Journal of Computer Networks and Communications

Journal of Computer Networks and Communications / 2012 / Article
Special Issue

Trends and Applications of Cognitive Radio

View this Special Issue

Research Article | Open Access

Volume 2012 |Article ID 294581 |

Ammar Zafar, Mohamed-Slim Alouini, Yunfei Chen, Redha M. Radaydeh, "Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access", Journal of Computer Networks and Communications, vol. 2012, Article ID 294581, 9 pages, 2012.

Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

Academic Editor: Enrico Del Re
Received09 Jan 2012
Revised19 Mar 2012
Accepted20 Mar 2012
Published20 May 2012


Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources.

1. Introduction

The ever increasing wireless communication networks have put great stress on the already limited spectrum. Due to the fixed spectrum allocation policy, only the licensed users, otherwise known as primary users, are able to access the licensed spectrum. Additionally, the Federal Communications Commission (FCC) task force highlighted in their report the fact that at any given time only 2% of the spectrum is being used [1]. Therefore, ensuring better spectrum usage is of paramount importance.

Cognitive radios have been proposed to resolve this issue [2]. In cognitive radio, the unlicensed users, otherwise known as secondary users, first sense the licensed bands for spectrum holes (parts of the licensed spectrum which are not being employed by the primary users at some time in certain geographical location) [3]. Then, if a spectrum hole is found, the secondary users transmit data to the intended destination. However, the secondary user has to be careful so as not to cause interference to the primary user. The two stages of spectrum sensing and data transmission are related and for optimal performance must be optimized jointly. This is due to the probability of detection, š‘ƒš‘‘, and probability of false alarm, š‘ƒš‘“, associated with spectrum sensing. If the secondary user with probability š‘ƒš‘“ misses a spectrum hole, then it will keep silent and miss an opportunity to transmit, reducing throughput. However, if a transmission from the primary is missed, with probability 1āˆ’š‘ƒš‘‘, then the secondary user transmits and causes interference to the primary user. Moreover, due to interference, the signal-to-noise-ratio (SNR) of the secondary user also decreases, decreasing the throughput and the symbol error rate (SER). Resource allocation that optimizes this sensing-throughput tradeoff has been discussed in [4]. Other optimal resource allocation algorithms for cognitive radio networks have been discussed in [5]. More specifically, in [5], the authors considered a multiband system and considered the two cases of sensing-based spectrum sharing and opportunistic spectrum access. However, both the above-mentioned works maximize the throughput.

In this paper, optimal resource allocation is discussed to minimize the SER. In order to achieve minimum SER, cooperation is introduced into the system as it decreases the SER due to diversity [6]. Hence, the transmitting secondary user now, upon sensing a spectrum hole, transmits to the relays as well as the destination. Power allocation for relay-assisted cognitive radio networks has been discussed in [7ā€“15]. These works proposed strategies to maximize the throughput for a cognitive relay network that is allowed to share the frequency band with the primary user. Thus, they did not consider spectrum sensing for opportunistic access. Here, we consider an opportunistic system with amplify-and-forward (AF) relays. Full channel state information is assumed at the central controller which performs the resource allocation. Firstly, an all-participate (AP) system is discussed and it is shown that the optimization problem is nonconvex and hence cannot be solved using analytical means. It is then noted that the AP system is limited due to the systems resources being orthogonally distributed. To rectify this, a selection scheme is proposed and the optimal resource allocation, in this case, is discussed.

The rest of the paper is organized as follows. Section 2 gives the system model. The AP system is considered in Section 3. Section 4 details selective relaying. Numerical results are discussed in Section 5. Finally, Section 6 concludes the paper.

2. System Model

Consider a cognitive radio network in which the secondary source utilizes š‘š relays to send data to the secondary destination as shown in Figure 1. The secondary network only has opportunistic access to the licensed spectrum. Therefore, it needs to perform spectrum sensing. The source performs the spectrum sensing and then transmits information to the relays and destination if it finds a ā€œspectral holeā€ in the first time slot. The relays then forward the received signal to the destination after amplification. In this paper narrowband channel is assumed. The source and the relays can use frequency orthogonal channels to avoid causing interference to each other in wideband channels. For ease of analysis, we consider time orthogonal channels here. Hence, a total of š‘š+1 time slots are used.

2.1. Received Signal Model

Based on the spectrum sensing result, there are two possible received signal models.

2.1.1. Without Interference from the Primary User

In this scenario, with probability 1āˆ’š‘ƒš‘“, where š‘ƒš‘“ is the probability of false alarm, the source correctly detects the presence of a ā€œspectral holeā€ and transmits. The signals received at the destination and the relays areš‘¦š‘Ÿš‘”=āˆššøSTā„Žš‘Ÿš‘”š‘ +š‘›š‘Ÿš‘”,š‘¦š‘–š‘”=āˆššøSTā„Žš‘–š‘”š‘ +š‘›š‘–š‘”,(1) where š‘  is the zero-mean and unit-energy transmitted symbol, šøST is the source energy, ā„Žš‘Ÿš‘” is the channel response between the source and the destination, ā„Žš‘–š‘” is the channel response between the š‘–th relay and the source, and š‘›š‘Ÿš‘”āˆ¼CN(0,šœŽ2š‘›š‘Ÿš‘”) and š‘›š‘–š‘”āˆ¼CN(0,šœŽ2š‘›š‘–š‘”) are the complex Gaussian noise samples. The relay, after normalization and amplification, forwards the received signal to the destination. The signal after normalization becomes š‘ š‘–=ī„¶ī„µī„µāŽ·šøSTšøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”ā„Žš‘–š‘”ī„¶ī„µī„µāŽ·š‘ +1šøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”š‘›š‘–š‘”.(2)

Therefore, the received signal at the destination from the š‘–th relay isš‘¦š‘Ÿš‘–=āˆššøš‘–ā„Žš‘Ÿš‘–š‘ š‘–+š‘›š‘Ÿš‘–,(3) where ā„Žš‘Ÿš‘– is the known channel response between the receiver and the š‘–th relay, šøš‘– is the š‘–th relay's energy, and š‘›š‘Ÿš‘–āˆ¼CN(0,šœŽ2š‘›š‘Ÿš‘–) is the complex Gaussian noise. Substituting š‘ š‘– in (3) gives š‘¦š‘Ÿš‘–=ī„¶ī„µī„µāŽ·šøSTšøš‘–šøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”ā„Žš‘Ÿš‘–ā„Žš‘–š‘”š‘ +Ģƒš‘›š‘Ÿš‘–,(4) where Ģƒš‘›š‘Ÿš‘–āˆ¼CN(0,ī‚šœŽ2š‘›š‘Ÿš‘–) and ī‚šœŽ2š‘›š‘Ÿš‘–=šøš‘–||ā„Žš‘Ÿš‘–||2šœŽ2š‘›š‘–š‘”šøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”+šœŽ2š‘›š‘Ÿš‘–.(5)

Writing the š‘š+1 received signals in matrix form, one hasš²=š”š‘ +š§,(6) where īƒ¬1š²=šœŽš‘›š‘Ÿš‘”š‘¦š‘Ÿš‘”1ī‚šœŽš‘›š‘Ÿ1š‘¦š‘Ÿ1ā‹Æ1ī‚šœŽš‘›š‘Ÿš‘šš‘¦š‘Ÿš‘šīƒ­š‘‡,āŽ”āŽ¢āŽ¢āŽ£īƒŽš”=šøSTšœŽ2š‘›š‘Ÿš‘”ā„Žš‘Ÿš‘”ī„¶ī„µī„µāŽ·šøSTšø1ī‚šœŽ2š‘›š‘Ÿ1ī‚€šøST||ā„Ž1š‘”||2+šœŽ2š‘›1š‘”ī‚Ć—ā„Žš‘Ÿ1ā„Ž1š‘”ā‹Æī„¶ī„µī„µāŽ·šøš‘†š‘‡šøš‘šī‚šœŽ2š‘›š‘Ÿš‘šī‚€šøST||ā„Žš‘šš‘”||2+šœŽ2š‘›š‘šš‘”ī‚Ć—ā„Žš‘Ÿš‘šā„Žš‘šš‘”īƒ­,š‘‡(7) and š§ is a (š‘š+1) dimensional vector whose components are zero mean and unit variance complex Gaussian random variables. Therefore š§ is also complex Gaussian with mean vector of all zeros and covariance matrix being the identity matrix, šˆ(š‘š+1)Ɨ(š‘š+1), that is š§āˆ¼CN(šŸŽ,šˆ).

2.1.2. With Interference from the Primary User

In this case, with probability 1āˆ’š‘ƒš‘‘ where š‘ƒš‘‘ is the probability of detection, the source misses the transmission from the primary user and transmits, which causes interference. The signals at the destination from both the source and the relays now also include an interfering signal due to primary user activity isš‘¦š‘Ÿš‘”=āˆššøSTā„Žš‘Ÿš‘”š‘ +š‘›š‘Ÿš‘”+š‘¦š¼š‘Ÿš‘”,š‘¦š‘–š‘”=āˆššøSTā„Žš‘–š‘”š‘ +š‘›š‘–š‘”+š‘¦š¼š‘–š‘”,(8) where š‘¦š¼š‘Ÿš‘” and š‘¦š¼š‘–š‘” are the interference signals.

