Next Article in Journal
Human Movement Detection and Identification Using Pyroelectric Infrared Sensors
Next Article in Special Issue
An Optimal Current Observer for Predictive Current Controlled Buck DC-DC Converters
Previous Article in Journal
Development of a Micro-Step Voltage-Fed Actuator with a Novel Stepper Motor for Automobile AGS Systems
Previous Article in Special Issue
The Enhanced Locating Performance of an Integrated Cross-Correlation and Genetic Algorithm for Radio Monitoring Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Spectrum Sensing Schemes with the Interference Constraint in Cognitive Radio Networks

1
Department of Electronic & Computer Engineering in Graduate School, Hongik University, Sejong 339-701, Korea
2
Department of Computer & Information Communications Engineering, Hongik University, Sejong 339-701, Korea
*
Author to whom correspondence should be addressed.
Sensors 2014, 14(5), 8037-8056; https://doi.org/10.3390/s140508037
Submission received: 12 March 2014 / Revised: 24 April 2014 / Accepted: 28 April 2014 / Published: 5 May 2014

Abstract

: In this paper, we propose cooperative spectrum sensing schemes, called decode-and-forward cooperative spectrum sensing (DF-CSS) scheme and amplify-and-forward cooperative spectrum sensing (AF-CSS) scheme, in cognitive radio networks. The main goals and features of the proposed cooperative spectrum sensing schemes are as follows: first, we solve the problem of high demand for bandwidth in a soft decision scheme using in our proposed schemes. Furthermore, the impact of transmission power of relaying users which is determined by the interference constraint on sensing performance of cooperative spectrum sensing schemes is also investigated. Second, we analyze the sensing performance of our proposed cooperative spectrum sensing schemes in terms of detection probability and interference probability, respectively. We take into account the interference caused by secondary user (SU) to primary user (PU) in the case that the transmission power of the relaying users exceeds a predefined interference constraint assigned by the primary user. The simulation results show that in cooperative spectrum sensing schemes the total sensing performance depends not only on the interference tolerance level, but also on the relay protocols used. We also prove that high transmission power of relaying users increases the interference between the secondary networks and the primary network.

1. Introduction

The demand for radio spectrum has rapidly increased since the number of wireless applications and standards are increasing significantly. However, the current static spectrum allocation policy has caused a shortage of spectrum resources because almost all the spectrum has been allocated and there is no new spectrum for new wireless services. On the other hand, actual measurements by the Federal Communications Commission (FCC) have shown that the allocated spectrum in the US is largely under-utilized [1]. In order to improve the utilization of the finite spectrum sources, a new intelligent communications system named cognitive radio (CR) is proposed. Cognitive radio (CR) technology enables unlicensed wireless devices to use the under-utilized spectrum by obtaining the necessary observations about their surrounding radio environment [2]. Therefore, the CR technique allows a more efficient utilization of the spectrum by operating in the idle channel.

In CR, the secondary (unlicensed) users opportunistically or concurrently access the spectrum allocated to primary (licensed) users. A prerequisite to this secondary access is that does not cause interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection has been widely applied because of its simplicity and efficiency. However, energy detectors are susceptible to noise uncertainty in low SNR regimes and reliable detection of the primary user is not possible, even with a large amount of sensing time [3]. On the other hand, a critical issue in cognitive radio is to reliably and quickly detect the presence of the primary users. In addition, the performance of spectrum sensing is limited by multipath fading and shadowing which are the fundamental characteristics of wireless channels. To overcome these challenges, cooperation among SUs to perform spectrum sensing has been proposed in the literature.

In cooperative spectrum sensing, information from different CR users is combined to make a decision on the presence or absence of the primary user. Cooperation among secondary users is usually coordinated by a fusion center (FC). Fusion schemes can be broadly categorized into soft decision schemes and hard decision schemes, depending on the type of sensing information being sent by the SUs [4,5]. In this paper, we focus on soft decision schemes. In [6], a soft decision scheme with relay using an amplify-and-forward protocol has been proposed. In that scheme, the secondary user with higher sensing reliability acts as a relay to help the other users that wants to use the primary spectrum band. By exploiting all the information available in both sensing and reporting phases in similar schemes in [6], the authors in [7] obtained a better sensing performance. Generally, soft decision combination has better sensing performance, but requires a much larger bandwidth for transmission of the sensing information [4]. However, the question about how to reduce the demand of bandwidth for reporting channel in soft decision scheme was not considered in [6,7].

In this paper, we develop an efficient cooperative sensing scheme based on the concept of the underlay approach in cognitive radio systems. The underlay approach to cognitive radio allows the secondary user to use the spectrum of the primary user simultaneously under the constraint that the interference caused to the primary user by secondary user does not degrade its communication [8]. More particularly, in [9], the outage probability of the underlay cognitive radio with best relay selection was investigated. A similar work in which the authors evaluated the interference probability of secondary transmissions on a primary receiver was reported in [10]. However, these works just focus on the data transmission, but not on application to spectrum sensing in cognitive radio networks. In addition, underlay cognitive radio still has a weak point in that cognitive users are limited to short range communications due to the transmission power constraints [8]. Hence, for the application with long distance transmission and high data rate, the secondary users should freely use the licensed spectrum with a normal transmit power level as the primary user to satisfy the QoS requirements.

Besides, in centralized cooperative sensing, the time delay for reporting sensing data will be large when the network size is expanded. We also consider this issue in our proposed cooperative spectrum sensing schemes by using best relay selection (BRS) protocol [11]. Among the various cooperative strategies, transmission based on relay selection has been shown to provide substantial cooperative gains as well as being spectrally and costly more efficient than repetitive transmission techniques [9]. Therefore, a best relay selection (BRS) has been commonly applied in several CR networks subject to a spectrum sharing condition, either assuming decode-and-forward (DF) relays or amplify-and-forward (AF) relays. It has been shown that exploiting user cooperation significantly enhances the cognitive system performance [9,10]. In this paper, we study the effect of the decode-and-forward, amplify-and-forward and best relay selection protocols on the spectrum sensing capabilities of cognitive radio network.

The main difference and typical characteristic of our proposed schemes with other cooperative schemes, i.e., the schemes presented in [6,7], are as follows: in this paper, we propose CSS schemes that rely on the concept of soft sensing and underlay cognitive radio, in which the underlay approach is adopted as a method for cooperative users to exchange their sensing data. Most cooperative spectrum schemes assume that there is a dedicated reporting channel for SUs to exchange their sensing data, but this assumption makes the soft combination schemes consume more radio resources. By using an underlay approach, our proposed schemes do not need the dedicated channel that is used for SUs to exchange their collected data. To the best of the authors' knowledge, there are no previous works that use an underlay approach as a method for exchanging data between cooperative SUs in spectrum sensing.

The organization of the paper is as follows: in Section 2, we describe in detail the basic concepts of the proposed cooperative spectrum sensing schemes and the system model. In Section 3, we then study and present theoretical analysis of the sensing performance of our proposed schemes and the probability of interference between the secondary and primary networks. In Section 4, we show the effect of interference constraints on the performance of cooperative detection schemes by using both theoretical and simulation results. Finally, in Section 5 we present our conclusions.

2. The Basic Concept of the Proposed Schemes and System Model

In this section, we describe in detail the basic concepts of the proposed cooperative spectrum sensing schemes. In [4], it was shown that soft decision fusion schemes have the ability to achieve better performance compared to hard decision schemes. However, under the same channel conditions, the bandwidth cost of sending one bit per decision in a hard decision scheme is smaller than that of sending the collected data of a primary signal for a soft decision scheme. Moreover, since this scheme needs more extra bandwidth, the bandwidth demand becomes high when the number of SUs in the network is huge. Another idea for the reporting channel between cooperative secondary users was proposed in [12]. The transmission of the sensing information can be done using an unlicensed band such as the industrial, scieic and medical (ISM) radio bands. However, the SUs may suffer severe interference from a variety of devices using the ISM band. To overcome this weak point of soft decision schemes, we propose the cooperative spectrum sensing schemes using soft decision, in which the collected data are exchanged between the cooperative secondary users by using an underlay approach in a cognitive radio system. By using the underlay approach, the proposed schemes do not need a dedicated reporting channel for exchanging sensing data between cooperative secondary users.

In the underlay approach, the secondary user is allowed to use the licensed spectrum simultaneously with the primary user only when the interference that is caused by the secondary user is less than the interference level which the primary user can tolerate. Let It be the interference threshold of the primary user. Hence, the transmission power of the secondary user is constrained not to exceed this interference threshold It. This approach may not only reduce the complexity of reporting channel management, but also solve the demand for bandwidth in soft decision schemes. However, since the underlay cognitive radio network operates in a fixed time-division multiple-access (TDMA) mode, the cooperative spectrum sensing requires a larger sensing time that involves sending data to the fusion center when the number of collaborating users is higher. In order to satisfy the essential requirements for the fast spectrum sensing and reliable signal detection, the best relay selection scheme is adopted in our proposed schemes as the method to solve this issue. Besides, in order to improve the sensing performance, we use AF and DF protocol to achieve the cooperative diversity.

Let's consider a cognitive radio system with the coexistence of primary and secondary networks as depicted in Figure 1. The primary network contains a primary transmitter P and a primary receiver D. The hypotheses of the absence and the presence of the primary user P are denoted as H0 and H1, respectively. We assume that the primary status is not changed during the sensing period. The secondary network is represented by one secondary user S and N secondary relays, denoted by R = {Rk | k = 1,2,…,N}. Herein, S wants to use the primary spectrum. All N secondary users Rk are available to help S sense the primary spectrum. In addition, all users in the entire system are equipped with one antenna and operate in half duplex mode.

We assume that each link between any two users is modeled as a Rayleigh fading channel and pairwise independent. We also assume that each user has access to its instantaneous channel state information (CSI). In addition, we assume that all the SUs have the knowledge of the average channel gain of the link from itself to other users in both primary and secondary networks. We assume that the secondary relays Rk's have an identical average SNR of the received primary signal. This is facilitated by allowing pilot symbols to be transmitted at regular intervals. The identical SNR assumption can be practical when all the relays are gathered in a small area.

In the spectrum sensing process, the sensing duration in each fixed time slot is divided into two sub-phases. In the first sub-phase, each SU collects the PU's signal. In the second sub-phase, by using the best relay selection scheme, only the relay which has the highest instantaneous signal-to-noise ratio (SNR) of the signal that received from primary user sends its collected data to S by using either a decode-and-forward protocol or an amplify-and-forward protocol. At the end of sensing process, S combines the received signals from the primary user and best relaying user using the maximum ratio combining (MRC) method, and makes the final decision about the status of the primary user by using an energy detector. Throughout the paper, we assume that the secondary user S has strong computation ability so that it can make the local decision by using its own sensing data and the relay data. Here, the secondary user S also plays a role as the fusion center.

