This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.
Cognitive radio is emerging as a promising solution to the problem of low efficient spectrum utilization that has appeared as a result of stringent spectrum allocations [1-3]. For the full use of a spectrum hole unoccupied by its primary network at a particular time and specific geographic location, cognitive radio can find the spectrum hole by spectrum sensing and allows unlicensed users, i.e., secondary users or cognitive users, to communicate over the detected spectrum hole. It is clear that the efficient utilization of limited spectrum holes can improve the quality of communication among secondary users, such as spectrum hole detection, transmission outage, and channel capacity.One-way cooperative relaying, which assists one source to transmit information to one destination, has been considered as an effective means to improve the performance of spectrum sensing and secondary user transmissions in cognitive radio networks (CRNs) [4]. The detection time and detection probabilities for the presence of primary users are improved as one-way cooperative relays are applied in spectrum sensing [5-8]. The chances of secodary users to access the primary users’ spectrum can also increase with the utilization of one-way cooperative relaying [9]. When multiple secondary users serve as one-way cooperative relays to help data transmissions from one secondary user to the other, paper [10] has studied the spectrum hole utilization efficiency which is the percentage of spectrum holes utilized by the secondary user source for its successful data transmissions without channel outage. However, one-way relaying techniques have low spectral efficiency due to the half-duplex operation mode [11]. Specifically, when two terminals T_{1} and T_{2} intend to exchange information, one-way relaying protocols need four sequential steps, i.e., T_{1} transmits information to the relay and T_{2} in the first step; in the second step, the relay forwards its information to T_{2}; in the third step, T_{2} in turn transmits information to the relay and T_{1}; and in the fourth step, the relay forwards its information to T_{1}, whereas two-way relaying protocols generally need two steps or three steps. For the three-step two-way relaying protocols, T_{1} and T_{2} transmit their own information in the first and second steps, respectively. In the third step, the relay broadcasts its information to the two terminals. For the two-step two-way relaying protocols, T_{1} and T_{2} simultaneously transmit information to the relay in the first step. Then, the relay broadcasts its information in the second step. It was shown that the two-way relaying protocols, which exploit the shared broadcast channel nature of the wireless medium, have higher spectral efficiency than one-way relaying protocols [11][12]1.Since two-way relaying protocols can achieve high spectral efficiency, they also have great potential to further improve the CRNs performance. Most of the current studies consider the scenario where secondary users share the spectrum of the primary user as long as they do not interfere with primary user operations and thus spectrum sensing is not required. In [13-15], two-way relays acted by secondary users are applied to assist two primary users’ bi-directional traffic. In exchange for secondary users relaying services, secondary users either broadcast secondary information in the last step of the two-way relaying protocols [13], or achieve their own communication in the primary user's sub-channels for a fraction of time [14][15]. It was demonstrated that the performance of both the primary and secondary systems can be enhanced by cooperation between the primary and secondary users [16].In the other scenario which is also considered in this paper, secondary users achieve their own communication only in the spectrum holes and thus spectrum sensing is required. For this scenario, the two-step two-way relaying protocol is discussed for the spectrum sensing improvement in [17], where secondary users serve as two-way relays to assist the bi-directional traffic between two primary users and in the second step of the protocol, the secondary users broadcast their information to the cognitive base station (i.e., fusion center) which determines whether the primary users are present or not. However, when the bidirectional traffic between two secondary users is performed through the help of the two-way relays, the performance of secondary data transmissions has not been fully studied. This has motivated our work.In non-cognitive radio networks, the performance of two-way relaying assisted information exchange between two end-sources has been extensively analyzed. Paper [18] compares the outage probability of two-step and three-step two-way protocols based on decode-and-forward (DF) relaying, where the three-step protocol is better than the two-step protocol at the high signal-to-noise ratio (SNR) region. The amplify-and-forward (AF) and DF relaying of two-step two-way relaying protocols are investigated in [19], where outage probability performance of DF outperforms that of AF as all nodes have a single antenna and the target rates of two end-sources are equal. For the networks including multiple two-way relays, the optimal relaying selection among a group of relays usually achieves full diversity and high spectral efficiency through saving the used channels. Paper [20] discusses a relay selection scheme for two-step AF relaying networks, which is to maximize the worse received signal-to-noise ratio (SNR) of the two end-sources. Then, paper [21] investigates the relay selection for three-step DF relaying channels, which is to minimize the average sum bit-error-rate (BER) of the two end-sources. Considering the imperfect channel state information (CSI) with a high feedback rate and a sufficiently high maximum Doppler Shift, paper [22] discusses the partial relay selection for AF relays.Compared with the above performance analysis of two-way relaying protocols in non-cognitive radio networks, CRNs face two challenges. The first is that the mutual interference between the primary and the secondary users has to be considered [23][24] due to the coexisting of the primary and secondary users in the same spectrum and due to the existing of the false alarm of spectrum holes, which means imperfect spectrum sensing. The second is that spectrum sensing and secondary data transmissions must be jointly designed, since they are closely connected [25][26].In this paper, we focus on two-way relaying assisted secondary data transmissions with multiple relays and jointly consider spectrum sensing and bidirectional data transmissions. The main contributions of this paper are summarized as follows. First, we extend the idea of the one-way relaying assisted SFSS-BRDT (selective fusion spectrum sensing and best relay data transmission) scheme [10] to the two-way relaying scenario, i.e., the SFSS is used for achieving spectrum sensing results and then the best relay is selected from a group of two-way cognitive relays to help the bidirectional traffic between two secondary users. Second, two-step and three-step bidirectional secondary data transmission (BSDT) schemes (i.e., two-BSDT and three-BSDT schemes) are proposed, where the typical two-step and three-step two-way relaying protocols based on DF relaying are applied in bidirectional secondary data transmissions. Finally, the closed-form asymptotic expressions of outage probabilities are derived for the two proposed schemes, where the interference from the primary user to secondary users is considered due to the existence of the false alarm of spectrum holes. Meanwhile, under a primary user protection constraint, we calculate and evaluate the spectrum hole utilization which is the percentage of spectrum holes utilized by two secondary users for their successful information exchange without channel outage.The remainder of the paper is organized as follows. In Section 2, we describe the system model and propose two-BSDT and three-BSDT schemes. Section 3 derives outage probabilities of the proposed schemes. Next, in Section 4, we conduct the computer simulations and numerical evaluations. Finally, Section 5 gives some concluding remarks.
