1

Cooperative Spectrum Sensing Under Random Geometric Primary User Network Model Kae Won Choi, Member, IEEE, Ekram Hossain, Senior Member, IEEE, and Dong In Kim, Senior Member, IEEE

Abstract—We propose a novel cooperative spectrum sensing algorithm for a cognitive radio (CR) network to detect a primary user (PU) network that exhibits some degree of randomness in topology (e.g., due to mobility). We model the PU network as a random geometric network that can better describe small-scale mobile PUs. Based on this model, we formulate the random PU network detection problem in which the CR network detects the presence of a PU receiver within a given detection area. To address this problem, we propose a location-aware cooperative sensing algorithm that linearly combines multiple sensing results from secondary users (SUs) according to their geographical locations. In particular, we invoke the Fisher linear discriminant analysis to determine the linear coefficients for combining the sensing results. The simulation results show that the proposed sensing algorithm yields comparable performance to the optimal maximum likelihood (ML) detector and outperforms the existing ones, such as equal coefficient combining, OR-rule-based and AND-rule-based cooperative sensing algorithms, by a very wide margin. Index Terms—Cognitive radio, opportunistic spectrum access, energy detection, cooperative spectrum sensing, location awareness, random geometric network, machine learning, Fisher linear discriminant analysis.

I. I NTRODUCTION A cognitive radio (CR) system opportunistically exploits the spectrum bands that primary users (PUs) hold a license to use, while it does not impose unacceptable interference to the PUs [1]. It finds out and accesses spectrum opportunities, which are the spectrum bands spatially or temporarily unused by PUs, by means of a spectrum sensing method. Considering that the performance of a cognitive radio system depends on how accurately the CR detects the spectrum opportunities, designing an efficient spectrum sensing method is a key to successful realization of the CR concept. Spectrum sensing in the context of a CR system is known to be a very challenging task due to the hidden PU problem [2] and the channel fading [3]. Cooperative sensing method is one viable way to tackle these problems by exploiting spatial diversity from multiple spectrum sensors. A comprehensive survey on cooperative spectrum sensing can be found in [4], [5]. A number of hard combining sensing algorithms were proposed in the literature, including the OR-rule [6], [7], the counting rule [8], [9], and the linear quadratic combining rule [10]. Soft combining cooperative sensing methods were studied in [11]– [13]. The softened hard combination method was proposed in [12] and the optimal linear fusion algorithm was suggested in [13]. In [14], [15], the authors analyzed the relay-based cooperative sensing schemes with the amplify-and-forward

protocol [14] and the decode-and-forward protocol [15]. The authors of [16], [17] suggested some methods to reduce the overhead due to feedback from the distributed spectrum sensors. In [18], the multi-band joint detection algorithm was introduced, which detects PUs over multiple frequency bands simultaneously. In [19], the problem of cooperative spectrum sensing was formulated as a cooperative boundary detection problem, and the problem was solved by using a two-stage algorithm. However, the overall algorithm has polynomial time complexity. In [20], a graph-based consensus algorithm for distributed cooperative spectrum sensing was proposed where the secondary users locally exchange their individual detection outcomes before reaching on an agreement on the presence of primary users. In [21], a distributed collaborative sensing strategy was developed based on the theory of coalitional games. The objective of this scheme is to maximize the detection probability taking into account the cost of cooperation. In [22], the optimal sensing threshold for energy detection was derived when a CR has location side information of PUs. Although the problem of cooperative sensing has been extensively researched, there are still many issues that need to be addressed. First of all, we require to consider a more general PU network model. Most of the existing works in the literature either assume that there is only one PU or do not consider the topology of the PU network at all [7], [8], [10], [12]–[21]. This PU network model may be feasible for largescale fixed PUs (e.g., TV stations coexisting with the 802.22based wireless regional area network (WRAN)). However, this model is not viable if we consider small-scale mobile PUs such as ad hoc networks, wireless personal area networks (WPANs), and wireless microphones. In such a case, from the standpoint of the SU network, the PU network is completely random with respect not only to its activity and operating frequency channel but also to the network topology. The randomness of the PU network topology is very well described by the random geometric network model [23]. Therefore, in this paper, we model the PU network as a random geometric network. There are few works applying the random network theory to the CR (e.g., [24]–[26]), which studied the power control problem [24], the scaling law of the delay and the throughput [25], and the interference analysis [26]. Therefore, it is a novel idea to invoke the random geometric network model for the PU network in the context of the cooperative spectrum sensing problem. Based on the random geometric network model, we formulate the “random PU network detection problem,” where the CR network decides if there exists a PU receiver or not within

2

a certain detection area. An example to illustrate the random PU network detection problem is shown in Fig. 1(a) and (b). A node in the CR network will henceforth be called a secondary user (SU). A PU receiver (PU-Rx) receives a signal transmitted from a PU transmitter (PU-Tx). In this example, the SU at the origin aims to detect PU-Rx’s within the detection area around itself by gathering the sensing results from the other cooperating SUs. That is, the CR network tries to distinguish the PU-absent case in Fig. 1(a) from the PU-present case in Fig. 1(b). This detection model is particularly useful for a large-scale ad hoc/mesh CR network wherein each SU has to find out local spectrum availability around itself. To address the random PU network detection problem, it is important to incorporate location-awareness into the cooperative sensing algorithm. In Fig. 1, an SU distant from the origin has a less reliable sensing result than that a nearby SU has about the existence of PU-Rx’s within the detection area. Therefore, sensing performance can be improved if the SU fuses the sensing results considering the difference in their reliability according to the distances from the origin. To design such an algorithm, we propose a linear fusion rule in which the linear coefficients are determined by the Fisher linear discriminant analysis [27]. The linear coefficients turn out to well reflect the geographical aspect of the SU network. In a related work [28], a cooperative sensing algorithm estimating the maximum interference-free transmit power level was proposed. Another work [29] proposed an optimal combining algorithm when the PU can appear at an arbitrary location. However, these works assumed that there is only one PU in the entire area. There have been few localization algorithms for cooperative sensing, which directly estimate the locations of PUs (e.g., [30]–[32]). Compared to the proposed algorithm, these localization algorithms are computationally complex and require a large number of SUs participating in cooperative sensing for accurate measurement. Moreover, these localization algorithms do not treat PUs as nodes forming a network but rather deem these PUs as power transmitting sources. In Table I, we compare the proposed algorithm qualitatively with the other existing algorithms. The proposed algorithm is advantageous in that it adopts random geometric PU network model in which there are multiple PUs with random locations. In addition, the hidden PU problem is taken into account by considering a PU-Rx as well as a PU-Tx. The proposed algorithm can also detect local existence of a PU within a specific detection area by exploiting the location awareness. The contributions of the paper can be summarized as follows: • We introduce the random PU network detection problem where the PU network is modeled as a random geometric network. This random network model can extend the simple PU model used in the existing literature, and is able to describe the random locations and the geographical characteristics of the PU networks. This model is particularly useful in modeling small-scale mobile PUs with unknown locations. • We propose a location-aware cooperative sensing algorithm that linearly combines the sensing results from

multiple SUs. Different from the existing linear combining algorithms (e.g., [13]), the linear coefficients of the proposed algorithm are formed by classifying the sensing results according to their reliability measured by the location information through the Fisher linear discriminant analysis. The simulation results show that the proposed algorithm has comparable performance to the optimal maximum likelihood (ML) detector and greatly outperforms the equal coefficient combining, the ORrule-based, and the AND-rule-based cooperative sensing algorithms. The rest of the paper is organized as follows. Section II describes the system model and assumptions. In Section III, we present the random primary user network detection problem and the linear cooperative sensing algorithm. In Section IV, we calculate the statistics for Fisher discriminant analysis of the proposed algorithm. We show representative performance evaluation results in Section V. Section VI concludes the paper. A list of the key mathematical symbols used in this paper is given in Table II. II. S YSTEM M ODEL AND A SSUMPTIONS A. Secondary User Network Model Consider PU and SU networks on the two-dimensional plane R2 as in Fig. 1. In this paper, we assume that the PU and SU networks share a single frequency channel. Note that the proposed algorithm can easily be extended to the case of multiple frequency channels. In the SU network, there are N SUs, each of which is indexed by i = 1, . . . , N . Let us define ci as the coordinate of SU i. The SU network tries to detect whether there is any PU receiver (PU-Rx) in the detection area A ∈ R2 . For example, in Fig. 1, the SU located at the origin needs to detect PU-Rx’s within the radius R to decide if it can transmit a signal without interfering any PU-Rx’s reception. In this example, the detection area is a disk of radius R centered at the origin, i.e., A = {x|kxk ≤ R}.1 The SU network performs cooperative spectrum sensing in a centralized manner. An SU collects the sensing results from other SUs, and then fuses the results together to decide spectrum availability. To efficiently fuse the sensing results, the proposed algorithm makes use of the topology information of the SU network. It is assumed that the SU network is aware of the relative locations of all SUs. Even when the SU network is mobile, the topology of the SU network can be regarded as deterministic from the point of view of the spectrum sensing algorithm since it knows the current locations of all SUs. The locations of the SUs can be obtained by means of various location estimation techniques such as the global positioning system (GPS) or the ultra-wideband (UWB) positioning [33]. B. Random Geometric Network Model for Primary User Network From the standpoint of the SU network, it is reasonable to consider the PU network as a random geometric network [23]. The PU network consists of PU transmitters (PU-Tx’s) and PU 1k

· k denotes the Euclidean norm.

