DOI QR코드

DOI QR Code

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan (Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Hohai University) ;
  • Zhu, Changping (Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Hohai University) ;
  • Tang, Yibin (Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Hohai University)
  • Received : 2013.11.04
  • Accepted : 2014.03.05
  • Published : 2014.03.31

Abstract

This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

Keywords

1. Introduction

Cognitive radio is emerging as a promising solution to the problem of low efficient spectrum utilization that has appeared as a result of stringent spectrum allocations [1-3]. For the full use of a spectrum hole unoccupied by its primary network at a particular time and specific geographic location, cognitive radio can find the spectrum hole by spectrum sensing and allows unlicensed users, i.e., secondary users or cognitive users, to communicate over the detected spectrum hole. It is clear that the efficient utilization of limited spectrum holes can improve the quality of communication among secondary users, such as spectrum hole detection, transmission outage, and channel capacity.

One-way cooperative relaying, which assists one source to transmit information to one destination, has been considered as an effective means to improve the performance of spectrum sensing and secondary user transmissions in cognitive radio networks (CRNs) [4]. The detection time and detection probabilities for the presence of primary users are improved as one-way cooperative relays are applied in spectrum sensing [5-8]. The chances of secodary users to access the primary users’ spectrum can also increase with the utilization of one-way cooperative relaying [9]. When multiple secondary users serve as one-way cooperative relays to help data transmissions from one secondary user to the other, paper [10] has studied the spectrum hole utilization efficiency which is the percentage of spectrum holes utilized by the secondary user source for its successful data transmissions without channel outage. However, one-way relaying techniques have low spectral efficiency due to the half-duplex operation mode [11]. Specifically, when two terminals T1 and T2 intend to exchange information, one-way relaying protocols need four sequential steps, i.e., T1 transmits information to the relay and T2 in the first step; in the second step, the relay forwards its information to T2; in the third step, T2 in turn transmits information to the relay and T1; and in the fourth step, the relay forwards its information to T1, whereas two-way relaying protocols generally need two steps or three steps. For the three-step two-way relaying protocols, T1 and T2 transmit their own information in the first and second steps, respectively. In the third step, the relay broadcasts its information to the two terminals. For the two-step two-way relaying protocols, T1 and T2 simultaneously transmit information to the relay in the first step. Then, the relay broadcasts its information in the second step. It was shown that the two-way relaying protocols, which exploit the shared broadcast channel nature of the wireless medium, have higher spectral efficiency than one-way relaying protocols [11][12]1.

Since two-way relaying protocols can achieve high spectral efficiency, they also have great potential to further improve the CRNs performance. Most of the current studies consider the scenario where secondary users share the spectrum of the primary user as long as they do not interfere with primary user operations and thus spectrum sensing is not required. In [13-15], two-way relays acted by secondary users are applied to assist two primary users’ bi-directional traffic. In exchange for secondary users relaying services, secondary users either broadcast secondary information in the last step of the two-way relaying protocols [13], or achieve their own communication in the primary user's sub-channels for a fraction of time [14][15]. It was demonstrated that the performance of both the primary and secondary systems can be enhanced by cooperation between the primary and secondary users [16].

In the other scenario which is also considered in this paper, secondary users achieve their own communication only in the spectrum holes and thus spectrum sensing is required. For this scenario, the two-step two-way relaying protocol is discussed for the spectrum sensing improvement in [17], where secondary users serve as two-way relays to assist the bi-directional traffic between two primary users and in the second step of the protocol, the secondary users broadcast their information to the cognitive base station (i.e., fusion center) which determines whether the primary users are present or not. However, when the bidirectional traffic between two secondary users is performed through the help of the two-way relays, the performance of secondary data transmissions has not been fully studied. This has motivated our work.

In non-cognitive radio networks, the performance of two-way relaying assisted information exchange between two end-sources has been extensively analyzed. Paper [18] compares the outage probability of two-step and three-step two-way protocols based on decode-and-forward (DF) relaying, where the three-step protocol is better than the two-step protocol at the high signal-to-noise ratio (SNR) region. The amplify-and-forward (AF) and DF relaying of two-step two-way relaying protocols are investigated in [19], where outage probability performance of DF outperforms that of AF as all nodes have a single antenna and the target rates of two end-sources are equal. For the networks including multiple two-way relays, the optimal relaying selection among a group of relays usually achieves full diversity and high spectral efficiency through saving the used channels. Paper [20] discusses a relay selection scheme for two-step AF relaying networks, which is to maximize the worse received signal-to-noise ratio (SNR) of the two end-sources. Then, paper [21] investigates the relay selection for three-step DF relaying channels, which is to minimize the average sum bit-error-rate (BER) of the two end-sources. Considering the imperfect channel state information (CSI) with a high feedback rate and a sufficiently high maximum Doppler Shift, paper [22] discusses the partial relay selection for AF relays.

Compared with the above performance analysis of two-way relaying protocols in non-cognitive radio networks, CRNs face two challenges. The first is that the mutual interference between the primary and the secondary users has to be considered [23][24] due to the coexisting of the primary and secondary users in the same spectrum and due to the existing of the false alarm of spectrum holes, which means imperfect spectrum sensing. The second is that spectrum sensing and secondary data transmissions must be jointly designed, since they are closely connected [25][26].

In this paper, we focus on two-way relaying assisted secondary data transmissions with multiple relays and jointly consider spectrum sensing and bidirectional data transmissions. The main contributions of this paper are summarized as follows. First, we extend the idea of the one-way relaying assisted SFSS-BRDT (selective fusion spectrum sensing and best relay data transmission) scheme [10] to the two-way relaying scenario, i.e., the SFSS is used for achieving spectrum sensing results and then the best relay is selected from a group of two-way cognitive relays to help the bidirectional traffic between two secondary users. Second, two-step and three-step bidirectional secondary data transmission (BSDT) schemes (i.e., two-BSDT and three-BSDT schemes) are proposed, where the typical two-step and three-step two-way relaying protocols based on DF relaying are applied in bidirectional secondary data transmissions. Finally, the closed-form asymptotic expressions of outage probabilities are derived for the two proposed schemes, where the interference from the primary user to secondary users is considered due to the existence of the false alarm of spectrum holes. Meanwhile, under a primary user protection constraint, we calculate and evaluate the spectrum hole utilization which is the percentage of spectrum holes utilized by two secondary users for their successful information exchange without channel outage.

The remainder of the paper is organized as follows. In Section 2, we describe the system model and propose two-BSDT and three-BSDT schemes. Section 3 derives outage probabilities of the proposed schemes. Next, in Section 4, we conduct the computer simulations and numerical evaluations. Finally, Section 5 gives some concluding remarks.

 

2. System Model

In a primary network, a primary user works on a slotted structure. In each time slot, either the spectrum is occupied by the primary user, or it is idle. On the other hand, a cognitive relay network coexists with the primary network, where a set of M secondary users as cognitive relays (CRs) denoted by Ψ = {CRi| i = 1,2, …,M} assists a secondary user SUs for both sensing the spectrum hole unoccupied by the primary user in a fraction of time and exchanging information with another secondary user SUd. The direct link between SUs and SUd does not exist due to the poor quality of the channel. A time slotted structure of cognitive transmissions is illustrated in Fig. 1 which includes the spectrum sensing slot α and the secondary data transmission slot 1-α. The parameter α is also referred to as spectrum sensing overhead.

Fig. 1.Time slotted structure of cognitive transmissions

To be practically feasible, all nodes operate in half-duplex mode. Each wireless link between two terminals is modeled as a Rayleigh fading channel where the fading process is considered as constant during one time slot. The independent channel coefficients from two different terminals a to b (or a→b) is denoted as hab. Notice that random variables (RVs) |hab|2 follow exponential distributions with mean In addition, we denote the terminals SUs, SUd, CRi and the primary user as the subscripts s, d, i, and p. The transmitting power at each terminal is Pl, where l∈{s, d, i, p}. The additive white Gaussian noise (AWGN) at all receivers is modeled as a complex Gaussian random variable with zero mean and variance N0. Thus, the SNR at each terminal can be given by γl = Pl/N0. Rs and Rd are the data rate at SUs and SUd, respectively.

2.1 Spectrum Sensing

We refer to [10] for designing the spectrum sensing protocol. In the first sub-phase of spectrum sensing as shown in Fig. 1, i.e., the first sub-phase of the time slot k, SUs and CRs independently detect a spectrum hole and each secondary user applies an energy detection method2.

In the second sub-phase, i.e., the second sub-phase of the time slot k, the detection results of all CRs are forwarded to SUs for fusion with an “AND” rule. In order to avoid interfering with the primary user in this sub-phase, a common control channel (CCC) is applied to forward the CRs’ detection results [27]. Here, we consider only the selective fusion spectrum sensing (SFSS) scheme in [10], where only the successfully decoded outcomes in SUs are selected for fusion.