Under underlay approach, the transmission power of the best relay Rk is calculated based on the interference constraint It that is defined by the primary receiver D and the instantaneous CSI of the interference link between the secondary relay Rk and the primary receiver D. In practice, it is difficult to estimate perfectly the channel state information (CSI) between secondary and primary networks (e.g., due to mobility between SUs and PUs). We take into account this scenario in terms of interference probability that is denoted by PI of the secondary relay transmissions on the primary receiver D. In particularly, we analyze the interference caused by the secondary user to the primary user since the secondary transmission power exceeds the predefined interference threshold It.

By using the underlay approach and best relay selection, the main objective we focus on in this paper is how to reduce radio resources such as bandwidth, and sensing time for a soft combination scheme with a large number of SUs in the network. With that purpose, while we adopt a simple cooperative scheme and fusion rule in our scheme to facilitate the analysis work, we do not focus on the improvement of sensing performance to compare with related works. For the whole paper, E[.] denotes the statistical expectation operator and Pr(A) is the probability of an arbitrary event A.

3. The Theoretical Analysis

3.1. Non-Cooperation Spectrum Sensing Scheme

In the non-cooperative spectrum sensing scheme, each secondary user decides independently the status of the primary user. Let us assume that the primary user P transmits signal xP (E[|xP|2] = 1) to the primary receiver D with a fixed power PP-Tx in a certain time slot t. In the meantime, all the secondary users in the secondary network also listen to the primary signal from P. The signals received by SUi, i ∈ {S, R1,R2,…RN} from primary user P can be expressed as:

y i = θ i P P Tx h P i x P + n i
where the time index t is dropped for notational convenience, hPi which is modeled as a complex Gaussian random variable with zero mean denotes the instantaneous channel gain of the channel from the primary user P to a secondary user SUi, and ni denotes the additive Gaussian noise with zero-mean and unit variance. Also, we assume that all the instantaneous channel gain hPi's and the additive Gaussian noise ni's in the secondary network are independent. Besides, θi denotes the primary user indicator such that θi = 1 implies the primary user is present and θi = 0 implies the primary user is absent.

The detection of primary user is a binary hypothesis testing problem, which can be written as follows:

H 0 : θ i = 0 , the primary user is absent , H 1 : θ i = 1 , the primary user is present .

In this paper, we utilize the energy detector (ED) [3] as a method of local spectrum sensing. The ED forms the statistics:

Y i = | y i | 2
and compares with the decision threshold λi which is determined by a pre-specified probability of false alarm Pf,i = β. If the observation statistic is greater than a decision threshold λi, namely Yi > λi, then the secondary user SUi decides that the primary user is present, otherwise the secondary user SUi decides that the primary user is absent. The expected signal power γi of Yi (i.e., γi = E[Yi]) is calculated as:
γ i = θ i P i R x + 1
where Pi-Rx = E[PP-Tx|hPi|2] refers to the received signal power at SUi from the primary user P.

Since yi is complex Gaussian random variable, Yi follows exponential distribution with parameter 1/γi. The detection probability Pd,i of the secondary user SUi under the non-cooperative spectrum sensing protocol is given by:

P d , i = Pr ( Y i > λ i | H 1 ) = λ i 1 γ i | H 1 exp ( t γ i | H 1 ) d t = exp ( λ i P i R x + 1 )
where λi is obtained from false alarm probability Pf,i as follows:
P f , i = Pr ( Y i > λ i | H 0 ) = λ i 1 γ i | H 0 exp ( t γ i | H 0 ) d t = exp ( λ i )
Where γiH1 and γiH10 are the expected signal power γi of Yi under hypothesis H1 and H0, respectively.

Therefore, under a constant probability of false alarm Pf,i = β, the detection threshold λi of secondary users SUi, according to Equation (5), is given by:

λ i = ln 1 β

3.2. Decode-and-Forward Protocol Based Cooperative Spectrum Sensing (DF-CSS) Scheme

In this subsection, we mathematically describe the cooperative spectrum sensing scheme using a decode-and-forward protocol in a cognitive radio system. Then, we derive the detection probability Pd,S,DF and the false alarm probability Pf,S,DF of the secondary user S.

The sensing process is conducted in two sub-phases. In the first sub-phase, all the secondary users listen to the signal from the primary user P. The received signal at each secondary user from the primary user is described as in Equation (1). Then, all the secondary relays will decode their received signals. In the second sub-phase, without loss of generality, consider that only a candidate relay Rk, k{1,2,…, N}, is selected to forward its decoded result to the secondary user S. Herein, we utilize the instantaneous channel gain of the link from the primary user P to secondary rely Rk to determine which “best” relay will be selected to send its own data to secondary user S in each sensing period. As a consequence, the best relay selection criterion can be written as:

Best relay = arg max R k R S N R R k = arg max R k R P R k R x | h P R k | 2 σ i 2 = arg max R k R | h P R k | 2
where hPRk which is modeled as a complex Gaussian random variable with zero mean denotes the instantaneous channel gain of the channel from the primary user P to a secondary relay Rk, and σi2 is the noise variance which is assumed to be unit.

With the aforementioned assumption that all the relays are gathered in a small area, the average received signal power PRkRx at the relays Rk's can be assumed identical. We can see that there are two possible scenarios for this scheme. In the first scenario, if primary user P is absent, then Rk will keep silent because there is no primary signal to decode. Therefore, S cannot get any help from Rk and make a decision by itself. On the other hand, in the second scenario, if primary user exists, Rk will decode the received signal and sends it to S. We assume that Rk can always fully decode the primary signal if the primary user is present. In the underlay cognitive radio structure, the transmission power at Rk may be expressed as:

P R k Tx = I t | f R k D | 2
where fRkD which is modeled as a complex Gaussian random variable with zero mean denotes the instantaneous channel gain of the interference channel from the secondary relay Rk to the primary receiver D.