This paper mainly takes advantage of high spectral efficiency of two-way relaying protocols. However, for achieving the high spectral efficiency, two-way relaying protocols need some sacrifices at some other aspects, such as hardware implementation and communication complexity. For example, two-way relaying protocols require more critical synchronization than one-way relaying protocols including source to source node synchronization, and handshaking between the sources and relay nodes. Another example is that for the successful self-interference cancellation in two-way relaying protocols, the appropriate channel estimation schemes are needed to estimate both source to relay channels and relay to source channels.
2. System Model
In a primary network, a primary user works on a slotted structure. In each time slot, either the spectrum is occupied by the primary user, or it is idle. On the other hand, a cognitive relay network coexists with the primary network, where a set of M secondary users as cognitive relays (CRs) denoted by Ψ = {CR_{i}| i = 1,2, …,M} assists a secondary user SU_{s} for both sensing the spectrum hole unoccupied by the primary user in a fraction of time and exchanging information with another secondary user SU_{d}. The direct link between SU_{s} and SU_{d} does not exist due to the poor quality of the channel. A time slotted structure of cognitive transmissions is illustrated in Fig. 1 which includes the spectrum sensing slot α and the secondary data transmission slot 1-α. The parameter α is also referred to as spectrum sensing overhead.
To be practically feasible, all nodes operate in half-duplex mode. Each wireless link between two terminals is modeled as a Rayleigh fading channel where the fading process is considered as constant during one time slot. The independent channel coefficients from two different terminals a to b (or a→b) is denoted as h_{ab}. Notice that random variables (RVs) |h_{ab}|^{2} follow exponential distributions with mean
PPT Slide
Lager Image
In addition, we denote the terminals SU_{s}, SU_{d}, CR_{i} and the primary user as the subscripts s, d, i, and p. The transmitting power at each terminal is P_{l}, where l∈{s, d, i, p}. The additive white Gaussian noise (AWGN) at all receivers is modeled as a complex Gaussian random variable with zero mean and variance N_{0}. Thus, the SNR at each terminal can be given by γ_{l} = P_{l}/N_{0}. R_{s} and R_{d} are the data rate at SU_{s} and SU_{d}, respectively.
- 2.1 Spectrum Sensing
We refer to [10] for designing the spectrum sensing protocol. In the first sub-phase of spectrum sensing as shown in Fig. 1, i.e., the first sub-phase of the time slot k, SU_{s} and CRs independently detect a spectrum hole and each secondary user applies an energy detection method2.In the second sub-phase, i.e., the second sub-phase of the time slot k, the detection results of all CRs are forwarded to SU_{s} for fusion with an “AND” rule. In order to avoid interfering with the primary user in this sub-phase, a common control channel (CCC) is applied to forward the CRs’ detection results [27]. Here, we consider only the selective fusion spectrum sensing (SFSS) scheme in [10], where only the successfully decoded outcomes in SU_{s} are selected for fusion.Notice that the above spectrum sensing protocol belongs to the parallel sensing strategy [28][29] where the secondary users simultaneously sense a primary user’s channel in a time slot and update the channel selections in the next slot. In the scenario with existing multiple primary users, a secondary user can simultaneously utilize the method of wideband spectrum sensing [30] to detect multiple users.For notational convenience, we denote H_{p}(k) to represent whether there is a spectrum hole unoccupied by the primary user for the time slot k. Let H_{p}(k) = H_{0} if there is a spectrum hole for the time slot k. Otherwise, we set H_{p}(k) = H_{1}. Meanwhile, H_{p}(k) can be modeled as a Bernoulli random variable with parameter P_{a}, i.e., Pr{H_{p}(k) = H_{0}} = P_{a} and Pr{H_{p}(k) = H_{1}} = 1 - P_{a}. For a clear representation of the detection of spectrum holes, we denote H_{s}(k) as the final fusion sensing result at SU_{s} for the time slot k. Then, the detection probability of spectrum holes is represented as P_{ds} = Pr{H_{s}(k) = H_{0}|H_{p}(k) = H_{0}}. Similarly, the false alarm probability of spectrum holes is given by P_{fs} = Pr{H_{s}(k) = H_{0}|H_{p}(k) = H_{1}}.
- 2.2 Secondary Data Transmission
After a spectrum hole is detected by spectrum sensing, the related information of the SU_{d} node (e.g. the code of SU_{d} receiver) is broadcast to the CRs by SU_{s} over the CCC. Then, SU_{s}, CRs and SU_{d} are switched to the channel of the detected hole to build a communication link. In Section 2.2.1 and 2.2.2, the received signals and the signal-to-interference-and-noise ratios (SINR) at terminals SU_{s}, SU_{d} and CR_{i} are given when the interference from the primary user is considered3, which means the false alarm of spectrum holes occurs. For the case that no false alarm of spectrum holes exists, the received signals and SNRs at these terminals are not given, since they can be easily obtained by deleting the primary user interference terms of those corresponding expressions with the interference from the primary user. Additionally, for protecting the primary user from the secondary signals’ interference, the false alarm probability P_{fs} of spectrum holes should be guaranteed to a target value. Hence, through the paper, we consider P_{fs} = 0.001 to protect the primary user’s quality-of-service (QoS)4.
