Skip to main content

Distributed beam forming with phase-only control for green cognitive radio networks

Abstract

Cognitive radio (CR) is an intelligent radio system and is able to share the spectrum with licensed users (LU). By adopting adaptive beam forming techniques, CR can reuse the spectrum with LU via directing main beams towards CR users while displaying nulls towards LU. In this article, we present a new distributed beam forming (DB) technique, and study the performance of its application to decentralized CR networks. The presented DB method only controls the phase of the transmitted signal of each CR node in the CR network, and therefore, it is called phase-only DB (PODB) method. It can be implemented at each node independently with only prior knowledge of its own location, and directions of distant CR (DCR) users and LU. The average beam pattern and the average gains for an arbitrary number of CR nodes of PODB method are discussed, showing that CR nodes can constructively transmit signals to DCR users with less interferences to LU via employing the PODB method to form and direct main beams towards directions of DCR users while nulls towards directions of LU. PODB proves to be a green DB method by prolonging the lifetime of the CR network due to effective battery power consumptions at CR nodes. The cumulative distributed function of the beam pattern for a large number of CR nodes is derived and analysed to demonstrate that the PODB method increases the possibility that the transmitted power of the whole CR network at the directions of LU is lower than a certain threshold, which guarantees that CR network causes less disturbing effect to LU.

1. Introduction

Cognitive radio (CR) is a new concept radio presented in [1, 2], which is a promising approach to solve the intensive usage of the precious natural source-spectrum [3]. As described in [3], CR is capable of sensing the communication environment and adapting to it by adjusting its parameters. By applying a beam forming technique, CR can direct its main beams towards CR users while putting nulls to licensed users (LU) in uplink in order to share the same spectrum with LU without disturbing them [4, 5].

Distributed beam forming (DB), which is also referred to as collaborative beam forming, is originally employed as an energy-efficient scheme to solve the long distance transmission by wireless sensors networks (WSN), in order to reduce the amount of required energy and consequently to extend the utilization time of the sensors. The basic idea of DB is that a set of nodes in wireless networks act as a virtual antenna array and then form a beam towards a certain direction to collaboratively transmit a signal. DB is proposed in [6] and it shows that by employing K collaborative nodes, the collaborative beam forming can result in up to K-fold gain in the received power at a distance access point. A cross-layer approach to DB for wireless adhoc networks is discussed in [7] with more complicated models and two time phases of communication steps. The improved beam pattern and connectivity properties are shown in [8], and a reasonable beam forming performance affected by a node synchronization error is discussed in [9]. DB has also been introduced in relay communication systems [1014]. In [1013], several DB techniques for relay networks with flat fading channels have been developed, while in [14] frequency selective fading has been considered. DB requires accurate synchronization; in other words, the nodes must start transmitting at the same time, synchronize their carrier frequencies, and control their carrier phases so that their signals can be combined constructively at the destination. Several synchronization techniques for CB can be found in [15, 16], and a review is given in [17].

As discussed in [4, 5], the CR base station (BS) needs to be equipped with array antenna (AA) so that it can form and direct main beams to its own users while steering nulls towards the directions of LU via adaptive beam forming techniques. In this study, instead of requesting CR BS to be deployed together with antenna arrays, we consider decentralized CR networks, which is formed by distributed CR users in a certain area. Those CR users are therefore regarded as CR nodes. Meanwhile DB is suggested to be employed by the CR network to form beams towards distant CR (DCR) users so that the CR network is able to forward the signals to DCR users cooperatively. Thus, the whole network decreases the energy consumption effectively, and also increases the communication range.

However, the CR network distinguishes itself from WSN in that it is designed to achieve two goals under one restricted condition, i.e., the received power at DCR users should be maximized, while that at LU be minimized. The restriction limits that CR nodes are only aware of its own location, as well as the directions of DCR users and LU. The constraint supports DB for a CR network functional even without cluster nodes. If cluster nodes are selected, each CR node is able to have the information of locations of all CR nodes during the process of information exchanging and sharing. Then, the DB problem can be described as designing adaptive beam formers with an irregular AA structure. In this article, we consider no CR cluster nodes, which is the basic and simplest network application. For DB, the aim of a CR network can directly be translated into generating main beams towards DCR users while displaying nulls towards LU. In addition, the weights calculation can be performed by each node, and for each node it should be independent from the prior knowledge of other nodes due to the restriction introduced above. This article also suggests generating a certain angular range of nulls instead of point nulls towards LU. The reason is due to the study of the probability density function (pdf) of the angle of arrival (AOA) of the scattered wave at the mobile station in wireless communications [1820], which will be explained later in this article.

Recently, DB for a CR network has also been discussed in [2123]. In [21], the effect of noise in phase synchronization on the resultant beam pattern has been analysed. A DB scheme based on zero-forcing beam forming has been presented in [22], where the idea that a CR network can be regarded as a relay network to forward the signal to the destination CR node is adopted. It is worth noticing that in [23], the authors have also addressed the above problem of directing main beam to a required direction while putting nulls to unwanted directions. This fits well the idea of introducing DB to CR network. A novel null-steering DB method has been presented in [23] in a way that each node can calculate its own weight by itself without prior knowledge of others.

Despite that the DB weights derived in [23] achieve our goal of CR network successfully, further improvements of DB in application to green CR networks are appreciated. In this article, we present a phase-only DB (PODB) method by only controlling the phase of the transmitted signal of each node. With the proposed PODB method, the lifetime of the whole CR network is prolonged, which will be proved in this article.

The PODB method is able to direct main beams towards DCR users while nulls are formed towards directions of LU. It can be implemented independently by each node based on very limited knowledge, including directions of DCR users and LU, and its own location. The weight of the PODB method can be regarded as nothing more than a phase perturbation of each node, which has the same amplitude as that of others. By adding certain virtual directions, the proposed PODB method can also generate broadened nulls in a defined range around directions of LU. The average beam pattern is also derived to show what the beam pattern with an arbitrary number of collaborative nodes will converge to. The average gains at both directions of LU and DCR users are calculated approximately. What is more, the cumulative distributed function (CDF) of the beam pattern is derived; it demonstrates the possibility that the transmitted power of the whole CR network at every direction can be lower than a certain threshold. The lifetime of a wireless network with both null-steering DB which has been presented in [23] and the PODB method is discussed and compared, in order to show the "green" aspect of the latter method.

The rest of the article is organized as follows. First in Section 2, the model of the CR network will be presented, as well as several necessary assumptions. Then the PODB method is proposed with and without broadened nulls. The average beam pattern of the PODB method, and its gains at certain directions are discussed in Section 3, as well as the derived CDF of the beam pattern generated by the PODB method. Several simulation results are shown in Section 4. The greenness of the PODB method is illustrated in Section 5 by comparing the lifetime of the wireless networks adopting null-steering DB and the PODB method. Finally, Section 6 concludes the article.

Notations: ||a||, ||a||2 denote the infinitive norm and Euclidean norm of vector a. (·)T, (·)* and (·)Hdenote the transpose, the conjugate, and the Hermitian transpose, respectively. (A) m, n represents the element of the m th row and n th column of matrix A, and (a) k represents the k th element of vector a. E[·] stands for the statistical expectation, and P 1 denotes converge with probability one. J n (·) is the n th-order Bessel function of the first kind, and I0(·) is the zeroth-order-modified Bessel function. Re[·] and Im[·] represent the real and imaginary parts of a variable, respectively.

2. Problem formulations and the proposed PODB method

2.1. Geometrical structure of CR networks

The geometrical structure of the CR network and also distant receiver terminals including LU and DCR users are illustrated in Figure 1. As shown in Figure 1, K CR nodes are uniformly distributed on a disc centred at O with radius R. Let us denote their polar coordinates of the k th CR node as (r k , Ψ k ). L DCR users are considered as access points, which locate in the same plane at ( A i DCR , ϕ i DCR ) ,i=1,2,...,L. Meanwhile, M LU are also coexisting with DCR users. Their locations are (A i , ϕ i ), i = 1,2,...,M. The CR nodes in the CR network are requested to form a virtual antenna array and collaboratively transmit a common message S(t).

Figure 1
figure 1

CR network with DCR users and LU.

2.2. Necessary assumptions

Without generality, we also adopt the following assumptions:

  1. (1)

    The number of CR nodes are larger than that of DCR users together with LU, i.e. K > L+M. This is basically required to solve the later matrix equations. In addition, many adaptive beam forming techniques also request that the number of AAs is larger than that of constrained directions where main beams and nulls are dedicatedly directed towards.

  2. (2)

    All DCR users and LU are located in the far-field of CR network, such that

    A i D C R R , i = 1 , 2 , . . . , L A i R , i = 1 , 2 , . . . , M
  3. (3)

    The bandwidth of S(t) is narrow, so that it guarantees that S(t) is almost constant during 2R/c second where c is the speed of light. It has been discussed in [24] that OFDM scheme is a proper and recommended candidate for CR due to its flexible adaptation of the spectrum. Since OFDM signal can be regarded as a combination of narrow-band modulated signals, the proposed method in this article can also be implemented in a wide band CR OFDM system.

The spatial effect of signal scattering and reflection at LU are taken into account. As a result, the angular spread at LU is suggested to be eliminated by displaying spread nulls around each direction of LU rather than point nulls. However, other channel effects, such as multipath fading and shadowing, are ignored in this article.

For simplicity, the proposed PODB is explained and presented when L = 1. In case L > 1, we show in [25] how to generate more than one main beam towards DCR users. We simplify ( A 1 DCR , ϕ 1 DCR ) by (A0, ϕ0) when there is only one DCR user.

2.3. System model of CR network

Let x k (t) denote the transmitted signal from k th node,

x k ( t ) = S ( t ) e j 2 π f t w k
(1)

where w k is the weight adopted by the k th node. The received signal at an arbitrary point (A, ϕ) in the far-field due to the k th node transmission is [23],

r k ( t ) = β k x k t - d k c = β k S t - d k c e j 2 π f t e - j 2 π λ d k w k
(2)

where d k is the distance between the k th node and the access point (A, ϕ), and β k = ( d k ) - γ 2 is the signal path loss with γ donating the path loss exponent. In [23], β k and d k are approximated by

d k = A 2 + r k 2 - 2 A r k cos ( ϕ - Ψ k ) A - r k cos ( ϕ - Ψ k )
(3)
β k = ( d k ) - γ 2 ( A - r k cos ( ϕ - Ψ k ) ) - γ 2 β 1 + γ r k cos ( ϕ - Ψ k ) 2 A
(4)

where β= A - γ 2 . The two approximations above are due to assumption 2. It also ensures γ r k cos ( ϕ - Ψ k ) 2 A 1, and then β k β.

Substituting Equations (3) and (4) into Equation (2) it follows that [23],

r k ( t ) β e - j 2 π λ A S t - A c e j 2 π f t e j 2 π λ r k cos ( ϕ - Ψ k ) w k
(5)

If we adopt the initial phase of each node as φ k =- 2 π λ r k cos ( ϕ 0 - Ψ k ) [6], the received signal at (A, ϕ) is

r k ( t ) β e - j 2 π λ A S t - A c e j 2 π f t e j 2 π λ r k [ cos ( ϕ - Ψ k ) - cos ( ϕ 0 - Ψ k ) ] w k
(6)

We define

F ( ϕ ) k = 1 K e j 2 π λ r k [ cos ( ϕ - Ψ k ) - cos ( ϕ 0 - Ψ k ) ] w k = k = 1 K e - j 4 π λ r k sin ( ϕ - ϕ 0 2 ) sin ( ϕ + ϕ 0 - 2 Ψ k 2 ) w k
(7)

The power received at (A, ϕ) is denoted by p(ϕ). If S(t) has normalized power, p(ϕ) is shown as

p ( ϕ ) = k = 1 K r k ( t ) 2 = β 2 F ( ϕ ) 2
(8)

The goal of our proposed PODB method is to find w, where w = (w1, w2, ..., w K )T, which satisfies

max w F ( ϕ 0 ) F ( ϕ m ) = 0 , m = 1 , 2 , . . . , M subject to w k = 1 , k = 1 , 2 , . . . , K
(9)

Based on Equation (7), it is easy to verify that d F ( ϕ ) d ϕ =0. Therefore, max w F ( ϕ 0 ) is always satisfying.

The constraint in (9) shows that each w k is no more than a phase adjustment. In other words, we only control the phase modification of each node.

A different optimization problem is discussed in [23], which has been proposed based on null-steering beamformers. It has the constraint of the total power of w, i.e. wHwP T , instead of |w i | = 1, i = 1,2,...,K.

