Next Article in Journal
A Review of Multi-UAV Task Allocation Algorithms for a Search and Rescue Scenario
Previous Article in Journal
Eye-Net: A Low-Complexity Distributed Denial of Service Attack-Detection System Based on Multilayer Perceptron
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding

School of Physics, Engineering and Computer Science (SPECS), University of Hertfordshire, College Lane Campus, Hatfield, Herts AL10 9AB, UK
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2024, 13(5), 46; https://doi.org/10.3390/jsan13050046
Submission received: 26 July 2023 / Revised: 6 August 2024 / Accepted: 12 August 2024 / Published: 23 August 2024

Abstract

:
For a multiuser multiple-input–multiple-output (MIMO) overlay cognitive radio (CR) network, an opportunistic interference alignment (IA) technique has been proposed that allows spectrum sharing between primary users (PUs) and secondary users (SUs) while ensuring zero interference to the PU. The CR system consists of one PU and K SUs where the PU uses space-time water-filling (ST-WF) algorithm to optimize its transmission and in the process, frees up unused eigenmodes that can be exploited by the SU. The SUs make use of an optimal power allocation algorithm to align their transmitted signals in such a way their interference impairs only the PUs unused eigenmodes. Since the SUs optimal power allocation algorithm turns out to be an optimal beamformer with multiple eigen-beams, this work initially proposes combining the diversity gain property of space-time block codes, the zero-forcing function of IA and beamforming to optimize the SUs transmission rates. This proposed solution requires availability of channel state information (CSI), and to eliminate the need for CSI, this work then combines Differential Space-Time Block Coding (DSTBC) scheme with optimal IA precoders (consisting of beamforming and zero-forcing) to maximize the SUs data rates. Simulation results confirm the accuracy of the proposed solution.

1. Introduction

The scarcity of the licensed frequency spectrum has not hindered the development of wireless communications services [1]. Studies have shown under-utilization of the licensed spectrum due to the fixed spectrum access (FSA) policy [2], which grants exclusive rights to licensed users. This inefficiency has led to the demand for dynamic spectrum access (DSA), an alternative policy allowing both licensed users and unlicensed secondary users (SUs) to access the spectrum. To support DSA, cognitive radio (CR) are required to sense the radio frequency spectrum [3,4,5]. CR can sense and utilize idle portions/spectrum holes of the licensed spectrum in an opportunistic manner when licensed/primary users (PUs) are idle or concurrently with the PUs [4,5]. Since the SU’s transmission is considered of a lower priority than that of the PU, a crucial task in the design of CR is about how best the SU can avoid interfering with the PU in their vicinity [4,5,6]. This is particularly challenging due to the increased deployment of wireless communications services such that the PU is seldom idle [7].
In trying to find solutions to this problem, the focus of research has shifted towards an interference management strategy [8,9,10] that linearly encodes signals over multiple signaling dimensions, such that the resulting interference signal observed at each receiver lies in a lower dimensional subspace and is orthogonal to the one spanned by the signal of interest at each receiver. There have been several research endeavors conducted towards implementing interference alignment (IA) in CR networks, most notably the work in [11] and later in [12], where an opportunistic IA (OIA) technique was proposed. In this work, the PU link makes use of a water-filling power allocation (PA) scheme to maximize its transmission over its spatial directions (SDs), leaving some of these SDs unused due to power limitations. The SU link then opportunistically takes advantage of these unused SDs (called transmit opportunities (TOs)) with a linear pre-coder that aligns the SU’s transmission with the unused SDs of the PU link, thereby avoiding any interference to the PU.
Some of these are depicted in [11,12,13,14,15], where all of their models make use of a single-user MIMO SU link thus ignoring the effect of multiple SUs on the performance of a CR network. In fact, a single SU is unlikely to reliably detect the presence of a PU due to factors such as multipath fading impairments, low Signal-to-Noise Ratios (SNRs) and sensing time constraints [16]. Further work conducted in [17,18,19,20,21,22,23] take these impairments into consideration by employing multi-user MIMO SUs to take advantage of multi-user diversity [20], with [22,23] employing cooperative spectrum sensing (CSS). The work conducted in [21,22,23] also represented a paradigm shift because they employed the space–time water-filling algorithm for power allocation (PA) of the PU link, unlike the spatial water-filling algorithm used in [11,12,13,14,15,16,17,18,19,20] given that space–time water-filling (ST-WF) achieves higher capacity per antenna than spatial water-filling (SWF) in conditions more suited to CR networks [24,25,26]. The above observations, combined with the prospect of improved spectrum utilization through CSS provided the motivation to propose an OIA technique that utilizes ST-WF for the PU link optimization in which three different IA constraints are satisfied. The first two constraints deal with SUs aligning their transmission to orthogonal subspaces at both the PU-Rx and SU-Rx. The third constraint deals with ensuring that all SUs avoid interference with the PU transmission. However, simultaneously aligning all SU transmissions at the PU-Rx is always limited by availability of spatial dimensions as well as typical user loads [27]. Therefore, this work proposes a user selection algorithm by the FC, in which only a set of SUs, i.e., the SUs that are closest to the FC, are aligned at each PU-Rx.
Naturally, the success of the SUs communication depends on the accurate availability of unused Degrees of Freedoms (DoFs), as shown in the work in [15] which provides a more accurate outcome on the absence/presence of individual TOs. Thus, to further enhance accuracy of detection of TOs without the huge computational complexity of [15], this paper makes use of a double-threshold energy detection (ED) scheme [28,29] for the purpose of enhancing detection accuracy and availability of DoFs. Typically, the sensing condition states that if the SD exceeds the water-level β value, then the SU reports unavailability of used SD. Alternatively, if it is less than β , then the SU reports availability of unused SD. However, if the detected value is between β ˙ 1 and   β ˙ 2 (i.e., values that are slightly above or below β ), the SUs still reports this energy value, implying that the FC receives two kinds of information from which to base its decision on. This increased range of values available to the FC leads to higher detection accuracy and thus increased DoFs.
This research is also focused on maximizing the achievable transmission rate as well as diversity gain for the opportunistic SU links. The more legacy work of [11,12] use two PA schemes to find a covariance matrix that maximizes the achievable transmission rate for the opportunistic SU link. It was shown in [12] that the PA technique turns out to be a beamformer with multiple beams formed using the orthogonal eigenvectors of the correlation matrix of the estimated channel at the SU-Tx according to the “spatial water-filling” principle. The water-level saturates the power constraints, which makes the K -user cognitive SU MIMO network equivalent to a standard interference channel with multiple antennas at each node. To increase the data rate performance, parallel transmissions equipped with space–time block coding (STBC) across eigen-beams were developed in [30,31,32], which yielded a two-directional eigen-beamformer that performs better than the conventional one-directional beamformer with negligible increase in computational complexity [32,33]. Conversely, to achieve full transmit diversity without losing sum rates, new IA schemes were proposed in [34,35] that use STBC to achieve full transmit diversity, where the STBC structure of the equivalent channels were preserved after zero-forcing the interfering users [36]. These IA schemes were shown to achieve higher diversity gain than other conventional methods [37] with only local CSI. Since the work in [37,38,39,40] reveals that the SU transmission is not changed by the transmit eigen-beamforming matrices, we can therefore propose wedding optimal precoding with orthogonal STBC and IA that will achieve higher transmit diversity at the same symbol rates as the work conducted in [12].
The ST-WF scheme is not without its drawbacks as shown in [24,25] to be associated with a higher channel outage probability, thereby setting a lower-bound in terms of the SUs’ transmission rates. In order to solve this problem of maximizing the SUs’ rates in the presence of channel outage, this paper proposes that the multiple SUs employ a differential STBC (DSTBC) scheme that is then combined with optimal IA precoders [38,39] that align interference at unintended receivers thereby eliminating the need for local CSI. DSTBC encodes the transmitted information into phase differences between two consecutive symbols, where information is essentially transmitted by first providing reference symbols which determine whether the SUs transmit or remain silent. The linearly encoded combinations of the original phase-shifted symbols and their conjugates are then processed. After zero forcing, the multiple SU-Rxs decode the current symbol by comparing its phase to the previous symbol’s phase. This scheme achieves a significantly higher sum rate and reliability. The contribution of this paper can be summarized as follows:
  • Firstly, the PU’s PA technique is based on an SVD scheme that employs the ST-WF algorithm for the PU link to free up some unused eigenmodes and achieve better channel capacity and;
  • Secondly, this paper takes advantage of multiple SUs, similar to [22,23], to enhance performance by employing CSS, and proposing a double-threshold ED scheme; the FC receives two kinds of information from which to base its decision which improves the probability of detection;
  • Finally, to optimize the transmission rates of SUs; this work proposes an IA technique that combines the merits of DSTBC and linear precoding, yielding a two-dimensional (2-D) beamforming solution that shows better performance in terms of the SUs’ transmission rates.
The remainder of this paper is organized as follows. In Section 2, the system model is described, and the main assumptions required for analysis are introduced. In Section 3, a comparative analysis is conducted between the MEB, SWF, and ST-WF schemes for the PU link as well as an analysis on the outage probability of the ST-WF algorithm. Section 4 presents the opportunistic IA scheme (OIA) by presenting the sensing phase (along with the double-threshold method) and the IA phase with the SU selection process. Section 5 presents OIA with STBC by briefly reviewing the literature before presenting the algorithms required for the STBC–beamforming–IA technique. Section 6 then presents the OIA with DSTBC approach that describes the steps taken towards achieving diversity and higher data rates through DSTBC. Section 7 provides an overview of simulation results as well as a performance comparison between this work and that of [12,22]. Finally, Section 8 presents the concluding remarks.

