Improving spectrum utilization efficiency is a fundamental goal of dynamic spectrum access technology. The definition of spectrum holes determines how to detect and exploit them. Current definitions of spectrum holes are ineffective in exploiting spatial-temporal spectrum holes. In this paper, a novel definition of spectrum holes is proposed, in which
throughput loss
indicates the impact of secondary users on primary users. The definition specifies spectrum holes, unifies the impact of secondary users on primary users and is effective exploiting spatial-temporal spectrum holes. Theoretical analysis and numerical simulations show that the new definition proposed in this paper significantly improves the spectrum utilization efficiency.
1. Introduction
R
adio frequency spectrum is a precious resource for wireless communication systems. With the rapid development of wireless communication services, there is an increasing demand for spectrum. Existing static spectrum allocations policies have resulted in the low utilization of spectrum
[1
-
4]
. The dynamic spectrum access (DSA) policy is proposed as an alternative to efficiently use radio spectrum
[5
-
8]
. In DSA, portions of the spectrum are allocated to one or more users, known as primary users (PUs). Spectrum use is not exclusively granted to these users, although they have a higher priority. Other users, referred to as secondary users (SUs), can also access the allocated spectrum, provided the PUs are properly protected. By doing so, the radio spectrum is reused opportunistically, thereby significantly improving the spectrum utilization
[5
-
8]
.
Cognitive radio (CR) technology is an important means to realize DSA. Users with cognitive functions can sense the spectrum environment using intelligent means. They can automatically search and use available spectrum, thereby realizing authorized spectrum sharing
[5
-
8]
. In
[9]
, a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining interference with all primary systems within an acceptable level.
In order to reuse the spectrum, a secondary user must be able to reliably identify a spectrum hole. In the above definition of a spectrum hole, the key factor is the impact of SUs on PUs. For a temporal spectrum hole, the impact refers to the probability when PUs and SUs simultaneously use the same spectrum. This has been referred to as the collision probability
[10]
. The collision probability ignores the position relationship between SUs and PUs, which is essential for exploiting spatial spectrum opportunities. For a spatial spectrum hole, this impact refers to power which is received by primary receriver from secondary transmitters, referred to as interference
[11
-
13]
. It alternately refers to the outage probability of the primary receiver, which is a function of the interference. The interference and the outage probability only reflect the intensity of the interfering signal. They does not reflect the duration of the interference. It also cannot fully reflect the impact of SUs on PUs. In
[14]
, the Bayesian risk function was minimized by selecting the sensing threshold. This was a tradeoff between the risk of collision probability and secondary users losing communication opportunity.This tradeoff exploited both the temporal and spatial spectrum opportunity, and greatly improved the spectrum utilization. However, it lacks a theoretical basis. In
[15]
, a three-region scheme for space-time spectrum sensing and access was designed with one primary transmitter at the center. This includes the black, grey, and white region. However, the authors have not jointly considered the interference and collision probability, as above, which doesn’t fully reflect the impact of SUs on PUs.
In this paper, the average throughput loss percentage (hereafter referred to as throughput loss) of the PUs reflects the impact of SUs on PUs. The throughput loss is a comprehensive indicator, which contains the collision probability and intensity of interference. It unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. Considering the throughput loss improves the spectrum utilization .In addition, the throughput loss is more intuitive, compared to Bayesian risk criteria. In this paper we design networks and channel models. Through theoretical analysis and numerical simulations, it is shown that the throughput loss is a more effective impact indicator than conventional indicators (e.g., collision probability, interference, and Bayesian risk) in terms of spectrum utilization.
The remainder of this paper is organized as follows. In section 2, we propose the spectrum holes definition with throughput loss as an impact indicator. In section 3, we introduce the networks and channel models to verify the definition. In section 4, we derive the optimal scheme of spectrum hole utilization in the models. In section 5, this definition is compared to conventional definitions of spectrum holes. In section 6, the numerical simulations and analysis are presented. In section 7, we conclude this research.
2. Spectrum Holes Definition
The definition of spectrum holes determines how to detect and exploit them. In this definition, the impact of SUs on PUs is a key factor. Conventional definitions of spectrum holes have many shortcomings. In this section, we first define spectrum holes with throughput loss as an impact indicator.
The average throughput loss percentage of PUs indicates the impact of SUs on PUs as
where
Tp
max
is the maximum average throughput of PUs and
Tpave
is the average throughput of PUs. This can be predicted through channel models, provided a secondary transmitter (ST) is used.
