2011 zou-yao-zheng-tw-648
-
Upload
amitrakshar-mohanta -
Category
Documents
-
view
131 -
download
0
Transcript of 2011 zou-yao-zheng-tw-648
648 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
Cognitive Transmissions with Multiple Relays inCognitive Radio Networks
Yulong Zou, Student Member, IEEE, Yu-Dong Yao, Senior Member, IEEE, and Baoyu Zheng, Member, IEEE
AbstractβIn cognitive radio networks, each cognitive trans-mission process typically requires two phases: the spectrumsensing phase and data transmission phase. In this paper, weinvestigate cognitive transmissions with multiple relays by jointlyconsidering the two phases over Rayleigh fading channels. Westudy a selective fusion spectrum sensing and best relay datatransmission (SFSS-BRDT) scheme in multiple-relay cognitiveradio networks. Specifically, in the spectrum sensing phase, onlythe initial spectrum sensing results, which are received from thecognitive relays and decoded correctly at a cognitive source, areselected and used for fusion. In the data transmission phase,only the best relay is utilized to assist the cognitive source fordata transmissions. Under the constraint of satisfying a requiredprobability of false alarm of spectrum holes (for the protectionof the primary user), we derive an exact closed-form expressionof the spectrum hole utilization efficiency for the SFSS-BRDTscheme, which is used as a measure to quantify the percentageof spectrum holes utilized by the cognitive source for its successfuldata transmissions. For the comparison purpose, we also examinethe spectrum hole utilization efficiency for a fixed fusion spectrumsensing and best relay data transmission (FFSS-BRDT) scheme,where all the initial spectrum sensing results are used for fusionwithout any refined selection. Numerical results show that, undera target probability of false alarm of spectrum holes, the SFSS-BRDT scheme outperforms the FFSS-BRDT scheme in terms ofthe spectrum hole utilization efficiency. Moreover, the spectrumhole utilization efficiency of the SFSS-BRDT scheme alwaysimproves as the number of cognitive relays increases, whereasthe FFSS-BRDT schemeβs performance improves initially anddegrades eventually after a critical number of cognitive relays. Itis also shown that a maximum spectrum hole utilization efficiencycan be achieved through an optimal allocation of the timedurations between the spectrum sensing and data transmissionphases for both the FFSS-BRDT and SFSS-BRDT schemes.
Index TermsβCognitive transmissions, cognitive radio, multi-ple relays, spectrum sensing, best relay selection, spectrum holeutilization efficiency.
Manuscript received May 16, 2010; revised August 4, 2010 and September21, 2010; accepted November 15, 2010. The associate editor coordinating thereview of this paper and approving it for publication was D. Hong.
Y. Zou is with the Institute of Signal Processing and Transmission,Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu210003, China, and with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected], [email protected]).
Y.-D. Yao is with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected]).
B. Zheng is with the Institute of Signal Processing and Transmission, Nan-jing University of Posts and Telecommunications, Nanjing, Jiangsu 210003,China (e-mail: [email protected]).
This work was partially supported by the Postgraduate Innovation Pro-gram of Scientific Research of Jiangsu Province (Grant Nos. CX08B 080Z,CX09B 150Z) and the National Natural Science Foundation of China (GrantNo. 60972039).
Digital Object Identifier 10.1109/TWC.2010.120610.100830
I. INTRODUCTION
COGNITIVE radio is emerging as a promising technol-ogy that enables unlicensed users, also referred to as
cognitive users (or secondary users), to communicate witheach other over licensed bands through detecting spectrumholes [1]-[3]. As discussed in [4] and [5], each cognitivetransmission process typically consists of two essential phases:1) a spectrum sensing phase, in which a cognitive sourceattempts to detect an available spectrum hole; and 2) a datatransmission phase, in which the secondary data traffic istransmitted to a destination through the detected spectrumhole. The two individual phases have been studied extensivelyin terms of different sensing [6]-[11] or different transmission[12]-[21] techniques.
However, the two individual phases can not be designedand optimized separately, since they affect each other [5]. Tobe specific, when an available spectrum hole is not perceivedby the cognitive source during a certain time duration, thespectrum hole utilization efficiency will be impaired. We mayincrease the time duration of spectrum sensing phase to alle-viate the problem of misdetection of spectrum holes, which,however, comes at the expense of a transmission performancereduction since less time is now available for the data transmis-sion phase [5]. The work of [4] investigated the sensing-and-throughput tradeoff in terms of the maximization of secondarythroughput with a primary user protection constraint, where aclosed-form secondary throughput expression is derived overadditive white Gaussian noise (AWGN) channels. In [5], wehave explored the sensing-and-transmission tradeoff in twocognitive radio network scenarios (i.e., cognitive transmissionswithout relay and with single-relay), where closed-form outageprobability expressions with a primary user protection con-straint are derived for the two scenarios considering Rayleighfading environments. Notice that the cognitive transmissionswith multiple relays are yet to be investigated in cognitiveradio networks.
In traditional (non-cognitive radio) multiple-relay networks,three relay protocols (i.e., fixed relaying, selection relayingand incremental relaying) have been studied extensively in[14]. The advantages of such relaying protocols are achievedat the cost of a reduction in spectral efficiency, since the relaysused transmit on orthogonal channels to avoid interfering eachother. To address the shortcoming of an inefficient utilizationof the spectrum resource, a best-relay selection protocol hasbeen investigated in [19]-[21], where only the βbestβ relay isselected to forward a source nodeβs signal and thus only twochannels (i.e., the best relay link and direct link) are requiredregardless of the number of relays. It has been shown in [19]
1536-1276/11$25.00 cβ 2011 IEEE
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 649
that the best-relay selection scheme can achieve the samediversity-multiplexing tradeoff performance as the traditionalprotocols where all relays are involved in forwarding thesource nodeβs signal. Accordingly, the best-relay selection isalso an attractive relay protocol for cognitive radio networksdue to its spectrum efficiency. However, compared with thebest-relay transmission in traditional wireless networks, cog-nitive radio networks face an additional challenging issue, i.e.,mutual interference between the primary and the cognitiveusers, especially in a relay network scenario.
In addition, the existing cooperative spectrum sensing works[9], [11] assume the perfect transmission of initial spectrumsensing results to a fusion center over a dedicated channel(also called common control channel). Although the initialsensing results consist of only a few information bits, the cog-nitive users should scan the licensed channel periodically (e.g.,in millisecond scale) [2], which results in a non-negligiblerate of the initial sensing result transmission. Moreover, thecommon control channel resources are typically limited andwireless fading should be considered, thus the assumption ofperfect transmission of initial sensing results is not valid inpractical cognitive radio systems.
In this paper, we investigate the cognitive transmissions withmultiple relays by jointly considering the spectrum sensingand data transmissions phases over Rayleigh fading channels.The main contributions of this paper are described as follows.First, we study a selective fusion spectrum sensing and bestrelay data transmission (SFSS-BRDT) scheme, where only theinitial spectrum sensing results (from the multiple cognitiverelays) received and decoded successfully at the cognitivesource are used for fusion and then only the best relay is se-lected to assist the cognitive source for its data transmissions.Second, an exact closed-form expression of the spectrum holeutilization efficiency, which is used as a measure to quantifythe percentage of spectrum holes utilized, is derived for theSFSS-BRDT scheme to evaluate its performance. Third, forthe purpose of performance comparison, we further investigatea fixed fusion spectrum sensing and best relay data transmis-sion (FFSS-BRDT) scheme, where the difference from theSFSS-BRDT scheme lies that all initial sensing results fromthe cognitive relays are used for fusion without any refinedselection. Finally, we also derive a closed-form expression ofthe spectrum hole utilization efficiency for the FFSS-BRDTscheme over Rayleigh fading channels.
The remainder of this paper is organized as follows. In Sec-tion II, we describe the system model of cognitive transmis-sions and present the signal modeling for the SFSS-BRDT aswell as the FFSS-BRDT schemes. Section III derives closed-form expressions of the spectrum hole utilization efficiencyfor the SFSS-BRDT and FFSS-BRDT schemes over Rayleighfading channels. Next, in Section IV, we conduct the numericalevaluations and computer simulations for the spectrum holeutilization efficiency of the SFSS-BRDT and FFSS-BRDTschemes, showing the advantage of the former scheme. Finally,we provide concluding remarks in Section V. The notationsused throughout this paper are illustrated in Table 1.
Fig. 1. Coexistence of a primary network and a cognitive radio network.
Fig. 2. Time slotted structure of the cognitive transmissions with multiplerelays.
II. COGNITIVE TRANSMISSION PROTOCOLS IN
MULTIPLE-RELAY COGNITIVE RADIO NETWORKS
A. System Description
As shown in Fig. 1, we consider a cognitive radio network,where multiple cognitive relays (CRs) are available to assist acognitive source (CS) for both the spectrum sensing and datatransmission phases, i.e., CRs first help CS detect a spectrumhole to find a transmission opportunity and then assist CSfor its data transmissions to a cognitive destination (CD).Following [14], [16] and considering for practicability, a half-duplex relaying mode is adopted for CRs. Notice that there areπ CRs as denoted by β = {CRπβ£π = 1, 2, β β β ,π}. Fig. 2 il-lustrates a time slotted structure of the cognitive transmissionswith multiple relays. In order to avoid interfering the primaryusers, we assume that there is a common control channelwhen CRs forward their initial spectrum sensing results toCS [11]. As seen from Fig. 2, each cognitive transmissionprocess includes two phases (i.e., the spectrum sensing anddata transmission phases), where the parameter πΌ is referredto as spectrum sensing overhead, which can be adjusted tooptimize the performance of cognitive transmissions.
Fig. 2 shows that the spectrum sensing phase consists of twosub-phases. In the first sub-phase, CS and CRs independentlydetect whether or not there is a spectrum hole. Then, inthe subsequent sub-phase, all CRs forward their detectionresults (also referred to as initial spectrum sensing results) toCS over π orthogonal common control sub-channels. Here,we consider two fusion strategies for the spectrum sensing:selective fusion and fixed fusion. In the selective fusionspectrum sensing (SFSS) scheme, a forward error detectioncode (such as cyclic redundancy check) is utilized by CRs toencode their initial spectrum sensing results, in addition to aforward error correction code, e.g., Turbo code. The encodedbits are transmitted to CS which will decode the receivedsignals and combines the successfully decoded outcomes only,i.e., only the successfully decoded outcomes are selected and
650 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
TABLE ILIST OF THE NOTATIONS USED THROUGHOUT THIS PAPER.
, c cBT B T
mC
mD
( )pH k
0 1,H H
Λ ( ,1)Λ ( ,1)s
i
H k
H k
Λ ( ,1)isH k
,1 ,1Pd ,Pfi i
,1 ,1Pd ,Pfs s
Pd , Pfs s
, s pP P
, s pΞ³ Ξ³
The time-bandwidth products of the licensed primary channel and the common controlchannel, respectively.
A non-empty set consisting of these cognitive relays whose initial spectrum sensing resultsare received and decoded successfully at a cognitive source.
A non-empty set consisting of these cognitive relays that are able to decode the signaltransmitted from the cognitive source.
Events representing the licensed channel being unoccupied and occupied by a primary user,respectively.
The initial spectrum sensing results detected by the cognitive source and i-th cognitive relay,respectively, at time slot k.
The decoded outcome of an initial spectrum sensing result received at the cognitive sourcefrom the i-th cognitive relay.
The individual probabilities of detection and false alarm of spectrum holes at the i-th cognitive relay, respectively.
The individual probabilities of detection and false alarm of spectrum holes at the cognitive source, respectively.
The overall probabilities of detection and false alarm of spectrum holes at the cognitive source after fusion, respectively.
The transmit powers at a secondary user and a primary user, respectively.
The transmit signal-to-noise ratios (SNR) at a secondary user and a primary user, respectively.
The status of the licensed primary channel at time slot k.
used for fusion. However, in the fixed fusion spectrum sensing(FFSS) scheme, only a forward error correction code is usedby CRs to encode their initial sensing results, and CS decodesthe received signals from CRs and combines all the decodedoutcomes based on a given fusion rule. Presently, there areseveral choices of fusion rule available, such as βANDβ, βORβ, and majority rule in the literature [9], [11]. Note that anβANDβ fusion rule is used throughout this paper without theconsideration of other rules.
In the data transmission phase, we consider the use of a bestrelay data transmission (BRDT) strategy. As shown in Fig. 2,there are also two sub-phases for the data transmissions. Ifa spectrum hole was detected earlier (in the sensing phase),CS will start transmitting its data to CD and CRs in the firstdata transmission sub-phase. Then, all CRs attempt to decodethe CSβs signal and those CRs which decode successfullyconstitute a set π·, called a decoding set. Notice that we canemploy a cyclic redundancy check code (CRC) to determinewhether a CR decodes its received signal successfully or not.Specifically, if the CRC checking passes at the CR, it is viewedas a successfully decoded relay and is added to the decodingset. Accordingly, the sample space of all the possible decodingsets is described as {π· β β βͺ π·π, π = 1, 2, β β β 2π β 1},where βͺ represents set union, β is the empty set, and π·π
is a non-empty subcollection of the π cognitive relays.In the second data transmission sub-phase, if the decodingset (π·) is not empty, the best relay (i.e., with the highestinstantaneous signal-to-interference-plus-noise ratio) chosenwithin the decoding set will forward its decoded result to CD.If π· is empty, i.e., no relay is able to decode the CSβs signalsuccessfully, CS will repeat the transmission of the original
signal to CD through its direct link. Finally, CD combinesthe two copies of the received signals using the maximumratio combining (MRC) method, and gives an estimation ofthe original signal. The reason for choosing MRC is that itcan achieve a better performance compared with the othertwo combining methods, i.e., the selective diversity combining(SDC) and the equal gain combining (EGC).
It is noted that, although the scenario considered is with thesingle cognitive source-destination pair and somewhat specific,it can be applied and extended to a more generic scenariowith multiple cognitive source-destination pairs by designingan additional multiple access protocol. To be specific, if arandom access strategy is considered, we can allow multiplecognitive sources to independently sense the licensed channelwith the assistance of multiple relays. Then, the source whichfirst detects a spectrum hole starts its data transmissions byusing the best relay selection scheme. On the other hand, ifa static multiple access strategy is considered, the cognitivesources can cooperatively sense the licensed primary channeland then access the detected spectrum hole through a round-robin scheduling (or, an orthogonal channelization method).In addition, for the scenario consisting of multiple licensedprimary channels, a cognitive source is able to sense themultiple channels simultaneously by using filter banks [22].Once one (or more than one) spectrum hole was found, thecognitive source starts its data transmissions over the detectedspectrum hole.
Each wireless link between any two nodes as depicted inFig. 1 is modeled as a Rayleigh fading channel and the fadingprocess is considered as constant during one time slot. Theadditive white Gaussian noise (AWGN) at all receivers is
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 651
modeled as a complex Gaussian random variable (RV) withzero mean and variance π0. For notational convenience, letπ»π(π) represent, for time slot π, whether or not there is aspectrum hole. Specifically, π»π(π) = π»0 represents that aspectrum hole is available, i.e., the channel is unoccupied bythe primary user (PU); otherwise, π»π(π) = π»1. We modelπ»π(π) as a Bernoulli random variable with parameter Pa (theprobability of the channel being available for secondary users),i.e., Pr(π»π(π) = π»0) = Pa and Pr(π»π(π) = π»1) = 1 β Pa.
B. Signal Modeling
1) Modeling of the SFSS-BRDT scheme: In the following,we first formulate the signal model of the SFSS-BRDTscheme, where the SFSS and BRDT strategies are used for thespectrum sensing and data transmission phases, respectively.In the first sub-phase of time slot π, the signal received at CSis expressed as
π¦π (π, 1) =β
ππβππ (π)π(π, 1) + ππ (π, 1) (1)
where βππ (π) is the fading coefficient of the channel from PUto CS, ππ (π, 1) is AWGN with zero mean and variance π0,and π(π, 1) is defined as
π(π, 1) =
{0, π»π(π) = π»0
π₯π(π, 1), π»π(π) = π»1
where π₯π(π, 1) is the transmit signal of PU in the first sub-phase of time slot π. Notice that π»π(π) = π»0 denotes thatthe channel is unoccupied by PU and nothing is transmittedfrom PU, and π»π(π) = π»1 represents that a PU signal istransmitted. Meanwhile, the signals received at all CRs canbe written as
π¦π(π, 1) =β
ππβππ(π)π(π, 1) + ππ(π, 1), π β β (2)
where βππ(π) is the fading coefficient of the channel from PUto CRπ and ππ(π, 1) is AWGN with zero mean and varianceπ0. Based on the received signals as given by Eq. (1) and Eq.(2), CS and CRs obtain their initial spectrum sensing results(as denoted by οΏ½ΜοΏ½π (π, 1) and οΏ½ΜοΏ½π(π, 1), respectively) by using agiven detection approach. At present, we have many choices ofdetector available, such as energy detector [6], matched filterdetector [3], and cyclostationary feature detector [7], [8]. Inthis paper, we use the energy detector [6], [10] to evaluate thespectrum sensing performance. The reasons for choosing theenergy detector are twofold: (1) We want to show the effect ofthe use of multiple relays for cognitive transmissions. Hence,the choice of detector is not critical; (2) We model the signalas a random variable with known variance, and thus the energydetector is optimal [10].