3

TABLE I C OMPARISON AMONG DIFFERENT COOPERATIVE SENSING ALGORITHMS Algorithm Proposed OR-rule Counting rule Linear quadratic combining Softened hard combining Optimal linear fusion Relay-based sensing Feedback reduction Low-overhead sensing Multiband detection Boundary detection Consensus-based sensing Coalition game Location side information Maximum transmit power Random path-loss Localization

Reference [6], [7] [8], [9] [10] [12] [13] [14] [16] [17] [18] [19] [20] [21] [22] [28] [29] [30]–[32]

No. of PUs Multiple Single Single Single Single Single Single Single Single Single Single Single Single Single Single Single Multiple

PU location Random Fixed Fixed Fixed Fixed Fixed Fixed Fixed Fixed Fixed Fixed Fixed Fixed Random Random Random Random

Hidden PU consideration Yes No No No No No No No No No No No No Yes Yes No No

Location awareness Yes No No Yes No Yes No No No No Yes No No Yes Yes No Yes

Local detection Yes No No No No No No No No No No No No Yes Yes No Yes

TABLE II L IST OF S YMBOLS

  





 

(a) PU-absent case (Y = 0)

      

  





 

(b) PU-present case (Y = 1) Fig. 1.

The PU and SU network model for PU-absent and present cases.

receivers (PU-Rx’s). A PU-Tx transmits a signal to a PU-Rx, which can be sensed by SUs. A PU-Rx attempts to receive a signal from a PU-Tx and therefore it should be protected from the harmful interference from SUs. Since a PU-Rx is generally located close to the PU-Tx from which it receives a signal, an SU can avoid interfering a PU-Rx by not transmitting any signal if the SU senses the signal from the corresponding PUTx. Note that, since a PU-Tx does not receive any signal, an SU can transmit simultaneously with a PU-Tx within the SU’s interfering range. In this paper, we do not explicitly consider

Symbol N A ci ΠTx ΠRx ΦTx ΦRx ΛTx (X ) ΛRx (X ) λTx (s) λRx (s) λTx|Y =0 (s) ζ fζ p(s) µp σp2 gi (s) ρ(d) ψi (s) µψ 2 σψ ωi (s) µω 2 σω Pi T W No γi Y w D

Definition Number of SUs Detection area Coordinate of SU i Set of the coordinates of PU-Tx’s Set of the coordinates of PU-Rx’s Measures representing the number of PU-Tx’s Measures representing the number of PU-Rx’s Expected number of PU-Tx’s within X Expected number of PU-Rx’s within X Density of PU-Tx’s on s Density of PU-Rx’s on s Density of PU-Tx’s on s in the PU-absent case Random displacement of a PU-Rx from the corresponding PU-Tx Probability density function of the random displacement ζ Transmission power of SU s Mean of the transmission power Variance of the transmission power Channel gain from PU-Tx s to SU i Path-loss for distance d Lognormal shadow fading component from PU-Tx s to SU i Mean of the shadow fading component Variance of the shadow fading component Multi-path fading component from PU-Tx s to SU i Mean of the multi-path fading component Variance of the multi-path fading component Total power received by SU i Energy detection time Bandwidth Noise spectral density Sensing result from SU i Indicator for the presence of a PU-Rx within the detection area Linear coefficient vector Linear combination of the sensing results

any mobility model such as the random waypoint model [34]. However, the proposed sensing algorithm can well be used to detect a mobile PU network based only on the random geometric network model. The locations of PU-Tx’s and PU-Rx’s are described by two-dimensional point processes, which are random collec-

4

tions of points on R2 . Let ΠTx and ΠRx denote the set of the coordinates of PU-Tx’s and PU-Rx’s, respectively. The PUTx (PU-Rx) s indicates the PU-Tx (PU-Rx) located at the coordinate s ∈ ΠTx (s ∈ ΠRx ). We also define ΦTx and ΦRx as the numbers of PU-Tx’s and PU-Rx’s, respectively, in a set in R2 . That is, ΦTx (X ) and ΦRx (X ) are the numbers of PU-Tx’s andTPU-Rx’s on T X ⊂ R2 (i.e., the numbers of the points in X ΠTx and X ΠRx ), respectively. It is assumed that the point processes ΠTx and ΠRx are isotropic and stationary. Specifically, we consider a peer-to-peer random network with a Poisson point process as the PU network. We assume that the point process for PU-Tx’s, ΠTx , is a Poisson point process. The density of PU-Tx’s on s is denoted by λTx (s). The expected number of PU-Tx’s in X is ΛTx (X ) = E[ΦTx (X )] = R λ (s) ds. Therefore, ΦTx (X ) follows a Poisson distribuTx s∈X tion with mean ΛTx (X ), and ΦTx (X1 ) and ΦTx (X2 ) are independent of each other for any disjoint sets X1 and X2 . For PUTx s (i.e., the PU-Tx at the coordinate s), the corresponding PU-Rx is located at s + ζ for the random displacement ζ. Let fζ denote the probability density function (pdf) of the random displacement ζ. We assume that the SU network has prior knowledge about this pdf. For example, if the corresponding PU-Rx is uniformly located within the disk of radius ξ centered at the PU-Tx, the pdf of the random displacement is given as fζ (x) = 1/(πξ 2 ) if kxk ≤ ξ; and fζ (x) = 0 otherwise. According to the displacement theorem [23], the point process for PU-Rx’s, ΠRx ,R is a Poisson point process with the density of λRx (s) = x∈R2 fζ (s − x)λTx (x) dx. Then, the expected number of RPU-Rx’s within X is given as ΛRx (X ) = E[ΦRx (X )] = s∈X λRx (s) ds. A PU-Tx s transmits using random power p(s), the mean and the variance of which are denoted by µp and σp2 , respectively. With this simple peer-to-peer network model, we can consider not only the randomness in PU locations but also the hidden PU problem which is caused by a PU-Rx distant from the corresponding PU-Tx. This PU network model is exemplified by the wireless microphones [35] in the VHF/UHF TV bands to be used by the IEEE 802.22-based wireless regional area networks (WRANs). Note that other types of random networks can also be assumed in designing the cooperative sensing algorithm as long as the model has known statistical properties. C. Channel Model We define gi (s) as the channel power gain from PU-Tx s to SU i, which is subject to path-loss, lognormal shadow fading, and multi-path Rayleigh fading as follows: gi (s) = ρ(ks − ci k) · ψi (s) · ωi (s)

