2011 zou-yao-zheng-tw-648

12
648 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011 Cognitive Transmissions with Multiple Relays in Cognitive Radio Networks Yulong Zou, Student Member, IEEE, Yu-Dong Yao, Senior Member, IEEE, and Baoyu Zheng, Member, IEEE Abstractβ€”In cognitive radio networks, each cognitive trans- mission process typically requires two phases: the spectrum sensing phase and data transmission phase. In this paper, we investigate cognitive transmissions with multiple relays by jointly considering the two phases over Rayleigh fading channels. We study a selective fusion spectrum sensing and best relay data transmission (SFSS-BRDT) scheme in multiple-relay cognitive radio networks. Specifically, in the spectrum sensing phase, only the initial spectrum sensing results, which are received from the cognitive relays and decoded correctly at a cognitive source, are selected and used for fusion. In the data transmission phase, only the best relay is utilized to assist the cognitive source for data transmissions. Under the constraint of satisfying a required probability of false alarm of spectrum holes (for the protection of the primary user), we derive an exact closed-form expression of the spectrum hole utilization efficiency for the SFSS-BRDT scheme, which is used as a measure to quantify the percentage of spectrum holes utilized by the cognitive source for its successful data transmissions. For the comparison purpose, we also examine the spectrum hole utilization efficiency for a fixed fusion spectrum sensing and best relay data transmission (FFSS-BRDT) scheme, where all the initial spectrum sensing results are used for fusion without any refined selection. Numerical results show that, under a target probability of false alarm of spectrum holes, the SFSS- BRDT scheme outperforms the FFSS-BRDT scheme in terms of the spectrum hole utilization efficiency. Moreover, the spectrum hole utilization efficiency of the SFSS-BRDT scheme always improves as the number of cognitive relays increases, whereas the FFSS-BRDT scheme’s performance improves initially and degrades eventually after a critical number of cognitive relays. It is also shown that a maximum spectrum hole utilization efficiency can be achieved through an optimal allocation of the time durations between the spectrum sensing and data transmission phases for both the FFSS-BRDT and SFSS-BRDT schemes. Index Termsβ€”Cognitive transmissions, cognitive radio, multi- ple relays, spectrum sensing, best relay selection, spectrum hole utilization efficiency. Manuscript received May 16, 2010; revised August 4, 2010 and September 21, 2010; accepted November 15, 2010. The associate editor coordinating the review of this paper and approving it for publication was D. Hong. Y. Zou is with the Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210003, China, and with the Electrical and Computer Engineering Depart- ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail: [email protected], [email protected]). Y.-D. Yao is with the Electrical and Computer Engineering Depart- ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail: [email protected]). B. Zheng is with the Institute of Signal Processing and Transmission, Nan- jing University of Posts and Telecommunications, Nanjing, Jiangsu 210003, China (e-mail: [email protected]). This work was partially supported by the Postgraduate Innovation Pro- gram of Scientific Research of Jiangsu Province (Grant Nos. CX08B 080Z, CX09B 150Z) and the National Natural Science Foundation of China (Grant No. 60972039). Digital Object Identifier 10.1109/TWC.2010.120610.100830 I. I NTRODUCTION C OGNITIVE radio is emerging as a promising technol- ogy that enables unlicensed users, also referred to as cognitive users (or secondary users), to communicate with each other over licensed bands through detecting spectrum holes [1]-[3]. As discussed in [4] and [5], each cognitive transmission process typically consists of two essential phases: 1) a spectrum sensing phase, in which a cognitive source attempts to detect an available spectrum hole; and 2) a data transmission phase, in which the secondary data traffic is transmitted to a destination through the detected spectrum hole. The two individual phases have been studied extensively in terms of different sensing [6]-[11] or different transmission [12]-[21] techniques. However, the two individual phases can not be designed and optimized separately, since they affect each other [5]. To be specific, when an available spectrum hole is not perceived by the cognitive source during a certain time duration, the spectrum hole utilization efficiency will be impaired. We may increase the time duration of spectrum sensing phase to alle- viate the problem of misdetection of spectrum holes, which, however, comes at the expense of a transmission performance reduction since less time is now available for the data transmis- sion phase [5]. The work of [4] investigated the sensing-and- throughput tradeoff in terms of the maximization of secondary throughput with a primary user protection constraint, where a closed-form secondary throughput expression is derived over additive white Gaussian noise (AWGN) channels. In [5], we have explored the sensing-and-transmission tradeoff in two cognitive radio network scenarios (i.e., cognitive transmissions without relay and with single-relay), where closed-form outage probability expressions with a primary user protection con- straint are derived for the two scenarios considering Rayleigh fading environments. Notice that the cognitive transmissions with multiple relays are yet to be investigated in cognitive radio networks. In traditional (non-cognitive radio) multiple-relay networks, three relay protocols (i.e., fixed relaying, selection relaying and incremental relaying) have been studied extensively in [14]. The advantages of such relaying protocols are achieved at the cost of a reduction in spectral efficiency, since the relays used transmit on orthogonal channels to avoid interfering each other. To address the shortcoming of an inefficient utilization of the spectrum resource, a best-relay selection protocol has been investigated in [19]-[21], where only the β€œbest” relay is selected to forward a source node’s signal and thus only two channels (i.e., the best relay link and direct link) are required regardless of the number of relays. It has been shown in [19] 1536-1276/11$25.00 c ⃝ 2011 IEEE

Transcript of 2011 zou-yao-zheng-tw-648

Page 1: 2011 zou-yao-zheng-tw-648

648 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

Cognitive Transmissions with Multiple Relays inCognitive Radio Networks

Yulong Zou, Student Member, IEEE, Yu-Dong Yao, Senior Member, IEEE, and Baoyu Zheng, Member, IEEE

Abstractβ€”In cognitive radio networks, each cognitive trans-mission process typically requires two phases: the spectrumsensing phase and data transmission phase. In this paper, weinvestigate cognitive transmissions with multiple relays by jointlyconsidering the two phases over Rayleigh fading channels. Westudy a selective fusion spectrum sensing and best relay datatransmission (SFSS-BRDT) scheme in multiple-relay cognitiveradio networks. Specifically, in the spectrum sensing phase, onlythe initial spectrum sensing results, which are received from thecognitive relays and decoded correctly at a cognitive source, areselected and used for fusion. In the data transmission phase,only the best relay is utilized to assist the cognitive source fordata transmissions. Under the constraint of satisfying a requiredprobability of false alarm of spectrum holes (for the protectionof the primary user), we derive an exact closed-form expressionof the spectrum hole utilization efficiency for the SFSS-BRDTscheme, which is used as a measure to quantify the percentageof spectrum holes utilized by the cognitive source for its successfuldata transmissions. For the comparison purpose, we also examinethe spectrum hole utilization efficiency for a fixed fusion spectrumsensing and best relay data transmission (FFSS-BRDT) scheme,where all the initial spectrum sensing results are used for fusionwithout any refined selection. Numerical results show that, undera target probability of false alarm of spectrum holes, the SFSS-BRDT scheme outperforms the FFSS-BRDT scheme in terms ofthe spectrum hole utilization efficiency. Moreover, the spectrumhole utilization efficiency of the SFSS-BRDT scheme alwaysimproves as the number of cognitive relays increases, whereasthe FFSS-BRDT scheme’s performance improves initially anddegrades eventually after a critical number of cognitive relays. Itis also shown that a maximum spectrum hole utilization efficiencycan be achieved through an optimal allocation of the timedurations between the spectrum sensing and data transmissionphases for both the FFSS-BRDT and SFSS-BRDT schemes.

Index Termsβ€”Cognitive transmissions, cognitive radio, multi-ple relays, spectrum sensing, best relay selection, spectrum holeutilization efficiency.

Manuscript received May 16, 2010; revised August 4, 2010 and September21, 2010; accepted November 15, 2010. The associate editor coordinating thereview of this paper and approving it for publication was D. Hong.

Y. Zou is with the Institute of Signal Processing and Transmission,Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu210003, China, and with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected], [email protected]).

Y.-D. Yao is with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected]).

B. Zheng is with the Institute of Signal Processing and Transmission, Nan-jing University of Posts and Telecommunications, Nanjing, Jiangsu 210003,China (e-mail: [email protected]).

This work was partially supported by the Postgraduate Innovation Pro-gram of Scientific Research of Jiangsu Province (Grant Nos. CX08B 080Z,CX09B 150Z) and the National Natural Science Foundation of China (GrantNo. 60972039).

Digital Object Identifier 10.1109/TWC.2010.120610.100830

I. INTRODUCTION

COGNITIVE radio is emerging as a promising technol-ogy that enables unlicensed users, also referred to as

cognitive users (or secondary users), to communicate witheach other over licensed bands through detecting spectrumholes [1]-[3]. As discussed in [4] and [5], each cognitivetransmission process typically consists of two essential phases:1) a spectrum sensing phase, in which a cognitive sourceattempts to detect an available spectrum hole; and 2) a datatransmission phase, in which the secondary data traffic istransmitted to a destination through the detected spectrumhole. The two individual phases have been studied extensivelyin terms of different sensing [6]-[11] or different transmission[12]-[21] techniques.

However, the two individual phases can not be designedand optimized separately, since they affect each other [5]. Tobe specific, when an available spectrum hole is not perceivedby the cognitive source during a certain time duration, thespectrum hole utilization efficiency will be impaired. We mayincrease the time duration of spectrum sensing phase to alle-viate the problem of misdetection of spectrum holes, which,however, comes at the expense of a transmission performancereduction since less time is now available for the data transmis-sion phase [5]. The work of [4] investigated the sensing-and-throughput tradeoff in terms of the maximization of secondarythroughput with a primary user protection constraint, where aclosed-form secondary throughput expression is derived overadditive white Gaussian noise (AWGN) channels. In [5], wehave explored the sensing-and-transmission tradeoff in twocognitive radio network scenarios (i.e., cognitive transmissionswithout relay and with single-relay), where closed-form outageprobability expressions with a primary user protection con-straint are derived for the two scenarios considering Rayleighfading environments. Notice that the cognitive transmissionswith multiple relays are yet to be investigated in cognitiveradio networks.

In traditional (non-cognitive radio) multiple-relay networks,three relay protocols (i.e., fixed relaying, selection relayingand incremental relaying) have been studied extensively in[14]. The advantages of such relaying protocols are achievedat the cost of a reduction in spectral efficiency, since the relaysused transmit on orthogonal channels to avoid interfering eachother. To address the shortcoming of an inefficient utilizationof the spectrum resource, a best-relay selection protocol hasbeen investigated in [19]-[21], where only the β€œbest” relay isselected to forward a source node’s signal and thus only twochannels (i.e., the best relay link and direct link) are requiredregardless of the number of relays. It has been shown in [19]

1536-1276/11$25.00 c⃝ 2011 IEEE

Page 2: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 649

that the best-relay selection scheme can achieve the samediversity-multiplexing tradeoff performance as the traditionalprotocols where all relays are involved in forwarding thesource node’s signal. Accordingly, the best-relay selection isalso an attractive relay protocol for cognitive radio networksdue to its spectrum efficiency. However, compared with thebest-relay transmission in traditional wireless networks, cog-nitive radio networks face an additional challenging issue, i.e.,mutual interference between the primary and the cognitiveusers, especially in a relay network scenario.