In the subsequent sub-phase, all CRs encode their initialresults by using a concatenated forward error detection andcorrection code (e.g., CRC-Turbo), giving an encoded bitstream that is mapped into a constellation symbol as denotedby π₯π(π, 2) by using a certain modulation scheme (e.g., BPSKand QAM). Then, CRs transmit the modulated symbols to CSover π orthogonal common control sub-channels. Hence, thereceived signals at CS from CRs can be expressed as
π¦ππ (π, 2) =β
ππ βππ (π)π₯π(π, 2) + πππ (π, 2), π β β (3)
where βππ (π) is the fading coefficient of the channel fromCRπ to CS, and ππ
π (π, 2) is AWGN with zero mean andvariance π0. From Eq. (3), CS attempts to decode οΏ½ΜοΏ½π(π, 1)from its received signal and the decoded outcome (after Turbodecoding and CRC checking) is denoted by οΏ½ΜοΏ½π
π (π, 2). Notethat, according to the coding theorem, if a channel outageevent occurs, i.e., channel capacity is smaller than data rate,the receiver is deemed to fail to decode and the CRC checkis assumed to fail to pass. For notational convenience, leta set πΆ represent the CRs whose initial sensing results arereceived and decoded successfully at CS. Accordingly, thesample space of such a set is given by {πΆ β β βͺ πΆπ, π =1, 2, β β β , 2π β1}, where πΆπ is a non-empty subcollection ofthe π cognitive relays.
β Case πΆ = β : This case corresponds to that CS fails to
decode any of the initial spectrum sensing results from CRs.Note that an initial sensing result οΏ½ΜοΏ½π(π, 1) carries 1-bitinformation only in an information-theoretic sense and thetime-bandwidth product of the common control channel isπ΅πππ. Hence, the transmission rate of such an initial sensingresult over the common control channel is given by 1/(π΅πππ).Accordingly, the case πΆ = β can be described from Eq. (3)as
πΌ
2πlog2(1 + β£βππ (π)β£2πΎπ ) <
1
π΅πππ, π β β (4)
where πΎπ = ππ /π0, and the factor 1/π is due to the fact thateach CR is assigned with 1/π fraction of the common controlchannel. Therefore, given that case πΆ = β has occurred, thefinal spectrum sensing result fused at CS, οΏ½ΜοΏ½π (π), is expressedas
οΏ½ΜοΏ½π (πβ£πΆ = β ) = οΏ½ΜοΏ½π (π, 1) (5)
which implies that none of the CRsβ initial spectrum sensingresults is utilized for fusion at CS.
β Case πΆ = πΆπ: CS successfully decodes these initial
spectrum sensing results from the CRs in set πΆ, i.e.,
πΌ
2πlog2(1 + β£βππ (π)β£2πΎπ ) >
1
π΅πππ, π β πΆπ
πΌ
2πlog2(1 + β£βππ (π)β£2πΎπ ) <
1
π΅πππ, π β πΆπ
(6)
where πΆπ = β β πΆπ is the complementary set of πΆπ. Inthe given case πΆ = πΆπ, CS combines οΏ½ΜοΏ½π (π, 1) and οΏ½ΜοΏ½π
π (π, 2)through a given fusion rule, leading to its final decision. Sincewe just want to show the sensing-transmission tradeoff in amultiple-relay cognitive radio network, the choice of fusionrule is not critical and an βANDβ fusion is used throughout thispaper without the consideration of other rules, e.g., βORβ andmajority rule. Thus, the final sensing result οΏ½ΜοΏ½π (π) is expressedas
οΏ½ΜοΏ½π (πβ£πΆ = πΆπ) = οΏ½ΜοΏ½π (π, 1) βπβπΆπ
οΏ½ΜοΏ½π(π, 1) (7)
which means that οΏ½ΜοΏ½π (πβ£πΆ = πΆπ) = π»0 (i.e., a spectrumhole is detected) if all initial spectrum sensing results implya spectrum hole available, and οΏ½ΜοΏ½π (πβ£πΆπ) = π»1 otherwise.Next, we develop signal modeling for the data transmissionphase of the SFSS-BRDT scheme. In the first part of the data
652 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
transmission, i.e., the third sub-phase of time slot π, the signalreceived at CD is expressed as
π¦π(π, 3) = βπ π(π)β
ππ π½(π, 3)+βππ(π)β
πππ(π, 3)+ππ(π, 3)(8)
where βπ π(π) and βππ(π) are the fading coefficients of thechannel from CS to CD and that from PU to CD, respectively,and the parameters π½(π, 3) and π(π, 3) are defined as
π½(π, 3) =
{π₯π (π), οΏ½ΜοΏ½π (π) = π»0
0, οΏ½ΜοΏ½π (π) = π»1
and
π(π, 3) =
{0, π»π(π) = π»0
π₯π(π, 3), π»π(π) = π»1
where π₯π (π) and π₯π(π, 3) are the transmit signals of CS andPU, respectively. Meanwhile, the signals received at CRs canbe written as
π¦π(π, 3) = βπ π(π)β
ππ π½(π, 3) + βππ(π)β
πππ(π, 3) + ππ(π, 3)(9)
where βπ π(π) and βππ(π) are the fading coefficients of thechannel from CS to CRπ and that from PU to CRπ, respectively.In the fourth sub-phase, there are two possible cases for thedata transmission depending on whether or not the decodingset (π·) is empty. Let π· = β represent the first case of anempty decoding set and π· = π·π correspond to the other case,where π·π is a non-empty subcollection set of all cognitiverelays (CRs).
β Case π· = β : This case corresponds to the scenario whereall CRs fail to decode CSβs signal from Eq. (9), implying
(1 β πΌ)
2log2(1 +
β£βπ π(π)β£2 πΎπ β£π½(π, 3)β£2β£βππ(π)β£2 πΎπ β£π(π, 3)β£2 + 1
) < π , π β β(10)
where π is the data rate of CS, β represents a set consistingof all π CRs, πΎπ = ππ /π0, and πΎπ = ππ/π0. In the givencase π· = β , CS will determine whether or not to repeat thetransmission of signal π₯π (π) to CD depending on its finaldecision οΏ½ΜοΏ½π (π) obtained during the spectrum sensing phase,and thus the received signal at CD is given by
π¦π(π, 4β£π· = β ) =βπ π(π)β
ππ π½(π, 4) + βππ(π)β
πππ(π, 4)
+ ππ(π, 4)(11)
where
π½(π, 4) =
{π₯π (π), οΏ½ΜοΏ½π (π) = π»0
0, οΏ½ΜοΏ½π (π) = π»1
and
π(π, 4) =
{0, π»π(π) = π»0
π₯π(π, 4), π»π(π) = π»1
By combining Eq. (8) and Eq. (11) with the maximum ratiocombining (MRC) method, CD can achieve an enhancedsignal version with a signal-to-interference-and-noise ratio(SINR) as given by
SINRd(π· = β )
=β£βπ π(π)β£2 πΎπ β£π½(π, 3)β£2 + β£βπ π(π)β£2 πΎπ β£π½(π, 4)β£2
β£βππ(π)β£2 πΎπ β£π(π, 3)β£2 + β£βππ(π)β£2 πΎπ β£π(π, 4)β£2 + 2
(12)
β Case π· = π·π: This case corresponds to the scenario
where CRs in decoding set π·π are able to decode CSβs signalsuccessfully, i.e.,
(1 β πΌ)
2log2(1 +
β£βπ π(π)β£2 πΎπ β£π½(π, 3)β£2β£βππ(π)β£2 πΎπ β£π(π, 3)β£2 + 1
) > π , π β π·π
(1 β πΌ)
2log2(1 +
β£βπ π(π)β£2 πΎπ β£π½(π, 3)β£2β£βππ(π)β£2 πΎπ β£π(π, 3)β£2 + 1
) < π , π β οΏ½ΜοΏ½π
(13)
where οΏ½ΜοΏ½π = β β π·π is the complementary set of π·π.Without loss of generality, consider that CRπ is selected toforward its correctly decoded result. Hence, given that caseπ· = π·π occurred and CRπ is selected, the signal received atCD in the fourth sub-phase is written as
π¦π(π, 4β£π· = π·π) =βππ(π)β
ππ π₯π (π) + βππ(π)β
πππ(π, 4)
+ ππ(π, 4)(14)
where βππ(π) is the fading coefficient of the channel fromCRπ to CD. Combining Eq. (8) and Eq. (14) with MRC, thecorresponding received SINR is given by
SINRd(π· = π·π,CRπ)
=β£βπ π(π)β£2 πΎπ + β£βππ(π)β£2 πΎπ
β£βππ(π)β£2 πΎπ β£π(π, 3)β£2 + β£βππ(π)β£2 πΎπ β£π(π, 4)β£2 + 2
(15)
In obtaining Eq. (15), we have used π½(π, 3) = π₯π (π) in thegiven case π· = π·π. In general, the relay, which successfullydecodes CSβs signal and achieves the highest received SINRat CD, is viewed as the βbestβ one. As a consequence, thebest relay selection criterion is found as
Best relay = arg maxπβπ·π
SINRd(π· = π·π,CRπ)
= arg maxπβπ·π
β£βππ(π)β£2 (16)
It is worth mentioning that using the best relay selectioncriterion as given above, we can further develop a specificrelay selection algorithm in a centralized or a distributed fash-ion. To be specific, for a centralized relay selection strategy,the cognitive source should maintain a table that consists ofall the cognitive relays and the related channel information(i.e., β£βππ(π)β£2). Note that such channel information could beestimated by the cognitive relays and then forwarded to thecognitive source over a feedback channel. After that, the bestcognitive relay can be easily determined by looking up thetable, which is called a centralized relay selection approach.For a distributed relay selection strategy, each cognitive relayshould maintain a timer [19] and set an initial value of thetimer in inverse proportional to β£βππ(π)β£2 as given by Eq. (16),resulting in the best cognitive relay with the smallest initialvalue for its timer. Hence, the best cognitive relay exhaustsits timer earliest compared with the other relays, and thenbroadcasts a control packet to notify the cognitive source andother relays [19]. Hence, in the given case π· = π·π, thereceived SINR at CD is given by
SINRd(π· = π·π) = maxπβπ·π
SINRd(π· = π·π,CRπ) (17)
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 653
where SINRd(π· = π·π,CRπ) is given by Eq. (15). Thiscompletes the model formulation for the SFSS-BRDT scheme.We next explain the signal modeling for the FFSS-BRDTscheme in the following subsection.
