#### Abstract

We propose a more practical spectrum sensing optimization problem in cognitive radio networks (CRN), by considering the data traffic of second user (SU). Compared with most existing work, we do not assume that SU always has packets to transmit; instead, we use the actual data transmitted per second rather than the channel capacity as the achievable throughput, to reformulate the Sensing-Throughput Tradeoff problem. We mathematically analyze the problem of optimal sensing time to maximize the achievable throughput, based on the data traffic of SU. Our model is more general because the traditional Sensing-Throughput Tradeoff model can be seen as a special case of our model. We also prove that the throughput is a concave function of sensing time and there is only one optimal sensing time value which is determined by the data traffic. Simulation results show that the proposed approach outperforms existing methods.

#### 1. Introduction

Cognitive radio (CR) is a promising technology to exploit the unused spectrum bands licensed to the primary user (PU) [1]. When the PU is inactive, the SU can transmit data on the idle channel; otherwise, SU have to keep silent. To provide enough protection of PU, the secondary users are required to sense the channel. Therefore, spectrum sensing is of significant importance in CRN.

There is a fundamental problem called Sensing-Throughput Tradeoff which has been studied in depth [2–4]. From the SU’s perspective, when the sensing time is longer, the probability of false alarm will be lower, and then there are more chances to transmit data which means the throughput is higher. However, the longer sensing time also shortens the allowable data transmission time of the secondary users. Hence, it is an important problem to find the optimal sensing time that maximizes the SU’s throughput while providing adequate protection to the PU.

Some important results have been given in related references. References [2–4] study the tradeoff to get the optimal throughput. This problem is further studied under limited time constraints in [5]. The authors in [6] consider the effect of primary user traffic. References [7, 8] study the tradeoff problem considering the reporting overhead. The authors in [9] propose a discontinuous spectrum sensing scheme under energy-constrained environment and achieve remarkable energy savings with negligible throughput loss.

Though this problem has been extensively studied with significant results, to the best of our knowledge, existing researches all make an impractical assumption that SU has countless data packets to transmit all the time. Then the optimal sensing time problem is equivalent to the following problem: how to maximize the idle channel capacity in a frame time.

However, this assumption does not always hold because the amount of data packets depends on the traffic flow in practical systems. Actually, it is certainly not SU has countless packets to transmit all the time in practical scenarios. In methodology, the above assumption simplifies the sensing time optimization problem, because the data traffic would have a great influence on the optimal sensing time. It should be noted that the ultimate purpose of all the study on spectrum sensing and access is to complete the data traffic of SU.

In this paper, we discard the impractical assumption that SU has data packets to transmit all the time. We define the SU throughput as the actually transmitted data in the actual time spent, rather than the channel capacity in the frame time and reformulate the Sensing-Throughput Tradeoff problem based on the data traffic of SU. We propose a more general model and prove that the throughput is a concave function of sensing time and there is only one optimal sensing time value which is determined by the data traffic.

The rest of this paper is organized as follows. The system model is described in Section 2. In Section 3, the performance analysis is presented. Computer simulation results are provided in Section 4. Finally, we draw a conclusion of our work in Section 5.

#### 2. System Model

##### 2.1. Frame Structure

We consider a slotted frame structure like in [2]. We also assume that the PU is either absent or present during each frame duration. The slot time is which is divided into sensing duration and data transmission duration , as shown in Figure 1. SU carries out spectrum sensing in the sensing duration and starts data transmission if PU is inactive by the sensing result. We denote that the channel capacity is .

We, specially, discard the impractical assumption that SU has data packets to transmit all the time and focus on the actual SU throughput defined by transmitted data in the actual time spent, rather than the channel capacity obtained. In Figure 1, the data packet queue of SU is not always full, which is decided by the input traffic (actual demand). The SU may not always transmit data packets during the left time of slot , the real data transmission time will be , and then the actual throughput would be totally different with existing works where the assumption of countless data is adopted.