In addition, the existing cooperative spectrum sensing works[9], [11] assume the perfect transmission of initial spectrumsensing results to a fusion center over a dedicated channel(also called common control channel). Although the initialsensing results consist of only a few information bits, the cog-nitive users should scan the licensed channel periodically (e.g.,in millisecond scale) [2], which results in a non-negligiblerate of the initial sensing result transmission. Moreover, thecommon control channel resources are typically limited andwireless fading should be considered, thus the assumption ofperfect transmission of initial sensing results is not valid inpractical cognitive radio systems.

In this paper, we investigate the cognitive transmissions withmultiple relays by jointly considering the spectrum sensingand data transmissions phases over Rayleigh fading channels.The main contributions of this paper are described as follows.First, we study a selective fusion spectrum sensing and bestrelay data transmission (SFSS-BRDT) scheme, where only theinitial spectrum sensing results (from the multiple cognitiverelays) received and decoded successfully at the cognitivesource are used for fusion and then only the best relay is se-lected to assist the cognitive source for its data transmissions.Second, an exact closed-form expression of the spectrum holeutilization efficiency, which is used as a measure to quantifythe percentage of spectrum holes utilized, is derived for theSFSS-BRDT scheme to evaluate its performance. Third, forthe purpose of performance comparison, we further investigatea fixed fusion spectrum sensing and best relay data transmis-sion (FFSS-BRDT) scheme, where the difference from theSFSS-BRDT scheme lies that all initial sensing results fromthe cognitive relays are used for fusion without any refinedselection. Finally, we also derive a closed-form expression ofthe spectrum hole utilization efficiency for the FFSS-BRDTscheme over Rayleigh fading channels.

The remainder of this paper is organized as follows. In Sec-tion II, we describe the system model of cognitive transmis-sions and present the signal modeling for the SFSS-BRDT aswell as the FFSS-BRDT schemes. Section III derives closed-form expressions of the spectrum hole utilization efficiencyfor the SFSS-BRDT and FFSS-BRDT schemes over Rayleighfading channels. Next, in Section IV, we conduct the numericalevaluations and computer simulations for the spectrum holeutilization efficiency of the SFSS-BRDT and FFSS-BRDTschemes, showing the advantage of the former scheme. Finally,we provide concluding remarks in Section V. The notationsused throughout this paper are illustrated in Table 1.

Fig. 1. Coexistence of a primary network and a cognitive radio network.

Fig. 2. Time slotted structure of the cognitive transmissions with multiplerelays.

II. COGNITIVE TRANSMISSION PROTOCOLS IN

MULTIPLE-RELAY COGNITIVE RADIO NETWORKS

A. System Description

As shown in Fig. 1, we consider a cognitive radio network,where multiple cognitive relays (CRs) are available to assist acognitive source (CS) for both the spectrum sensing and datatransmission phases, i.e., CRs first help CS detect a spectrumhole to find a transmission opportunity and then assist CSfor its data transmissions to a cognitive destination (CD).Following [14], [16] and considering for practicability, a half-duplex relaying mode is adopted for CRs. Notice that there are𝑀 CRs as denoted by β„› = {CRπ‘–βˆ£π‘– = 1, 2, β‹… β‹… β‹… ,𝑀}. Fig. 2 il-lustrates a time slotted structure of the cognitive transmissionswith multiple relays. In order to avoid interfering the primaryusers, we assume that there is a common control channelwhen CRs forward their initial spectrum sensing results toCS [11]. As seen from Fig. 2, each cognitive transmissionprocess includes two phases (i.e., the spectrum sensing anddata transmission phases), where the parameter 𝛼 is referredto as spectrum sensing overhead, which can be adjusted tooptimize the performance of cognitive transmissions.

Fig. 2 shows that the spectrum sensing phase consists of twosub-phases. In the first sub-phase, CS and CRs independentlydetect whether or not there is a spectrum hole. Then, inthe subsequent sub-phase, all CRs forward their detectionresults (also referred to as initial spectrum sensing results) toCS over 𝑀 orthogonal common control sub-channels. Here,we consider two fusion strategies for the spectrum sensing:selective fusion and fixed fusion. In the selective fusionspectrum sensing (SFSS) scheme, a forward error detectioncode (such as cyclic redundancy check) is utilized by CRs toencode their initial spectrum sensing results, in addition to aforward error correction code, e.g., Turbo code. The encodedbits are transmitted to CS which will decode the receivedsignals and combines the successfully decoded outcomes only,i.e., only the successfully decoded outcomes are selected and

Page 3: 2011 zou-yao-zheng-tw-648

650 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

TABLE ILIST OF THE NOTATIONS USED THROUGHOUT THIS PAPER.

, c cBT B T

mC

mD

( )pH k

0 1,H H

Λ† ( ,1)Λ† ( ,1)s

i

H k

H k

Λ† ( ,1)isH k

,1 ,1Pd ,Pfi i

,1 ,1Pd ,Pfs s

Pd , Pfs s

, s pP P

, s pΞ³ Ξ³

The time-bandwidth products of the licensed primary channel and the common controlchannel, respectively.

A non-empty set consisting of these cognitive relays whose initial spectrum sensing resultsare received and decoded successfully at a cognitive source.

A non-empty set consisting of these cognitive relays that are able to decode the signaltransmitted from the cognitive source.

Events representing the licensed channel being unoccupied and occupied by a primary user,respectively.

The initial spectrum sensing results detected by the cognitive source and i-th cognitive relay,respectively, at time slot k.

The decoded outcome of an initial spectrum sensing result received at the cognitive sourcefrom the i-th cognitive relay.

The individual probabilities of detection and false alarm of spectrum holes at the i-th cognitive relay, respectively.

The individual probabilities of detection and false alarm of spectrum holes at the cognitive source, respectively.

The overall probabilities of detection and false alarm of spectrum holes at the cognitive source after fusion, respectively.

The transmit powers at a secondary user and a primary user, respectively.

The transmit signal-to-noise ratios (SNR) at a secondary user and a primary user, respectively.

The status of the licensed primary channel at time slot k.

used for fusion. However, in the fixed fusion spectrum sensing(FFSS) scheme, only a forward error correction code is usedby CRs to encode their initial sensing results, and CS decodesthe received signals from CRs and combines all the decodedoutcomes based on a given fusion rule. Presently, there areseveral choices of fusion rule available, such as β€œAND”, β€œOR”, and majority rule in the literature [9], [11]. Note that anβ€œAND” fusion rule is used throughout this paper without theconsideration of other rules.

In the data transmission phase, we consider the use of a bestrelay data transmission (BRDT) strategy. As shown in Fig. 2,there are also two sub-phases for the data transmissions. Ifa spectrum hole was detected earlier (in the sensing phase),CS will start transmitting its data to CD and CRs in the firstdata transmission sub-phase. Then, all CRs attempt to decodethe CS’s signal and those CRs which decode successfullyconstitute a set 𝐷, called a decoding set. Notice that we canemploy a cyclic redundancy check code (CRC) to determinewhether a CR decodes its received signal successfully or not.Specifically, if the CRC checking passes at the CR, it is viewedas a successfully decoded relay and is added to the decodingset. Accordingly, the sample space of all the possible decodingsets is described as {𝐷 ∈ βˆ… βˆͺ π·π‘š, π‘š = 1, 2, β‹… β‹… β‹…2𝑀 βˆ’ 1},where βˆͺ represents set union, βˆ… is the empty set, and π·π‘š

is a non-empty subcollection of the 𝑀 cognitive relays.In the second data transmission sub-phase, if the decodingset (𝐷) is not empty, the best relay (i.e., with the highestinstantaneous signal-to-interference-plus-noise ratio) chosenwithin the decoding set will forward its decoded result to CD.If 𝐷 is empty, i.e., no relay is able to decode the CS’s signalsuccessfully, CS will repeat the transmission of the original

signal to CD through its direct link. Finally, CD combinesthe two copies of the received signals using the maximumratio combining (MRC) method, and gives an estimation ofthe original signal. The reason for choosing MRC is that itcan achieve a better performance compared with the othertwo combining methods, i.e., the selective diversity combining(SDC) and the equal gain combining (EGC).

It is noted that, although the scenario considered is with thesingle cognitive source-destination pair and somewhat specific,it can be applied and extended to a more generic scenariowith multiple cognitive source-destination pairs by designingan additional multiple access protocol. To be specific, if arandom access strategy is considered, we can allow multiplecognitive sources to independently sense the licensed channelwith the assistance of multiple relays. Then, the source whichfirst detects a spectrum hole starts its data transmissions byusing the best relay selection scheme. On the other hand, ifa static multiple access strategy is considered, the cognitivesources can cooperatively sense the licensed primary channeland then access the detected spectrum hole through a round-robin scheduling (or, an orthogonal channelization method).In addition, for the scenario consisting of multiple licensedprimary channels, a cognitive source is able to sense themultiple channels simultaneously by using filter banks [22].Once one (or more than one) spectrum hole was found, thecognitive source starts its data transmissions over the detectedspectrum hole.

Each wireless link between any two nodes as depicted inFig. 1 is modeled as a Rayleigh fading channel and the fadingprocess is considered as constant during one time slot. Theadditive white Gaussian noise (AWGN) at all receivers is

Page 4: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 651

modeled as a complex Gaussian random variable (RV) withzero mean and variance 𝑁0. For notational convenience, let𝐻𝑝(π‘˜) represent, for time slot π‘˜, whether or not there is aspectrum hole. Specifically, 𝐻𝑝(π‘˜) = 𝐻0 represents that aspectrum hole is available, i.e., the channel is unoccupied bythe primary user (PU); otherwise, 𝐻𝑝(π‘˜) = 𝐻1. We model𝐻𝑝(π‘˜) as a Bernoulli random variable with parameter Pa (theprobability of the channel being available for secondary users),i.e., Pr(𝐻𝑝(π‘˜) = 𝐻0) = Pa and Pr(𝐻𝑝(π‘˜) = 𝐻1) = 1 βˆ’ Pa.