2. System Model and Assumptions

The system model for this paper is a MIMO CR network that consists of a single PU link (PU-Tx and PU-Rx) and k SU-Tx/Rx pairs ( S U 1 , …, S U k ) as shown in Figure 1 below. Every user is assumed to have M transmit and N receiver antennas. The PU link is a point-to-point MIMO link, while the SU network is a multi-user MIMO network. The following assumptions are made for the purpose of the system model: (I) The PU and SUs operate in the same frequency band and all channels are Rayleigh fading. (II) The PU link is a single user MIMO channel which is represented as a N i × M j matrix, H i j , with channel coefficients between transmitter j and receiver i , where elements of   H i j are drawn i.i.d. from a continuous distribution. The channels are assumed to be block fading, and the CSI is known to all the nodes. The signal received at the PU-Rx can be defined as
  Y i = j = 0 K H i j V j x j + n i  
where   V j is the   M i × d i precoding matrix of the i th user and d i represents the number of transmitted streams, x j is the M j × 1 transmitted vector, n i is the N i × 1 additive Gaussian noise vector at the i th receiver. The transmitted power is subject to an average power constraint E x j H x j P . (III) It is assumed that the PU-Tx is oblivious to the presence of the SUs. We also assume that the PU channel matrix is known at the PU-Tx and PU-Rx [4]. The PU-Tx chooses its precoding matrix V j and the PU-Rx chooses its post-processing matrix U j such that the PU link channel transfer matrix is diagonalized. Then, once SVD has taken place on H p p of the PU, each SU will receive independent m i n   M , N parallel non-interfering channels [11,23].
The received signal at each SU-Rx is thus defined as
  Y s s k = H s s k x s s + n s s
The transmit covariance of the input signal is x E x s s x s s H which is subject to an average power constraint. In the standard IA conditions, each transmitter therefore transmits a sequence of Gaussian encoded symbols to its corresponding receiver by processing its symbols using a M i × d i precoding matrix V i to form the transmitted signal vector   V i x i . The received signal at the i th receiver is linearly processed by the post-processing matrix U i = N i × d i to extract the symbols sent by the i th transmitter. The IA condition states that the primary and secondary received signals are represented by
  Y i = H i i V i x i + j = 1 K H i j V j x j + z i
where y i denotes the N i × 1 received signal vector at the j th receiver; z i denotes the N i × 1 zero mean unit variance circularly symmetric AWGN noise vector at the j t h receiver; x i denotes the M i × 1 signal vector transmitted from the i t h transmitter; H i j is the N i × M i matrix of the channel coefficients between the i t h transmitter and the j th receiver; and P i = E x i x i H , where P i is the transmit power of the i t h transmitter [20]. It should be noted that i and j are used as a generalization denoting each transmitter and receiver pair.

3. PU Link Optimization

3.1. The Numerical Comparison

With the comparative study carried out in [24,25], it is clear that the ST-WF offers improved SU performance for the same PU parameters. Most significant though is the fact that the ST-WF achieves significantly higher capacity than SWF at low-to-moderate SNR regimes, which fits well with CR networks [25,26]. In order to implement the ST-WF algorithm, we take a look at the original approach for water-filling [12], i.e., the SWF approach. For a single MIMO PU channel, recall that
max Q l o g I + 1 σ 2 H p p Q H p p s u b j e c t   t o   t r Q   P
where Q is the M × M input covariance matrix, H p p is the MIMO channel, Q is the autocorrelation matrix of the input vector x , defined as Q = E [ x x ] , P is the instantaneous power limit, | A | denotes the determinant of A , and t r ( A ) denotes the trace of matrix A and   σ i is the noise variance. SWF can be used to optimally allocate power to the parallel channels as defined by the following equation [26]:
P i = β σ i 2 λ i + ; 1 i R H  
where P i is the power of   x p p . The water-fill level β is chosen such that i = 1 R H P i = P as defined in Equation (5). Once the PA matrix using SWF is set up according to [12], the diagonal matrix Σ contains m 1 non-zero/used entries and N 1 m 1 zero/unused entries which crucially translate into a set of m 1 used receive dimensions and a set of N 1 m 1 unused receive dimensions with no PU signal. In terms of implementing the ST-WF algorithm, the PU-Tx also chooses precoding matrices as the columns of V p p ( U p p ) that corresponds to a non-zero power allocation that is used to maximize the rate of the PU link under power constraints as shown below
  m a x Q E l o g I + 1 σ 2 H p p Q H p p s u b j e c t   t o   t r Q   P
It should be noted that for ST-WF, the function E [ t r ( Q ) ] is present in all MIMO channel realizations, implying that the symbol rate changes faster than the channel variation where Q can be computed from all symbols but within one channel realization. For computation of the diagonal PA matrix by applying the so-called ST-WF algorithm, β can be found as follows:
  P i = β ¯ σ i 2 λ i + ; 1 i R H
where β ¯ is the mean water level that can be solved by the equation provided below:
    l = 1 L p σ i 2 β β ¯ σ n 2 λ i f λ i d λ i = P
and f λ i is the marginal probability density function (pdf) of the random variable λ i . To gain more insight into this issue, Figure 2 above shows the average sum rate versus the SNR for a single user PU MIMO link with the SWF, ST-WF, and MEB PA schemes. For the Rayleigh channels in this work, Rayleigh fading is assumed to be pure due to the PU-Tx and PU-Rx assumed to be in close proximity and hence the shadowing effect is negligible.
The ST-WF algorithm with no shadowing variance achieves higher spectral efficiency over SWF at low SNRs and has the highest gain of 5 dB in the SNR over equal power distribution at a spectral efficiency of 2.5 bps/Hz/antenna. Furthermore, Figure 2 shows that the numerical results obtained from the simulations corroborate with theoretical results [24,25]. The simulation results shows that the ST-WF scheme outperforms the other schemes and shows the possibility of increased sum rates in two-tier CR networks when the PU participates in IA.

3.2. Outage Probability of ST-WF

A condition exists for the ST-WF algorithm, when SDs from the PU channel matrix are not high enough to properly utilize transmission power. This can result in blockage of transmission, or more specifically channel outage. The channel outage probability defined in [41] is equivalent to the probability that the largest eigenvalue of H p p H p p is smaller than   σ i 2 / β . Since the eigenvalues { λ i } k = 1 M of H p p H p p are in descending order, the channel outage probability can be expressed as
    P i σ 2 , M = P λ i σ 2 β ¯  
The exact channel outage probability is expressed in terms of the maximal eigenvalue distribution, denoted as   ε m a x λ i . If   λ 1 =   s h t 1 , where   s h is the shadowing random variable and t 1 is the maximal eigenvalue of H p p H p p , the distribution of t 1 is denoted as δ m a x t 1 and can be obtained by integrating out t M ,   t M 1 , t 2 , that is,
δ m a x t 1 = 0 t 1   0 t M 2 0 t M 1 K M e i t i × i < j t 1 t j 2 d t M d t M 1 d t 2
Differentiating Equation 10 above yields the pdf of λ i given as
ε λ i = 10 ρ l o g 10 2 π 0 β ¯ δ m a x λ i s 1 s 2 e ( 10 l o g 10 s ) 2 / 2 ρ 2 d s  
Given the closed-form nature of the outage probability calculations, solving for δ ( t ) is seen to be computationally complex, and as such, only an approximated value of δ t will be utilized to simplify the calculation of β ¯ . The achievable spectral efficiencies per antenna of the two cases of SWF and ST-WF are compared using Monte Carlo simulations performed over 10 6 channel realizations.
Since we are considering practical multi-antenna systems where the channel coefficients fluctuate relatively fast, their antennas may exhibit strong correlation among fading channels, which implies that the channel’s spatial correlations will typically change slowly, even when the channel coefficients fluctuate relatively fast [42,43,44]. The channel’s spatial correlation is considered as a slowly varying effect similar to log-normal shadowing. Therefore, the Rayleigh MIMO channel has variance of 1 / 2 for both real and imaginary parts with a standard deviation of η = 0 for a pure Rayleigh scenario, and η = 8 for log-normal distribution [45].
With the average power P set to be 1, Figure 3 shows the channel outage probabilities for both water-filling techniques for 2 × 2 Rayleigh channels with and without shadowing. For η = 8 , it can be seen that the SWF technique incurs a higher channel outage probability than the ST-WF technique. The case of pure Rayleigh fading for the ST-WF technique results in lower channel outage because the increase in η in log-normal shadowing conditions changes much slower than fast fading. Therefore, the distribution of the shadowing variable dominates the outage probability. ST-WF typically achieves a higher average capacity per antenna compared to SWF due to its ability to adapt power allocation over both space and time, leading to a more balanced and efficient use of the available resources.

4. Opportunistic Interference Alignment

The proposed approach will be divided into two phases, the first being the sensing phase and the second being the interference alignment phase.

4.1. The Sensing Phase

It should be noted that because both PU and SU have been assumed to be operating in the same frequency band, the SUs will opportunistically always make use of the licensed spectrum as long as the TOs are available. Recall from the system model that the PU–SU link is assumed to be operating as a MIMO channel with the PU seemingly broadcasting to many SUs [26,31] such that at a low SNR, the ST-WF algorithm allocates all power to the strongest R H parallel channels while at a high SNR, it allocates equal power to each of the R H channels. The strongest channels are the m 1 used dimensions, while the others can be classified as the N 1 m 1 unused dimensions or TOs.
Energy detection is especially useful in scenarios where prior information about the signal is unavailable, thanks to its simplicity and efficiency. When compared to other traditional spectrum sensing methods—such as matched filtering, cyclostationary feature detection, and eigenvalue-based detection—energy detection offers distinct advantages, including ease of implementation and applicability in diverse environments. The advantages of energy detection compared to other traditional spectrum sensing techniques [46] can be found in Table 1.
Each SU can sense the absence or presence of the unused TO such as is the case in conventional energy detection theory [4,47], where each SU makes its local decisions by comparing its observational value with a pre-fixed threshold β , as shown in Figure 4a, and a decision is made when   E h is greater or less than the threshold value β ¯ under the following binary hypothesis test [22]:
H 0 ;   m 1   e i g e n m o d e   u s e d   b y   P U   H 1 ; N 1 m 1   e i g e n m o d e   u n u s e d   b y   P U  
In this paper, a double-threshold method as shown in Figure 4b is introduced, where two thresholds are used to help the decision of the SU [28,29]. The condition for the conventional detection method states that “if the energy value E i exceeds β , then the SU reports   H 1 . If E i is less than β , SU reports   H 0 . However, there are some sub-carriers that are just slightly below the water level, i.e.,   β ˙ 2 , that the normal single-threshold detection classifies as used. However, the channels of these sub-carriers are actually too poor for it to be worthwhile for transmission by the PU [48], with the same applying for the reverse situation of the sub-carriers being slightly above water-level ( β ˙ 1 ), which are classified as unused. Therefore, the double-detection technique states that if E i is between β ˙ 1 and   β ˙ 2 , then the SU also reports this observational energy value “ E i ”; hence, the FC receives two kinds of information, the local decision and the observational value of the SU.
It is assumed that each SU has identical threshold values. If E i   satisfies   β ˙ 1 < E i < β ˙ 2 , then the i t h SU sends the measured energy value E i   to the FC. Otherwise, it reverts back to reporting its local decision L i according to   E i , i.e., the conventional detection technique. Each SU sends a summary of its own observations to the FC in the form of P m d ,     P f where P m d and P f denote the probabilities of missed detection and false alarm for the SUs.
Let R i denote the information that the FC receives from the i t h SU expressed as
  R i = E i   β ˙ 1 < E i β ˙ 2 L i   o t h e r w i s e  
and
  L i = H 0   0 < E i β H 1   E i > β  
Hence, the FC collects their observational values and makes an upper decision on the availability of used and unused SDs. The FC then uses the hard combination fusion rule [1,4,47] for making the final decision based on the received information. This work utilizes the probability of missed detection as one of the parameters for measuring performance. It can be observed that the simulation results in Figure 5 are quite optimal, yielding near-perfect results when sensing ONLY for TOs. Figure 5 illustrates that the detection probability of the proposed double-threshold CSS scheme increases compared with the conventional detection scheme. Figure 6 illustrates the performance variation of the   P d in relationship to the SNR (dB) with multiple cognitive relays (2, 4, and 6). It can be observed that by increasing the number of SUs,   P d is increased. Additionally, the   P d increases as the SNR increases, which is consistent with performance criteria in CR networks.

4.2. The Interference Alignment Phase

The main goal of this subsection is to derive appropriate pre- and postcoding matrices which align the SU transmissions to the N 1 m 1 unused dimensions. In order to achieve that, an OIA strategy is proposed in which three separate conditions must be satisfied. Firstly, given the SVD channel matrix of the PU link as H p p = U p p Σ p V p p H , where V p p and U p p are the M p p × M p p and N p p × N p p singular-vector matrices and Σ p is a N p p × M p p diagonal matrix containing singular values, the cognitive IA problem is formulated by defining the required conditions for IA.
Given that the received signal at the i th receiver due to the j th transmitter lies in the subspace spanned by the columns of H i j V j , the SU-Tx’s are guaranteed not to generate any interference on the PU-Rx as long as the following precoding and post-processing condition are met
  U p p H H p j V j = 0 d p ;   i = 1 , K  
U i H H i p V p p = 0 d i ;   i = 1 , K
Equation 15 is the post-processing matrix that satisfies the orthogonality between the SU-Rxs and the PU-Tx, thus guaranteeing that the PU link achieves similar data rates as an equivalent single-tier system despite the opportunistic transmission of the SUs. d i is defined as the DoFs [8], thus satisfying the first condition.
The second condition requires that the SU and PU signals be aligned to orthogonal subspaces at not only the PU receiver, but the SU receiver as well. Therefore, a different strategy is used to design the SUs postcoding matrix in order to satisfy the second interference constraint. The first part of this constraint, defined in 16 , ensures that interference from each SU-Tx is aligned at the output of its corresponding unintended receivers.
  U i H H i j V j = 0 d p ;   i = 1 , K
r a n k { U i H H i i V i } = d i ;   i = 1 , K
Similar to ( 16 ) , the constraint in ( 17 ) guarantees that the i th SU can achieve d i DoFs. However, because this work consists of multiple SUs, the third condition that must be satisfied requires that ALL the SUs do not impose any interference on the PU receiver. Similar to the approach proposed in [27,49], this work proposes to perform IA with user selection in order to optimize the performance of this third condition. While the work conducted in [14,15,16,17,18,19,20] relies strictly on the feasibility conditions of IA [50,51] to ensure multiple SUs are aligned along the PU null spaces, the number of SUs that can actually be aligned at the PU’s null spaces is generally limited by the spatial dimensions available for IA based on the number of antennas at the PU-Rx. Therefore, simultaneously aligning all SUs at the PU-Rx is not feasible for typical user loads. Instead of attempting to align the entire set of SUs at every PU, this work proposes an efficient clustering strategy for the SUs network.
The objective of this strategy is to ensure that SUs that are closest to the FC are aligned at each PU-Rx into the same cluster. In order to select appropriate SUs, the FC collects information from each SU node, which includes the distance from the FC and the SUs’ received signal power from the PU. Based on the information gathered, the FC elects the SUs that will form a cluster according to a given election algorithm and broadcasts the election to all nodes. The message broadcasted contains the node ID of the elected SUs and also information about time synchronization, resource allocation, and the maximum number of permitted access nodes in one cluster. The number of nodes in a cluster is limited to avoid too many nodes crowding in one cluster. Let denote the average distance from nodes to the FC, and the selected SUs are expected to be located at minimal away from FC. The SU election algorithm is described in Table 2.
The number of SUs aligned at each PU-Rx cannot exceed n = 2 , which is introduced to control the maximum number of elements of each set. It should be noted that limiting the selection of SUs to a bare minimum can negate the benefits of multi-user diversity. However, our selection scheme will be justified in the next section of this paper.

4.3. Feasibility Conditions of IA

This section discusses the feasibility of the proposed method as well as the conditions for perfect IA. The conditions for which the system is proper are first determined by establishing that the number of variables to be determined is greater than or equal to the number of equations in the IA system defined in [51] as follows:
d i m i n M i j = 1 K p d j , N i j = 1 K p d j
Our model looks to design a cluster of SUs based on geographical proximity as discussed in Section 4.2 above, and for the sake of simplicity, we limit our initial design to two SUs per cluster with each SU having two Tx/Rx antennas. It is well known from Bezout’s theorem that generic polynomial systems are solvable if and only if the number of equations does not exceed the number of variables [52]. As such, signal space IA problems can either be proper or improper [51,53]. Thus, from the Theorem of Proper Characterization [50], a symmetric system ( M × N , d ) K is proper if and only if
  N v N e M + N K + 1 d 0  
Likewise, an asymmetric system defined as π k = 1 K M i × N i , d j is improper if
  N v < N e k = 1 K d j M i × N i , d j < k , j κ k j K d k d j  
Thus, based on the Equations 16 and ( 18 ) , this system can be designed according to the algorithms to satisfy the IA condition. The advantage of this is that it will follow directly on the cognitive IA system [18]. For example, it was shown that for single-beam IA systems, i.e., systems where each user requests only one DoF [50], IA is almost surely feasible if the system is proper.