2) Modeling of the FFSS-BRDT scheme: As can be seenfrom the previous subsection, the difference between theSFSS-BRDT and the FFSS-BRDT schemes lies the spectrumsensing part. Thus, we only need to model the sensing phaseof the FFSS-BRDT scheme, since its transmission phase isidentical to the SFSS-BRDT scheme as modeled by Eqs. (6)- (16). For the FFSS strategy, only a forward error correctioncode (without an additional error detection code) is utilizedby CRs to encode their initial sensing results, leading to anencoded bit stream that is modulated to a constellation symboldenoted by π§π(π, 2). After that, CRs forward the modulatedsymbols to CS over π orthogonal common control sub-channels. Thus, the received signals at CS from CRs can berepresented as
π¦ππ (π, 2) =β
ππ βππ (π)π§π(π, 2) + πππ (π, 2), π β β (18)
Then, CS will attempt to decode οΏ½ΜοΏ½π(π, 1) based on its receivedsignal and the decoded outcome is denoted by οΏ½ΜοΏ½π
π (π, 2), whichcan be given by
οΏ½ΜοΏ½ππ (π, 2) =
{οΏ½ΜοΏ½π(π, 1), Ξππ (π, 2) = 0
rand{π»0, π»1}, Ξππ (π, 2) = 1(19)
where rand{π»0, π»1} indicates the equiprobable selection ofan element from {π»0, π»1}, Ξππ (π, 2) = 0 denotes thatno outage occurs over the channel from CRπ to CS, andΞππ (π, 2) = 1 denotes an outage event occurring over thecorresponding channel. Finally, CS combines οΏ½ΜοΏ½π (π, 1) andοΏ½ΜοΏ½π
π (π, 2) through a logical AND rule. Hence, the final spec-trum sensing result at CS, οΏ½ΜοΏ½π (π), is expressed as
οΏ½ΜοΏ½π (π) = οΏ½ΜοΏ½π (π, 1)πβπ=1
οΏ½ΜοΏ½ππ (π, 2) (20)
We now have completed the signal modeling for both theSFSS-BRDT and the FFSS-BRDT schemes. In what follows,we focus on their performance analysis in Rayleigh fadingenvironments.
III. PERFORMANCE ANALYSIS OF THE SFSS-BRDT AND
FFSS-BRDT SCHEMES OVER RAYLEIGH FADING
CHANNELS
In this section, we first derive a closed-form outage prob-ability expression with a primary user protection constraintfor the SFSS-BRDT scheme over Rayleigh fading channels.Based on the derived outage probability, a performance metric,referred to as spectrum hole utilization efficiency, is definedand used to quantify the percentage of spectrum holes utilizedby the cognitive source for its successful data transmissionswithout channel outage. Finally, we also present the spectrumhole utilization efficiency analysis for the FFSS-BRDT schemeto make a performance comparison with the SFSS-BRDTscheme.
A. Analysis of The SFSS-BRDT Scheme
Following [14], [16], an outage event is considered to occurwhen channel capacity falls below data transmission rate π .Thus, the outage probability of the SFSS-BRDT scheme canbe calculated as
Pout = Pr
{1 β πΌ
2log2(1 + SINRd) < π
}= Pr {SINRd(π· = β ) < πΎπ Ξ, π· = β }
+
2πβ1βπ=1
Pr {SINRd(π· = π·π) < πΎπ Ξ, π· = π·π}(21)
where Ξ = [22π /(1βπΌ) β 1]/πΎπ , SINRd(π· = β ) andSINRd(π· = π·π) are given by Eq. (12) and Eq. (17),respectively. Note that the factor 1/2 in the first equationof Eq. (19) is resulted from a half-duplex relay constraint[14], [16]. According to Eq. (10) and Eq. (12), the termPr{SINRd(π· = β ) < πΎπ Ξ, π· = β } in Eq. (21) can beexpanded as
Pr {SINRd(π· = β ) < πΎπ Ξ, π· = β }
= PaPdπ Pr{β£βπ π(π)β£2 < Ξ}πβπ=1
Pr{β£βπ π(π)β£2 < Ξ}
+ (1 β Pa)Pfπ Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}
Γπβπ=1
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}
+ Pa(1 β Pdπ ) + (1 β Pa)(1 β Pfπ )
(22)
where Pa = Pr{π»π(π) = π»0} is the probability that there isa spectrum hole, Pdπ = Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»0} andPfπ = Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»1} are, respectively, theprobability of detection and false alarm of spectrum holes atCS. Notice that random variables (RVs) β£βπ π(π)β£2, β£βπ π(π)β£2,β£βππ(π)β£2 and β£βππ(π)β£2 follow exponential distributions withmeans π2
π π, π2π π, π
2ππ and π2
ππ, respectively. Moreover, the dif-ference between two identically and exponentially distributedrandom variables has a Laplace distribution. Therefore, theprobabilities as given in Eq. (22) are calculated as
Pr{β£βπ π(π)β£2 < Ξ} = 1 β exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 < Ξ} = 1 β exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}= 1 β π2
π π
π2πππΎπΞ + π2
π π
exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}= 1 β π2
π π
π2πππΎπΞ + π2
π π
exp(β Ξ
π2π π
)
(23)
654 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
From Eq. (13) and Eq. (17), the term Pr{SINRd(π· = π·π) <πΎπ Ξ, π· = π·π} in Eq. (21) is found as
Pr {SINRd(π· = π·π) < πΎπ Ξ, π· = π·π}= PaPdπ Pr{max
πβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2}
Γβ
πβπ·π
Pr{β£βπ π(π)β£2 > Ξ}β
πβοΏ½ΜοΏ½π
Pr{β£βπ π(π)β£2 < Ξ}
+ (1 β Pa)Pfπ β
πβπ·π
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ > Ξ}
Γβ
πβοΏ½ΜοΏ½π
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}
Γ Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2 + 2β£βππ(π)β£2πΎπΞ}(24)
wherein
Pr{β£βπ π(π)β£2 > Ξ} = exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 < Ξ} = 1 β exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ > Ξ}=
π2π π
π2πππΎπΞ + π2
π π
exp(β Ξ
π2π π
)
Pr{β£βπ π(π)β£2 β β£βππ(π)β£2πΎπΞ < Ξ}
= 1 β π2π π
π2πππΎπΞ + π2
π π
exp(β Ξ
π2π π
)
(25)
Moreover, the probability Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ ββ£βπ π(π)β£2} in Eq. (24) is calculated as
Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2}
=
β« 2Ξ
0
1
π2π π
exp(β π₯
π2π π
)β
πβπ·π
[1 β exp(β2Ξ β π₯
π2ππ
)]ππ₯(26)
By using the binomial expansion formula, theterm
βπβπ·π
[1 β exp(β 2Ξβπ₯π2ππ
)] can be expressed as