Notice that the instantaneous channel gains hij and fij, are assumed to be zero-mean complex Gaussian random variables, respectively, where i{P, S, Rk}, j{Rk, D}. Therefore, the instantaneous channel gains |hRkS|2 and |fRkD|2 of these links follows exponential distribution with the parameters:

1 ψ R k S = 1 E [ | h R k S | 2 ] , 1 ψ R k D = 1 E [ | f R k D | 2 ]
respectively.

Finally, the secondary user S combines two signals, one is from the primary user P and the other is from the best secondary relay Rk using the maximum ratio combining (MRC) method, and does the spectrum sensing by using energy detector as we mentioned in Section 3.1. The received signal at S can be written as:

y S , D F = θ S P P Tx h P S x P + θ R k P R k Tx h R k S x P + n S
where hRkS which is modeled as a complex Gaussian random variable with zero mean denotes the instantaneous channel gain of the channel from the secondary relay Rk to a secondary user S, and θS denotes the primary user indicator of the secondary user S, and θRk denotes the primary user indicator of all the secondary relays Rk.

The energy detector forms the statistics YS,DF = |yS,DF|2 and compares it with its threshold λS,DF which is determined by a pre-assigned false alarm probability β. In addition, the expected signal power γS,DF of YS,DF is calculated as:

γ S , D F = E [ Y S , D F ] = θ R k I t | h R k S | 2 | f R k D | 2 + θ S P S R x + 1
where PSRx refers to the received signal power at secondary user S and secondary relay Rk from the primary user P. Let:
z = | h R k S | 2 / ψ R k S | f R k D | 2 / ψ R k D

In Equation (12), since the numerator and denominator of z are independent and both exponentially distributed with mean one, after some manipulations, probability density function (pdf) of z is given as:

f ( z ) = { 1 ( 1 + z ) 2 , z > 0 0 , z 0

Define ψ = ψRkS/ψRkD then Equation (11) is re-written as:

γ S , D F = θ R k I t ψ z + θ S P S R x + 1

Since yS,DF given hRkS and fRkD is complex Gaussian random variable, YS,DF given z follows exponential distribution with parameter 1/γS,DF. By using the theorem of total probability, the detection probability Pd,S,DF of S is given by:

P d , S , D F = Pr ( Y S , D F > λ S , D F | H 1 ) k = 1 N Pr ( | h R k S | 2 > max h R i S R , i k | h R i S | 2 )

We first calculate Ωk as [10]:

Ω k = Pr ( | h R k S | 2 > max h R i S R , i k | h R i S | 2 ) = 0 Pr ( max h R i S R , i k | h R i S | 2 < x ) f | h R k S | 2 ( x ) d x = ( a ) m = 0 N 1 ( N 1 m ) ( 1 ) m m + 1 = ( b ) 1 N

In Equation (16), the equality sign (a) is obtained by using cumulative distribution function (CDF) of |hRkS|2 and Newton's binomial expansion. The equality sign (b) is derived by using Mathematica software [13]. Hence:

P d , S , D F = Pr ( Y S , D F > λ S , D F | H 1 ) k = 1 N Ω k = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | θ R k = 1 , H 1 ) Pr ( θ R k = 1 | H 1 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | θ R k = 0 , H 1 ) Pr ( θ R k = 0 | H 1 ) = β 1 P R k R x + 1 0 1 ( 1 + z ) 2 exp ( λ S , D F I t ψ z + P S R x + 1 ) d z + ( 1 β 1 P R k R x + 1 ) exp ( λ S , D F P S R x + 1 ) .

The derivation of Equation (17) is presented in Appendix 1. The value of threshold λS,DF in each sensing period is determined first. We assume that all the secondary users have to maintain the same predefined false alarm probability before doing spectrum sensing, i.e., Pf,S,DF = Pf, Rk = β, then the threshold λS,DF is determined as follows:

P f , S , D F = Pr ( Y S , D F > λ S , D F | H 0 ) k = 1 N Ω k = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | θ R k = 1 , H 0 ) Pr ( θ R k = 1 | H 0 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | θ R k = 0 , H 0 ) Pr ( θ R k = 0 | H 0 ) = ( 1 β ) exp ( λ S , D F ) + β 0 1 ( 1 + z ) 2 exp ( λ S , D F I t ψ z + 1 ) d z

The derivation of Equation (18) is presented in Appendix 2.

3.3. Amplify-and-Forward Protocol Based Cooperative Spectrum Sensing Scheme

In this subsection, we mathematically describe the cooperative spectrum sensing scheme using an decode-and-forward protocol in a cognitive radio system. Then, we derive the detection probability Pd,S,AF and the false alarm probability Pf,S,AF of the secondary user S.

The sensing process is conducted in two sub-phases time. In the first sub-phase, all the secondary users listen to the signal from the primary user P. The received signal at each secondary user from the primary user is described as in Equation (1). In the second sub-phase, the best relay Rk that is selected according to the best relay selection criterion as in Equation (7) will amplify its received signal and send to the secondary user S without consideration about the status of the primary user. According to the underlay cognitive radio structure and for fair comparison in sensing performance with the DF-CSS scheme, the amplification factor is chosen as:

α = I t | f R k D | 2
where fRkD which is modeled as a complex Gaussian random variable with zero mean denotes the instantaneous channel gain of the interference channel from the secondary relay Rk to the primary receiver D.

In this scheme, let θ denote the primary user indicator for all the secondary user in the network. It is reasonable due to in the first sub-phase, that the secondary S and the relays Rk's do the cooperation but do not consider the status of the primary user as in a DF-CSS scheme.