2.4. The proposed PODB method

We propose the solution of Equation (9) in this section. First we assume W = 0, where W is the width of the spread nulls towards each LU, which requires only a point null at each LU direction, and then we give further results of how to generate spread nulls by modifying the angles.

Equation (9) also appeared in the application of adaptive array techniques to solve the problems of array pattern nulling, which was studied in [26]. The proposed solution in [26] linearized the nonlinear problem by considering small position perturbation of each antenna element, and then derived analytic results. It was also proved in [26] that good nulling performance could be achieved, even though the solutions were based on approximations. Unfortunately, the results shown in [26] could be only adopted by uniformly linear arrays (ULA).

In the case of CR network, the structure and the motivation of the beam forming problem are very different from that in [26]. As mentioned before, our goal is to find a set of weights (w1, w2, ..., w K ), which can be implemented by each node under the constraint that only the information of (r k , Ψ k ), the directions of DCR (ϕ0) and LU (ϕ i , i = 1,2,..., M) are available.

We assume that w k has the form of

w k = e j μ k
(10)

Then, we perform a Taylor expansion in Equation (7) and retain the first two terms. We obtain

F ( ϕ ) = k = 1 K e - j 4 π λ r k sin ϕ + ϕ 0 - Ψ k 2 sin ϕ - ϕ 0 2 + j μ k k = 1 K e - j 4 π λ r k sin ϕ + ϕ 0 - Ψ k 2 sin ϕ - ϕ 0 2 + j k = 1 K μ k e - j 4 π λ r k sin ϕ + ϕ 0 - Ψ k 2 sin ϕ - ϕ 0 2 F 0 ( ϕ ) + F C ( ϕ )
(11)

F C (ϕ) represents the second item of (11) and is a cancellation pattern which can be used to achieve M nulls.

Let we define the following variables

μ ( μ 1 , μ 2 , μ K ) T
u e - j 4 π λ r 1 sin ϕ + ϕ 0 - Ψ 1 2 sin ( ϕ - ϕ 0 2 ) e - j 4 π λ r K sin ϕ + ϕ 0 - Ψ K 2 sin ( ϕ - ϕ 0 2 ) T = x + j y

where μ K × 1, x = Re[u], and y = Im[u].

α , 0 4π R λ sin ϕ - ϕ 0 2
α m , n 4π R λ sin ϕ m - ϕ n 2
α , m 4π R λ sin ϕ - ϕ m 2
e= ( 1 , 1 , . . . , 1 ) T

where e is a K × 1 vector with one as its entities.

Thus, Equation (11) can be simplified as

F ( ϕ ) = e H u +j μ H u
(12)

According to Equation (9), when W = 0, in order to steer nulls at direction of ϕ m , = 1,2,..., M, we require

F ( ϕ m ) = 0 , m = 1 , 2 , . . . , M
(13)

Due to assumption 1, Equation (13) has a solution and can be solved as the following. Using the results in [6],

lim k 1 K e H u m = E e - j 4 π R λ sin ϕ m - ϕ 0 2 r k R sin ϕ m + ϕ 0 - 2 Ψ k 2 = 2 J 1 ( α m , 0 ) α m , 0
(14)

Equation (13) can be further written as

μ H x m = 0 K 2 J 1 ( α m , 0 ) α m , 0 = μ H y m ,m=1,2,...,M
(15)

If we define

X ( x 1 , x 2 , . . . , x M )
Y ( y 1 , y 2 , . . . , y M )
Δ ( X Y )
Γ= Δ H Δ
c ( c 1 , c 2 , . . . , c M )

where c m = 2 J 1 ( α m , 0 ) α m , 0 .

The solution of Equation (15) is

μ H = K ( 0 c ) Γ - 1 Δ H
(16)

where (0) is a vector with length M and 0 as its entries.

To make the calculation of μ be able to be implemented by each node in a distribution fashion, we need to calculate Γ differently, which has a good approximation of original counterparts, and the entries of it depends only on the information that each node is entitled to have (r k k ), ϕ0, ϕ m , m = 1,2,...,M.

Theorem 1: Give a matrix U, which is defined as

U (u1, u2, ..., u M ) = X+j Y, we have the following results:

lim k 1 K ( U H U ) m , n P 1 E u m H u n K =E u m * k u n k = 1 , m = n = 1 , 2 , . . . , M 2 J 1 ( α m , n ) α m , n , m n ; m , n = 1 , 2 , . . . , M
(17)
lim k 1 K ( U H U * ) m , n P 1 E u m H u n * K =E u m * k u n * k = J 1 ( 2 α m , 0 ) α m , 0 , m = n = 1 , 2 , . . . , M 2 J 1 ( α ̃ m , n ) α ̃ m , n , m n ; m , n = 1 , 2 , . . . , M
(18)

where α ̃ m , n =4π R λ 1 + cos 2 ϕ m - ϕ n 2 - cos ( ϕ 0 - ϕ n ) - cos ( ϕ 0 - ϕ m ) .

Proof: See Appendix 1

Theorem 2: The entries of Γ have the following results:

lim k 1 K Γ P 1 E Γ K = ( Γ 1 ) M × M 0 0 ( Γ 2 ) M × M
(19)
( Γ 1 ) m , n = J 1 ( 2 α m , 0 ) 2 α m , 0 + 1 2 , m = n = 1 , 2 , . . . , M J 1 ( α ̃ m , n ) α ̃ m , n + J 1 ( α m , n ) α m , n , m n ; m , n = 1 , 2 , . . . , M
(20)
( Γ 2 ) m , n = 1 2 - J 1 ( 2 α m , 0 ) 2 α m , 0 , m = n = 1 , 2 , . . . , M J 1 ( α m , n ) α m , n - J 1 ( α ̃ m , n ) α ̃ m , n , m n ; m , n = 1 , 2 , . . . , M
(21)

Proof: See Appendix 2

Based on Theorem 2, we can replace Γ by E[Γ], and then calculate (E[Γ])-1 by

E Γ - 1 = 1 K Γ 1 - 1 0 0 Γ 2 - 1
(22)

If we define

c Γ 2 - 1 ( q 1 , q 2 , . . . , q M )

Then by combining (16) and (22), we have

μ H = c Γ 2 - 1 Y H
(23)

The weight of the k th CR node is represented by

w k = e j μ k = e j ( μ ) k = e m = 1 M j q m ( y m ) k
(24)

So far we have derived the weight of the PODB method, which shows that the computation of w k for each node only depends on c, Γ2, and (y m ) k . The first two can be regarded as constant vectors and a constant matrix, as shown in their definitions and Theorem 2. While in order to calculate (y m ) k , each node only requires the prior knowledge of its own location (r k , Ψ k ), and directions of all LU ϕ m , m = 1,2,...,M. It is worth noticing that the information of the direction of DCR user ϕ0 is also needed for deciding the initial phase of each node φ k in Equation (6).

2.5. PODB method with spread nulls

The principle of the necessity of generating spread nulls has been explained in [25]. In wireless communication systems, the received signal and power spectra at the mobile station at wireless communication depend on the pdf of the AOA of the scattered wave. Clarke considered a uniform AOA pdf over [-π, π) [18]. However, it has been argued and experimentally demonstrated that the scattering encountered in many environments results into a non-uniform pdf of AOA [19]. Reference [20] suggests the two-parameter Von Mises pdf as a flexible and generalized model for the pdf of AOA, which includes non-isotropic scattering cases, and also the isotropic one as a special case. The pdf is given as [20]

p Θ ( θ ) = exp ( l cos ( θ - θ p ) ) 2 π I 0 ( l ) ,θ - π , π
(25)

where θ p accounts for the main direction of the AOA scatter components. Parameter l ≥ 0 controls the width of the AOA of scatter components. Figure 2 shows the pΘ(θ) with different l for θ p = 0. Based on Von Mises model, point nulls which can be generated by CR networks are not sufficient enough for energy depression at directions of LU, because the power around the nulling direction may also leak into LU due to spatial scattering. As a result, instead of generating point nulls, CR network is required to display spread nulls around each direction of the LU.

Figure 2
figure 2

Von Mises pdf for the AOA of scatter components at mobile station.

Null broadening (NB) technique was originally developed as a robust array beam forming technique. It was also regarded as a beam pattern synthesis method. Mailloux [27] presented a NB method by simple modification of the covariance matrix of the received signal. While in [28], a similar NB algorithm was also presented by applying a transform to the same covariance matrix. Both methods were capable of providing notch at locations of interferences signals. In [29], two NB algorithms as covariance matrix taper methods are defined, and considered as effective robust adaptive beam forming techniques, imparting robustness into adaptive pattern by judicious choice of null placement and width. As for wireless communication, NB was employed in a cellular communication system, particularly an example was given in space division multiple access system for downlink beam forming [30].

The above proposed NB methods are all based on ULA. They all require the prior knowledge of the distance between every two AA elements. In our case, this requested information can be translated into the distance between every two CR nodes in CR networks. Consequently, this does not align with our constraint that each node is only aware of its own location.

However, one simple way of generating spread nulls is to add N virtual LU sources ϕ i , i = 1,2,..., N around each direction of existing LU with the angle range of W/2, e.g. |ϕ i -ϕ m | ≤ W/2, m = 1,2,...,M. The number of those virtual directions N can be chosen with a compromising between computation load and the depth of spread nulls. If N is large enough, all the angles around directions of the LU are continuously all regarded as nulling points, thus the spread nulls in the beam pattern are maintaining the same depth with that of the nulling point ϕ m . However, with large N, the size of matrix Γ2 in Theorem 2 increases to (MN) × (MN), and consequently each node must have larger computation burden.

3. Properties of the beam pattern generated by the PODB method

In this section, we discuss the properties of the beam pattern that generated by the presented PODB method. The analysed properties include the average beam pattern for an arbitrary number of CR nodes K, the average gains at the directions of DCR user ϕ0, and at those of all the LU ϕ m , m = 1,2,...,M. Meanwhile the CDF of the beam pattern with larger K is also derived.

3.1. Average beam pattern

The result of average beam pattern is given by Theorem 3.

Theorem 3: Using the presented PODB method, the average beam pattern, which is defined as

P ̃ ( ϕ ) E [ P ( ϕ ) ] =E 1 K F ( ϕ ) 2

when ϕϕ0, can be approximated by

P ̃ ( ϕ ) P ̃ a ( ϕ ) = 1 K + K - 1 K 2 J 1 ( α , 0 ) α , 0 2 + J 1 ( α , 0 ) α , 0 m = 1 M q m ς , m
(26)

where ς , m = J 1 ( 2 α m , 0 ) α m , 0 - 1 , ϕ = ϕ m , m = 1 , 2 , . . . , M 2 J 1 ( α ̃ , m ) α ̃ , m - 2 J 1 ( α , m ) α , m , ϕ ϕ m , m = 1 , 2 , . . . , M

and the approximation error ε=E P ̃ ( ϕ ) - P ̃ a ( ϕ ) is bounded by ε K - 1 K c Γ 2 - 1 c H .

Proof: See Appendix 3

3.2. Average gain at direction of DCR

The average gain at ϕ0 is approximated by 1, i.e.

P ̃ ( ϕ 0 ) 1
(27)

Proof: See Appendix 4

3.3. Average gains at directions of LU

The average gain at ϕ m , m = 1,2,...,M is

P ̃ ( ϕ m ) 1 K ,m=1,2,...,M
(28)

Proof: See Appendix 5

For CR network, it is very important to limit the transmission power at directions of LU. From Equation (27) and (28), we can see that towards LU directions, the average transmission power are K - 1 times lower than that towards the direction of DCR user.

When there is no LU available, i.e. M = 0. Equation (23) gives the result of μ k = 0. Consequently,

P ̃ ( ϕ ) | M = 0 = 1 K 2 E k = 1 K e j 4 π R λ sin ϕ - ϕ 0 2 r k sin ϕ + ϕ 0 - Ψ k 2 2 = 1 K + K - 1 K 2 J 1 ( α , 0 ) α , 0 2
(29)

This is consistent with the average beam pattern of the DB method presented in [6], which has no specific nulling points.

3.4. CDF of the beam pattern generated by PODB method

The CDF of the beam pattern generated by PODB method with large number of K is given by Theorem 4.

Theorem 4: When K is large enough, the CDF of the beam pattern at different ϕ can be approximated by

Prob { P ( ϕ ) | P ( ϕ ) P 0 } F ρ + P 0 - sgn ρ - P 0 + 1 2 F ρ - P 0
(30)

where F ( γ 0 ) =Prob ( γ | γ γ 0 ) =1-exp - γ 0 2 K / ( 1 + c Γ 2 - 1 c H - ρ 2 ) for γ ≥ 0 is the CDF of the Rayleigh distribution, sgn(x) = |x|/x and ρ= 2 J 1 ( α , 0 ) α , 0 + m = 1 M q m 2 ς , m .

Proof: See Appendix 6.

We can write when ϕ = ϕ m , m = 1,2,..., M

Prob { P ( ϕ m ) | P ( ϕ m ) P 0 } F ( P 0 ) =1-exp - P 0 K / ( 1 + c Γ 2 - 1 c H )
(31)

Proof: See Appendix 7.

From the above equation, we can conclude that when ϕ = ϕ m , m = 1,2,..., M, the probability of the total transmitted power of CR network lower than P0 can be expressed by a constant, which is decided by P0, K and c Γ 2 - 1 c H . Based on Equation (21) and the definition of c, c Γ 2 - 1 c H can be only determined by ϕ0, ϕ m , m = 1,2,...,M and R/λ. Usually P0 is defined by LU due to its spectrum interference tolerance threshold. Consequently, if we want to increase the probability of the case that CR network transmitting less power than P0 towards directions of the LU, we need to increase K. In other words, more CR nodes need to be added to the same CR network (maintaining the same network structure R/λ) to collaboratively perform PODB.

4. Simulations and results

The average beam pattern of DB methods are shown in Figure 3. They are DB method without considering nulling directions, which has been presented in [6], the proposed PODB method, and null-steering DB method in [23]. In the simulation, we choose R/λ = 2, K = 100 and ϕ0 = 0°. Meanwhile, two LU are considered, which locate at the directions of ϕ1 = 30°, ϕ2 = -15°. Figure 3 shows that PODB and null-steering DB methods successfully depress transmission power towards the directions of LU. Their performances are similar to each other. The DB method without nulling has a symmetrical average beam pattern without particular nulling points. As mentioned in Equations (27) and (28), the average gain at ϕ0 = 0° approximates to 1, while those at ϕ1 = 30°, ϕ2 = -15° are close to 10 log(1/K) = -20 dB.

Figure 3
figure 3

Average Beampatterns of three DB methods.

Figure 4 shows the average beam pattern with only one LU, which has the direction of ϕ = 30°. The other simulation conditions remain the same with Figure 3. In Figure 4, we also consider the average beam pattern of PODB method with broadened nulls, which assumes two virtual LU directions around ϕ = 30°, which are located at ϕ1 = 20°, ϕ2 = 40°. It can be seen from Figure 4 that PODB method with NB generates spread nulls around ϕ = 30° with the width of W = 20° and depth about -20 dB.

Figure 4
figure 4

Average Beampatterns of PODB methods.

Figure 5 shows the CDF of the beam pattern at different angle ϕ, which has been discussed in Theorem 4. As required in Theorem 4, the number of nodes in CR network needs to be large, so that the sum of random variables can be regarded as Gaussian distribution random variables. Therefore, we consider two cases with K = 100, and K = 500. Meanwhile, only one LU is considered, i.e. ϕ = 5°. The DCR user is at the direction of ϕ0 = 0°. P0 in Theorem 4 is chosen as P0 = 0.01. It can be seen from Figure 5 that, in the angle range of 5° ≤ ϕ ≤ 7°, considering the probability that the transmitted power of CR network lower than P0, PODB method has much higher chance than the DB method without nulling. Meanwhile, as discussed in Section 3.4, Prob{P(ϕ m )|P(ϕ m ) ≤ P0} is a constant which depends on ϕ1, ϕ0 and K. When more nodes participate in CR network to perform DB (K is increasing), Prob{P(ϕ m )|P(ϕ m ) ≤ P0} is also increasing, which is also demonstrated in Figure 5.

Figure 5
figure 5

Probability of with different K.

5. Greenness of the PODB method

The battery consumptions of the network adopting the proposed PODB method and null-steering DB method presented in [23] are illustrated in Figures 6 and 7. Figure 6 shows that to perform PODB, each node of CR network consumes the same amount of battery power at the same time. The power consumption of the whole network is "balanced", because of the constraint in Equation (9), i.e. |w k | = 1. While null-steering DB method utilizes the battery power of each node "unevenly", as shown in Figure 7. When the battery of one node is dying, the others nodes are still power supplied.