Obviously, our model is more practical because it is certainly not SU has countless packets to transmit all the time in practical scenarios. Actually, our model is more general compared to the existing one. The traditional model in [2] is a special case of our model when the data queue of SU is long enough for transmission duration ; that is, .

##### 2.2. Definition of Throughput

In existing works, under the assumption that all the SUs have countless data packets to transmit all the time, the throughput would be computed by where is the capacity of channel. is the time left to transmit data after sensing duration.

The above definition of throughput is actually the available channel resource, not the exact throughput obtained by SU.

In order to study the actual optimal sensing order in practical systems, as in Figure 1, we use the actual throughput of SU’s data traffic defined by the actually transmitted data in the actual time spent:

This value is the actual throughput for the data traffic . In addition, when .

#### 3. Performance Analysis

##### 3.1. Energy Detection

We adopt energy detection in the sensing duration as in [3]. Local spectrum sensing problem using energy detection can be formulated as the following binary hypothesis test: where and denote that the PU on the channel is absent and present, respectively. is the received signal at the th sample in SU. The noise is a Gaussian, independent, and identically distributed (i.i.d) random process with mean zero and variance . The primary signal is an i.i.d random process with mean zero and variance . We assume that the primary signal is complex PSK modulated and the noise is circularly symmetric complex Gaussian (CSCG) signal. denotes the channel gain of the listening channel between the PU and SU. Similar with the analysis in [3], we assume that the sensing time is smaller than the coherence time of the channel, so can be viewed as time invariant during the sensing process, . We denote by the signal-to-noise ratio (SNR) at the SU when PU exists.

Following the analysis in [3], we use the test statistic given by where denotes the number of samples. Using central limit theorem (CLT), for a large , the probability density function (PDF) of under hypothesis can be approximated by a Gaussian distribution with mean and variance . The PDF of under hypothesis can be approximated by a Gaussian distribution with mean and variance as When the detection threshold is , the probability of false alarm is given by The probability of detection is given by where We denote sampling frequency by ; when the sensing time is , the number of samples will be . Combining (6) and (7), the probability of false alarm is given by

##### 3.2. Sensing-Throughput Tradeoff

We focus on the throughput of SU when PU is inactive, as in [2]; then denotes the channel capacity when it operates in the absence of primary users. We denote by the probability for which the primary user is inactive; then the throughput of SU is given by

We focus on the first situation, that is, , because this one can show the effect of data traffic, and the other situation () is the traditional study [2].

There is a tradeoff between sensing and transmission. When is fixed to provide enough protection for PU, is a decreasing function of sensing time since is a monotonically decreasing function of . When is longer, increases, but the value of in (10) decreases at the same time.

The objective is to find the optimal sensing time for SU’s traffic to maximize the throughput while PU is sufficiently protected. The optimization problem can be stated as where is the target probability of detection. For example, = 0.9 in IEEE802.22 WRAN [9].

##### 3.3. Optimal Sensing Time

In problem (11), is a monotonically decreasing function of is a monotonically decreasing function of , and then is a monotonically decreasing function of . Therefore, the optimal solution is achieved with equality constraint in (11). So the optimization problem can be transferred into

Theorem 1. *There exists only one optimal sensing time which maximizes the throughput when is a typical value range in cognitive radio.*

*Proof. *From (12), we have
and then

According to (9),

When , is monotonically increasing function of [3], which means .

Applying , , and to (14), we can get , which means that is a monotonically decreasing function of .

In addition, according to (9) and (15), , and , then

Since , , , is concave for the range of when . We can have the following conclusions.

If , that is, , there is one optimal sensing time which maximizes the throughput .

If , that is, , the optimal sensing time is .

This result means that condition is meted (10), and this situation has been studied in [2], where is concave for the range of when ; there is also one optimal sensing time (denoted by ) which maximizes the throughput .

Combining our research and study in [2], the conclusion is as follows. If , the optimal sensing time is . Else, .