B. Signal Modeling

1) Modeling of the SFSS-BRDT scheme: In the following,we first formulate the signal model of the SFSS-BRDTscheme, where the SFSS and BRDT strategies are used for thespectrum sensing and data transmission phases, respectively.In the first sub-phase of time slot π‘˜, the signal received at CSis expressed as

𝑦𝑠(π‘˜, 1) =√

π‘ƒπ‘β„Žπ‘π‘ (π‘˜)πœƒ(π‘˜, 1) + 𝑛𝑠(π‘˜, 1) (1)

where β„Žπ‘π‘ (π‘˜) is the fading coefficient of the channel from PUto CS, 𝑛𝑠(π‘˜, 1) is AWGN with zero mean and variance 𝑁0,and πœƒ(π‘˜, 1) is defined as

πœƒ(π‘˜, 1) =

{0, 𝐻𝑝(π‘˜) = 𝐻0

π‘₯𝑝(π‘˜, 1), 𝐻𝑝(π‘˜) = 𝐻1

where π‘₯𝑝(π‘˜, 1) is the transmit signal of PU in the first sub-phase of time slot π‘˜. Notice that 𝐻𝑝(π‘˜) = 𝐻0 denotes thatthe channel is unoccupied by PU and nothing is transmittedfrom PU, and 𝐻𝑝(π‘˜) = 𝐻1 represents that a PU signal istransmitted. Meanwhile, the signals received at all CRs canbe written as

𝑦𝑖(π‘˜, 1) =√

π‘ƒπ‘β„Žπ‘π‘–(π‘˜)πœƒ(π‘˜, 1) + 𝑛𝑖(π‘˜, 1), 𝑖 ∈ β„› (2)

where β„Žπ‘π‘–(π‘˜) is the fading coefficient of the channel from PUto CR𝑖 and 𝑛𝑖(π‘˜, 1) is AWGN with zero mean and variance𝑁0. Based on the received signals as given by Eq. (1) and Eq.(2), CS and CRs obtain their initial spectrum sensing results(as denoted by �̂�𝑠(π‘˜, 1) and �̂�𝑖(π‘˜, 1), respectively) by using agiven detection approach. At present, we have many choices ofdetector available, such as energy detector [6], matched filterdetector [3], and cyclostationary feature detector [7], [8]. Inthis paper, we use the energy detector [6], [10] to evaluate thespectrum sensing performance. The reasons for choosing theenergy detector are twofold: (1) We want to show the effect ofthe use of multiple relays for cognitive transmissions. Hence,the choice of detector is not critical; (2) We model the signalas a random variable with known variance, and thus the energydetector is optimal [10].

In the subsequent sub-phase, all CRs encode their initialresults by using a concatenated forward error detection andcorrection code (e.g., CRC-Turbo), giving an encoded bitstream that is mapped into a constellation symbol as denotedby π‘₯𝑖(π‘˜, 2) by using a certain modulation scheme (e.g., BPSKand QAM). Then, CRs transmit the modulated symbols to CSover 𝑀 orthogonal common control sub-channels. Hence, thereceived signals at CS from CRs can be expressed as

𝑦𝑖𝑠(π‘˜, 2) =√

π‘ƒπ‘ β„Žπ‘–π‘ (π‘˜)π‘₯𝑖(π‘˜, 2) + 𝑛𝑖𝑠(π‘˜, 2), 𝑖 ∈ β„› (3)

where β„Žπ‘–π‘ (π‘˜) is the fading coefficient of the channel fromCR𝑖 to CS, and 𝑛𝑖

𝑠(π‘˜, 2) is AWGN with zero mean andvariance 𝑁0. From Eq. (3), CS attempts to decode �̂�𝑖(π‘˜, 1)from its received signal and the decoded outcome (after Turbodecoding and CRC checking) is denoted by �̂�𝑖

𝑠(π‘˜, 2). Notethat, according to the coding theorem, if a channel outageevent occurs, i.e., channel capacity is smaller than data rate,the receiver is deemed to fail to decode and the CRC checkis assumed to fail to pass. For notational convenience, leta set 𝐢 represent the CRs whose initial sensing results arereceived and decoded successfully at CS. Accordingly, thesample space of such a set is given by {𝐢 ∈ βˆ… βˆͺ πΆπ‘š, π‘š =1, 2, β‹… β‹… β‹… , 2𝑀 βˆ’1}, where πΆπ‘š is a non-empty subcollection ofthe 𝑀 cognitive relays.

βˆ™ Case 𝐢 = βˆ…: This case corresponds to that CS fails to

decode any of the initial spectrum sensing results from CRs.Note that an initial sensing result �̂�𝑖(π‘˜, 1) carries 1-bitinformation only in an information-theoretic sense and thetime-bandwidth product of the common control channel is𝐡𝑐𝑇𝑐. Hence, the transmission rate of such an initial sensingresult over the common control channel is given by 1/(𝐡𝑐𝑇𝑐).Accordingly, the case 𝐢 = βˆ… can be described from Eq. (3)as

𝛼

2𝑀log2(1 + βˆ£β„Žπ‘–π‘ (π‘˜)∣2𝛾𝑠) <

1

𝐡𝑐𝑇𝑐, 𝑖 ∈ β„› (4)

where 𝛾𝑠 = 𝑃𝑠/𝑁0, and the factor 1/𝑀 is due to the fact thateach CR is assigned with 1/𝑀 fraction of the common controlchannel. Therefore, given that case 𝐢 = βˆ… has occurred, thefinal spectrum sensing result fused at CS, �̂�𝑠(π‘˜), is expressedas

�̂�𝑠(π‘˜βˆ£πΆ = βˆ…) = �̂�𝑠(π‘˜, 1) (5)

which implies that none of the CRs’ initial spectrum sensingresults is utilized for fusion at CS.

βˆ™ Case 𝐢 = πΆπ‘š: CS successfully decodes these initial

spectrum sensing results from the CRs in set 𝐢, i.e.,

𝛼

2𝑀log2(1 + βˆ£β„Žπ‘–π‘ (π‘˜)∣2𝛾𝑠) >

1

𝐡𝑐𝑇𝑐, 𝑖 ∈ πΆπ‘š

𝛼

2𝑀log2(1 + βˆ£β„Žπ‘—π‘ (π‘˜)∣2𝛾𝑠) <

1

𝐡𝑐𝑇𝑐, 𝑗 ∈ πΆπ‘š

(6)

where πΆπ‘š = β„› βˆ’ πΆπ‘š is the complementary set of πΆπ‘š. Inthe given case 𝐢 = πΆπ‘š, CS combines �̂�𝑠(π‘˜, 1) and �̂�𝑖

𝑠(π‘˜, 2)through a given fusion rule, leading to its final decision. Sincewe just want to show the sensing-transmission tradeoff in amultiple-relay cognitive radio network, the choice of fusionrule is not critical and an β€œAND” fusion is used throughout thispaper without the consideration of other rules, e.g., β€œOR” andmajority rule. Thus, the final sensing result �̂�𝑠(π‘˜) is expressedas

�̂�𝑠(π‘˜βˆ£πΆ = πΆπ‘š) = �̂�𝑠(π‘˜, 1) βŠ—π‘–βˆˆπΆπ‘š

�̂�𝑖(π‘˜, 1) (7)

which means that �̂�𝑠(π‘˜βˆ£πΆ = πΆπ‘š) = 𝐻0 (i.e., a spectrumhole is detected) if all initial spectrum sensing results implya spectrum hole available, and �̂�𝑠(π‘˜βˆ£πΆπ‘š) = 𝐻1 otherwise.Next, we develop signal modeling for the data transmissionphase of the SFSS-BRDT scheme. In the first part of the data

Page 5: 2011 zou-yao-zheng-tw-648

652 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

transmission, i.e., the third sub-phase of time slot π‘˜, the signalreceived at CD is expressed as

𝑦𝑑(π‘˜, 3) = β„Žπ‘ π‘‘(π‘˜)√

𝑃𝑠𝛽(π‘˜, 3)+β„Žπ‘π‘‘(π‘˜)√

π‘ƒπ‘πœƒ(π‘˜, 3)+𝑛𝑑(π‘˜, 3)(8)

where β„Žπ‘ π‘‘(π‘˜) and β„Žπ‘π‘‘(π‘˜) are the fading coefficients of thechannel from CS to CD and that from PU to CD, respectively,and the parameters 𝛽(π‘˜, 3) and πœƒ(π‘˜, 3) are defined as

𝛽(π‘˜, 3) =

{π‘₯𝑠(π‘˜), �̂�𝑠(π‘˜) = 𝐻0

0, �̂�𝑠(π‘˜) = 𝐻1

and

πœƒ(π‘˜, 3) =

{0, 𝐻𝑝(π‘˜) = 𝐻0

π‘₯𝑝(π‘˜, 3), 𝐻𝑝(π‘˜) = 𝐻1

where π‘₯𝑠(π‘˜) and π‘₯𝑝(π‘˜, 3) are the transmit signals of CS andPU, respectively. Meanwhile, the signals received at CRs canbe written as

𝑦𝑖(π‘˜, 3) = β„Žπ‘ π‘–(π‘˜)√

𝑃𝑠𝛽(π‘˜, 3) + β„Žπ‘π‘–(π‘˜)√

π‘ƒπ‘πœƒ(π‘˜, 3) + 𝑛𝑖(π‘˜, 3)(9)

where β„Žπ‘ π‘–(π‘˜) and β„Žπ‘π‘–(π‘˜) are the fading coefficients of thechannel from CS to CR𝑖 and that from PU to CR𝑖, respectively.In the fourth sub-phase, there are two possible cases for thedata transmission depending on whether or not the decodingset (𝐷) is empty. Let 𝐷 = βˆ… represent the first case of anempty decoding set and 𝐷 = π·π‘š correspond to the other case,where π·π‘š is a non-empty subcollection set of all cognitiverelays (CRs).