Finally, the secondary user S combines two signals, one is from the primary user P, the other is from the best secondary relay Rk using the maximum ratio combining (MRC) method, and does the spectrum sensing by using energy detector. The received signal at S can be written as:

y S , A F = θ P P Tx h P S x P + α h R k S y R k + n S = θ P P Tx h P S x P + α h R k S ( θ P P Tx h P R k x P + n R k ) + n S = θ P P Tx x P ( h P S + α h R k S h P R k ) + ( α h R k S n R k + n S )
where hPS, hPRk, hRkS which are modeled as a complex Gaussian random variable with zero mean denote the instantaneous channel gain of the channel from the primary user P to a secondary user S, from the primary user P to a best secondary relay Rk, and from the best secondary relay Rk to the secondary user S, respectively; ns and nRk denote the additive Gaussian noise with zero-mean and unit variance.

Let YS,AF = |yS,AF|2 be the output of the energy detector of the secondary user S. The expected signal power γS,AF of YS,AF is calculated as:

γ S , A F = E [ Y S , A F ] = θ ( P S R x + α P R k R x | h R k S | 2 ) + ( α | h R k S | 2 + 1 )
where PSRx and PRkRx refer to the received signal power at secondary user S and secondary relay Rk from the primary user P, respectively.

Let

z = | h R k S | 2 / ψ R k S | f R k D | 2 / ψ R k D
as in Equation (12) and the pdf of z is given as in Equation (13). Define ψ = ψRkS/ψRkD Equation (21) is rewritten as
γ S , A F = ( 1 + θ P R k R x ) I t ψ z + θ P S R x + 1

Since yS,AF given hRkS and fRkD is complex Gaussian random variable, YS,AF given z follows exponential distribution with parameter 1/γS,AF.

The detection probability Pd,S,AF of S is given by

P d , S , A F = Pr ( Y S , A F > λ S , A F | H 1 ) k = 1 N Pr ( | h R k S | 2 > max h R i S R , i k | h R i S | 2 ) = Pr ( Y S , A F > λ S , A F | H 1 ) k = 1 N Ω k = 0 Pr ( Y S , A F > λ S , A F | H 1 , z ) f ( z ) d z = 0 λ S , A F 1 ( 1 + z ) 2 1 γ S , A F | H 1 exp ( x γ S , A F | H 1 ) dxdz = 0 1 ( 1 + z ) 2 exp ( λ S , A F ( 1 + P R R x ) I t G z + P S R x + 1 )
where λS,AF refers to the threshold of energy detector of the secondary user S.

The value of threshold λS,AF in each sensing period is priory determined. We assume that all the secondary users have to maintain the same predefined false alarm probability before doing spectrum sensing, i.e., Pf,S,AF = Pf, Rk = β (the same value as in DF-CSS scheme) then the threshold λS,AF is determined as follows

P f , S , A F = Pr ( Y S , A F > λ S , A F | H 0 ) k = 1 N Ω k = 0 Pr ( Y S , A F > λ S , A F | H 0 , z ) f ( z ) d z = 0 λ S , A F 1 ( 1 + z ) 2 1 γ S , A F | H 0 exp ( x γ S , A F | H 0 ) dxdz . = 0 1 ( 1 + z ) 2 exp ( λ S , A F I t ψ z + 1 ) d z

3.4. Interference Probability

In this subsection, we take into account the case that the secondary relays have imperfect CSI of the interference link between the primary receiver D and the secondary relay Rk. Let denote fRkD,im as the imperfect interference link between Rk and D. Then, according to [14], fRkD,im is given as:

f R k D , i m = ρ f R k D + τ 1 ρ 2
where τ is a circular symmetric complex Gaussian random variable with zero mean and ψRkD/2 variance and ρ (0 < ρ < 1) is the correlation coefficient between fRkD and fRkD,im.

Since transmission power at Rk is rewritten as:

P R k Tx , i m = ɛ I t | f R k D , i m | 2
where ε (ε0) is control power coefficient used to adjust transmit power for analyzing the influence of secondary transmission on primary network.

consequently, by using the theorem of total probability, the interference probability pi is given as follows:

P I = Pr ( P R k Tx , i m | f R ' D | 2 > I t ) k = 1 N Pr ( | h R k S | 2 > max h R i S R , i k | h R i S | 2 ) = Pr ( P R k Tx , i m | f R ' D | 2 > I t ) k = 1 N Ω k

Define:

g ( z ) = Pr ( | f R k D | 2 | f R k D , i m | 2 > z )

The joint probability density function (pdf) of fRkD and fRkD,im is given as [14]:

f | f R k D | 2 , | f R k D , i m | 2 ( x , y ) = e x + y ( 1 ρ 2 ) ψ R k D ( 1 ρ 2 ) ψ R k D 2 I 0 ( 2 ρ x y ( 1 ρ 2 ) ψ R k D )
where I0(.) is the zero th order modified Bessel function of the first kind.

We derive g(z) as follows:

g ( z ) = y = 0 x = y z ( e x + y ( 1 ρ 2 ) ψ R k D / ( 1 ρ 2 ) ψ R k D 2 ) I 0 ( 2 ρ x y ( 1 ρ 2 ) ψ R k D ) dxdy = ( a ) 0 1 ψ R k D exp ( y ψ R k D ) Q 1 ( 2 y ( 1 ρ 2 ) ψ R k D , 2 y z ( 1 ρ 2 ) ψ R k D ) d y = ( b ) 1 2 ( 1 + 1 z ( 1 + z ) 2 4 ρ 2 z )
where Q ( a , b ) = b x exp ( ( x 2 + a 2 ) / 2 ) I 0 ( a x ) d x is the Marcum-Q function.