5. Opportunistic Interference Alignment with Space–Time Coding

5.1. Background

In [12], a source covariance matrix was chosen in which the SU-Tx can allocate power to maximize its achievable rate. This was achieved by using uniform power allocation (UPA) and optimal power allocation (OPA) schemes. In the UPA case, the opportunistic SU-Tx does not perform any optimization on its transmit power, but rather uniformly spreads its total power among the previously identified TOs, which saturates the transmit power constraint. The OPA scheme, on the other hand, takes on a water-filling solution with an N d i × L 2 SVD matrix such that the OP can be rewritten as
max P i log 2 I d i + 1 σ i 2 H i i U i H P i V i H i i H U i s . t .   P i T r a c e V i H P i V i P i  
Given that the SVD of the matrix U i H H i i V i is given as   V ~ i H Σ i U ~ i , where the columns of U ~ i and V ~ i contain the singular vectors, and Σ i is the N d i × L 2 diagonal matrix containing the corresponding singular values γ i . The optimal solution is thus given as   V ~ i H P ~ i U ~ i = P i . The diagonal matrix   P ~ i is used to represent the OPA solution and the optimal values of its diagonal elements translate into the water-filling solution
  P ~ i = β ¯ i σ i 2 γ i 2 +
where β ¯ i is the Lagrangian multiplier chosen to satisfy Equation (23). This optimal SU precoder described above turns out to be a generalized beamformer formed using the eigenvectors of the matrix of the optimized channel at the SU-Tx. A perfect illustration of this is the work conducted in [22], where, even after the SUs use a covariance matrix to maximize their throughput, a power-allocation strategy called threshold beam forming (TBF) is proposed to improve both the spectral and power efficiency of the SUs. The TBF scheme is an effective tool for saving SU-Tx power and improving the spectrum efficiency in poor channel conditions. If the receiver can acquire the CSI reliably as shown in [22] or when partial CSI is available at the transmitter, coherent detection along with orthogonal space–time block coding (STBC) [31,37,54] can be employed to increase the data rate. As such, parallel transmissions equipped with STBC [31,32,33,34] across optimally loaded eigen-beams have been developed that lead to the so-called two-directional (2D) eigen-beamforming. With minimal variation in computational complexity compared with traditional one-directional (1D) beamforming, 2D beamforming was shown to achieve better performance.
In addition to network throughput, reliability in terms of diversity gain is another dimension of performance measurement for the SUs. When channels experience fading, the SNR level at the receiver becomes low and dominated by outage events. As a result, techniques such as Alamouti codes and STBC in point-to-point MIMO channels [34] have been proposed to explore the spatial diversity gain. Recently, the work in [34] presented the scenario where a trade-off between symbol rate, diversity, and IA was possible in a multi-user network, thus motivating the work in [35,36,55] that use Alamouti codes to achieve full transmit diversity without losing rate. The transmitters in this proposed scheme only require CSI from itself to both receivers instead of global CSI as assumed in [10].
It is clear that the scope of the literature on wedding optimal precoding/eigen-beamforming with orthogonal STBC to improve throughput does not delve into the full process of IA through zero forcing at the multiple receivers. The scope of the literature on achieving higher diversity gain, on the other hand, does incorporate STBC with beamforming where zero forcing is used to decouple symbols at the interfering users, but obviously without optimal precoding. As such, this work finds an opportunity to propose an IA scheme where each transmitter needs only channel information from itself to both receivers that achieves the same maximum symbol rate as the scheme in [10] but with a higher diversity gain. Given the fact that Alamouti codes achieve full transmit spatial diversity in point-to-point MIMO systems [37], this work incorporates Alamouti codes in the design of optimal precoding matrices, the product of which is a two-dimensional (2-D) eigen-beamformer without rate reduction. Since the equivalent channels are linearly independent, zero-forcing (ZF) is conducted at each receiver, to cancel interference and separate useful symbols to obtain symbol-by-symbol decoding.
Given that channel estimation becomes difficult or requires too many training symbols, especially when the channel is rapidly changing in a mobile environment, unitary space–time modulation and differential space–time modulation [46,54,56,57,58,59,60,61,62,63] are well motivated because they bypass CSI acquisition at the SU-Rx. As such, this work considers differential space–time modulation based on orthogonal STBC, without partial CSI at the SU-Tx for independent, identically distributed (i.i.d.) fading channels. One of the advantages of MIMO systems is their ability to exhibit strong correlation in the presence of fading due to multiple transmit antennas. This implies that the channel’s spatial correlations in fast-fading channels will still fluctuate slowly [56,57]. Thus, while there is no knowledge of CSI in differential space–time transmission, the channel’s spatial correlations can easily be estimated at the SU-Rx due to slower fluctuation and be fed back to the SU-Tx. Similar to [37], the differential modulation based on orthogonal STBC is also much easier to construct and leads to low-complexity symbol-by-symbol decoding. Given its inherent advantages, this paper will consider incorporating differential STBC (DSTBC) into the STBC beamforming solution described earlier. The next sections will look at how the STBC–beamforming–IA process with local CSI will be used to achieve both higher sum rates and diversity gain. This will then be followed by the DSTBC–beamforming–IA (DSTBC–BF–IA) solution to save the SU-Tx power in rapidly changing channel conditions.

5.2. STBC Beamforming IA Process

The initial approach considers a two-user IC channel as shown in Figure 7 where H 1 ,   G 1 ,   H 2 ,   G 2 are used to denote the 2 × 2 channel matrices. H 1 and G 1 are perfectly known at SU-Rx 1, and H 2 and G 2 are known at SU-Rx 2, and each of the entries are i.i.d. Gaussian distributed. It is assumed that the channels are block fading (or constant), i.e., all channels keep unchanged during transmission in which all the desired signals at SU-Rx 1 are from SU-Tx 1 while the interference at SU-Rx 1 only comes from SU-Tx 2 [34]. At a given symbol period, two signals with fixed Binary Phase-shift keying (BPSK) constellation for each of the two receivers are simultaneously transmitted from the SU-Tx antennas, denoted as   s i j .
At the next symbol period, two complex conjugate signals are then transmitted from the two antennas of the SU, denoted as s i j * . The superscript in s i j k denotes the index of the symbol, the first subscript i denotes the index of the transmitter, and j denotes the index of the receiver. SU-Tx i linearly combines four symbols s i j k and generates a block code X i . The equivalent transmitted vectors can be expressed as
  X 1 = V 11 s 1 11 s 2 11 s 2 11 * s 1 11 * + V 12 s 1 12 s 2 12 s 2 12 * s 1 12 *  
X 2 = V 21 s 1 21 s 2 21 s 2 21 * s 1 21 * + V 22 s 1 22 s 2 22 s 2 22 * s 1 22 *  
where V i j denotes the beamforming matrix from Tx i to Rx j . The symbols s i j 1 intended for SU-Rx 1 become interference for SU-Rx 2 and are aligned with SU-Rx 2. The decompositions in ( 17 ) and ( 18 ) for the precoding and post-processing matrices of the SUs can be modified due to the presence of the PU link to get the following equations:
  U i H H i j D p l V ~ j = 0 d i × d j   i , j = 1 , K ,   i j
r a n k { U ~ i H H i i D p l V i } = d i   i = 1 , K
The modified equations in ( 26 ) and ( 27 ) represent a standard IA problem with the variables V i i = 1 K and U i i = 1 K . Given that V i = C ( M i d 0 ) × d i and U i = C ( N i d 0 ) × d i are the beamforming matrices at the i th SU-Tx and SU-Rx, ( 27 ) ensures that all the interfering signals at i th SU-Rx lie in the subspace orthogonal to U ~ j , while ( 28 ) assures that the signal subspace H i j D p l V ~ j has dimension d k and is linearly independent of the interference subspace. The constant D p l is a diagonal matrix which contains power loading coefficients. By exploiting the knowledge of the covariance matrix, the power loading coefficients will be derived based on the symbol error rate (SER) values. From [12], the SNR of the covariance matrix P i for a fixed channel realization can be found as follows:
  γ = μ = 1 N t φ μ h μ 2 E s N 0  
where N t denotes the independent eigenvalue channels, h μ is the Rayleigh distribution of the μ th sub-channels, φ μ denotes the μ th eigenvalue of U i H H i i V i that is non-negative, and φ μ h μ 2 E s / N 0 denoting the μ th sub-channel’s SNR [31]. This implies that we can approximately compute the SER.
  P S E R = 1 π 0 M 1 π M μ N t I μ φ μ E s N 0 , g B P S K , θ d θ  
where   g B P S K = s i n 2 π M , and I μ x , g , θ = M is the moment generating function of the probability density function of the Rayleigh distribution. The power loading coefficients contained in the diagonal matrix D p l based on the approximate SER values are shown to also come very close to the actual SER values at a low SNR.
  P S E R = M 1 M 1 μ = 1 N t 1 + g B P S K λ Q E s D p l 2 N 0  
where λ Q is the eigenvalue of the channel covariance matrix Q . To select power loading coefficients, we now formulate the following optimization problem:
  max D μ = 1 N t log 1 + g P S K λ Q E s D p l 2 N 0     s u b j e c t   t o   μ = 1 N t D p l = 1
Using the Lagrange multiplier method, we can find power loading coefficients as follows:
D p l = 1 N ¯ t + N 0 g P S K E s 1 N ¯ t μ = 1 N ¯ t 1 λ Q j 1 λ Q i
where N ¯ t 0 < N ¯ t < N t is the number of beamformers that transmit signals, given the transmitted power budget   E s . Each transmitter sends two symbols to one receiver. The transmitted block codes are designed as follows:
  X 1 = ρ μ s 1 11 s 2 11 s 2 11 * s 1 11 * D p l V 11 + s 1 12 s 2 12 s 2 12 * s 1 12 * D p l V 12  
  X 2 = ρ μ s 1 21 s 2 21 s 2 21 * s 1 21 * D p l V 21 + s 1 22 s 2 22 s 2 22 * s 1 22 * D p l V 22  
The coefficients ρ and μ are the average SNR and the normalization factor at each SU-Rx, respectively, that are introduced to ensure that the average energy of the coded symbols are unitary across all the antennas. Each symbol is sent using Alamouti codes, and each transmitter sends linear combinations of both the original symbol and their conjugate. To this end, X 1 is transmitted along the eigenvectors of the channel correlation matrix with power loaded on each eigenvector. Recalling that the received T × 2 signal matrix at Rx j can be represented as
  Y 1 = X 1 H + X 2 G + W 1 ,     Y 2 = X 1 A + X 2 B + W 2  
where W j denotes the T × 2 additive white Gaussian noise (AWGN) matrix at Rx j , therefore
  Y 1 = ρ μ s 1 11 s 2 11 s 2 11 * s 1 11 * D p l V 11 H 1 + ρ μ s 1 22 s 2 22 s 2 22 * s 1 22 * D p l V 21 G 1 + W 1  
  Y 2 = ρ μ s 1 21 s 2 21 s 2 21 * s 1 21 * D p l V 12 H 2 + ρ μ s 1 12 s 2 12 s 2 12 * s 1 12 * D p l V 22 G 2 + W 2  
Both the second terms in 36 and 37 represent interference, which then makes it clear to see how the post-processing filters of 36 and 37 align symbols s i j 22 and s i j 22 * at SU-Rx 1, while s i j 12 and s i j 12 * are aligned at SU-Rx 2. After completing IA at both SU-Rxs, the individual symbols can be decoded using symbol-by-symbol decoding. As mentioned earlier, the Alamouti structure ensures that the corresponding definite channel matrices H ¯ 1 ,   G ¯ 1 ,   H ¯ 2 ,   G ¯ 2 at the SU-Rx retain the same structure due to the completeness of its multiplication and addition properties [37]. Therefore, s i j 11 can be decoded with the following equation:
  s i j 11 = arg max s j k = 1 h ¯ k * y k s ,   k = 1,2  
Equation 38 therefore applies to the remaining symbols at SU-Rx 1 and SU-Rx 2 to have four separate procedures for symbol-by-symbol decoding to recover the desired symbols.

6. Opportunistic Interference Alignment with Differential-STBC

The spectral efficiency gain of ST-WF is typically associated with a higher channel outage probability, which sets a lower-bound on optimizing the SUs transmission rates. It is therefore necessary to find a solution that not only helps with optimizing transmission rates, but also encourages the SUs to use their power more efficiently. Thus, similar to the work conducted in [22], where the SU-Rx depends on pilot signals transmitted at the start of each transmission to estimate its own channel matrix (local CSI) and determine whether the SU-Tx remains silent or transmits, this paper considers using DSTBC, but without local CSI at SU-Txs for independent, identically distributed (i.i.d.) fading channels. This solution states that if the channel is approximately constant for a time of at least two symbol periods without any outage, i.e., within 3 dB of the coherent demodulation in Gaussian channels, then the SUs transmit. Otherwise, the SUs remain silent.

6.1. Differential Encoding

To implement DSTBC, information is encoded in the phase differences between consecutive transmitted symbols, rather than in the absolute phases of the symbols themselves. This approach offers several advantages, particularly when it comes to simplifying receiver design and improving robustness in wireless communication systems. In order to implement DSTBC for the SUs, signal transmissions begin by sending a reference codeword matrix C 0 which consists of an arbitrary pair of symbols c 1 and c 2 at time t 1 from the two SU-Txs followed by the related pair of symbols c 2 * and c 1 * at time   t 2 that provide the receiver with a known frame of reference for facilitating the DSTBC process. Where the channel has a phase response that is approximately constant from one symbol period to the next, defined by a threshold τ t h , the SU-Rx is able to decode the information in the current symbol. Specifically, the information matrix s i j k is transmitted according to its matrix structure defined in ( 24 ) , first collected in an N × N STBC matrix comprising the linear combinations of both original symbols and their conjugate as follows:
  s i j = ρ μ j = 1 p s i j k + j s i j k *  
It follows that the N × N DSTBC matrix C 0 can be written as follows:
  C 0 = s i j k C k 1 ,   i > 0  
where the codeword matrix also has the following structure:
  C k i , j = c 1 i j c 2 i j c 2 i j * c 1 i j *  
Similar to the STBC solution, C 0 will be transmitted along the eigenvectors of the correlation matrix with power loaded on each channel eigenvector. As such, the transmitted signal at the i th block can be expressed as follows:
  X i = i , j = 1,2 K ρ μ C 0 V i j D p l  
where D p l contains power loading coefficients. Due to the unitary property of the codeword matrix C k ( i , j ) and the works in [37,53], the SU-Tx power remains unchanged, implying that the fundamental differential transmission equation is not changed by the power-loaded eigen-beamforming matrices. Similar to the STBC-beamforming solution, the SER is also used to derive power loading coefficients using 29 31 . Using the Lagrange multiplier method, we can find power loading coefficients as follows [37]:
  D p l = 1 N ¯ t + 2 N 0 g P S K E s 1 N ¯ t μ = 1 N ¯ t 1 λ Q j 1 λ Q i  
Equation ( 43 ) above is similar to 32 for coherent STBC except for a factor 2 in the second term, which is used to compensate for the 3 dB discrepancy between the P S E R for DSTBC and its counterpart in coherent STBC [48,53].

6.2. Differential Decoding

The first step towards differential decoding entails removing the aligned interference. Given that the equivalent channels spanned by the useful signals have an Alamouti structure, and since the equivalent channels for interference are constant, the aligned interference can simply be cancelled. From 36 and 37 , I 1 = ρ μ s 1 22 s 2 22 s 2 22 * s 1 22 * D p l V 21 G 1 and I 1 = ρ μ s 1 12 s 2 12 s 2 12 * s 1 12 * D p l V 22 G 2 . For clarity, we first consider a single Rx antenna. The received data are processed by computing the differential phases between any two consecutive symbols. The receiver detects this phase difference to decode the transmitted data without needing to know the exact channel coefficients. The scheme uses the relative phase between consecutive transmissions; it is inherently robust to slow fading and phase noise. The decoding process is less affected by these variations, leading to more reliable communication. By not requiring the transmission of pilot symbols which are typically used for channel estimation in other schemes, DSTBC can use the available bandwidth more efficiently. This allows for a higher sum rate because more symbols can be transmitted within a given timeframe. DSTBC offers advantages in certain scenarios, these come at the cost of increased computational demands, especially when compared to traditional, centralized STBC schemes [64].

7. Simulation Results and Analysis

In this section, numerical results have been provided to evaluate the performance of the OIA-STBC algorithm against the SU-IA-OPA and SU-IA-TBF algorithms. It is quite clear from the results obtained that this scheme provides improved throughput when compared with other schemes. The performance curves of conventional STBC with coherent detection are shown to be parallel to those of the DSTBC schemes, indicating that the DSTBC schemes also achieve full transmission diversity due to the orthogonal designs. Traditionally, the one drawback of the differential scheme is that it is almost always 3 dB worse than the respective STBC with coherent detection since it does not require any CSI. The inherent requirement of perfect CSI in the coherent STBC scheme introduces channel estimation errors as well as additional power consumed by training symbols, particularly in this work that employs optimal power loading, making it inapplicable to fast-fading channels. DSTBC, on the other hand, does not require CSI at the SU-Rx, making it well suited to perform well in fast-fading channels. A summary of the simulation parameters is shown in Table 3.
In our simulations, both coherent STBC and DSTBC use BPSK, where the channel is both fixed and independent over a pair of successive blocks in each run (i.e., channel variation is negligible in two consecutive blocks) making our simulations valid for fast-fading channels. As stated earlier, practical multi-antenna systems may exhibit strong correlation among fading channels, which implies that the channel’s spatial correlations will typically change slowly, even when the channel coefficients fluctuate relatively fast, which is a requirement common to all differential schemes. The SER performance curves of coherent STBC and DSTBC with beamforming with two Tx antennas and both one and two RX antennas are evaluated via simulations as shown in Figure 8 below. If we take into account the channel estimation error and the transmitted power consumed by training, coherent STBC with two Rx antennas shows better performance than with one Rx antenna. On the other hand, we see that for one Rx antenna, the proposed DSTBC–beamforming scheme initially outperforms the coherent STBC at a very low SNR since DSTBC does not require CSI at the Rx.
With two Rx antennas, the DSTBC–beamforming scheme eventually shows better performance than coherent STBC with an increasing margin as the SNR was increased. Therefore, our results demonstrate that in highly correlated channels, the proposed DSTBC modulation scheme has better or comparable error probability performance to coherent STBC, proving the point that the training symbols used in coherent STBC incur a significant loss in data rate. This is a clear demonstration that combining DSTBC with optimally loaded beamforming offers higher data rates. The analysis of the performance curves presented in Figure 9 and Figure 10 provide further insight into the improved data rates of the DSTBC–beamforming scheme. Monte-Carlo simulations using MATLAB were carried out for two SU pairs (Tx and Rx) and a single PU link with each node equipped with two antennas. As shown in Figure 9, three separate techniques are compared, namely the legacy SU–IA–PA [12], the SU–IA–TBF [22], and of course the proposed STBC–BF–IA scheme.
For the SU–IA–PA scheme, it is observed that at low and high SNRs for the PU link, the performances of both the uniform PA and optimal PA are unsatisfactory and almost identical, even when the SU-Tx spreads its power amongst all the available TOs or performs optimal PA which translates into a water-filling solution. This poor outcome is most probably due to the transmission power of the PU-Tx being at lower and higher ends of the transmit power spectrum, thus not leaving any unused SDs. Indeed, in that case, we are faced with the conventional CR system in which SUs can only utilize the PUs frequency band in an opportunistic manner to avoid imposing interference on the PU, i.e., when the PU is idle. At intermediate SNR values, however, significant data rates for the IA–OPA and IA–UPA approaches are achieved by the SUs. For the TBF scheme shown in Figure 9, the discrepancy in performance of the PU link optimization using the MEB technique is small in comparison to the ST-WF algorithms but the throughput performance of the SUs, on the other hand, increases exponentially at high SNR values when compared to the SU–IA–OPA scheme at almost no cost to the PU. The improved performance of the SUs’ sum rates can be attributed to two things: Firstly, the MEB algorithm ensures that at least one of the PUs’ eigenmode will always be available to convey the SUs’ data. Secondly, the SUs with a poor channel condition stay silent as per TBF to cooperate with the other SU links to enhance the performance of the network through controlling the interference. It could also be suggested that as the number of candidate SUs increases, the average sum rate also increases. It should be noted that the observations are all predicated on the fact that the achievable rates of the SUs have to be computed using the following equation: R s u P , H i = l o g d e t ( I d i + 1 σ 2 P i H i i H H i i ) for all i j .
From Figure 9, the proposed STBC–BF solution clearly performs better than the TBF solution even with the TBF solution seemingly enjoying the advantage of an increased number of candidate SUs and its efficient SU rate optimization scheme that is applied after threshold beamforming to help keep the sum rates above a prespecified threshold level. This improved performance is initially founded on the fact that the SU selection scheme limits the number of SUs in a cluster, which was otherwise not the case in other works such as in [22]. While an increased number of SUs can improve detection accuracy, it could also be an additional source of interference to the PU transmission. Helped by the double-detection scheme, the SUs are therefore almost assured free TOs that they could align their transmission with. Secondly, the increased sum rates of this scheme are a direct manifestation of employing coherent STBC with beamforming and optimal power loading to improve reliability in terms of diversity gain without much discrepancy in terms of computational complexity.
The graph shown in Figure 10 demonstrates the performance comparison between SU–IA–STBC and SU–IA–DSTBC where the channel’s spatial correlations are considered to have a slowly varying effect similar to shadowing. Both the DSTBC and the STBC technique are seen to significantly outperform the SU–IA–UPA technique because implementing 2D eigen-beamforming minimizes the error probability and outperforms 1D beamforming especially at a moderate-to-high SNR. This is indicative of the fact that for the SU–IA–UPA scheme, the TOs become almost non-existent at the highest SNR. However, this work shows that for practical values of the SNR, there are a non-zero number of TOs that the SUs can always exploit. At an intermediate-to-high SNR, the SU–IA–DSTBC scheme performs better than the SU–IA–STBC scheme. The graph shown in Figure 10 demonstrates the difference in performance between the SU–IA–TBF scheme against the SU–IA–DSTBC schemes. It has been shown that even though the ST-WF PA scheme provides efficient performance for the SUs only in the intermediate SNRs, this work combines the benefits of double ED as well as the SU–IA–STBC algorithm to release even more eigenmodes, thus achieving higher data rate performance than the SU–IA–TBF algorithm. The essential drawback of the MEB algorithm is that it is less dynamic than ST-WF and more susceptible to lower data rates. It can also be seen in Figure 8 that the data rate performance of the SU–IA–DSTBC is higher than that of the SU–IA–DSTBC schemes, owing to the fact that the threshold function of the DSTBC scheme is an effective tool for saving the PU’s transmit power due to the WPA’s channel outage conditions (see Figure 3). The consequence of saving the SUs’ transmit power can be seen in Figure 8, where the sum rate performance of the SU–IA–DSTBC curve increases even further especially at a moderate-to-high SNR, when compared with the SU–IA–STBC curve. Also, with two SU-Rx antennas, the DSTBC–beamforming scheme shows better SER performance than coherent STBC with an increasing margin as the SNR was increased, demonstrating that in highly correlated channels, training symbols used in coherent STBC incur a significant loss in data rate.
Implementing the proposed scheme in real-world CR networks involves significant challenges such as hardware limitations, synchronization, channel variability, energy consumption, and interference management. Although the approach offers benefits, these practical issues must be addressed to realize its potential.

8. Conclusions

An opportunistic interference alignment (OIA) scheme has been proposed that is based on the literature described in [11,12,13,14,15,16,17,18,19,20,21,22,23]. However, this work differentiates itself in a number of key areas to achieve significantly higher data rate performance. Firstly, the SVD that is performed on the PU channel matrix applies a ST-WF algorithm to free up some unused eigenmodes. Both the PU and SU can utilize the licensed spectrum by aligning the interference from the SUs to these unused eigenmodes. The ST-WF achieves higher capacity per antenna than SWF, and even though ST-WF has a higher channel outage probability than that of SWF, its transmission is similar to block transmission, which makes this scheme operate in conditions more suited to CR networks. Secondly, to further enhance the accuracy of detection of TOs, this work makes use of a double-threshold energy detection (ED) scheme where the FC receives two kinds of information from which to base its decision on. This increased range of values available to the FC leads to higher detection accuracy and thus an increased number of TOs. Thirdly, to increase the SUs’ sum rate performance, a new IA scheme equipped with STBC across eigen-beams were combined to yield a two-directional eigen-beamformer that performs better than the conventional one-directional beamformer with negligible increase in computational complexity. The incremental gains in performance achieved from the ST-WF and double-ED schemes coupled with a careful SU selection scheme that always ensures a 2 T x × 2 R x for the SUs combine with the SU–IA–STBC scheme to yield higher data rates. Lastly, the new IA scheme was used to achieve full transmit diversity without losing sum rates by wedding optimal precoding with orthogonal DSTBC, where the DSTBC structure of the equivalent channels were preserved after zero-forcing the interfering users. Since the fundamental SU transmission is not changed by the transmit eigen-beamforming matrices, these IA schemes were shown to achieve higher diversity gain than other conventional methods.