The proposed definition of a spectrum holes is as follows:
Definition
: a spectrum hole is defined as a (time, location, frequency-band)-tuple that a secondary user can use, while maintaining the throughput loss to all primary users in the specified frequency band within an acceptable level.
Choosing a suitable value for
k
is important. In a practical system, PUs cannot always work at the maximum average throughput. There is spare throughput against all kinds of interference. We choose a suitable value for
k
to guarantee QoS of the PUs and make the SUs attain the maximum throughput.
3. Network and Channel Models
- 3.1 Networks Model
As shown in
Fig. 1
, we consider a network model consisting of a pair of fixed PUs (including a primary transmitter (PT) and a primary receiver (PR)) and a pair of SUs (including a secondary transmitter (ST) and a secondary receiver (SR)). The SUs opportunistically exploit a spectrum band licensed to the PUs. Assume that the PUs are rate-adaptive digital communication systems, and occupy the spectrum band with a probability
q
.
Network model
In
Fig. 1
, PT is located in the origin of coordinates. The coordinates of PR, ST, and SR are labeled in the respective brackets. The angle between the communication direction from ST to SR and the X-axis is
f
. The angle between the communication direction from PT to PR and the X-axis is
q
.
r
is the distance from PT to ST.
rp
and
rs
denote the communication distance of the PUs and SUs, respectively.
dps
denotes the distance from PT to SR.
dsp
denotes the distance from ST to PR.
In
Fig. 1
, the circles with radius
d
are the protected regions. Any active transmitter cannot be inside this region, to exclude the possibility that the receive signal and interference power reaches infinity. It's worth noting that the protected region of ST is used to exclude the possibility that the sensing receive power reaches infinity.
- 3.2 Channel Model
Consider a wireless channel model with both large-scale path loss and small-scale fading. Free-space path loss,
hPL
, models the average power changing with distance. Rayleigh fading
hFD
is adopted for small-scale variation. The channel model between any Tx-Rx pair can then be written as follows:
where
hFD
~
CN
(0.1) is a complex circular Gaussian random variable with independent real and imaginary parts with equal variance; and
where
A
is a constant dependent upon the frequency and transmitter/receiver antenna gain,
r
is the distance between the Tx-Rx pair, and
a
is the path loss exponent. Without loss of generality, we normalize
A
=1 for simplicity and consider
a
³ 2, which is typical in practical applications.
- 3.3 Signal and Sensing Models
To sense the primary transmission, ST must perform a hypothesis test between the following two hypotheses:
H
0
(primary signal absent) and
H
1
(primary signal present). This test is conducted as follows:
where
N
is the number of samples,
y
(
i
) is the received samples at ST,
x
(
i
)
CN
(0,
S
2
x
) is the signal received at ST from PT after path loss and fading, and
w
(
i
) is assumed to be a circularly-symmetric complex Gaussian random variable with mean zero and one-sided power spectral density
S
2
w
, namely,
w
(
i
)
CN
(0,
S
2
w
) . Based on the channel model in (4),
Sx
2
=
Pph
2
PLd
where
Pp
is transmit power of PT. The primary signal
x
(
i
) is independent of the noise
w
(
i
).
The decision statistic is
. The probabilities of miss detection
pm
=Pr{
H
0
/
H
1
} and false alarm
pf
=Pr{
H
1
/
H
0
} are
[16]
:
where
g
is the signal to noise ratio (SNR) at ST,
g=Ppr-aSw
-2
in the above channel model, and
e
is the decision threshold.
is the tail probability of the standard normal distribution.
4. Optimization of Spatial-Temporal Spectrum
- 4.1 Channel States
In DSA, for a temporal spectrum hole, SUs cannot simultaneously operate in the same channel with the PUs. Collision between the SUs and PUs may only occur due to sensing errors. But for a spatial-temporal spectrum hole, we allow for it if the distance from PR is far enough. So, we model the spectrum access process as a four-state process, where state 0 means no user operates in the channel. State 1 means the PUs operate in the channel. State 2 means the SUs operate in the channel. State 3 means both the PUs and the SUs operate in the channel. The channel state set is
S
{0,1,2,3} . It is assumed that PUs occupy the spectrum band with a probability
q
and SUs opportunistically occupy it. The probability in every channel state is, respectively:
- 4.2 Throughput Achieved in Every Channel State
In the system models described above, we assume the bandwidth is 1Hz. As the network model only consists of a pair of PUs and SUs, we replace the throughput with channel capacity
[17]
. The throughput of the PUs achieved in state1 is
The throughput of the SUs achieved in state2 is
where
sw
2
is power of the additive white Gaussian noise (AWGN),
Pp
is the transmission power for the PUs, and
Ps
is the transmission power for the SUs.