βˆ™ Case 𝐷 = βˆ…: This case corresponds to the scenario whereall CRs fail to decode CS’s signal from Eq. (9), implying

(1 βˆ’ 𝛼)

2log2(1 +

βˆ£β„Žπ‘ π‘–(π‘˜)∣2 𝛾𝑠 βˆ£π›½(π‘˜, 3)∣2βˆ£β„Žπ‘π‘–(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 3)∣2 + 1

) < 𝑅, 𝑖 ∈ β„›(10)

where 𝑅 is the data rate of CS, β„› represents a set consistingof all 𝑀 CRs, 𝛾𝑠 = 𝑃𝑠/𝑁0, and 𝛾𝑝 = 𝑃𝑝/𝑁0. In the givencase 𝐷 = βˆ…, CS will determine whether or not to repeat thetransmission of signal π‘₯𝑠(π‘˜) to CD depending on its finaldecision �̂�𝑠(π‘˜) obtained during the spectrum sensing phase,and thus the received signal at CD is given by

𝑦𝑑(π‘˜, 4∣𝐷 = βˆ…) =β„Žπ‘ π‘‘(π‘˜)√

𝑃𝑠𝛽(π‘˜, 4) + β„Žπ‘π‘‘(π‘˜)√

π‘ƒπ‘πœƒ(π‘˜, 4)

+ 𝑛𝑑(π‘˜, 4)(11)

where

𝛽(π‘˜, 4) =

{π‘₯𝑠(π‘˜), �̂�𝑠(π‘˜) = 𝐻0

0, �̂�𝑠(π‘˜) = 𝐻1

and

πœƒ(π‘˜, 4) =

{0, 𝐻𝑝(π‘˜) = 𝐻0

π‘₯𝑝(π‘˜, 4), 𝐻𝑝(π‘˜) = 𝐻1

By combining Eq. (8) and Eq. (11) with the maximum ratiocombining (MRC) method, CD can achieve an enhancedsignal version with a signal-to-interference-and-noise ratio(SINR) as given by

SINRd(𝐷 = βˆ…)

=βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 βˆ£π›½(π‘˜, 3)∣2 + βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 βˆ£π›½(π‘˜, 4)∣2

βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 3)∣2 + βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 4)∣2 + 2

(12)

βˆ™ Case 𝐷 = π·π‘š: This case corresponds to the scenario

where CRs in decoding set π·π‘š are able to decode CS’s signalsuccessfully, i.e.,

(1 βˆ’ 𝛼)

2log2(1 +

βˆ£β„Žπ‘ π‘–(π‘˜)∣2 𝛾𝑠 βˆ£π›½(π‘˜, 3)∣2βˆ£β„Žπ‘π‘–(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 3)∣2 + 1

) > 𝑅, 𝑖 ∈ π·π‘š

(1 βˆ’ 𝛼)

2log2(1 +

βˆ£β„Žπ‘ π‘—(π‘˜)∣2 𝛾𝑠 βˆ£π›½(π‘˜, 3)∣2βˆ£β„Žπ‘π‘—(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 3)∣2 + 1

) < 𝑅, 𝑗 ∈ οΏ½Μ„οΏ½π‘š

(13)

where οΏ½Μ„οΏ½π‘š = β„› βˆ’ π·π‘š is the complementary set of π·π‘š.Without loss of generality, consider that CR𝑖 is selected toforward its correctly decoded result. Hence, given that case𝐷 = π·π‘š occurred and CR𝑖 is selected, the signal received atCD in the fourth sub-phase is written as

𝑦𝑑(π‘˜, 4∣𝐷 = π·π‘š) =β„Žπ‘–π‘‘(π‘˜)√

𝑃𝑠π‘₯𝑠(π‘˜) + β„Žπ‘π‘‘(π‘˜)√

π‘ƒπ‘πœƒ(π‘˜, 4)

+ 𝑛𝑑(π‘˜, 4)(14)

where β„Žπ‘–π‘‘(π‘˜) is the fading coefficient of the channel fromCR𝑖 to CD. Combining Eq. (8) and Eq. (14) with MRC, thecorresponding received SINR is given by

SINRd(𝐷 = π·π‘š,CR𝑖)

=βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 + βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 𝛾𝑠

βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 3)∣2 + βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(π‘˜, 4)∣2 + 2

(15)

In obtaining Eq. (15), we have used 𝛽(π‘˜, 3) = π‘₯𝑠(π‘˜) in thegiven case 𝐷 = π·π‘š. In general, the relay, which successfullydecodes CS’s signal and achieves the highest received SINRat CD, is viewed as the β€œbest” one. As a consequence, thebest relay selection criterion is found as

Best relay = arg maxπ‘–βˆˆπ·π‘š

SINRd(𝐷 = π·π‘š,CR𝑖)

= arg maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 (16)

It is worth mentioning that using the best relay selectioncriterion as given above, we can further develop a specificrelay selection algorithm in a centralized or a distributed fash-ion. To be specific, for a centralized relay selection strategy,the cognitive source should maintain a table that consists ofall the cognitive relays and the related channel information(i.e., βˆ£β„Žπ‘–π‘‘(π‘˜)∣2). Note that such channel information could beestimated by the cognitive relays and then forwarded to thecognitive source over a feedback channel. After that, the bestcognitive relay can be easily determined by looking up thetable, which is called a centralized relay selection approach.For a distributed relay selection strategy, each cognitive relayshould maintain a timer [19] and set an initial value of thetimer in inverse proportional to βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 as given by Eq. (16),resulting in the best cognitive relay with the smallest initialvalue for its timer. Hence, the best cognitive relay exhaustsits timer earliest compared with the other relays, and thenbroadcasts a control packet to notify the cognitive source andother relays [19]. Hence, in the given case 𝐷 = π·π‘š, thereceived SINR at CD is given by

SINRd(𝐷 = π·π‘š) = maxπ‘–βˆˆπ·π‘š

SINRd(𝐷 = π·π‘š,CR𝑖) (17)

Page 6: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 653

where SINRd(𝐷 = π·π‘š,CR𝑖) is given by Eq. (15). Thiscompletes the model formulation for the SFSS-BRDT scheme.We next explain the signal modeling for the FFSS-BRDTscheme in the following subsection.

2) Modeling of the FFSS-BRDT scheme: As can be seenfrom the previous subsection, the difference between theSFSS-BRDT and the FFSS-BRDT schemes lies the spectrumsensing part. Thus, we only need to model the sensing phaseof the FFSS-BRDT scheme, since its transmission phase isidentical to the SFSS-BRDT scheme as modeled by Eqs. (6)- (16). For the FFSS strategy, only a forward error correctioncode (without an additional error detection code) is utilizedby CRs to encode their initial sensing results, leading to anencoded bit stream that is modulated to a constellation symboldenoted by 𝑧𝑖(π‘˜, 2). After that, CRs forward the modulatedsymbols to CS over 𝑀 orthogonal common control sub-channels. Thus, the received signals at CS from CRs can berepresented as

𝑦𝑖𝑠(π‘˜, 2) =√

π‘ƒπ‘ β„Žπ‘–π‘ (π‘˜)𝑧𝑖(π‘˜, 2) + 𝑛𝑖𝑠(π‘˜, 2), 𝑖 ∈ β„› (18)

Then, CS will attempt to decode �̂�𝑖(π‘˜, 1) based on its receivedsignal and the decoded outcome is denoted by �̂�𝑖

𝑠(π‘˜, 2), whichcan be given by

�̂�𝑖𝑠(π‘˜, 2) =

{�̂�𝑖(π‘˜, 1), Ξ˜π‘–π‘ (π‘˜, 2) = 0

rand{𝐻0, 𝐻1}, Ξ˜π‘–π‘ (π‘˜, 2) = 1(19)

where rand{𝐻0, 𝐻1} indicates the equiprobable selection ofan element from {𝐻0, 𝐻1}, Ξ˜π‘–π‘ (π‘˜, 2) = 0 denotes thatno outage occurs over the channel from CR𝑖 to CS, andΞ˜π‘–π‘ (π‘˜, 2) = 1 denotes an outage event occurring over thecorresponding channel. Finally, CS combines �̂�𝑠(π‘˜, 1) and�̂�𝑖

𝑠(π‘˜, 2) through a logical AND rule. Hence, the final spec-trum sensing result at CS, �̂�𝑠(π‘˜), is expressed as

�̂�𝑠(π‘˜) = �̂�𝑠(π‘˜, 1)π‘€βŠ—π‘–=1

�̂�𝑖𝑠(π‘˜, 2) (20)

We now have completed the signal modeling for both theSFSS-BRDT and the FFSS-BRDT schemes. In what follows,we focus on their performance analysis in Rayleigh fadingenvironments.

III. PERFORMANCE ANALYSIS OF THE SFSS-BRDT AND

FFSS-BRDT SCHEMES OVER RAYLEIGH FADING

CHANNELS

In this section, we first derive a closed-form outage prob-ability expression with a primary user protection constraintfor the SFSS-BRDT scheme over Rayleigh fading channels.Based on the derived outage probability, a performance metric,referred to as spectrum hole utilization efficiency, is definedand used to quantify the percentage of spectrum holes utilizedby the cognitive source for its successful data transmissionswithout channel outage. Finally, we also present the spectrumhole utilization efficiency analysis for the FFSS-BRDT schemeto make a performance comparison with the SFSS-BRDTscheme.

A. Analysis of The SFSS-BRDT Scheme

Following [14], [16], an outage event is considered to occurwhen channel capacity falls below data transmission rate 𝑅.Thus, the outage probability of the SFSS-BRDT scheme canbe calculated as

Pout = Pr

{1 βˆ’ 𝛼

2log2(1 + SINRd) < 𝑅

}= Pr {SINRd(𝐷 = βˆ…) < 𝛾𝑠Δ, 𝐷 = βˆ…}

+

2π‘€βˆ’1βˆ‘π‘š=1

Pr {SINRd(𝐷 = π·π‘š) < 𝛾𝑠Δ, 𝐷 = π·π‘š}(21)

where Ξ” = [22𝑅/(1βˆ’π›Ό) βˆ’ 1]/𝛾𝑠, SINRd(𝐷 = βˆ…) andSINRd(𝐷 = π·π‘š) are given by Eq. (12) and Eq. (17),respectively. Note that the factor 1/2 in the first equationof Eq. (19) is resulted from a half-duplex relay constraint[14], [16]. According to Eq. (10) and Eq. (12), the termPr{SINRd(𝐷 = βˆ…) < 𝛾𝑠Δ, 𝐷 = βˆ…} in Eq. (21) can beexpanded as

Pr {SINRd(𝐷 = βˆ…) < 𝛾𝑠Δ, 𝐷 = βˆ…}

= PaPd𝑠 Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ”}π‘€βˆπ‘–=1

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 < Ξ”}

+ (1 βˆ’ Pa)Pf𝑠 Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ < Ξ”}

Γ—π‘€βˆπ‘–=1

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘–(π‘˜)∣2𝛾𝑝Δ < Ξ”}

+ Pa(1 βˆ’ Pd𝑠) + (1 βˆ’ Pa)(1 βˆ’ Pf𝑠)

(22)

where Pa = Pr{𝐻𝑝(π‘˜) = 𝐻0} is the probability that there isa spectrum hole, Pd𝑠 = Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0} andPf𝑠 = Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1} are, respectively, theprobability of detection and false alarm of spectrum holes atCS. Notice that random variables (RVs) βˆ£β„Žπ‘ π‘‘(π‘˜)∣2, βˆ£β„Žπ‘ π‘–(π‘˜)∣2,βˆ£β„Žπ‘π‘‘(π‘˜)∣2 and βˆ£β„Žπ‘π‘–(π‘˜)∣2 follow exponential distributions withmeans 𝜎2

𝑠𝑑, 𝜎2𝑠𝑖, 𝜎

2𝑝𝑑 and 𝜎2

𝑝𝑖, respectively. Moreover, the dif-ference between two identically and exponentially distributedrandom variables has a Laplace distribution. Therefore, theprobabilities as given in Eq. (22) are calculated as

Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ”} = 1 βˆ’ exp(βˆ’ Ξ”

𝜎2𝑠𝑑

)

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 < Ξ”} = 1 βˆ’ exp(βˆ’ Ξ”

𝜎2𝑠𝑖

)

Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ < Ξ”}= 1 βˆ’ 𝜎2

𝑠𝑑

𝜎2𝑝𝑑𝛾𝑝Δ + 𝜎2

𝑠𝑑

exp(βˆ’ Ξ”

𝜎2𝑠𝑑

)

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘–(π‘˜)∣2𝛾𝑝Δ < Ξ”}= 1 βˆ’ 𝜎2

𝑠𝑖

𝜎2𝑝𝑖𝛾𝑝Δ + 𝜎2

𝑠𝑖

exp(βˆ’ Ξ”

𝜎2𝑠𝑖

)

(23)

Page 7: 2011 zou-yao-zheng-tw-648

654 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

From Eq. (13) and Eq. (17), the term Pr{SINRd(𝐷 = π·π‘š) <𝛾𝑠Δ, 𝐷 = π·π‘š} in Eq. (21) is found as

Pr {SINRd(𝐷 = π·π‘š) < 𝛾𝑠Δ, 𝐷 = π·π‘š}= PaPd𝑠 Pr{max

π‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2}

Γ—βˆ

π‘–βˆˆπ·π‘š

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 > Ξ”}∏

π‘—βˆˆοΏ½Μ„οΏ½π‘š

Pr{βˆ£β„Žπ‘ π‘—(π‘˜)∣2 < Ξ”}

+ (1 βˆ’ Pa)Pfπ‘ βˆ

π‘–βˆˆπ·π‘š

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘–(π‘˜)∣2𝛾𝑝Δ > Ξ”}

Γ—βˆ

π‘—βˆˆοΏ½Μ„οΏ½π‘š

Pr{βˆ£β„Žπ‘ π‘—(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘—(π‘˜)∣2𝛾𝑝Δ < Ξ”}

Γ— Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + 2βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ}(24)

wherein

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 > Ξ”} = exp(βˆ’ Ξ”

𝜎2𝑠𝑖

)

Pr{βˆ£β„Žπ‘ π‘—(π‘˜)∣2 < Ξ”} = 1 βˆ’ exp(βˆ’ Ξ”

𝜎2𝑠𝑗

)

Pr{βˆ£β„Žπ‘ π‘–(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘–(π‘˜)∣2𝛾𝑝Δ > Ξ”}=

𝜎2𝑠𝑖

𝜎2𝑝𝑖𝛾𝑝Δ + 𝜎2

𝑠𝑖

exp(βˆ’ Ξ”

𝜎2𝑠𝑖

)

Pr{βˆ£β„Žπ‘ π‘—(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘—(π‘˜)∣2𝛾𝑝Δ < Ξ”}

= 1 βˆ’ 𝜎2𝑠𝑗

𝜎2𝑝𝑗𝛾𝑝Δ + 𝜎2

𝑠𝑗

exp(βˆ’ Ξ”

𝜎2𝑠𝑗

)

(25)

Moreover, the probability Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’βˆ£β„Žπ‘ π‘‘(π‘˜)∣2} in Eq. (24) is calculated as

Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2}

=

∫ 2Ξ”

0

1

𝜎2𝑠𝑑

exp(βˆ’ π‘₯

𝜎2𝑠𝑑

)∏

π‘–βˆˆπ·π‘š

[1 βˆ’ exp(βˆ’2Ξ” βˆ’ π‘₯

𝜎2𝑖𝑑

)]𝑑π‘₯(26)

By using the binomial expansion formula, theterm

βˆπ‘–βˆˆπ·π‘š

[1 βˆ’ exp(βˆ’ 2Ξ”βˆ’π‘₯𝜎2𝑖𝑑

)] can be expressed as

1 +2βˆ£π·π‘šβˆ£βˆ’1βˆ‘

𝑛=1(βˆ’1)βˆ£π‘†π‘š(𝑛)∣ exp(βˆ’ βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

2Ξ”βˆ’π‘₯𝜎2𝑖𝑑

), where

βˆ£π·π‘šβˆ£ is the number of the elements in decoding set π·π‘š andπ‘†π‘š(𝑛) is the 𝑛-th non-empty subcollection of the elementsin π·π‘š. Substituting this result into the preceding equationand performing the integration yield

Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2} = 1 βˆ’ exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

+

2βˆ£π·π‘šβˆ£βˆ’1βˆ‘π‘›=1

(βˆ’1)βˆ£π‘†π‘š(𝑛)βˆ£πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)]

(27)

where πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)] is given by

πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)] =

⎧⎨⎩

2Ξ”

𝜎2𝑠𝑑

exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

),βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

1

𝜎2𝑖𝑑

=1

𝜎2𝑠𝑑

exp(βˆ’ βˆ‘π‘–βˆˆπ‘†π‘š(𝑛)

2Ξ”

𝜎2𝑖𝑑

)βˆ’ exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

1βˆ’ βˆ‘π‘–βˆˆπ‘†π‘š(𝑛)

𝜎2𝑠𝑑

𝜎2𝑖𝑑

, others

Besides, the probability Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + 2βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ} in Eq. (24) is given by (seeAppendix A for details)

Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + 2βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ}= Aπ‘š + Bπ‘š

(28)

where the closed-form expressions of Aπ‘š and Bπ‘š are givenby Eq. (A.6) and Eq. (A.7), respectively, in Appendix A.Now, we start to analyze Pd𝑠 and Pf𝑠 as given in Eq.(22) and Eq. (24). Considering Eqs. (5) and (7), an overallprobability of detection of spectrum holes at CS (Pd𝑠), calleddetection probability, can be calculated as Eq. (29), wherePd𝑠,1 = Pr{�̂�𝑠(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0} and Pd𝑖,1 =Pr{�̂�𝑖(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0} are the individual probabili-ties of detection of spectrum holes at CS and CR𝑖, respectively.Similarly, an overall probability of false alarm of spectrumholes at CS (Pf𝑠), called false alarm probability, is given byEq. (30), where Pf𝑠,1 = Pr{�̂�𝑠(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}and Pf𝑖,1 = Pr{�̂�𝑖(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1} are theindividual probabilities of false alarm of spectrum holes atCS and CR𝑖, respectively. Note that, throughout this paper,an energy detector [6], [10] is considered in evaluating theperformance of the spectrum sensing phase. Following [10],Pd𝑠,1 and Pf𝑠,1 can be represented from Eq. (1) as

Pd𝑠,1 = Pr{�̂�𝑠(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}= Pr{βˆ£π‘›π‘ (π‘˜, 1)∣2 < 𝛿} (31)

and

Pf𝑠,1 = Pr{�̂�𝑠(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}= Pr{𝛼

2π‘ƒπ‘βˆ£β„Žπ‘π‘ (π‘˜)∣2 + βˆ£π‘›π‘ (π‘˜, 1)∣2 < 𝛿} (32)

where 𝛿 is an energy detection threshold. From Eq. (31) andEq. (32), we can obtain

Pf𝑠,1 =

⎧⎨⎩

1 βˆ’ [1 βˆ’ ln(1 βˆ’ Pd𝑠,1)](1 βˆ’ Pd𝑠,1), π›ΌπœŽ2𝑝𝑠𝛾𝑝 = 4

1 βˆ’ 4(1 βˆ’ Pd𝑠,1)

4 βˆ’ π›ΌπœŽ2𝑝𝑠𝛾𝑝

βˆ’ π›ΌπœŽ2𝑝𝑠𝛾𝑝

π›ΌπœŽ2𝑝𝑠𝛾𝑝 βˆ’ 4

(1 βˆ’ Pd𝑠,1)4

π›ΌπœŽ2𝑝𝑠𝛾𝑝 , otherwise

(33)Similar to the derivation of Eq. (33) and following Eq. (2),we obtain

Pf𝑖,1 =

⎧⎨⎩

1 βˆ’ [1 βˆ’ ln(1 βˆ’ Pd𝑖,1)](1 βˆ’ Pd𝑖,1), π›ΌπœŽ2𝑝𝑖𝛾𝑝 = 4

1 βˆ’ 4(1 βˆ’ Pd𝑖,1)

4 βˆ’ π›ΌπœŽ2𝑝𝑖𝛾𝑝

βˆ’ π›ΌπœŽ2𝑝𝑖𝛾𝑝

π›ΌπœŽ2𝑝𝑖𝛾𝑝 βˆ’ 4

(1 βˆ’ Pd𝑖,1)4

π›ΌπœŽ2𝑝𝑖

𝛾𝑝 , otherwise

(34)In addition, Pr(𝐢 = βˆ…) and Pr(𝐢 = πΆπ‘š) are determined by

Pr(𝐢 = βˆ…) =

π‘€βˆπ‘–=1

[1 βˆ’ exp(βˆ’ Ξ›

𝜎2𝑖𝑠

)] (35)

Page 8: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 655

Pd𝑠 =Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}=Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0, 𝐢 = βˆ…}Pr(𝐢 = βˆ…βˆ£π»π‘(π‘˜) = 𝐻0)

+

2π‘€βˆ’1βˆ‘π‘š=1

Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0, 𝐢 = πΆπ‘š}Pr(𝐢 = πΆπ‘šβˆ£π»π‘(π‘˜) = 𝐻0)

= Pr(𝐢 = βˆ…)Pd𝑠,1 +

2π‘€βˆ’1βˆ‘π‘š=1

Pr(𝐢 = πΆπ‘š)Pd𝑠,1

βˆπ‘–βˆˆπΆπ‘š

Pd𝑖,1

(29)

Pf𝑠 =Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}=Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1, 𝐢 = βˆ…}Pr(𝐢 = βˆ…βˆ£π»π‘(π‘˜) = 𝐻1)

+

2π‘€βˆ’1βˆ‘π‘š=1

Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1, 𝐢 = πΆπ‘š}Pr(𝐢 = πΆπ‘šβˆ£π»π‘(π‘˜) = 𝐻1)

= Pr(𝐢 = βˆ…)Pf𝑠,1 +

2π‘€βˆ’1βˆ‘π‘š=1

Pr(𝐢 = πΆπ‘š)Pf𝑠,1∏

π‘–βˆˆπΆπ‘š

Pf𝑖,1

(30)

and

Pr(𝐢 = πΆπ‘š) =∏

π‘–βˆˆπΆπ‘š

exp(βˆ’ Ξ›

𝜎2𝑖𝑠

)∏

π‘—βˆˆπΆπ‘š

[1 βˆ’ exp(βˆ’ Ξ›

𝜎2𝑗𝑠

)]

(36)where Ξ› = [22𝑀/(𝛼𝐡𝑐𝑇𝑐) βˆ’ 1]/𝛾𝑠. Clearly, if there is a falsealarm of spectrum holes, the CS will start its data traffic trans-missions and thus interferes with the primary user. Accord-ingly, for the protection of the primary user, the overall falsealarm probability shall be guaranteed to be below a requiredtarget value. Given a target value Pf𝑠,thr and assuming that thesensing performance at CS associated with each possible set 𝐢is guaranteed with the same false alarm requirement, we canobtain solutions from Eq. (30) as Pf𝑠,1 = (Pf𝑠,thr)

1/(∣𝐢∣+1)

and Pf𝑖,1 = (Pf𝑠,thr)1/(∣𝐢∣+1), respectively, where ∣𝐢∣ is the

number of CRs in set 𝐢. Substituting Pf𝑠,1 = (Pf𝑠,thr)1/(∣𝐢∣+1)

and Pf𝑖,1 = (Pf𝑠,thr)1/(∣𝐢∣+1) into Eqs. (33) and (34), we can

obtain the numerical solutions to Pd𝑠,1 and Pd𝑖,1, by usingwhich an overall detection probability Pd𝑠 is determined fromEq. (29) under a given target false alarm probability Pf𝑠,thr.

Now, we have completed the analysis of spectrum sensingperformance for the SFSS-BRDT scheme. Now, we havederived a closed-form expression of the outage probabilityfor the SFSS-BRDT scheme. Based on the derived outageprobability, a spectrum hole utilization efficiency is defined as

πœ‚ =1 βˆ’ Pout

Pa(37)

where 1 βˆ’ Pout indicates the quantity of spectrum holes thatare utilized by the cognitive source (CS) for its successful datatransmissions (without channel outage) and Pa implies thetotal quantity of spectrum holes available for CS. Accordingly,(1 βˆ’ Pout)/Pa can be seen as a measure to quantify thepercentage of spectrum holes utilized by CS for its successfuldata transmission. Furthermore, combining Eq. (21) and Eq.(37), one can see that 𝛼 is a parameter that can be optimized tomaximize the spectrum hole utilization efficiency. Obtaininga general expression for optimal spectrum sensing overhead,𝛼opt, as a function of other parameters is challenging. Nev-

ertheless, the optimal value 𝛼opt can be determined throughnumerical calculations.

B. Analysis of The FFSS-BRDT Scheme

For the purpose of performance comparison, we also exam-ine the spectrum hole utilization efficiency of the FFSS-BRDTscheme. Since the difference between the SFSS-BRDT andFFSS-BRDT schemes lies the spectrum sensing phase only,we just need to investigate the spectrum sensing performanceof the FFSS-BRDT scheme. From Eq. (20), the overall proba-bility of detection of spectrum holes at CS using FFSS-BRDTscheme can be calculated as

Pd𝑠 = Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}= Pr{�̂�𝑠(π‘˜, 1)

π‘€βŠ—π‘–=1

�̂�𝑖𝑠(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}

= Pd𝑠,1

π‘€βˆπ‘–=1

Pd𝑖𝑠,2

(38)

where Pd𝑖𝑠,2 = Pr{�̂�𝑖

𝑠(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}. Similarly,from Eq. (20), the probability of false alarm of spectrum holesat CS is given by

Pf𝑠 = Pr{�̂�𝑠(π‘˜) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}= Pr{�̂�𝑠(π‘˜, 1)

π‘€βŠ—π‘–=1

�̂�𝑖𝑠(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}

= Pf𝑠,1

π‘€βˆπ‘–=1

Pf𝑖𝑠,2

(39)

where Pf𝑖𝑠,2 = Pr{�̂�𝑖𝑠(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}. Notice that

the relationship between Pd𝑠,1 and Pf𝑠,1 is described by Eq.(33). Moreover, substituting �̂�𝑖

𝑠(π‘˜, 2) from Eq. (19) into Pd𝑖𝑠,2

and Pf𝑖𝑠,2 yields

Pd𝑖𝑠,2 = Pr{�̂�𝑖(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 0}

+ Pr{rand{𝐻0, 𝐻1} = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻0}Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 1}= Pd𝑖,1 Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 0} +

1

2Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 1}

(40)

Page 9: 2011 zou-yao-zheng-tw-648

656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

and

Pf𝑖𝑠,2 = Pr{�̂�𝑖(π‘˜, 1) = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 0}+ Pr{rand{𝐻0, 𝐻1} = 𝐻0βˆ£π»π‘(π‘˜) = 𝐻1}Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 1}= Pf𝑖,1 Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 0} +

1

2Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 1}

(41)

where the false alarm probability, Pf𝑖,1, is depicted as a func-tion of the detection probability, Pd𝑖,1, as given by Eq. (34). Itis noted that an initial spectrum sensing result �̂�𝑖(π‘˜, 1) carries1-bit information only in an information-theoretic sense andthe time-bandwidth product of the common control channel is𝐡𝑐𝑇𝑐. Thus, the transmission rate of such an initial sensingresult over the common control channel is given by 1/(𝐡𝑐𝑇𝑐).Moreover, as mentioned in the paragraph below Eq. (19),Ξ˜π‘–π‘ (π‘˜, 2) = 0 denotes that no outage event occurs over thechannel from the CR𝑖 to CS. In addition, from Eq. (18), theprobability of occurrence of Ξ˜π‘–π‘ (π‘˜, 2) = 0 is calculated as

Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 0} = Pr{ 𝛼

2𝑀log2(1 + βˆ£β„Žπ‘–π‘ (π‘˜)∣2𝛾𝑠) >

1

𝐡𝑐𝑇𝑐}

= exp(βˆ’ Ξ›

𝜎2𝑖𝑠

)

(42)

where Ξ› = [22𝑀/(𝛼𝐡𝑐𝑇𝑐) βˆ’ 1]/𝛾𝑠. From Eq. (42),Pr{Ξ˜π‘–π‘ (π‘˜, 2) = 1} is easily found as 1 βˆ’ Pr{Ξ˜π‘–π‘ (π‘˜, 2) =0}. Hence, given a target value Pf𝑠,thr and assuming eachcognitive user with the same detection performance, we canobtain solutions from Eq. (39) as Pf𝑠,1 = (Pf𝑠,thr)

1/(𝑀+1)

and Pf𝑖𝑠,2 = (Pf𝑠,thr)1/(𝑀+1), respectively. Substituting

Pf𝑠,1 = (Pf𝑠,thr)1/(𝑀+1) into Eq. (33) easily obtains the

corresponding numerical solution to Pd𝑠,1. Meanwhile, ap-plying Pf𝑖𝑠,2 = (Pf𝑠,thr)

1/(𝑀+1) to Eq. (41) yields Pf𝑖,1 =

exp( Ξ›πœŽ2𝑖𝑠

)(Pf𝑠,thr)1/(𝑀+1) βˆ’ 1

2 [exp( Ξ›πœŽ2𝑖𝑠

) βˆ’ 1] and the corre-sponding detection probability Pd𝑖,1 can be found from Eq.(34), by using which a numerical Pd𝑖

𝑠,2 is determined fromEq. (40). Finally, substituting the results Pd𝑠,1 and Pd𝑖

𝑠,2 intoEq. (38), we can obtain an overall detection probability Pd𝑠

under a given target false alarm probability Pf𝑠,thr. Now, wehave completed the analysis of spectrum sensing performancefor the FFSS-BRDT scheme. Note that the outage probabilityanalysis of the FFSS-BRDT scheme differs from that of theSFSS-BRDT scheme only in the terms Pd𝑠 and Pf𝑠. There-fore, a closed-form expression of the spectrum hole utilizationefficiency for the FFSS-BRDT scheme can be obtained fromEq. (37) with the replacement of Eqs. (29) and (30) by Eqs.(38) and (39), respectively.

IV. NUMERICAL AND SIMULATION RESULTS

In this section, we conduct numerical evaluations for theSFSS-BRDT and the FFSS-BRDT schemes, showing theadvantages of the former scheme. Notice that the primaryuser will be interfered by the cognitive users when a falsealarm of spectrum holes occurs at CS. Therefore, the falsealarm probability Pf𝑠 shall be set to be below a requiredvalue by the cognitive system to guarantee a primary quality-of-service (QoS) requirement. We use Pf𝑠 = 10βˆ’3 in thefollowing numerical evaluations. In addition, we demonstrate

10βˆ’4

10βˆ’3

10βˆ’2

10βˆ’1

10βˆ’6

10βˆ’5

10βˆ’4

10βˆ’3

10βˆ’2

10βˆ’1

100

False alarm probability (Pfs)

Mis

dete

ctio

n pr

obab

ility

(1βˆ’

Pd s)

Nonβˆ’cooperationFFSSβˆ’BRDT with M=2SFSSβˆ’BRDT with M=2FFSSβˆ’BRDT with M=4SFSSβˆ’BRDT with M=4FFSSβˆ’BRDT with M=6SFSSβˆ’BRDT with M=6

M = 6

M = 4

M = 2

Fig. 3. The misdetection probability (1βˆ’ Pd𝑠) versus the false alarm prob-ability (Pf𝑠) of the non-cooperation, the SFSS-BRDT and the FFSS-BRDTschemes for the different number of cognitive relays 𝑀 with Pa = 0.6,𝛾𝑝 = 20 dB, 𝛼 = 0.5, 𝐡𝑐𝑇𝑐 = 100, and 𝜎2

𝑝𝑠 = 𝜎2𝑝𝑖 = 𝜎2

𝑖𝑠 = 1.

that a maximum spectrum hole utilization efficiency can beachieved through an optimization of the spectrum sensingoverhead.

Fig. 3 depicts the misdetection probability (1βˆ’Pd𝑠) versusthe false alarm probability (Pf𝑠) of the SFSS-BRDT andthe FFSS-BRDT schemes. The performance curve of thenon-cooperation scheme is also plotted in this figure. FromFig. 3, one can see that the SFSS-BRDT scheme performsbetter than both the FFSS-BRDT and the non-cooperationschemes. It is also shown from Fig. 3 that the misdetectionprobability curves of the FFSS-BRDT scheme correspondingto 𝑀 = 2, 4 and 6 converge to their floors, respectively,in high false alarm probability regions. As the number ofcognitive relays increases from 𝑀 = 2 to 6, the misdetectionprobability floor increases. This is because that the channeloutages will occur during the transmission of initial spectrumsensing results from CRs to CS, which results in the initialsensing results received at CS in error. Since the FFSS-BRDT scheme can not recognize such errors, it in turnimpairs the fusion performance of the FFSS-BRDT scheme.Moreover, the occurrence of these errors is independent of thefalse alarm probability and becomes the dominant factor toadversely affect the sensing performance in high false alarmprobability regions, thus causing a misdetection probabilityfloor for the FFSS-BRDT scheme. In contrast, the SFSS-BRDT scheme is able to identify and discard these errors byCRC checking, thus no misdetection probability floor occursfor the SFSS-BRDT scheme. In addition, with an increasednumber of cognitive relays and under fixed/limited commoncontrol channel resources, the probability of occurrence ofsuch an error increases due to the fewer common controlchannel resources assigned for each CR, which finally leadsto an increase of the misdetection probability floor for theFFSS-BRDT scheme.

In Fig. 4, we show the detection probability versus thenumber of CRs of the SFSS-BRDT and the FFSS-BRDTschemes with a required false alarm probability Pf𝑠 = 10βˆ’3.

