrossRef]
  30. Reeb, D.; Wolf, M.M. Tight bound on relative entropy by entropy difference. IEEE Trans. Inf. Theory 2015, 61, 1458–1473. [Google Scholar] [CrossRef]
  31. Li, R.; Zhao, Z.; Zhou, X.; Palicot, J.; Zhang, H. The prediction analysis of cellular radio access network traffic: From entropy theory to networking practice. IEEE Commun. Mag. 2014, 52, 234–240. [Google Scholar] [CrossRef]
  32. Nielsen, M.A.; Kempe, J. Separable states are more disordered globally than locally. Phys. Rev. Lett. 2001, 86, 5184–5187. [Google Scholar] [CrossRef] [PubMed]
  33. Patwari, N.; Hero, A.O.; Perkins, M.; Correal, N.S.; O’Dea, R.J. Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 2003, 51, 2137–2148. [Google Scholar] [CrossRef]
  34. Zhang, H.; Huang, S.; Jiang, C.; Long, K.; Leung, V.C.M.; Poor, H.V. Energy efficient user association and power allocation in millimeter-wave-based ultra dense networks with energy harvesting base stations. IEEE J. Sel. Areas Commun. 2017, 35, 1936–1947. [Google Scholar] [CrossRef]
  35. El Batt, T.; Ephremides, A. Joint scheduling and power control for wireless ad hoc networks. IEEE Trans. Wirel. Commun. 2004, 3, 74–85. [Google Scholar] [CrossRef]
  36. Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.-H.; Leung, V.C.M. Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges. IEEE Commun. Mag. 2017, 55, 138–145. [Google Scholar] [CrossRef]
Figure 1. Illustration of the rectangular grid based SN-CRN. SU: secondary user; PU: primary user; PBS: primary base station.
Figure 1. Illustration of the rectangular grid based SN-CRN. SU: secondary user; PU: primary user; PBS: primary base station.
Sensors 17 02132 g001
Figure 2. The time-slotted frame structure adopted by dedicated spectrum sensor nodes (SSNs) in time-slot duration T F . SSR: spectrum sensing results.
Figure 2. The time-slotted frame structure adopted by dedicated spectrum sensor nodes (SSNs) in time-slot duration T F . SSR: spectrum sensing results.
Sensors 17 02132 g002
Figure 3. Illustration of buffer based congestion detection at bottlenecked secondary user (SU) b. (a) Normal status without buffer overflow; (b) Congestion occurrence due to buffer overflow.
Figure 3. Illustration of buffer based congestion detection at bottlenecked secondary user (SU) b. (a) Normal status without buffer overflow; (b) Congestion occurrence due to buffer overflow.
Sensors 17 02132 g003
Figure 4. The block diagram of the key point to achieve congestion mitigation for bottleneck secondary user.
Figure 4. The block diagram of the key point to achieve congestion mitigation for bottleneck secondary user.
Sensors 17 02132 g004
Figure 5. Simulation scenario: the rectangular grid topology with three-tier structure within a torus area of 100 m × 100 m. The dotted lines correspond to the transmissions of the spectrum sensing results from interior tier (IT) and middle tier (MT) spectrum sensor nodes to bottlenecked secondary user. SU: secondary user; PU: primary user; ET: exterior tier.
Figure 5. Simulation scenario: the rectangular grid topology with three-tier structure within a torus area of 100 m × 100 m. The dotted lines correspond to the transmissions of the spectrum sensing results from interior tier (IT) and middle tier (MT) spectrum sensor nodes to bottlenecked secondary user. SU: secondary user; PU: primary user; ET: exterior tier.
Sensors 17 02132 g005
Figure 6. The detection and false alarm probabilities for spectrum sensor nodes from interior tier and middle tier over 12 uplink channels. IT: interior tier; MT: middle tier; SSN: spectrum sensor node.
Figure 6. The detection and false alarm probabilities for spectrum sensor nodes from interior tier and middle tier over 12 uplink channels. IT: interior tier; MT: middle tier; SSN: spectrum sensor node.
Sensors 17 02132 g006
Figure 7. The detection probability and false alarm probability distributions of the selected spectrum sensor nodes involving IT-1, MT-2, MT-5, and MT-7. (a) Detection probability distribution; (b) False alarm probability distribution. IT: interior tier; MT: middle tier; SSN: spectrum sensor node.
Figure 7. The detection probability and false alarm probability distributions of the selected spectrum sensor nodes involving IT-1, MT-2, MT-5, and MT-7. (a) Detection probability distribution; (b) False alarm probability distribution. IT: interior tier; MT: middle tier; SSN: spectrum sensor node.
Sensors 17 02132 g007
Figure 8. Optimal transmit power vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Figure 8. Optimal transmit power vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Sensors 17 02132 g008
Figure 9. Optimal transmit power vs. the slot τ r p (r = 0.5, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Figure 9. Optimal transmit power vs. the slot τ r p (r = 0.5, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Sensors 17 02132 g009
Figure 10. Transmitted data sequence of SSR vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Figure 10. Transmitted data sequence of SSR vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Sensors 17 02132 g010
Figure 11. Reduction of data sequence of spectrum sensing results for of selected spectrum sensor nodes vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Figure 11. Reduction of data sequence of spectrum sensing results for of selected spectrum sensor nodes vs. discount factor r ( τ r p = 12 ms, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Sensors 17 02132 g011
Figure 12. Reduction of data sequence of spectrum sensing resultsfor of selected spectrum sensor nodes vs. the slot τ r p (r = 0.3, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Figure 12. Reduction of data sequence of spectrum sensing resultsfor of selected spectrum sensor nodes vs. the slot τ r p (r = 0.3, l = 250 iterations). NoCoPC: noncooperative power control; CoPC: cooperative power control; PB: power balancing.
Sensors 17 02132 g012

Share and Cite

MDPI and ACS Style

Zhang, L.; Xu, H.; Zhuo, F.; Duan, H. Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks. Sensors 2017, 17, 2132. https://doi.org/10.3390/s17092132

AMA Style

Zhang L, Xu H, Zhuo F, Duan H. Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks. Sensors. 2017; 17(9):2132. https://doi.org/10.3390/s17092132

Chicago/Turabian Style

Zhang, Long, Haitao Xu, Fan Zhuo, and Hucai Duan. 2017. "Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks" Sensors 17, no. 9: 2132. https://doi.org/10.3390/s17092132

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop