Uncertainty area-based interference mitigation for cognitive radio
- Mathieu Boutin^{1, 2}Email author,
- Charles L Despins^{1, 2, 3} and
- Tayeb A Denidni^{1, 2}
https://doi.org/10.1186/1687-1499-2011-175
© Boutin et al; licensee Springer. 2011
Received: 28 February 2011
Accepted: 21 November 2011
Published: 21 November 2011
Abstract
A new interference mitigation approach is presented for a Mobile Ad Hoc NETwork (MANET), acting as a secondary wireless network, which takes advantage of smart antennas and cognitive radio capabilities when arbitrarily deployed in the same area as a primary wireless network while both sharing the same spectrum. The MANET has to cope with the very coarse probabilistic estimate of the primary network antenna location, resulting from the absence of communication between both networks. Prior to MANET deployment, a Monte Carlo simulation is performed to evaluate the MANET's potential aggregate interference. Thus, both network managers have offline requirements to meet by such a simulation before approving their coexistence in the same environment. The adequate size of an uncertainty area surrounding each primary antenna, to respect those requirements, is therefore our main contribution to mitigate the MANET's interference. This is a novel solution for this kind of non-intrusive underlay spectrum sharing paradigm.
Keywords
cognitive radio interference estimation mobile ad hoc network probabilistic location radio coverage area smart antennas uncertainty area underlay paradigm wireless network coexistence1. Introduction
The rapid growth of electromagnetic radio-spectrum use has made this natural resource a rather scarce asset for different wireless networks deployed in overlapping areas. Acute bandwidth shortage is predicted in the near future by considering the frequency bands already assigned for various applications such as television broadcast, cellular communications [1], etc. In contrast to this apparent spectrum scarcity has been the pervasive existence of spectrum opportunity as extensive measurements indicate that, at any given time and location, a large portion of licensed spectrum lies unused [2]. Even when a frequency band is actively used, the bursty nature of many applications results in abundant spectrum opportunities [3]. The relatively new spectrum underlay paradigm even allows simultaneous use of the shared spectrum by both the primary and secondary networks [4]. The cognitive radio concept is viewed as a promising way for improving the usage of this resource with two main objectives in mind: highly reliable communications whenever and wherever needed as well as efficient utilization of the radio spectrum [5].
The FCC has proposed an interference temperature model [6], for the underlay approach of wireless network coexistence, where unlicensed transceivers can operate on the same frequencies as licensed signals provided they can quantify and bound the resulting additional interference [4]. In this model, a secondary node (SN) senses the available spectrum band to further estimate the interference temperature experienced at each channel for each primary antenna (PA) and/or primary user that uses the channel. It is then allowed to transmit data on a channel provided the interference temperature for that channel does not exceed a predefined threshold at any aforementioned primary device [7]. Although temporarily abandoned by the FCC policy task force, the interference temperature model is still widely used among researchers as it provides an accurate measure at a receiving primary device for the acceptable level of RF interference in the spectrum band of interest [8]. The interference temperature of a channel is a function of the channel's average interference power for a given central frequency and spectral bandwidth. In this article though, an aggregate interference power is estimated in a radio agnostic fashion, using generic propagation loss parameters, so that no particular physical layer standards need to be specified. As such, we are concerned about the interference power instead of the temperature model, although the latter is indirectly considered by virtue of aggregate interference.
Many beamforming techniques may be used at transmitters and/or receivers belonging to the same network to enhance their communication. Choosing the best radiation beamwidth and direction at a given transceiver--so as to maximize the signal-to-interference-plus-noise ratio on desired links while minimizing it on any other link--is the challenging purpose of its smart antenna. This interference alleviation method also brought a lot of interest for the development of dynamic spectrum access strategies, where the transmitted power from SNs must be either lowered towards PAs or steered away from them, when sufficient information about PAs' location is available at SNs.
A major obstacle in estimating the aggregate interference at PAs can be the absence of communication between both networks to ensure non-intrusiveness, which can lead to a very inaccurate estimation of the PAs' location by the secondary network. The originality of this study is that our approach is especially designed to deal with this specific issue, which has rather been neglected in the past. Furthermore, it takes advantage of smart-antenna technology, but our scheme can be applied to any wireless network enabling such transmission directivity or not. The emphasis is also on the use of a Mobile Ad hoc NETwork (MANET) as the secondary network since MANETs will be soon very popular for a fast, easy, and low-cost deployment. Our original scheme also demonstrates that, by means of offline communicated coexistence requirements to be statistically satisfied by both networks, i.e., MANET interference underestimation and overestimation constraints imposed, respectively, by the primary and secondary networks, the unavailable online communication between both networks can be surprisingly counterweighted.
There will certainly be many future arising applications requiring the deployment of a MANET in the same environment as a primary network, from which any online communication is practically impossible and the knowledge of PAs' location by the MANET seriously lacks accuracy. Among many examples, one may think about a short-term special event occurring in a city and requiring mobile wireless video transfer for security purposes. Even though the precise PAs' location might be offline communicated to the such a MANET in this rather friendly situation, the radio-wave propagation behavior in this urban environment adds an non-negligible unpredictability factor. A military deployment in an enemy territory is another relevant example, although the assumption of offline communicated coexistence requirements may not hold (the primary network belonging to the enemy). Indeed, as the military MANET (intruder) wishes to reach a minimum QoS while not being detected by the enemy network, the previously mentioned interference estimation constraints still apply.
2. Related work
In many other approaches found in literature, pilot signals sent by a primary to a secondary network allow the latter to estimate the interference it causes to the former, so that interference constraints can only be violated within the desired limits as in [9], hence resulting on an intrusive secondary network deployment. Other authors as in [10–14] have proposed an alternative method--using omnidirectional antennas, beamforming technologies, or relay-assisted directional transmissions--with the drawback of having a constraint on the SNs position during the deployment, which is obviously not convenient when the secondary network is a MANET. A power control strategy serving as an alternative interference avoidance method has been presented in [15], which allows the secondary users to share the common spectrum used by primary users while not degrading the primary link's QoS, by not affecting its outage probability. However, this requires the secondary users to be able to frequently obtain the primary users' channel state information, which unfortunatly implies an online communication between them.
An interesting channel selection scheme under the interference temperature model has been presented in [16], where the interference is estimated in the frequency band of interest before SNs' transmission. However, SNs are assumed to know the exact waveform details and the modulation type of primary signal a priori, so they are able to separate out the primary signals from other interfering signals because of noise and other SNs. The interference estimation accuracy is also highly dependent on SNs distribution over the deployment site. In [17], the proposition of a common control channel design, to be used by both the secondary and primary networks in order to exchange information, is not applicable in our non-intrusive MANET deployment scheme. By having the location information of the secondary as well as the primary users in [18], an overlaying cognitive ad hoc network can concurrently transmit peer-to-peer data in the presence of an infrastructured-based connection in some region. However, it is still not applicable in our scheme because of our assumed PAs' location information inaccuracy for the MANET. The authors in [19] have aimed to maximize the throughput of SNs while keeping the interference temperature at PAs below a certain threshold, even without channel knowledge to the PAs. In fact, they study the optimal secondary-link beamforming pattern to steer interference away from PAs, which is unfortunatly too dependent on an accurate PAs' location information.
In this article, we now remove the need for the primary network to cater to the secondary network with a pilot signal and/or channel state information or details about the primary signal, so that the latter becomes totally non-intrusive, and also permits an arbitrary SNs deployment. To the best of our knowledge, nobody in the past has ever considered our main assumptions in the interference estimation of a secondary network towards a primary network: no online communication between both networks, coarse probabilistic estimate of PAs location obtained by the secondary network, and arbitrary deployment of the latter. For this reason, our simulation results presented in Section 5 cannot be compared with any other method from literature at this time, as our scheme is the first reference for this particular non-intrusive coexistence condition. We have already published some preliminary results of this work in [20], but this article now offers much more details on our proposed interference estimation technique, as well as a quite different and more efficient method to statistically justify the wireless coexistence approval. The following section explains how the results of a Monte Carlo simulation prior to the MANET deployment, provided that special coexistence requirements are communicated offline between both network managers, brings a novel interesting avenue for interference mitigation in this emerging open spectrum context.
3. System models
The communication model among SNs is exactly the same as reported in [21]. For the PAs, they are all assumed to have a unity gain and being omnidirectional for simplicity. In the remainder of this article, the set of all transmitting SNs is defined as S_{ T }, and the set of all PAs is defined as S_{ P }. For the worst case assessment, PAs are always considered to be in receiving mode. We assume all SNs to always know their exact location, by means of a GPS for instance. An SN's antenna beam is modeled as a circular sector since we assume the main lobe to be much more important than all the side lobes together as in [21].
Let G_{ T }(i) be the antenna gain of the i th transmitting SN with its beamwidth θ (i). Similarly, let G_{ R }(j) be the antenna gain of the j th receiving SN with its beamwidth θ(j). Let d (i,p) be the distance between the i th SN and p th PA, and let d_{0} be the far-field distance for the antenna of both types of transceiver. Our radio propagation model thus holds as long as d (i,p) ≥ d_{0}, which is always respected in our simulations. We define α as the path loss exponent and C (i,p) as a zero mean Lognormal random variable, with a standard deviation σ_{ C }, representing the slow fading on the radio channel between i and p[22]. There is no need to consider fast fading since we assume it to be averaged in our model. This way of modeling the radio propagation is quite simple but does not have any impact on the usability of our interference estimation scheme explained subsequently. Indeed, any model could fit as long as the actual and estimated interference received at any PA are calculated accordingly.
By letting the i th RCA be the radio coverage area of the i th transmitting SN, which is actually its transmission beam, r_{MNZ} (i) is in fact the radius of the circular sector representing it, such that the interference from i is considered to be null outside its RCA.
A. Probabilistic location of primary antennas
Many techniques can be found in literature for a cognitive radio network to approximate the location of the primary network antennas. For example, the authors in [23] have combined the number of source estimations provided by the MUSIC [24] algorithm to the MC [25] algorithm to ensure cognitive radio's knowledge on the location of primary and secondary users. However, there are no perfect techniques which would always ensure a precise enough location estimate. Radio channel conditions may greatly vary over short periods of time, mutual interference among nodes may disturb adaptation processes, etc. We thus assume the MANET to never know the exact location of the PAs, but to rather have a coarse probabilistic estimate. Location estimates, such as the expectation, are much more useful if they are complemented with some indication about their precision. In order to visualize the uncertainty associated with the location of each PA, we assume that we have a probability distribution describing the uncertainty about the actual location. This can be done by drawing an Uncertainty Area (UA) centered at the estimated location such that the size and orientation describe the uncertainty of the location estimate as well as possible [26].
B. Requirements for coexistence
Since we consider any online communication to be impossible between both networks, our scheme is based on the idea that, prior the MANET deployment in the same environment as the primary network, both of them must agree with the coexistence based on the results of an offline Monte Carlo simulation. This type of simulation method consists on independently repeating random experiments, from which statistical results are extracted. Those statistics are then used as a basis for decision-making regarding wireless coexistence. To this end though, a different coexistence requirement must be respected by each network, both related with I_{A,o}(p) ∀p ∈ S_{ P }.
Indeed, what will prevent the coexistence acceptance by the primary network is a threatful aggregate interference underestimation (strictly negative I_{ A },o (p)) from the MANET obtained by simulation, which would make the latter erroneously believe that it can use an inappropriate transmission power for its communications once deployed. On the other hand, what will prevent the coexistence acceptance by the MANET is a too great aggregate interference overestimation (strictly positive I_{ A },o (p)) that would affect its QoS, by forbidding it from choosing necessary transmission power among its SNs, even if the received interference at PAs may be far from being critical.
Summary of model's symbols
S_{ T }: | Set of all transmitting SNs |
---|---|
S_{ P }: | Set of all PAs |
i: | Any given transmitting SN (i ∈ S_{ T }) |
j: | Any given receiving SN |
p: | Any given PA (p ∈ S_{ P }) |
G_{ T } (i): | i's antenna gain |
G_{ R } (j): | j 's antenna gain |
θ (i)/θ (j): | i's/j's beamwidth |
d (i,p): | Distance between i and p |
d_{0}: | Far-field distance, d(i,p) ≥ d_{0} |
α: | Path loss exponent |
C (i,p): | Random slow fading between i and p |
σ_{ C }: | Slow fading standard deviation |
P_{ T }(i): | i's transmission power |
r_{INT} (i,p): | Interference radius from i to p |
r_{INT,e}(i,p): | MANET estimate of r_{INT} (i,p) |
I_{ R }(i,p): | Received interference from i to p |
I_{R,e}(i,p): | MANET estimate of I_{ R }(i,p) |
P_{MNZ}: | Minimum non-zero power threshold |
r_{ MNZ }(i): | Distance from i to reach P_{ MNZ } |
I_{ A }(p): | p's aggregate interference |
I_{A,e}(p): | MANET estimate of I_{ A }(p) |
I_{A,o}(p): | p's aggregate interference offset |
μ_{ x }(p): | MANET estimate of p's mean x location |
μ_{ y }(p): | MANET estimate of p's mean y location |
σ_{ x }(p): | MANET estimate of p's std x location |
σ_{ y }(p): | MANET estimate of p's std y location |
λ (p): | p's UA inclination |
Ω_{UC} (p): | p's Uncertainty coefficient |
A_{UC} (p): | p's UA semimajor axis |
B _{UC} (p): | p's UA semiminor axis |
I_{A,UM}(p): | I_{ A }(p)'s Underestimation margin |
E_{out,UM} (p): | I_{A,UM}(p)'s outage event |
P_{out,UM} (p): | Occurrence probability of E_{out,UM} (p) |
η_{UM} (p): | Max. acceptable value of P_{out,UM} (p) |
I_{A,OM}: | I_{ A }(SP)'s Overestimation margin |
E_{out,OM} (p): | I_{A,OM}'s outage event for p |
P_{out,OM} (p): | Occurrence probability of E_{out,OM} (p) |
η_{OM}: | Max. acceptable value of P_{out,OM} (S_{ P }) |
4. New interference estimation technique
A. RCA's intersection with UA
Nonetheless, the parameters t_{ N }, ${t}_{{T}_{1}}$, ${t}_{{T}_{2}}$ and t_{ w }need to be approximated in order to do so, which is explained next.
B. Iterative methods for parameters approximation
A vector starting at (x_{ P },y_{ P }) and ending at (x(t),y(t)) perpendicular to the UA would result on having its length minimized. This is actually the case with $\stackrel{\u20d7}{{v}_{N}}$ for which $\u2225\overrightarrow{v}\left(t\right)\u2225$ has its global minimum at t = t_{ N }. Because of the non-linearity of $\u2225\overrightarrow{v}\left(t\right)\u2225$, it becomes much more affordable to approximate t_{ N }by an iterative method rather than trying to get its exact value analytically [28]. Using the BFGS Quasi-Newton method with a mixed quadratic and cubic line search procedure [29], and starting this unconstrained nonlinear optimization with t_{ P }as the initial estimate, we attempt to find the minimum of $\u2225\overrightarrow{v}\left(t\right)\u2225$ to obtain an approximation of t_{ N }. It has to be noted that, depending on the circumstances, i.e., the location of the external point with respect to the UA as well as the value of the ellipse parameters, it may occur for $\u2225\overrightarrow{v}\left(t\right)\u2225$ to have two minima. For the one-minimum case, the convergence is guaranteed from the fact that it is impossible for t_{ P }to be located at the unique maximum. For the two-minima case, it is also impossible for t_{ P }to be located at one of both maxima, and will always be located on the side of both maxima leading to the global minimum, hence the convergence is also guaranteed.
occurring at $t={t}_{{T}_{1}}$ and $t={t}_{{T}_{2}}$. The function in (11) is actually the negative of the cosine of the angle between $\stackrel{\u20d7}{{v}_{N}}$ and $\overrightarrow{v}\left(t\right)$, from the vector dot product equation, where we have added the negative sign in order to find two minima instead of two maxima. Since one of its maxima is located at t = t_{ N }which has previously been approximated, both minima are obviously located on both sides of it. Using the same iterative method as the one to approximate t_{ N }, we now find the two minima of f (t) with t_{ N }± 1° as initial estimates. For the input parameters used in our simulation, the choice of these initial estimates ensures that both executions of the search procedure will always distinctly converge to both minima. However, the value of the initial estimates to guarantee convergence will depend on the typical scenario to consider as well as the required precision, but this minor issue is rather irrelevant with today's computing capabilities and precision.
between bounds b_{1} and b_{2} (see Figure 3), which are used to prevent the algorithm from getting the wrong minimum, so that the convergence to the global minimum is guaranteed. Similarly as for f(t) in (11) described previously, the function g(t) in (12) is the negative of the cosine of the angle between $\overrightarrow{w}$ and $\overrightarrow{v}\left(t\right)$ from the vector dot product equation.
The presented approaches to approximate t_{ N }, ${t}_{{T}_{1}}$, ${t}_{{T}_{2}}$, and t_{ w }are all based on the search of a global minimum of a one-parameter nonlinear function, for which the initial estimate is judiciously chosen to guarantee convergence and correctness. However, one must be aware that the complexity and precision are directly related to the termination tolerance on both t and the function value, and the allowed maximum number of both iterations and function evaluations of the aforementioned iterative algorithms. Fortunately, because of the random nature of radio-wave propagation, the exactness of these values is not crucial, since a not so small difference between the exact and approximated values is very unlikely to influence the interference estimation.
5. Simulation
A Monte Carlo simulation with Matlab was performed to assess our Border-UA technique. The simulation is made of a large number of independently generated scenarios forming the samples from which relevant statistics are extracted. For each scenario, SNs as well as the estimated location of only one PA, i.e., the mean (μ_{ x }(p), μ_{ y }(p)), are randomly uniformly distributed on a 2D simulation area. A bivariate Gaussian distribution with means μ_{ x }(p) and μ_{ y }(p), and standard deviations σ_{ x }(p) and σ_{ y }(p) is then used for the actual location (in meters) of the unique PA, followed by an uniformly distributed inclination with (μ_{ x }(p), μ_{ y }(p)) as the rotation center. The resultant PAs actual location may lie outside the simulation area, but is still considered. Since we consider the worst case situation where all PAs are in receiving mode, the presence of one PA does not affect SNs or other PAs in any way, so all PAs can thus be treated independently and separately. Therefore, setting more than one PA per scenario would be useless as the obtained statistics from only one PA are the same for all other PAs. The primary network sets I_{A,UM}(S_{ P }) with η_{UM} (S_{ P }) while the MANET sets I_{A,OM}with η_{OM} as their respective coexistence requirements.
For each scenario, I_{A,o}(p) is calculated for each possible value of Ω_{UC} (p) from a chosen relevant continuous interval. This results on a large amount of I_{A,o}(p) values associated with each Ω_{UC} (p), forming an Empirical Cumulative Distribution Function (ECDF). Such an ECDF is then separated into a partial ECDF for all I_{A,o}(p) < 0, and a partial Empirical Complementary CDF (ECCDF) for all I_{A,o}(p) > 0. The former is used by the primary network to assess the aggregate interference underestimation, whereas the latter is used by the MANET to assess the overestimation. It has to be noted that neither of both partial CDFs includes I_{A,o}(p) = 0 since it only occurs when no RCA intersects the UA of p and actual location, so it is not of any help. The upcoming example represents a typical possible simulation from which the primary and secondary networks could justify their coexistence decision. One should note that, because of the uniqueness of our non-intrusive coexistence condition still not considered in literature up to now, our simulation results cannot be compared with any previous method, as already mentioned.
A. Results of a coexistence example
Simulation input parameters
Scenarios: |
---|
Area = 1.0 × 1.0 km^{2} |
Number of PAs = 3 |
Number of SNs = 35 |
Number of scenarios = 25000 |
σ_{ x }(p) ~ σ_{ y }(p) · U [1,4], ∀p ∈ S_{ P } |
σ_{ y }(p) ~ U [6,18],∀p ∈ S_{ P } |
Ω_{UC} (p) ∈ [0.0, 0.2,..., 5.0], ∀p ∈ S_{ P } |
Radio propagation: |
α = 2.1 |
σ_{ C }= 0.2 |
d_{0} = 1.0 m |
P_{MNZ} = 10^{-15} W |
Coexistence requirements |
Primary network |
I_{A,UM}(1) = -10^{-6} W, η_{UM} (1) = 0.02 |
I_{A,UM}(2) = -5 × 10^{-6} W, η_{UM} (2) = 0.008 |
I_{A,UM}(3) = -10^{-5} W, η_{UM} (3) = 0.001 |
Secondary network |
I_{A,OM}= 5 × 10^{-5} W, η_{OM} = 0.15 |
CSRRT algorithm |
N_{ R }= 5 × 10^{-15} W |
γ_{SINR} = 13 dB |
ξ = 1.25 |
θ(i)= θ (j) = 60° |
G_{ T }(i) = 2π/θ (i), g_{ R }(j) = 2π/θ (j) |
Those parameters are chosen so as to represent a MANET deployment with high node density, in a typical urban area. Such a cluttered RF environment gives rise to the relatively high imprecision on PAs location estimate by the MANET. In regard to the coexistence requirements, different I_{A,UM}(p)'s and η_{UM} (p)'s value were attributed for each PA, with the objective of providing a better idea of the flexibility offered by our scheme. Meanwhile, I_{A,OM}'s and η_{OM}'s values were simply set as if the MANET were not too demanding with respect to its own performance--for its deployment to be possible.
It is important to note that, as shown in Figure 5c, the number of available samples (scenarios) is not constant as a function of Ω_{UC} (p) in Figure 5a,b. When Ω_{UC} (p) = 0.0, the underestimation and overestimation occurrence probabilities are about the same because p does not have an UA yet, and the null offset probability is at its maximum (although quite low) for the same reason. Therefore, as Ω_{UC} (p) increases, the number of underestimation samples for Figure 5a decreases while the number of overestimation samples for Figure 5b increases. The five-number summaries of Figure 5a,b finally show that I_{A,o}(p) clearly tends to statistically increase as Ω_{UC} (p) increases, which is obviously expected.
The partial ECDF for the aggregate interference underestimation is presented in Figure 6a where the thick dashed lines represent the requirements of the primary network to be respected (I_{A,UM}(S_{ P }) and η_{UM} (S_{ p })). The partial ECCDF for the aggregate interference overestimation is presented in Figure 6b, where the thick dashed lines represent the requirement of the MANET to be respected (I_{A,OM}and η_{OM}). Figure 7a presents P_{out,UM} (S_{ P }) as a function of Ω_{UC} (S_{ P }), where the thick dashed lines show the minimum value of Ω_{UC} (S_{ P }) for the primary network requirements to be respected. Figure 7b presents P_{out,OM} (S_{ P }) as a function of Ω_{UC} (S_{ P }) where the black thick dashed lines show the maximum value of Ω_{UC} (S_{ P }) for the MANET requirement to be respected. One can also see from Figure 7b the gray thick dashed lines at the minimum value of Ω_{UC} (S_{ P }) taken from Figure 7a, so the interval of possible value of Ω_{UC} (S_{ P }) can be clearly seen for each PA in order for the coexistence to be accepted by both networks.
B. Discussion
Both Figures 6 and 7 are essential in the coexistence decision process after the Monte Carlo simulation has been completed. Notwithstanding the fact that Figure 7 is by far the most convenient between both figures to precisely determine the permitted Ω_{UC} (S_{ P })'s interval granted that I_{A,UM}(S_{ p }), η_{UM} (S_{ P }), I_{A,OM}and η_{OM} are fixed, Figure 6 gives a much better overview of the worthy value range of those coexistence requirement parameters. Indeed, an informal decision can easily be taken by both network managers by only taking a glance at Figure 6, which is not possible with Figure 7 as a degree of liberty is lost since I_{A,UM}(S_{ p }) and I_{A,OM}are now implicit to the curves. It is clearly shown in Figure 7b that the coexistence is possible if Ω_{UC} (1) ∈ [2.19, 3.25] for "PA #1", Ω_{UC} (2) ∈ [0.9,3.25] for "PA #2" and Ω_{UC} (3) ∈ [2.75, 3.25] for "PA #3". The optimal value for Ω_{UC} (S_{ P }) to choose among those intervals is however out of the scope of this article as it may depend on many factors. For instance, it could be settled that the primary network remains always privileged by choosing the maximum permitted value of Ω_{UC} (S_{ P }) so that its aggregate interference is minimized. Under other circumstances, some performance metrics could be accounted by both networks so that the value of Ω_{UC} (S_{ P }) is chosen such that an agreed Pareto optimum is obtained. Choosing the optimal Ω_{UC} (S_{ P }) might be the subject of our future research.
One should note that the presented simulation results strongly depend on our antenna and radio propagation models, the simulation area, the number of PAs and SNs as well as the algorithm used (CRSST) to establish communication links among SNs. Changing any of those attributes could give results at a rather different scale, but the main trends would always be the same. Even if modeling smart-antenna radiation-beam patterns with circular sectors might seem too simplistic, real beam patterns can actually be precisely modeled by many adjacent circular sectors, so our scheme is thus fully applicable for any model to reach the desired real-world fidelity.
6. Conclusion
A novel and very promising interference mitigation approach has been described in this article, which greatly takes advantage of the use of smart antennas by secondary network nodes when arbitrarily deployed in the same area as primary network antennas. Our scheme is especially designed to cope with the very poor or non-existent online communication between primary and secondary networks, which is highly prone to lead to an inaccurate probabilistic location estimate of each PA by the SNs. By selecting the appropriate size of an UA surrounding the estimated location of each PA, the trade-off between aggregate interference underestimation and overestimation can statistically be tuned by a Monte Carlo simulation prior the secondary network deployment, provided that wireless coexistence requirements are communicated offline between both networks.
Ensuring non-intrusive integration of a MANET in the same spatial and spectral environment as a primary network, by assuming no online communication between them, undoubtedly makes any coexistence adaptation quite tedious by both parties. Without any feedback from the concurrent network, the other one will not be able to reach its quasi-optimal performance, and vice versa. Nevertheless, if each network keeps a history of its activity and QoS-related metrics over time, a periodic offline feedback is still possible between both network managers, and coexistence requirements updated accordingly. Such an offline adaptation might be really valuable in the situations explained in [31] where malicious radio nodes (as enemies from a third network, for instance) try to spoof the online communicated feedback between the secondary and primary networks, in order for the intelligent adaptive capabilities of the former to unfortunately play against itself.
Our scheme could even be employed without any requirement communicated offline between networks, as for military applications. The secondary network requirement would then become a QoS constraint, and the primary network requirement would become an interference constraint (for the secondary network not to be detected due to its own transmissions). Determining the optimal Ω_{UC} (p), instead of an acceptable interval, might even be done by online adaptation in our future study, for which many original approaches are yet to be discovered. Using the same coexistence constraints as mentioned in this article, but by providing even greater values for Ω_{UC} (S_{ P })'s upper and lower bounds, is of real interest and also part of our future study. On the one hand, the greater is the UAs size of a PA for fixed coexistence constraints, the greater is the probability of this PA to be located inside of its UA, and hence a better interference protection is permitted. On the other hand, if one assumes the primary network to be also composed of primary users receiving data from these PAs, as for the upcoming IEEE 802.22 WRAN standard for the digital TV Broadcast spectrum sharing [32], these primary users will also benefit from a better interference protection if their PAs use a greater UAs size.
Declarations
Authors’ Affiliations
References
- Thoppian M, Venkatesan S, Prakash R, Chandrasekaran R: MAC-layer scheduling in cognitive radio based multi-hop wireless networks. IEEE Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Network 2006, 191-202.View ArticleGoogle Scholar
- McHenry M: Spectrum white space measurements, Presented to New America Foundation Broadband Forum; Measurements by Shared Spectrum Company. 2003.Google Scholar
- Zhao Q, Tong L, Swami A, Chen Y: Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a POMDP framework. IEEE J Sel Areas Commun 2007, 25(3):589-600.View ArticleGoogle Scholar
- Clancy T: Formalizing the interference temperature model. Wiley J Wirel Commun Mob Comput 2007, 7(9):1077-1086. 10.1002/wcm.482View ArticleGoogle Scholar
- Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE J Sel Areas Commun (invited paper) 2005, 23(2):201-220.View ArticleGoogle Scholar
- FCC Notice of Inquiry and Notice of Proposed Rule Making, In the matter of establishment of an interference temperature metric to quantify and manage interference and to expand available unlicensed operation in certain fixed, mobile and satellite frequency bands, Et Docket No. 03-237 2003.Google Scholar
- Sharma M, Sahoo A, Nayak KD: Channel modeling based on interference temperature in underlay cognitive wireless networks. In IEEE International Symposium on Wireless Communication Systems (ISWCS). Reykjavik, Iceland; 2008:224-228.Google Scholar
- Chen T, Zhang H, Kartz M: CogMesh: cognitive wireless mesh networks. In Proceedings of IEEE Globecom 2008 (Workshop on Wireless Mesh and Sensor Networks). New Orleans, LA, USA; 2008.Google Scholar
- Kim DI, Le LB, Hossain E: Joint rate and power allocation for cognitive radios in dynamic spectrum access environment. IEEE Trans Wirel Commun 2008, 7(12):5517-5527.View ArticleGoogle Scholar
- Huang S, Ding Z, Liu X: Non-intrusive cognitive radio networks based on smart antenna technology. In IEEE Global Telecommunications Conference (GLOBECOM). Washington, DC, USA; 2007:4862-4867.Google Scholar
- Hanif MF, Smith PJ: On the statistics of cognitive radio capacity in shadowing and fast fading environments. IEEE Trans Wirel Commun 2010, 9(2):844-852.View ArticleGoogle Scholar
- Yiu S, Vu M, Tarokh V: Interference and noise reduction by beamforming in cognitive networks. IEEE Trans Commun 2009, 57(10):3144-3153.View ArticleGoogle Scholar
- Zhao G, Ma J, Li GY, Wu T, Kwon YH, Soong A, Yang C-Y: Spatial spectrum holes for cognitive radio with relay-assisted directional transmission. IEEE Trans Wirel Commun 2009, 8(10):5270-5279.View ArticleGoogle Scholar
- Vu M, Devroye N, Tarokh V: On the primary exclusive region of cognitive networks. IEEE Trans Wirel Commun 2009, 8(7):3380-3385.View ArticleGoogle Scholar
- Chen Y, Yu G, Zhang Z, Chen H, Qiu P: On cognitive radio networks with opportunistic power control strategies in fading channels. IEEE Trans Wirel Commun 2008, 7(7):2752-2761.View ArticleGoogle Scholar
- Sharma M, Sahoo A, Nayak KD: Channel selection under interference temperature model in multi-hop cognitive mesh networks. In IEEE 2nd International symposium on New Frontiers in Dynamic Spectrum Access Networks. Dublin, Ireland; 2007:133-136.View ArticleGoogle Scholar
- Chowdhury KR, Akyildiz IF: OFDM-based common control channel design for cognitive radio ad hoc networks. IEEE Trans Mob Comput 2011, 10(2):228-238.View ArticleGoogle Scholar
- Wang L-C, Chen A: Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlaying infrastructure-based systems. IEEE Trans Mob Comput 2009, 8(5):577-589.View ArticleGoogle Scholar
- Zhang YJ, So AM-C: Optimal spectrum sharing in MIMO cognitive radio networks via semidefinite programming. IEEE J Sel Areas Commun 2011, 29(2):362-373.View ArticleGoogle Scholar
- Boutin M, Despins C, Denidni T: Interference protection on legacy devices with cognitive radio using smart antennas. In IEEE 70th Vehicular Technology Conference. Anchorage, Alaska, USA; 2009.Google Scholar
- Boutin M, Despins C, Denidni T, Affes S: A novel interference safety margin for cognitive radio MANET using smart antennas. Special Issue on Wireless Communication on Underground and Confined Areas. J Commun 2009, 4(4):257-266.Google Scholar
- Boutin M, Benzakour A, Despins CL, Affes S: Radio wave characterization and modeling in underground mine tunnels. IEEE Trans Antenn Propag 2008, 56(2):540-549.View ArticleGoogle Scholar
- Duval O, Punchihewa A, Gagnon F, Despins C, Bhargava VK: Blind multi-sources detection and localization for cognitive radio. In IEEE Global Telecommunications Conference (GLOBECOM). New Orleans, LA, USA; 2008.Google Scholar
- Godara LC: Smart Antennas. CRC Press; 2004.View ArticleGoogle Scholar
- Punchihewa A, Dobre OA, Rajan S, Inkol R: Cyclostationarity-based algorithm for blind recognition of OFDM and single carrier linear digital modulations. In IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Athens, Greece; 2007.Google Scholar
- Kontkanen P, Myllymäki P, Roos T, Terri H, Valtonen K, Wettig H: Topics in probabilistic location estimation in wireless networks. In IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Volume 2. Barcelona, Spain; 2004:1052-1056.Google Scholar
- Miller CD, Lial ML, Schneider DI: Fundamentals of College Algebra. 3rd edition. Scott Foresman/Little; 1990.Google Scholar
- Ahn SJ, Rauh W, Recknagel M: Ellipse fitting and parameter assessment of circular object targets for robot vision, in. In IEEE/RSJ Proceedings, International Conference on Intelligent Robots and Systems (IROS). Volume 1. Kyongju, South Korea; 1999:525-530.Google Scholar
- Fletcher R: Practical Methods of Optimization, Vol 1 Unconstrained Optimization. Wiley; 1980.Google Scholar
- Brent RP: Algorithms for Minimization Without Derivatives. Prentice-Hall, Englewood Cliffs, NJ; 1973.Google Scholar
- Clancy TC, Goergen N: Security in cognitive radio networks: threats and mitigation, in. In IEEE 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom). Singapore, Singapore; 2008.Google Scholar
- Stevenson C, Chouinard G, Zhongding L, Wendong H, Shellhammer S, Caldwell W: IEEE 802.22: the first cognitive radio wireless regional area network standard. IEEE Commun Mag 2009, 47(1):130-138.View ArticleGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.