Notice that the above spectrum sensing protocol belongs to the parallel sensing strategy [28][29] where the secondary users simultaneously sense a primary user’s channel in a time slot and update the channel selections in the next slot. In the scenario with existing multiple primary users, a secondary user can simultaneously utilize the method of wideband spectrum sensing [30] to detect multiple users.

For notational convenience, we denote Hp(k) to represent whether there is a spectrum hole unoccupied by the primary user for the time slot k. Let Hp(k) = H0 if there is a spectrum hole for the time slot k. Otherwise, we set Hp(k) = H1. Meanwhile, Hp(k) can be modeled as a Bernoulli random variable with parameter Pa, i.e., Pr{Hp(k) = H0} = Pa and Pr{Hp(k) = H1} = 1 - Pa. For a clear representation of the detection of spectrum holes, we denote Hs(k) as the final fusion sensing result at SUs for the time slot k. Then, the detection probability of spectrum holes is represented as Pds = Pr{Hs(k) = H0|Hp(k) = H0}. Similarly, the false alarm probability of spectrum holes is given by Pfs = Pr{Hs(k) = H0|Hp(k) = H1}.

2.2 Secondary Data Transmission

After a spectrum hole is detected by spectrum sensing, the related information of the SUd node (e.g. the code of SUd receiver) is broadcast to the CRs by SUs over the CCC. Then, SUs, CRs and SUd are switched to the channel of the detected hole to build a communication link. In Section 2.2.1 and 2.2.2, the received signals and the signal-to-interference-and-noise ratios (SINR) at terminals SUs, SUd and CRi are given when the interference from the primary user is considered3, which means the false alarm of spectrum holes occurs. For the case that no false alarm of spectrum holes exists, the received signals and SNRs at these terminals are not given, since they can be easily obtained by deleting the primary user interference terms of those corresponding expressions with the interference from the primary user. Additionally, for protecting the primary user from the secondary signals’ interference, the false alarm probability Pfs of spectrum holes should be guaranteed to a target value. Hence, through the paper, we consider Pfs = 0.001 to protect the primary user’s quality-of-service (QoS)4.

2.2.1 Two-BSDT Scheme

The two-BSDT scheme needs two sub-phases to complete the bidirectional data exchange between SUs and SUd as shown in Fig. 2. In the first sub-phase, SUs and SUd simultaneously send their data to CRs. Thus, the received signal at CRi is expressed as

where xs(k,3), xd(k,3) and xp(k,3) are the transmitting signals for the third sub-phase of the time slot k at terminals SUs, SUd and the primary user, respectively. ni(k,3) is AWGN at CRi. The primary user interference term expresses the interference from the primary user.

Fig. 2.Time slotted structure of two-BSDT schem

In the second sub-phase, i.e., the fourth sub-phase of the time slot k, all CRs decode their received signals. We define a decoding set D which includes a non-empty subcollection Dm of all CRs and an empty set Ø.

• Case 1: D = Dm. Those CRi which have successfully decoded both xs(k,3) and xd(k,3) form Dm. First, we define events

and

from Eq.(1) with considering the primary user interference term. Then, the event E(i) of successfully decoding at CRi includes three events E1(i), E2(i) and E3(i). Specifically, E1(i) is that Es→i and Ed→i are both satisfied, i.e., E1(i) = Es→i ⋂ Ed→i . The events E2(i) and E3(i) happen when only Es→i or Ed→i is satisfied and the corresponding event

or

is satisfied. That means where CRi will attempt successive interference cancellation (SIC) to decode the remaining data stream [31]. Thus, the event E(i) can be given by5

Meanwhile, CRj in the complementary set of Dm (i.e., ) fails to decode its received signals, which satisfies

where the expressions of are obtained from those of Es→i, respectively, by changing their subscript i to j. Similarly, as the primary user interference does not exist, the event of CRi successful decoding in the set Dm and the event of CRj decoding failure in the set can be respectively given by

where

In the set Dm, only the best relay is selected to broadcast its signal through network coding (bitwise XOR between SUs’s and SUd’s decoded data streams [32]). Then, the respective received signals at the two end-sources are expressed as

where xi(k,4) and xp(k,4) are the transmitting signals for the fourth sub-phase of the time slot k at CRi and the primary user, respectively. ns(k,4) and nd(k,4) are AWGN at SUs and SUd, respectively. The primary user interference terms are Hence, the corresponding received SINR are given by

In general, the “best” relay is defined as achieving the maximum of the worse SINR of the two-way links from CRi to SUs and SUd. The selection criterion can be expressed as6

Then, the received SINR at the selected best link is given by

• Case 2: D = Ø, i.e., D is empty. All CRs in the set Ψ fail to decode the received signals. That means the event with no interference from the primary user is satisfied as

Thus, an outage of data transmission occurs and then SUs and SUd will start a new transmitting process.