Herein, the equal sign (a) is obtained by making a change of variable, i.e., t = x, and with the help of Equation (9) in [15]. The equal sign (b) is obtained by using Equation (55) from [15]. From Equation (27), (28) and (30), interference probability PI is derived as:

P I = g ( 1 ɛ )

Notice that ε (ε0) is control power coefficient used to adjust transmit power for analyzing the influence of best relay's transmission on the primary receiver D.

4. Performance Evaluation

In this section, we present the performance evaluation of our proposed schemes with the results of simulation and analysis under various different scenarios. In both DF-CSS and AF-CSS, we assume that S is the secondary user that has the weaker ability to sense the primary spectrum than the secondary relay Rk, i.e., PRkRx > PSRx, where PRkRx and PSRx are the received power from the primary user P at the secondary user Rk and S, respectively. The average channel gains ψRkS and ψRkD are modeled as a function of PRkRx and PS-Rx, and of PRkRx and PD-Rx, respectively. We assume that the primary user P, the secondary relays and the secondary user are nearly collinear. This is practical since the secondary relays are assumed to be closely located in a small area and the distance between the primary user P, the secondary user S and the area that the secondary relay Rk are located are far enough away. For simplicity, the received signal powers at user i (i{S, Rk}) from the primary user P are modeled as [7] Pi = (di)–3, where di is the distance between user i and P. Thus, ψRkS and ψRkD are obtained as:

ψ R k S = 1 | d R k d S | 3 , ψ R k D = 1 | d R k d D | 3
Where dRk is the distance between secondary user Rk and P, and dS is the distance between secondary user S and P, and dD is the distance between primary receiver D and primary user P.

Notice that, in this paper, the average SNRs of the primary signal at Rk's are assumed to be identical. Without loss of generality, the pre-assigned false alarm probability β of all secondary users is always set as β = 0.1 and the received power at D and S from P is always PD-Rx = 3 dB and PS-Rx = 0 dB, respectively.

In a cognitive radio network, when the primary users are detected, the secondary users have to leave that channel immediately. This makes the detection probability important to the primary users since the detection probability determines the primary user's degree protection from secondary users. Hence, the detection probability should be maintained at a high level. In this section, we will discuss the detection probability of the secondary user S as the sensing performance and on the main role of interference threshold It in the proposed schemes.

In Figures 2 and 3, we present the detection probability Pd,S,DF and Pd,S,AF as functions of the received power PRkRx from the primary user P at the secondary user Rk of the DF-CSS scheme and AF-CSS scheme, respectively. As we can see, according to the increasing value of PRkRx, the detection probability of S is better since Rk gets higher received power. Especially, at a given value of PRkRx the detection probability increases when the value of It is increased.

In Figure 4, we compare the sensing performance (detection probability) between DF-CSS and AF-CSS under the same parameter such that It = 5 dB. As we can see in Figure 4, the sensing performance (detection probability) of the AF-CSS scheme is superior to the DF-CSS scheme at high value of PRkRx (i.e., PRkRx is larger than 7 dB). However, at low value of PRkRx (i.e., PRkRx is from 3 dB to 7 dB), the sensing performance (i.e., detection probability) is almost the same for the DF-CSS and AF-CSS schemes.

In Figure 5 and Figure 6, we quay the sensing performance by depicting the receiver operating characteristic (ROC) (detection probability Pd, (i.e., Pd,S,DF and Pd,S,AF) versus false alarm probability Pf (i.e., Pf,S,DF and Pf,S,AF)) for the DF-ASS and AF-CSS schemes, respectively, in which, PRkRx = 7 dB, interference threshold It is 1 dB and 5 dB, respectively. In the context of cognitive radio, the value of Pf should be maintained at a low level since the false alarm probability determines the percentage of the white spaces that are misclassified as occupied. Hence, we just consider the sensing performance of the secondary user S at a low level of false alarm probability of S. As we can see, for a given value in low false alarm probability region, the detection probabilities in both the DF-CSS and AF-CSS schemes increase when value of It is increased.

From Figure 23, 4, 5 to Figure 6, we can see that in both the DF-CSS and AF-CSS schemes, with the same received power from the primary user at secondary user Rk and S, the detection probability is increased according to the increase of the interference threshold It. It means that when the relay is allowed to send the data to the secondary user S with higher transmission power, the final sensing result at the secondary user S is more reliable. Moreover, we can see that the sensing performance of both the schemes is improved if the received power from the primary user at the secondary relay Rk is increased. Obviously, it may be explained that the sensing reliability is higher when the relay receives the stronger signal from primary user.

In Figure 7, we compare the sensing performance of the DF-CSS and AF-CSS schemes. At the point of Pf = 0.1, both the schemes have the same sensing performance. However, when Pf increases, the AF-CSS scheme is superior than the DF-CSS scheme.

Figure 8 shows the interference probability PI of the both the DF-CSS and AF-CSS schemes as a function of the transmission power control coefficient ε of the secondary user Rk. Herein, without loss of generality, we choose the standard It = 5 dB and PRkRx = 3 dB. As we can see in Figure 8, the interference of the secondary transmission to the primary network becomes higher when we increase the transmission power control coefficient ε which makes the transmission power of Rk increase. Notice that the transmission power of the secondary relay Rk is determined based on the interference threshold It. However, when the condition of the interference link between secondary Rk and primary D is better (i.e., ρ is higher, where ρ is the correlation coefficient between fRkD and fRkD,im), the interference probability PI is decreased. The reason is that with more exact information about the primary receiver, the interference caused by a secondary network on the primary network is reduced. In addition, the interference threshold It itself does not impact on the change of interference probability PI. As we can see in Figure 8, the scenario with ρ = 0.9 and It = 1 dB gives the same simulation result as in the scenario with ρ = 0.9 and It = 5 dB in both the DF-CSS and AF-CSS schemes.