- 2.2.1 Two-BSDT Scheme
The two-BSDT scheme needs two sub-phases to complete the bidirectional data exchange between SU_{s} and SU_{d} as shown in Fig. 2. In the first sub-phase, SU_{s} and SU_{d} simultaneously send their data to CRs. Thus, the received signal at CR_{i} is expressed as
PPT Slide
Lager Image
where x_{s}(k,3), x_{d}(k,3) and x_{p}(k,3) are the transmitting signals for the third sub-phase of the time slot k at terminals SU_{s}, SU_{d} and the primary user, respectively. n_{i}(k,3) is AWGN at CR_{i}. The primary user interference term
In the second sub-phase, i.e., the fourth sub-phase of the time slot k, all CRs decode their received signals. We define a decoding set D which includes a non-empty subcollection D_{m} of all CRs and an empty set Ø.• Case 1: D = D_{m}. Those CR_{i} which have successfully decoded both x_{s}(k,3) and x_{d}(k,3) form D_{m}. First, we define events
PPT Slide
Lager Image
and
PPT Slide
Lager Image
from Eq.(1) with considering the primary user interference term. Then, the event E(i) of successfully decoding at CR_{i} includes three events E_{1}(i), E_{2}(i) and E_{3}(i). Specifically, E_{1}(i) is that E_{s→i} and E_{d→i} are both satisfied, i.e., E_{1}(i) = E_{s→i} ⋂ E_{d→i} . The events E_{2}(i) and E_{3}(i) happen when only E_{s→i} or E_{d→i} is satisfied and the corresponding event
PPT Slide
Lager Image
or
PPT Slide
Lager Image
is satisfied. That means
PPT Slide
Lager Image
where CR_{i} will attempt successive interference cancellation (SIC) to decode the remaining data stream [31]. Thus, the event E(i) can be given by5
PPT Slide
Lager Image
Meanwhile, CR_{j} in the complementary set of D_{m} (i.e.,
PPT Slide
Lager Image
) fails to decode its received signals, which satisfies
PPT Slide
Lager Image
where the expressions of
PPT Slide
Lager Image
are obtained from those of E_{s→i},
PPT Slide
Lager Image
respectively, by changing their subscript i to j. Similarly, as the primary user interference does not exist, the event
PPT Slide
Lager Image
of CR_{i} successful decoding in the set D_{m} and the event
PPT Slide
Lager Image
of CR_{j} decoding failure in the set
PPT Slide
Lager Image
can be respectively given by
PPT Slide
Lager Image
PPT Slide
Lager Image
where
PPT Slide
Lager Image
In the set D_{m}, only the best relay is selected to broadcast its signal through network coding (bitwise XOR between SU_{s}’s and SU_{d}’s decoded data streams [32]). Then, the respective received signals at the two end-sources are expressed as
PPT Slide
Lager Image
PPT Slide
Lager Image
where x_{i}(k,4) and x_{p}(k,4) are the transmitting signals for the fourth sub-phase of the time slot k at CR_{i} and the primary user, respectively. n_{s}(k,4) and n_{d}(k,4) are AWGN at SU_{s} and SU_{d}, respectively. The primary user interference terms are
PPT Slide
Lager Image
Hence, the corresponding received SINR are given by
PPT Slide
Lager Image
PPT Slide
Lager Image
In general, the “best” relay is defined as achieving the maximum of the worse SINR of the two-way links from CR_{i} to SU_{s} and SU_{d}. The selection criterion can be expressed as6
PPT Slide
Lager Image
Then, the received SINR at the selected best link is given by
PPT Slide
Lager Image
• Case 2: D = Ø, i.e., D is empty. All CRs in the set Ψ fail to decode the received signals. That means the event
PPT Slide
Lager Image
with no interference from the primary user is satisfied as
PPT Slide
Lager Image
PPT Slide
Lager Image
Thus, an outage of data transmission occurs and then SU_{s} and SU_{d} will start a new transmitting process.
- 2.2.2 Three-BSDT Scheme
The three-BSDT scheme which includes three sub-phases is displayed in Fig. 3. The two end-sources SU_{s} and SU_{d} broadcast each data to CRs in the first and second sub-phases (i.e. the third and fourth sub-phases of the time slot k), respectively. The corresponding signals received at CR_{i} are expressed as
PPT Slide
Lager Image
PPT Slide
Lager Image
where x_{d}(k,4) is the transmitting signal at SU_{d} for the fourth sub-phase of the time slot k. n_{i}(k,4) is AWGN at CR_{i}.
In the third sub-phase, i.e. the fifth sub-phase of time slot k, all CRs decode their received signals. Being similar to two-BSDT scheme, we define a decoding set D.• Case 1: D = D_{m}. Those CR_{i} which have successfully decoded both x_{s}(k,3) and x_{d}(k,4) form D_{m}. Considering the primary user interference terms, we define events
PPT Slide
Lager Image
and
PPT Slide
Lager Image
from Eqs.(16) and (17). In the set D_{m}, the event F(i) of CR_{i} successful decoding is expressed as
PPT Slide
Lager Image
Due to the lack of a direct link between the two end-sources, the case that only one of the signals x_{s}(k,3) and x_{d}(k,4) is successfully decoded at CR_{i} can not achieve the successful bidirectional data exchange between the two end-sources and thus is not included in the set D_{m}. Then, the event
PPT Slide
Lager Image
of CR_{j} decoding failure in the set
PPT Slide
Lager Image
is given by
PPT Slide
Lager Image
where the expressions of F_{s→j} and F_{d→j} are obtained from those of Eqs. (18) and (19), respectively, whose subscript is are converted into js. Similarly, as the primary user interference does not exist, the event
PPT Slide
Lager Image
of CR_{i} successful decoding in the set D_{m} and the event
PPT Slide
Lager Image
of CR_{j} decoding failure in the set
PPT Slide
Lager Image
are respectively expressed as
PPT Slide
Lager Image
PPT Slide
Lager Image
where
PPT Slide
Lager Image
In the set D_{m}, only the best relay is selected to broadcast its signal through network coding. Thus, the respective received signals at the two end-sources are expressed as
PPT Slide
Lager Image
PPT Slide
Lager Image
where x_{i} (k,5) and x_{p}(k,5) are the transmitting signals for the fifth sub-phase of the time slot k at CR_{i} and the primary user, respectively. n_{s} (k,5) and n_{d} (k,5) are AWGN at SU_{s} and SU_{d}, respectively. The primary user interference terms are
PPT Slide
Lager Image
From Eqs.(24) and (25), we obtain the corresponding SINR at the two end-sources just as Eqs. (10) and (11). Besides, the selection criterion of the best relay is also the same as Eqs.(12) and (13) in the two-BSDT scheme.• Case 2: D = Ø, i.e., D is empty and all CRs in the set Ψ fail to decode the received signals. Then, the event
PPT Slide
Lager Image
(or
PPT Slide
Lager Image
as no interference from the primary user) is satisfied, i.e.,
PPT Slide
Lager Image
PPT Slide
Lager Image
Thus, the data transmission outage happens.
To simplify the analysis of spectrum sensing, we assume that SU_{d} does not assist in sensing the spectrum hole. In fact, if SU_{d} joins in detecting the primary user, it only means that the number of secondary users to sensing the spectrum hole adds one and becomes M + 2. Therefore, we can discuss the different value of M to know the performance diversity as SU_{d} participates in the spectrum sensing.
We assume that secondary users know the channel state information (CSI) of the primary user and the estimation of channels between diferent secondary users is perfect. Such assumption has also been widely adopted in existing literature such as [9][10][16][17]. Additionally, a method to stimate the channels of the primary user by referring to [34] is to utilize the pilot symbols transmitted from the primary transmitter to its receiver for the estimation of the channels between the two primary transceivers. Specifically, when the primary user transmits a pilot symbol at the beginning of its transmission frame, the secondary users observe pilot signals during the spectrum sensing and then each secondary user estimates the CSI of the primary user using the pilot signals. A method to estimate secondary users channel information is the pilot-assisted channel estimation using compressing sensing techniques for the OFDM-based cognitive radio networks [35]. To be specific, secondary transmitters send pilot symbols to other secondary receivers using some idle subcarriers detected by spectrum sensing. Then, the secondary receivers perform the sparse channel estimation using the pilot symbols. Note that for the sparse channel estimation using compressing sensing techniques, the pilot design is necessary at the secondary transmitters and the results of the pilot design need to be sent to the secondary receivers through a common control channel.
According to IEEE 802.22 requirement, the detection probability P_{d} of the presence of primary user should be guaranteed to a target value, i.e., P_{d} = Pr{H_{s}(k) = H_{1}|H_{p}(k) = H_{1}} ≥ 0.9. Therefore, the false alarm probability P_{fs} of spectrum holes equals 1 – P_{d} and needs to be below 0.1, i.e., P_{fs} ≤ 0.1.
Here, we refer to [31] for defining the event E(i) of successfully decoding at CR_{i}. Considering the practical scenario where SU_{s} and SU_{d} lack mutual cooperation and coordination, and each of them selects a fixed data rate to simultaneously transmit their signals to CR_{i}, we eliminate the event that both are satisfied as events E_{s→i} and E_{d→i} are both unsatisfied. If both are satisfied, SU_{s} and SU_{d} will transmit signals to CR_{i}, respectively, without the interference from each other.
Here, the best-relay selection criterion takes into account the condition of the interference links from the primary user to the two end-sources, different from [20] where it is in non-cognitive radio two-way relaying networks that there is no primary user. Additionally, for using the best-relay selection criterion, a centralized algorithm can be developed by referring to [9][33]. Specifically, a table including the related channel information (i.e., |h_{is}|^{2}, |h_{id}|^{2}, |h_{ps}|^{2}, |h_{pd}|^{2}) should be maintained at SU_{s}. Note that |h_{is}|^{2} and |h_{id}|^{2} may be estimated by CRs, while |h_{ps}|^{2} and |h_{pd}|^{2} could be estimated by SU_{s} and SU_{d}, respectively. Then, such channel information is transmitted to SU_{s} over CCC. Finally, using the proposed criterion (i.e., Eq. (12)), the best relay can be determined by looking up the table.
3. Outage Probability
- 3.1 Two-BSDT Scheme
Since the aim of the two-way relaying network is to exchange information between two end-sources, an outage event is declared when the channel capacity of either SU_{s} → SU_{d} or SU_{d} → SU_{s} falls below the data rate. Thus, the outage probability of two-BSDT scheme can be calculated as
PPT Slide
Lager Image
where R = R_{s} = R_{d} and Δ = [2^{2R/(1-α)} - 1]/γ_{s}. Assuming that γ_{p} = αγ_{s} where α is a constant. The transmitting power of all secondary users is assumed to be equal, which means γ_{s} = γ_{d} = γ_{i} = γ. According to Eq.(13) and the definition of D = D_{m} in Section 2.2.1, and considering the spectrum hole sensing results P_{ds} and P_{fs} , we write the term Pr{min (SINR_{best} (D = D_{m})) < γΔ, D = D_{m} } in Eq.(28) as
PPT Slide
Lager Image
From Eqs.(6) and (4), we obtain the probabilities
PPT Slide
Lager Image
PPT Slide
Lager Image
where
PPT Slide
Lager Image
According to Eqs.(7) and (30),
PPT Slide
Lager Image
in Eq.(29) equals
PPT Slide
Lager Image
Similarly,
PPT Slide
Lager Image
from Eqs.(5) and (31). The other terms in Eq.(29) are calculated as
PPT Slide
Lager Image
PPT Slide
Lager Image
In Eq.(33), X_{i} equals
PPT Slide
Lager Image
We have proved in Appendix A that the event X_{i} < Δ is independent with other events X_{j} < Δ (i, j ∈ D_{m} and i ≠ j) under the conditions of
PPT Slide
Lager Image
Thus, the closed-form asymptotic expression of Eq.(33) is given as
PPT Slide
Lager Image
Eq.(34) can be derived by Eq.(A.2) in Appendix A.In addition, from Eqs.(14) and (15), the term Pr{SINR(D = Ø) < γΔ, D = Ø} in Eq.(28) is found to be
PPT Slide
Lager Image
where
PPT Slide
Lager Image
whose closed-form expressions can be obtained from Eqs.(30) and (31).At this point, we have obtained the closed-form asymptotic expressions of the outage probability for two-BSDT scheme.
- 3.2 Three-BSDT Scheme
Being similar to Eq.(28), the outage probability of three-BSDT scheme can be expressed as
PPT Slide
Lager Image
where ∧ = [2^{3R/(1-α)} - 1]/γ_{s}. According to Eq.(13) and the definition of D = D_{m} in Section 2.2.2, and considering the spectrum hole sensing results P_{ds} and P_{fs}, we write the term Pr{min (SINR_{best} (D = D_{m} )) < γ∧, D = D_{m} } in Eq.(36) as
PPT Slide
Lager Image
From Eqs.(22) and (20), we obtain the probabilities
PPT Slide
Lager Image
PPT Slide
Lager Image
where the closed-form expression of Eq.(39) is derived from Eq.(A.1) in Appendix A. According to Eqs.(23) and (38),
PPT Slide
Lager Image
Similarly,
PPT Slide
Lager Image
is equal to
PPT Slide
Lager Image
from Eqs. (21) and (39). The other terms in Eq.(37) are expressed as
PPT Slide
Lager Image
PPT Slide
Lager Image
The closed-form expression of Eq. (40) is obtained by referring to Eq.(32). The closed-form asymptotic expression of Eq.(41) is similar to Eq.(34) and satisfies the conditions of
PPT Slide
Lager Image
In addition, from Eqs.(26) and (27), we write the term Pr{SINR(D = Ø) < γ∧, D = Ø} in Eq.(36) as
PPT Slide
Lager Image
where
PPT Slide
Lager Image
whose closed-form expressions can be obtained from Eqs.(38) and (39), respectively.Now, we have derived the closed-formed asymptotic expressions of the outage probabilities for two-BSDT and three-BSDT schemes. According to [10], the definition of the spectrum hole utilization η is based on the derived outage probability, i.e.,
PPT Slide
Lager Image
The spectrum hole utilization can be considered as a measure to quantify the percentage of spectrum holes utilized by SU_{s} and SU_{d} for their successful data exchange. In the next section, we give the numerical evaluation of η for the two BSDT schemes.
4. Simulation Results
In this section, we will evaluate the spectrum hole utilization for two-BSDT and three-BSDT schemes according to Eq.(43). For a primary user’s QoS requirement, the false alarm probability P_{fs} of spectrum holes needs to be below a required target value. Here, we set P_{fs} = 0.001. In the spectrum sensing protocol, Eq.(29) in [10] can be applied to calculate the detection probability P_{ds} of spectrum holes under the given target value of P_{fs}.Considering the effect of the spectrum sensing on secondary data transmissions, we discuss the performance of the spectrum sensing first. Fig. 4 shows that the detection probability P_{ds} of spectrum holes varies with the secondary SNR (γ_{s}), the channel gain
PPT Slide
Lager Image
and the number (M) of CRs. It is obvious that P_{ds} becomes larger with the rise of γ_{s}, the reason of which is that the higher γ_{s} results in the lower outage probability to transmit sensing results from CRs to SU_{s}. As the gain
PPT Slide
Lager Image
of channels from the primary user to CR_{i} increases from 0.1 to 1, the energy of the primary user is more easily detected by CR_{i}, which leads to the rise of P_{ds}. On the other hand, an increased number of CRs from M = 4 to 8 achieves higher P_{ds} due to the merit of the spectrum sensing protocol SFSS, i.e., although the rise of M and the limited CCC resources bring the transmission failure of initial sensing results received at SU_{s}, the SFSS protocol is able to identify and discard such transmission failure, and thus the performance of the spectrum sensing is not affected.
Overall outage probability versus the existing probability of spetrum holes with α = 0.5,
Fig. 5 shows the overall outage probability versus the existing probability (P_{a}) of spectrum holes for two-BSDT scheme, three-BSDT scheme and one-way relaying scheme7. As observ--ed from Fig. 5, the overall outage probability decreases with the incremental existing probability of spectrum holes. The reason is that with the increasing P_{a}, cognitive users can transmit information through choosing more available spectrum holes in order to keep communicating without interruption. Moreover, the overall outage probability is further low as the number of cognitive relays increases from M = 4 to 8. It can be also seen that the two-BSDT scheme performs worse than both the three-BSDT and one-way relaying schemes, since the performance of the two-BSDT scheme is interference-limited, which is indicated by Eqs.(2) and (3). In addition, the simulations match the theoretical results very well.Next, we give the spectrum hole utilization versus the secondary SNR (γ_{s}) for two-BSDT, three-BSDT and one-way relaying schemes as shown in Fig. 6. It is clear that the theoretical results fit well with the simulation and the three-BSDT scheme (in terms of spectrum hole utilization) outperforms both two-BSDT and one-way relaying schemes for both
PPT Slide
Lager Image
and 0.1. Additionally, the two-BSDT scheme appears a performance floor and thus performs worse than one-way relaying scheme in the high SNR region. This results indicates that for the best spectrum hole utilization, the two-BSDT scheme with network coding is not suitable for all SNR values. Therefore, compared with two-BSDT scheme, the three-BSDT scheme is the best choice across the whole SNR region. Considering the simple hardware implementation and low communication complexity, however, one-way relaying scheme is also attractive in high SNR, since its spectrum hole utilization is similar to that of the three-BSDT scheme in the high SNR region according to Fig. 6.