2.2.2 Three-BSDT Scheme

The three-BSDT scheme which includes three sub-phases is displayed in Fig. 3. The two end-sources SUs and SUd broadcast each data to CRs in the first and second sub-phases (i.e. the third and fourth sub-phases of the time slot k), respectively. The corresponding signals received at CRi are expressed as

where xd(k,4) is the transmitting signal at SUd for the fourth sub-phase of the time slot k. ni(k,4) is AWGN at CRi. are the primary user interference terms.

Fig. 3.Time slotted structure of three-BSDT scheme

In the third sub-phase, i.e. the fifth sub-phase of time slot k, all CRs decode their received signals. Being similar to two-BSDT scheme, we define a decoding set D.

• Case 1: D = Dm. Those CRi which have successfully decoded both xs(k,3) and xd(k,4) form Dm. Considering the primary user interference terms, we define events

and

from Eqs.(16) and (17). In the set Dm, the event F(i) of CRi successful decoding is expressed as

Due to the lack of a direct link between the two end-sources, the case that only one of the signals xs(k,3) and xd(k,4) is successfully decoded at CRi can not achieve the successful bidirectional data exchange between the two end-sources and thus is not included in the set Dm. Then, the event of CRj decoding failure in the set is given by

where the expressions of Fs→j and Fd→j are obtained from those of Eqs. (18) and (19), respectively, whose subscript is are converted into js. Similarly, as the primary user interference does not exist, the event of CRi successful decoding in the set Dm and the event of CRj decoding failure in the set are respectively expressed as

where

In the set Dm, only the best relay is selected to broadcast its signal through network coding. Thus, the respective received signals at the two end-sources are expressed as

where xi (k,5) and xp(k,5) are the transmitting signals for the fifth sub-phase of the time slot k at CRi and the primary user, respectively. ns (k,5) and nd (k,5) are AWGN at SUs and SUd, respectively. The primary user interference terms are From Eqs.(24) and (25), we obtain the corresponding SINR at the two end-sources just as Eqs. (10) and (11). Besides, the selection criterion of the best relay is also the same as Eqs.(12) and (13) in the two-BSDT scheme.

• Case 2: D = Ø, i.e., D is empty and all CRs in the set Ψ fail to decode the received signals. Then, the event (or as no interference from the primary user) is satisfied, i.e.,

Thus, the data transmission outage happens.

 

3. Outage Probability

3.1 Two-BSDT Scheme

Since the aim of the two-way relaying network is to exchange information between two end-sources, an outage event is declared when the channel capacity of either SUs → SUd or SUd → SUs falls below the data rate. Thus, the outage probability of two-BSDT scheme can be calculated as

where R = Rs = Rd and Δ = [22R/(1-α) - 1]/γs. Assuming that γp = αγs where α is a constant. The transmitting power of all secondary users is assumed to be equal, which means γs = γd = γi = γ. According to Eq.(13) and the definition of D = Dm in Section 2.2.1, and considering the spectrum hole sensing results Pds and Pfs , we write the term Pr{min (SINRbest (D = Dm)) < γΔ, D = Dm } in Eq.(28) as

From Eqs.(6) and (4), we obtain the probabilities

where According to Eqs.(7) and (30), in Eq.(29) equals Similarly, from Eqs.(5) and (31). The other terms in Eq.(29) are calculated as

In Eq.(33), Xi equals We have proved in Appendix A that the event Xi < Δ is independent with other events Xj < Δ (i, j ∈ Dm and i ≠ j) under the conditions of Thus, the closed-form asymptotic expression of Eq.(33) is given as

Eq.(34) can be derived by Eq.(A.2) in Appendix A.

In addition, from Eqs.(14) and (15), the term Pr{SINR(D = Ø) < γΔ, D = Ø} in Eq.(28) is found to be

where whose closed-form expressions can be obtained from Eqs.(30) and (31).

At this point, we have obtained the closed-form asymptotic expressions of the outage probability for two-BSDT scheme.