5. Conclusions

In this paper, we propose two soft decision cooperative spectrum sensing schemes using the combination of an underlay cognitive radio approach and a best relay selection scheme. Through theoretical analysis and simulation results, we can reach the following conclusions: detection probability depends on the value of interference threshold It at a primary user. In both the DF-CSS and AF-CSS schemes, with the same received power from the primary user at a secondary user Rk and S, we can see that the sensing performances are increased according to the increase of the interference threshold It. Moreover, we can see that the sensing performance of the both schemes is improved if the received power from the primary user at the secondary relay Rk is increased. The interference caused by secondary users on the primary operation is characterized by three main parameters, which are interference probability PI, the correlation coefficient ρ between fRkD and fRkD,im, and the control power coefficient ε. For a given ε, the interference probability PI is increased as the correlation coefficient ρ decreases. It means that the worse CSI the secondary users estimate, the more interference the secondary transmission causes on the primary operation. On the other hand, for the same received power from the primary user, interference caused by data transmission of Rk on a primary user is increased according to the increased transmission power of the secondary relay Rk which is adjusted by using the control power coefficient ε in both AF-CSS and DF-CSS schemes. Therefore, we need a tradeoff between the sensing reliability and the interference between primary and secondary networks because we adopt the underlay approach in spectrum sensing in cognitive radio networks.

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2013075605).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix 1

Derivation of Equation (17)

P d , S , D F = Pr ( Y S , D F > λ S , D F | H 1 ) k = 1 N Ω k = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | θ R k = 1 , H 1 ) Pr ( θ R k = 1 | H 1 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | θ R k = 0 , H 1 ) Pr ( θ R k = 0 | H 1 ) = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | H 1 ) Pr ( Y R k > λ R k | H 1 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | H 1 ) ( 1 Pr ( Y R k > λ R k | H 1 ) ) = P f , R k 0 Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | H 1 , z ) f ( z ) d z + ( 1 P f , R k ) 0 Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | H 1 , z ) f ( z ) d z = exp ( λ R k P R k R x + 1 ) 0 λ S , D F 1 ( 1 + z ) 2 1 γ S , D F | H 1 , θ R k = 1 exp ( x γ S , D F | H 1 , θ R k = 1 ) dxdz + ( 1 exp ( λ R k P R k R x + 1 ) ) 0 λ S , D F 1 ( 1 + z ) 2 1 γ S , D F | H 1 , θ R k = 0 exp ( x γ S , D F | H 1 , θ R k = 0 ) dxdz = P d , R k 0 λ S , D F 1 ( 1 + z ) 2 1 γ S , D F | H 1 , θ R k = 1 exp ( x γ S , D F | H 1 , θ R k = 1 ) dxdz + ( 1 P d , R k ) 0 λ S , D F 1 ( 1 + z ) 2 1 γ S , D F | H 1 , θ R k = 0 exp ( x γ S , D F | H 1 , θ R k = 0 ) dxdz = β 1 P R k R x + 1 0 1 ( 1 + z ) 2 exp ( λ S , D F I t ψ z + P S R x + 1 ) d z + ( 1 β 1 P R k R x + 1 ) exp ( λ S , D F P S R x + 1 ) .

Appendix 2

Derivation of Equation (18)

P f , S , D F = Pr ( Y S , D F > λ S , D F | H 0 ) k = 1 N Ω k = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | θ R k = 1 , H 0 ) Pr ( θ R k = 1 | H 0 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | θ R k = 0 , H 0 ) Pr ( θ R k = 0 | H 0 ) = Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | H 0 ) Pr ( Y R k > λ R k | H 0 ) + Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | H 0 ) ( 1 Pr ( Y R k > λ R k | H 0 ) ) = P f , R k 0 Pr ( Y S , D F ( θ R k = 1 ) > λ S , D F | H 0 , z ) f ( z ) d z + ( 1 P f , R k ) 0 Pr ( Y S , D F ( θ R k = 0 ) > λ S , D F | H 0 , z ) f ( z ) d z = P f , R k 0 λ S , A F 1 ( 1 + z ) 2 1 γ S , D F | H 0 , θ R k = 1 exp ( x γ S , D F | H 0 , θ R k = 1 ) dxdz + ( 1 P f , R k ) 0 λ S , A F 1 ( 1 + z ) 2 1 γ S , D F | H 0 , θ R k = 0 exp ( x γ S , D F | H 0 , θ R k = 0 ) dxdz = ( 1 β ) exp ( λ S , D F ) + β 0 1 ( 1 + z ) 2 exp ( λ S , D F I t ψ z + 1 ) d z .