Author Contributions

Conceptualization, Y.A., O.S. and Y.S.; Data curation, Y.A. and Y.S.; Formal analysis, Y.A., O.S. and Y.S.; Investigation, Y.A., O.S. and Y.S.; Methodology, Y.A., O.S. and Y.S.; Project administration, O.S.; Resources, O.S. and Y.S.; Software, Y.A. and O.S.; Supervision, Y.S.; Validation, Y.A. and O.S.; Writing—original draft, Y.A.; Writing—review and editing, O.S., Y.A. and Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in the study are included in the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, X.L.; Li, Y.X.; Gao, Y.; Tang, X.W. Q-Learning-Based Spectrum Access for Multimedia Transmission Over Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 110–119. [Google Scholar] [CrossRef]
  2. Dong, L.; Wang, H.M.; Xiao, H. Secure Cognitive Radio Communication via Intelligent Reflecting Surface. IEEE Trans. Commun. 2021, 69, 4678–4690. [Google Scholar] [CrossRef]
  3. Mitola, J.; Maguire, G.Q. Cognitive radio: Making software radios more personal. IEEE Pers. Commun. 1999, 6, 13–18. [Google Scholar] [CrossRef]
  4. Nobar, S.K.; Ahmed, M.H.; Morgan, Y.; Mahmoud, S.A. Resource Allocation in Cognitive Radio-Enabled UAV Communication. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 296–310. [Google Scholar] [CrossRef]
  5. Guo, S.; Zhao, X. Deep Reinforcement Learning Optimal Transmission Algorithm for Cognitive Internet of Things With RF Energy Harvesting. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1216–1227. [Google Scholar] [CrossRef]
  6. Haykin, S. Cognitive radio: Brain-empowered Wireless Communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  7. Ghosh, S.; Acharya, T.; Maity, S.P. Outage Analysis in SWIPT Enabled Cooperative AF/DF Relay Assisted Two-Way Spectrum Sharing Communication. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1434–1443. [Google Scholar] [CrossRef]
  8. Jafar, S.A. Interference Alignment—A New Look at Signal Dimensions in a Communication Network; Now Publishers: Norwell, MA, USA, 2011. [Google Scholar]
  9. El-Ayach, O.; Peters, S.W.; Heath, R.W. The Practical Challenges of Interference Alignment. IEEE Wirel. Commun. 2013, 20, 35–42. [Google Scholar] [CrossRef]
  10. Jafar, S.A.; Shamai, S. Degrees of Freedom Region of the MIMO X Channel. IEEE Trans. Inf. Theory 2008, 54, 151–170. [Google Scholar] [CrossRef]
  11. Perlaza, S.M.; Debbah, M.; Lasaulce, S.; Chaufray, J.M. Opportunistic Interference Alignment in MIMO Interference Channels. In Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes, France, 15–18 September 2008; pp. 1–5. [Google Scholar]
  12. Perlaza, S.M.; Fawaz, N.; Lasaulce, S.; Debbah, M. From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks. IEEE Trans. Signal Process. 2010, 58, 3728–3741. [Google Scholar] [CrossRef]
  13. Krikidis, I. A SVD-Based Location Coding for Cognitive Radio in MIMO Uplink Channels. IEEE Commun. Lett. 2010, 14, 912–914. [Google Scholar] [CrossRef]
  14. Tang, J.; Lambotharan, S.; Pomeroy, S. Interference Cancellation and Alignment Techniques for multiple-input and multiple-output Cognitive Relay Networks. IET Signal Process. 2013, 7, 188–200. [Google Scholar] [CrossRef]
  15. Alizadeh, A.; Bahrami, H.R.; Maleki, M.; Sastry, S. Spatial Sensing and Cognitive Radio Communication in the Presence of a K-User Interference Primary Network. IEEE J. Sel. Areas Commun. 2015, 33, 741–754. [Google Scholar] [CrossRef]
  16. Sboui, L.; Ghazzai, H.; Rezki, Z.; Alouini, M.S. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users. IEEE Commun. Lett. 2015, 19, 403–406. [Google Scholar] [CrossRef]
  17. Shen, C.; Fitz, M.P. Opportunistic Spatial Orthogonalization and Its Application in Fading Cognitive Radio Networks. IEEE J. Sel. Top. Signal Process. 2011, 5, 182–189. [Google Scholar] [CrossRef]
  18. Amir, M.; El-Keyi, A.; Nafie, M. Constrained Interference Alignment and the Spatial Degrees of Freedom of MIMO Cognitive Networks. IEEE Trans. Inf. Theory 2011, 57, 2994–3004. [Google Scholar] [CrossRef]
  19. Yang, H.J.; Shin, W.Y.; Jung, B.C.; Paulraj, A. Opportunistic Interference Alignment for MIMO Interfering Multiple-Access Channels. IEEE Trans. Wirel. Commun. 2013, 12, 2180–2192. [Google Scholar] [CrossRef]
  20. Baferani, M.H.; Abouei, J.; Yazdi, Z.Z. Interference Alignment in Overlay Cognitive Radio Femtocell Networks. IET Commun. 2016, 10, 1401–1410. [Google Scholar] [CrossRef]
  21. Tsinos, C.G.; Berberidis, K. Blind Opportunistic Interference Alignment in MIMO Cognitive Radio Systems. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 626–639. [Google Scholar] [CrossRef]
  22. Mosleh, S.; Abouei, J.; Aghabozorgi, M.S. Distributed Opportunistic Interference Alignment Using Threshold-Based Beamforming in MIMO Overlay Cognitive Radio. IEEE Trans. Veh. Technol. 2014, 63, 3783–3793. [Google Scholar] [CrossRef]
  23. Abdulkadir, Y.; Simpson, O.; Nwanekezie, N.; Sun, Y. Space-Time Opportunistic Interference Alignment in Cognitive Radio Networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016. [Google Scholar]
  24. Shen, Z.; Heath, J.; Andrews, J.; Evans, B.L. Comparison of Space-time Water-filling and Spatial Water-filling for MIMO Fading Channels. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Dallas, TX, USA, 29 November–3 December 2004. [Google Scholar]
  25. Shen, Z.; Heath, J.; Andrews, J.; Evans, B.L. Space-Time Water-Filling for Composite MIMO Fading Channels. EURASIP J. Wirel. Commun. Netw. 2006, 2006, 016281. [Google Scholar] [CrossRef]
  26. Goldsmith, A.; Jafar, S.A.; Jindal, N.; Vishwanath, S. Capacity limits of MIMO channels. IEEE J. Sel. Areas Commun. 2003, 21, 684–702. [Google Scholar] [CrossRef]
  27. Guler, B.; Yener, A. Selective Interference Alignment for MIMO Cognitive Femtocell Networks. IEEE J. Sel. Areas Commun. 2015, 32, 439–450. [Google Scholar] [CrossRef]
  28. Simpson, O.; Abdulkadir, Y.; Sun, Y.; Chi, B. Relay-Based Cooperative Spectrum Sensing with Improved Energy Detection in Cognitive Radio. In Proceedings of the International Conference on Broadband and Wireless Computing, Communications and Applications, Krakow, Poland, 4–6 November 2015. [Google Scholar]
  29. Kalamkar, S.S.; Banerjee, A. Improved Double Threshold Energy Detection for Cooperative Spectrum Sensing in Cognitive Radio. Def. Sci. J. 2013, 63, 34–40. [Google Scholar] [CrossRef]
  30. Jöngren, G.; Skoglund, M.; Ottersten, B. Combining Beamforming and Orthogonal Space–Time Block Coding. IEEE Trans. Inf. Theory 2003, 48, 611–627. [Google Scholar] [CrossRef]
  31. Zhou, S.; Giannakis, G.B. Optimal Transmitter Eigen-Beamforming and Space—Time Block Coding Based on Channel Correlations. IEEE Trans. Inf. Theory 2003, 49, 1673–1689. [Google Scholar] [CrossRef]
  32. Bhatnagar, M.R.; Hjørungnes, A. Linear Precoding of STBC over Correlated Ricean MIMO Channels. IEEE Trans. Wirel. Commun. 2010, 9, 1832–1836. [Google Scholar] [CrossRef]
  33. Abdel-Samad, A.; Davidson, T.N.; Gershman, A.B. Robust Transmit Eigen Beamforming Based on Imperfect Channel State Information. IEEE Trans. Signal Process. 2010, 54, 1596–1608. [Google Scholar] [CrossRef]
  34. Shi, L.; Zhang, W.; Xia, X.G. On Designs of Full Diversity Space-Time Block Codes for Two-User MIMO Interference Channels. IEEE Trans. Wirel. Commun. 2012, 11, 4184–4191. [Google Scholar]
  35. Li, L.; Jafarkhani, H. Maximum-Rate Transmission With Improved Diversity Gain for Interference Networks. IEEE Trans. Inf. Theory 2013, 59, 5313–5330. [Google Scholar]
  36. Naguib, A.; Seshadri, N.; Calderbank, A. Applications of Space-time Block Codes and Interference Suppression for High Capacity and High Data Rate Wireless Systems. In Proceedings of the Asilomar Conference, Pacific Grove, CA, USA, 1–4 November 1998. [Google Scholar]
  37. Alamouti, A. Simple Transmitter Diversity scheme for Wireless Communications. IEEE J. Sel. Areas Commun. 1998, 16, 1451–1458. [Google Scholar] [CrossRef]
  38. Cai, X.; Giannakis, G.B. Differential Space—Time Modulation With Eigen-Beamforming for Correlated MIMO Fading Channels. IEEE Trans. Signal Process. 2006, 54, 1279–1288. [Google Scholar]
  39. Bhatnagar, M.R.; Hjørungnes, A.; Song, L. Precoded Differential Orthogonal Space-Time Modulation Over Correlated Ricean MIMO Channels. IEEE J. Sel. Top. Signal Process. 2011, 2, 124–134. [Google Scholar] [CrossRef]
  40. Li, F.; Jafarkhani, H. Space-time Processing for X Channel using Precoders. IEEE Trans. Signal Process. 2011, 60, 1849–1861. [Google Scholar] [CrossRef]
  41. Alotaibi, F.T.; Chambers, J.A. Outage Probability of Cooperative Cognitive Networks Based on Distributed Orthogonal Space–Time Block Codes. IEEE Trans. Veh. Technol. 2011, 61, 3759–3765. [Google Scholar] [CrossRef]
  42. Telatar, I.E. Capacity of Multi-antenna Gaussian Channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  43. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  44. Guo, X.; Xia, X.G. On Full Diversity Space—Time Block Codes With Partial Interference Cancellation Group Decoding. IEEE Trans. Inf. Theory 2009, 55, 4366–4385. [Google Scholar] [CrossRef]