3.2 Three-BSDT Scheme

Being similar to Eq.(28), the outage probability of three-BSDT scheme can be expressed as

where ∧ = [23R/(1-α) - 1]/γs. According to Eq.(13) and the definition of D = Dm in Section 2.2.2, and considering the spectrum hole sensing results Pds and Pfs, we write the term Pr{min (SINRbest (D = Dm )) < γ∧, D = Dm } in Eq.(36) as

From Eqs.(22) and (20), we obtain the probabilities

where the closed-form expression of Eq.(39) is derived from Eq.(A.1) in Appendix A. According to Eqs.(23) and (38), Similarly, is equal to from Eqs. (21) and (39). The other terms in Eq.(37) are expressed as

The closed-form expression of Eq. (40) is obtained by referring to Eq.(32). The closed-form asymptotic expression of Eq.(41) is similar to Eq.(34) and satisfies the conditions of

In addition, from Eqs.(26) and (27), we write the term Pr{SINR(D = Ø) < γ∧, D = Ø} in Eq.(36) as

where whose closed-form expressions can be obtained from Eqs.(38) and (39), respectively.

Now, we have derived the closed-formed asymptotic expressions of the outage probabilities for two-BSDT and three-BSDT schemes. According to [10], the definition of the spectrum hole utilization η is based on the derived outage probability, i.e.,

The spectrum hole utilization can be considered as a measure to quantify the percentage of spectrum holes utilized by SUs and SUd for their successful data exchange. In the next section, we give the numerical evaluation of η for the two BSDT schemes.

 

4. Simulation Results

In this section, we will evaluate the spectrum hole utilization for two-BSDT and three-BSDT schemes according to Eq.(43). For a primary user’s QoS requirement, the false alarm probability Pfs of spectrum holes needs to be below a required target value. Here, we set Pfs = 0.001. In the spectrum sensing protocol, Eq.(29) in [10] can be applied to calculate the detection probability Pds of spectrum holes under the given target value of Pfs.

Considering the effect of the spectrum sensing on secondary data transmissions, we discuss the performance of the spectrum sensing first. Fig. 4 shows that the detection probability Pds of spectrum holes varies with the secondary SNR (γs), the channel gain and the number (M) of CRs. It is obvious that Pds becomes larger with the rise of γs, the reason of which is that the higher γs results in the lower outage probability to transmit sensing results from CRs to SUs. As the gain of channels from the primary user to CRi increases from 0.1 to 1, the energy of the primary user is more easily detected by CRi, which leads to the rise of Pds. On the other hand, an increased number of CRs from M = 4 to 8 achieves higher Pds due to the merit of the spectrum sensing protocol SFSS, i.e., although the rise of M and the limited CCC resources bring the transmission failure of initial sensing results received at SUs, the SFSS protocol is able to identify and discard such transmission failure, and thus the performance of the spectrum sensing is not affected.

Fig. 4.Detection probability of spectrum holes versus secondary SNR with

Fig. 5.Overall outage probability versus the existing probability of spetrum holes with α = 0.5,

Fig. 5 shows the overall outage probability versus the existing probability (Pa) of spectrum holes for two-BSDT scheme, three-BSDT scheme and one-way relaying scheme7. As observ--ed from Fig. 5, the overall outage probability decreases with the incremental existing probability of spectrum holes. The reason is that with the increasing Pa, cognitive users can transmit information through choosing more available spectrum holes in order to keep communicating without interruption. Moreover, the overall outage probability is further low as the number of cognitive relays increases from M = 4 to 8. It can be also seen that the two-BSDT scheme performs worse than both the three-BSDT and one-way relaying schemes, since the performance of the two-BSDT scheme is interference-limited, which is indicated by Eqs.(2) and (3). In addition, the simulations match the theoretical results very well.

Next, we give the spectrum hole utilization versus the secondary SNR (γs) for two-BSDT, three-BSDT and one-way relaying schemes as shown in Fig. 6. It is clear that the theoretical results fit well with the simulation and the three-BSDT scheme (in terms of spectrum hole utilization) outperforms both two-BSDT and one-way relaying schemes for both and 0.1. Additionally, the two-BSDT scheme appears a performance floor and thus performs worse than one-way relaying scheme in the high SNR region. This results indicates that for the best spectrum hole utilization, the two-BSDT scheme with network coding is not suitable for all SNR values. Therefore, compared with two-BSDT scheme, the three-BSDT scheme is the best choice across the whole SNR region. Considering the simple hardware implementation and low communication complexity, however, one-way relaying scheme is also attractive in high SNR, since its spectrum hole utilization is similar to that of the three-BSDT scheme in the high SNR region according to Fig. 6.

