Professional Documents
Culture Documents
Poor Quickest
Poor Quickest
Abstract—In this work, the agility of detection algorithms in the agility of cognitive radio. In addition to the detection
cognitive radio is studied. A sequential change detection frame- probability, we argue that the detection delay is also an
work is developed to investigate the delay of detection algorithms. important performance metric in cognitive radio detection.
Three scenarios with different information about primary users’
parameters available at cognitive users are considered. Optimal If a primary user stops transmission, then a secondary user
detection schemes that minimize the detection delay under certain should detect this event quickly, in order to be able to start its
false alarm constraints are developed. Minimal detection delay own transmission quickly. A small detection delay will allow
is characterized as a function of the false alarm probability and secondary users to take short transmission opportunities. On
the Kullback-Leibler distance between signal plus noise and noise the other hand, if the primary user starts transmission, the
only models.
cognitive user should detect this event as quickly as possible,
I. I NTRODUCTION in order to vacate the band for the primary user. A small
detection delay will allow the design of a spectrum reuse
Recently, the opportunistic spectrum access problem has
scheme that has minimal impact on the licensed users. Of
attracted considerable attention. The basic idea is to allow
course, the desire to reduce the detection delay should be
unlicensed users (cognitive users) to use the spectrum made
balanced with a certain false alarm constraint. Our goal is
available when licensed users are not transmitting. To make
to establish a statistical framework to analyze detection delay
this idea viable, one should develop techniques that allow
subject to certain false alarm constraints, and more importantly
the cognitive users to know whether the primary users are
to design a scheme that can minimize the delay.
transmitting or not. One possible approach to this problem
We adopt a sequential change-point detection approach. A
is to design centralized schemes in which central controllers
comprehensive treatment on this topic can be found in [3], [4].
track the spectral usage and properly assign the spectrum
In the sequential change-point detection problem, one observes
to cognitive users. Another possible approach is to require
samples sequentially. Initially, the samples are drawn from
unlicensed users to detect for themselves whether there are
a certain distribution. At an unknown time, the distribution
primary users present in the network or not. We adopt this
changes. Once this occurs, one needs to raise an alarm as
latter detection based approach in this paper.
quickly as possible, hence to minimize the delay (rigorous
Depending on the amount of information about a primary
definitions will be given in the sequel) between the time when
user’s parameters available at a cognitive user, various de-
the change occurs and the time when the alarm is raised.
tection schemes have been developed for this application.
The sequential change point detection problem is different
Energy detection, matched filtering and feature detection [1],
from but has a close relationship with the classic sequential
[2] are representative ones. These approaches adopted a classic
testing problem. In the classic sequential testing problem
detection framework, in which the goal is to minimize the miss
developed by Wald [5], the objective is to distinguish between
probability subject to constraints on the false alarm probability.
two hypotheses from a sequence of statistically homogeneous
A common feature of these schemes is that the detection
random samples. All the samples are drawn from the same
is block-based. That is the cognitive radio takes a block of
distribution, it is only the identity of this distribution that is in
samples, computes a statistic and compares it with a threshold.
question. In the scenario considered in change point detection,
A key challenge of these block-based approaches is that, if
the random observations are not homogenous, and one should
there are modelling uncertainties, such as uncertainty about
raise an alarm as soon as an inhomogeneity occurs. On the
the noise variance, then there is a signal to noise ratio (SNR)
other hand, the sequential change-point detection problem can
wall phenomenon [1]. This phenomenon refers to the situation
be modelled and solved as sequences of classical open-ended
in which if the SNR of the received signal is smaller than a
sequential testing problems [3]. In the cognitive radio setup,
threshold, these detection algorithms will not work, no matter
the onset of activity of a primary user at an unknown time
how many samples are in each block.
will change the distribution of the received signal of cognitive
In this paper, we take an alternative view of the detec-
users. Hence, the change detection framework is well suited
tion problem in cognitive radio. More specifically, we study
for this problem. After the submission of this work, we got to
This research was supported in part by the National Science Foundation know [6], which also considers the application of change point
under Grants ANI-03-38807 and CNS-06-25637. detection in cognitive radio. The model considered in [6] is
consider the following three different scenarios. In the first We are seeking a strategy that can minimize T̄1 , while main-
scenario, both σ 2 and P are known. In the second scenario, taining T̄0 to be larger than a conveniently set threshold Tth .
we assume that P is not known exactly. In the third scenario, That is, we formulate the cognitive radio detection problem as
we assume that neither σ 2 nor P is known. the following optimization problem:
Instead of modelling this problem as a classical hypothesis
min T̄1 = sup ess sup Ef1 {γ = ta − τ |ta ≥ τ, Y1τ },
testing problem [7], we formulate this problem using a sequen- Γ τ ≥1
tial change detection framework [3]. We first use the scenario subject to T̄0 ≥ Tth . (2)
in which both σ 2 and P are known as an example to precisely
present our formulation. The cognitive radio observes the se- As noted above, in cognitive radio applications, the small-
quence Y [1], Y [2], · · · sequentially. Initially, the observations ness of detection delay is important. In the case of detecting a
follow a distribution F0 with corresponding density function transmission opportunity, a small delay will allow the cognitive
f0 . At an unknown time τ , due to the activity of the primary radio to start transmitting as soon as the opportunity occurs.
user, the distribution changes to F1 with corresponding density In the case of detecting of a primary user, a small delay will
function f1 . For example, in the detection of the entrance to allow the cognitive user to vacate the band quickly when the
the channel of a primary user, f0 is the N (0, σ 2 ) density and primary user returns.
f1 is the N (0, σ 2 + P ) density. If τ = 1, the primary user III. K NOWN P AND σ 2 CASE : CUSUM ALGORITHM
is already present when the cognitive user switches to the
When both P and σ 2 are known, the densities before and
band. On the other hand, if we want to detect transmission
after the change, f0 and f1 , are fully specified. Hence, for
opportunities, i.e., the exit of the primary user, then f0 is the
observation y[i], the log likelihood ratio
N (0, σ 2 + P ) density and f1 is the N (0, σ 2 ) density. In this
case, if τ = 1, then there is already a transmission opportunity f1 (y[i])
l(y[i]) = ln (3)
when the cognitive user switches to the band. In this paper, f0 (y[i])
we discuss only the detection of the entrance of the primary P y 2 [i] 1 σ2
user to the band, the detection of transmission opportunities = + ln
2(P + σ 2 )σ 2 2 P + σ2
can be solved similarly.
is also fully defined.
Let Γ denote the detection strategy employed by the cogni-
Before the primary user starts transmission
tive user. After taking each sample, the strategy Γ will decide
whether the primary user is present or not, and output an alarm f1 (y)
Ef0 {l(Y [i])} = f0 (y) ln dy = −D(f0 ||f1 ) ≤ 0,
if it decides so. More specifically, at each time t, the cognitive f0 (y)
radio tries to distinguish the following two hypotheses based while after the primary user starts its transmission
on Y1t = {Y [1], · · · , Y [t]} :
f1 (y)
Ef1 {l(Y [i])} = f1 (y) ln dy = D(f1 ||f0 ) ≥ 0,
H0 : Y [i] = W [i], n = 1, · · · , t, f0 (y)
Percent
one can first choose an appropriate value of h using the bound 0.15
for T̄0 . The cognitive user can then compute the statistic at
0.1
each time instant and compare it to h. The delay incurred by
this scheme is bounded by c1 log h when h is sufficiently large.