  45. StÄuber, G.L. Principles of Mobile Communication, 2nd ed.; Kluwer Academic Publisher: Dordrecht, The Netherlands, 2001. [Google Scholar]
  46. Simpson, O. Optimal Cooperative Spectrum Sensing for Cognitive Radio. Ph.D. Thesis, University of Hertfordshire, Hatfield, UK, 2016. [Google Scholar]
  47. Atapattu, S.; Tellambura, C.; Jiang, H. Energy Detection Based Cooperative Spectrum Sensing in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2011, 10, 1232–1241. [Google Scholar] [CrossRef]
  48. Palomar, D.P.; Fonollosa, J.R. Practical Algorithms for a Family of Water-filling Solutions. IEEE Trans. Signal Process. 2005, 53, 686–695. [Google Scholar] [CrossRef]
  49. Abdulkadir, Y.; Simpson, O.; Nwanekezie, N.; Sun, Y. A Differential Space-Time Coding Scheme for Cooperative Spectrum Sensing in Cognitive Radio Networks. In Proceedings of the IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015; pp. 1386–1391. [Google Scholar]
  50. Yetis, C.M.; Gou, T.; Jafar, S.A.; Kayran, A.H. On Feasibility of Interference Alignment in MIMO Interference Networks. IEEE Trans. Signal Process. 2010, 58, 4771–4782. [Google Scholar] [CrossRef]
  51. Gomadan, K.; Cadambe, V.R.; Jafar, S.A. A Distributed Numerical Approach to Interference Alignment and Applications to Wireless Interference Networks. IEEE Trans. Inf. Theory 2011, 57, 3309–3322. [Google Scholar] [CrossRef]
  52. Guo, C.; Peng, T.; Xu, S.; Wang, H.; Wang, W. Cooperative Spectrum Sensing with Cluster-Based Architecture in Cognitive Radio Networks. In Proceedings of the IEEE 69th Vehicular Technology Conference (VTC), Barcelona, Spain, 26–29 April 2009; pp. 1–5. [Google Scholar]
  53. Gomadam, K.S.; Cadambe, V.R.; Jafar, S.A. Approaching the Capacity of Wireless Networks through Distributed Interference Alignment. In Proceedings of the IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6. [Google Scholar]
  54. Tarokh, V.; Jafarkhani, H. A Differential Detection Scheme for Transmit Diversity. IEEE J. Sel. Areas Commun. 2000, 18, 1161–1174. [Google Scholar] [CrossRef]
  55. Ganesan, A.; Rajan, B.S. Interference Alignment With Diversity for the 2 × 2 X-Network With Four Antennas. IEEE Trans. Inf. Theory 2014, 60, 3576–3592. [Google Scholar] [CrossRef]
  56. Jafarkhani, H.; Tarokh, V. Multiple Transmit Antenna Differential detection from Generalized Orthogonal Designs. IEEE Trans. Inf. Theory 2001, 47, 2626–2631. [Google Scholar] [CrossRef]
  57. Ganesan, G.; Stoica, P. Differential Modulation using Space–time Block Codes. IEEE Signal Process. Lett. 2002, 9, 57–60. [Google Scholar] [CrossRef]
  58. Abdulkadir, Y.; Simpson, O.; Sun, Y. Interference Alignment for Cognitive Radio Communications and Networks: A Survey. J. Sens. Actuator Netw. 2019, 8, 50. [Google Scholar] [CrossRef]
  59. Slaney, A.; Sun, Y. Space-time coding for wireless communications. IEE Proc. Commun. 2006, 153, 509–518. [Google Scholar] [CrossRef]
  60. Yang, J.; Sun, Y.; Senior, J.M.; Pem, N. Channel estimation for wireless communications using space-time block coding techniques. In Proceedings of the IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, 25–28 May 2003. [Google Scholar]
  61. Delestre, F.; Masoud, E.; Sun, Y.; Slaney, A. Detection scheme for space-time block coded wireless communications without channel state information. In Proceedings of the IEEE International Conference on Communication Systems, Guangzhou, China, 19–21 November 2008. [Google Scholar]
  62. Bani, K.; Kulkarni, V. Hybrid Spectrum Sensing Using MD and ED for Cognitive Radio Networks. J. Sens. Actuator Netw. 2022, 11, 36. [Google Scholar] [CrossRef]
  63. Abdulkadir, Y. Optimizing Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Alignment and Space-Time Coding. Ph.D. Thesis, University of Hertfordshire, Hatfield, UK, 2017. [Google Scholar]
  64. Nnamdi, N.; Simpson, O.; Wojaiye, G.O.; Sun, Y. Co-Efficient Vector Based Differential Distributed Quasi-Orthogonal Space Time Frequency Coding. Sensors 2023, 23, 7540. [Google Scholar]
Figure 1. Multiuser CR network model consisting of one PU link and multiple SUs.
Figure 1. Multiuser CR network model consisting of one PU link and multiple SUs.
Jsan 13 00046 g001
Figure 2. Average sum rate vs. the SNR at the PUs link for water-filling (SWF and ST-WF) and MEB.
Figure 2. Average sum rate vs. the SNR at the PUs link for water-filling (SWF and ST-WF) and MEB.
Jsan 13 00046 g002
Figure 3. Outage probability curves for SWF and ST-WF.
Figure 3. Outage probability curves for SWF and ST-WF.
Jsan 13 00046 g003
Figure 4. (a) Single detection (b) Double detection.
Figure 4. (a) Single detection (b) Double detection.
Jsan 13 00046 g004
Figure 5. Performance comparison of a conventional ED and a double-threshold ED scheme.
Figure 5. Performance comparison of a conventional ED and a double-threshold ED scheme.
Jsan 13 00046 g005
Figure 6. Pd vs. SNR with Pf = 0.1 and 0.01 using a conventional ED and a double-threshold ED with an R = 5 scheme.
Figure 6. Pd vs. SNR with Pf = 0.1 and 0.01 using a conventional ED and a double-threshold ED with an R = 5 scheme.
Jsan 13 00046 g006
Figure 7. STBC process.
Figure 7. STBC process.
Jsan 13 00046 g007
Figure 8. SER Curves for coherent STBC and DSTBC–beamforming schemes.
Figure 8. SER Curves for coherent STBC and DSTBC–beamforming schemes.
Jsan 13 00046 g008
Figure 9. Average sum rate (b/s) against SNR (dB) for two SUs.
Figure 9. Average sum rate (b/s) against SNR (dB) for two SUs.
Jsan 13 00046 g009
Figure 10. Average sum rate (b/s) against SNR (dB) for two SUs with DSTBC.
Figure 10. Average sum rate (b/s) against SNR (dB) for two SUs with DSTBC.
Jsan 13 00046 g010
Table 1. Spectrum sensing techniques comparison [46].
Table 1. Spectrum sensing techniques comparison [46].
AspectEnergy
Detection
Matched
Filtering
Cyclostationary Feature DetectionEigenvalue-Based Detection
Implementation ComplexitySimple and low complexityHigh complexity; requires matched filter designModerate to high complexity; requires spectral correlationModerate to high complexity; requires covariance matrix computation
Prior Knowledge RequiredNone;
signal-agnostic
Requires knowledge of signal’s waveform or patternRequires knowledge of signal’s cyclic featuresNo prior knowledge of signal waveform required
Sensitivity to NoiseHigh; sensitive to noise power variationsModerate; performance depends on filter design and noiseHigh; sensitive to noise but can be robust with correct featuresModerate to high; performance affected by noise and interference
Application SuitabilitySuitable for environments where simplicity and low cost are keySuitable when exact signal waveform is known and precise synchronization is possibleSuitable for signals with known cyclic features and in moderate-to-high SNR environmentsSuitable for detecting signals in noisy environments and when precise signal structure is unknown
Table 2. SU election algorithm.
Table 2. SU election algorithm.
StepsAlgorithm 1 SU Election Algorithm
ICalculate of all SUs from the FC, and place nodes in ascending order of in a queue. Choose 2 K nodes with the shortest in the queue as a set of candidate SUs to form clusters denoted as i ;
IIRandomly assign K nodes as the SU set from i where i = { i 1 , , i k } and initialize m ¯ = m ¯ 1 , , m ¯ k , where m ¯ k = m i k ;
IIIAllocate each node into the cluster, where K = arg min 1 k K m i m ¯ k , i = 1 , 2 and m ¯ i denotes the observation vector for each given SU node i . For each cluster, update m ¯ k by averaging m of all nodes in cluster k. Similarly, update the node ID of each selected SU as i k = arg min i C can m i m ¯ k .
Table 3. Summary of the simulation parameters.
Table 3. Summary of the simulation parameters.
ParametersSpecification
Simulation platform Monte-Carlo simulations using MATLAB
Modulation typeBPSK
Number of bits per symbol1 b/s
Diversity techniqueSTBC, DSTBC
Antenna configuration
(Number of transmitting antennas and receiving antennas)
2 × 2, 2 × 1
2 Tx SUs 2 Rx SUs
2 Tx SUs 1 Tx SU
ChannelRayleigh (fixed and independent)
Signal-to-noise ratio (SNR)−5 to 30 dB
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abdulkadir, Y.; Simpson, O.; Sun, Y. Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding. J. Sens. Actuator Netw. 2024, 13, 46. https://doi.org/10.3390/jsan13050046

AMA Style

Abdulkadir Y, Simpson O, Sun Y. Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding. Journal of Sensor and Actuator Networks. 2024; 13(5):46. https://doi.org/10.3390/jsan13050046

Chicago/Turabian Style

Abdulkadir, Yusuf, Oluyomi Simpson, and Yichuang Sun. 2024. "Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding" Journal of Sensor and Actuator Networks 13, no. 5: 46. https://doi.org/10.3390/jsan13050046

APA Style

Abdulkadir, Y., Simpson, O., & Sun, Y. (2024). Opportunistic Interference Alignment in Cognitive Radio Networks with Space–Time Coding. Journal of Sensor and Actuator Networks, 13(5), 46. https://doi.org/10.3390/jsan13050046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop