Skip to main content

Interference avoidance throughput optimization in cognitive radio ad hoc networks

Abstract

The development of a method to ensure interference free transmission with various system constraints to achieve maximum secondary network capacity in an underlay cognitive radio (CR) network is still a challenging issue. Due to the lack of explicit support from the primary system, CR sensing algorithms often face difficulties in reliably estimating the primary signals. This problem becomes even worse when the primary user is a pure receiver. In this paper, we propose a distributed neighbor coordinated adaptive power control estimation mechanism to guarantee a reliable protection for primary users. With reliable transmission power control for the secondary transmitter, the power allocation problem of the CR system is modeled into a constrained Lagrange multipliers optimization problem to guarantee reliable sum rate maximization. Based on a comprehensive analysis from the topology and spectrum access scenario, we simplify the complex interference relationship between primary users and CR transmission pairs and propose an iterative power allocation algorithm with a suboptimal bit loading algorithm, along with fully distributed and neighbor coordinated channel selection strategies. Simulation results show that our proposed power spectrum mask estimation algorithm with capacity maximization model can greatly reduce interference to primary nodes and can successfully enhance the overall throughput.

Introduction

Traditional fixed channel allocations result in low efficiency in terms of spectrum utilization. According to the Federal Communication Commission [1], most of the allocated spectrum remains underutilized most of the time. By enabling a secondary user to access the spectrum holes, spectrum utilization can be significantly enhanced by cognitive radio (CR) technology [2]. If the spectrum band is not being used by the primary system or if communications between CR devices do not cause any harmful impact on the performance of the incumbent users, then CR nodes can adaptively coexist with primary users based on sensing schemes [36].

Due to the dynamical changes of primary user (PU) activities on licensed bands, controlling the transmission behaviors of secondary users (SUs) and determining how to allocate the limited licensed spectrum resource to maximize the network capacity is a challenging process. To successfully achieve such an allocation, several studies have considered the dynamic spectrum access (DSA) issues. Especially in orthogonal frequency division multiplexing (OFDM) CR networks, the power allocation is normally formulated as a constrained optimization problem to distribute the available power over several sub-channels (SCs) in an optimal way. Such allocation is able to maximize the secondary users’ capacity under various constraints [712]. In [7], a weighted sum rate for ad hoc SU links in a cognitive radio network was optimized under a power spectrum mask (PSM) of the SU transmitters. In [8], a single cell downlink model was proposed and the weighted sum rate maximization of all PUs and SUs was studied by using sequential quadratic programming and proportional fair scheduling algorithms. In [9], the interference induced by the SU to the PU was considered as a constraint and several suboptimal algorithms were determined. In [10] and [11], it was assumed that the interference limit at the primary receiver is known to SUs based on the assumption that the PU receiver is also a transmitter; these studies proposed an optimization model with several constraints to maximize the CR system capacity. In [12], a novel effective iterative water-filling algorithm was proposed for power allocation in cognitive networks with a power budget and the peak transmission power of the SU as constraints. This method introduced a distance model to convert the constraints on the interference induced by SUs to the PUs to the PSM constraint of the SU.

A more complex power spectrum mask fitting proposal was proposed in [13] to allow coexistence between a single cognitive radio cell and multi cell primary cells. The power allocation for subcarriers of the SU was modeled into a constrained optimization problem, in which the mutual interference between the SU and PU was comprehensively formulated as restrictions on the SU’s transmission power. Consequently, the modeling scheme restrains the interference to PUs and maximizes the capacity of the SU as well. A similar optimization with a more complete secondary co-channel transmission model is described in [14], in which each channel is shared by multiple SUs. However, [13] and [14], except for the fact that strong interference from the primary transmitter (PT) may interrupt the nearby concurrent secondary communication during the primary uplink phase, ignore the following facts: 1) uplink phase only transmission reduces the spectrum utilization ratio and 2) the primary transmission schedule should always be known in advance, because it will cause unbearable information leaking of primary systems. In [15], an assumption similar to that in [714] was used, and the power allocation for the subcarrier of the SU was modeled into a constrained optimization problem, in which the interference constraint was given as a sensing range concept. With a modified classical power distribution algorithm, the CR network capacity can be maximized with affordable interference to the primary user.

Generally, the power allocation issue for secondary users in cognitive networks includes two aspects: 1) a single user case that considers power allocation for a single SU without a centralized controller or coordinator, in which the accumulated interference from multiple SUs to PUs will not be considered, which is more suitable for point to point transmission; and 2) a multiple SU case that considers the joint power optimization of multiple SUs and accurate interference constraint with various system constraints to help SUs achieve global optimization based on cooperation from a centralized cluster header or coordinator. In this paper, we consider both cases. Despite the contributions of the previous studies, a method that can be used to derive a reliable interference free constraint that plays a key role in capacity maximization has not been well studied in CR ad hoc networks. As a common approach, existing optimization studies in the area of cognitive radio networks assume that the primary transmission range can reach the secondary sensing device that wants to transmit data. In this case, when any primary receiver is within the transmission range of the secondary device, harmful interference (the harmful interference denotes the interference that exceeds the affordable decoding threshold of nearby primary receiver, which is caused by the secondary utilization of the cognitive radio communication pair on the licensed band) higher than the allowed level can be given to the primary receiver. In particular, if the primary receiver does not transmit any signals when the secondary devices perform sensing, then it is very difficult to recognize this primary hidden receiver. In this case, the interference avoidance constraint used for a power spectral mask at the secondary transmitter does not work well. Harmful interference to a primary receiver cannot be avoided. Furthermore, since the Lagrange model has generally been exploited as the main technique in dynamical spectrum allocation optimization for non convex problems with various complicated constraints, the complexity of constraints determines the convergence speed as well as the design difficulty of the optimization algorithm.

Therefore, two main challenges will be raised due to the introduction of a cognitive radio technique into the ad hoc network: 1) how to avoid possible interference to PUs, especially the pure primary receiver (PR), and how to control the accumulated interference to the PR when multiple CR links exist; and 2) how to design maximization criteria along with less complex system constraints with the Lagrange multiplier optimization problem to enhance the CR system capacity and reduce the calculation complexity.

To solve the problems mentioned above, in this paper, we first propose a distributed neighbor coordinated PSM constraint estimation algorithm to guarantee reliable protection for primary users in a challenging network scenario. If there is reliable transmission power control at the secondary transmitter side, then, in order to maximize the CR network throughput (the maximization of sum of data rates from all sub-channels belongs to i-th CR communication pair), a Lagrange optimization problem with different channel selection strategies is modeled; in this problem, both fully distributed channel selection and competition based optimal channel selection are considered. Based on a comprehensive analysis using topology and spectrum access scenarios in the proposed network model, the complicated mutual interference between primary users and CR users is simplified to reduce the primary protection uncertainty and the calculation complexity. We jointly considered the relationship among optimal channel set selection, total transmission power budget, and PSM limitation, and propose an efficient iterative power allocation algorithm along with a suboptimal integer bit loading algorithm to optimize the transmission power on the selected channels.

The remainder of the paper is organized as follows. Section 2 describes the system model and the challenging PSM constraint problem in an ad hoc CR network system. Section 3 provides the proposed neighbor coordinated PSM estimation scheme that provides full protection for primary users even in extreme network scenarios. Section 4 formulates the power requirements to transmit data and the corresponding interference free PSM constraint. A Lagrange multiplier optimization problem is then formulated in Section 5 with simple but efficient power loading algorithms. Section 6 shows the experimental results of the simulations. Section 7 concludes this paper.

PSM constraint problem

System model

In this study, a multi-channel transmission scenario for cognitive radio users is assumed. The available spectrum bands are divided into a set of orthogonal channels by using OFDM modulation scheme, so that from the total N orthogonal sub-channels each cognitive transceiver can opportunistically transmit data using any available sub-channel that does not give harmful interference to primary systems. We assume that the CR transmitter has perfect knowledge of primary users ( P PT and T R PT ). K secondary communication pairs and M primary communication pairs exist. To avoid harmful interference to primary systems, the CR transmitter needs to sense the existence of primary signals and avoid using those sub-channels that do not meet the minimal transmission power needed to maintain the decodable SINR (signal to interference ratio) at the cognitive radio receiver side. The typical PSM estimation model for cognitive radio ad hoc networks [10] is presented in Figure 1. The transmission power of the primary transmitter (PT) is P PT ; the effective transmission range (i.e., the range decodable by the primary receiver) of the primary system is T R PT ; the primary signal interference range is I R PT ; and the maximal transmission range of secondary transmitter (ST) on the licensed band is T R ST Max with maximal transmission power. It is assumed that the typical primary transmission power P PT and the minimal decodable receiving power at the primary receiver are known in advance to the secondary users. It is also assumed that by using a suitable path loss model, the distance between the transmitter and receiver can be derived by measuring the received power for the given transmission power.

Figure 1
figure 1

Coexistence scenarios between primary and secondary systems.

Illustration of PSM constraint problem

Generally, three sensing scenarios exist, as shown in Figure.1: 1) Secondary transmitter a (STa) is within the primary transmission range, which is defined as a protection range in IEEE 802.22 WRAN [16]). STa detects a primary signal, and no transmission is permitted; 2) Secondary transmitter b (STb), which is within the interference range of the PT (also denoted as keep out range in the IEEE 802.22 WRAN [16]), detects the primary signal so that it will control its transmission power to keep the interference range of STb ( I R ST b ) outside the protected range of PT; and 3) Secondary transmitter c STc is outside the interference range I R PT of the primary signal. STc cannot detect the primary signal from PT, so that harmful interference may be given to possible primary receivers (PR) nearby because STc will use the allowed maximal transmission power. In this paper, we consider the case in which the primary receiver does not send any signals when the secondary devices sense the channel. Since a primary receiver does not transmit signals, it is very difficult or impossible for neighboring CR devices to recognize the existence of such a primary receiver. This situation becomes even worse when STs are within the I R PT , due to the complexity of the wireless transmission environment (e.g., channel fading, shadowing, and signal attenuation) [17]. When the secondary transmitter does not detect nearby primary receivers, it may use the allowed maximum transmission power, and significant inference to those PRs will occur. Especially, when the PR is located close to the ST, this creates the worst case scenario in the field of cognitive radio operation, which aims to protect the primary user. Transmission power control without consideration of hidden primary receivers contradicts the original principle of CR: the implementation of CR must not impinge on the performance of primary users. Therefore a more reliable power spectral mask estimation scheme for a multi-channel cognitive environment is needed to guarantee the correctness of CR capacity maximization.

Proposed distributed neighbor coordinated psm estimation

In this section, we propose a fully distributed low complex neighbor coordinated power spectrum mask constraint estimation method (DNPSM). Each CR transmitter estimates its possible maximum interference range not only based on the primary sensing information gathered directly from itself, but also with the help of one hop secondary neighbors (SNs). Table 1 shows the definitions of the parameters that are used for the distance estimation calculations in this paper.

Table 1 Glossary of new terminology

As can be seen in Figure 2, the secondary transmitter (ST) cannot sense the primary signal because it is not within the primary signal detection range. Therefore, ST itself cannot correctly estimate the distance D P T , ST , which is fundamental information for ST power control. To effectively protect primary nodes, the ST must be able to estimate the distance between the ST and the nearest primary receiver (PR). In this paper, we propose a method to estimate the distance D PT,ST with the help of secondary neighbor nodes. The control information exchanged to estimate the distance is performed on the CR control band (e.g., the dedicated control channel for CR use or an unlicensed band such as the ISM band), which does not create any harmful interference (Harmful interference denotes interference that exceeds the affordable decoding threshold of a nearby primary receiver, which interference is caused by the secondary utilization of the cognitive radio communication pair on the licensed band) to the primary system working on the licensed band. It should be noted that the ST can use its maximum transmission power on the control channel to contact nearby secondary neighbors. As can be seen in Figure 2, a secondary neighbor (SN) that is located inside the PT’s transmission range can overhear the control signal from the ST.

Figure 2
figure 2

The proposed PSM estimation scheme.

In DNPSM, a secondary neighbor SN can estimate the distance between a CR transmitter and neighbors ( D ST,SN ) by receiving a message from the secondary transmitter on the control channel; it can also estimate the distance between PT and SN ( D P T , S N ) by receiving a signal from the primary transmitter on the licensed band. Since SN has already determined the maximum transmission range D P T , PR (e.g., in the case of TV broadcasting) of the primary transmitter, it can estimate the worst case distance D ST , PR (also denoted as safety distance). By reporting the estimated safety distance to ST, ST will control its transmission power so that it does not interfere with the possible primary receiver.

Figure 3 shows the procedure of the proposed DNPSM operation. Before an actual data transmission, the CR transmitter ST first senses the licensed channels. If the ST can find some available channels in which no primary signal can be detected, then it requests assistance from nearby CR neighbors to verify the correctness of the sensing results using the CR control band interface. Secondary neighbors measure the received power level from the primary transmitter ( P PR ) on the channels listed by ST. When the primary transmitter’s maximum transmission power ( P PT ) is known to the secondary systems, then, by using the path loss model ( P L LB d ) of the licensed band as in (1), the distance between PT and SN ( D P T , S N ) can be derived from (2). In (1), we used the Hata path loss model [18], which is suitable for urban areas, but any path loss model can be applicable to improve the estimation accuracy under different circumstances.

P L LB d = P PT - P PR = h 69.55 + 26.16 log f 13.82 log h B C H + 44.9 6.55 log h B log d
(1)
D P T , S N = 10 10 log P PT - P PR 69.55 + 26.16 log f 13.82 log h B C H 44.9 6.55 log h B
(2)

in which h B is the antenna height of the base station; C H is the antenna height correction factor; f is the transmission frequency; d is the distance between base station and mobile stations; and h x = 10 x 10 .

Figure 3
figure 3

Reliable PSM constraint estimation procedure.

Since the ST transmits the request message on the CR control channel (e.g., a dedicated unlicensed band) with maximal transmission power, some one-hop neighbor SNs that receive the sensing request may be within the primary transmission range (or interference range). Based on the received power level P SR , SN estimates the distance between ST and SN ( D ST , S N ) using a control channel path loss model (PLUB(d)). In this paper, we use a typical loss model of the ISM band (COST.231 model [19]).

P L UB d = P ST - P SR = h 37 + 30 log 10 d + 18.3 n n + 2 n + 1 0.46
(3)
D ST , S N = 10 10 log P ST - P SR 37 18.3 n n + 2 n + 1 0.46 30
(4)

where n is the path loss parameter that represents the number of floors in the path.

When the maximum primary transmission distance D PT , PR is known, the distance ( D SN , PR ) between SN and the possible worst case primary receiver location can be derived as in (5).

D SN , PR = D PT , PR D PT , S N
(5)

From (4) and (5), the safe distance for the secondary transmission on each available licensed channel can be derived as in (6).

D ST , PR = D ST , SN D SN , PR
(6)

If there are multiple primary systems working on the same sub-channel j (j=1,2,3,…,N), ST takes only the shortest distance between itself and the nearest worst case primary system receiver as the safety distance (PSM constraint) among all the estimated safety distances on the sub-channel j. Clearly, harmful interference to any possible hidden primary receiver from any single CR communication pair can be successfully avoided using the proposed DNPSM.

Power Required and PSM Constraint Formulation

Power requirement

In this study, we consider each sub-channel as a linear time invariant channel; the additive Gaussian noise in each transmission is zero mean with variance σ j 2 . G j d is the channel gain coefficient between the secondary transmitter and its dedicated receiver on sub-channel j with distance d. The mean power P i , j of ST i (i=1,2,3,…,N) to transmit b bits per symbol in sub-channel j (j=1,2,3,…,N) can be calculated as in (7) [20].

P i , j = Γ σ j 2 G j d 2 b i , j 1
(7)

The SNR gap Γ of each ST can be calculated from (8). The SNR gap Γ denotes the difference between theoretical transmitted bits on the channel and the maximal achieved transmitted bits with the selected coding and modulation scheme.

Γ = 1 3 Q 1 R e 4 2 γ κ
(8)

γ is the SNR degradation immunity, which represents the repair capability when facing channel impairment due to an unpredicted situation; the impairment recovery probability is closely related to an extra amount of modulation performance. is κ is the coding gain, which depends on what kind of coding scheme is chosen by the current communication pair. R e is the target error probability. Q 1 . is the inverse of the famous Q- function, which is defined as in (9).

Q t = 2 π 1 / 2 t e τ 2 / 2 d τ
(9)

PSM constraint formulation

The purpose of capacity maximization is to maximize the data transmission rate sum, which is directly related with the CR transmission power on each sub-channel. We assume that the maximal affordable interference power threshold at each primary receiver is the same, and that such a threshold is evenly distributed across all sub-channels with ζ(the method for obtaining ζ is given in [13]). Then, the CR transmission power of the ST should be controlled as in (10) to avoid harmful interference to the primary receiver (distance between the ST and PR is d) within the maximal CR interference range. I j ' d ' is the channel gain between the primary transmitter and primary receiver with distance d’. T P PT I j ' d ' is the received power level from the primary transmitter working on channel j at the primary receiver with distance d ' .

P i , j G j d / δ j 2 + T P PT I j ' d ' ζ
(10)

By manipulating (1), G j and I j ' can be obtained by (11) and (12).

G J D S T , PR = 10 0.1 P L LB D ST , PR
(11)
I j ' T R PT = 10 0.1 P L LB T R PT
(12)

Then, (10) can be rewritten as in (13), combining (11) and (12).

P i , j ζ δ j 2 + T P PT 10 0.1 P L LB T R PT 10 0.1 P L LB D ST , PR
(13)

Let us assume that T P ST Max is the maximal allowed transmission power limited by the CR system hardware on each sub-channel. Then, to avoid harmful interference to primary system receivers, and based on the DNPSM and by manipulating (1) according to the estimated D ST , PR , as shown in Figure 4, the maximal allowed transmission power ( P ST Max ) of the secondary transmitter is given in (14). I R ST Max is the interference range of CR transmission using T P ST Max . P i , j is the transmission power of ST i on sub-channel j.

P i , j P ST Max = { 0 , D S T , P T T R PT ζ δ j 2 + T P PT 10 0.1 P L LB T R PT 10 0.1 P L LB D S T , P R , T R PT < D S T , P T T R PT + I R ST Max T P ST Max , T R PT + I R ST Max D S T , P T
(14)
Figure 4
figure 4

Illustration of PSM constraint with distance variation.

With transmission power P i , j from (14), harmful interference from a single ST to the nearest PR can be successfully avoided. However, such transmission power results in a nutritious accumulated interference from multiple single STs at the same PR side, which is a challenging task that cannot be avoided easily. The solution of this issue will be discussed in the following sections.

Capacity maximization formulation

Distributed channel selection strategy

In this part, we consider a fully distributed network in which each CR communication pair performs the CSMA/CA scheme defined in IEEE 802.11 WLAN to obtain the right to spectrum access. The communication pair will utilize all available sub-channels to transmit data. Since we have multiple CR communication pairs on sub-channel j ( j = 1 , 2 , 3 , , N ), if there are K active CR transmissions on the same channel j, then, harmful interference caused by a single CR communication pair (10) should be rewritten as an accumulative interference constraint (15) with each P i , j following (14). D ST i , PR j is the distance between ST i ( i = 1 , 2 , 3 , , K ) and the nearest PR on sub-channel j.

i = 1 K P i , j G j D ST i , P R j / δ j 2 + T P PT I j ' T R PT ζ
(15)

With the total energy amount as the power budget limitation, and the PSM constraint as the maximal transmission power, the capacity maximization problem can be formulated as a Lagrange multiplier optimization problem on N sub channels; this problem is given in (16), in which d i , m is the distance between the i th CR communication pair and the primary transmitter m (m =1, 2, 3,…, M), and D ST k , SR i is the distance between the ST k ( k i , k = 1 , 2 , 3 , , K ) and the dedicated receiver of i th CR communication pair.

M a x j = 1 N log 2 1 + P i , j G j D S T i , S R i / δ j 2 + m M T P PT I j ' d i , m + k = 1 K k i P k , j G j D ST k , SR i subject to: j = 1 N P i , j P Budget 0 i = 1 K P i , j G j D ST i , P R j / δ j 2 + T P PT I j ' T R PT ζ P i , j Min P i , j
(16)

P i , j Min is the minimal required transmission power of ST i to its dedicated receiver SR on channel j. Because the received SINR at the secondary receiver should be greater than the minimum signal decodable level γ S on each channel j, the minimum transmission power P i , j Min of ST i on channel j can be obtained from (17).

γ s P i , j Min G j D S T i , S R i δ j 2 + m M T P PT I j ' d i , m + k = 1 K k i P k , j G j D S T k , S R i
(17)

Analysis of the capacity maximization model

To control the harmful accumulated interference caused by CR transmissions to the primary receiver under the affordable threshold (15), the ST needs to know the number, transmission power, and channel gain of all neighboring co-channel CR transmission pairs. This is a challenging task and many studies consider just a single secondary communication pair instead [712]. In some investigations, the spectrum access of the SU in a multiple SU network model follows the exclusively spectrum access (ESA) model, in which only one CR communication pair is allowed each time, in order to avoid accumulated interference from the secondary transmission to the primary receiver on the same channel [13][14]. In this study, we consider a multiple CR communication pairs model without the ESA limitation; in this model, multiple secondary users are able to access the same sub-channel by performing the CSMA/CA scheme. A topology based interference relationship analysis between multiple STs and the same PR is shown in Figure 5.

Figure 5
figure 5

Accumulated interference cancellation illustration.

Considering Figure 5, let us suppose that D ST a , PR a SC 1 is the CR ST a’ estimated safety distance to the nearest PR (PRa) working on sub-channel SC1 by performing DNPSM, and D ST b , PR b SC 1 is the CR ST b’ estimated safety distance to the nearest PR (PRb) working on SC1. Both of these are the shortest distances to the nearby PRs (PRa and PRb) on the sub-channel SC1. If the STa gives harmful interference to the STb’ nearest PRb, then D ST a , PR a SC 1 is not the shortest distance to the nearby PR on channel j around the STa. This contradicts the fact that the estimated D ST i , PR j should be the shortest distance from ST i to all PRs around channel j. Therefore, with the help of the proposed DNPSM, the existing challenge of accumulated interference to the same primary receiver in a multiple nodes network model can be successfully solved. Besides, the proposed DNPSM assumes that each CR device is equipped with two interfaces: i) the CR control band interface, which is used for sensing information distribution among CR nodes and for exchanging control information; and ii) the licensed band interface (e.g., the UHF band), which is not only used for data transmission, but also for safety PSM constraint derivation between possible primary receiver and CR devices. Due to the merit of having two interfaces, the interference component P k , j G j D ST k , SR i of (16) can be released. The reason for this is that all the control information and sensing messages are exchanged on the common control channel through CSMA/CA, which is defined in IEEE 802.11 WLAN. One-hop neighbors will always overhear the network allocation vector (NAV) of the selected sub-channel j from the current CR communication pair on the common control channel. The NAV will cease the concurrent transmissions from one-hop CR neighbors. Co-channel interference from two-hop neighboring CR nodes is not considered. Therefore, the complex accumulated interference caused by co-channel CR transmissions can be converted into a single CR communication pair, which simplifies the assumption. Then, (16) can be further simplified and rewritten as (18), in which P i , j Max is the maximal transmission power of ST i on sub-channel j and is equal to P ST Max in (14), with safety distance D ST i , PR j .

M a x j = 1 N log 2 1 + P i , j G j D ST i , SR i / δ j 2 + m M T P PT I j ' d i , m subject to: j = 1 N P i , j P Budget 0 P i , j P i , j Max P i , j Min P i , j
(18)

Local power loading algorithm

By using the Karush-Kuhn-Tucker (KKT) condition [21], and applying the Lagrange multiplier approach, the maximization power filling solution of (18) can be obtained by deriving (19) with λ 0 , μ i 0 .

G j D S T i , SR i / δ j 2 + m M T P PT I j ' d i , m ln 2 × 1 + P i , j G j D S T i , S R i / δ j 2 + m M T P PT I j ' d i , m λ μ i = 0 λ j N P i , j P Budget 0 = 0 μ i P i , j P i , j Max = 0 , j N
(19)

In order to reduce complexity of the following algorithm P i , j P i , j Min is included in the boundary check instead of being included in the Lagrange multiplier problem. By manipulating (19), the optimization filling power P i , j Opt on channel j, necessary to maximize the transmission data rate, can be calculated as in (20).

P i , j Opt = { P i , j Max , j N P i , j Max P Budget 0 M i n M a x 1 ln 2 × λ + μ i φ i G j D S T i , S R i / δ j 2 + m M T P PT I j ' d i , m N i , j 1 , 0 , P i , j Max , j N P i , j Max P Budget > 0
(20)

With the estimated PSM constraint for ST i (i =1,2,3,…,K) from DNPSM, we know the maximal allowed transmission power ( P i , j Max ). By combining λand μ i and defining 1 / ln 2 λ + μ i = φ i as the power loading (water-filling (WL)) level needed to pour limited power into the sub-channel j ( j N ), the water level can be uniquely determined from a total power budget average concept, in which φ i can be obtained from derivation by making (21) equal to zero with N i , j 1 as given in (20).

f φ i = j = 1 N Max φ i N i , j 1 , 0 P Budget
(21)

The only variable parameter in (21) is φ i , with the measured bottom ( N i , j 1 ) of each channel and the initial power level φ i without PSM constraint able to be simply estimated as in (22).

φ i = j = 1 N N i , j 1 + P Budget / N
(22)

Since different sub-channels have different covers ( N i , j 1 + P i , j Max ), three kinds of sub-channel exist: 1) maximal loaded sub-channels, in which the allocated amount of power is ( P i , j Max ); 2) channels in which the power loading is restrained by the water level φ i , in which the allowed pouring power is φ i N i , j 1 ; and 3) zero power sub-channels, in which no transmission will be allowed on these channels. With the limited power budget, if we pour all sub-channels with P i , j Max , power budget will be exhausted. In order to allow sub-channels in both case 1) and case 2) to be assigned optimal power from a limited power budget, the only method is to take some power from the sub-channels of case 1) and pour it into the sub-channels of case 2). To decide which channel should be selected for the pouring of water and to determine the amount of power to pour on the selected sub-channel in order to maximize the capacity of the CR communication pair, we propose an iterative interference avoidance local rate sum (IALRS) algorithm (Algorithm 1) to derive the optimal value φ i Opt with suitable channel selection. The proposed sub-channel allocation algorithm operates with the following steps. An example of the power-loading scenario is shown in Figure 6. The pseudo code of IALRS is given in Figure 7.

Figure 6
figure 6

Power loading level adjustment scenario illustration.

Figure 7
figure 7

Iterative interference avoidance local rate sum (IALRS) algorithm.

1st) Initial power level estimation: average the total power amount on sub-channel j (j = 1,2,3,…, N) according to (22) as the initial water level φ i .

2nd) Adjustment of power allocation: for sub-channel j ( j N ), check the maximal allowed transmission power (PSM constraint P i , j Max estimated from (14)), and calculate the minimal required transmission power ( P i , j Min ) using (17). If current water level φ i exceeds the cover ( N i , j 1 + P i , j Max ) of channel j, remove current channel j, save the power φ i N i , j 1 + P i , j Max in the total power budget P Budget ; the number of removed channels is increased by one. If current water level does not cover the noise bottom ( N i , j 1 + P i , j Min ) of channel j, save the power φ i N i , j 1 in the total power budget P Budget ; no power will be allocated on this channel, or else φ i N i , j 1 should be poured into channel j.

3rd) Re-adjust water level: for remaining sub-channels ( N R ), average the power budget saved from 2nd step. The new power loading level φ i ' should be within the range of (23), in which P Budget left _ R denotes the saved power collected from removed channel set (R) due to the effect of the PSM constraint ( P i , j Max ); P Budget left _ T R denotes the remaining power collected from the temporary removed (TR) channels whose noise bottoms are not covered by the current power loading level ( φ i ). x represents the number of sub-channels in the removed channel set x. By defining ϖ = φ i + P Budget left _ R / N R and ϖ = φ i + P Budget left _ R + P Budget left _ T R / N R T R , the new water level can be updated as in (24).

φ i + P Budget left _ R / N R φ i ' φ i + P Budget left _ R + P Budget left _ T R / N R T R
(23)
φ i ' = ϖ + ϖ 2
(24)

If f φ i ' in (21) is larger than zero, repeat Step 2 to find lower bound ϖ , set the upper bound as ϖ = φ i ' and repeat Step 3 to find a solution to enable (21) to equal zero. If f φ i ' in (21) is smaller than zero, set up the lower bound as ϖ = φ i ' , repeat Step 3 to find the updated upper bound ϖ .

4th) Repeat Steps 2 and 3 until no power can be collected from the previous round; φ i Opt can be obtained ( φ i Opt = φ i ' in Figure 6).

It should be noted that our algorithm does not need to sort all the sub-channels according to N i , j 1 , which sorting is an important component of traditional algorithms and is considerably complex.

The iteration performance of the proposed IALRS algorithm is illustrated in Figure 8, in which the total power budget ( P budget ) equals 800(dB), with noise bottoms and covers randomized from (0, 50) (dB) and (51, 150) (dB), respectively. When we increase the number of sub-channels, the iteration numbers increase as well. The reason for this is that the number of iterations of the proposed algorithm depends on the number of channels that have been detected that do not satisfy the conditions among the three channel condition criteria ( P i , j Min , P i , j Max and N i , j 1 ), which results in a water level readjustment. The fewer the number of channels detected compared to the total number of sub-channels N, the higher the improvement of the computational complexity.

Figure 8
figure 8

Iterative trend of the proposed interference avoidance local rate sum (IALRS) algorithm.

Cooperative Channel Selection Strategy

In this part, instead of only maximizing the throughput of each CR communication pair separately by using the distributed channel selection strategy, we also take the cooperative channel selection strategy into consideration, in which CR nodes coordinate with each other and exchange safety distance information among themselves. CR nodes compare their estimated PSM constraint related distance D ST i , PR j ; only ST i (i = 1,2,3,…K) with arg Max i K arg M i n j N D ST i , PR j wins the spectrum assessing right of channel j (j = 1,2,3,…N). It is assumed that the safety distance information among CR nodes is perfectly exchanged. At the end of the channel comparison stage, each CR node has its own channel selection strategy to maximize the CR system capacity (ot only single communication pairs). To maximize the multiple nodes CR network system, the capacity maximization problem (18) can be rewritten as in (25), in which Opt C i is the optimal channel set selected by STi according to the channel selection criteria.

Max i = 1 K j Opt C i log 2 1 + P i , j G j D ST i , SR i / δ j 2 + m M T P PT I j ' d i , m subject to: j = 1 Opt C i P i , j P Budget 0 P i , j P i , j Max P i , j Min P i , j
(25)

Since the optimal sub-channel set Opt C i is selected by each CR communication pair before Lagrange formulation, the optimal transmission power on each optimal channel set can be obtained by the similar procedure as (19) and (20) of Algorithm 1. The Pseudocode of interference avoidance optimal rate sum (IAORS) solution, which handles the problem of how to find a suitable channel set Opt C i and the suitable power on channel j within each Opt C i (i = 1,2,3,…K), are given in Figure 9 (Algorithm 2), with the following operation steps:

Figure 9
figure 9

Interference avoidance optimal rate sum (IAORS) algorithm (Algorithm 2).

1st) Optimal sub-channel set selection: calculate the maximal transmission power of CR node i ( i K ) using (14) on sub-channel j ( j N ) by performing DNPSM; assign the sub-channel j ( j N ) with arg M i n j N D ST i , PR j as the transmission power “covers” for CR node i ( i K ).

2nd) Compare all one hop CR nodes k ( i , k K , i k ) with Max i K arg M i n j N D ST i , PR j . If arg Max i K arg M i n j N D ST i , PR j ST i , assign the sub-channel j ( j N ) to CR node i ( i K ). Repeat 1st and 2nd steps until sub-channels j ( j N ) are assigned to optimal sub-channel set of each CR node i ( i K ).

3rd) Throughput maximization phase: perform Algorithm 1 on Opt C i ( i K ).

Due to the realistic constellation encoder and decoder implementation requirements, for easy modulation in the practical bit filling procedure, the allocated bit number for each channel should be an integer. A suboptimal integer bit loading algorithm is given in the following section.

Suboptimal Integer Bit Loading Algorithm

The transmitted bits ( b i , j ) of ST i on channel j according to P i , j can be rewritten as in (26) according to (7).

b i , j = log 2 1 + P i , j N i , j
(26)

According to the power filling level on each channel, obtained from Algorithm 1 and Algorithm 2, if we increase all the bit rates to the upper bound of optimal transmission bits x ( b i , j ), which is the nearest integer that is larger thanx, not only will the power budget be exceeded, but also the probability of unaffordable interference to primary receivers will increase. However, a reliable integral data rate can be achieved if the transmitted bits b i , j are uniformly reduced to the lower boundary ( b i , j ), in which x is the lower bound of x that takes the nearest smaller integer than x. We define the extra power that is needed to transmit bits on channel j ( j C i , i = 1 , 2 , 3 , , K ) as P i , j inc in (27).

P i , j inc = N i , j 2 b i , j 1 N i , j 2 b i , j 1
(27)

Then, P C i tot , which is defined as the total saved power of ST i (i=1,2,3…,K) on the selected channel set C i ( C i N ) when we perform only the low bound integer bit loading, is given in (28).

P C i tot = j C i N i , j 2 b i , j 1 N i , j 2 b i , j 1
(28)

Clearly, as we can see from (28), even though the integer bit loading is able to protect primary receivers, the lower bound of allocated bits on each channel will cause a waste of the power budget. Therefore, we try to transmit x bits on channel set C i as long as such increment does not exceed the power budget Pbudget, while obeying the PSM constraint of Ci at the same time. To fully utilize the power budget and maximize the transmission data rate, a suboptimal (SubOpt) integer bit loading algorithm is proposed in Algorithm 3 (Figure 10).

Figure 10
figure 10

Suboptimal Bit Loading Algorithm (Algorithm 3).

After the suboptimal integer bit loading, the remaining power budget is less than the power needed to transmit one more bit on any channel j ( j C i ). Therefore, this is a nearly optimal solution to the integral bit loading requirement.

Simulation results

In this section, simulations are conducted to evaluate the performance in terms of: i) interference avoidance performance during data transmission; ii) power loading model and corresponding capacity maximization algorithms; and iii) SubOpt IBL loading. A typical water-filling scheme [10] is compared as a conventional protocol, in which the PSM constraint is estimated based only on its local primary sensing information without the coordination of neighbors. The simulation parameters are shown in Table 2. The Gaussian noise is assumed to have zero mean and unit variation. Other power related energies are defined in decibels compared with noise power.

Table 2 Simulation parameters

Figure 11 shows the simulation topology for the proposed DNPSM and the reliable capacity maximization model. Without loss of generality, we assume that a total of three worst situation primary receivers (PRa, PRb and PRc) on sub-channel sets A (Ch1-Ch5), B (Ch6-Ch10), and C (Ch11-Ch15) exist nearby, and that each PR is placed on the primary signal decodable boundaries of its corresponding PT. Two STs exist and compete with each other to choose the most suitable channel set from (A, B, C) based on the comparison of arg Max i K arg M i n j N D ST i , PR j ; these STs then pour the power with obtained optimal power filling amount P i , j Opt ( P a , j Opt and P b , j Opt in Figure 11) from (20) into the selected channel set C i (C a and C b in this case), respectively. The DNPSM performed by the secondary transmitter STa in order to avoid the harmful interference for the worst situation of PRa is picked up as an example to illustrate the performance of the DNPSM. Secondary neighbors are randomly placed within the transmission range of the ST. Only SNs that are within the signal overlapping area between the PT and ST can help the ST to derive the transmission power related safety distance in the DNPSM. Data are always backlogged at the ST side.

Figure 11
figure 11

Simulation topology on licensed/CR control band.

As can be seen in Figure 11, to evaluate the performance of the proposed method, DNPSM, and in accordance with the different positions of the ST, we use a coexistence scenario between PTa and STa and place STa between (xPR + 0, 0) and (xPR + T R ST Max , 0), in which xPR = 150 m is the PRa’s position on the x-axis. Since the performance of the DNPSM mainly depends on the variation of the position of the ST ( D ST , PR ), on the transmission range of the ST (ST_Radius) on the CR control band, and on the number of neighbors, we changed these parameters in this simulation study. The appearance of the primary signal is based on the On/Off mode. During On-time, the channel is busy. On-time T On and Off-time T Off have exponential distributions λ 1 and λ 2 , respectively, as expressed in (28). Here, the primary system manifestation probability P On is calculated using (30).

F On t = P T On t = 1 e λ 1 t , F Off t = P T Off t = 1 e λ 2 t
(29)
P On = E T On E T On + E T Off = 1 / λ 1 1 / λ 1 + 1 / λ 1 = λ 1 λ 2 λ 1 λ 1 + λ 2
(30)

Figure 12(a) shows the interference ratio in accordance with the different number of SNs. Interference ratio (31) indicates how much interference on average the surrounding primary systems experienced during the whole CR transmission time. In this experiment, in order to obtain a fair parameter comparison value to evaluate the system performance, the transmission radius (ST_Radius) is set at 230 meters and the appearance probability of the primary signal on the licensed band is set at 50%. T d _ i is the i-th data transmission time, N t is the total number of data transmissions, and IT j is the interference time for the primary system of the j-th data transmission time. In the case of the conventional scheme, regardless of the number of SNs, a CR communication pair cannot obtain the correct measurement due to the lack of a neighbor cooperated power controlling mechanism, so it always yields heavy interference to the incumbent systems around it. In the proposed DNPSM scheme, as the number of SNs increases, the interference ratio decreases dramatically. Compared with the conventional PSM constraint estimation scheme, when the nodes’ density is high enough, harmful interference to the primary system can be completely avoided. Since the smaller overlapping area between ST and PT transmission ranges results in fewer existing SNs, the larger safety distance ( D ST , PR ) always has a higher interference ratio. The variation of the interference ratio according to the transmission range of the ST on the CR control band (ST_Radius) is also shown in Figure 12(b). We can see that only 20 randomly distributed SNs are enough to lower harmful interference to under 2%.

Inference Ratio = j = 1 N t I T j / i = 1 N t T d _ i
(31)
Figure 12
figure 12

Average interference ratio to primary system.

Due to the random position of the SNs, there is a little possibility that no SNs exists on the straight line between the ST and the PT. When an SN that is not located on the straight line between the ST and the PT overhears the control information (channel sensing request) from the ST, the distance estimated ( D ST , PR ) by this SN will be a little bit longer than the real distance between the ST and the possible hidden PR. This discrepancy can cause extra interference to the primary devices. Since precise distance estimation is important to provide accurate power control for SUs, we observed the distance estimation error and the transmission power reduction ratio, with data shown in Figure 13. The distance estimation error represents the difference between the real distance R D ST , PR and the final estimated distance D ST , PR , which is obtained by the ST. As can be seen in Figure 13(a), at first, when D ST , PR increases, the overlapping area decreases and the number of neighbor nodes that can detect the primary signal also decreases; the distance estimation error increases consequently. However, since the distance estimation error is minor compared with the estimated safety distance, the number of SNs has little effect on the power reduction ratio. Figure 13(b) illustrates the relationship between the average reduced transmission power ratio and the positions of the ST. As the safety distance increases, the power reduction ratio of the conventional PSM estimation remains the same. Due to incorrect incumbent system sensing results, the conventional PSM scheme always uses the full power to transmit, which will cause harmful interference to the incumbent systems. Obviously, the DNPSM has better performance. When D ST , PR equals 90 m, the number of SNs equals 15 and the ST_Radius is 150 m; in such a case, less than 50% of the full power level will be allowed for secondary data transmission, in order to avoid harmful interference to possible PRs that are around.

Figure 13
figure 13

Distance estimation error & power reduction ratio of the proposed DNPSM.

The effect of the proposed PSM constraint derived from the DNPSM on the power loading (Water-Filling) performance (Pro. WF) is shown in Figure 14. Without loss of generality, we chose Algorithm 2 to illustrate the power loading performance on the selected sub-channels, with different power loading bottoms and PSM constraints shown in Figure 11. To clearly show the effect of the DNPSM on the performance of the proposed water-filling (Pro.WF) scheme, we set the overall power budget ( P budget ) equal to 920 dB. As shown in Figure 14, compared with the conventional WF scheme (Conv. WF), the maximal allowed transmission power will be smaller with cooperation from one-hop neighbors (PSM constraint (14)). According to the channel selection criteria ( arg Max i K arg M i n j N D ST i , PR j ), STa will choose sub-channel set A (Ch1-Ch5) and C (Ch11-Ch15) as the channels into which to pour power (Figure 14(a)), while STb will choose channel set B (Ch6-Ch10) (Figure 14(b)). On channel set B (Ch6-Ch10), though STb has a large enough power budget to allow it to pour more water, it still uses the P b , j Max ( j C B ) as the optimal water level to protect PRb. Compared with the proposed DNPSM scheme, the conventional approach cannot detect the existence of primary signals on channel sets A, B, or C, and so it always uses the allowed hardware maximal transmission power ( T P ST Max ) as the PSM constraint to pour power into all the sub channels. Harmful interference is given to PRs on those channels (PRs working on channel set B (Ch6-Ch10) and C (Ch11-Ch15) in Figure 14(a) and Figure 14(b), respectively).

Figure 14
figure 14

Power loading illustration according to channel selection and PSM constraint.

In Figure 15, the Pro. WF (Algorithm 2) at the STa side is selected as an example to show the effect of integer bit loading on the power loading of each channel set with different P a , j Max ( j C A , C B , C C ). Since significant harmful interference has already been introduced by using the conventional water-filling schemes (Conv. WF), we will not consider the SubOpt bit loading performance for Conv. WF. As that is shown in Figure 15(a), the lower band integer bit loading (Pro. WF w. IBL) will give a different level of power reduction. However, compared with Conv. WF, which does not take the pure primary receiver into account (performing the data transmission on channel set B ((Ch6-Ch10)), the proposed distributed neighbor coordinated water-filling mechanism (Pro. WF) not only gives reliable protection to the primary users, but also enhances the feasible transmission rate (channel set A and channel set C). Clearly, as we can see in Figure 15(b), the longer safety distance P a , j Max ( j C A , C B , C C )) will have a higher accumulated transmission bit rate ( C A (Ch1-Ch5) > C C (Ch11-Ch15)), because the maximal transmission power can be reached earlier by increasing the transmission power (enhancing the transmission rate) on a lower P a , j Max ( j C A , C B , C C )) channel.

Figure 15
figure 15

Performance of Integer bit loading algorithm.

Figure 16 provides an evaluation of the proposed power loading performance according to the different numbers of randomly placed SNs with different positions of the ST. Along with an increasing D ST , PR , the total amount of pouring power also increases, because the maximal allowed transmission power ( P i , j Max ) has been increased. However, when D ST , PR increases to a certain level (ST_Radius = 200 m), the total amount of power will stop the increasing trend and stay at the same level due to power budget limitations. Furthermore, as we increase the number of SNs, the total amount of power will be slightly reduced. The reason for this is that the larger number of SNs will reduce the safety distance estimation error (tightening the PSM constraint), which will result in a smaller amount of pouring water (power). When the number of SNs is close to 20, as we can see in Figure 12, in which the distance estimation error is less than 2%, minor power pouring changes are made.

Figure 16
figure 16

Performance of proposed PSM constraint on power loading.

Figure 17 shows the data rate sum of the CR transmission system achieved by performing Algorithm 1 and Algorithm 2 separately, with implementation of Algorithm 3. Using Algorithm 2, STa chooses channel set A and C, while STb chooses just channel set B according to the channel selection criteria under the situation shown in Figure 11. The average rate (Ave. Rate), which is obtained by performing Algorithm 1, denotes the average of the transmission rate sum determined by applying the channel selection without neighbor coordination at STa and STb. That is, STa or STb chooses all available channels in order to perform power loading without considering the channel selection strategy. Rate with NC denotes the rate sum that results by applying the channel selection strategy with neighbor coordination (Algorithm 2). Because each channel has a different power loading level, and uniform lower bound integer bits loading (IBL) causes an uneven transmission power waste, Algorithm 2 captures this difference and determines the optimal channel selection strategy to reduce power budget waste by reassigning the suitable sub-channels to each CR communication pair. As we can see in Figure 17, compared to the power loading of Algorithm 1, which is used to maximize the system throughput, Algorithm 2 efficiently enhances the overall transmission rate while reducing the power budget waste. This also indicates that in order to maximize the system throughput, the ST prefers to allocate more power to a channel that is far away from the primary receivers. Along with the increasing of the Power_budget, the data transmission rate sums of both channel selections (with or without an optimal channel selection strategy) show an ascending trend. However, when the Power_budget reaches a certain level, due to the PSM constraint (14), the data transmission rate sums of both channel selections stop the continuous increasing trend. Obviously, with the SubOpt IBL algorithm (Algorithm 3), the CR system capacity can be further enhanced.

Figure 17
figure 17

Performance of data rate sum according to P_budget variation.

As we can see from the evaluations above, compared with the conventional power loading scheme, which does not consider the pure primary receiver, the proposed scheme provides reliable protection for primary users. With the proposed simple but efficient iterative power loading algorithms, a suitable channel set can be determined and optimal transmission power on each channel for whole system capacity maximization can be achieved successfully.

Conclusion

In this paper, a neighbor coordination capacity maximization model with a reliable interference free constraint is proposed for cognitive radio ad hoc networks with multiple secondary nodes; in this model, the complex mutual interference relationship between primary users and secondary users is modeled as an optimization problem and the reliability of the interference free constraint during the Lagrange derivation procedure can be guaranteed. To derive a reliable PSM constraint, instead of using local sensing to estimate the distance to a possible primary receiver to avoid harmful interference, the secondary transmitter estimates the distance to the hidden primary receiver using neighbor node cooperation, and the transmission power is adaptively controlled by considering the safety distance. We jointly considered the relationship among channel set selection, total transmission power budget, and PSM limitation, and proposed two simple but efficient iterative power allocation algorithms, along with a suboptimal integer bit loading algorithm, in which both distributed and neighbor cooperative comparison based channel selection strategies are considered. Simulation results show that with the help of the proposed PSM constraint estimation method and efficient power loading algorithms, capacity maximization of the secondary system, along with reliable performance of the primary user without harmful interference, can be successfully achieved.

Authors’ information

Graduate School of Information Technology & Telecommunication, Inha University, 253 Yonghyun-dong, Nam-gu, Incheon 402-751, Korea, http://multinet.inha.ac.kr

References

  1. FCC: Spectrum Policy Task Force Report, No.02-155. 2002

  2. Simon H: Cognitive Radio: Brain-Empowered Wireless Communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220. 10.1109/JSAC.2004.839380

    Article  Google Scholar 

  3. Zhao Q, Tong L, Swami A: Decentralized Cognitive MAC for Dynamic Spectrum Access. the IEEE Symposium on New Frontier in Dynamic Spectrum Access Networks (DySPAN’05), Baltimore, Maryland, USA; 2005.

    Google Scholar 

  4. Zhao Q, Tong L, Swami A, Chen Y: Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: a POMDP framework. IEEE Journal on Selected Areas in Communications 2007, 25(3):589-600. 10.1109/JSAC.2007.070409

    Article  Google Scholar 

  5. Alex Chia-Chun H, David S, Wei L, Jay Kuo C-C: A Cognitive MAC Protocol Using Statistical Channel Allocation for Wireless Ad-hoc Networks. IEEE Wireless Communications Networking Conference (WCNC’07), Hong Kong, China; 2007:11-15.

    Google Scholar 

  6. Chu F, Chen K: Radio Resource Allocation in OFDMA Cognitive Radio Systems. the IEEE Personal, Indoor and Mobile Radio Communications Symposium (PIMRC’ 07), Athens, Greece; 2007:3-7.

    Google Scholar 

  7. Bazerque J-A, Giannakis GB: Distributed scheduling and resource allocation for cognitive OFDMA radios. the IEEE CrownCom 2007, Orlando; 2007:1-3.

    Google Scholar 

  8. Attar A, Holland O, Nakhai M, Aghvami A: Interference-limited resource allocation for cognitive radio in orthogonal frequency-division multiplexing networks. IET Communications 2008, 2: 806-814. 10.1049/iet-com:20070355

    Article  Google Scholar 

  9. Hamdi K, Wei Z, Letaief K: Uplink scheduling with QoS provisioning for cognitive radio systems. the IEEE Wireless Communications Networking Conference (WCNC’07), Hong Kong, China; 2007:11-15.

    Google Scholar 

  10. Xin K, Ying Chang L, Arumugam N: Optimal power allocation for fading channels in Cognitive Radio Networks under Transmit and Interference Power Constraints. the IEEE International Conference on Communications 2007(ICC 2007), Glasgow, Scotland; 2007:24-28.

    Google Scholar 

  11. Kyuho S, Bang Chul J, Song C, Dan Keun S: Opportunistic Underlay Transmission Multi-carrier Cognitive Radio Systems. the IEEE Wireless Communications Networking Conference 2009 (WCNC’09), Budapest, Hungary; 2009:5-8.

    Google Scholar 

  12. Wang P, Zhao M, Xiao L, Zhou S, Wang J: Power allocation in OFDM-based cognitive radio systems. the IEEE Global Communications Conference 2007 (IEEE GlobeCom 2007), Washington DC, USA; 2007:26-30.

    Google Scholar 

  13. Yao M, Dong In K: Centralized and distributed optimization of ad hoc cognitive radio network. the IEEE Global Communications Conference 2009 (IEEE GlobeCom 2009), Hilton Hawaiian Village, Hawaii, USA; 2009:1-7.

    Google Scholar 

  14. Yao M, Dong In K: Sub-channel-sharing based distributed optimization of ad hoc cognitive radio network. the IEEE Global Communications Conference 2010 (IEEE GlobeCom 2010), Miami, Florida, USA; 2010:1-6.

    Google Scholar 

  15. Cheng Shi Z, Kyungsup K: Power/Bit loading in OFDM based cognitive networks with comprehensive interference considerations: the single SU case. IEEE Trans. Vehicular Technology 2010, 59(4):1910-1922. 10.1109/TVT.2010.2042091

    Article  Google Scholar 

  16. IEEE 802.22-2011(TM) Standard for Cognitive Wireless Regional Area Networks (RAN) for Operation in TV Bands. 2011.

  17. Sahai A, Hoven N, Tandra R: Some fundamental limits on cognitive radio. the Allerton Conference on Communication, Control, and computing, University of Illinois; 2004:1-11.

    Google Scholar 

  18. Hata M: Empirical formula for propagation loss in land mobile radio services. IEEE Trans. Vehicular Technology 1980, VT-29: 317-325. 10.1109/T-VT.1980.23859

    Article  Google Scholar 

  19. Digital Mobile Radio towards Future Generation Systems: Digital Mobile Radio towards Future Generation Systems. COST 231, Brussels; 1996.

    Google Scholar 

  20. Palomar DP, Fonollosa JR: Practical algorithms for a family of waterfilling solutions. IEEE Trans. Signal Processing 2005, 53(2):686-695. 10.1109/TSP.2004.840816

    Article  MathSciNet  Google Scholar 

  21. Boyd S, Vandenberghe L: Convex Optimization. Cambridge Univ. Press, Cambridge. U.K; 2004.

    Book  Google Scholar 

Download references

Acknowledgements

This work was supported by the Inha University Research Grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Jo Yoo.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Hao, N., Yoo, SJ. Interference avoidance throughput optimization in cognitive radio ad hoc networks. J Wireless Com Network 2012, 295 (2012). https://doi.org/10.1186/1687-1499-2012-295

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-295

Keywords