Interference Mitigation Under Degrees-of-Freedom Sensing Uncertainties in Opportunistic Transmission

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Interference Mitigation under Degrees-of-Freedom

Sensing Uncertainties in Opportunistic Transmission


Jordi Borràs and Gregori Vazquez
Department of Signal Theory and Communications, Technical University of Catalonia (UPC)
Building D5, Campus Nord UPC, Jordi Girona 1-3, 08034 Barcelona, Spain
Email: {jordi.borras.pino, gregori.vazquez}@upc.edu

Abstract—Inter-system interference may limit the performance are heterogeneous networks [7], interweave cognitive radio [8],
of co-existing systems in dense heterogeneous wireless networks. and device-to-device communications [9].
Context-aware waveform design can profitably overcome this
limitation. However, the latter substantially depends on degrees- In the following, we detail some recent results in the context
of-freedom (DoF) sensing mechanisms. In this work, we show that of opportunistic communications. Although waveform design
total least-squares (TLS)-based waveform design is robust against has been widely studied (see, e.g., [10–12] and references
sensing uncertainties. Given the equivalence of minimum norm therein), it is still an open issue. In [13], a waveform design
and TLS, the latter exhibits the good properties of linear predic- scheme which permits the co-existence of radar and mobile
tors, which are of paramount importance to guarantee minimum
inter-system interference and detectability by neighboring nodes.
systems is proposed. Additionally, [14] addresses the perfor-
Additionally, since derived solution relies on orthogonal projector mance analysis of improper Gaussian signaling in interweave
onto the so-called noise subspace, we can efficiently and iteratively cognitive radio systems. In view of the expected lack of
construct an orthogonal waveform-book enabling the presented radio resources to satisfy the demanding user-requirements of
transmission scheme in multi-carrier scenarios. Simulation results a large number of inter-connected devices, in [15] we may
are presented to support our theoretical contributions, and to
highlight any potential advantage of proposed solution in crowded
find a survey of state-of-the-art proposals of non-orthogonal
heterogenous wireless networks. multiple-access (NOMA) for cognitive communications.
Index Terms—Opportunistic communications, distributed net- What is very interesting is the marriage of opportunistic
works, total least-squares, sensing uncertainties, waveform design. communications and novel proposals for increase the per-user
rate. For instance, opportunistic communications have been
I. I NTRODUCTION recently studied to operate in millimeter-wave bands [16], and
altogether with full-duplex technology [17].
Next-era wireless communications will be mainly charac-
terized by demanding high data-rates, ultra low latency, high As previously presented, interference might be a limiting
reliability, and a huge amount of wireless interfaces simultane- performance factor in distributed wireless networks. Therefore,
ously transmitting information [1]. Moreover, another impor- some state-of-the-art proposals are also concerned with inter-
tant consideration is the co-existence of several communication ference management (see [18] and references therein).
technologies. Therefore, many works recently presented study As a final remark on the literature, we focus on performance
the communication in such heterogeneous environments with analysis. For instance, the impact of sensing performance
different technologies co-existing. Nevertheless, interference in detection error in cognitive systems is assesed in [19].
might pose a severe limitation in dense wireless networks. Regarding to the throughput, [20] studies the achievable rates
Hence, several recent works deal with techniques for interfer- of interweave cognitive radio, whereas a study of the optimal
ence management, avoidance, and/or cancellation (see [2–4] throughput in multi-cell opportunistic multiple-access can be
and references therein). found in [21].
Opportunistic communication [5] has arisen as a promis- In this work, we will study the problem of robust waveform
ing technique which efficiently and robustly exploits net- design. Actually, according to our previous results [22–24],
work resources. This communication format has a context- or minimum-norm waveform optimization has found to be the
scenario-aware nature. Therefore, it is suitable to be employed best that can be done under degrees-of-freedom (DoF) uncer-
in decentralized or infrastructureless networks [6]. Since inef- tainties in a per-local only sensing scheme. In this paper, we
ficient backbone communication can be avoided, latency might tackle the problem in a different manner which permits a total
be reduced. Furthermore, since opportunistic transmissions are least-squares (TLS) formulation.
adapted to network conditions, transmission schemes their- The remainder of this paper is organized as follows. In Sec.
selves may also present interference management capabilities. II we present the considered signal model and formulate the
Some examples of opportunistic communications techniques problem in detail. The robust waveform design is addressed
Sec. III. As well, we compare the result with previous works
This work has been supported by the Spanish Ministry of Science, Inno- and propose a multi-waveform solution. Some properties of the
vation and Universities through project WINTER: TEC2016-76409-C2-1-R
(AEI/FEDER, UE) and fellowship FPI BES-2017-080071, and by the Catalan presented solution are detailed in Sec. IV. Simulation results
Government (AGAUR) under grant 2017 SGR 578. are reported in Sec. V and the paper is concluded in Sec. VI.

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.
978-1-7281-0962-6/19/$31.00 ©2019 IEEE
External Network

#1 #3
S̃(r) NE (r)
#2 ··· #M

SE (r)
Ñ (r)
Tx Rx
ϕT (n) ∈ span(Ψ̂N ,T ) ϕR (n) ∈ span(Ψ̂N ,R )
Internal (TDD) Network

Fig. 1: Context-aware opportunistic transmission in a distributed network. Fig. 2: Sketch of signal and noise subspaces at geographical position r.

II. S IGNAL D ESCRIPTION AND P ROBLEM F ORMULATION A. Degrees-of-Freedom Detection and Sensing Uncertainties
In the sequel, we consider the scenario shown in Fig. 1. Although sensing schemes are being continuously improved
External network refers to the wireless environment, consisting (see, e.g., [28]), since they are based on detection theory, inher-
in an arbitrary number M of wireless interfaces simultaneously ent errors due to false-alarm and miss-detection probabilities
exploiting a fraction of the total degrees-of-freedom (DoF), are always committed yielding sensing uncertainties.
N , (cf. [25], [26]). Internal network consists in those users Notice that there is a slight abuse of notation when we
wishing to opportunistically exploit the available DoF. For the define the external network. Actually, each internal-network
sake of simplicity, we consider herein that it is composed node may observe different external networks, depending on
of a transmitter-receiver pair. To that end, internal-network their geographical position space coordinates r  [x, y, z]T .
users sense the network state through interference channels, Therefore, we will focus our discussion on an arbitrary r.
and decide, by solving a binary hypothesis testing problem, According to Fig. 2, signal and noise subspaces, of dimensions
whether a DoF ζn , for n = 1, . . . , N , is occupied or available: D(r) and K(r), respectively, can be written as S(r) =
S̃(r) ∪ SE (r) and N (r) = Ñ (r) ∪ NE (r). In this work,
H0 : ζn is available, (1a) we assume that S̃(r) and SE (r) contain the occupied DoF
H1 : ζn is occupied. (1b) sensed as occupied and the occupied DoF erroneously sensed
as available, respectively. Regarding to N (r), we refer to Ñ (r)
This problem involves the use of an arbitrary sensing mech- and NE (r) as the available DoF detected as available and the
anism. Spectrum sensing, or more general DoF sensing, has available DoF erroneously detected as occupied, respectively.
been widely studied in the literature (cf. [27] and references Therefore, signal and noise subspaces bases are given by
 