Taking into account the fact that the source and relays have no knowledge of the interfering signal and adopting the same approach as previously, one can writeš‘¦š‘Ÿš‘–=ī„¶ī„µī„µāŽ·šøSTšøš‘–šøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”ā„Žš‘Ÿš‘–ā„Žš‘–š‘”š‘ +Ģ‚š‘›š‘Ÿš‘–+Ģ‚š‘¦š¼š‘Ÿš‘–,(9) where Ģ‚š‘›š‘Ÿš‘–āˆ¼CN(0,īšœŽ2š‘›š‘Ÿš‘–) and īšœŽ2š‘›š‘Ÿš‘–=šøš‘–||ā„Žš‘Ÿš‘–||2šœŽ2š‘›š‘–š‘”šøST||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”+šœŽ2š‘›š‘Ÿš‘–,Ģ‚š‘¦š¼š‘–=š‘¦š¼š‘Ÿš‘–+īƒŽšøš‘–šøST|ā„Žš‘–š‘”|2+šœŽ2š‘›š‘–š‘”ā„Žš‘Ÿš‘–š‘¦š¼š‘–š‘”.(10)

Again in matrix form one hasš²š¼=š”š¼š‘ +š§š¼+š˜š¼,(11) where š²š¼=īƒ¬1šœŽš‘›š‘Ÿš‘”š‘¦š‘Ÿš‘”1īšœŽš‘›š‘Ÿ1š‘¦š‘Ÿ1ā‹Æ1īšœŽš‘›š‘Ÿš‘šš‘¦š‘Ÿš‘šīƒ­š‘‡,š”š¼=āŽ”āŽ¢āŽ¢āŽ£īƒŽšøSTšœŽ2š‘›š‘Ÿš‘”ā„Žš‘Ÿš‘”ī„¶ī„µī„µāŽ·šøSTšø1īšœŽ2š‘›š‘Ÿ1ī‚€šøST||ā„Ž1š‘”||2+šœŽ2š‘›1š‘”ī‚Ć—ā„Žš‘Ÿ1ā„Ž1š‘”ā‹Æī„¶ī„µī„µāŽ·šøSTšøš‘šīšœŽ2š‘›š‘Ÿš‘šī‚€šøST||ā„Žš‘šš‘”||2+šœŽ2š‘›š‘šš‘”ī‚Ć—ā„Žš‘Ÿš‘šā„Žš‘šš‘”īƒ­š‘‡,š˜š¼=īƒ¬1šœŽš‘›š‘Ÿš‘”š‘¦š¼š‘Ÿš‘”1īšœŽš‘›š‘Ÿ1Ģ‚š‘¦š¼1ā‹Æ1īšœŽš‘›š‘Ÿš‘šĢ‚š‘¦š¼š‘šīƒ­š‘‡,(12) and š§š¼āˆ¼CN(šŸŽ,šˆ).

2.2. Spectrum Sensing

Spectrum sensing is performed, by means of an energy detector, for the first š‘”š‘  seconds out of total time slot duration of š‘‡ seconds at the source node only. The remaining š‘‡āˆ’š‘”š‘  is used for transmission, after detecting a ā€œspectral holeā€. The probabilities of detection and false alarm, according to [16], are given by š‘ƒš‘‘āŽ›āŽœāŽœāŽœāŽ=š‘„šœ†āˆ’š‘āˆ’š›¾š‘‘ī”2ī€·š‘+2š›¾š‘‘ī€øāŽžāŽŸāŽŸāŽŸāŽ ,š‘ƒš‘“īƒ©=š‘„šœ†āˆ’š‘āˆšīƒŖ,2š‘(13) respectively, where šœ† is the threshold of the energy detector, š‘=š‘”š‘ š‘“š‘  is the number of samples, š‘“š‘  is the sampling frequency, š›¾š‘‘ equals š‘ times the SNR at the output of the detector and š‘„(ā‹Æ) is the Gaussian š‘„-function.

3. All Participate System

In this section, an all-participate (AP) system is discussed. In such a system, all the relays forward the signal to the destination. Firstly, the optimization problem is formulated. Then the constraints on the objective function are derived. The SER at the destination is given byī€·š»SER=š‘ƒ0ī€øī‚€š‘„ī‚€āˆšš‘˜š›¾0ī€·ī‚ī‚1āˆ’š‘ƒš‘“ī€øī€·š»+š‘ƒ1ī€øī‚€š‘„ī‚€āˆšš‘˜š›¾š¼ī€·ī‚ī‚1āˆ’š‘ƒš‘‘ī€ø,(14) where š›¾0 is the SNR after combining, š›¾š¼ is the signal-to-interference-plus-noise-ratio (SINR) after combining, š‘˜ is a constant which depends on the modulation scheme used, š‘ƒ(š»0) is the probability of no primary user transmission, and š‘ƒ(š»1)=1āˆ’š‘ƒ(š»0) is the probability of a primary user transmission. The SNR š›¾0 can be found, assuming maximal ratio combining (MRC), asš›¾0=š›¼+š‘šī“š‘–=1š›½š‘–ī‚šœŽ2š‘›š‘Ÿš‘–,(15) where š‘š›¼=STš‘‡š‘ ||ā„Žš‘Ÿš‘”||2šœŽ2š‘›š‘Ÿš‘”,š›½š‘–=š‘STš‘š‘–š‘‡2š‘ ||ā„Žš‘Ÿš‘–||2||ā„Žš‘–š‘”||2š‘STš‘‡š‘ ||ā„Žš‘–š‘”||2+šœŽ2š‘›š‘–š‘”,(16) where the source and relay energies have been replaced by šøST=š‘STš‘‡š‘ ,šøš‘–=š‘š‘–š‘‡š‘†,(17) where š‘ST and š‘š‘–s are the source and relay powers, respectively, and š‘‡š‘  is the symbol time. Similarly, š›¾š¼ can be expressed asš›¾š¼=ī‚€āˆ‘š›¼+š‘šš‘–=1ī‚€š›½š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚ī‚2āˆ‘š›¼+š‘šš‘–=1ī‚€š›½š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚+ī‚€š›¼š‘/šœŽ2š‘›š‘Ÿš‘”ī‚+āˆ‘š‘šš‘–=1ī‚€š‘‘š‘–/īšœŽ2š‘›š‘Ÿš‘–š›½ī‚ī‚€š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚,(18) where ī‚ø|||š‘¦š‘=šøš¼š‘Ÿš‘”|||2ī‚¹š‘‘,(19)š‘–ī‚ƒ||=šøĢ‚š‘¦š¼š‘–||2ī‚„šøī‚ƒ||,(20)Ģ‚š‘¦š¼š‘–||2ī‚„ī‚ø|||š‘¦=šøš¼š‘Ÿš‘–|||2ī‚¹ī‚ø|||š‘¦+šøš¼š‘–š‘”|||2ī‚¹īƒ©šøš‘–šøš‘†š‘‡|ā„Žš‘–š‘”|2+šœŽ2š‘›š‘–š‘”||ā„Žš‘Ÿš‘–||2īƒŖ.(21)

After substituting (15) and (18) in (14), the SER can be obtained asī€·š»SER=š‘ƒ0ī€øš‘„āŽ›āŽœāŽœāŽī„¶ī„µī„µī„µāŽ·š‘˜āŽ›āŽœāŽœāŽš›¼+š‘šī“š‘–=1š›½š‘–ī‚šœŽ2š‘›š‘Ÿš‘–āŽžāŽŸāŽŸāŽ āŽžāŽŸāŽŸāŽ Ć—īƒ©īƒ©1āˆ’š‘„šœ†āˆ’š‘āˆšī€·š»2š‘īƒŖīƒŖ+š‘ƒ1ī€øāŽ›āŽœāŽœāŽœāŽāŽ›āŽœāŽœāŽœāŽ1āˆ’š‘„šœ†āˆ’š‘āˆ’š›¾š‘‘ī”2ī€·š‘+2š›¾š‘‘ī€øāŽžāŽŸāŽŸāŽŸāŽ āŽžāŽŸāŽŸāŽŸāŽ š‘„Ć—āŽ›āŽœāŽœāŽœāŽī„¶ī„µī„µī„µī„µāŽ·š‘˜ī‚€āˆ‘š›¼+š‘šš‘–=1ī‚€š›½š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚ī‚2āˆ‘š›¼+š‘šš‘–=1ī‚€š›½š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚+ī‚€š›¼š‘/šœŽ2š‘›š‘Ÿš‘”ī‚+āˆ‘š‘šš‘–=1ī‚€š‘‘š‘–/īšœŽ2š‘›š‘Ÿš‘–š›½ī‚ī‚€š‘–/īšœŽ2š‘›š‘Ÿš‘–ī‚āŽžāŽŸāŽŸāŽŸāŽ .(22)