(1)

where ρ(d) is the path-loss component for distance d, ψi (s) is the lognormal shadow fading component, and ωi (s) is the multi-path Rayleigh fading component. We adopt the bounded path-loss law to remove the singularity at zero distance. With the bounded path-loss law, the path-loss is given as ρ(d) = (1 + dα )−1 , where α denotes the path-loss exponent [23]. The shadow fading component in dB (i.e., 10 log10 ψi (s)) follows a normal distribution with

zero mean and standard deviation ν. Then, the mean and ln 10 2 the variance of ψi (s) are µψ = E[ψi (s)] = 10 200 ν and ln 10 2 ln 10 2 σψ2 = Var[ψi (s)] = 10 100 ν · (10 100 ν − 1), respectively. For simplicity, the multi-path fading ωi (s) follows an exponential distribution with mean µω . The shadow fading and the multipath fading are assumed to be independent for each pair of a PU-Tx and an SU, but the energy detection model below can be modified to consider other types of channels, for instance, correlated shadowing for a set of clustered PU-Tx’s. The total power received by SU i from all PU-Tx’s is Z X gi (s)p(s) = gi (s)p(s)ΦTx (ds). (2) Pi = s∈ΠTx

s∈R2

D. Energy Detection Model An SU performs energy detection for a time duration of T . If we denote the bandwidth by W , the energy detector takes W T baseband complex signal samples during T . Let zi,k denote the kth signal sample taken by SU i. Let xi,k (s) denote a signal from PU-Tx s to SU i, and let ni,k denote the thermal noise at SU i. The signal samples consist of the summation of P signals from all PU-Tx’s and the thermal noise, that is, zi,k = s∈ΠTx xi,k (s)+ni,k . The total collected energy 2 PW T P from all PU-Tx’s is k=1 E[ s∈ΠTx xi,k (s) ] = Pi T and the noise spectral density is E[|ni,k |2 ] = No . To generate a sensing result, denoted by γi , the energy detector of SU i estimates P the normalized energy from the signal samples as WT γi = N1o k=1 |zi,k |2 . For a given Pi , the sensing result γi follows a normal distribution if the number of signal samples (i.e., W T ) is sufficiently large [36]. The mean and variance of the normal distribution are estimated to be T Pi (3) E[γi |Pi ] = W T + No T Var[γi |Pi ] = W T + 2 Pi . (4) No III. L INEAR C OOPERATIVE S ENSING A LGORITHM A. Random Primary User Network Detection Problem In this section, we define the random PU network detection problem. The SU network tries to decide if there is any PU-Rx or not within a given detection area A (e.g., A = {x|kxk ≤ R} in Fig. 1), so that it can avoid inflicting interference to PU-Rx’s. In other words, the SU network distinguishes the PU-absent case, where there is no PU-Rx within A, from the PU-present case, where there is at least one PU-Rx within A. We show the PU-absent case in Fig. 1(a) and the PU-present case in Fig. 1(b). Let Y be a random variable that indicates whether there is any PU-Rx within the detection area A. That is, ( 1, if there is at least one PU-Rx in A Y = (5) 0, otherwise. Note that there is at least one PU-Rx in A if and only if ΠRx ∩ A = 6 ∅. The proposed algorithm collects the sensing results from SUs (i = 1, . . . , N ), and then determines Y from the vector of the sensing results γ := (γ1 , . . . , γN )T .

5

B. Maximum Likelihood Detector The optimal detector for the random PU network detection problem is the maximum likelihood (ML) detector following the Neyman-Pearson criterion. Let us define fγ|Y =0 and fγ|Y =1 as the pdf’s of γ given that Y = 0 and Y = 1, respectively. Then, the ML detector determines Y by comparing the likelihood ratio as fγ|Y =1 (γ) ≶δ (6) fγ|Y =0 (γ) for a certain threshold δ. For the ML detector, we require to calculate the pdf of γ given that Y = 0 and Y = 1. Let Lγ|Y =0 and Lγ|Y =1 denote the Laplace transforms of fγ|Y =0 and fγ|Y =0 , respectively. In Appendix A, we calculate Lγ|Y =0 and Lγ|Y =1 (see equations 23-eqly1). To derive fγ|Y =0 and fγ|Y =1 , we need to perform the inverse Laplace transform to Lγ|Y =0 and Lγ|Y =1 . Although the ML detector is optimal in the sense that the false alarm and misdetection probabilities are minimized, it is difficult to implement the ML detector since we have to calculate Lγ|Y =0 and Lγ|Y =1 , which involves numerical integration, and then invert them to derive the pdf’s of the sensing result. Therefore, we will design a low-complexity detector rather than the ML detector to solve the random PU network detection problem. The performance of this lowcomplexity detector will be compared to that of the ML detector. C. Linear Fusion Cooperative Sensing Algorithm To design a simple and efficient detector, we adopt the following linear fusion rule: T

D=w γ=

N X

wn γn ≶ δ

(7)

n=1

where D = wT γ is the linear combination of the sensing results, w := (w1 , . . . , wN )T is the vector of the linear coefficients, and δ is a certain threshold. If wT γ > δ, the detector decides that a PU-Rx is present in A; otherwise, it decides that there is no PU-Rx in A. This linear detector can provide a good approximation to the optimal decision regions of the ML detector. The linear detector divides the vector space of γ into two decision regions by an N -dimensional plane. In Fig. 2, we show the samples of sensing results from two SUs when a PU-Rx is absent and when a PU-Rx is present within the detection area. This figure shows that it is possible to efficiently discriminate the samples in the PU-present case from the samples in the PU-Rx absent case by observing on which side of the plane wT γ = δ the vector γ lies. Now, the problem is how to determine the values of the linear coefficients w. Fig. 2 also demonstrates that it is important to choose appropriate linear coefficients according to the geographical locations of SUs. In this figure, we let SU 1 be located at the center of the detection area which is a disk of radius 50 m. On the other hand, SU 2 is located 100 m away from SU 1, out of the detection area. Hence, SU 1 has more reliable information about the presence of a PU-Rx within

Fig. 2. Samples of sensing results from two SUs when a PU-Rx is absent and present within the detection area. SU 1 is at the origin and SU 2 is at 100 m away from the origin. The detection area is a disk of radius 50 m centred at the origin. The PU-Rx is uniformly located within the disk of radius 1 m centred at the corresponding PU-Tx. The density of PU-Tx’s and PU-Rx’s is λTx (s) = 10−4 m−2 . Here, we only consider the path-loss component.

the detection area than SU 2 does. This can clearly be seen in Fig. 2. To reflect the difference in reliability, the detector should assign different linear coefficients to SUs based on their respective locations. The optimal linear coefficient vector is the one that maximizes the detection probability while minimizing the false alarm probability. However, it may be impossible to calculate the optimal linear coefficients due to high complexity. To circumvent this problem, we invoke the Fisher linear discriminant analysis to determine the linear coefficients. D. Fisher Linear Discriminant Analysis to Determine the Linear Coefficients The Fisher linear discriminant analysis is a machine learning technique that provides means to evaluate the usefulness of each input variable in discerning different classes [27]. Therefore, the Fisher linear discriminant analysis fits very well to our purpose, that is, to decide the linear coefficient for each SU according to its reliability. Let us demonstrate how the Fisher linear discriminant analysis is applied to our problem. Fig. 3(a) and (b) show the histograms of wT γ under both the signal absent and the signal present cases. The locations of SUs and other parameters are the same as the ones for Fig. 2. The linear coefficient vector is set to w = (5, 1)T for Fig. 3(a) and w = (1, 5)T for Fig. 3(b). We can see that the signal absent and the signal present cases are more clearly distinguished when the linear coefficient vector is w = (5, 1)T . Therefore, w = (5, 1)T is preferred to w = (1, 5)T in this example. The Fisher linear discriminant analysis finds the linear coefficient vector that most clearly separates the different cases by assigning higher linear coefficient to a more useful variable. For the best separation between two cases, the Fisher linear discriminant analysis finds w that maximizes J(w) =

(E[wT γ|Y = 1] − E[wT γ|Y = 0])2 . Var[wT γ|Y = 1] + Var[wT γ|Y = 0]

(8)

6



homogeneous. We denote by λTx|Y =0 (s) the density of PUTx’s on s in the PU-absent case. Recall that, for PU-Tx s, the corresponding PU-Rx is located at s + ζ and fζ denotes the pdf of ζ. Since no PU-Rx is within A in the PU-absent case, the density of PU-Tx’s is subject to the independent thinning as Z λTx|Y =0 (s) = λTx (s) · fζ (x − s) ds. (12)

      

 



    

x∈R2 \A



Let us consider the special case when PU-Tx’s constitute a homogeneous poisson process with the density of λ (i.e., λTx (s) = λ for all s), a PU-Rx is uniformly located within the disk of radius ξ centered at the corresponding PU-Tx, and the detection area is a disk of radius R centered at the origin. We define B(a, r) := {x|kx − ak ≤ r} as the disc of radius r centered at a. The density of PU-Tx’s on s in the PU-absent case is derived as in (13). As can be seen in this equation, λTx|Y =0 (s) only depends on the distance from the origin to s, which means that λTx|Y =0 (s) is a circularly symmetric function of s.

 































(a) The linear coefficient vector is w = (5, 1)T . 

      





    

B. Calculation of Components in m0 and m1

 































(b) The linear coefficient vector is w = (1, 5)T . Fig. 3. Histogram of the linear combination of sensing results when a PU-Rx is absent and when a PU-Rx is present within the detection area.