Fig. 6.Spectrum hole utilization versus secondary SNR with Pa = 0.6, α = 0.5, R = 0.5 bit/s/Hz, M = 4,

For the comparison between and 0.1 in Fig. 6, we can see that the spectrum hole utilizations of the three schemes are better for than those for which means that the channels from the primary user to CRi and those among cognitive users have higher attenuation. This phenomenon shows that the decrease of Pds with from 1 to 0.1 as shown in Fig. 4 becomes the dominant factor adversely resulting in the poor overall outage performance of secondary data transmissions, although the decrease of from 1 to 0.1 degrades the interference from the primary user to CRi and improves the partial outage performance. It also demonstrates that the spectrum sensing performance directly affects the spectrum hole utilization of secondary users.

In addition, we also investigate the spectrum hole utilization versus the number (M) of CRs in Fig. 7 for symmetric channels where and asymmetric channels where It is straightforward that the three-BSDT scheme and the two-BSDT scheme increase with the rise of M for both symmetric and asymmetric channels. The reason is that the spectrum hole detection performance of SFSS protocol is unaffected by many error initial sensing results which occur with an increased number of CRs, and thus the spectrum hole utilization is not diminished. Furthermore, we can find that when the number of CRs is smaller than a critical value, the spectrum hole utilization of the three-BSDT scheme for symmetric channels is better than that for asymmetric channels. The reason is that the asymmetric channel from SUs to CRi has larger attenuation and thus the probability of successfully decoding at CRi is lessened by this poor channel. However, the spectrum hole utilization of the two-BSDT scheme for asymmetric channels is better than that of symmetric channels before a critical value due to the interference-limited characteristic of the two-BSDT scheme. Specifically, for the poor channel in asymmetric channels, CRi can use SIC to decode the data stream and thus the probability of successfully decoding at CRi is higher for asymmetric channels. Fig. 7 also demonstrates that, no matter which scheme (two-BSDT or three-BSDT) is used, the performance gap between symmetric channels and asymmetric channels decreases and even disappears with the increasing of M. The reason is that the increased number of CRs reduces the possibility for all relays to fail to decode the data streams, which makes the successfully decoding probability at CRs grown and further improves the overall outage performance and spectrum hole utilization performance. The same reason leads to the lessening of the perform disparity between the three-BSDT scheme and the two-BSDT scheme as M increases regardless of the specific channels used.

Fig. 7.Spectrum hole utilization versus the number of CRs with Pa =0.6, α = 0.5,

Fig. 8.Spectrum hole utilization versus spectrum sensing overhead with Pa =0.6,

Lastly, we illustrate the spectrum hole utilization versus the spectrum sensing overhead α for R = 0.5 bit/s/Hz and R = 1 bit/s/Hz. In Fig. 8, the spectrum hole utilization corresponding toR = 0.5 bit/s/Hz is larger than that to R = 1 bit/s/Hz regardless of the specific scheme used. This shows that due to the decrease in R, the probabilities of decoding failure at cognitive users drop and so do the communication outages occurring between the two end-sources. Also the lower R requires less time duration allocated for secondary data transmissions, which induces the longer spectrum sensing time duration left for R = 0.5 bit/s/Hz as shown in Fig. 8. It is clear that an optimal sensing overhead corresponding to the maximum of spectrum hole utilization exists for the two schemes. Moreover, no matter which data rate (R = 0.5 bit/s/Hz or R = 1 bit/s/Hz) is used, the three-BSDT scheme has larger optimal sensing overhead than the two-BSDT scheme and achieves higher spectrum hole utilization. The reason is that the larger sensing overhead obtains the higher detection probability of spectrum holes, which brings on the lower outage probability of the three-BSDT scheme, whereas outage probability of the two -BSDT scheme can not always reduce with the increase of detection probability of spectrum holes due to the interference-limited feature of it. Since the three-BSDT scheme has higher spectrum hole utilization than the two-BSDT scheme regardless of the specific data rate used, it is better for high data rate applications to choose the three-BSDT scheme.

 

5. Conclusion

In this paper, we studied the spectrum hole utilization of secondary bidirectional data transmissions between two secondary end-sources in CRNs with imperfect spectrum sensing. We derived closed-form asymptotic expressions of outage probabilities for two-BSDT and three-BSDT schemes over Rayleigh fading channels. Due to the interference-limited characteristic of two-BSDT scheme, three-BSDT scheme has better spectrum hole utilization than two-BSDT scheme in symmetric channels, whereas the spectrum hole utilization of two-BSDT scheme is greatly improved in asymmetric channels and thus two-BSDT scheme is more appropriate for applications with asymmetric channels. Furthermore, the performance gap between symmetric channels and asymmetric channels diminishes as the number of CRs rises. On the other hand, when the influence of channel gain from the primary user to secondary users on spectrum hole utilization is considered, the spectrum hole utilization becomes poor as the decrease of the channel gain induces the decline of detection probability of spectrum holes. Finally, the optimal spectrum sensing overhead is investigated in order to maximize the spectrum hole utilization, which indicates the necessity of joint optimization of spectrum sensing and secondary data transmissions.