Now we form the different constraints on the problem. First, we consider both individual power constraints at the source and the relay and a global power constraint on the whole system. Therefore, the constraints are given by0ā‰¤š‘STā‰¤š‘š‘‡,0ā‰¤š‘š‘–ā‰¤š‘š‘–max,š‘ƒš‘“ā‰¤š‘ƒthš‘“,š‘ST+š‘šī“š‘–=1š‘š‘–ā‰¤š‘total,š‘…š‘‡š‘ +š‘”š‘ ā‰¤š‘‡,(23) where š‘ST is the power available at the source, š‘š‘–max is the power available at each relay, š‘total is the power available to the whole system, and š‘ƒthš‘“ specifies the constraint on the probability of false alarm. The constraints on š‘ƒš‘“, š‘‡š‘ , and š‘”š‘  are introduced to maintain an acceptable throughput. Next the two cases of global power constraint only and individual power constraints only are considered. For the case of global power constraint only, the constraints will beš‘ƒš‘“ā‰¤š‘ƒthš‘“,š‘ST+š‘šī“š‘–=1š‘š‘–ā‰¤š‘total,š‘…š‘‡š‘ +š‘”š‘ ā‰¤š‘‡.(24)

In the other scenario, the constraints are given by0ā‰¤š‘STā‰¤š‘š‘‡,0ā‰¤š‘š‘–ā‰¤š‘š‘–max,š‘ƒš‘“ā‰¤š‘ƒthš‘“,š‘…š‘‡š‘ +š‘”š‘ ā‰¤š‘‡.(25)

The individual power constraints are set to limit the interference suffered by the primary user in the case of missed detection. As there is no individual power constraint, the interference caused to the user in the global power constraint only case, where the primary user is only protected by spectrum sensing, is greater.

The problem with optimizing (22) is that it is a nonlinear and nonconvex function due to the Gaussian Q-function being nonlinear and, in general, nonconvex. Thus, the Lagrangian multiplier method [17] cannot be applied here to obtain closed form expressions of the optimal resource allocation. One has to resort to numerical techniques to obtain the optimal solution.

A special case of importance is the absence of the direct link between source and destination, because the relays take on a more prominent role in the presence of no direct link. In this case, the SER is can be obtained by setting š›¼=0 in (22).

4. Selective Relaying

The drawback of the all-participate (AP) scheme discussed in the previous section is that to avoid causing interference, the source and the relay transmit on orthogonal channels. Hence, consuming a considerable amount of resources. In our discussion of a time orthogonal systems, š‘š+1 time slots are utilized for the transmission of one data frame. Additionally, as no sensing is performed at the relays, the primary may become active over any one of the š‘š time slots and cause interference.

To overcome these problems, a selection scheme is proposed in this section in which only one relay is selected to take part in forwarding the signal from the source. Now only 2 time slots are used in transmitting one frame of data and thus decreasing the likelihood of primary becoming active again during relay transmission. In the selection case, the SER isī€·š»SER=š‘ƒ0ī€øš‘„āŽ›āŽœāŽœāŽī„¶ī„µī„µī„µāŽ·š‘˜āŽ›āŽœāŽœāŽš›½š›¼+š‘—ī‚šœŽ2š‘›š‘Ÿš‘—āŽžāŽŸāŽŸāŽ āŽžāŽŸāŽŸāŽ īƒ©īƒ©1āˆ’š‘„šœ†āˆ’š‘āˆšī€·š»2š‘īƒŖīƒŖ+š‘ƒ1ī€øš‘„Ć—āŽ›āŽœāŽœāŽœāŽī„¶ī„µī„µī„µī„µāŽ·š‘˜ī‚€ī‚€š›½š›¼+š‘—/īšœŽ2š‘›š‘Ÿš‘—ī‚ī‚2ī‚€š›½š›¼+š‘—/īšœŽ2š‘›š‘Ÿš‘—ī‚+ī‚€š›¼š‘/šœŽ2š‘›š‘Ÿš‘”ī‚+ī‚€š‘‘š‘—/īšœŽ2š‘›š‘Ÿš‘—š›½ī‚ī‚€š‘—/īšœŽ2š‘›š‘Ÿš‘—ī‚āŽžāŽŸāŽŸāŽŸāŽ Ć—īƒ©īƒ©1āˆ’š‘„šœ†āˆ’š‘āˆ’š›¾āˆš,2(š‘+2š›¾)īƒŖīƒŖ(26) where š‘š‘—, š‘‘š‘—, and šœŽ2š‘›š‘Ÿš‘— correspond to the š‘—th relay that is selected. The SER in (26) is first optimized for all the relays and the relay which gives the minimum optimum SER is selected. Again, all three cases given in (23), (24) and (25) of both global and individual constraints, global constraint only and individual constraint only are considered. The selection criteria of minimizing SER adds complexity. However, such a criteria provides results which can serve as a benchmark as minimizing SER is the optimal selection criteria.

It is again evident that, even in the selection case, the SER is still a nonlinear and nonconvex function. Therefore, one has to resort to numerical techniques to find the optimal solution. The special case of no direct link is again of particular interest and considered separately.