We assume that the SUs and PUs can vary their data rate through a combination of adaptive modulation and coding. This allows the transmitter and receiver to employ the most reliable communication at the highest rate permitted, given the signal-to-interference-plus-noise ratio (SINR).We assume that they use random Gaussian codebooks. As a result, their transmitted signals can be treated as white Gaussian processes. The transmission of other users is treated as Gaussian noise. The maximal rate of users when the secondary user and the primary user share the spectrum can be represented as follows:
The throughput of the SUs achieved in state3 is
The throughput of the PUs achieved in state3 is
- 4.3 Optimization of Spatial-Temporal Spectrum for Proposed Definition
The average throughput of the SUs is
The average throughput of the PUs is
The maximum average throughput of the PUs is
Tp
max
=
qRp
1
.
Maximizing the available spatial-temporal spectrum opportunity using the spectrum holes definition in this paper can be formulized as follows:
where 0 #
k
1 is a scaling factor that denotes the maximum average throughput loss ratio that is acceptable for PUs due to interference of the SUs. We first introduce the following proposition to solve this problem:
Proposition1
:
pf
is a decreasing function of
pm
.
Proof
: According to (7) and (8), we can obtain:
So,
Therefore
pf
is a decreasing function of
pm
. Proposition 1 is proved.
The objective function in equation (19) is a decreasing function of
pf
.
We can obtain from the constraint condition (20):
where
pm
*
denotes the optimal miss detection probability. Because
pm
is a decreasing function of
pf
, the optimal false alarm probability is:
It is worth noting that
kRp
1
(
Rp
1
-
Rp
3
)
-1
> 1 can occur when
r
is large enough. However, miss detection probability is not greater than 1. In this case, we order
pm
*
=1 and
pf
*
=0 to maximize the SUs throughput.
The maximum average throughput of the SUs is:
5. Comparison of the Proposed and Conventional Definitions
As stated in the introduction, the interference only reflects the intensity of the interfering signal. It does not reflect the duration of the interference signal. So, it cannot fully reflect the impact of SUs on PUs. We only consider the definition based on the collision probability constraint and the Bayesian risk in this section.
- 5.1 Comparison to the Collision Probability Constraint
We maximize the available spatial-temporal spectrum using the spectrum holes definition as follows
[10]
:
where
is the minimum miss detection probability. The inequality (28) constrains the collision probability between the PUs and the SUs. We easily obtain the optimal false alarm probability to maximize the SUs throughput as follows:
The maximum average throughput of the SUs is:
In this case, the maximum value of
k
is:
where
Rp
3min
is the minimum value of
Rp
3
in the case of
dsp
=max(
rp
|sin
q
|,
d
) . Substituting
km
into (24), we obtain
Substituting (32) into (26), we obtain the maximum average throughput of the SUs in the case of
k
=
km
in the proposed definition:
where
is obtained by substituting
into (25).
Subtracting (30) from (33), we obtain the following:
It is easy to prove (34) is greater than zero. That is, the definition of spectrum holes based on the throughput loss is more advantageous than the one based on the collision probability constraint in terms of spectrum utilization.
The traditional scheme uses (29), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than that of the traditional scheme. However, the overhead in the proposed scheme is more than the traditional schemes due to the information required to transmit. The additional overhead is limited in small-scale network.
- 5.2 Comparison to the Bayesian Criteria
Using Bayesian criterion, the optimization objective is defined as a risk function involving the miss detection and false alarm probabilities as follows
[14]
:
where
Ips
is the interference power from the PT to the SR,
Isp
is the interference power from the ST to the PR, and
Ls
is the signal power received by the SR. Both
pm
and
pf
are a function of the detection threshold
e. b
³ 1 is the penalty parameter to place a higher priority on the PUs link.
The sensing threshold is designed to minimize the risk in the different cases of location information:
and
Substituting (31) and (32) into (36), we obtain
where
We obtain the optimal detection threshold:
Substituting
e
*
into (7) and (8), we obtain
pm
(
e
*
) and
pf
(
e
*
) . From (17), we obtain the optimal throughput of the SUs.
The traditional scheme uses (40), while the proposed scheme uses (25). The computing complexity of the proposed scheme is not much higher than the traditional scheme. Additionally, the overhead in the proposed scheme is nearly equivalent to the traditional schemes, as both needs to transmit more information.