therein). Hence, the sensing stage is assumed to be completed ΨS (r) = Ψ̃S (r) Ξ(r) , (3)
in this work. The sensing mechanism chosen by each internal-  
ΨN (r) = Ψ̃N (r) Υ(r) , (4)
network user allows it to construct a basis of the occupied
DoF subspace, usually known as signal subspace, and a with S̃(r) = span(Ψ̃S (r)), SE (r) = span(Ξ(r)), Ñ (r) =
basis of the available DoF subspace, also known as noise span(Ψ̃N (r)), and NE (r) = span(Υ(r)). Taking the latter
subspace. Once these bases are obtained at each internal- into account, we can define the sensed bases as
network node, they have to design, without side information  
Ψ̂S (r) = Ψ̃S (r) Υ(r) , (5)
on the subspaces sensed at neighboring nodes, a waveform or  
shaping filter ϕi (n), for i = {T, R}, to set up the opportunistic Ψ̂N (r) = Ψ̃N (r) Ξ(r) , (6)
communication. By letting a[m], T and SR be a symbol from a with dimensions D̂(r) = D(r) − ξ(r) + (K(r) − K̃(r)) and
given constellation, the symbol period and the received power, K̂(r) = K̃(r) + ξ(r), respectively, being ξ(r) = dim[SE (r)]
the signal observed by internal-network receiver is given by and K̃(r) = dim[Ñ (r)]. From the transmission point of view,
 note that false-alarm rate only supposes that some transmission
y(n) = SR a[m]ϕT (n − mT ) + v(n), (2)
opportunities are lost, which is not critical in view of inter-
m
system interferences. Nevertheless, miss detection may lead
where v(n) ∼ CN (0, σ 2 ) is a complex noise. Then, internal to these undesired interferences, since internal-network node
receiver will use its local waveform ϕR (n) to detect y(n), at coordinates r will exploit the DoF encompassed in Ξ(r).
without cooperating with internal transmitter. This challenging As a final remark, if an occupied DoF is sensed as available
issue is addressed by the authors in [24]. In this work, we will due to poor monitoring conditions (outage or shadowing
focus on designing robust waveforms in the sense of minimum and multipath fadings), no interferences will be delivered to
inter-system interference. external system due to time division duplex (TDD) assumption.

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.
III. ROBUST S IGNALING BASED ON A T OTAL It is worth noting that, whenever the dimensions of the null-
L EAST-S QUARES O PTIMIZATION space of TH T is larger than one, the TLS problem may lack
In this Section, we present the main result of this work. As a unique solution. In that case, the one with minimum norm
explained before, since we address the design at an arbitrary should be selected. Finally, if several minimum-norm solutions
geographical position, we drop the dependence on the position exists, any of them is valid. Consequently, if internal-network
vector r for simplicity of notation whenever it is possible. nodes do not pre-agree a selection criterion, a detection
It is worth noting that any waveform ϕ fulfilling ambiguity problem arises as in [24].
What is very interesting to notice is that since TH T is
ΨH
Sϕ=0 (7) 
0 01×N
TH T = , (17)
will not provide inter-system interference. However, as we 0N ×1 Ψ̂S Ψ̂H S
have discussed, we will not be able to sense an actual signal
then the proposed design scheme is seeking a solution be-
subspace basis. Therefore, we will consider herein the worst
longing to the null-space of Ψ̂S Ψ̂H S , or, equivalently, to the
case, i.e. we seek a waveform ϕ orthogonal to Ψ̂S and with
column-space of Ψ̂N Ψ̂H N = I H
N − Ψ̂S Ψ̂S . By elemental
minimum impact on those DoF encompassed in Ξ. To this end,
manipulations, it is straightforward to verify that the proposed
let us define the extended signal subspace basis as follows:
  solution in (15) is just one column of the orthogonal projector
Ψ̆S = Ψ̂S Ξ . (8) onto the sensed noise subspace. This column depends on which
row we have selected to divide V2 in (16). Therefore, given
Thus, the problem reduces to find a waveform ϕ such that the equivalence of minimum norm and TLS [30], the solution
 H proposed by the authors in [22–24], i.e.
Ψ̂S Ξ ϕ = 0 + eS , (9)
 −1/2
where eS stands for the error with respect to the complete ϕn = eH H
n Ψ̂N Ψ̂N en Ψ̂N Ψ̂HN en , (18)
orthogonality. For the sake of convenience, we define the
following matrices: and (15) are equivalent. Thus, the robust solution presented
  herein (in the sense of minimum inter-system interference)
Ω̂H
S = Ψ̂S 0N ×ξ , (10) enjoys the attractive properties of linear predictors, as min-
H
  imum norm does [31]. Notice that, although all columns of
ES = 0N ×D̂ Ξ , (11)
P̂N  Ψ̂N Ψ̂H N are orthogonal to the sensed signal subspace,
such that the problem in (9) can be expressed as minimum inter-system interference and the advantages of
  linear prediction can only be guaranteed when the selected
Ω̂S + ES ϕ = 0 + eS . (12)
column fulfills the minimum-norm criterion [22, Sec. III].
It is worth noting that (12) admits a total least-squares (TLS) A. Multi-Waveform Design Scheme
problem formulation [29], where ES and eS play the roles
It is worth pointing out that even though the N columns of
of errors in data matrix and observations, respectively. By
P̂N are orthogonal to the sensed signal subspace Ŝ, they are
defining the extended error matrix or perturbation matrix as
not orthogonal between them. This follows from noting that
Δ  [ eS ES ], TLS finds a matrix Δ such that
K̂ < N . Therefore, the proposed solution is not feasible for
2
min ΔF (13a) multi-carrier systems. In the sequel, we present an iterative
{ES ,eS }
  algorithm to obtain a set of K̂ TLS orthogonal waveforms,
subject to Ω̂S + ES ϕ = 0 + eS . (13b) namely W, at an arbitrary geographical position. We assume
that the internal node has detected both signal and noise
According to the rationale followed in the literature (see subspace bases Ψ̂S and Ψ̂N . We denote the set of columns
[29], [30]), TLS seeks a solution that belongs to the null- of P̂N that meet the minimum-norm condition as F, with
space of matrix TH T, being T the extended data matrix |F | = J < N . One of them is arbitrarily selected with
T  [ 0 Ω̂S ]. Therefore, accounting for the singular value probability J1 . The selected solution ϕn (1) is the waveform
decomposition (SVD) of T, designed at iteration ι = 1. For ι = 2, internal node
 should consider a modified orthogonal projector, such that it
  Σ1 0 V1H
T = U1 U2 0 , (14) belongs to a subspace orthogonal to Ŝ ∪ { ϕn (1)}. Hence, this
0 Σ2 V2H orthogonal projector is given by
where V1 and V2 span the column-space and the null-space
P̂N (2) = IN − Ψ̂S Ψ̂H  
S + ϕn (1)(ϕn (1))
H
, (19)
of TH T, respectively, the TLS waveform yields
Ṽ2 c∗ where P̂S (2) = Ψ̂S Ψ̂H  
S + ϕn (1)(ϕn (1))
H
is the orthogonal
ϕTLS = H , (15) projector onto the modified signal subspace, i.e. the subspace
c c
encompassing the sensed signal subspace and the selected
where cT and Ṽ2 come from partitioning V2 as waveform at the previous iteration. Therefore, by arbitrarily
 T
c selecting an element from F (2), internal node obtains a
V2 = . (16) waveform orthogonal to both Ŝ and ϕn (1). By iterating this
Ṽ2

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.
Algorithm 1 Iterative Computation of W where N0 encompasses the DoF that have been simultaneously
Input: Ψ̂S , Ψ̂N , K̂ detected as available by both transmitter and receiver, whereas
Output: W E(r) contains those DoF only sensed as available at position
1: P̂N (1) = Ψ̂N Ψ̂H H r. As proven in [24], the orthogonal projector onto the sensed
N , P̂S (1) = Ψ̂S Ψ̂S , W ← ∅
2: Arbitrarily choose n ∈ {1, . . . , J} with probability J1 noise subspace at position r can be written as
 −1/2
3: ϕn (1) = e H
n P̂N (1)e n P̂N (1)en , W ← ϕn (1) P̂N (r) = P̂N0 + P̂E(r) , (23)
4: for ι = 2 until K̂ do and the matched-filter miss-matching factor between the wave-
5: P̂S (ι) = P̂S (ι − 1) + ϕn (ι − 1)(ϕn (ι − 1))H forms designed at the transmitter and the receiver, ϕn,T and
6: P̂N (ι) = IN − P̂S (ι) and find F (ι) ϕn,R , yields
7: Arbitrarily choose n ∈ {1, . . . , Jι } with probability J1ι  −1/2
 −1/2  H  κT + κR κT κR
(ϕn,R ) ϕn,T = 1 + + , (24)
8: ϕn (ι) = eH n P̂N (ι)en P̂N (ι)en , W ← ϕn (ι) K0 K02
9: end for being K0 = dim(N0 ), and κT = dim(E(rT )) and κR =
dim(E(rR )), where rT and rR refer to the positions of internal
transmitting and receiving nodes, respectively. Equation (24)
methodology until ι = K̂, the set W can be designed. The means that the energy injected/sensed in N0 will be preserved,
whole procedure is sketched in Algorithm 1. whereas the fraction of energy injected/sensed in E(r) intro-
IV. P ROPERTIES OF ROBUST C ONTEXT-AWARE S IGNALING duces a performance worsening in the form of energy loss (at
transmitter) and noise enhancement (at receiver).
In this Section, we highlight some properties of derived
solution. Notice that a more accurate analysis was performed D. Distribution of Waveform’s Zeros
by the authors in [22–24]. It is worth noting that TLS and minimum-norm waveforms
presented in [22–24] are equivalent. As presented by Kumare-
A. Invariance to Subspace Rotations
san in [32], the so-called extraneous zeros present an almost
In contrast to other works based on null-space of the external uniform distribution inside the unit circle (and only will occupy
network, the waveform design scheme proposed herein relies the unit circle whenever the waveforms are linear combination
on the orthogonal projector onto this subspace and not on a of complex exponentials). Therefore, it is worth noting that
basis. Therefore, by letting U ∈ CK̂×K̂ be a unitary matrix, proposed waveforms exhibit minimum phase and minimum
it is straightforward to see that group delay. Furthermore, as an additional interpretation, this
 H (almost) uniform distribution indicates that transmitted power
(r) (r) (r)
P̂N = Ψ̂N Ψ̂N = Ψ̂N UUH Ψ̂H N = P̂N . (20) will be spread over all DoF detected as available. Thus, in case
of sensing errors, the interference power is minimized.
Hence, since the orthogonal projector is not affected by this
rotation, TLS waveforms exhibit rotational invariance, which V. N UMERICAL A NALYSIS
guarantees coherent detection. In this Section, we report a numerical analysis of the
B. Invariance to Phase and/or Frequency Errors proposed waveform design. For the sake of concreteness, we
are going to consider that sensed signal/noise subspace bases
Waveform design schemes based on observations from ex- are Fourier matrices. This case corresponds to an OFDMA
ternal network acquired by a centralized unit may suffer from scenario. Nevertheless, the results can be extrapolated to any
reference error. Nevertheless, since the derived waveforms rely arbitrary bases.
on the local orthogonal projector, and defining Γ as
A. Behavior Assessment: Proof-of-Concept
Γ = diag(exp{j2πυ0 + φ0 }, . . . , exp{j2πN υ0 + φ0 }), (21)
We consider a wireless environment composed of M het-
i.e. a diagonal matrix containing the reference errors, we may erogeneous nodes, exploiting D DoF (carriers) of a 32-
observe that orthogonal projector is not modified by Γ. Hence, dimensional ambient space. In this proof-of-concept, we as-
TLS waveforms (15) is not affected by these reference errors. sume a DoF occupation of D/N = 3/8. Therefore, a total of
K = 20 DoF are available for opportunistic transmission.
C. Robustness to Subspace Uncertainties In order to take sensing uncertainties into account, we are
This property is of paramount importance to guarantee the going to use the concept of normalized uncertainty. By letting
detectability by a neighboring node. Recall that each internal- ξ be the number of occupied DoF erroneously sensed as
network node only considers local external-network obser- available, the normalized uncertainty is defined as u = ξ/D,
vations. Thus, noise subspaces sensed at each opportunistic such that u ∈ [0, 1]. It is worth noting that u indicates the
system end, N̂ KT and N̂ KR , are, in general, different. Actually, relative excess of DoF sensed as available. We have depicted
at an arbitrary geographical position we may define the noise the power spectral density (PSD) and zeros distribution in
subspace as Figs. 3 and 4, for the extreme cases u = 0 and u = 1. It
N̂ (r) = N0 ∪ E(r), (22) is worth noting that the transmitted power is spread among

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.
20
1
Power Spectral Density (PSD)

Imaginary Part
−20
0

−40
External-Network
Spectral Mask
TLS with u = 0
−60 TLS with u = 1 −1

−0.4 −0.2 0 0.2 0.4 −1 0 1


Normalized Frequency Real Part
Fig. 3: PSD of TLS waveform (15) in a proof-of-concept (useless) case with Fig. 4: Zeros distribution of proposed waveform (15) when u = 0 (blue
a very low subspace dimension (N = 32 DoF). circles) and u = 1 (red crosses).

all available DoF (carriers). When u = 0, the sensed noise of the waveform-book at geographical position r, W(r). To
subspace perfectly match with the available DoF. Contrary, account for a more realistic scenario than in the previous
when u = 1, all DoF are sensed as available and hence the proof-of-concept, we have considered an ambient space of
transmitted power is spread over all system bandwidth. By N = 512 DoF. However, we have also set an external-network
observing Fig. 4, we see that zeros corresponding to occupied occupation of 3/8. By observing Fig. 5, we may see that the
DoF are located at specific positions, whereas noise-subspace three waveforms depicted only span the transmitted power over
zeros are uniformly distributed inside the unit circle. From the available frequency bands, keeping the external-network
Figs. 3 and 4 follows that proposed waveform presents a spectral mask unaffected (whenever u = 0). What is very
behavior similar to multi-carrier CDMA. interesting is that thanks to the proposed iterative algorithm, all
Summarizing, notice that power is actually spread among waveforms in W(r) will not only be orthogonal to the external-
all available subspace. For that reason, as discussed by the network signal subspace, but also between them. Therefore,
authors in [22], proposed transmission scheme can be seen proposed multi-waveform transmission scheme will also avoid
as a dimension-based spreading mechanism. A very engaging any kind of adjacent-waveform interference and will produce
consequence of the latter is that transmitted power per DoF a little or non existent interference to external-network users
(carrier) is, in average, Sk = ST /K̂, for k = 1, . . . , K̂, (depending on the sensing uncertainty u).
with ST and K̂ representing the transmitted power and the C. Performance of Opportunistic Transmission
DoF sensed as available, respectively. Therefore, in case of
sensing uncertainties (i.e. u = 0), the power delivered to Even though sensing uncertainties may not degrade external-
those DoF erroneously sensed as available is the same as the network performance, a degradation in opportunistic transmis-
remaining ones. Interestingly, when ST is kept constant, the sion is observed. Recalling (24), the matched-filter gain is
transmitted power per DoF decreases with K̂ (i.e. decreases directly affected by subspace uncertainties at internal trans-
as the uncertainty grows). Hence, the average inter-system mitting and receiving nodes. For the sake of illustration, the
interference per DoF decreases with u. contour plot of the matched-filter gain is depicted in Fig. 6 for
As a second interpretation, it is worth noting that spread different normalized DoF excess (ρi = κi /K0 , for i = {T, R})
spectrum has found to be the optimal solution in noncoopera- at internal transmitter and receiver. Notice that for uncertainty-
tive communications when one or more nodes present a selfish limited regimes, performance of opportunistic communications
behavior and interfering systems are also spreading their trans- might be severely degraded. Opportunistic system performance
missions in varying environments [33], such as heterogeneous can be improved by means of subspace agreement [34].
networks. Hence, proposed dimensions spreading mechanism VI. C ONCLUSIONS
also seems to be robust to these unfair behaviors. This paper has dealt with the robust scenario-aware wave-
form design in the context of opportunistic communication.
B. Multi-Waveform Solution We have proven that, when the problem is cast as a total least-
As an extension of the proposed TLS waveform, we have squares optimization, the robustness against sensing uncertain-
also proposed a multi-waveform solution. Thanks to the pre- ties is guaranteed. Since proposed waveform design scheme re-
sented iterative algorithm, internal-network nodes can con- lies on the orthogonal projector, a set of orthogonal waveform
struct a waveform-book of K̂(r) elements. This procedure is can be iteratively construct making our proposal feasible in
very useful since enables TLS waveform design scheme in multi-carrier systems. Moreover, total least-squares waveforms
multi-carrier like scenarios and also in multi-user opportunis- exhibits invariance to rotations, reference errors and subspace
tic communications. In order to illustrate the performance of uncertainties, and their zeros are almost uniformly distributed
Algorithm 1, we have depicted in Fig. 5 the three first elements inside the unit circle.

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.
10 10

−8
9

Normalized DoF Excess at RX ρR

−6
Power Spectral Density (PSD)

−5
8

−9


6 −8

7
−10

4 6 −8
−7


5
−4
−20
First Iteration
2 −6 −7
Second Iteration −


3 −5

2
Third Iteration − −4 −6
1 −5
−30 0
−0.4 −0.2 0 0.2 0.4 0 2 4 6 8 10
Normalized Frequency Normalized DoF Excess at TX ρT
Fig. 5: PSD of the three first waveforms produced by Algorithm 1 for the Fig. 6: Contour plot of energy losses [dB] as a function of normalized
external-network spectral mask depicted in dashed black. subspace dimension excesses at internal transmitter and receiver, ρT and ρR .

R EFERENCES [17] S. K. Sharma, T. E. Bogale, L. B. Le, S. Chatzinotas, X. Wang, and


B. Ottersten, “Dynamic spectrum sharing in 5G wireless networks with
[1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. full-duplex technology: Recent advances and research challenges,” IEEE
Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun. Surveys Tut., vol. 20, no. 1, pp. 674–707, Firstquarter 2018.
Commun., vol. 32, no. 6, pp. 1065–1082, June 2014. [18] Z. Chen and M. Kountouris, “Decentralized opportunistic access for D2D
[2] N. Lee and R. W. Heath Jr, “Advanced interference management underlaid cellular networks,” IEEE Trans. Commun., vol. 66, no. 10, pp.
technique: potentials and limitations,” IEEE Wireless Commun., vol. 23, 4842–4853, Oct 2018.
no. 3, pp. 30–38, June 2016. [19] S. Akin and M. C. Gursoy, “Performance analysis of cognitive radio
[3] L. Sun, Q. Du, P. Ren, and Y. Wang, “Two birds with one stone: To- systems with imperfect channel sensing and estimation,” IEEE Trans.
wards secure and interference-free D2D transmissions via constellation Commun., vol. 63, no. 5, pp. 1554–1566, May 2015.
rotation,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8767–8774, [20] A. Patel, M. Z. A. Khan, S. N. Merchant, U. B. Desai, and L. Hanzo,
Oct 2016. “The achievable rate of interweave cognitive radio in the face of sensing
[4] D. Darsena, G. Gelli, and F. Verde, “Joint channel estimation, interfer- errors,” IEEE Access, vol. 5, pp. 8579–8605, 2017.
ence cancellation, and data detection for ambient backscatter communi- [21] H. Lin and W. Shin, “Multi-cell aware opportunistic random access,” in
cations,” in 2018 IEEE 19th Int. Workshop Signal Process. Adv. Wireless 2017 IEEE Int. Symp. Inf. Theory (ISIT), June 2017, pp. 2533–2537.
Commun. (SPAWC), June 2018, pp. 1–5. [22] J. Borràs, J. Font-Segura, J. Riba, and G. Vazquez, “Dimension spreading
[5] L. Lu, G. Y. Li, A. Maaref, and R. Yao, “Opportunistic transmission for coherent opportunistic communications,” in 2017 51st Asilomar Conf.
exploiting frequency- and spatial-domain degrees of freedom,” IEEE Signals, Syst. Comput., Oct 2017, pp. 1940–1944.
Wireless Commun., vol. 21, no. 2, pp. 91–97, April 2014. [23] J. Borràs and G. Vazquez, “Uncoordinated space-frequency pilot design
[6] R. Marin, R. Ciobanu, and C. Dobre, “Improving opportunistic networks for multi-antenna wideband opportunistic communications,” in 2018
by leveraging device-to-device communication,” IEEE Commun. Mag., IEEE 19th Int. Workshop Signal Process. Adv. Wireless Commun.
vol. 55, no. 11, pp. 86–91, Nov 2017. (SPAWC), Jun 2018, pp. 1–5.
[7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. [24] J. Borràs and G. Vazquez, “Decentralized shaping for pilot generation
Quek, and J. Zhang, “Enhanced intercell interference coordination chal- and detection in opportunistic communications,” in 2019 IEEE Int. Conf.
lenges in heterogeneous networks,” IEEE Wireless Commun., vol. 18, Commun. (ICC), May 2019, pp. 1–6.
no. 3, pp. 22–30, June 2011. [25] R. G. Gallager, Information Theory and Reliable Communications. John
[8] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum Wiley & Sons, 1968.
gridlock with cognitive radios: an information theoretic perspective,” [26] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.
Proc. IEEE, vol. 97, no. 5, pp. 894–914, May 2009. Cambridge University Press, 2005.
[9] F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, “A survey [27] J. Font-Segura, G. Vázquez, and J. Riba, “Single and multi-frequency
of device-to-device communications: research issues and challenges,” wideband spectrum sensing with side-information,” IET Signal Process.,
IEEE Commun. Surveys Tut., pp. 1–1, 2018. vol. 8, no. 8, pp. 831–843, 2014.
[10] Y. Zhang, E. DallAnese, and G. B. Giannakis, “Distributed optimal [28] F. Awin, E. Abdel-Raheem, and K. Tepe, “Blind spectrum sensing
beamformers for cognitive radios robust to channel uncertainties,” IEEE approaches for interweaved cognitive radio system: A tutorial and short
Trans. Signal Process., vol. 60, no. 12, pp. 6495–6508, Dec 2012. course,” IEEE Commun. Surveys Tut., vol. 21, no. 1, pp. 238–259,
[11] L. S. Cardoso, M. Kobayashi, F. R. P. Cavalcanti, and M. Debbah, Firstquarter 2019.
“Vandermonde-subspace frequency division multiplexing for two-tiered [29] I. Markovsky and S. Van Huffel, “Overview of total least-squares
cognitive radio networks,” IEEE Trans. Commun., vol. 61, no. 6, pp. methods,” Signal Process., vol. 87, no. 10, pp. 2283–2302, 2007.
2212–2220, June 2013. [30] E. M. Dowling and R. D. DeGroat, “The equivalence of the total least
[12] L. Lu, G. Y. Li, and A. Maaref, “Spatial-frequency signal alignment for squares and minimum norm methods,” IEEE Trans. Signal Process.,
opportunistic transmission,” IEEE Trans. Signal Process., vol. 62, no. 6, vol. 39, no. 8, pp. 1891–1892, Aug 1991.
pp. 1561–1575, March 2014. [31] D. W. Tufts and R. Kumaresan, “Estimation of frequencies of multiple
[13] M. Bica, K. Huang, U. Mitra, and V. Koivunen, “Opportunistic radar sinusoids: making linear prediction perform like maximum likelihood,”
waveform design in joint radar and cellular communication systems,” in Proc. IEEE, vol. 70, no. 9, pp. 975–989, Sept 1982.
2015 IEEE Global Commun. Conf. (GLOBECOM), Dec 2015, pp. 1–7. [32] R. Kumaresan, “On the zeros of the linear prediction-error filter for
[14] W. Hedhly, O. Amin, and M. Alouini, “Interweave cognitive radio with deterministic signals,” IEEE Trans. Acoust., Speech, Signal Process.,
improper Gaussian signaling,” in 2017 IEEE Global Commun. Conf. vol. 31, no. 1, pp. 217–220, February 1983.
(GLOBECOM), Dec 2017, pp. 1–6. [33] R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed
[15] F. Zhou, Y. Wu, Y. Liang, Z. Li, Y. Wang, and K. Wong, “State of the art, bands,” IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517–528, April
taxonomy, and open issues on cognitive radio networks with NOMA,” 2007.
IEEE Wireless Commun., vol. 25, no. 2, pp. 100–108, April 2018. [34] J. Borràs and G. Vazquez, “Distributed feedback-aided subspace concur-
[16] D. Ramirez, L. Huang, Y. Wang, and B. Aazhang, “On opportunistic rent opportunistic communications,” in 2019 IEEE 20th Int. Workshop
mmWave networks with blockage,” IEEE J. Sel. Areas Commun., vol. 35, Signal Process. Adv. Wireless Commun. (SPAWC), July 2019, pp. 1–5.
no. 9, pp. 2137–2147, Sep. 2017.

Authorized licensed use limited to: Aristotle University of Thessaloniki. Downloaded on November 02,2023 at 12:05:37 UTC from IEEE Xplore. Restrictions apply.

You might also like