5. Numerical Results

In this section, numerical results are provided for the optimization problems discussed. First, the proposed AP system with optimal resource allocation is discussed and it is shown that the proposed AP schemes give better performance than the uniform power allocation (UPA) scheme. In UPA, the power is uniformly distributed among the source and the relays and the sensing time and the symbol time are set so that the inequality š‘…š‘‡š‘ +š‘”š‘ ā‰¤š‘‡ is satisfied. The selection scheme is discussed next and its performance is compared with selection with UPA. To make it easy for the reader to follow the discussion, a glossary is included in Table 1.

AcronymFull name

AP-ORA All-participate with optimal resource allocation
AP-ORA-GL All-participate optimal resource allocation with global constraint only
AP-ORA-Ind All-participate optimal resource allocation with individual constraints only
UPA uniform power allocation
AP-ORA-NDL All-participate optimal resource allocation with no direct link
AP-ORA-GL-NDL All-participate optimal resource allocation with global constraint only and no direct link
AP-ORA-Ind-NDL All-participate optimal resource allocation with individual constraints only and no direct link
UPA-NDL uniform power allocation with no direct link
Sel-ORA selection with optimal resource allocation
Sel-ORA-GL selection optimal resource allocation with global constraint only
Sel-ORA-Ind selection optimal resource allocation with individual constraints only
Sel-UPA selection with uniform power allocation
Sel-ORA-NDL selection optimal resource allocation with no direct link
Sel-ORA-GL-NDL selection optimal resource allocation with global constraint only and no direct link
Sel-ORA-Ind-NDL selection optimal resource allocation with individual constraints only and no direct link
Sel-UPA-NDL selection uniform power allocation with no direct link

An interior-point algorithm was used to perform the optimization. The MATLAB function fmincon, which performs constrained optimization, is used to run the interior-point algorithm. To ensure that the algorithm converged to the optimal solution, the algorithm was run for a large number of initial values. All the variances are set as equal, šœŽ2š‘›š‘Ÿš‘”=šœŽ2š‘›š‘–š‘”=šœŽ2š‘›š‘Ÿš‘–=šœŽ2. The constraint of š‘ƒš‘“ is set at š‘ƒthš‘“=0.1. The total time duration is taken to be 100 ms. Binary phase shift keying (BPSK) is the modulation scheme employed. Due to the the number of samples and the sensing time being linearly related, the results are plotted against the number of samples.

The relationship between the number of samples (š‘) and SER is shown in Figure 2. As one can clearly observe from Figure 2, there is an optimal value of the number of samples, hence for the sensing time, which minimizes the SER. This is because of the tradeoff between symbol time, š‘‡š‘  and sensing time, š‘”š‘ . Increasing sensing time means higher probability of detection which leads to a lower SER. However, an increase in sensing time comes at the cost of a decrease in symbol time which leads to lower š›¾0 and š›¾š¼. Therefore, the SER increases. Similarly, decreasing sensing time implies a lower probability of detection and, in turn, higher SER. However, it also means high values of š›¾0 and š›¾š¼ due to increase in symbol time, which in turn leads to lower SER. Hence, there exists an optimal value. This optimal value is affected by the primary user's SNR. The higher the primary user's SNR, the lower the optimal value of the sensing time will be as it takes shorter time to reach the same value of š‘ƒš‘‘ as it would take for a lower SNR of the primary user.

Figure 3 shows the relationship between the symbol time, š‘‡š‘ , and the SER. The relationship follows the opposite pattern as the sensing time. This is due to the constraint relating sensing time and the symbol time. Therefore, when the optimal value of the sensing time is low, the optimal value of the symbol time is high.

Figure 4 shows the SER performance of the different AP schemes plotted against š›¾š‘ , where š›¾š‘ =1/šœŽ2. As expected, for the case with a direct link, the three optimal resource allocation (ORA) scenarios, global constraint only (GL), individual constraints only (Ind), and both global and individual constraints, outperform the uniform power allocation (UPA) and the direct link only for all values of š›¾š‘  and the gap in performance becomes wider with increasing š›¾š‘ .

In Figure 4, in the case where there is no direct link (NDL) between source and destination, the performance is a little different. In this case, all three ORA schemes, AP-ORA-NDL, AP-ORA-GL-NDL, and AP-ORA-Ind-NDL, outperform the uniform power allocation scheme (UPA-NDL). However, for š›¾š‘  less than 0ā€‰dB, the direct link only case provides better SER performance than the three ORA cases with no direct link. The three ORA schemes with no direct link start to catch up to the direct link only scenario after 0ā€‰dB and completely outperform it after 5ā€‰dB. This phenomena coupled with the fact that AP-ORA-NDL, AP-ORA-GL-NDL, and AP-ORA-Ind-NDL, are handily outperformed by AP-ORA, AP-ORA-GL, and AP-ORA-Ind, respectively, demonstrate the significance of the presence of a link between the source and destination.