Page 10: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 657

0 5 10 15 200.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

The number of CRs (M)

Det

ectio

n pr

obab

ility

(P

d s)

SFSSβˆ’BRDTFFSSβˆ’BRDT

Fig. 4. The detection probability versus the number of cognitive relays ofthe SFSS-BRDT and the FFSS-BRDT schemes for different 𝐡𝑐𝑇𝑐 valueswith Pa = 0.6, Pfs = 10βˆ’3, 𝛾𝑝 = 20 dB, 𝛼 = 0.5, 𝐡𝑐𝑇𝑐 = 100, and𝜎2𝑝𝑠 = 𝜎2

𝑝𝑖 = 𝜎2𝑖𝑠 = 1.

All cases in Fig. 4 clearly show that, when the number ofCRs is smaller than a critical value, the detection probabilitiesof the SFSS-BRDT are nearly identical to that of the FFSS-BRDT scheme. One can also observe from Fig. 4 that, asthe number of cognitive relays continues increasing afterthe critical value, the detection probability of the FFSS-BRDT scheme starts to degrade. This is due to the fact that,with an increased number of CRs and a limited commoncontrol channel resources, the channel outage events occurredduring the transmission of initial sensing results become morefrequent, leading to more initial sensing results received atCS in error. It then becomes the dominant factor adverselyaffecting the FFSS-BRDT’s sensing performance, since thisscheme can not recognize if the received initial sensing resultat CS from a CR is in error or not. However, the SFSS-BRDTscheme is able to identify and discard such errors by CRCchecking, and thus is not affected by this adverse factor.

Fig. 5 shows the spectrum hole utilization efficiency versusthe secondary SNR (𝛾𝑠) of the non-cooperation, SFSS-BRDTand FFSS-BRDT schemes with a false alarm probability con-straint Pf𝑠 = 10βˆ’3, where the time-bandwidth products of thelicensed channel and common control channel are 𝐡𝑇 = 500and 𝐡𝑐𝑇𝑐 = 100, respectively. This considers that the cogni-tive radio is typically designed to reuse the licensed spectrumwith very limited dedicated channel resources. We also providethe simulated spectrum hole utilization efficiency results byusing a typical link-level simulation approach. As observedfrom Fig. 5, in low SNR regions, both the SFSS-BRDT andFFSS-BRDT schemes perform worse than the non-cooperationscheme in terms of the spectrum hole utilization efficiency.This is because that a half-duplex relaying mode is adopted,which would degrade the system performance due to theinefficient duplexing method. However, in higher SNR regions,the relay benefits achieved overtake the performance cost dueto the half-duplexing constraint and thus the SFSS-BRDT andFFSS-BRDT schemes outperform the non-cooperation. Also,it can be seen from Fig. 5 that the spectrum hole utilization

0 5 10 15 200

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Secondary SNR (Ξ³s)

Spe

ctru

m h

ole

utili

zatio

n ef

ficie

ncy

(Ξ·)

SFSSβˆ’BRDT with M=8 (numer.)SFSSβˆ’BRDT with M=8 (simul.)FFSSβˆ’BRDT with M=8 (numer.)FFSSβˆ’BRDT with M=8 (simul.)SFSSβˆ’BRDT with M=4 (numer.)SFSSβˆ’BRDT with M=4 (simul.)FFSSβˆ’BRDT with M=4 (numer.)FFSSβˆ’BRDT with M=4 (simul.)Nonβˆ’cooperation (numer.)Nonβˆ’cooperation (simul.)

Fig. 5. Spectrum hole utilization efficiency versus the secondary SNR 𝛾𝑠of the non-cooperation, the SFSS-BRDT and the FFSS-BRDT schemes fordifferent number of cognitive relays 𝑀 with Pa = 0.6, Pf𝑠 = 10βˆ’3, 𝛾𝑝 =20 dB, 𝑅 = 1 bit/s/Hz, 𝛼 = 0.5, 𝐡𝑇 = 500, 𝐡𝑐𝑇𝑐 = 100, and 𝜎2

𝑝𝑠 =𝜎2𝑝𝑖 = 𝜎2

𝑝𝑑 = 𝜎2𝑠𝑖 = 𝜎2

𝑠𝑑 = 𝜎2𝑖𝑠 = 𝜎2

𝑖𝑑 = 1.

0 5 10 15 200.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

The number of CRs (M)

Spe

ctru

m h

ole

utili

zatio

n ef

ficie

ncy

(Ξ·)

SFSSβˆ’BRDTFFSSβˆ’BRDT

Fig. 6. Spectrum hole utilization efficiency versus the number of cognitiverelays 𝑀 of the SFSS-BRDT and the FFSS-BRDT schemes with Pa = 0.6,Pf𝑠 = 10βˆ’3, 𝛾𝑝 = 20 dB, 𝛾𝑠 = 15 dB, 𝑅 = 1 bit/s/Hz, 𝛼 = 0.5, 𝐡𝑇 =500, 𝐡𝑐𝑇𝑐 = 100, and 𝜎2

𝑝𝑠 = 𝜎2𝑝𝑖 = 𝜎2

𝑝𝑑 = 𝜎2𝑠𝑖 = 𝜎2

𝑠𝑑 = 𝜎2𝑖𝑠 = 𝜎2

𝑖𝑑 = 1.

efficiency of the SFSS-BRDT scheme is higher than that ofthe FFSS-BRDT scheme and, moreover, the performance gapbetween the two schemes enlarges as the number of cognitiverelays increases from 𝑀 = 4 to 8. In addition, the simulationsmatch the analytic results very well, showing the accuracyof the derived closed-form expressions of the spectrum holeutilization efficiency.

In Fig. 6, we illustrate the spectrum hole utilization effi-ciency of the SFSS-BRDT and FFSS-BRDT schemes versusthe number of CRs with a false alarm probability constraintPf𝑠 = 10βˆ’3. One can see from Fig. 6 that, when the numberof cognitive relays is below a certain value, the spectrum holeutilization efficiency of the SFSS-BRDT scheme is almostthe same as that of the FFSS-BRDT scheme. However, as

Page 11: 2011 zou-yao-zheng-tw-648

658 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Spectrum sensing overhead (Ξ±)

Spe

ctru

m h

ole

utili

zatio

n ef

ficie

ncy

(Ξ·)

SFSSβˆ’BRDT schemeFFSSβˆ’BRDT scheme

R=1 bit/s/HzR=1.5 bit/s/Hz

Fig. 7. Spectrum hole utilization efficiency versus the spectrum sensingoverhead 𝛼 of the SFSS-BRDT and the FFSS-BRDT schemes for differentdata rates 𝑅 with Pa = 0.6, Pf𝑠 = 10βˆ’3, 𝛾𝑝 = 20 dB, 𝛾𝑠 = 15 dB,𝐡𝑇 = 500, 𝐡𝑐𝑇𝑐 = 100, 𝑀 = 4, and 𝜎2

𝑝𝑠 = 𝜎2𝑝𝑖 = 𝜎2

𝑝𝑑 = 𝜎2𝑠𝑖 = 𝜎2

𝑠𝑑 =

𝜎2𝑖𝑠 = 𝜎2

𝑖𝑑 = 1.

the number of CRs continues increasing after a critical value,the FFSS-BRDT scheme’s performance begins to degrade andperforms noticeably worse than the SFSS-BRDT scheme. Thisis because that, with an increased number of CRs, the channeloutages occurred from CRs to CS will eventually be significantand result in many initial sensing results received at CS inerror. Since the FFSS-BRDT scheme can not recognize anddiscard these errors, it causes the spectrum hole detectionfailure and in turn affects adversely the spectrum hole utiliza-tion efficiency. In contrast, the SFSS-BRDT scheme is able toidentify whether an initial sensing result received at CS froma CR is correct or not by the CRC checking, whose spectrumhole utilization efficiency is thus not degraded even with alarge number of cognitive relays.

Fig. 7 shows the spectrum hole utilization efficiency versusthe spectrum sensing overhead of the SFSS-BRDT and theFFSS-BRDT schemes for different data rates, where the twocurve pairs plotted correspond to 𝑅 = 1 bit/s/Hz and 𝑅 =1.5 bit/s/Hz, respectively. As shown in Fig. 7, there alwaysexists an optimal spectrum sensing overhead to maximize thespectrum hole utilization efficiency for both the SFSS-BRDTand the FFSS-BRDT schemes. Therefore, a joint analysisof the two phases (i.e., the spectrum sensing and the datatransmission phases) in terms of the spectrum hole utilizationefficiency is essential to optimize the overall performanceof cognitive transmissions. Fig. 7 also demonstrates that,no matter which scheme (SFSS-BRDT or FFSS-BRDT) isused, the optimal spectrum sensing overhead correspondingto 𝑅 = 1.5 bit/s/Hz is smaller than that for 𝑅 = 1 bit/s/Hz.This is due to the fact that as the data rate 𝑅 increases, thedata transmission phase should be allocated a relatively longertime duration, which results in less time available for thespectrum sensing phase. In addition, it is shown from Fig.7 that the spectrum hole utilization efficiency of the SFSS-BRDT scheme is always higher than that of the FFSS-BRDTscheme.

V. CONCLUSION

In this paper, we have investigated two cognitive trans-mission schemes for multiple-relay cognitive radio networks,i.e., the selective fusion spectrum sensing and best relay datatransmission scheme and the fixed fusion spectrum sensingand best relay data transmission scheme. We have derivedclosed-form expressions of the spectrum hole utilization ef-ficiency for the two schemes over Rayleigh fading channels.Numerical results have shown that the SFSS-BRDT schemeoutperforms the FFSS-BRDT scheme in terms of the spectrumhole utilization efficiency. Moreover, as the number of CRsincreases, the spectrum hole utilization efficiency of the FFSS-BRDT scheme improves initially and then begins to degrade.In contrast, the SFSS-BRDT’s performance always improveswith an increase of the number of CRs, which further verifiesits advantage over the FFSS-BRDT scheme. In addition, ithas been shown that a maximum spectrum hole utilizationefficiency is achieved through an optimization of the spectrumsensing overhead.

