Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

IET Communications

Research Article

Achievable rates and outage probability of ISSN 1751-8628


Received on 25th January 2015

cognitive radio with dynamic frequency hopping Revised on 4th August 2015
Accepted on 14th August 2015
doi: 10.1049/iet-com.2015.0094
under imperfect spectrum sensing www.ietdl.org

Anh D. Le 1 ✉, Sanjeewa P. Herath2, Nghi H. Tran1, Trung Q. Duong3, 4, Sachin Shetty5


1
Department of Electrical and Computer Engineering, University of Akron, Akron, USA
2
Department of Electrical and Computer Engineering, McGill University, Room 633, McConnell Engineering Building 3480 University
Street, Montreal, Canada H3A 0E9
3
School of Electronics, Electrical Engineering and Computer Science, Queen’s University of Belfast, Belfast, UK
4
Duy Tan University, Da Nang, Vietnam
5
Department of Electrical and Computer Engineering Department, Tennessee State University, Nashville, USA
✉ E-mail: adl47@zips.uakron.edu

Abstract: In this study, the authors propose simple methods to evaluate the achievable rates and outage probability of a
cognitive radio (CR) link that takes into account the imperfectness of spectrum sensing. In the considered system, the CR
transmitter and receiver correlatively sense and dynamically exploit the spectrum pool via dynamic frequency hopping.
Under imperfect spectrum sensing, false-alarm and miss-detection occur which cause impulsive interference emerged
from collisions due to the simultaneous spectrum access of primary and cognitive users. That makes it very challenging to
evaluate the achievable rates. By first examining the static link where the channel is assumed to be constant over time,
they show that the achievable rate using a Gaussian input can be calculated accurately through a simple series
representation. In the second part of this study, they extend the calculation of the achievable rate to wireless fading
environments. To take into account the effect of fading, they introduce a piece-wise linear curve fitting- based method to
approximate the instantaneous achievable rate curve as a combination of linear segments. It is then demonstrated that
the ergodic achievable rate in fast fading and the outage probability in slow fading can be calculated to achieve any given
accuracy level.

1 Introduction of both PU and SU and affects the CR link. While considering the
imperfectness of spectrum sensing at the CR transmitter (TX), the
This work was partially supported by the National Science analysis in [8, 9] studied the achievable rate under the assumption
Foundation, USA, under Grant No. 1509006. A part of this work of perfect knowledge of the state of the PU interference at the CR
was presented at the IEEE Int. Conf. on Commun. and Electronics receiver (RX). Therefore, the achievable rate can only be
(ICCE), Da Nang. August 2014 [1]. Cognitive radio (CR) has considered as an upper-bound on the capacity of a CR link. Some
been considered as a revolutionary wireless communication recent efforts have studied cooperative sensing techniques [10, 11]
paradigm [2] to improve the spectral efficiency. In CR, unlicenced and intelligent power control [12, 13] to enhance the CR
users, or secondary users (SUs), are allowed to access the performance. However, these works do not completely take into
frequency bands (F-bands) when primary users (PUs) are absent account the miss-detection and false-alarm events. The sensing-
[2]. By intelligently sensing and adapting to the environment, SUs energy efficiency and sensing-throughput trade-off of CR networks
can identify the temporal communications opportunities (spectrum have also been investigated in [9, 14] but with the same drawbacks.
holes) and utilise them without causing harmful interference to Recently, the error performance of CR systems has been analysed
PUs’ communication links. One of the prospective CR models is under imperfect spectrum sensing in [15] but the results apply to
dynamic frequency hopping (DFH) [3, 4] in which the working F- only uncoded CR systems. In a practical scenario under miss-
bands of PUs users are divided into small sub-channels to form a detection and false-alarm events, due to the presence of
spectrum pool. An SU can exploit this spectrum pool by interference generated from the PU, the channel is no longer
performing spectrum sensing and dynamically hopping over these Gaussian and calculating the achievable rate is very difficult.
sub-channels to establish SU communication links when temporal Herath et al. in [16] attempted to study the achievable rate of such
white spaces are available. In fact, this set of sub-channels is a CR link using DFH in a frequency pool for opportunistic
dynamically changed depending on PU activities over the channel. spectrum sharing. Under the assumption that both the CR TX and
Once PU wants its own resources, all SUs must leave, releasing RX can access the same sensing information, the achievable rates
the corresponding vacant sub-channels to the PU [3]. Since SUs are calculated based on raw approximations. As a consequence,
dynamically hop over sub-channels, their links are less affected by the accuracy level cannot be controlled. In addition, the work in
PU activities [5]. [16] assumed a static CR channel where the channel gains are
While spectrum sensing can be performed effectively using assumed to be constant. This assumption therefore does not fit
various advanced sensing schemes (please see [6, 7] and very well to a dynamic fading wireless environment. The raw
references therein), this operation is not perfect in practice, which calculations in [16] cannot be extended to such circumstance,
results in false-alarm and miss-detection events. When we have since one needs to consider the effects of fading in addition to
false-alarm, the SU fails to utilise the interference-free channel. On impulsive interference from PUs.
the other hand, when the miss-detection happens, an SU fails to Motivated by the above observation, in this paper, we propose a
detect an active PU and collisions occur. As a result, impulsive simple method to accurately evaluate the achievable rate of a
interference is generated due to the simultaneous spectrum access realistic CR link using DFH in a frequency pool for opportunistic
spectrum sharing that takes into account the imperfectness of
spectrum sensing. While this work can be considered as an
† In the first part of this paper, we consider the static channel model
extension of our prior work in [16], the contributions of this where the channel gain remains constant as similar to [16]. However,
submission are much more comprehensive where novel methods instead of using raw approximations, we show that the information
are proposed to calculate the achievable rates and the outage rate achieved by a Gaussian input can be calculated using a simple
probabilities over both static and fading channels to achieve any series representation. This provides an effective and accurate way to
accuracy level. Extensive Monte Carlo simulations are therefore no calculate the achievable rate.
longer needed. Our detailed contributions can be summarised as More importantly, we extend the calculation of the ergodic
follows:
† achievable rate in fast Rayleigh fading and the outage probability in
IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167
& The Institution of Engineering and Technology 2015 1
slow Rayleigh fading environments in the second part of this paper.
Given that the instantaneous achievable rate can be expressed in Since the spectrum sensing is not perfect in practice, it is
closed-form, we propose a piece-wise linear curve fitting (PLCF)- important to take into account the imperfectness of the spectrum
based method to approximate the instantaneous achievable rates sensing, which is characterised by the probabilities of miss-
curve as a combination of linear segments. It is then demonstrated detection and false-alarm with the probabilities Pm and Pf,
that the ergodic achievable rate in fast fading and the outage respectively [20]. Under the miss-detection event, SU fails to
probability in slow fading of the considered CR systems in the detect an active PU. In this event, the SU link is affected by an
presence of sensing imperfection can be calculated effectively to impulsive interference generated from the PU transmission. On the
achieve any given accuracy level. other hand, false-alarm occurs in the event that no PU is active but
SU postulates one. Furthermore, in the events of false-alarm with
probability Pf and correct detection with probability (1 − Pm), the
The remainder of this paper is organised as follows. In Section 2,
the considered DFH CR link is introduced. Section 3 presents a SU channel outputs are respectively noise and noise plus
simple way to calculate the achievable rate over the static channel interference only (i.e. without SU transmission). Depending on the
to achieve any predetermined accuracy level. In Section 4, the sensing techniques applied, for example, energy detection [6], we
calculation of the ergodic achievable rate in fast fading can calculate these two parameters straightforwardly [21]. It is
environment is provided. The calculation of the outage probability clear that Pm and Pf depend on the noise level, and the strength of
in slow fading is also presented in this section. Numerical results interfering signal from PU.
are then provided in Section 5 to confirm the analysis. Finally, To establish the channel model of interest in further detail, let be
Section 6 concludes this paper. be a Bernoulli random variable that represents the cases of SU
perceiving either a busy time-slot, that is, (be 0), or free time-
slot, that is, (be 1). It can be seen that the event P
be =0= indicates the
P =
case of false-alarm or correct detection. Therefore, (be 0) p(1
Pm) (1 p)Pf . Under this event, SU TX keeps silent and
P
channel= erasure
= − be +
can − by SU RX. On the other hand,
declared
under the event be = 1, the channel is considered to be free from SU
perspective and SU TX will transmit a complex signal x. Taking
into account the miss-detection event of the presence of a PU, the
channel output y can then be expressed as

y|be=1 = g · x + bmI + n. (1)

In (1), bm is Bernoulli random variables with state space {0, 1}


where ‘bm = 1’ indicates the miss-detection of the presence of a
PU and we have (bm 1) pPmW p1. For convenience, we
denote peW (be P 1) throughout
= = this paper. Note that the input
is subject toP the= average power constraint E(be|x|2) ≤ 2Px.
Moreover in (1), g is the channel gain, n~ CN 0, 2s2 represents
. Σ
n
2
the
. thermal noise,
I and I is thefi PU interference seen by SU RX,
which isΣI~
no longer
CN 0,Gaussian
2s . We distributed.
also de ne n W b I + n as a
2 CR under DFH: system model In this paper, we consider two different cases of the channel gain
g.
total Specifically,
noise, for a static channelm as in [16], we have g = 1. On
2.1 Channel model the otherT hand, in a wireless fading environment, we consider
Rayleigh fading in which the magnitude of g follows Rayleigh
In this paper, we consider the CR system employing DFH as in [3, distribution, or equivalently, α = |g| is exponentially distributed. It
2

15]. In this DFH system, the PU utilises an F-band in a time- is also assumed that g is available at the CR RX but not the TX.
slotted transmission structure and it is assumed that the PU occupies
a time-slot with probability p. As shown in Fig. 1 , a frequency
spectrum pool is formed by using several frequency subchannels 2.2 Achievable rates and outage probability
over PU F-bands [3, 4]. The SU then dynamically hops over these
sub-channels and establishes its transmission when the channel is For the above model, as shown in [16], the use of a Gaussian input
free of PU signal. We assume that the hopping sequence is known to x is asymptotically optimal. As such, for a static channel with g =
both SU TX and RX [16, 17], and the SU is synchronised with the 1, the information rate achieved by the Gaussian input can be
PU time-slot structure [18]. At the beginning of each time-slot, a calculated as
decision regarding the presence or absence of PU signals is made
available at both the SU TX and RX. This can be achieved when
the RX knows the sensing information from the TX via a reliable Cs = I(x; y, be) = I(x; be) + I(x; y|be)
feedforward link. In a more practical scenario, a fusion sensing = P(be = 1)I(x; y|be = 1)
architecture can be employed to collect all sensing information and
a final sensing decision is made at an access point and sent to the = pe[h(y) − h(nT)] (2)
SU terminals [19].
where I( ) is the mutual information between the corresponding
variables and h(y) and h(nT) are entropy values of y and nT,
·
respectively. It should be noted that the above achievable rate
corresponds to the case of be = 1. It is because the SU RX declares
channel erasures on the noise and noise plus interference outputs
when we have the realisation be = 0.
In the case of fading channels and under the assumption of
ergodicity for fading gains, g can be assumed to change
independently from symbol to symbol. Therefore, the ergodic
achievable rate can be obtained by averaging over the fading gain
g as follows
Fig. 1 Frequency spectrum pool in PU F-bands
Cf = pe[Eg[h(y|g)] − h(nT)]. (3)
In (3), h(y|g) is the differential entropy of the output for a given g.
On the other hand, for a slow fading channel where g is m = b1/w = s2/s2. The parameter I1 can then be expressed as
assumed to n
remain constant, one has the outage probability, which is defined
as the probability that the achievable rate for a given realisation g ∫
−m ln d 1
is smaller than a desired rate r. The outage probability can be I1 = e ln (1 + )e−my dy. (9)
expressed as w − ln
d
e−y
Using integration by− parts with u = ln(1 + e−y) and dv = e−μy dy,
Pout (r) = Pr {[h(y|g) − h(n )] ≤ r} (4) we obtain du = − (e y/(1 + e−y))dy and v = − e−μy/μ. Applying this
T
transformation to (9), we have
IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167
2 & The Institution of Engineering and Technology 2015
In general, due to the presence of the interference from the PU,
there does not exist an effective method to calculate Cs, Cf, and
Pout(r). Even for the static channel, the calculation of Cs in [16] was −m ln d 1∫
I1 = e u dv
relied on some rough approximations and the accuracy might w
be an It is because the calculation in [16] relied on specific levels − ln ∫
issue. d−m 1
d e−(m+1)y
ln (1 + d)
of signal-to-noise ratio (SNR). In the subsequent sections, we shall dy. (10)
introduce new methods to evaluate Cs, Cf, and Pout(r) in an = 1 − (1 + e−y)
b b
1 −
ln d
effective manner to achieve any level of accuracy. −y −y
Now, let z = e /(1 + e ). I1 in (10) can be then calculated as

ln(1 + d)
∫d/(1+d)
b d −m m −(1+m)
3 Achievable rates of CR static channel I1 = − 1
1
b 0
b 1 0 z (1 − z) d
In this section, the focus is on the calculation of Cs for the static + a
(a) ln(1
d) d−m ∫1 a−1 −a
x u

channel. Instead of relying on approximate calculations [16], we = 1 b1 (1 − ux) du
will show that Cs can be expressed in closed-form using a simple b
0

series representation and we can achieve any level of accuracy. Σ−a


(b) ln(1 + m ∫1 . x(1 − t) (1 − x)
d) d−a−1
Σ aΣ 1−t
x
Let us start with the differential entropy of the total noise h(nT). 1− dt
= 1 − 1
Using the same analysis as in [16], we have b ∫1 0. 1 − xtΣa−1 . 1 − xt − xt)2
b Σ−a (1
ln (1 + d) d −m a 1−t 1−x (1 − x) dt
Σ . ΣΣ = − x 1 − 1 − (1 − xt)2
b b xt xt

h(nT) = −E log fnT(nR, nI) 1 1 0

. . ΣΣ . Σ ln(1 + d) d−m a ∫1 (1 t)a−1


2p s2 n+ s2 I = x (1 − x)− − dt
s +p s
2 2
b1 01 −
= log + log b
(a−1)
− xt
(e) n I
− Y(nR, nI).
1
p1 s2 + s2 ∫ −1
n I
+ x
(5) −
ln(1 d) 1 1−
b
= 1 1 dt
b (1 −xt
t)a (11)
0
where nR and nI, respectively, denote real and imaginary
components of nT, and
where x = δ/(1 + δ), a = μ + 1, and u = z/x in (a). Furthermore, in
(b),
we set t = (1 − u)/(1 − xu), which yields u = (1 − t)/(1 − xt) and
du =
∫1 ∫1 Σ . ΣΣ − ((1 − x)/(1 − zt)2)dt. Using the geometric series representation of
n2 + n2
=

1
log 1 + d exp −
R I
Y(nR, nI) fnT(nR, nI) dnR dnI the term 1/(1 − xt) in (11), we then obtain
0 2s2n
(6)
In (6), we denote d = (1 − p ) s + s / p s 2 2 2
I1 = ln (1 + − x 1∫ t) (1 − a−1
0
and Σ (xt)n dt
b
d)
1/s2 = (1/s2 ) − (1/(s2 + s2 . f (I Σ· 1, n b
1 n 1 1 0 ∫ n0
= 1
joint probability density function (PDF) of nR and nI and is given as
− 1x
n+ v1 =
a−1
(1 − v)n dv
I )). Furthermore, · ) is 1 Σ
(c) ln (1 + d)
n n nT
the
b b11n=0 0
1
b1 0
∫1 . Σ
(1 − p1) (1 + d) 1 n
−(nR
2 I2
+n )/2 s n2 (d) ln n 1 k ak1
fnT(nR, nI) = 2 e b1 Σ
2 Σ k
ps n
0
. Σ = −b x+ +− d
p1 2
−(n +n )/2 s +s 2 2 2 (−1) kv
n 1 n=0
Σ n . 0
Σ
k=0 k n +
Σ1 1

IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167 k k+m+


& The Institution of Engineering and Technology 2015 1 3
+ . 2 R I I . (7) ln (1 + d) 1
n (−1) x
. (12)
= − n=0 k=0
k
Σe n

2p sn + sI 2 b1 b1 n=0 k=0

Using the polar


be further coordinator
expressed as nR = r cos (f) and nI = r sin (f), (6) can Note that in (c), we change the parameter v =1 − t and in (d ), we
Σ1
apply the binomial series representation (1 + x)a = k
.
a
= Σxkk .
0

Σ
log (e) (1 − p1) p I Σ (8) As we show in the Appendix, the truncation of the first N terms
Y(n , n ) = I 1 + s2 +1 s2 2 from n =0 to n = (N − 1) will introduce an error that is
R I
2 s 2

n n I
where
upper-bounded by

error .
, 1 1 xn+1
Σ 1 xN +1 (13)
1 Σ

.
Ii = ∫ . Σ b1 n=N =
m+1 b1(m + 1−x
ln 1 + de−wx e−bix dx,
0 1)

with i =. {1, 2Σ}, x = r2, j = 1/2σ2, b1 = 1/2s2, and


n I
Since x ∈ (0, 1), it can be seen that the error decreases as N
increases and it converges to zero when N → ∞. Therefore, the
2
n
b = 1/2 s2 + s 2 . Now, let y = jx − ln δ and calculation of
I
can be done with any accuracy level. In particular, for a given
2 n I 1

ln (eb1 (m + 1)(1 − x))


level e, one can use the first N nT = , − 1, Observe that the differential entropy h(y) in (18) has the same
1
ln x form with the differential entropy of the total noise in (5). By
terms to achieve an error that is smaller than e. replacing s2 in (5) by β, we obtain the differential entropy h(y)
Using a similar procedure, we can obtain I2 in (5) by replacing in a simple series representation as follows
β1 and μ in I1 by β2 and l b2/w s2/(s2 s2), respectively. For I2, n
= = n + I
to achieve , e, we can use the first
, an error that is smaller than h(y) = −E[log ( fy(yR, yI))]
ln x b + p1sI
2 2p b + sI log(e)
ln (eb2 (l + 1)(1 − x)) log. . p1 ΣΣ . Σ
representation.
n
N T=
terms in the series b + s22
−1 2
= I

Combining with I1 calculated earlier, we obtain the closed-form . (12 p )bs


.
2

expression of the entropy of nT, which is given in (14) −


bs + b b +
1 I
. Σ + log(e) I I
n (−1) (1 − p1) b + s2 /((1 − p1)s2 + b)
k

h(nT) = + log ΣΣ I I
log n n I 1 s2
n 1 I (e) 1

. Σ . 2 Σ
2ps2 s2 + s2 s + p s2 . Σ . . Σ Σn+1
h(nT) = + log 1 1 n
log
n 1
(e) I
(−1)k (1 − p1) b + s2 /((1 − p1)s2 + b)
s2 + (1 − p )s2
s2 + s2 ΣΣ .. Σ Σ
×
1
n . 1 I Σ n I k k + 1 + b + s2 /s2
1

1 I
n I n
(1 p n) 2 2 I
. n=0 k=0 I I
Σ Σ Σn
n
n I 1 I k
n n I =

=
log (e) − 1 snsI

IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167


4 & The Institution of Engineering and Technology 2015
n I n = ( p )s2 Σ1 Σ1 . n Σ
1
I = I
k
b+
+ s2
. Σ k log(e) ×
s2s2 + s2 s2 + s2 n0k0

1I
1
n .+ Σ
. .I Σ Σn+1
(−1)k (1 − p ) s2 + s2 /((1 − p )s2 + s2) I n=0 k=0
1 I
1I n Σ (1 − p1) b + /((1 − p1)sI +
k + 1 + s2 + s2 /s2 (−1)
n I
sI b)
I . (20)
.. Σ k. . 2Σ
2
Σn+1
n I
2
I

1 I
. Σ Σ1 Σn . k + 1 + (b/sI )
p s2
+ log Σ
s2 +n s2 n I As similar to the analysis for h(nT), it can be verified that by using
(e)

n=0 k=0
k

n I k
. . Σ Σn+1
( 1)k (1 p ) s2 s2 ((1 p )s 2
s2) the first Ny = max (Ny, Ny) in the two series in (20), the maximum
− /

I+
I
− 1 n+ I − 1 n
(14)
1 2
error in the approximation of h(y) is
k+ 1+ (s2/s2) Σ . Σ Σ
It is not hard to verify that by using the first N max (N n T, N n T ) log (e) (1 − p1) b + s2 + p1b
I
T y . Σ
= 2 b b + s 2
n 1 2 e=e . (21)
in the two series in (14), the maximum error in the approximation I
I
of
h(nT) is Here, Ny and Ny can be calculated as similar to NnT and NnT by
Σ . 2 2Σ 2Σ 1 2 1 2
log (1 − p1) sn + sI + p1sn (15)
replacing sn 2by β in calculating β1, β2, μ, l, and x.
n n
I
enT = e . Σ . Finally, substituting h(y) and h(nT) into (2) yields the achievable
2 s2 s2 + s2 rate Cs in closed-form. The truncation of the first
N = max (Ny, Nn T) terms in the four series representations result
Now, turning our attention to the differential entropy of the in a maximum error of max (ey, enT).
output, it is easy to show that the moment generating function
of the output is
. ΣΣ 4 Achievable rates and outage probability of
+
f (v , v ) = e−(1/2)b.v2 v2Σ.1 − p 2 2
−(1/2)s v +v
2
CR Rayleigh fading channel
+ p e
1 2
,
I1 2
y 1 2
1 1
In this section, we consider the CR SU link in a wireless fading
(16) environment. We first focus on the calculation of the ergodic
where b = (P / p ) + s2. Then, taking the inverse Fourier achievable rateprobability
of the outage in fast fading before
in slow extending to the computation
fading.
x e n
transform of (16) yields the PDF of yGI as
(1 − p1) 2 2 2 4.1 Calculation of Cf
f (y , y ) = e−(y +y )/2s

y R R I n
2pb Observe from (3) that the key point in obtaining C is to calculate the
I . Σ
p 2 2 2 f
2 differential entropy h(y) averaged over g. It is because the
Σ+ e−(yR+yI )/2 b+sI
1
. , (17) differential entropy h(nT) can be effectively calculated as in the
I
previous section. For a given g, we can treat the channel as a static
2p b + s channel. As such,
where yR and yI are the real and imaginary components of the joint the instantaneous differential entropy of the output h(y|g) of the
PDF of yGI. Therefore, the differential entropy of yGI can be considered CR link can . 2be expressed inΣclosed-form by replacing
represented as s2nin (14) by k(g)W |g| (P /x p )e+ s2 .n Since h(y|g) is a function
of α = |g|2 , with a slight abuse of notation, hereafter, let us denote
h(y|g) as h(y|α) and k(g) as k(α), respectively. Note that α follows
h(y) = −E[.log ( fy(yR, yΣI))] the exponential distribution, that is, p(α)= e−α. We then have
. Σ . Σ
2p b + s2 b + p s2 ∫
I

1 I |

IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167


& The Institution of Engineering and Technology 2015 5
1I 1
= log + log − Y(yR, yI).
p b + s2 h(y) = h(y a)e−a da. (22)
(e) 0
(18)
Given that h(y|α) can be easily calculated for a given α using the
where simple series representation derived earlier, we can adopt the
PLCF method in [22] to evaluate the integral in (22). The main
∫1 ∫1 Σ idea of PLCF is to approximately represent a curve using linear
. ΣΣ
= y2R+ y2I
0
Y(yR, yI) log 1 + d exp − fy(yR, yI) dyR dyI segments in which we can control the gap between the curve and
0 2b the segments with any given accuracy level. However, the PLCF
(19) method can only be applied to a curve consisting of finite values.
Since h(y|α) is not finite when α goes to ∞, the PLCF method Given the above approximations with controllable error levels,
cannot be used directly. Our idea is to approximate h(y|α) by a we can now proceed to evaluate the average achievable rate Cf. By
simple function of α when α is beyond a certain threshold αth that using PLCF in the range (0, αth] and using h(α)= hGO(α) in the
depends on the accuracy level, and to approximate h(y|α) using range [αth,
PLCF when α < αth. To this end, we consider the use of an
∞), we obtain the following approximation on the entropy h(y)
upper-bound on the achievable rate derived in [16] under the
assumption of a Gaussian output. In particular, if the output h(y) ≃ am−1
(ama + bm)e−a da
is
Gaussian distributed, for a given α, the differential entropy of the
Σm=1am M ∫
output can be expressed as . . ΣΣ
log 2pe k(a) + p s2 e−a da W A + B. (29)
+ ∫1 1I
. . ΣΣ
h (a) = log 2pe k(a) + p s 2
. (23) aM
where A is the summation of the first M integrals and B is the last
While hGO(α) is an upper-bound on h(a) W h(y a), it is observed
| hGO(α) when α
via numerical results in [16] that h(α) approaches integral in (29). To evaluate A in (29), we represent the integrals
goes to using series representations as follows
∞. To further evaluate the difference between hGO(α) and h(α), we
first express h(α) as follows ∫am
Σ
M
Σ . ΣΣ A = m=1 (ama + bm)e−a da
2pk(a) k(a) + s2 k(a) + p s2 a
M m−1

1 I m
I
I
h(a) = log + log
1I
= a =a − Σ a=am−1
k(a) + (1 − p )s2 k(a) + s 2
Σ e−a(1 + a). m 1
+ e−a (30)
(e)
a b M .
a=am a=am
− Y′(y , y ) (24) m=1 m=1 m
R I
where we have used the following integral
where Y′(yR, yI) is obtained by replacing s2 in (6) by k(α). Since
. Σ .
0 , exp −(yR2 + yI2)/2k(a) ≤ 1 for −∞ < ynR , y <I ∞, Y′(y , yR ) I ∫b n i x=b
can be upper-bounded by xne−x dx = −e−xn! i!
Σ x (31)
.

Y′ (yR , yI ) ≤ log.1 + a i=0 .


. ΣΣ x=a

(1 − p1) k(a) + s2I . (25) for n = 0 and n = 1.


p1k(a) Next, we can write the last integral B in (29) as follows

Then, from (24), we obtain the lower bound on h(α) . . ΣΣ −


B= ∫1 log 2pe k(a) + p s2 e a da
pk a
Σ . 2
ΣΣ
2 ( ) ( ) 1I
aM
h(a) . k(a) + p1sI 2 1 1
pk a k a + sI + log (e) .I (26) n 1 I

1
I

k(a) + (1 − p )s2 . . ΣΣ −a
k(a) + s2 = ∫ log 2pe s2 + p s2 e da + log (a′ + 1)ne−na′ da′
∫ aM l
. . ΣΣ −aM
Using this result, the difference between h (α)GOand h(α), Δh = = log 2pe s +
n
p s 1 Ie 2 2

hGO(α) − h(α), can be upper-bounded as follows


. Σ + log (l + 1)e−nl + log (e)en E1 (n(l + 1)), (32)
. 2 Σ . Σ
p1(1 − p1)s4 (1 − p1)s2 where P p p 2 , p ( 2 p 2) P , ′
I
I
x e n 1 I 1
I
I
Dh , log 1 + . Σ + log (e) I l = n x/ e s n +
aM e
I x
IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167
6 & The Institution of Engineering and Technology 2015
1 I 1sI n=e sn + 1sI / xa =
. . ΣΣ
k(a) k(a) + s 2
k(a) + s2 a P / p s2 + p s2 , and E ( · ) is the exponential integral
x e n 1 I

Σ . ΣΣ I
∫1
(1 − p ) k(a) + p s2 s2 E1(z) = e−tz/t dt. In (32), the last equality is obtained using the
I

·
1 1 I 1
, log (27a)
k(a) + s 2 integral [23, eq. (4.337.1)].
(e) k(a) By substituting A and B from (30) and (32) into (22), we obtain the
closed-form approximation of the differential entropy h(y) as
. Σ 2
log (e) I
≤ k(a) , (27b) M M
1 − p s1 Σ . Σ Σ . Σ
h(y) ≃ (am + bm ) e−am−1 − e−am + am am −1 e−am−1 − am e−am
where (27a) is achieved by using the inequality ln(1 + x)< x with m=1 m=1
0 and (27b) follows the fact that (k(a) + p1s2)/(k(a) + s2) ≤ 1 for . . ΣΣ −aM
I I + log 2pe k(a )+ M p s 1 Ie
2
α ≥ 0 and 0 ≤ ≤
p1 Observe that the 1. upper-bound on Δh in (27b) is a decreasing . 2 Σ. Σ
+ log(e)e pe (s n+ p1 sI )/Px E1 aM + pe s n+ p1s I
2 2 2
function of α. For a given error tolerance e, it can be easily 2 . (33)
verified that if we choose α such that log (e)(1 − p )s / P
th . 1I
x
k(ath) = e, or equivalently, ath = pe ( log (e)(1 − p1)sI /ePx)−
2
It can be verified that the calculation in (33) results in an average
(s2/Pn)), thex difference Δh is smaller than e for α ≥ αth. error ¯e that will not exceed e. Finally, by substituting
n x differential entropies h(nT) and h(y) from (14) and (33) into (3),
Since αth is a fixed value, h(α) is finite for α < αth. In this case, we obtain the achievable rate Cf.
we can apply the PLCF method to approximate h(α) using linear
segments in which the approximation error is always upper-
bounded by the chosen error tolerance e. Specifically, the 4.2 Calculation of outage probability
approximation of h(α) can be expressed in the form of linear
segments as follows Now, for the outage probability in (4), it can be expressed as follows
error ¯e that will not exceed e. Finally, by substituting
h(a) ≃ ama + bm, for am−1 , a ≤ am, P (r) = Pr {h(y|g) − h(n ) ≤ r} = Pr {g ≤ g } W F (g )
(28)
out T min g min
where m = 1, .. . , M , α0 = 0, and αM = αth. Note that am and bm, (34)
respectively, are the slope and intercept of the mth segment (αm−1,
αm] of the PLCF. where gmin is the minimum required value of the received SNR in
order to achieve the target rate r, g W aG is the received SNR, and
Fg( · ) is the cumulative distribution function of g. Since g follows standard IEEE 802.22 [20]. It is also worth mentioning that in
the exponential distribution, we then have practice, Pm and Pf depend on a given sensing technique and the
proposed method can be applied to any Pm and Pf. When using
gmin the proposed series presentations to calculate the total noise
P (r) = Pr {h(y|g) − h(n ) ≤ r} = 1 − expΣ− Σ (35) entropy, the output entropy, and the rate, we follow the selection
T
out G criteria discussed in Section 3. A to select the number of terms N
in the series representation to achieve high accuracy. Such
For a desired rate r, the outage probability Pout(r) can be calculated selection is SNR dependent and N can run from a few hundreds to
by finding the minimum SNR gmin to achieve the rate r. To this end, a few thousands in the SNR’s range of interest. Since (15)
we can apply the PLCF-based method to approximate gmin for a and
pre-determined error level. In particular, for a given r, it is easy to (21) are the upper bounds on the approximation errors, we observe
calculate (r + peh(nT))/pe. That gives us a specific value of h(y|g). that the use of the first N = 1000 terms in any series representation
Now, using the PLCF technique, we can find the slope and is sufficient. This value is therefore adopted in all calculations.
intercepts am and bm of the linear segment that h(y|g) belongs,
which is given as amg + bm. As a result, gmin can be approximated as 5.1 Achievable rates of CR static channel
Σ Σ We first demonstrate the accuracy of the calculation of the achievable
1 r

gmin ÷ m e (36) rate over the static channel. Fig. 2 plots the achievable rate Cs
a − bm + h(nT) calculated from (2) using the series representation of h(nT) in (14)
p and the series representation of h(y) in (20) for three different
where the value of m is such that rm−1 < r ≤ rm. For completeness, probabilities of the presence of PU, p = 0.1, p = 0.2, and p = 0.5.
we For comparison, the achievable rates obtained by Monte Carlo
have provided the slope and intercept values am and bm, simulations are also provided. For the Monte Carlo simulations, at
respectively, in Table 1 with the accuracy e = 0.01. The outage a given Px, s2, and s2, 107 samples of the total noise plus
probability can
then be effectively calculated as
I n
r 1 interference nT = bmI + n are generated, together with the same
P (r) = 1 − expΣ−. − + h(n )Σ Σ. (37) number of samples of the input x. Note that I, n, and x are all
b
out T
amG complex Gaussian, while bm is generated according to a Bernoulli
pe distribution with (bm 1) pPmW p1. Then 107 samples of the
P = =
output y are created using y = x + n. From the complex samples
m of
Given the above expression for the outage probability, one can also Σ Σ
obtain an alternative performance measure referred to as ɛ − Cout(1) = pe −amG log (1 − 1) + bm − h(nT) . (38)
outage capacity [24]. This value can be understood as the
maximum data rate that can be achieved such that the outage
probability is less than ɛ. By solving Pout(r)= ɛ, it is
straightforward see that this ɛ − outage capacity can be expressed
in closed-form as 5 Numerical results
IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167
& The Institution of Engineering and Technology 2015 7
the total noise plus interference n7T, the differential entropy h(nT) is
This section provides numerical results to verify the theoretical calculated by averaging over 10 values of−log ( fnT (nR, nI)). The
derivations and calculations in the previous sections. In all the differential entropy h(y) for given be = 1 can be calculated in a
results for the2 achievable rate, it is drawn versus the average similar manner using − log ( fy(yR, yI)). The achievable rate can
SNR, G Px/s . The value of interference-to-noise ratio j s2/s2 then be obtained as h(y) − h(nT). It can be observed from Fig. 2
is = set atn20 dB, unless otherwise stated. For all of the
= figures,
I n
that the proposed calculation matches perfectly with Monte Carlo
the values of Pm = Pf = 0.1 are selected. These values are simulations. As a result, it can be used effectively to predict the
specified as the maximum tolerable limit of sensing achievable rate without the need of lengthy Monte Carlo
imperfectness in the CR simulations.

Table 1 Coefficients for the PLCF as a function of SNR with error tolerance 5.2 Ergodic achievable rates in Rayleigh fading
e = 0.01
Extending the results to the Rayleigh fading channel, we first
evaluate the ergodic achievable rates in fast fading. In Figs. 3 and
4, we compare the approximation of the proposed PLCF-based
method with Monte Carlo simulation results for two accuracy
levels, e = 0.1 and 0.01, respectively. In all cases, the achievable
rate curves are obtained for three different values of p, p = 0.1,
p = 0.2, and p = 0.5. Note that with Monte Carlo simulations,
M rm+1 Slope (am) Intercept (bm) we
1 0.3059428065 1.2382829816 3.2340169676
2 0.6184785530 0.9611303983 3.3171710663
3 0.9185473304 0.7296250082 3.4792410626
4 1.2396824871 0.5648865760 3.6769469716
5 1.5836106365 0.4201288158 3.9520142502
6 1.9391502641 0.3107991046 4.2691021532
7 2.3097001108 0.2265676063 4.6313338551
8 2.6849514800 0.1635014990 5.0286901069
9 3.0620405973 0.1179992878 5.4428016811
10 3.4447083244 0.08494261126 5.8725814981
11 3.8294539164 0.06092874895 6.3168824254
12 4.2168626682 0.04376901783 6.7665123886
13 4.6057323031 0.03140112866 7.2241700994
14 4.9959626147 0.02255873865 7.6849047385
15 5.3876827956 0.01619452593 8.1508117471
16 5.7802877795 0.01162143328 8.6205153803
17 6.1733602041 0.00833635638 9.0932852697
18 6.5670017584 0.00597835135 9.5682350248 Fig. 2 Achievable rate Cs of the CR link obtained from the derived
19 6.9609352208 0.00428518388 10.045248052
20 7.3548793821 0.00307145685 10.523261602 calculation and Monte Carlo simulations over the static channel for
different values of p

IET Commun., 2015, Vol. 9, Iss. 17, pp. 2160–2167


8 & The Institution of Engineering and Technology 2015
Fig. 3 Achievable rate Cf obtained from Monte Carlo simulations and the
Fig. 5 Outage probability for Rayleigh fading channel for different values
derived calculation over Rayleigh fading with different values of p and e =
of p. The average SNR Γ is set at 15 dB
0.1

Fig. 4 Achievable rate Cf obtained from Monte Carlo simulations and the
Fig. 6 Outage capacity with 1, 5, and 10% outage obtained from Monte
derived calculation over Rayleigh fading with different values of p and e =
Carlo simulations and the derived calculation over slow Rayleigh fading
0.01
with p = 0.1 and e = 0.01

generate the same number of samples of the channel gain g. Then


107 samples of the output y are created using y = g · x + nT. A outage probability can then be estimated by counting the number of
similar procedure as in the static channel is then performed to samples h(y|g) that is smaller than r + h(nT) and dividing by 107.
obtain the ergodic achievable rate. It can be seen from Figs. 3 and 4 Similar results can also be seen with the alternative measure, the
that while there is a small gap between the proposed calculation outage capacity. In particular, shown in Fig. 6 are the outage
and the Monte Carlo simulation when e = 0.1, the two results are capacities against Γ when the systems are in 1, 5, and 10% outage.
almost identical when e = 0.01 at any values of Γ and p. Via It is clear that the proposed calculation is in full agreement with
extensive simulation results, we observe that e = 0.01 is sufficient the Monte Carlo simulations at the error tolerance e = 0.01.
to provide an accurate estimation of Cf. The proposed calculation
can therefore serve as an attractive solution to calculate the rates.
6 Conclusion
5.3 Outage probability and capacity In this paper, we proposed a simple and accurate method to
calculate the achievable rates and outage probability of a CR link
In Fig. 5, the outage probability is plotted versus the achievable using DFH under a realistic condition of imperfect spectrum
rate r using the calculation in (37) for p = 0.1, 0.2, and 0.5. Here, sensing for both static and Rayleigh fading channels. Specifically,
the error tolerance is chosen at e = 0.01. In line with the previous over a static channel where the channel gain is assumed to be
results, it can be observed from Fig. 5 that the derived outage constant, we showed that the achievable rate of the considered CR
probability fits very well with the Monte Carlo simulations. In this link can be calculated using a simple series representation. The
case, Monte Carlo simulations are performed by first calculating r error introduced from the truncation of this representation is
+ h(nT) for a given r using 107 samples of the total noise plus controllable. The calculation of the ergodic achievable rate in fast
interference. The fading and the outage probability in slow fading was also studied.
In particular,
based on the closed-form expression of the differential entropies method to approximate the instantaneous achievable rate curve. It
calculated for the static channel, we introduced a PLCF-based was then demonstrated that the average achievable rate can be
calculated effectively to achieve any given accuracy level. The 16 Herath, S.P., Tran, N.H., Le-Ngoc, T.: ‘Capacity limit of cognitive radio with
PLCF-based method was also applied to effectively calculate the dynamic frequency hopping under imperfect spectrum sensing’. IEEE Int. Symp.
outage probability. Numerical results were finally provided to on Personal Indoor and Mobile Radio Communications (PIMRC), 2012,
pp. 1693–1698
demonstrate the accuracy of the proposed methods. 17 Khalid, L., Anpalagan, A.: ‘Performance of cooperative spectrum sensing with
Finally, it is worth mentioning that while we are able to provide correlated cognitive users’ decisions’. Proc. IEEE Int. Symp. on Personal Indoor
and Mobile Radio Communications (PIMRC), 2011, pp. 635–639
effective numerical methods to calculate the achievable rates and 18 Kim, J., Shin, Y., Ban, T.W., et al.: ‘Effect of spectrum sensing reliability on the
capacity of multiuser uplink cognitive radio systems’, IEEE Trans. Veh.
outage probabilities, the proposed analytical results do not provide Technol., 2011, 60, (9), pp. 4349–4362
an insight on the behaviour of the considered CR systems. It is 19 Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: ‘Malicious user detection in a
cognitive radio cooperative sensing system’, IEEE Trans. Wirel. Commun.,
therefore very interesting to asymptotically study the effect of 2010, 9, (8), pp. 2488–2497
imperfect spectrum sensing to the performance of the CR systems 20 Stevenson, C., Chouinard, G., Lei, Z., et al.: ‘IEEE 802.22: the first cognitive
radio wireless regional area network standard’, IEEE Commun. Mag., 2009, 47,
under consideration. This interesting problem is currently under 21
(1), pp. 130–138
Cheng, W., Zhang, X., Zhang, H.: ‘Full duplex spectrum sensing in non-time-
investigation. slotted cognitive radio networks’. Proc. Military Communications Conf.
(MILCOM), 2011, pp. 1029–1034
22 Vu, H.V., Tran, N.H., Nguyen, T.V., et al.: ‘Estimating Shannon and constrained
capacities of Bernoulli–Gaussian impulsive noise channels in Rayleigh fading’,
IEEE Trans. Commun., 2014, 62, (6), pp. 1845–1856
7 References 23 Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic
Press, Inc., 2000, 6th edn.)
1 Le, A.D., Tran, N.H., Duong, T.Q., et al.: ‘Numerical calculation of achievable 24 Tse, D., Viswanath, P.: ‘Fundamentals of wireless communication’ (Cambridge
rates for cognitive radio with dynamic frequency hopping under imperfect University Press, New York, NY, USA, 2005)
spectrum sensing’. Proc. IEEE Int. Conf. on Communications and Electronics
(ICCE), 2014, pp. 1–6
2 Goldsmith, A., Jafar, S., Maric, I., et al.: ‘Breaking spectrum gridlock with
cognitive radios: an information theoretic perspective’, Proc. IEEE, 2009, 97,
3
(5), pp. 894–914
Willkomm, D., Gross, J., Wolisz, A.: ‘Reliable link maintenance in cognitive 8 Appendix 1: truncation of I1
radio systems’. Proc. of New Frontiers in Dynamic Spectrum Access Networks
(DySPAN), 2005, pp. 371–378
4 Hu, W., Willkomm, D., Abusubaih, M., et al.: ‘Cognitive radios for dynamic
spectrum access – dynamic frequency hopping communities for efficient IEEE
When the first N − 1 terms of the series in I1 are truncated, the error
will be
n. Σ k
802.22 operation’, IEEE Commun. Mag., 2007, 45, (5), pp. 80–87 1 n (−1) xn+1
1Σ Σ
5 Wang, B., Liu, K.: ‘Advances in cognitive radio networks: a survey’, IEEE J. (39)
Sel. Top. Signal Process., 2011, 5, (1), pp. 5–23 error = k+m+1
6 Tandra, R., Sahai, A.: ‘SNR walls for signal detection’, IEEE J. Sel. Areas b 1 n=N k=0 k
Commun., 2008, 2, pp. 4–17
7 Rao, A., Alouini, M.-S.: ‘Performance of cooperative spectrum sensing over non-
identical fading environments’, IEEE Trans. Commun., 2011, 59, pp. 3249–
3253 Since (1 − v)n < 1, we have
8 Tang, L., Chen, Y., Hines, E., et al.: ‘Effect of primary user traffic on ∫1 ∫1
sensing-throughput tradeoff for cognitive radios’, IEEE Trans. Wirel. Commun., n+1 m n n+1 m

2011, 10, (4), pp. 1063–1068 x v (1 dv , v dv. (40)
9 Zhang, S., Zhao, H., Wang, S., et al.: ‘A cross-layer rethink on the sensing- 0
throughput tradeoff for cognitive radio networks’, IEEE Commun. Lett., 2014,
18, (7), pp. 1226–1229
x
10 Li, S., Zheng, Z., Ekici, E., et al.: ‘Maximizing system throughput by cooperative v)
sensing in cognitive radio networks’, IEEE/ACM Trans. Netw., 2014, 22, It then follows that
(4), 0
pp. 1245–1256 Σn . n Σ
11 Sharma, H., Patel, A., Merchant, S.N., et al.: ‘Optimal spectrum sensing for xn+1 (41)
(−1)kxn+1
cognitive radio with imperfect detector’. Proc. IEEE Vehicular Technology
Conf. (VTC), 2014, pp. 1–5
k k+m+ , m+1
k=0
12 Chen, Y., Yu, G., Zhang, Z., et al.: ‘On cognitive radio networks with
opportunistic 1
power control strategies in fading channels’, IEEE Trans. Wirel. Commun.,
2008, 7, (7), pp. 2752–2761 Hence, the error will be upper-bounded as
13 and M.F., Smith, P.J.: ‘On the statistics of cognitive radio capacity in shadowing
Hanif,
fast fading environments’, IEEE Trans. Wirel. Commun., 2010, 9, (2), pp. 844– . Σ
1
Σ xn+ 1 xN +1
852 1 1
14 Zhang, J., Zheng, F., Gao, X., et al.: ‘Sensing-energy efficiency tradeoff for error ,
cognitive radio networks’, IET Commun., 2014, 8, (18), pp. 3414–3423 = . (42)
15 Ozcan, S.G.G., Gursoy, M.C.: ‘Error rate analysis of cognitive radio b1 1−
transmissions with imperfect channel sensing’, IEEE Trans. Wirel. Commun., m+1 b1(m +
2014, 13, (3), pp. 1462–1655 n=N x
1)

You might also like