In particular, according to (13), when , , which means that when there is no limitation of time slot, is concave for the range of when , there is only one optimal sensing time which maximizes the throughput .

In all, there is only one optimal sensing time which maximizes the throughput when . So efficient search algorithms can be developed to find the optimal sensing time.

In addition, the optimal sensing time in our model is related to the traffic and the channel capacity , which is different from research in [2].

#### 4. Numerical Results and Discussions

In this section, we present the simulation results to evaluate the performance of the proposed method. Without loss of generality, similar with [2], the following parameters are set.

The bandwidth of PU channel is 6 MHz, the SNR of SU’s signal without PU’s single is 0 dB, and the sampling frequency is the same as the bandwidth. The probability of channel idle is , and the target probability of detection is . We are also interested in low SNR regime as in [2].

We assume that the model of data traffic of SU is constant bit rate (CBR) traffic [10], which is a popular traffic source in network simulation. The data rate is set as [] Kbit/s; then the data amount for transmission in next slot is . These data rates include some typical voice and video formats, such as G.728LD-CELP (16 Kbit/s), G.711PCM (64 Kbit/s), WMV (256 Kbit/s), AVI/RM (384 Kbit/s), flash (512 Kbit/s), and H264 (768 Kbit/s), to simulate the traffic generated by various applications.

Figures 2 and 3 show that the optimal sensing time obtained by our method is different with the value obtained by the method in [2] (capacity based [2]). Note that the throughput in the top figure (capacity based [2]) is the throughput defined by (1), not the real throughput for data traffic defined by (2). In addition, the optimal sensing time in [2] is different when the frame time is different, but in our method, the optimal sensing time is only determined by SU’s traffic.

**(a)**

**(b)**

**(a)**

**(b)**

Figures 2, 4, and 5 show that the optimal sensing time is different when the SNR is different, and the value in [2] and in our method is also different. Importantly, there is only one optimal sensing time value in different SNR values, which proves our analysis.

**(a)**

**(b)**

**(a)**

**(b)**

Figures 6, 7, 8, and 9 show that the optimal sensing time varies with the input data traffic of SU in the proposed method. However, with fixed frame time and SNR value, the optimal sensing time obtained by [2] is a fixed value, which is not related with traffic.

**(a)**

**(b)**

**(a)**

**(b)**

**(a)**

**(b)**

**(a)**

**(b)**

The results show that the real throughput for traffic obtained by our method is obviously better than the method in [2]. For example, in Figure 6, with some typical applications, 157 percent improvement for G.711PCM (64 Kbit/s), 114 improvement for WMV (256 Kbit/s) and 109 improvement for AVI/RM (384 Kbit/s), because the sensing time is optimized by considering the traffic.

When the frame time and SNR value are different, the optimal sensing time and the optimal throughput change. Importantly, the performance of the proposed method is always better than the method in [2], which fails to take the SU’s traffic into consideration.

In addition, when the traffic is heavy, the data queue may be almost full; the throughput becomes almost the same, which verifies that the model in [2] is a special case of our model.

#### 5. Conclusions

In this paper, we investigate the Sensing-Throughput Tradeoff problem in CRN, considering the effect of traffic of SU. We reformulated this problem by removing the assumption that the SUs always have countless data packets to transmit. The proposed model is more suitable for practical systems and can be regarded as a more general model compared with the existing work, because the traditional Sensing-Throughput Tradeoff model can be seen as a special case of our model. We also prove that the throughput is a concave function of sensing time when the probability of false alarm is less than 0.5, and there is only one optimal sensing time value which is determined by the data traffic. Simulation results show that the proposed method achieves better performance than the existing approaches.

#### Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant nos. 61172062 and 61301160), by Jiangsu Province Natural Science Foundation (Grant no. BK2011116), and in part by the National Basic Research Program of China (Grant no. 2009CB320400). This work was also supported by the National Science Foundation of China under Grant no. 61401508.