1 +2β£π·πβ£β1β
π=1(β1)β£ππ(π)β£ exp(β β
πβππ(π)
2Ξβπ₯π2ππ
), where
β£π·πβ£ is the number of the elements in decoding set π·π andππ(π) is the π-th non-empty subcollection of the elementsin π·π. Substituting this result into the preceding equationand performing the integration yield
Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2} = 1 β exp(β 2Ξ
π2π π
)
+
2β£π·πβ£β1βπ=1
(β1)β£ππ(π)β£π[π2π π, π
2ππ, ππ(π)]
(27)
where π[π2π π, π
2ππ, ππ(π)] is given by
π[π2π π, π
2ππ, ππ(π)] =
β§β¨β©
2Ξ
π2π π
exp(β 2Ξ
π2π π
),β
πβππ(π)
1
π2ππ
=1
π2π π
exp(β βπβππ(π)
2Ξ
π2ππ
)β exp(β 2Ξ
π2π π
)
1β βπβππ(π)
π2π π
π2ππ
, others
Besides, the probability Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ ββ£βπ π(π)β£2 + 2β£βππ(π)β£2πΎπΞ} in Eq. (24) is given by (seeAppendix A for details)
Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2 + 2β£βππ(π)β£2πΎπΞ}= Aπ + Bπ
(28)
where the closed-form expressions of Aπ and Bπ are givenby Eq. (A.6) and Eq. (A.7), respectively, in Appendix A.Now, we start to analyze Pdπ and Pfπ as given in Eq.(22) and Eq. (24). Considering Eqs. (5) and (7), an overallprobability of detection of spectrum holes at CS (Pdπ ), calleddetection probability, can be calculated as Eq. (29), wherePdπ ,1 = Pr{οΏ½ΜοΏ½π (π, 1) = π»0β£π»π(π) = π»0} and Pdπ,1 =Pr{οΏ½ΜοΏ½π(π, 1) = π»0β£π»π(π) = π»0} are the individual probabili-ties of detection of spectrum holes at CS and CRπ, respectively.Similarly, an overall probability of false alarm of spectrumholes at CS (Pfπ ), called false alarm probability, is given byEq. (30), where Pfπ ,1 = Pr{οΏ½ΜοΏ½π (π, 1) = π»0β£π»π(π) = π»1}and Pfπ,1 = Pr{οΏ½ΜοΏ½π(π, 1) = π»0β£π»π(π) = π»1} are theindividual probabilities of false alarm of spectrum holes atCS and CRπ, respectively. Note that, throughout this paper,an energy detector [6], [10] is considered in evaluating theperformance of the spectrum sensing phase. Following [10],Pdπ ,1 and Pfπ ,1 can be represented from Eq. (1) as
Pdπ ,1 = Pr{οΏ½ΜοΏ½π (π, 1) = π»0β£π»π(π) = π»0}= Pr{β£ππ (π, 1)β£2 < πΏ} (31)
and
Pfπ ,1 = Pr{οΏ½ΜοΏ½π (π, 1) = π»0β£π»π(π) = π»1}= Pr{πΌ
2ππβ£βππ (π)β£2 + β£ππ (π, 1)β£2 < πΏ} (32)
where πΏ is an energy detection threshold. From Eq. (31) andEq. (32), we can obtain
Pfπ ,1 =
β§β¨β©
1 β [1 β ln(1 β Pdπ ,1)](1 β Pdπ ,1), πΌπ2ππ πΎπ = 4
1 β 4(1 β Pdπ ,1)
4 β πΌπ2ππ πΎπ
β πΌπ2ππ πΎπ
πΌπ2ππ πΎπ β 4
(1 β Pdπ ,1)4
πΌπ2ππ πΎπ , otherwise
(33)Similar to the derivation of Eq. (33) and following Eq. (2),we obtain
Pfπ,1 =
β§β¨β©
1 β [1 β ln(1 β Pdπ,1)](1 β Pdπ,1), πΌπ2πππΎπ = 4
1 β 4(1 β Pdπ,1)
4 β πΌπ2πππΎπ
β πΌπ2πππΎπ
πΌπ2πππΎπ β 4
(1 β Pdπ,1)4
πΌπ2ππ
πΎπ , otherwise
(34)In addition, Pr(πΆ = β ) and Pr(πΆ = πΆπ) are determined by
Pr(πΆ = β ) =
πβπ=1
[1 β exp(β Ξ
π2ππ
)] (35)
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 655
Pdπ =Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»0}=Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»0, πΆ = β }Pr(πΆ = β β£π»π(π) = π»0)
+
2πβ1βπ=1
Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»0, πΆ = πΆπ}Pr(πΆ = πΆπβ£π»π(π) = π»0)
= Pr(πΆ = β )Pdπ ,1 +
2πβ1βπ=1
Pr(πΆ = πΆπ)Pdπ ,1
βπβπΆπ
Pdπ,1
(29)
Pfπ =Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»1}=Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»1, πΆ = β }Pr(πΆ = β β£π»π(π) = π»1)
+
2πβ1βπ=1
Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»1, πΆ = πΆπ}Pr(πΆ = πΆπβ£π»π(π) = π»1)
= Pr(πΆ = β )Pfπ ,1 +
2πβ1βπ=1
Pr(πΆ = πΆπ)Pfπ ,1β
πβπΆπ
Pfπ,1
(30)
and
Pr(πΆ = πΆπ) =β
πβπΆπ
exp(β Ξ
π2ππ
)β
πβπΆπ
[1 β exp(β Ξ
π2ππ
)]
(36)where Ξ = [22π/(πΌπ΅πππ) β 1]/πΎπ . Clearly, if there is a falsealarm of spectrum holes, the CS will start its data traffic trans-missions and thus interferes with the primary user. Accord-ingly, for the protection of the primary user, the overall falsealarm probability shall be guaranteed to be below a requiredtarget value. Given a target value Pfπ ,thr and assuming that thesensing performance at CS associated with each possible set πΆis guaranteed with the same false alarm requirement, we canobtain solutions from Eq. (30) as Pfπ ,1 = (Pfπ ,thr)
1/(β£πΆβ£+1)
and Pfπ,1 = (Pfπ ,thr)1/(β£πΆβ£+1), respectively, where β£πΆβ£ is the
number of CRs in set πΆ. Substituting Pfπ ,1 = (Pfπ ,thr)1/(β£πΆβ£+1)
and Pfπ,1 = (Pfπ ,thr)1/(β£πΆβ£+1) into Eqs. (33) and (34), we can
obtain the numerical solutions to Pdπ ,1 and Pdπ,1, by usingwhich an overall detection probability Pdπ is determined fromEq. (29) under a given target false alarm probability Pfπ ,thr.
Now, we have completed the analysis of spectrum sensingperformance for the SFSS-BRDT scheme. Now, we havederived a closed-form expression of the outage probabilityfor the SFSS-BRDT scheme. Based on the derived outageprobability, a spectrum hole utilization efficiency is defined as
π =1 β Pout
Pa(37)
where 1 β Pout indicates the quantity of spectrum holes thatare utilized by the cognitive source (CS) for its successful datatransmissions (without channel outage) and Pa implies thetotal quantity of spectrum holes available for CS. Accordingly,(1 β Pout)/Pa can be seen as a measure to quantify thepercentage of spectrum holes utilized by CS for its successfuldata transmission. Furthermore, combining Eq. (21) and Eq.(37), one can see that πΌ is a parameter that can be optimized tomaximize the spectrum hole utilization efficiency. Obtaininga general expression for optimal spectrum sensing overhead,πΌopt, as a function of other parameters is challenging. Nev-
ertheless, the optimal value πΌopt can be determined throughnumerical calculations.