Spectrum hole utilization versus secondary SNR with P_{a} = 0.6, α = 0.5, R = 0.5 bit/s/Hz, M = 4,
For the comparison between
PPT Slide
Lager Image
and 0.1 in Fig. 6, we can see that the spectrum hole utilizations of the three schemes are better for
PPT Slide
Lager Image
than those for
PPT Slide
Lager Image
which means that the channels from the primary user to CR_{i} and those among cognitive users have higher attenuation. This phenomenon shows that the decrease of P_{ds} with
PPT Slide
Lager Image
from 1 to 0.1 as shown in Fig. 4 becomes the dominant factor adversely resulting in the poor overall outage performance of secondary data transmissions, although the decrease of
PPT Slide
Lager Image
from 1 to 0.1 degrades the interference from the primary user to CR_{i} and improves the partial outage performance. It also demonstrates that the spectrum sensing performance directly affects the spectrum hole utilization of secondary users.In addition, we also investigate the spectrum hole utilization versus the number (M) of CRs in Fig. 7 for symmetric channels where
PPT Slide
Lager Image
and asymmetric channels where
PPT Slide
Lager Image
It is straightforward that the three-BSDT scheme and the two-BSDT scheme increase with the rise of M for both symmetric and asymmetric channels. The reason is that the spectrum hole detection performance of SFSS protocol is unaffected by many error initial sensing results which occur with an increased number of CRs, and thus the spectrum hole utilization is not diminished. Furthermore, we can find that when the number of CRs is smaller than a critical value, the spectrum hole utilization of the three-BSDT scheme for symmetric channels is better than that for asymmetric channels. The reason is that the asymmetric channel from SU_{s} to CR_{i} has larger attenuation
PPT Slide
Lager Image
and thus the probability of successfully decoding at CR_{i} is lessened by this poor channel. However, the spectrum hole utilization of the two-BSDT scheme for asymmetric channels is better than that of symmetric channels before a critical value due to the interference-limited characteristic of the two-BSDT scheme. Specifically, for the poor channel in asymmetric channels, CR_{i} can use SIC to decode the data stream and thus the probability of successfully decoding at CR_{i} is higher for asymmetric channels. Fig. 7 also demonstrates that, no matter which scheme (two-BSDT or three-BSDT) is used, the performance gap between symmetric channels and asymmetric channels decreases and even disappears with the increasing of M. The reason is that the increased number of CRs reduces the possibility for all relays to fail to decode the data streams, which makes the successfully decoding probability at CRs grown and further improves the overall outage performance and spectrum hole utilization performance. The same reason leads to the lessening of the perform disparity between the three-BSDT scheme and the two-BSDT scheme as M increases regardless of the specific channels used.
Spectrum hole utilization versus spectrum sensing overhead with P_{a} =0.6,
Lastly, we illustrate the spectrum hole utilization versus the spectrum sensing overhead α for R = 0.5 bit/s/Hz and R = 1 bit/s/Hz. In Fig. 8, the spectrum hole utilization corresponding toR = 0.5 bit/s/Hz is larger than that to R = 1 bit/s/Hz regardless of the specific scheme used. This shows that due to the decrease in R, the probabilities of decoding failure at cognitive users drop and so do the communication outages occurring between the two end-sources. Also the lower R requires less time duration allocated for secondary data transmissions, which induces the longer spectrum sensing time duration left for R = 0.5 bit/s/Hz as shown in Fig. 8. It is clear that an optimal sensing overhead corresponding to the maximum of spectrum hole utilization exists for the two schemes. Moreover, no matter which data rate (R = 0.5 bit/s/Hz or R = 1 bit/s/Hz) is used, the three-BSDT scheme has larger optimal sensing overhead than the two-BSDT scheme and achieves higher spectrum hole utilization. The reason is that the larger sensing overhead obtains the higher detection probability of spectrum holes, which brings on the lower outage probability of the three-BSDT scheme, whereas outage probability of the two -BSDT scheme can not always reduce with the increase of detection probability of spectrum holes due to the interference-limited feature of it. Since the three-BSDT scheme has higher spectrum hole utilization than the two-BSDT scheme regardless of the specific data rate used, it is better for high data rate applications to choose the three-BSDT scheme.
One-way relaying scheme is obtained by referring to [10] where the cognitive relay CR_{i} acts as one-way relaying to assist the information transmission from SU_{s} to SU_{d} through two sub-phases. Being different from [10], one-way relaying scheme achieves the information exchange between SU_{s} and SU_{d} assisted by one-way relaying CR_{i} through four sub-phases. In addition, the direct link between SU_{s} and SU_{d} is not considered due to the poor quality of the channel.
5. Conclusion
In this paper, we studied the spectrum hole utilization of secondary bidirectional data transmissions between two secondary end-sources in CRNs with imperfect spectrum sensing. We derived closed-form asymptotic expressions of outage probabilities for two-BSDT and three-BSDT schemes over Rayleigh fading channels. Due to the interference-limited characteristic of two-BSDT scheme, three-BSDT scheme has better spectrum hole utilization than two-BSDT scheme in symmetric channels, whereas the spectrum hole utilization of two-BSDT scheme is greatly improved in asymmetric channels and thus two-BSDT scheme is more appropriate for applications with asymmetric channels. Furthermore, the performance gap between symmetric channels and asymmetric channels diminishes as the number of CRs rises. On the other hand, when the influence of channel gain from the primary user to secondary users on spectrum hole utilization is considered, the spectrum hole utilization becomes poor as the decrease of the channel gain induces the decline of detection probability of spectrum holes. Finally, the optimal spectrum sensing overhead is investigated in order to maximize the spectrum hole utilization, which indicates the necessity of joint optimization of spectrum sensing and secondary data transmissions.
BIO
Yuan Gao received the B.E. degree in Communication Engineering and M.E. degree in Communication and Information System from Hohai University, Nanjing, China in 1998 and 2005, respectively. She is currently working toward the Ph.D. degree at the College of Computer and Information Engineering of Hohai University. Her research is in the areas of wireless communication and networking with emphasis on cooperative relay techniques in cognitive radio networks.
Changping Zhu received his M.E. degree in electrical and information engineering from Huazhong University of Science and Technology, Wuhan, China in 2002 and the Ph.D. degree in Communication and Information System from China University of Mining and Technology, Xuzhou, China in 2010. He is currently a professor at Hohai University, China. His research interests span the broad area of wireless communication and networking, communication circuit and power ultrasonic technology.
Yibin Tang received the B.E. and M.E. degrees in Communication and Information Engineering from Nanjing University of Posts and Telecommunications, Nanjing, China in 2004 and 2007, respectively, and the Ph.D. degree from Southeast University, Nanjing, China in 2010. His research interests are in the areas of intelligent signal processing, and wireless communication and networking.