APPENDIX APROOF OF EQ. (28)

We can rewrite Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 +

2βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ} as Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ π‘₯}, where

π‘₯ = βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ 2βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Δ. Notice that RVs βˆ£β„Žπ‘ π‘‘(π‘˜)∣2and βˆ£β„Žπ‘π‘‘(π‘˜)∣2 follow exponential distribution with parameters1/𝜎2

𝑠𝑑 and 1/𝜎2𝑝𝑑, respectively. Hence, the probability density

function of RV π‘₯ can be given by

𝑓(π‘₯) =

⎧⎨⎩

1

𝜎2𝑠𝑑 + 2𝜎2

𝑝𝑑𝛾𝑝Δexp(βˆ’ π‘₯

𝜎2𝑠𝑑

), π‘₯ β‰₯ 0

1

2𝜎2𝑝𝑑𝛾𝑝Δ + 𝜎2

𝑠𝑑

exp(π‘₯

2𝜎2𝑝𝑑𝛾𝑝Δ

), otherwise

(A.1)Thus, we obtain

Pr{maxπ‘–βˆˆπ·π‘š

βˆ£β„Žπ‘–π‘‘(π‘˜)∣2 < 2Ξ” βˆ’ π‘₯}

=

∫ Ξ›

βˆ’βˆž

βˆπ‘–βˆˆπ·π‘š

[1 βˆ’ exp(βˆ’2Ξ” βˆ’ π‘₯

𝜎2𝑖𝑑

)]𝑓(π‘₯)𝑑π‘₯

= Aπ‘š + Bπ‘š

(A.2)

where the terms Aπ‘š and Bπ‘š are given by

Aπ‘š =

∫ 0

βˆ’βˆž

Ξ¨

2𝜎2𝑝𝑑𝛾𝑝Δ + 𝜎2

𝑠𝑑

exp(π‘₯

2𝜎2𝑝𝑑𝛾𝑝Δ

)𝑑π‘₯ (A.3)

and

Bπ‘š =

∫ Ξ›

0

Ξ¨

𝜎2𝑠𝑑 + 2𝜎2

𝑝𝑑𝛾𝑝Δexp(βˆ’ π‘₯

𝜎2𝑠𝑑

)𝑑π‘₯ (A.4)

wherein the parameter Ξ¨ is given by

Ξ¨ = 1 +

2βˆ£π·π‘šβˆ£βˆ’1βˆ‘π‘›=1

(βˆ’1)βˆ£π‘†π‘š(𝑛)∣ exp(βˆ’βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

2Ξ” βˆ’ π‘₯

𝜎2𝑖𝑑

) (A.5)

where π‘†π‘š(𝑛) is the 𝑛-th non-empty subcollection of theelements of π·π‘š and βˆ£π‘†π‘š(𝑛)∣ is the number of the elementsin π‘†π‘š(𝑛). In obtaining Eq. (A.5), we have used binomial

Page 12: 2011 zou-yao-zheng-tw-648

ZOU et al.: COGNITIVE TRANSMISSIONS WITH MULTIPLE RELAYS IN COGNITIVE RADIO NETWORKS 659

expansion formula. Substituting Ξ¨ from Eq. (A.5) into Eq.(A.3) yields

Aπ‘š = Ξ“ +

2βˆ£π·π‘šβˆ£βˆ’1βˆ‘π‘›=1

(βˆ’1)βˆ£π‘†π‘š(𝑛)βˆ£Ξ“

1 +βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

2𝜎2𝑝𝑑𝛾𝑝Δ

𝜎2𝑖𝑑

exp(βˆ’βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

2Ξ”

𝜎2𝑖𝑑

)

(A.6)

where Ξ“ =2𝜎2

𝑝𝑑𝛾𝑝Δ

2𝜎2𝑝𝑑𝛾𝑝Δ+𝜎2

𝑠𝑑. Similarly, substituting Ξ¨ from Eq.

(A.5) into Eq. (A.4), we are able to obtain

Bπ‘š =(1 βˆ’ Ξ“){1 βˆ’ exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

+

2βˆ£π·π‘šβˆ£βˆ’1βˆ‘π‘›=1

(βˆ’1)βˆ£π‘†π‘š(𝑛)βˆ£πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)]}

(A.7)

where πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)] is given by

πœ™[𝜎2𝑠𝑑, 𝜎

2𝑖𝑑, π‘†π‘š(𝑛)] =

⎧⎨⎩

2Ξ”

𝜎2𝑠𝑑

exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

),βˆ‘

π‘–βˆˆπ‘†π‘š(𝑛)

1

𝜎2𝑖𝑑

=1

𝜎2𝑠𝑑

exp(βˆ’ βˆ‘π‘–βˆˆπ‘†π‘š(𝑛)

2Ξ”

𝜎2𝑖𝑑

)βˆ’ exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

1βˆ’ βˆ‘π‘–βˆˆπ‘†π‘š(𝑛)

𝜎2𝑠𝑑

𝜎2𝑖𝑑

, others

(A.8)wherein Ξ” = [22𝑅/(1βˆ’π›Ό) βˆ’ 1]/𝛾𝑠.

REFERENCES

[1] J. Mitola and G. Q. Maguire, β€œCognitive radio: making software radiosmore personal,” IEEE Personal Commun., vol. 6, pp. 13-18, 1999.

[2] IEEE 802.22 Working Group, β€œIEEE P802.22/D1.0 draft standard forwireless regional area networks part 22: cognitive wireless RAN mediumaccess control (MAC) and physical layer (PHY) specifications: policiesand procedures for operation in the TV bands,” Apr. 2008.

[3] J. Ma, Y. G. Li, and B. H. Juang, β€œSignal processing in cognitive radio,”Proc. IEEE, vol. 97, no. 5, pp. 805-8023, 2009.

[4] Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, β€œSensing-throughputtradeoff for cognitive radio networks,” IEEE Trans. Wireless Commun.,vol. 7, no. 4, pp. 1326-1337, Apr. 2008.

[5] Y. Zou, Y.-D. Yao, and B. Zheng, β€œOutage probability analysis ofcognitive transmissions: the impact of spectrum sensing overhead,” IEEETrans. Wireless Commun., vol. 9, no. 8, pp. 2676-2688, Aug. 2010.

[6] V. I. Kostylev, β€œEnergy detection of a signal with random amptitude,”in Proc. IEEE Int. Conf. Commun., 2002.

[7] A. Fehske, J. D. Gaeddert, and J. H. Reed, β€œA new approach to signalclassification using spectral correlation and neural networks,” in Proc.IEEE DySPAN 2005, Nov. 2005, pp. 144-150.

[8] P. D. Sutton, K. E. Nolan, and L. E. Doyle, β€œCyclostationary signaturesin practical cognitive radio applications,” IEEE J. Sel. Areas Commun.,vol. 26, no. 1, pp. 13-24, 2008.

[9] A. Ghasemi and E. S. Sousa, β€œCollaborative spectrum sensing foropportunistic access in fading environment,” in Proc. IEEE DySPAN2005, pp. 131-136.

[10] G. Ganesan and Y. G. Li, β€œCooperative spectrum sensing in cognitiveradio–part I: two user networks,” IEEE Trans. Wireless Commun., vol.6, no. 6, pp. 2204-2213, 2007.

[11] J. Ma, G. Zhao, and Y. Li, β€œSoft combination and detection forcooperative spectrum sensing in cognitive radio networks,” IEEE Trans.Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Nov. 2008.

[12] R. W. Pabst and B. H. Shultz, et al., β€œRelay-based deployment conceptsfor wireless and mobile broadband radio,” IEEE Commun. Mag., vol.42, no. 9, pp. 80-89, Sep. 2004.

[13] A. J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bolcskei, β€œAn overviewof MIMO communications–a key to Gigabit wireless,” Proc. IEEE, vol.92, no. 2, pp. 198-218, Feb. 2004.

[14] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, β€œCooperative diversityin wireless networks: efficient protocols and outage behavior,” IEEETrans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, 2004.

[15] A. Sendonaris, E. Erkip, and B. Aazhang, β€œUser cooperation diversity–part I: system description,” IEEE Trans. commun., vol. 51, no. 11, pp.1927-1938, 2003.

[16] T. E. Hunter, S. Sanayei, and A. Nosratinia, β€œOutage analysis of codedcooperation,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 375-391, 2006.

[17] Y. Zou, B. Zheng, and J. Zhu, β€œOutage analysis of opportunistic cooper-ation over Rayleigh fading channels,” IEEE Trans. Wireless Commun.,vol. 8, no. 6, pp. 3077-3385, June 2009.

[18] Y. Zou, B. Zheng, and W.-P. Zhu, β€œAn opportunistic cooperation schemeand its BER analysis,” IEEE Trans. Wireless Commun., vol. 8, no. 9,pp. 4492-4497, Sep. 2009.

[19] A. Bletsas, H. Shin, M. Z. Win, and A. Lippman, β€œA simple cooperativediversity method based on network path selection,” IEEE J. Sel. AreasCommun., vol. 24, no. 3, pp. 659-672, Mar. 2006.

[20] E. Beres and R. S. Adve, β€œSelection cooperation in multi-sourcecooperative networks,” IEEE Trans. Wireless Commun., vol. 7, no. 1,pp. 118-127, 2008.

[21] S. Lkki and M. H. Ahmed, β€œPerformance of multiple-relay cooperativediversity systems with best relay selection over Rayleigh fading chan-nels,” EURASIP J. Advances in Signal Process., article ID 580368.

[22] Z. Tian and G. B. Giannakis, β€œA wavelet approach to wideband spectrumsensing for cognitive radios,” in Proc. IEEE CROWNCOM 2006, pp. 1-5.

Yulong Zou received his B.Eng. degree (with thehighest honor) in Information Engineering fromNanjing University of Posts and Telecommunica-tions (NUPT), Nanjing China, in 2006. He is cur-rently working toward his Ph.D. degrees, respec-tively, at the Institute of Signal Processing andTransmission of NUPT, Nanjing China, and theElectrical and Computer Engineering Departmentof Stevens Institute of Technology (SIT), NJ USA.His research interests span the broad area of scal-able wireless communication and networking, with

emphasis on cooperative relay technology. Recently, he focuses on theinvestigation of cooperative relay techniques in cognitive radio networks.

Yu-Dong Yao (S’88-M’88-SM’94) has been withStevens Institute of Technology, Hoboken, New Jer-sey, since 2000 and is currently a professor anddepartment director of electrical and computer en-gineering. He is also a director of Stevens’ Wire-less Information Systems Engineering Laboratory(WISELAB). Previously, from 1989 and 1990, hewas at Carleton University, Ottawa, Canada, as aResearch Associate working on mobile radio com-munications. From 1990 to 1994, he was with SparAerospace Ltd., Montreal, Canada, where he was

involved in research on satellite communications. From 1994 to 2000, he waswith Qualcomm Inc., San Diego, CA, where he participated in research anddevelopment in wireless code-division multiple-access (CDMA) systems.

He holds one Chinese patent and twelve U.S. patents. His research interestsinclude wireless communications and networks, spread spectrum and CDMA,antenna arrays and beamforming, cognitive and software defined radio(CSDR), and digital signal processing for wireless systems. Dr. Yao was anAssociate Editor of IEEE Communications Letters and IEEE TRANSACTIONS

ON VEHICULAR TECHNOLOGY, and an Editor for IEEE TRANSACTIONS ON

WIRELESS COMMUNICATIONS. He received the B.Eng. and M.Eng. degreesfrom Nanjing University of Posts and Telecommunications, Nanjing, China, in1982 and 1985, respectively, and the Ph.D. degree from Southeast University,Nanjing, China, in 1988, all in electrical engineering.

Baoyu Zheng received B.S. and M.S. degreesfrom the Department of Circuit and Signal System,NUPT, in 1969 and 1981, respectively. Since then,he has been engaged in teaching and researching atSignal and Information Processing. He is a full pro-fessor and doctoral advisor at NUPT. His researchinterests span the broad area of the intelligent signalprocessing, wireless network and signal processingfor modern communication, and the quantum signalprocessing.