By maximizing J(w), the difference between the expectations of the linear combination for both cases is maximized while the sum of the variances is minimized. Therefore, we can say that the linear coefficients maximizing J(w) separates the two cases very well. According to [27], the linear coefficient vector maximizing J(w) is given by w∗ = (S1 + S0 )−1 (m1 − m0 )

(9)

where my is the mean of γ given that Y = y such that T

my := (E[γ1 |Y = y], . . . , E[γN |Y = y])

In this section, we calculate the components in m0 and m1 , which are the expectations of the sensing results given that Y = 0 and Y = 1. Let us first calculate m0 = (E[γ1 |Y = 0], . . . , E[γN |Y = 0])T . From (2) Rand (3), we calculate E[γi |Y = 0] as in (14), where Υ(x) := s∈R2 ρ(ks− xk) · λTx|Y =0 (s) ds. Now, we calculate m1 = (E[γ1 |Y = 1], . . . , E[γN |Y = 1])T . Since E[γi ] = Pr[Y = 0] E[γi |Y = 0] + Pr[Y = 1] E[γi |Y = 1], we have 1 (E[γi ] − Pr[Y = 0] E[γi |Y = 0]). Pr[Y = 1] (15) Thus, to calculate E[γi |Y = 1], we require to derive Pr[Y = 0] and E[γi ]. The number of PU-Rx’s in A (i.e., ΦRx (A)) follows a Poisson distribution with mean ΛRx (A). Therefore, we have E[γi |Y = 1] =

Pr[Y = 0] = Pr[ΦRx (A) = 0] = e−ΛRx (A) . (10)

and Si is a covariance matrix of γ given that Y = y such that Sy is as given in (11). If we calculate my and Sy , we can derive the optimal linear coefficient vector w∗ from (9). In the sequel, we will calculate the components in my and Sy one by one. Note that these components are calculated not from the training set as in the case of supervised learning, but from the given random network model in a statistical sense. IV. C ALCULATION OF S TATISTICS FOR F ISHER D ISCRIMINANT A NALYSIS A. Random PU Network in Primary User-Absent Case To calculate the statistics for the Fisher discriminant analysis, we first study the characteristics of the PU random network in the PU-absent case. In the PU-absent case, the PU network is still a Poisson random network, however, it is no longer

(16)

In addition, similar to E[γi |Y = 0], we can calculate Z T µψ µω µp E[γi ] = W T + · ρ(ks−ci k)·λTx (s) ds. (17) No s∈R2 From (14), (15), (16), and (17), we have E[γi |Y = 1] = W T +

T µψ µω µp · Θ(ci ) No

(18)

R λ (s)−e−ΛRx (A) ·λTx|Y =0 (s) where Θ(x) := s∈R2 ρ(ks−xk)· Tx ds. 1−e−ΛRx (A) Let us show examples of E[γi |Y = 1] − E[γi |Y = 0] when a PU-Rx is uniformly located within the disk of radius ξ centered at the corresponding PU-Tx and the detection area is a disk of radius R centered at the origin. In this model, λTx|Y =0 (s) is circularly symmetric, which renders E[γi |Y = 0] and E[γi |Y = 1] only depend on the distance from the origin to SU i (i.e., kci k). Hence, in Fig. 4, we plot E[γi |Y = 1]−E[γi |Y = 0] according to the distances from the origin. As the value of E[γi |Y = 1] − E[γi |Y = 0] becomes

7



Var[γ1 |Y = y]  Cov(γ2 , γ1 |Y = y)  Sy :=  ..  . Cov(γN , γ1 |Y = y)

Cov(γ1 , γ2 |Y = y) Var[γ1 |Y = y] .. .

··· ··· .. .

Cov(γN , γ2 |Y = y) · · ·

 Cov(γ1 , γN |Y = y) Cov(γ2 , γN |Y = y)  . ..  . Var[γN |Y = y]

  |B(0, R) ∩ B(s, ξ)| λTx|Y =0 (s) = λ · 1 − |B(s, ξ)|   λ,    0,    λ(1 − R2 /ξ 2 ),   2   2  = R + ksk2 − ξ 2 ξ + ksk2 − R2 λ 2 2   + ξ arccos λ − 2 · R arccos   πξ 2Rksk   2ξksk   1p 2   2 2 2 4 4 4  − (R + ξ + ksk ) − 2(R + ξ + ksk ) , 2

(11)

if ksk ≥ R + ξ if R ≥ ksk + ξ if ξ ≥ ksk + R otherwise.

T E[γi |Y = 0] = E[E[γi |Pi ]|Y = 0] = W T + · E[Pi |Y = 0] No  Z T = WT + ·E gi (s)p(s)ΦTx (ds) Y = 0 No s∈R2 Z T = WT + · ρ(ks − ci k) E[ψi (s)] E[ωi (s)] E[p(s)] E[ΦTx (ds)|Y = 0] No s∈R2 T µψ µω µp · Υ(ci ). = WT + No

λ (s)−e−ΛRx (A) ·λ

R

(13)

(14)

(s)

Tx|Y =0 ds. The ρ(ks − xk)ρ(ks − yk) · Tx 1−e−ΛRx (A) covariance of the sensing results can be derived as in (21)-(22).

s∈R2

D. Summary of the Proposed Cooperative Sensing Algorithm

Fig. 4. The difference in the means of sensing results (i.e., E[γi |Y = 1] − E[γi |Y = 0]) according to the distance from the origin to an SU.

higher, SU i better distinguishes the PU-absent case from the PU-present case. In Fig. 6, we can see that SUs closer to the origin have a higher value of E[γi |Y = 1] − E[γi |Y = 0]. C. Calculation of Components in S0 and S1 The details of calculation of Var[γi |Y = y] and Cov(γi , γj |Y = y), which are required to construct Sy , can be found in Appendix B. The variances of the sensing results can be derived as in (19)-(20), where Υ(x, y) := R ρ(ks − xk)ρ(ks − yk) · λTx|Y =0 (s) ds and Θ(x, y) := s∈R2

The proposed algorithm takes the following three steps to detect a PU-Rx: 1) Given the parameters regarding the detection area and the random PU network model (i.e., A, λTx (s), and fζ ), the algorithm calculates Υ(x), Θ(x), Υ(x, y), and Θ(x, y). 2) Based on the coordinates of SUs (i.e., ci ’s), the algorithm constructs m0 , m1 , S0 and S1 from (14), (18), (19), (20), (21), and (22), and then calculates the linear coefficients w∗ = (S1 + S0 )−1 (m1 − m0 ). 3) If the algorithm receives the vector of the sensing results (i.e., γ), it calculates the linear combination as D = (w∗ )T γ and compares D with the threshold δ to determine the presence of a PU-Rx within the detection area. Each of the above steps is taken in different occasions. The first step is performed only when the parameters related to the detection area and/or the random PU network model change. Since these parameters are generally fixed, the first step can be performed off-line and the calculated functions can be preloaded on the SUs prior to the operation. Therefore, the complexity of this step is not a concern even though it has relatively high complexity due to numerical integration. The second step involves matrix inversion, the complexity of which is of O(N 3 ) with the Gauss-Jordan elimination method. The

8

2T 2 µ2ω (σψ2 + µ2ψ )(σp2 + µ2p ) 2T µψ µω µp · Υ(ci , ci ) · Υ(ci ) + No No2 2T 2 µ2ω (σψ2 + µ2ψ )(σp2 + µ2p ) 2T µψ µω µp · Θ(ci , ci ) Var[γi |Y = 1] = W T + · Θ(ci ) + No No2 T 2 µ2ψ µ2ω µ2p −ΛRx (A) − ·e · (Υ(ci ) − Θ(ci ))2 . No2 Var[γi |Y = 0] = W T +

T 2 µ2ψ µ2ω (σp2 + µ2p ) · Υ(ci , cj ) No2 T 2 µ2ψ µ2ω (σp2 + µ2p ) Cov(γi , γj |Y = 1) = · Θ(ci , cj ) No2 T 2 µ2ψ µ2ω µ2p −ΛRx (A) − ·e · (Υ(ci ) − Θ(ci ))(Υ(cj ) − Θ(cj )). No2 Cov(γi , γj |Y = 0) =

(19)

(20)

(21)

(22)

algorithm takes the second step if the topology of the SU network changes. Therefore, this step is performed frequently in a mobile SU network, while it is not in a static SU network. The third step is performed every time an SU tries to find out the spectrum availability. V. P ERFORMANCE E VALUATION A. Simulation Parameters The bandwidth W is 10 MHz and the sensing time T is 100 µs. The noise spectral density is No = −174 dBm. We consider a homogeneous Poisson point process for PUTx’s. The density of PU-Tx’s, λTx (s), is 10−5 m−2 . A PU-Rx is uniformly located within the disk of radius ξ centered at the corresponding PU-Tx. The transmission range of the PU network, ξ, varies from 0 m to 300 m.2 The transmission power of a PU-Tx, p(s), is fixed to 200 mW. The path-loss is given as ρ(d) = (1 + d3 )−1 for distance d in meter. The standard deviation of the shadow fading, ν, is 8 dB. The mean of the multi-path fading gain is assumed to be one. Fig. 5 shows the SU network topology and the detection area for the simulation. The SU network consists of 49 SUs that form a 7-by-7 grid topology. We consider two different detection areas, which are the disks of radius R = 150 m and R = 300 m centred at the origin. B. Numerical Results In Fig. 6, we plot the linear coefficients of SUs according to the distance of the SUs from the origin. The linear coefficients are determined only by the distance from the origin due to the circular detection area and the PU network model. In this figure, we can see that the linear coefficient drops quickly around R if the transmission range of the PU network is ξ = 0 m. On the other hand, the linear coefficient gradually decreases 2 The case with ξ = 0 m can be interpreted as an ideal scenario where the distance between a PU-Tx and the corresponding PU-Rx is so small that it can be neglected. We have presented this case for the purpose of providing a comparison between ordinary cases and the baseline case where there is no hidden problem at all.

  

  



 Fig. 5. The SU network topology and the detection area used for simulation.

in the case that ξ = 100 m, having a meaningful value for some SUs out of the detection area. This means that some SUs out of the detection area actually participate in cooperative sensing when ξ is large. The participation of SUs out of the detection area allows the proposed cooperative sensing algorithm to tackle the hidden PU problem. Fig. 7 illustrates the hidden PU problem and how the proposed algorithm takes the problem into consideration. Let us take a look at PU-Tx 1 and PU-Rx 1. Since PU-Rx 1 is inside the detection area, the SU network should decide that it is the PU-present case. However, SU 2, which is inside the detection area, by itself cannot detect PU-Rx 1 since PU-Rx 1, which is close to SU 2, does not transmit any signal, and PU-Tx 1, which transmits a signal, is far from SU 2. This is a typical case of the hidden PU problem that arises when the transmission range is large. On the other hand, SU 1, which is out of the detection area, is able to decide that it is the PUpresent case by detecting a signal from PU-Tx 1. Therefore,

9 

1.0

   

  

0.9 0.8

Detection probability

    

0.7 0.6

Prop., !=0 m EC, !=0 m OR, !=0 m AND, !=0 m Prop., !=100 m EC, !=100 m OR, !=100 m AND, !=100 m

0.5 0.4 0.3

 0.2



0.1



0.0

 



















0.0



0.1

0.2

0.3

     

Fig. 6. origin.

0.4

0.5

0.6

0.7

0.8

0.9

1.0

False alarm probability

The linear coefficients according to the distance of an SU from the

Fig. 8. The receiver operating characteristic (ROC) curves for the proposed, the EC combining, the OR-rule-based, and the AND-rule-based cooperative sensing algorithms when R = 150 m.

  

   

1.0 0.9

 

 

 

 





  



Detection probability

0.8 0.7 0.6

Prop., !=0 m EC, !=0 m OR, !=0 m AND, !=0 m Prop., !=100 m EC, !=100 m OR, !=100 m AND, !=100 m

0.5 0.4 0.3 0.2 0.1

 

 

0.0 0.0

Fig. 7.

Illustration of the hidden PU problem.

the proposed algorithm can relieve the hidden PU problem by letting some SUs out of the detection area to participate in cooperative sensing. To efficiently tackle the hidden PU problem, the proposed algorithm assigns the linear coefficients to SUs in consideration of the locations of SUs. In Fig. 7, from the point of view of SU 1, a high value of the sensing result means that there is a nearby PU-Tx and around which there also is the corresponding PU-Rx within the transmission range of the PU-Tx. If the possible location of the corresponding PU-Rx overlaps the detection area as we can see in Fig. 7, it is possible that the corresponding PU-Rx is within the detection area. Therefore, there is correlation between the sensing result of SU 1 and the existence of a PU-Rx within the detection area. Hence, the proposed algorithm assigns a moderate value of the linear coefficient to SU 1. On the other hand, since SU 3 is too far away from the detection area, the PU-Rx corresponding to the PU-Tx detected by SU 3 cannot fall in the detection area. Therefore, a low linear coefficient is assigned to SU 3. In Figs. 8 and 9, we compare the receiver operating characteristic (ROC) curves of the proposed, the equal coefficient (EC) combining, the OR-rule-based, and the AND-rule-based cooperative sensing algorithms. The EC algorithm also linearly combines the sensing results in a way similar to the proposed one, but uses the same linear coefficients for all SUs without considering the SU network topology. For the OR-rulebased and AND-rule-based algorithms, each SU independently

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

False alarm probability

Fig. 9. The receiver operating characteristic (ROC) curves for the proposed, the EC combining, the OR-rule-based, and the AND-rule-based cooperative sensing algorithms when R = 300 m.

makes a hard decision on the PU presence and reports the decision to the fusion center. The OR-rule-based algorithm determines that a PU-Rx is present if there is at least one SU with a positive decision, while the AND-rule-based algorithm does that only if all SUs agree that a PU-Rx is present. For Fig. 8, the radius of the detection area is 150 m. In this figure, we can see that the proposed algorithm significantly outperforms the other algorithms. When ξ = 0 m, for the detection probability of 0.9, the false alarm probability of the proposed algorithm is 0.37 while that for each of the EC, OR-rule-based, and AND-rule-based algorithms is 0.77, 0.81, and 0.79, respectively. The ROC curves for a larger detection area, the radius of which is 300 m, are presented in Fig. 9. While the detection performance becomes better for all the algorithms due to a larger detection area, the proposed algorithm still reduces the false alarm probability for the detection probability of 0.9, from 0.51 (EC algorithm), 0.62 (OR-rule-based algorithm), and 0.63 (AND-rule-based algorithm) to 0.22 (proposed algorithm) when ξ = 0 m. Fig. 10 shows the false alarm probability for the proposed, the EC combining, the OR-rule-based, and the AND-rulebased algorithms according to the transmission range of the PU network. The false alarm probability is obtained under the condition that the detection probability is 0.9. As the

10 1.0

topology of the SU network. Although we have used a simple random geometric network model (i.e., a peer-to-peer network) to describe the PU network, we can extend our algorithm for more generic random network model such as the Gilbert’s random disk graph [23] and possibly any type of random geometric network with known statistical property.

0.9

False alarm probability

0.8 0.7 0.6 0.5 0.4 0.3

Prop., R=150 m EC, R=150 m OR, R=150 m AND, R=150 m

0.2 0.1

A PPENDIX

Prop., R=300 m EC, R=300 m OR, R=300 m AND, R=300 m

A. Calculation of the Laplace transforms of fγ|Y =0 and fγ|Y =0

0.0 0

50

100

150

200

250

300

Transmission distance of PU network, ! (meter)

Fig. 10. The false alarm probability for the proposed, the EC combining, the OR-rule-based, and the AND-rule-based cooperative sensing algorithms for the detection probability of 0.9 according to the transmission range of the PU network. 1.0 0.9

Detection probability

0.8 0.7 0.6

Prop., R=150 m, !=0 m Opt., R=150 m, !=0 m Prop., R=150 m, !=100 m Opt., R=150 m, !=100 m Prop., R=300 m, !=0 m Opt., R=300 m, !=0 m Prop., R=300 m, !=100 m Opt., R=300 m, !=100 m

0.5 0.4 0.3 0.2 0.1

B. Calculation of Var[γi |Y = y] and Cov(γi , γj |Y = y)

0.0 0.0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

We first calculate the Laplace transform of fγ|Y =0 as in (23), where v := (v1 , . . . , vN )T , P := (P1 , . . . , PN )T , λTx|Y =0 (s) is the density of PU-Tx’s on s given that Y = 0, a(v, s) := NTo (v1 − v12 )ρ1 (s), . . . , NTo (vN − T 2 vN )ρN (s) , and LF (x) is the Laplace transform of the fading and transmission power components such that LF (x) := PN E[exp(− i=1 xi ψi (s)ωi (s)p(s))]. Now we calculate the Laplace transform of fγ|Y =1 . Let us define fγ as the pdf of γ and Lγ as the Laplace transform of fγ . Since Lγ (v) = Pr[Y = 0]Lγ|Y =0 (v) + Pr[Y = 1]Lγ|Y =1 (v), we have Lγ|Y =1 (v) as given in (24). It is noted that Lγ (v) can be calculated in a way similar to that for Lγ|Y =0 (v).

1.0

False alarm probability

Fig. 11. The receiver operating characteristic (ROC) curves for the proposed and the optimal (i.e., ML detector-based) cooperative sensing algorithms.

transmission range of the PU network, ξ, increases, it becomes harder to detect the presence of a PU-Rx based on the signal from the corresponding PU-Tx. In Fig. 10, we can see that the proposed algorithm outperforms the other algorithms for all range of values of ξ, while the performance gap decreases as ξ increases. In Fig. 11, we show the ROC curves of the proposed algorithm and the optimal ML detector. The ROC curve of the ML detector is derived by calculating the pdf’s of the sensing results by using the Monte Carlo simulation. To reduce the complexity of Monte Carlo simulation, we assume that there are only two SUs, one is at the origin and the other is 200 m away from the origin. We can see that the optimal ML detector yields better performance than the proposed algorithm does. However, considering that the ML detector is infeasible to be practically implemented, the proposed algorithm can be a good alternative with low complexity. VI. C ONCLUSION We have modeled the PU network as a random geometric network and formulated the random PU network detection problem. The proposed cooperative sensing algorithm adopts a linear fusion rule in which the linear coefficients are derived by invoking the Fisher linear discriminant analysis to reflect the

We first calculate Var[γi |Y = 0] and Var[γi |Y = 1]. From (25), R we derive Var[γi |Y = 0] as in (26), where Υ(x, y) := s∈R2 ρ(ks − xk)ρ(ks − yk) · λTx|Y =0 (s) ds. Var[γi |Y = 0] = E[Var[γi |Pi ]|Y = 0] + Var[E[γi |Pi ]|Y = 0] 2T T2 = WT + · E[Pi |Y = 0] + 2 · Var[Pi |Y = 0] No No 2T µψ µω µp = WT + · Υ(ci ) No 2T 2 µ2ω (σψ2 + µ2ψ )(σp2 + µ2p ) + · Υ(ci , ci ). No2 (26) We now calculate Var[γ = 1] as in (27), i |Y R where Θ(x, y) := ρ(ks − xk)ρ(ks − yk) · 2 s∈R λTx (s)−e−ΛRx (A) ·λTx|Y =0 (s) 1−e−ΛRx (A)

ds. Note that Var[γi ] in (27) can be calculated in a way similar to that for Var[γi |Y = 0]. We now evaluate Cov(γi , γj |Y = 0) and Cov(γi , γj |Y = 1). First, we calculate Cov(Pi , Pj |Y = 0) as in (28). From (28), we evaluate Cov(γi , γj |Y = 0) as in (29). We now evaluate Cov(γi , γj |Y = 1) as in (30). In (30), Cov(γi , γi ) is calculated in a way similar to that for Cov(γi , γi |Y = 0). R EFERENCES [1] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access and Management in Cognitive Radio Networks. Cambridge University Press, 2009. [2] D. Cabric, S. M. Mishra, and R. Brodersen, “Implementation issues in spectrum sensing for cognitive radios,” in Proc. of 38rd Asilomar Conf. on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2004.

11

Lγ|Y =0 (v) = E[exp(−vT γ)|Y = 0] = E[E[exp(−vT γ)|P]|Y = 0]       N N X T X = exp − W T · (vi − vi2 )Pi Y = 0 (vi − vi2 /2) E exp − No i=1 i=1       Z N N X T X 2 2 = exp − W T · (vi − vi /2) E exp − (vi − vi )gi (s)p(s)ΦTx (ds) Y = 0 s∈R2 No i=1 i=1      Z N N X T X = exp − W T · (vi − vi2 )gi (s)p(s) · λTx|Y =0 (s) ds (vi − vi2 /2) − E 1 − exp − No i=1 s∈R2 i=1   Z N X 2 = exp − W T · (vi − vi /2) − (1 − LF (a(v, s)) · λTx|Y =0 (s) ds . i=1

(23)

s∈R2

Lγ|Y =1 (v) 1 (Lγ (v) − Pr[Y = 0]Lγ|Y =0 (v)) = Pr[Y = 1]   Z N X 1 2 = (vi − vi /2) − (1 − LF (a(v, s)) · λTx (s) ds exp − W T · 1 − e−ΛRx (A) s∈R2 i=1   Z N X e−ΛRx (A) 2 − exp − W T · (v − v /2) − (1 − L (a(v, s)) · λ (s) ds . i F Tx|Y =0 i 1 − e−ΛRx (A) s∈R2 i=1

(24)

  Var[Pi |Y = 0] = E (Pi − E[Pi ])2 |Y = 0   Z Z 2 =E gi (s)p(s)ΦTx (ds) − E gi (s)p(s)ΦTx (ds) Y = 0 s∈R2 s∈R2 Z  2  = E gi (s)p(s)ΦTx (ds) − E[gi (s)p(s)ΦTx (ds)] Y = 0 2 Zs∈R = ρ(di (s))2 E[ψi (s)2 ] E[ωi (s)2 ] E[p(s)2 ] E[ΦTx (ds)2 |Y = 0] s∈R2 Z = 2µ2ω (σψ2 + µ2ψ )(σp2 + µ2p ) · ρ(ks − ci k)2 · λTx|Y =0 (s) ds.

(25)

Var[γi |Y = 1] = E[γi2 |Y = 1] − E[γi |Y = 1]2 1 = (E[γi2 ] − Pr[Y = 0] E[γi2 |Y = 0]) − E[γi |Y = 1]2 Pr[Y = 1] 1 = (Var[γi ] − Pr[Y = 0] Var[γi |Y = 0] + E[γi ]2 Pr[Y = 1] − Pr[Y = 0] E[γi |Y = 0]2 − Pr[Y = 1] E[γi |Y = 1]2 ) 2T 2 µ2ω (σψ2 + µ2ψ )(σp2 + µ2p ) 2T µψ µω µp = WT + · Θ(ci ) + · Θ(ci , ci ) No No2 T 2 µ2ψ µ2ω µ2p −ΛRx (A) − ·e · (Υ(ci ) − Θ(ci ))2 . No2

(27)

s∈R2

12

Cov(Pi , Pj |Y = 0)   = E (Pi − E[Pi ])(Pj − E[Pj ])|Y = 0 Z   = E gi (s)p(s)ΦTx (ds) − E[gi (s)p(s)ΦTx (ds)] s∈R2

  × gj (s)p(s)ΦTx (ds) − E[gj (s)p(s)ΦTx (ds)] |Y = 0

(28)

Z

ρ(ks − ci k)ρ(ks − ci k) E[ψi (s)] E[ψj (s)] E[ωi (s)] E[ωj (s)] E[p(s)2 ] E[ΦTx (ds)2 |Y = 0] Z = µ2ψ µ2ω (σp2 + µ2p ) · ρ(ks − ci k)ρ(ks − ci k) · λTx|Y =0 (s) ds.

=

s∈R2

s∈R2

T2 Cov(γi , γj |Y = 0) = Cov(E[γi |Pi ], E[γj |Pj ]|Y = 0) = 2 Cov(Pi , Pj |Y = 0) No Z 2 2 2 2 2 T µψ µω (σp + µp ) = · ρ(ks − ci k)ρ(ks − cj k) · λTx|Y =0 (s) ds No2 s∈R2 T 2 µ2ψ µ2ω (σp2 + µ2p ) = · Υ(ci , cj ). No2

(29)

Cov(γi , γj |Y = 1) = E[γi γj |Y = 1] − E[γi |Y = 1] E[γj |Y = 1] 1 = (E[γi γj ] − Pr[Y = 0] E[γi γj |Y = 0]) − E[γi |Y = 1] E[γj |Y = 1] Pr[Y = 1] 1 = (Cov(γi , γi ) − Pr[Y = 0] Cov(γi , γj |Y = 0) + E[γi ] E[γj ] Pr[Y = 1] − Pr[Y = 0] E[γi |Y = 0] E[γj |Y = 0] − Pr[Y = 1] E[γi |Y = 1] E[γj |Y = 1]) 2 2 2 2 T 2 µ2ψ µ2ω µ2p −ΛRx (A) T µψ µω (σp + µ2p ) · Θ(c , c ) − ·e · (Υ(ci ) − Θ(ci ))(Υ(cj ) − Θ(cj )). = i j No2 No2

[3] A. Sahai, R. Tandra, S. M. Mishra, and N. Hoven, “Fundamental design tradeoffs in cognitive radio systems,” in Proc. of TAPAS’06, Boston, MA, Aug. 2006. [4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Commun. Surveys and Tuts., vol. 11, no. 1, pp. 116-130, Mar. 2009. [5] Y. Zeng, Y.-C. Liang, A. T. Hoang, and R. Zhang, “A review on spectrum sensing for cognitive radio: Challenges and solutions,” EURASIP Journal on Advances in Signal Processing, vol. 2010, Article ID 381465, 15 pages, 2010. [6] A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” in Proc. of IEEE DySPAN’05, Baltimore, MD, Nov. 2005. [7] A. Ghasemi and E. S. Sousa, “Spectrum sensing in cognitive radio networks: The cooperation-processing tradeoff,” Wireless Commun. and Mobile Comput., vol. 7, no. 9, pp. 1049-1060, Nov. 2007. [8] S. Junyang, J. Tao, L. Siyang, and Z. Zhongshan, “Maximum channel throughput via cooperative spectrum sensing in cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5166-5175, Oct. 2009. [9] E. C. Peh, Y.-C. Liang, Y. L. Guan, and Y. Zeng, “Optimization of cooperative sensing in cognitive radio networks: A sensing-throughput tradeoff view,” IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5294-5299, Nov. 2009. [10] J. Unnikrishnan and V. V. Veeravalli, “Cooperative sensing for primary detection in cognitive radio,” IEEE J. Sel. Topics in Signal Process., vol. 2, no. 1, pp. 18-27, Feb. 2008. [11] S. M. Mishra, A. Sahai, and R. W. Brodersen, “Cooperative sensing among cognitive radios,” in Proc. of ICC’06, Istanbul, Turkey, Jun. 2006. [12] J. Ma, G. Zhao, and Y. Li, “Soft combination and detection for coopera-

[13]

[14]

[15]

[16]

[17]

[18]

[19]

[20]

[21]

[22]

(30)

tive spectrum sensing in cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Dec. 2008. Z. Quan, W. Ma, S. Cui, and A. H. Sayed, “Optimal linear fusion for distributed detection via semidefinite programming,” IEEE Trans. Signal Process., vol. 58, no. 4, pp. 2431-2436, Apr. 2010. G. Ganesan and Y. Li, “Cooperative spectrum sensing in cognitive radio, part I: Two user networks,” IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2204-2213, Jun. 2007. G. Ganesan, Y. Li, B. Bing, and S. Li, “Spatiotemporal sensing in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 5-12, pp. 5-12, Jan. 2008. C. Sun, W. Zhang, and K. B. Letaief, “Cooperative spectrum sensing for cognitive radios under bandwidth constraints,” in Proc. of IEEE WCNC’07, Hong Kong, China, Jun. 2007. S. Zhang, T. Wu, and V. K. N. Lau, “A low-overhead energy detection based cooperative sensing protocol for cognitive radio systems,” IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5575-5581, Nov. 2009. Z. Quan, S. Cui, A. H. Sayed, and H. V. Poor, “Optimal multiband joint detection for spectrum sensing in cognitive radio networks,” IEEE Trans. Signal Process., vol. 57, no. 3, pp. 1128-1140, Mar. 2009. Y. Yang, Y. Liu, Q. Zhang, and L. Ni, “Cooperative boundary detection for spectrum sensing using dedicated wireless sensor networks,” in Proc. of IEEE INFOCOM’10, San Diego, CA, Mar. 2010. Z. Li, F. R. Yu, and M. Huang, “A cooperative spectrum sensing consensus scheme in cognitive radios,” in Proc. of IEEE INFOCOM’09 Mini Conference, Rio de Janeiro, Brazil, Apr. 2009. W. Saad, Z. Han, M. Debbah, A. Hjørungnes, and T. Basar, “Coalitional games for distributed collaborative spectrum sensing in cognitive radio networks,” in Proc. of IEEE INFOCOM’09, Rio de Janeiro, Brazil, Apr. 2009. P. Jia, M. Vu, T. Le-Ngoc, S-C. Hong, and V. Tarokh, “Capacity-optimal

13

[23]

[24] [25] [26] [27] [28] [29] [30]

[31]

[32] [33] [34] [35] [36]

and bayesian-optimal cognitive sensing with location side information,” IEEE J. Sel. Areas Commun., submitted for publication, 2009. M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sept. 2009. W. Ren, Q. Zhao, and A. Swami, “Power control in cognitive radio networks: How to cross a multi-lane highway,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1283-1296, Sept. 2009. C. Yin, L. Gao, and S. Cui, “Scaling laws for overlaid wireless networks: A cognitive radio network versus a primary network,” IEEE/ACM Trans. Netw., 2010, to be published. A. Ghasemi and E. S. Sousa, “Interference aggregation in spectrumsensing cognitive wireless networks,” IEEE J. Sel. Topics in Signal Process., vol. 2, no. 1, pp. 41-56, Feb. 2008. G. J. McLachlan, Discriminant Analysis and Statistical Pattern Recognition. New York: John Wiley & Sons, 2004. B. L. Mark and A. O. Nasif, “Estimation of maximum interference-free power level for opportunistic spectrum access,” IEEE Trans. Wireless Commun., vol. 8, no. 5, pp. 2505-2513, May. 2009. S. S. Jeong, W. S. Jeon, and D. G. Jeong, “Collaborative spectrum sensing for multiuser cognitive radio systems,” IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2564-2569, Jun. 2009. S.-J. Kim, E. Dall’Anese, and G. B. Giannakis, “Sparsity-aware cooperative cognitive radio sensing using channel gain maps,” in Proc. of 43rd Asilomar Conf. on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2009. R. Martin and R. Thomas, “Algorithms and bounds for estimating location, directionality, and environmental parameters of primary spectrum users,” IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5692-5701, Nov. 2009. J. Nelson, M. Gupta, J. Almodovar, and W. Mortensen, “A quasi EM method for estimating multiple transmitter locations,” IEEE Signal Process. Lett., vol. 16, no. 5, pp. 354-357, May. 2009. H. Celebi and H. Arslan, “Utilization of location information in cognitive wireless networks,” IEEE Wireless Commun. Mag., vol. 14, no. 4, pp. 613, Aug. 2007. C. Bettstetter, H. Hartenstein, and X. Perez-Costa, “Stochastic properties of the random waypoint mobility model.” Wireless Networks, vol. 10, no. 5, pp. 555-567, Sep. 2004. E. Reihl, “Wireless microphone characteristics,” IEEE 802.2206/0070r0, May 2006. H. Urkowitz, “Energy detection of unknown deterministic signals,” Proceedings of the IEEE, vol. 55, no. 4, pp. 523-531, Apr. 1967.

ACKNOWLEDGMENT This research was supported in part by the Natural Sciences and Engineering Research Council (NSERC) of Canada, and in part by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency) (NIPA-2010-(C1090-1011-0005)).

Kae Won Choi received the B.S. degree in civil, urban, and geosystem engineering in 2001, and the M.S. and Ph.D. degrees in electrical engineering and computer science in 2003 and 2007, respectively, all from Seoul National University, Seoul, Korea. From 2008 to 2009, he was with Telecommunication Business of Samsung Electronics Co., Ltd., Korea. From 2009 to 2010, he was a postdoctoral researcher in the Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada. In 2010, he joined the faculty at Seoul National University of Science and Technology, Korea, where he is currently an assistant professor in the Department of Computer Science. His research interests include cognitive radio, wireless network optimization, radio resource management, and mobile cloud computing.