References

  1. FCC. Spectrum Policy Task Force Report; Technical Report TR 02-155; Federal Communications Commission: Washington, DC, USA, 2002. [Google Scholar]
  2. Mitola, J. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, 2000. [Google Scholar]
  3. Digham, F.F.; Alouini, M.S. On the energy detection of unknown signals over fading channels. IEEE Trans Commun. 2007, 1, 21–24. [Google Scholar]
  4. Yucek, T.; Arslan, H. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun Surv Tutor. 2009, 1, 116–130. [Google Scholar]
  5. Wang, B.; Liu, K.R. Advances in cognitive radio networks: A survey. IEEE J. Sel. Top Sign Proces. 2011, 1, 5–23. [Google Scholar]
  6. Ganesan, G.; Li, Y. Cooperative spectrum sensing in cognitive radio, part I: Two user networks. IEEE Trans Wirel Commun. 2007, 6, 2204–2213. [Google Scholar]
  7. Stotas, S.; Nallanathan, A. Cooperative spectrum sensing protocols in cognitive radio based on energy detection. Proceedings of the 2009 First UK-India International Workshop on Cognitive Wireless Systems (UKIWCWS), New Delhi, India, 10–12 December 2009; pp. 1–5.
  8. Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc IEEE 2009, 5, 894–914. [Google Scholar]
  9. Bao, V.N.Q.; Duong, Q.T.; Da Costa, D.; Alexandropoulos, G.; Nallanathan, A. Cognitive amplify-and-forward relaying with best relay selection in non-identical Rayleigh fading. IEEE Commun Lett. 2013, 3, 475–478. [Google Scholar]
  10. Thanh, T.L.; Bao, V.N.Q.; An, B. On the performance of outage probability in underlay cognitive radio with imperfect CSI. Proceedings of the IEEE 2013 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, 16–18 October 2013; pp. 125–130.
  11. Michalopoulos, D.S.; Karagiannidis, G.K. Performance analysis of single relay selection in Rayleigh fading. IEEE Trans Wirel Commun. 2008, 10, 3718–3724. [Google Scholar]
  12. Gandetto, M.; Regazzoni, C. Spectrum sensing: A distributed approach for cognitive terminals. IEEE J Sel Areas Commun. 2007, 3, 546–557. [Google Scholar]
  13. Mathematica, Version 9.0; Wolfram Research Inc.: Champaign, IL, USA, 2012.
  14. Suraweera, H.A.; Smith, P.J.; Shafi, M. Capacity limits and performance analysis of cognitive radio with imperfect channel knowledge. IEEE Trans Veh Technol. 2010, 4, 1811–1822. [Google Scholar]
  15. Nuttall, A.H. Some Integrals Involving the Q-Function; Technical Report 4297; Naval Underwater Systems Center: New London, CT, USA, 1972. [Google Scholar]
Figure 1. Cognitive radio system model with the coexistence of a secondary network under a primary network.
Figure 1. Cognitive radio system model with the coexistence of a secondary network under a primary network.
Sensors 14 08037f1 1024
Figure 2. Detection probability Pd,S,DF as a function of the received power PRkRx from the primary user P at the secondary user Rk in the DF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB).
Figure 2. Detection probability Pd,S,DF as a function of the received power PRkRx from the primary user P at the secondary user Rk in the DF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB).
Sensors 14 08037f2 1024
Figure 3. Detection probability Pd,S,AF as a function of the received power PRkRx from the primary user P at the secondary user Rk in the AF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB).
Figure 3. Detection probability Pd,S,AF as a function of the received power PRkRx from the primary user P at the secondary user Rk in the AF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB).
Sensors 14 08037f3 1024
Figure 4. Detection probability Pd between the DF-CSS and AF-CSS schemes as a function of the received power PRkRx from the primary user P at the secondary user Rk (PD-Rx = 3 dB, PS-Rx = 0 dB, It = 5 dB).
Figure 4. Detection probability Pd between the DF-CSS and AF-CSS schemes as a function of the received power PRkRx from the primary user P at the secondary user Rk (PD-Rx = 3 dB, PS-Rx = 0 dB, It = 5 dB).
Sensors 14 08037f4 1024
Figure 5. The ROC (Pd,S,DF vs. Pf,S,DF) of the secondary user S in the DF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB).
Figure 5. The ROC (Pd,S,DF vs. Pf,S,DF) of the secondary user S in the DF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB).
Sensors 14 08037f5 1024
Figure 6. The ROC (Pd,S,AF vs. Pf,S,AF) of the secondary user S in the AF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB).
Figure 6. The ROC (Pd,S,AF vs. Pf,S,AF) of the secondary user S in the AF-CSS scheme (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB).
Sensors 14 08037f6 1024
Figure 7. Comparison of the ROC (Pd vs. Pf) of the secondary user S between DF-CSS and AF-CSS (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB, It = 5 dB).
Figure 7. Comparison of the ROC (Pd vs. Pf) of the secondary user S between DF-CSS and AF-CSS (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB, It = 5 dB).
Sensors 14 08037f7 1024
Figure 8. Interference probability PI between secondary and primary networks as a function of the transmit power control coefficient ε of the secondary user Rk. (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB, It = 5 dB).
Figure 8. Interference probability PI between secondary and primary networks as a function of the transmit power control coefficient ε of the secondary user Rk. (PD-Rx = 3 dB, PS-Rx = 0 dB, PRkRx = 7 dB, It = 5 dB).
Sensors 14 08037f8 1024

Share and Cite

MDPI and ACS Style

Do, T.-N.; An, B. Cooperative Spectrum Sensing Schemes with the Interference Constraint in Cognitive Radio Networks. Sensors 2014, 14, 8037-8056. https://doi.org/10.3390/s140508037

AMA Style

Do T-N, An B. Cooperative Spectrum Sensing Schemes with the Interference Constraint in Cognitive Radio Networks. Sensors. 2014; 14(5):8037-8056. https://doi.org/10.3390/s140508037

Chicago/Turabian Style

Do, Tri-Nhu, and Beongku An. 2014. "Cooperative Spectrum Sensing Schemes with the Interference Constraint in Cognitive Radio Networks" Sensors 14, no. 5: 8037-8056. https://doi.org/10.3390/s140508037

APA Style

Do, T. -N., & An, B. (2014). Cooperative Spectrum Sensing Schemes with the Interference Constraint in Cognitive Radio Networks. Sensors, 14(5), 8037-8056. https://doi.org/10.3390/s140508037

Article Metrics

Back to TopTop