Comparing the different constraints, AP-ORA gives the worst performance in both scenarios of direct and no direct link. This is due to the fact that AP-ORA is constrained both globally and individually. Thus, even if one relay has more favourable conditions, the power allocated to it cannot exceed š‘š‘–max which is not the case in global constraint only case. In global constraint only case more power can be allocated to the source and relay which has more favourable conditions. The comparison between global constraint only and individual constraints only requires further elaboration.

First, the global constraints only and individual only scenarios are compared in the no direct link case. Here, AP-ORA-Ind-NDL provides lower SER than AP-ORA-GL-Ind for all values of š›¾š‘ . AP-ORA-GL-NDL has the advantage of allocating more power to relays with better channel conditions. However, AP-ORA-Ind-NDL makes up for this advantage by having more total power in the system as it is not constrained by a total power constraint.

Now consider the direct link case. Here, AP-ORA-GL outperforms AP-ORA-Ind at low values of š›¾š‘  due to the presence of the direct link. As discussed before, the direct link is quite important, hence, as AP-ORA-GL is not limited by individual constraints, more power can be allocated to the direct link. This is not the case for AP-ORA-Ind. Therefore, AP-ORA-GL gives lower SER. However, with an increase in š›¾š‘ , the noise decreases and the greater total power in the case of AP-ORA-Ind comes more into play. Thus, AP-ORA-Ind starts to outperform AP-ORA-GL at higher values of š›¾š‘ . However, we must keep in mind that in the global power constraint only case, the interference to the primary is greater than those in the other two cases. Hence, the advantage in performance at low š›¾š‘  comes at the cost of greater interference to the primary.

Figure 5 shows the SER performance of the AP system as a function of the number of relays, š‘š. A similar pattern to Figure 4 is observed. The ORA schemes outperform the UPA schemes in both cases of direct and no direct link. Among the proposed ORA schemes, AP-ORA-Ind-NDL provides lower SER than AP-ORA-NDL and AP-ORA-GL-NDL in the no direct link scenario while in the direct link scenario AP-ORA is outperformed by both AP-ORA-Ind and AP-ORA-GL. In addition, AP-ORA-GL has better performance than AP-ORA-Ind for a small number of relays. However, as the number of relays increases AP-ORA-Ind surpasses AP-ORA-GL in terms of performance due to greater total power. Moreover, AP-ORA-NDL, AP-ORA-GL-NDL, and AP-ORA-Ind-NDL even start to outperform UPA for a large number of relays which shows the gain in performance due to ORA.

Figure 6 shows the performance of the various selection schemes as a function of š›¾š‘ . The comparison in performance follows a similar pattern as in the AP case with the proposed selection ORA schemes outperforming their UPA counterparts and direct link only scenario. However, there is one major difference. In the presence of a direct link, Sel-ORA-Ind gives poorer performance than Sel-ORA-GL even for high values of š›¾š‘ . Only at around 15 dB does Sel-ORA-Ind starts to catch up to Sel-ORA-GL. This is due to the fact that as pointed out in the AP system, in the case of global constraints only more power can be allocated to the source. However, unlike AP, in Sel there is only one additional relay which implies less total power for Sel-ORA-Ind and, therefore, requires a high value of š›¾š‘  to make the difference in total power count.

SER performance for selective relaying as a function of the number of relays is shown in Figure 7. Again, the main difference from the AP case is that Sel-ORA-GL outperforms Sel-ORA-Ind even for a large number of relays. This is due to the fact that even though the number of relays increase, the total power for Sel-ORA-Ind remains constant as only one relay in addition to the source takes part in data transmission. An interesting point to note here is that the there seems to be a minimum threshold for the SER for the selective system.

Figures 8 and 9 show the performance comparison between the AP and Sel system as a function of š›¾š‘  and š‘š, respectively. The comparison is presented separately for clarity, as if it was included in the previous figures, they would have become cluttered. From Figure 8, one can see that AP scheme outperforms the selection scheme in all scenarios, however, the gap in performance is not too big. This is due to the fact that the total number of relays is 3. If š‘š is increased, the performance gap will also increase. Still, one has to keep in mind the extra cost and spectral inefficiency associated with the AP scheme. This becomes more clear when the Figure 9 is examined.

As one can see, the difference in performance between the respective AP schemes and Sel schemes increases with increase in number of relays. As discussed earlier, the Sel schemes look to be bounded by a minimum threshold. Due to this, Sel with direct link scenarios even fall below the AP with no direct link scenarios for a large number of relays.