0.05
0
0 10 20 30 40 50
τ
VI. S IMULATIONS
Fig. 3. Histogram of the detection delay in the CUSUM, GLR and non-
In this section, we provide some numerical results. In the parametric algorithms when τ = 100.
simulations, we set σ 2 = 1 and P = 3. In generating the
simulations, the thresholds are set using the bounds for T̄0
derived in the paper. For the GLR algorithm, we set Pmin = VII. C ONCLUSIONS
P/2 and Pmax = 2P . For the nonparametric algorithm, we We have established a sequential change detection frame-
set p = 0.9, q = 0.1, α = 0.9 and β = 3. Figure 1 shows a work for studying the agility of detection algorithms in cogni-
typical realization of the CUSUM and GLR statistics, when the tive radio. We have considered three scenarios with different
primary user starts transmission at τ = 100. Figure 2 shows prior information available at the cognitive users. We have
the corresponding result for the non-parametric approach. We characterized the minimal detection delay that any detection
can see that before the primary user begins transmission, the scheme will suffer, and have further provided schemes that
statistics remain relatively small. After t = τ and some delays, incur only this minimal delay.
the statistic in each scheme reacts aggressively. The schemes described in this paper have high implementa-
tion complexity, and thus the development of low complexity
100
CUSUM
and order-optimal schemes is of practical importance. Exploit-
90 GLR
ing the presence of multiple cognitive users in the network to
80
70
the quick detection of the primary users’ activities is also of
60 interest.
gt
50
40 R EFERENCES
30
[1] R. Tandra and A. Sahai, “SNR walls for signal detection,” IEEE Journal
20
on Special Topics in Signal Processing, vol. 2, pp. 4–17, Feb. 2008.
10
[2] J. Lunden, A. Huttunen, V. Koivunen, and H. V. Poor, “Multiple
0 20 40 60 80 100 120 140 160 180 sensing in cognitive radios based on multiple cyclic frequencies,” in
t
Proc. Intl. Conf. on Cognitive Radio Oriented Wireless Networks and
Communications, (Orlando, FL), pp. 1583–1590, Aug. 1-3, 2007.
Fig. 1. A typical realization of the CUSUM and GLR statistic when τ = 100. [3] H. V. Poor and O. Hadjiliadis, Quickest Detection. Cambridge, UK:
Cambridge University Press, 2009. Forthcoming.
[4] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes - Theory
and Application. Englewood Cliffs, NJ: Prentice-Hall, 1993.
5000
[5] A. Wald, Sequential Analysis. New York: Wiley, 1947.
4500 Non−Parametric [6] H. Li, C. Li, and H. Dai, “Quickest spectrum sensing in cognitive radio,”
4000
in Proc. Conf. on Information Science and Systems, (Princeton, NJ), Mar.
2008.
3500
[7] H. V. Poor, An Introduction to Signal Detection and Estimation. New
3000 York: Springer-Verlag, 1994.
[8] E. Page, “Continuous inspection schemes,” Biometrika, vol. 41, pp. 100–
gt
2500
115, 1954.
2000
[9] G. Lorden, “Procedures for reacting to a change in distribution,” Annals
1500 of Mathematical Statistics, vol. 42, no. 6, pp. 1897–1908, 1971.
1000 [10] G. Moustakides, “Optimal procedures for detecting changes in distribu-
tions,” Annals of Statistics, vol. 14, no. 1379-1387, 1986.
500
[11] G. Lorden, “On excess over the boundary,” Annals of Mathematical
0
60 80 100 120 140
Statistics, vol. 41, pp. 520–527, Apr. 1970.
t [12] G. Lorden, “Open-ended tests for Koopman-Darmois families,” Annals
of Statistics, vol. 1, no. 4, pp. 633–643, 1973.
[13] J. M. Lucas and R. B. Crosier, “Robust CUSUM: A robustness study
Fig. 2. A typical realization of the nonparametric statistic when τ = 100.
for CUSUM quality control schemes,” Comm. Statist. Theory Methods,
vol. 1, pp. 2669–2687, 1982.
Figure 3 shows the histograms of the detection delay of the [14] L. Gordon and M. Pollak, “A robust surveillance scheme for stochasti-
various algorithms when we set T̄0 = 1000. We can see that cally ordered alternatives,” Annals of Statistics, vol. 23, pp. 1350–1375,
Aug. 1995.
the histogram of the GLR and non-parametric schemes spread
out more than that of the CUSUM algorithm. This is the price
we pay for not knowing the channel parameters.