6. Numerical Simulation and Analysis
Numerical simulations in
Fig. 2
,
Fig. 3
, and
Fig. 4
were conducted using the conditions described in
Table 1
.
the Parameters and Their Value in the Following Numerical Simulations
the Parameters and Their Value in the Following Numerical Simulations
Throughput comparison of SUs
Throughput comparison of SUs vs. q
Throughput comparison of SUs vs. N
Fig. 2
shows that the throughput of the SUs for different definitions varies with the distance,
r
. It is worth noting the selection of the throughput loss percentage of PUs,
k
. Let the penalty parameter
b
=1 . We obtain the optimal threshold
e
*
from (40). We then obtain
pm
(
e
*
) and
pf
(
e
*
) from (6) and (7). By substituting them into (17) we obtain the throughput of the SUs. At the same time, we calculate the throughput loss percentage
k
. With
r
varying from 0.1m to 20m, we select the maximum value of
k
as the throughput loss percentage. The throughput of the SUs is optimized as described in section4.3, with the maximum value of
k
.
is obtained from (31). The throughput of the SUs is optimized as described in section5.1 using
.
Fig. 2
shows that the throughput of the SUs for the proposed definition is greater than that of the definitions in
[10]
and
[14]
. As
r
increases, the advantage of the proposed definition is more obvious compared to other definitions. This is because the definition in
[10]
is for temporal spectrum holes. However, as
r
increases, the SNR decreases. The false probability increases to satisfy the relatively small collision probability. As a result, the SUs lose spatial spectrum. When
r
>10, the throughput sharply decreases. However, for the definition in
[14]
and the proposed definition, the SUs utilize both temporal and spatial spectrum holes. As
r
increases, the influence of ST on the PR decreases. We increase the collision probability P
3
to utilize more spatial spectrum opportunity. There is obvious improvement in the throughput of the SUs. In
[14]
, the optimization objective is a risk function
R
, not the throughput of SUs. Therefore, compared with the Bayesian criterion, the throughput of the SUs increases significantly with the proposed definition.
Fig. 3
shows the throughput of SUs for different definitions varies with the probability
q
. As shown, the throughput of the SUs for all definitions decreases as
q
increases. This is because the increase in
q
results in less temporal spectrum holes for SUs to utilize. In this process, the throughput for the proposed definition decreases less than that of the other definitions. This is because, in the case of
r
=12 , the SUs mainly utilize spatial spectrum holes.
Fig. 4
shows the throughput of SUs for different definitions with various numbers of samples
N
. It is shown that the throughput of the SUs for all definitions vary as
N
increases. For the proposed definition, it nearly remains unchanged. For the definition in
[10]
, the throughput increases. However, for the definition in
[14]
, it decreases. This shows that the proposed definition is insensitive to sensing accuracy.
7. Conclusion
In this paper, throughput loss is used to indicate the impact of SUs on PUs. This specifies the definition of spectrum holes, and unifies the impact of SUs on PUs in the spatial-temporal spectrum holes. In a typical cognitive radio system, theoretical analysis and numerical simulations show that, when compared to previous definitions of spectrum holes, the proposed definition significantly improves the spectrum utilization, and is insensitive to sensing accuracy.
BIO
Xiaoqiang Li received the B. S. degree and the M. S. degree both from PLA University of Science and Technology, Nanjing, China in 1997 and 2007 respectively. He is currently pursuing for the Ph. D degree in Communications and Information System at the Institute of Communications Engineering, PLA University of Science and Technology, Nanjing, China. His current research interests include cognitive radio technology and digital communications.
Qi Zhou received the B. S. degree from PLA University of Science and Technology, Nanjing, China in 1997 and the M. S. degree from Tsinghua University, Beijing, China in 2005. He is now a senior engineer in research institute. His working is concerned with wireless communication and networks.
Hui Dai received his doctor degree in 2008 at PLA University of Science and Technology, Nanjing, China. He is currently an engineer in Institute of China Electronic System Engineering Corporation. His research focuses on wideband mobile communication technologies including MIMO, link adaptation, cooperative transmission technologies.
Jie Zhang received the Ph.D. degree from Naval Aeronautical Engineering University Yantai, China in 2006. He is now a senior engineer at Beijing institute of electronic system engineering. His research interests include command and control system, effectiveness evaluation, cognitive radio.