Akyildiz I. F.
,
Lee W. Y.
,
Vuran M. C.
,
Mohanty S.
2006
“Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey”
Computer Networks
Article (CrossRef Link)
50
(2)
2127 -
2159
DOI : 10.1016/j.comnet.2006.05.001
Goldsmith A.
,
Jafar S. A.
,
Marić I.
,
Srinivasa S
2009
“Breaking spectrum gridlock with cognitive radios: an Information theoretic perspective“
in Proc. of the IEEE
vol. 97, no. 5, Article (CrossRef Link)
894 -
914
Zou Y. L.
,
Yao Y. D.
,
Zheng B. Y.
2012
“Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions”
IEEE Commun. Mag.
Article (CrossRef Link)
50
(4)
98 -
103
DOI : 10.1109/MCOM.2012.6178840
Ganesan G.
,
Li Y.
2007
“Cooperative spectrum sensing in cognitive radio, part I: two user networks”
IEEE Trans. on Wireless Commun
Article (CrossRef Link)
6
(6)
2204 -
2213
DOI : 10.1109/TWC.2007.05775
Zhu J.
,
Zheng B. Y.
,
Zou Y. L.
2009
“Detection time analysis for the multiple-user cooperative spectrum sensing in cognitive radio networks”
SCIENCE CHINA Information Sciences
Article (CrossRef Link)
52
(10)
1915 -
1925
DOI : 10.1007/s11432-009-0166-x
Zhang X.
,
Wu Q. H.
,
Li X. Q.
,
Yun Z.
2013
“Optimal cooperation and transmission in cooperative spectrum sensing for cognitive radio”
KSII Transactions on Internet and Information Systems
Article (CrossRef Link)
7
(2)
184 -
201
Shen B.
,
Kwak K.
,
Bai Z.
2009
“Optimal linear soft fusion schemes for cooperative sensing in cognitive radio networks”
IEEE Global Telecommunications Conference
Nov. 30-Dec. 4
Article (CrossRef Link)
1 -
6
Dai Z. Y.
,
Liu J.
,
Wang C.
,
Long K.
2012
“An adaptive cooperation communication strategy for enhanced opportunistic spectrum access in cognitive radios”
IEEE Commun. Lett
Article (CrossRef Link)
16
(1)
40 -
43
DOI : 10.1109/LCOMM.2011.111011.111418
Zou Y. L.
,
Yao Y. D.
,
Zheng B. Y.
2011
“Cognitive transmissions with multiple relays in cognitive radio networks”
IEEE Trans. on Wireless Commun
Article (CrossRef Link)
10
(2)
648 -
659
DOI : 10.1109/TWC.2010.120610.100830
Rankov B.
,
Wittneben A.
2007
“Spectral efficient protocols for half-duplex fading relay channels”
IEEE Journal on Selected Areas in Communications
Article (CrossRef Link)
25
(2)
379 -
389
DOI : 10.1109/JSAC.2007.070213
Li Q.
,
Ting S. H.
,
Pandharipande A.
,
Han Y.
2011
“Cognitive Spectrum Sharing With Two-Way Relaying Systems”
IEEE Trans. on Vehicular Technology
Article (CrossRef Link)
60
(3)
1233 -
1240
DOI : 10.1109/TVT.2010.2104334
Hafeez M.
,
Elmirghani J. M. H.
2012
“Analysis of Dynamic Spectrum Leasing for Coded Bi-Directional Communication”
IEEE J. Sel. Areas Commun
Article (CrossRef Link)
30
(8)
1500 -
1512
DOI : 10.1109/JSAC.2012.120918
Pickholtz R.
2008
“Spectrum leasing to cooperating secondary ad hoc networks”
IEEE J. Sel. Areas Commun
Article (CrossRef Link)
26
(1)
203 -
213
DOI : 10.1109/JSAC.2008.080118
Tao M.
,
Liu Y.
2013
“Spectrum leasing and cooperative resource allocation in cognitive OFDMA networks”
Journal of Communications and Networks
Article (CrossRef Link)
15
(1)
102 -
110
DOI : 10.1109/JCN.2013.000015
Alizadeh A.
,
Sadough S. M. S.
2012
“Spectrum sensing improvement by SNR maximization in cognitive two-way relay networks”
In Pro. Electrical Engineering (ICEE)
May 15-17
Article (CrossRef Link)
1511 -
1516
Liu P.
,
Kim I. M.
2010
“Performance analysis of bidirectional communication protocols based on decode-and-forward relaying”
IEEE Trans. on Commun
Article (CrossRef Link)
58
(9)
2683 -
2696
DOI : 10.1109/TCOMM.2010.080310.090292
Lin X.
,
Tao M.
,
Xu Y.
2013
“Outage Probability and Finite-SNR Diversity-Multiplexing Tradeoff for Two-Way Relay Fading Channels”
IEEE Trans. on Vehicular Technology
in press. Article (CrossRef Link)
Li Y. H.
,
Louie R. H. Y.
,
Vucetic B.
2010
“Relay Selection With Network Coding in Two-Way Relay Channels”
IEEE Transactions on Vehicular Technology
Article (CrossRef Link)
59
(9)
4489 -
4499
DOI : 10.1109/TVT.2010.2070817
Zhong B.
,
Zhang Z. S.
,
Zhang X.
,
Li Y.
,
Long K. P.
2013
“Impact of partial relay selection on the capacity of communications systems with outdated CSI and adaptive transmission techniques”
EURASIP J. Wireless Comm. Netw
Article (CrossRef Link)
24
Ding G. R.
,
Wu Q. H.
,
Zou Y. L.
,
Wang J.
,
Gao Z.
2014
“Joint spectrum sensing and transmit power adaptation in interference-aware cognitive radio networks”
Transactions on Emerging Telecommunications Technologies
Article (CrossRef Link)
25
(2)
231 -
238
DOI : 10.1002/ett.2586
Dai Z. Y.