Ekram Hossain (S’98-M’01-SM’06) is a full Professor in the Department of Electrical and Computer Engineering at University of Manitoba, Winnipeg, Canada. He received his Ph.D. in Electrical Engineering from University of Victoria, Canada, in 2001. He was a University of Victoria Fellow. Dr. Hossain’s current research interests include design, analysis, and optimization of wireless/mobile communications networks and cognitive radio systems (http://www.ee.umanitoba.ca/∼ekram). He is an author/editor of the books “Cooperative Cellular Wireless Networks” (Cambridge University Press, 2011), “Dynamic Spectrum Access and Management in Cognitive Radio Networks” (Cambridge University Press, 2009), “Heterogeneous Wireless Access Networks” (Springer, 2008), “Introduction to Network Simulator NS2” (Springer, 2008), “Cognitive Wireless Communication Networks” (Springer, 2007), and “Wireless Mesh Networks: Architectures and Protocols” (Springer, 2007). Dr. Hossain serves as the Area Editor for the IEEE Transactions on Wireless Communications in the area of “Resource Management and Multiple Access”, an Editor for the IEEE Transactions on Mobile Computing, the IEEE Communications Surveys and Tutorials, and IEEE Wireless Communications. He serves/served as a Technical Program Co-Chair of the “Cognitive Radio and Networks” Symposium for IEEE ICC’12, the “Mobile and Wireless Networks” Track for IEEE WCNC’12, the “Cognitive Radio and Spectrum Management” Track for IEEE PIMRC’11, the “Cognitive Radio and Cooperative Communications” Track for IEEE VTC’10-Fall and IEEE VTC’10-Spring. Dr. Hossain has several research awards to his credit which include Lucent Technologies Research Award for contribution to IEEE International Conference on Personal Wireless Communications (ICPWC’97), the best studentpaper award for a co-authored paper presented in ACM International Conference on Wireless Communications and Mobile Computing (IWCMC’06), and the University of Manitoba Merit Award in 2010 (for Research And Scholarly activities). He is a registered Professional Engineer in the province of Manitoba, Canada.

Dong In Kim (S’89-M’91-SM’02) received the B.S. and M.S. degrees in Electronics Engineering from Seoul National University, Seoul, Korea, in 1980 and 1984, respectively, and the M.S. and Ph.D. degrees in Electrical Engineering from University of Southern California (USC), Los Angeles, in 1987 and 1990, respectively. From 1984 to 1985, he was a Researcher with Korea Telecom Research Center, Seoul. From 1986 to 1988, he was a Korean Government Graduate Fellow in the Department of Electrical Engineering, USC. From 1991 to 2002, he was with the University of Seoul, Seoul, leading the Wireless Communications Research Group. From 2002 to 2007, he was a tenured Full Professor in the School of Engineering Science, Simon Fraser University, Burnaby, BC, Canada. From 1999 to 2000, he was a Visiting Professor at the University of Victoria, Victoria, BC. Since 2007, he has been with Sungkyunkwan University (SKKU), Suwon, Korea, where he is a Professor and SKKU Fellow in the School of Information and Communication Engineering. Since 1988, he is engaged in the research activities in the areas of wireless cellular communications. His current research interests include cooperative relaying and base station cooperation, interference management for heterogeneous networks and cognitive radio networks, cross-layer design and optimization. Dr. Kim was an Editor for the IEEE Journal on Selected Areas in Communications: Wireless Communications Series and also a Division Editor for the Journal of Communications and Networks. He is currently an Editor for Spread Spectrum Transmission and Access for the IEEE Transactions on Communications and an Area Editor for Cross-layer Design and Optimization for the IEEE Transactions on Wireless Communications. He also serves as coEditor-in-Chief for the Journal of Communications and Networks.

Choi, Hossain, Kim - 2011 - Cooperative Spectrum Sensing Under ...

Whoops! There was a problem loading this page. Choi, Hossain, Kim - 2011 - Cooperative Spectrum S ... er Random Geometric Primary User Network Model.pdf.

3MB Sizes 3 Downloads 243 Views

Recommend Documents

Choi, Hossain, Kim - 2011 - Cooperative Spectrum Sensing Under ...
Choi, Hossain, Kim - 2011 - Cooperative Spectrum S ... er Random Geometric Primary User Network Model.pdf. Choi, Hossain, Kim - 2011 - Cooperative ...

Choi, Hossain - 2011 - Opportunistic Access to Spectrum Holes ...
consecutive packets in an 802.11b-based WLAN, even when a. WLAN continuously uses a channel for packet transmissions. However, exploiting these spectrum opportunities poses sig- nificant challenges due to the following two characteristics of. a data-

Cooperative Spectrum Sensing and Cognitive ...
Broadband and Wireless Group .... distances are smaller than their distances to the PU, so that ..... New York, NY: Springer Science Business Media, LLC,. 2007.

IN-NETWORK COOPERATIVE SPECTRUM SENSING ...
ber has to be finite, we derive high probability bounds on the iteration ... proposed in-network cooperative spectrum sensing at a given iteration. 1. ... To guarantee high spectrum uti- ..... little impact (logarithmic) on the convergence speed.

Choi - 2010 - Adaptive Sensing Technique to Maximize Spectrum ...
Choi - 2010 - Adaptive Sensing Technique to Maximize Spectrum Utilization in Cognitive Radio.pdf. Choi - 2010 - Adaptive Sensing Technique to Maximize ...

A New Cooperative Spectrum Sensing Scheme for ...
Abstract. As the radio spectrum is becoming more and more crowded, the cognitive radio has recently become a hot research topic to improve the spectrum ...

Cooperative Spectrum Sensing with Noisy Hard ...
thus Binomial distributed. Moreover, one can easily obtain PD and PF using the Rij parameters. Finally, recall that PM = 1 − PD. The following result considers the performance of the proposed CBS detector for large SNR cases. As the transmitting po

Cooperative Communication-Aware Spectrum Leasing ...
Apr 5, 2010 - Cooperative Communication-Aware Spectrum. Leasing in Cognitive Radio Networks. Y. Yi. †. , J. Zhang. †. , Q. Zhang. †. , T. Jiang. ‡. , J. Zhang. ╫. †. Hong Kong University of Science and Technology. ‡. Huazhong University

Cooperative Spectrum Sharing Among Primary and ...
In this paper, we present an idea of cooperative communication which can enhance the transmission opportunities for ... new way to improve spectral efficiency of wireless networks. A .... For better understanding the benefits of cooperative.

APCC 2012 - TDMA-based Cooperative Sensing using SDR Platform ...
APCC 2012 - TDMA-based Cooperative Sensing using SDR Platform for Cognitive Radio.pdf. APCC 2012 - TDMA-based Cooperative Sensing using SDR ...

Research Article Spectrum Sensing for Cognitive ...
bution [30] with a mean time between transmission given. τH /Tw. τL/Tw. H o ld time/scanning ..... for modeling the call hold time describing many real time.

Joint Cross-Layer Scheduling and Spectrum Sensing for ... - IEEE Xplore
secondary system sharing the spectrum with primary users using cognitive radio technology. We shall rely on the joint design framework to optimize a system ...

Demonstration of Real-time Spectrum Sensing for Cognitive Radio
form factor (SFF) software defined radio (SDR) development platform (DP) [7] is ..... [5] Y. Tachwali, M. Chmeiseh, F. Basma, and H. Refai, “A frequency agile.

Van Engen, K., Baese-Berk, M., Baker, R. E., Choi, A., Kim, M., and ...
Current theories of speech perception have focused primarily on accounting for ... For example, speakers of languages with large and small vowel inventories will ..... Detailed information about the conventions and software employed for these .... As

JS KIM - SELF-HEALING IN ECC STIMULATED BY SAP UNDER ...
JS KIM - SELF-HEALING IN ECC STIMULATED BY SAP UNDER FLEXURAL CYCLIC LOAD.pdf. JS KIM - SELF-HEALING IN ECC STIMULATED BY SAP ...

Van Engen, K., Baese-Berk, M., Baker, R. E., Choi, A., Kim, M., and ...
support the hypothesis that successful speech communication depends both on the alignment of ...... Language and Linguistics Compass, 3(1), 236–264. SMITH ...

Copyright by Doo Soon Kim 2011
Chapter 2. Knowledge Integration in Machine Reading. 7. 2.1 Our Machine Reading Task and its Comparison to the Other. Types of Machine Reading . . . . . . . . . . . . . . . . . . . . ..... 4.5 Packed representation for S2, “The engine's spark plug

Chen-Choi-Escanciano.pdf
Page 1 of 1. Page 1 of 1. Chen-Choi-Escanciano.pdf. Chen-Choi-Escanciano.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Chen-Choi-Escanciano.pdf. Page 1 of 1.Missing:

Wing commander Forhad Hossain Mahmud.pdf
Wing commander Forhad Hossain Mahmud.pdf. Wing commander Forhad Hossain Mahmud.pdf. Open. Extract. Open with. Sign In. Main menu.

a survey to different approaches of spectrum sensing in ...
Increasing interest of wireless services in consumers', demand for radio spectrum has .... The main advantage of matched filter is that it needs less time to.

Disclosure under Regulatiion 30(2), SAST Regulations, 2011.PDF ...
HYDERABAD,lNDlA500034 Phone : +91 40 23606641 Fax : +91 40 23606640 ... An ISO 9001 ComPanY. GIN : 1251 19AP1 ... With best regards,. For Nile ...