References

  1. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, Feb. 2005. https://doi.org/10.1109/JSAC.2004.839380
  2. I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, "Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey," Computer Networks, vol. 50, no. 2, pp. 2127-2159, 2006. https://doi.org/10.1016/j.comnet.2006.05.001
  3. A. Goldsmith, S. A. Jafar, I. Marić, and S Srinivasa, "Breaking spectrum gridlock with cognitive radios: an Information theoretic perspective," in Proc. of the IEEE, vol. 97, no. 5, pp. 894-914, 2009. https://doi.org/10.1109/JPROC.2009.2015717
  4. Y. L. Zou, Y. D. Yao, and B. Y. Zheng, "Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions," IEEE Commun. Mag., vol. 50, no. 4, pp. 98-103, 2012.
  5. G. Ganesan and Y. Li, "Cooperative spectrum sensing in cognitive radio, part I: two user networks," IEEE Trans. on Wireless Commun., vol. 6, no. 6, pp. 2204-2213, 2007. https://doi.org/10.1109/TWC.2007.05775
  6. J. Zhu, B. Y. Zheng, and Y. L. Zou, "Detection time analysis for the multiple-user cooperative spectrum sensing in cognitive radio networks," SCIENCE CHINA Information Sciences, vol. 52, no. 10, pp. 1915-1925, 2009. https://doi.org/10.1007/s11432-009-0166-x
  7. X. Zhang, Q. H. Wu, X. Q. Li, and Z. Yun, "Optimal cooperation and transmission in cooperative spectrum sensing for cognitive radio," KSII Transactions on Internet and Information Systems, vol. 7, no. 2, pp. 184-201, 2013. https://doi.org/10.3837/tiis.2013.02.001
  8. B. Shen, K. Kwak, and Z. Bai, "Optimal linear soft fusion schemes for cooperative sensing in cognitive radio networks," IEEE Global Telecommunications Conference, pp. 1-6, Nov. 30-Dec. 4, 2009.
  9. Z. Y. Dai, J. Liu, C. Wang, and K. Long, "An adaptive cooperation communication strategy for enhanced opportunistic spectrum access in cognitive radios," IEEE Commun. Lett., vol. 16, no. 1, pp. 40-43, 2012. https://doi.org/10.1109/LCOMM.2011.111011.111418
  10. Y. L. Zou, Y. D. Yao, and B. Y. Zheng, "Cognitive transmissions with multiple relays in cognitive radio networks," IEEE Trans. on Wireless Commun., vol. 10, no. 2, pp. 648-659, 2011. https://doi.org/10.1109/TWC.2010.120610.100830
  11. B. Rankov and A.Wittneben, "Spectral efficient protocols for half-duplex fading relay channels," IEEE Journal on Selected Areas in Communications, vol. 25, no. 2, pp. 379-389, 2007. https://doi.org/10.1109/JSAC.2007.070213
  12. S. L. Zhang, S. C. Liew, and P. P. Lam, "Physical layer network coding," In Proc. ACM MobiCom, pp. 358-365, Sep.24-29, 2006.
  13. Q. Li, S. H. Ting, A. Pandharipande, and Y. Han, "Cognitive Spectrum Sharing With Two-Way Relaying Systems," IEEE Trans. on Vehicular Technology, vol. 60, no. 3, pp. 1233-1240, 2011. https://doi.org/10.1109/TVT.2010.2104334
  14. M. Hafeez and J. M. H. Elmirghani, "Analysis of Dynamic Spectrum Leasing for Coded Bi-Directional Communication," IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1500-1512, 2012. https://doi.org/10.1109/JSAC.2012.120918
  15. R.Pickholtz, "Spectrum leasing to cooperating secondary ad hoc networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 203-213, 2008. https://doi.org/10.1109/JSAC.2008.080118
  16. M. Tao and Y. Liu, "Spectrum leasing and cooperative resource allocation in cognitive OFDMA networks," Journal of Communications and Networks, vol. 15, no. 1, pp. 102-110, 2013. https://doi.org/10.1109/JCN.2013.000015
  17. A. Alizadeh and S. M. S. Sadough, "Spectrum sensing improvement by SNR maximization in cognitive two-way relay networks," In Pro. Electrical Engineering (ICEE), pp. 1511-1516, May 15-17, 2012.
  18. P. Liu and I. M. Kim, "Performance analysis of bidirectional communication protocols based on decode-and-forward relaying," IEEE Trans. on Commun., vol. 58, no. 9, pp. 2683-2696, 2010. https://doi.org/10.1109/TCOMM.2010.080310.090292