,
Liu J.
,
Long K.
“Cooperative transmissions for secondary spectrum access in cognitive radios”
International Journal of Communication Systems
Available online: , Jan. 2013. Article (CrossRef Link)
Liang Y. C.
,
Zeng Y. H.
,
Peh E.
,
Hoang A.T.
2008
“Sensing-throughput tradeoff for cognitive radio networks”
IEEE Trans. on Wireless Commun
Article (CrossRef Link)
7
(4)
1326 -
1337
DOI : 10.1109/TWC.2008.060869
Anh H.
,
Liang Y. C.
,
Zeng Y. H.
2010
“Adaptive joint scheduling of spectrum sensing and data transmission in cognitive radio networks”
IEEE Trans. on Commun
Article (CrossRef Link)
58
(1)
235 -
246
DOI : 10.1109/TCOMM.2010.01.070270
Ma J.
,
Zhao G.
,
Li Y.
2008
“Soft combination and detection for cooperative spectrum sensing in cognitive radio networks“
IEEE Trans. Wireless Commun
Article (CrossRef Link)
7
(11)
4502 -
507
DOI : 10.1109/T-WC.2008.070941
Zhao Q.
,
Tong L.
,
Swami A.
2007
“Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework”
IEEE J. Sel. Areas Commun
Article (CrossRef Link)
25
(3)
589 -
600
DOI : 10.1109/JSAC.2007.070409
Xu Y.
,
Anpalagan A.
,
Wu Q.
2013
“Decision-Theoretic Distributed Channel Selection for Opportunistic Spectrum Access: Strategies, Challenges and Solutions”
IEEE Communications Surveys and Tutorials
in press. Article (CrossRef Link)
DOI : 10.1109/SURV.2013.030713.00189
Tian Z.
,
Giannakis G. B.
2006
“A wavelet approach to wideband spectrum sensing for cognitive radios”
in Proc. of IEEE CROWNCOM
June 8-10
Article (CrossRef Link)
1 -
5
Li Q.
,
Ting S. H.
,
Pandharipande A.
2009
“Adaptive two-way relaying and outage analysis”
IEEE Trans. on Wireless Commun.
Article (CrossRef Link)
8
(6)
3288 -
3299
DOI : 10.1109/TWC.2009.081213
Ahlswede R.
,
Cai N.
,
Li S-Y R.
2000
“Network information flow”
IEEE Trans. on Information Theory
Article (CrossRef Link)
46
(4)
1204 -
1216
DOI : 10.1109/18.850663
Zou Y.
,
Zhu J.
,
Zheng B.
,
Yao Y. D.
2010
“An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks”
IEEE Trans. Signal Process
Article (CrossRef Link)
58
(10)
5438 -
5445
DOI : 10.1109/TSP.2010.2053708
Qi C.
,
Yue G.
,
Wu L.
,
Arumugam N.
2014
“Pilot design for sparse channel estimation in OFDM-based cognitive radio systems”
IEEE Transactions on Vehicular Technology
in press. Article (CrossRef Link)
DOI : 10.1109/TVT.2013.2280655
Citing 'Spectrum Hole Utilization in Cognitive Two-way Relaying Networks
'
@article{ E1KOBZ_2014_v8n3_890}
,title={Spectrum Hole Utilization in Cognitive Two-way Relaying Networks}
,volume={3}
, url={http://dx.doi.org/10.3837/tiis.2014.03.010}, DOI={10.3837/tiis.2014.03.010}
, number= {3}
, journal={KSII Transactions on Internet and Information Systems (TIIS)}
, publisher={Korean Society for Internet Information}
, author={Gao, Yuan
and
Zhu, Changping
and
Tang, Yibin}
, year={2014}
, month={Mar}
TY - JOUR
T2 - KSII Transactions on Internet and Information Systems (TIIS)
AU - Gao, Yuan
AU - Zhu, Changping
AU - Tang, Yibin
SN - 1976-7277
TI - Spectrum Hole Utilization in Cognitive Two-way Relaying Networks
VL - 8
PB - Korean Society for Internet Information
DO - 10.3837/tiis.2014.03.010
PY - 2014
UR - http://dx.doi.org/10.3837/tiis.2014.03.010
ER -
Gao, Y.
,
Zhu, C.
,
&
Tang, Y.
( 2014).
Spectrum Hole Utilization in Cognitive Two-way Relaying Networks.
KSII Transactions on Internet and Information Systems (TIIS),
8
(3)
Korean Society for Internet Information.
doi:10.3837/tiis.2014.03.010
Gao, Y
,
Zhu, C
,
&
Tang, Y
2014,
Spectrum Hole Utilization in Cognitive Two-way Relaying Networks,
KSII Transactions on Internet and Information Systems (TIIS),
vol. 3,
no. 3,
Retrieved from http://dx.doi.org/10.3837/tiis.2014.03.010
[1]
Y Gao
,
C Zhu
,
and
Y Tang
,
“Spectrum Hole Utilization in Cognitive Two-way Relaying Networks”,
KSII Transactions on Internet and Information Systems (TIIS),
vol. 3,
no. 3,
Mar
2014.
Gao, Yuan
and
,
Zhu, Changping
and
,
Tang, Yibin
and
,
“Spectrum Hole Utilization in Cognitive Two-way Relaying Networks”
KSII Transactions on Internet and Information Systems (TIIS),
3.
3
2014:
Gao, Y
,
Zhu, C
,
Tang, Y
Spectrum Hole Utilization in Cognitive Two-way Relaying Networks.
KSII Transactions on Internet and Information Systems (TIIS)
[Internet].
2014.
Mar ;
3
(3)
Available from http://dx.doi.org/10.3837/tiis.2014.03.010
Gao, Yuan
,
Zhu, Changping
,
and
Tang, Yibin
,
“Spectrum Hole Utilization in Cognitive Two-way Relaying Networks.”
KSII Transactions on Internet and Information Systems (TIIS)
3
no.3
()
Mar,
2014):
http://dx.doi.org/10.3837/tiis.2014.03.010