6. Conclusions

In this paper, ORA for a cognitive relay network has been discussed. It has been shown that for an AP system that ORA improves SER performance and the discussed schemes outperform the UPA schemes. The importance of the direct link between the source and the destination has also been demonstrated. Among the different constraints on the system, the case of both individual and global constraints gives the worst performance while global constraints only is the best for low š›¾š‘ . However, this comes at the cost of greater interference to the primary user. The individual constraints only case takes over as the best scheme as š›¾š‘  increases.

It was then noted that the AP scheme consumes considerable resources and is spectrally inefficient. Therefore, a simple relay selection scheme has been proposed. Optimal resource allocation was then discussed for the selection scheme. The performance comparison of the AP and Sel shows that while AP provides better SER performance, it comes at the cost of considerable resources.


This work was supported by King Abdullah University of Science and technology (KAUST).


  1. ā€œFederal communications comission (fcc), et docket no 03-322 notice of proposed rule making and order,ā€ 2003. View at: Google Scholar
  2. J. Mitola and G. Maguire Jr., ā€œCognitive radio: making software radios more personal,ā€ IEEE Personal Communications, vol. 6, no. 4, pp. 13ā€“18, 1999. View at: Publisher Site | Google Scholar
  3. S. Haykin, ā€œCognitive radio: brain-empowered wireless communications,ā€ IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201ā€“220, 2005. View at: Publisher Site | Google Scholar
  4. Y. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, ā€œSensing-throughput tradeoff for cognitive radio networks,ā€ IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1326ā€“1337, 2008. View at: Publisher Site | Google Scholar
  5. S. Stotas and A. Nallanathan, ā€œOptimal sensing time and power allocation in multiband cognitive radio networks,ā€ IEEE Transactions on Communications, vol. 59, no. 1, pp. 226ā€“235, 2011. View at: Publisher Site | Google Scholar
  6. J. Laneman, D. Tse, and G. Wornell, ā€œCooperative diversity in wireless networks: efficient protocols and outage behavior,ā€ IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062ā€“3080, 2004. View at: Publisher Site | Google Scholar
  7. W. Yue, B. Zheng, and Q. Meng, ā€œOptimal power allocation for cognitive relay networks,ā€ in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP '09), pp. 1ā€“5, Nanjing, China, November 2009. View at: Publisher Site | Google Scholar
  8. L. Li, X. Zhou, H. Xu, G. Y. Li, D. Wang, and A. Soong, ā€œSimplified relay selection and power allocation in cooperative cognitive radio systems,ā€ IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 33ā€“36, 2011. View at: Publisher Site | Google Scholar
  9. J. Mietzner, L. Lampe, and R. Schober, ā€œDistributed transmit power allocation for multihop cognitive-radio systems,ā€ IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5187ā€“5201, 2009. View at: Publisher Site | Google Scholar
  10. Z. Liu, Y. Xu, D. Zhang, and S. Guan, ā€œAn efficient power allocation algorithm for relay assisted cognitive radio network,ā€ in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP '10), pp. 1ā€“5, Suzhou, China, October 2010. View at: Publisher Site | Google Scholar
  11. X. Liu, B. Zheng, J. Cui, and W. Ji, ā€œA new scheme for power allocation in cognitive radio networks based on cooperative relay,ā€ in Proceedings of the 12th IEEE International Conference on Communication Technology (ICCT '10), pp. 861ā€“864, Tsukuba Science City, Novmber 2010. View at: Google Scholar
  12. X. Qiao, Z. Tan, S. Xu, and J. Li, ā€œCombined power allocation in cognitive radio-based relay-assisted networks,ā€ in Proceedings of the IEEE International Conference on Communications Workshops (ICC '10), pp. 1ā€“5, Cape Town, South Africa, May 2010. View at: Publisher Site | Google Scholar
  13. X. Liu, B. Zheng, and W. Ji, ā€œCooperative relay with power control in cognitive radio networks,ā€ in Proceedings of the 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '10), pp. 1ā€“5, Chengdu, China, September 2010. View at: Publisher Site | Google Scholar
  14. L. Jayasinghe and N. Rajatheva, ā€œOptimal power allocation for relay assisted cognitive radio networks,ā€ in Proceedings of the IEEE 72nd Vehicular Technology Conference Fall (VTC2010-Fall '10), pp. 1ā€“5, Ottawa, Canada, September 2010. View at: Publisher Site | Google Scholar
  15. Z. Shu and W. Chen, ā€œOptimal power allocation in cognitive relay networks under different power constraints,ā€ in Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS '10), pp. 647ā€“652, Beijing, China, June 2010. View at: Google Scholar
  16. H. Urkowitz, ā€œEnergy detection of unknown deterministic signals,ā€ Proceedings of the IEEE, vol. 55, no. 4, pp. 523ā€“531, 1967. View at: Google Scholar
  17. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.

Copyright Ā© 2012 Ammar Zafar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.