  19. X. Lin, M. Tao, and Y. Xu, "Outage Probability and Finite-SNR Diversity-Multiplexing Tradeoff for Two-Way Relay Fading Channels," IEEE Trans. on Vehicular Technology, 2013, in press.
  20. Y. Jing, "A relay selection scheme for two-way amplify-and-forward relay networks," In Pro. WCSP, pp.1-5, Nov.13-15, 2009.
  21. Y. H. Li, R. H. Y. Louie, and B. Vucetic, "Relay Selection With Network Coding in Two-Way Relay Channels," IEEE Transactions on Vehicular Technology, vol. 59, no. 9, pp. 4489-4499, 2010. https://doi.org/10.1109/TVT.2010.2070817
  22. B. Zhong, Z. S. Zhang, X. Zhang, Y. Li, and K. P. Long, "Impact of partial relay selection on the capacity of communications systems with outdated CSI and adaptive transmission techniques," EURASIP J. Wireless Comm. Netw., 24, 2013.
  23. G. R. Ding, Q. H. Wu, Y. L. Zou, J. Wang and Z. Gao, "Joint spectrum sensing and transmit power adaptation in interference-aware cognitive radio networks," Transactions on Emerging Telecommunications Technologies, vol. 25, no. 2, pp. 231-238, 2014. https://doi.org/10.1002/ett.2586
  24. Z. Y. Dai, J. Liu, and K. Long,. "Cooperative transmissions for secondary spectrum access in cognitive radios," International Journal of Communication Systems, Available online: http://onlinelibrary.wiley.com/doi/10.1002/dac.2503/full, Jan. 2013.
  25. Y. C. Liang, Y. H. Zeng, E. Peh, and A.T. Hoang, "Sensing-throughput tradeoff for cognitive radio networks," IEEE Trans. on Wireless Commun., vol. 7, no. 4, pp. 1326-1337, 2008. https://doi.org/10.1109/TWC.2008.060869
  26. H. Anh, Y. C. Liang, and Y. H. Zeng, "Adaptive joint scheduling of spectrum sensing and data transmission in cognitive radio networks," IEEE Trans. on Commun., vol. 58, no. 1, pp. 235-246, 2010. https://doi.org/10.1109/TCOMM.2010.01.070270
  27. J. Ma, G. Zhao, and Y. Li, "Soft combination and detection for cooperative spectrum sensing in cognitive radio networks," IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4502-507, 2008. https://doi.org/10.1109/T-WC.2008.070941
  28. Q. Zhao, L. Tong, and A. Swami, "Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework," IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589-600, 2007. https://doi.org/10.1109/JSAC.2007.070409
  29. Y. Xu, A. Anpalagan, and Q. Wu, "Decision-Theoretic Distributed Channel Selection for Opportunistic Spectrum Access: Strategies, Challenges and Solutions," IEEE Communications Surveys and Tutorials, 2013, in press.
  30. Z. Tian and G. B. Giannakis, "A wavelet approach to wideband spectrum sensing for cognitive radios," in Proc. of IEEE CROWNCOM, pp. 1-5, June 8-10, 2006.
  31. Q. Li, S. H. Ting, and A. Pandharipande, "Adaptive two-way relaying and outage analysis," IEEE Trans. on Wireless Commun., vol. 8, no. 6, pp. 3288-3299, 2009. https://doi.org/10.1109/TWC.2009.081213
  32. R. Ahlswede, N. Cai, and S-Y R. Li, "Network information flow," IEEE Trans. on Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000. https://doi.org/10.1109/18.850663
  33. Y. Zou, J. Zhu, B. Zheng, and Y. D. Yao, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5438-5445, 2010. https://doi.org/10.1109/TSP.2010.2053708
  34. Y. Yilmaz, Z. Y. Guo, and X. D. Wang, "Sequential joint spectrum sensing and channel estimation for dynamic spectrum access", Available online: http://arxiv.org/abs/1401.6134, Jan, 2014.
  35. C. Qi, G. Yue, L. Wu, and N. Arumugam, "Pilot design for sparse channel estimation in OFDM-based cognitive radio systems," IEEE Transactions on Vehicular Technology, 2014, in press.

Cited by

  1. Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks vol.11, pp.3, 2017, https://doi.org/10.3837/tiis.2017.03.002