B. Analysis of The FFSS-BRDT Scheme
For the purpose of performance comparison, we also exam-ine the spectrum hole utilization efficiency of the FFSS-BRDTscheme. Since the difference between the SFSS-BRDT andFFSS-BRDT schemes lies the spectrum sensing phase only,we just need to investigate the spectrum sensing performanceof the FFSS-BRDT scheme. From Eq. (20), the overall proba-bility of detection of spectrum holes at CS using FFSS-BRDTscheme can be calculated as
Pdπ = Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»0}= Pr{οΏ½ΜοΏ½π (π, 1)
πβπ=1
οΏ½ΜοΏ½ππ (π, 2) = π»0β£π»π(π) = π»0}
= Pdπ ,1
πβπ=1
Pdππ ,2
(38)
where Pdππ ,2 = Pr{οΏ½ΜοΏ½π
π (π, 2) = π»0β£π»π(π) = π»0}. Similarly,from Eq. (20), the probability of false alarm of spectrum holesat CS is given by
Pfπ = Pr{οΏ½ΜοΏ½π (π) = π»0β£π»π(π) = π»1}= Pr{οΏ½ΜοΏ½π (π, 1)
πβπ=1
οΏ½ΜοΏ½ππ (π, 2) = π»0β£π»π(π) = π»1}
= Pfπ ,1
πβπ=1
Pfππ ,2
(39)
where Pfππ ,2 = Pr{οΏ½ΜοΏ½ππ (π, 2) = π»0β£π»π(π) = π»1}. Notice that
the relationship between Pdπ ,1 and Pfπ ,1 is described by Eq.(33). Moreover, substituting οΏ½ΜοΏ½π
π (π, 2) from Eq. (19) into Pdππ ,2
and Pfππ ,2 yields
Pdππ ,2 = Pr{οΏ½ΜοΏ½π(π, 1) = π»0β£π»π(π) = π»0}Pr{Ξππ (π, 2) = 0}
+ Pr{rand{π»0, π»1} = π»0β£π»π(π) = π»0}Pr{Ξππ (π, 2) = 1}= Pdπ,1 Pr{Ξππ (π, 2) = 0} +
1
2Pr{Ξππ (π, 2) = 1}
(40)
656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
and
Pfππ ,2 = Pr{οΏ½ΜοΏ½π(π, 1) = π»0β£π»π(π) = π»1}Pr{Ξππ (π, 2) = 0}+ Pr{rand{π»0, π»1} = π»0β£π»π(π) = π»1}Pr{Ξππ (π, 2) = 1}= Pfπ,1 Pr{Ξππ (π, 2) = 0} +
1
2Pr{Ξππ (π, 2) = 1}
(41)
where the false alarm probability, Pfπ,1, is depicted as a func-tion of the detection probability, Pdπ,1, as given by Eq. (34). Itis noted that an initial spectrum sensing result οΏ½ΜοΏ½π(π, 1) carries1-bit information only in an information-theoretic sense andthe time-bandwidth product of the common control channel isπ΅πππ. Thus, the transmission rate of such an initial sensingresult over the common control channel is given by 1/(π΅πππ).Moreover, as mentioned in the paragraph below Eq. (19),Ξππ (π, 2) = 0 denotes that no outage event occurs over thechannel from the CRπ to CS. In addition, from Eq. (18), theprobability of occurrence of Ξππ (π, 2) = 0 is calculated as
Pr{Ξππ (π, 2) = 0} = Pr{ πΌ
2πlog2(1 + β£βππ (π)β£2πΎπ ) >
1
π΅πππ}
= exp(β Ξ
π2ππ
)
(42)
where Ξ = [22π/(πΌπ΅πππ) β 1]/πΎπ . From Eq. (42),Pr{Ξππ (π, 2) = 1} is easily found as 1 β Pr{Ξππ (π, 2) =0}. Hence, given a target value Pfπ ,thr and assuming eachcognitive user with the same detection performance, we canobtain solutions from Eq. (39) as Pfπ ,1 = (Pfπ ,thr)
1/(π+1)
and Pfππ ,2 = (Pfπ ,thr)1/(π+1), respectively. Substituting
Pfπ ,1 = (Pfπ ,thr)1/(π+1) into Eq. (33) easily obtains the
corresponding numerical solution to Pdπ ,1. Meanwhile, ap-plying Pfππ ,2 = (Pfπ ,thr)
1/(π+1) to Eq. (41) yields Pfπ,1 =
exp( Ξπ2ππ
)(Pfπ ,thr)1/(π+1) β 1
2 [exp( Ξπ2ππ
) β 1] and the corre-sponding detection probability Pdπ,1 can be found from Eq.(34), by using which a numerical Pdπ
π ,2 is determined fromEq. (40). Finally, substituting the results Pdπ ,1 and Pdπ
π ,2 intoEq. (38), we can obtain an overall detection probability Pdπ
under a given target false alarm probability Pfπ ,thr. Now, wehave completed the analysis of spectrum sensing performancefor the FFSS-BRDT scheme. Note that the outage probabilityanalysis of the FFSS-BRDT scheme differs from that of theSFSS-BRDT scheme only in the terms Pdπ and Pfπ . There-fore, a closed-form expression of the spectrum hole utilizationefficiency for the FFSS-BRDT scheme can be obtained fromEq. (37) with the replacement of Eqs. (29) and (30) by Eqs.(38) and (39), respectively.
IV. NUMERICAL AND SIMULATION RESULTS
In this section, we conduct numerical evaluations for theSFSS-BRDT and the FFSS-BRDT schemes, showing theadvantages of the former scheme. Notice that the primaryuser will be interfered by the cognitive users when a falsealarm of spectrum holes occurs at CS. Therefore, the falsealarm probability Pfπ shall be set to be below a requiredvalue by the cognitive system to guarantee a primary quality-of-service (QoS) requirement. We use Pfπ = 10β3 in thefollowing numerical evaluations. In addition, we demonstrate
10β4
10β3
10β2
10β1
10β6
10β5
10β4
10β3
10β2
10β1
100
False alarm probability (Pfs)
Mis
dete
ctio
n pr
obab
ility
(1β
Pd s)
NonβcooperationFFSSβBRDT with M=2SFSSβBRDT with M=2FFSSβBRDT with M=4SFSSβBRDT with M=4FFSSβBRDT with M=6SFSSβBRDT with M=6
M = 6
M = 4
M = 2
Fig. 3. The misdetection probability (1β Pdπ ) versus the false alarm prob-ability (Pfπ ) of the non-cooperation, the SFSS-BRDT and the FFSS-BRDTschemes for the different number of cognitive relays π with Pa = 0.6,πΎπ = 20 dB, πΌ = 0.5, π΅πππ = 100, and π2
ππ = π2ππ = π2
ππ = 1.
that a maximum spectrum hole utilization efficiency can beachieved through an optimization of the spectrum sensingoverhead.
Fig. 3 depicts the misdetection probability (1βPdπ ) versusthe false alarm probability (Pfπ ) of the SFSS-BRDT andthe FFSS-BRDT schemes. The performance curve of thenon-cooperation scheme is also plotted in this figure. FromFig. 3, one can see that the SFSS-BRDT scheme performsbetter than both the FFSS-BRDT and the non-cooperationschemes. It is also shown from Fig. 3 that the misdetectionprobability curves of the FFSS-BRDT scheme correspondingto π = 2, 4 and 6 converge to their floors, respectively,in high false alarm probability regions. As the number ofcognitive relays increases from π = 2 to 6, the misdetectionprobability floor increases. This is because that the channeloutages will occur during the transmission of initial spectrumsensing results from CRs to CS, which results in the initialsensing results received at CS in error. Since the FFSS-BRDT scheme can not recognize such errors, it in turnimpairs the fusion performance of the FFSS-BRDT scheme.Moreover, the occurrence of these errors is independent of thefalse alarm probability and becomes the dominant factor toadversely affect the sensing performance in high false alarmprobability regions, thus causing a misdetection probabilityfloor for the FFSS-BRDT scheme. In contrast, the SFSS-BRDT scheme is able to identify and discard these errors byCRC checking, thus no misdetection probability floor occursfor the SFSS-BRDT scheme. In addition, with an increasednumber of cognitive relays and under fixed/limited commoncontrol channel resources, the probability of occurrence ofsuch an error increases due to the fewer common controlchannel resources assigned for each CR, which finally leadsto an increase of the misdetection probability floor for theFFSS-BRDT scheme.
In Fig. 4, we show the detection probability versus thenumber of CRs of the SFSS-BRDT and the FFSS-BRDTschemes with a required false alarm probability Pfπ = 10β3.
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 657
0 5 10 15 200.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
The number of CRs (M)
Det
ectio
n pr
obab
ility
(P
d s)
SFSSβBRDTFFSSβBRDT
Fig. 4. The detection probability versus the number of cognitive relays ofthe SFSS-BRDT and the FFSS-BRDT schemes for different π΅πππ valueswith Pa = 0.6, Pfs = 10β3, πΎπ = 20 dB, πΌ = 0.5, π΅πππ = 100, andπ2ππ = π2
ππ = π2ππ = 1.
All cases in Fig. 4 clearly show that, when the number ofCRs is smaller than a critical value, the detection probabilitiesof the SFSS-BRDT are nearly identical to that of the FFSS-BRDT scheme. One can also observe from Fig. 4 that, asthe number of cognitive relays continues increasing afterthe critical value, the detection probability of the FFSS-BRDT scheme starts to degrade. This is due to the fact that,with an increased number of CRs and a limited commoncontrol channel resources, the channel outage events occurredduring the transmission of initial sensing results become morefrequent, leading to more initial sensing results received atCS in error. It then becomes the dominant factor adverselyaffecting the FFSS-BRDTβs sensing performance, since thisscheme can not recognize if the received initial sensing resultat CS from a CR is in error or not. However, the SFSS-BRDTscheme is able to identify and discard such errors by CRCchecking, and thus is not affected by this adverse factor.
Fig. 5 shows the spectrum hole utilization efficiency versusthe secondary SNR (πΎπ ) of the non-cooperation, SFSS-BRDTand FFSS-BRDT schemes with a false alarm probability con-straint Pfπ = 10β3, where the time-bandwidth products of thelicensed channel and common control channel are π΅π = 500and π΅πππ = 100, respectively. This considers that the cogni-tive radio is typically designed to reuse the licensed spectrumwith very limited dedicated channel resources. We also providethe simulated spectrum hole utilization efficiency results byusing a typical link-level simulation approach. As observedfrom Fig. 5, in low SNR regions, both the SFSS-BRDT andFFSS-BRDT schemes perform worse than the non-cooperationscheme in terms of the spectrum hole utilization efficiency.This is because that a half-duplex relaying mode is adopted,which would degrade the system performance due to theinefficient duplexing method. However, in higher SNR regions,the relay benefits achieved overtake the performance cost dueto the half-duplexing constraint and thus the SFSS-BRDT andFFSS-BRDT schemes outperform the non-cooperation. Also,it can be seen from Fig. 5 that the spectrum hole utilization
0 5 10 15 200
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Secondary SNR (Ξ³s)
Spe
ctru
m h
ole
utili
zatio
n ef
ficie
ncy
(Ξ·)
SFSSβBRDT with M=8 (numer.)SFSSβBRDT with M=8 (simul.)FFSSβBRDT with M=8 (numer.)FFSSβBRDT with M=8 (simul.)SFSSβBRDT with M=4 (numer.)SFSSβBRDT with M=4 (simul.)FFSSβBRDT with M=4 (numer.)FFSSβBRDT with M=4 (simul.)Nonβcooperation (numer.)Nonβcooperation (simul.)
Fig. 5. Spectrum hole utilization efficiency versus the secondary SNR πΎπ of the non-cooperation, the SFSS-BRDT and the FFSS-BRDT schemes fordifferent number of cognitive relays π with Pa = 0.6, Pfπ = 10β3, πΎπ =20 dB, π = 1 bit/s/Hz, πΌ = 0.5, π΅π = 500, π΅πππ = 100, and π2
ππ =π2ππ = π2
ππ = π2π π = π2
π π = π2ππ = π2
ππ = 1.
0 5 10 15 200.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
The number of CRs (M)
Spe
ctru
m h
ole
utili
zatio
n ef
ficie
ncy
(Ξ·)
SFSSβBRDTFFSSβBRDT
Fig. 6. Spectrum hole utilization efficiency versus the number of cognitiverelays π of the SFSS-BRDT and the FFSS-BRDT schemes with Pa = 0.6,Pfπ = 10β3, πΎπ = 20 dB, πΎπ = 15 dB, π = 1 bit/s/Hz, πΌ = 0.5, π΅π =500, π΅πππ = 100, and π2
ππ = π2ππ = π2
ππ = π2π π = π2
π π = π2ππ = π2
ππ = 1.
efficiency of the SFSS-BRDT scheme is higher than that ofthe FFSS-BRDT scheme and, moreover, the performance gapbetween the two schemes enlarges as the number of cognitiverelays increases from π = 4 to 8. In addition, the simulationsmatch the analytic results very well, showing the accuracyof the derived closed-form expressions of the spectrum holeutilization efficiency.
In Fig. 6, we illustrate the spectrum hole utilization effi-ciency of the SFSS-BRDT and FFSS-BRDT schemes versusthe number of CRs with a false alarm probability constraintPfπ = 10β3. One can see from Fig. 6 that, when the numberof cognitive relays is below a certain value, the spectrum holeutilization efficiency of the SFSS-BRDT scheme is almostthe same as that of the FFSS-BRDT scheme. However, as
658 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
0 0.2 0.4 0.6 0.8 10
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Spectrum sensing overhead (Ξ±)
Spe
ctru
m h
ole
utili
zatio
n ef
ficie
ncy
(Ξ·)
SFSSβBRDT schemeFFSSβBRDT scheme
R=1 bit/s/HzR=1.5 bit/s/Hz
Fig. 7. Spectrum hole utilization efficiency versus the spectrum sensingoverhead πΌ of the SFSS-BRDT and the FFSS-BRDT schemes for differentdata rates π with Pa = 0.6, Pfπ = 10β3, πΎπ = 20 dB, πΎπ = 15 dB,π΅π = 500, π΅πππ = 100, π = 4, and π2
ππ = π2ππ = π2
ππ = π2π π = π2
π π =
π2ππ = π2
ππ = 1.
the number of CRs continues increasing after a critical value,the FFSS-BRDT schemeβs performance begins to degrade andperforms noticeably worse than the SFSS-BRDT scheme. Thisis because that, with an increased number of CRs, the channeloutages occurred from CRs to CS will eventually be significantand result in many initial sensing results received at CS inerror. Since the FFSS-BRDT scheme can not recognize anddiscard these errors, it causes the spectrum hole detectionfailure and in turn affects adversely the spectrum hole utiliza-tion efficiency. In contrast, the SFSS-BRDT scheme is able toidentify whether an initial sensing result received at CS froma CR is correct or not by the CRC checking, whose spectrumhole utilization efficiency is thus not degraded even with alarge number of cognitive relays.
Fig. 7 shows the spectrum hole utilization efficiency versusthe spectrum sensing overhead of the SFSS-BRDT and theFFSS-BRDT schemes for different data rates, where the twocurve pairs plotted correspond to π = 1 bit/s/Hz and π =1.5 bit/s/Hz, respectively. As shown in Fig. 7, there alwaysexists an optimal spectrum sensing overhead to maximize thespectrum hole utilization efficiency for both the SFSS-BRDTand the FFSS-BRDT schemes. Therefore, a joint analysisof the two phases (i.e., the spectrum sensing and the datatransmission phases) in terms of the spectrum hole utilizationefficiency is essential to optimize the overall performanceof cognitive transmissions. Fig. 7 also demonstrates that,no matter which scheme (SFSS-BRDT or FFSS-BRDT) isused, the optimal spectrum sensing overhead correspondingto π = 1.5 bit/s/Hz is smaller than that for π = 1 bit/s/Hz.This is due to the fact that as the data rate π increases, thedata transmission phase should be allocated a relatively longertime duration, which results in less time available for thespectrum sensing phase. In addition, it is shown from Fig.7 that the spectrum hole utilization efficiency of the SFSS-BRDT scheme is always higher than that of the FFSS-BRDTscheme.
V. CONCLUSION
In this paper, we have investigated two cognitive trans-mission schemes for multiple-relay cognitive radio networks,i.e., the selective fusion spectrum sensing and best relay datatransmission scheme and the fixed fusion spectrum sensingand best relay data transmission scheme. We have derivedclosed-form expressions of the spectrum hole utilization ef-ficiency for the two schemes over Rayleigh fading channels.Numerical results have shown that the SFSS-BRDT schemeoutperforms the FFSS-BRDT scheme in terms of the spectrumhole utilization efficiency. Moreover, as the number of CRsincreases, the spectrum hole utilization efficiency of the FFSS-BRDT scheme improves initially and then begins to degrade.In contrast, the SFSS-BRDTβs performance always improveswith an increase of the number of CRs, which further verifiesits advantage over the FFSS-BRDT scheme. In addition, ithas been shown that a maximum spectrum hole utilizationefficiency is achieved through an optimization of the spectrumsensing overhead.
APPENDIX APROOF OF EQ. (28)
We can rewrite Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β β£βπ π(π)β£2 +
2β£βππ(π)β£2πΎπΞ} as Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β π₯}, where
π₯ = β£βπ π(π)β£2 β 2β£βππ(π)β£2πΎπΞ. Notice that RVs β£βπ π(π)β£2and β£βππ(π)β£2 follow exponential distribution with parameters1/π2
π π and 1/π2ππ, respectively. Hence, the probability density
function of RV π₯ can be given by
π(π₯) =
β§β¨β©
1
π2π π + 2π2
πππΎπΞexp(β π₯
π2π π
), π₯ β₯ 0
1
2π2πππΎπΞ + π2
π π
exp(π₯
2π2πππΎπΞ
), otherwise
(A.1)Thus, we obtain
Pr{maxπβπ·π
β£βππ(π)β£2 < 2Ξ β π₯}
=
β« Ξ
ββ
βπβπ·π
[1 β exp(β2Ξ β π₯
π2ππ
)]π(π₯)ππ₯
= Aπ + Bπ
(A.2)
where the terms Aπ and Bπ are given by
Aπ =
β« 0
ββ
Ξ¨
2π2πππΎπΞ + π2
π π
exp(π₯
2π2πππΎπΞ
)ππ₯ (A.3)
and
Bπ =
β« Ξ
0
Ξ¨
π2π π + 2π2
πππΎπΞexp(β π₯
π2π π
)ππ₯ (A.4)
wherein the parameter Ξ¨ is given by
Ξ¨ = 1 +
2β£π·πβ£β1βπ=1
(β1)β£ππ(π)β£ exp(ββ
πβππ(π)
2Ξ β π₯
π2ππ
) (A.5)
where ππ(π) is the π-th non-empty subcollection of theelements of π·π and β£ππ(π)β£ is the number of the elementsin ππ(π). In obtaining Eq. (A.5), we have used binomial
ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 659
expansion formula. Substituting Ξ¨ from Eq. (A.5) into Eq.(A.3) yields
Aπ = Ξ +
2β£π·πβ£β1βπ=1
(β1)β£ππ(π)β£Ξ
1 +β
πβππ(π)
2π2πππΎπΞ
π2ππ
exp(ββ
πβππ(π)
2Ξ
π2ππ
)
(A.6)
where Ξ =2π2
πππΎπΞ
2π2πππΎπΞ+π2
π π. Similarly, substituting Ξ¨ from Eq.