Ying Li received her B.S. and Ph. D degree in 2001 and 2006 respectively from National University of Defense Technology, Changsha, Hunan, all in communication engineering. From 2007, she is a research member in Institute of China Electronic System Engineering Company, Beijing. Her research interests include wireless network protocol and signal processing in communications, more specially, the areas of Multicarrier transmission, MIMO and cognitive radio.
Federal Commun. Comm.
2002
Spectrum Policy Task Force Report
Washington, DC
ET Docket No. 02-135
Islam M.
,
Koh C.
,
Oh S.
,
Qing X.
,
Lai Y.
,
Wang C.
,
Liang Y.-C.
,
Toh B.
,
Chin F.
,
Tan G.
,
Toh W.
2008
“Spectrum survey in Singapore: Occupancy measurements and analysis”
in Proc. of 3rd Int. Conf. CROWNCOM
1 -
7
Datla D.
,
Wyglinski A. M.
,
Minden G. J.
2009
“A spectrum surveying framework for dynamic spectrum access networks”
IEEE Trans. Veh. Technol.
58
(8)
4158 -
4168
DOI : 10.1109/TVT.2009.2021601
Xu Y.
,
Anpalagan A.
,
Wu Q.
“Decision-theoretic distributed channel selection for opportunistic spectrum access: Strategies, challenges and solutions”
IEEE Communications Surveys and Tutorials
to be published.
DOI : 10.1109/SURV.2013.030713.00189
Mitola J.
,
Maguire G. Q.
1999
“Cognitive radio: Making software radios more personal”
IEEE Pers. Commun.
6
(4)
13 -
18
DOI : 10.1109/98.788210
Mitola J.
,
Ph.D. dissertation
2000
“Cognitive radio—An integrated agent architecture for software-defined radio”
Roy. Inst. Technol.
Stockholm, Sweden
Ph.D. dissertation
Xu Y.
,
Wang J.
,
Wu Q.
2012
“Opportunistic spectrum access in cognitive radio networks: Global optimization using local interaction games”
IEEE Journal of Selected Topics in Signal Processing
6
(2)
180 -
194
DOI : 10.1109/JSTSP.2011.2176916
Xu Y.
,
Wang J.
,
Wu Q.
2012
“Opportunistic spectrum access in unknown dynamic environment: A game-theoretic stochastic learning solution”
IEEE Transactions on Wireless Communications
11
(4)
1380 -
1391
DOI : 10.1109/TWC.2012.020812.110025
Tandra R.
,
Mishra M.
,
Sahai A.
2009
“What is a spectrum hole and what does it take to recognize one?”
Proc. IEEE
97
(5)
824 -
848
DOI : 10.1109/JPROC.2009.2015710
Ding G.
,
Wu Q.
,
Song F.
2011
“Joint exploration and exploitation of spatial-temporal spectrum hole for cognitive vehicle radios”
in Proc. of IEEE ICSPCC. Conf.
1 -
4
Mai V.
,
Devroye N.
,
Tarokh V.
2009
“On the primary exclusive region of cognitive networks”
IEEE Transactions on Wireless Communications
8
3380 -
3385
DOI : 10.1109/TWC.2009.080454
Wu Q
,
Ding G
,
Wang J
,
Yao Y
2013
"Spatial-temporal opportunity detection for spectrum heterogeneous cognitive radio networks: Two-dimensional sensing"
IEEE Transactions on Wireless Communications
12
(2)
516 -
526
DOI : 10.1109/TWC.2012.122212.111638
Ding G
,
Wang J
,
Wu Q
,
Song F
,
Chen Y
2013
"Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?"
IEEE Sensors Journal
DOI : 10.1109/JSEN.2013.2264161
Jia P.
,
Vu M.
,
Hong T. Le-Ngoc. S.-C.
,
Basar T.
2011
“Capacity-and Bayesian-based cognitive sensing with location side information”
IEEE Journal on Selected Areas in Communications
29
276 -
289
DOI : 10.1109/JSAC.2011.110202
Wei Z.
,
Feng Z.
,
Zhang Q.
,
Li W.
2012
"Three regions for space-time spectrum sensing and access in cognitive radio networks"
IEEE Global Communications Conference
1283 -
1288
Liang Y.-C.
,
Zeng Y.
,
Peh ECY
,
Hoang AT
2008
“Sensing- Throughput Tradeoff for Cognitive Radio Networks”
IEEE Transactions on Wireless Communications
7
1326 -
1337
DOI : 10.1109/TWC.2008.060869
Cover T. M.
,
Thomas J. A.
1990
Elements of Information Theory.
Wiley-Interscience
New York