(A.5) into Eq. (A.4), we are able to obtain
Bπ =(1 β Ξ){1 β exp(β 2Ξ
π2π π
)
+
2β£π·πβ£β1βπ=1
(β1)β£ππ(π)β£π[π2π π, π
2ππ, ππ(π)]}
(A.7)
where π[π2π π, π
2ππ, ππ(π)] is given by
π[π2π π, π
2ππ, ππ(π)] =
β§β¨β©
2Ξ
π2π π
exp(β 2Ξ
π2π π
),β
πβππ(π)
1
π2ππ
=1
π2π π
exp(β βπβππ(π)
2Ξ
π2ππ
)β exp(β 2Ξ
π2π π
)
1β βπβππ(π)
π2π π
π2ππ
, others
(A.8)wherein Ξ = [22π /(1βπΌ) β 1]/πΎπ .
REFERENCES
[1] J. Mitola and G. Q. Maguire, βCognitive radio: making software radiosmore personal,β IEEE Personal Commun., vol. 6, pp. 13-18, 1999.
[2] IEEE 802.22 Working Group, βIEEE P802.22/D1.0 draft standard forwireless regional area networks part 22: cognitive wireless RAN mediumaccess control (MAC) and physical layer (PHY) specifications: policiesand procedures for operation in the TV bands,β Apr. 2008.
[3] J. Ma, Y. G. Li, and B. H. Juang, βSignal processing in cognitive radio,βProc. IEEE, vol. 97, no. 5, pp. 805-8023, 2009.
[4] Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, βSensing-throughputtradeoff for cognitive radio networks,β IEEE Trans. Wireless Commun.,vol. 7, no. 4, pp. 1326-1337, Apr. 2008.
[5] Y. Zou, Y.-D. Yao, and B. Zheng, βOutage probability analysis ofcognitive transmissions: the impact of spectrum sensing overhead,β IEEETrans. Wireless Commun., vol. 9, no. 8, pp. 2676-2688, Aug. 2010.
[6] V. I. Kostylev, βEnergy detection of a signal with random amptitude,βin Proc. IEEE Int. Conf. Commun., 2002.
[7] A. Fehske, J. D. Gaeddert, and J. H. Reed, βA new approach to signalclassification using spectral correlation and neural networks,β in Proc.IEEE DySPAN 2005, Nov. 2005, pp. 144-150.
[8] P. D. Sutton, K. E. Nolan, and L. E. Doyle, βCyclostationary signaturesin practical cognitive radio applications,β IEEE J. Sel. Areas Commun.,vol. 26, no. 1, pp. 13-24, 2008.
[9] A. Ghasemi and E. S. Sousa, βCollaborative spectrum sensing foropportunistic access in fading environment,β in Proc. IEEE DySPAN2005, pp. 131-136.
[10] G. Ganesan and Y. G. Li, βCooperative spectrum sensing in cognitiveradioβpart I: two user networks,β IEEE Trans. Wireless Commun., vol.6, no. 6, pp. 2204-2213, 2007.
[11] J. Ma, G. Zhao, and Y. Li, βSoft combination and detection forcooperative spectrum sensing in cognitive radio networks,β IEEE Trans.Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Nov. 2008.
[12] R. W. Pabst and B. H. Shultz, et al., βRelay-based deployment conceptsfor wireless and mobile broadband radio,β IEEE Commun. Mag., vol.42, no. 9, pp. 80-89, Sep. 2004.
[13] A. J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bolcskei, βAn overviewof MIMO communicationsβa key to Gigabit wireless,β Proc. IEEE, vol.92, no. 2, pp. 198-218, Feb. 2004.
[14] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, βCooperative diversityin wireless networks: efficient protocols and outage behavior,β IEEETrans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, 2004.
[15] A. Sendonaris, E. Erkip, and B. Aazhang, βUser cooperation diversityβpart I: system description,β IEEE Trans. commun., vol. 51, no. 11, pp.1927-1938, 2003.
[16] T. E. Hunter, S. Sanayei, and A. Nosratinia, βOutage analysis of codedcooperation,β IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 375-391, 2006.
[17] Y. Zou, B. Zheng, and J. Zhu, βOutage analysis of opportunistic cooper-ation over Rayleigh fading channels,β IEEE Trans. Wireless Commun.,vol. 8, no. 6, pp. 3077-3385, June 2009.
[18] Y. Zou, B. Zheng, and W.-P. Zhu, βAn opportunistic cooperation schemeand its BER analysis,β IEEE Trans. Wireless Commun., vol. 8, no. 9,pp. 4492-4497, Sep. 2009.
[19] A. Bletsas, H. Shin, M. Z. Win, and A. Lippman, βA simple cooperativediversity method based on network path selection,β IEEE J. Sel. AreasCommun., vol. 24, no. 3, pp. 659-672, Mar. 2006.
[20] E. Beres and R. S. Adve, βSelection cooperation in multi-sourcecooperative networks,β IEEE Trans. Wireless Commun., vol. 7, no. 1,pp. 118-127, 2008.
[21] S. Lkki and M. H. Ahmed, βPerformance of multiple-relay cooperativediversity systems with best relay selection over Rayleigh fading chan-nels,β EURASIP J. Advances in Signal Process., article ID 580368.
[22] Z. Tian and G. B. Giannakis, βA wavelet approach to wideband spectrumsensing for cognitive radios,β in Proc. IEEE CROWNCOM 2006, pp. 1-5.
Yulong Zou received his B.Eng. degree (with thehighest honor) in Information Engineering fromNanjing University of Posts and Telecommunica-tions (NUPT), Nanjing China, in 2006. He is cur-rently working toward his Ph.D. degrees, respec-tively, at the Institute of Signal Processing andTransmission of NUPT, Nanjing China, and theElectrical and Computer Engineering Departmentof Stevens Institute of Technology (SIT), NJ USA.His research interests span the broad area of scal-able wireless communication and networking, with
emphasis on cooperative relay technology. Recently, he focuses on theinvestigation of cooperative relay techniques in cognitive radio networks.
Yu-Dong Yao (Sβ88-Mβ88-SMβ94) has been withStevens Institute of Technology, Hoboken, New Jer-sey, since 2000 and is currently a professor anddepartment director of electrical and computer en-gineering. He is also a director of Stevensβ Wire-less Information Systems Engineering Laboratory(WISELAB). Previously, from 1989 and 1990, hewas at Carleton University, Ottawa, Canada, as aResearch Associate working on mobile radio com-munications. From 1990 to 1994, he was with SparAerospace Ltd., Montreal, Canada, where he was
involved in research on satellite communications. From 1994 to 2000, he waswith Qualcomm Inc., San Diego, CA, where he participated in research anddevelopment in wireless code-division multiple-access (CDMA) systems.
He holds one Chinese patent and twelve U.S. patents. His research interestsinclude wireless communications and networks, spread spectrum and CDMA,antenna arrays and beamforming, cognitive and software defined radio(CSDR), and digital signal processing for wireless systems. Dr. Yao was anAssociate Editor of IEEE Communications Letters and IEEE TRANSACTIONS
ON VEHICULAR TECHNOLOGY, and an Editor for IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS. He received the B.Eng. and M.Eng. degreesfrom Nanjing University of Posts and Telecommunications, Nanjing, China, in1982 and 1985, respectively, and the Ph.D. degree from Southeast University,Nanjing, China, in 1988, all in electrical engineering.
Baoyu Zheng received B.S. and M.S. degreesfrom the Department of Circuit and Signal System,NUPT, in 1969 and 1981, respectively. Since then,he has been engaged in teaching and researching atSignal and Information Processing. He is a full pro-fessor and doctoral advisor at NUPT. His researchinterests span the broad area of the intelligent signalprocessing, wireless network and signal processingfor modern communication, and the quantum signalprocessing.