Figure 6
figure 6

Power consumption of CR network with PODB method.

Figure 7
figure 7

Power consumption of CR network with null-steering DB method.

For null-steering method, we introduce a new concept of "DB cycle". It describes the process from the moment that all nodes in the network start participating DB till the moment that one node in the network first runs out of its battery. Then, the rest of the nodes of the network will start computing the new weights of DB method with one less number of the nodes, and thus another round of DB cycle begins.

The number of CR nodes K in a DB cycle is requested to satisfy kK0, 1 ≤ K0K, where K0 is the least number of CR nodes required by CR network to perform DB, due to the restriction of the transmission power towards directions of LU

P ̃ ( ϕ m ) = 1 k 1 K 0 ,m=1,2,...,M
(32)

We denote the normalized the weights of the i th DB cycle of null-steering DB method as w NS ( i ) and it satisfies that w NS ( i ) H w NS ( i ) =1. Assume t NS ( i ) is the length of the time period of the i th DB cycle of the null-steering DB method

t NS ( i ) = p ( i ) max k w NS ( i ) k 2 = p ( i ) w NS ( i ) 2
(33)

where p(i)is the battery power consumption of the CR node, which finishes its battery first in the i th DB cycle. Then, the total lifetime of CR network by adopting null-steering method can be written as

t NS = i = 1 K - K 0 + 1 p ( i ) w N S ( i ) 2
(34)

The total energy consumption is

E N S = i = 1 K - K 0 + 1 p ( i ) w NS ( i ) 2 w NS ( i ) 2 2 = i = 1 K - K 0 + 1 p ( i ) w NS ( i ) 2
(35)

The total amount of energy of the whole network is fixed, due to the fact that all nodes will consume all of their batteries power in the end. Let us denote the total energy of the CR network as E.

E = i = 1 K p ( i ) w NS ( i ) 2 w NS ( i ) 2 2 = i = 1 K p ( i ) w NS ( i ) 2
(36)

It is easy to verify that

E NS E
(37)

Only when K0 = 1,

E NS =E
(38)

However, the concept of DB cycle is not necessary for PODB, because all the nodes will be finishing their batteries at the same time. We define the normalized weights of the PODB method as wpo, and it satisfies w PO H w PO = 1 . Then, the lasting time of the network with the PODB method using the same amount of energy E is

t PO = E K 1 max k ( w PO ) k 2 = E K w PO 2 = E K K=E
(39)

Using the results of Equations (34), (35), (37) and (39), we can write that

t NS t PO
(40)

Thus, it has been proved that the life time of the network adopting PODB method is longer than that adopting null-steering method. Only when K0 = 1, the network has the same lifetime by employing both two DB methods.

6. Conclusions

A new DB method, which is called PODB method, has been proposed in this article in the application of a green CR network. It is implemented in a way that CR nodes transmit signals constructively towards directions of DCR users and destructively to the LU. Considering the average beam pattern of the PODB method, it achieves the highest gain at the direction of DCR users and the lowest to the LU. The PODB method can be computed at each node in a so called distributed way, i.e., each node is only aware of its own location, and the directions of LU and DCR users. The PODB is different from the null-steering-based DB method meaning that the weights of the former can be regarded as a phase perturbation of each node. Consequently, it utilizes energy of the whole network evenly and effectively, a characteristic which renders itself to green concept.

In a CR network, it is extremely important to calculate the probability of the case that the power transmitted by the CR network towards directions of LU is lower than a certain threshold. Therefore, the CDF of the beam pattern of the PODB method has been derived in this article assuming a large number of CR nodes. Comparing with the DB method without particular nulling directions, the PODB method achieves much higher chances of transmitting less power towards directions of LU. To increase the chances that the disturbances to LU, which are caused by the CR network are less than the interference power threshold that the LU can tolerate, the presented CDF suggests that more CR nodes should participate in the CR network to perform DB.

Appendix 1

Proof of Theorem 1

It has been discussed in [23] that

1 K u m H u n = 1 K k = 1 K e - j α m , n z k P 1 E [ e - j α m , n z k ] = 1 , m = n 2 J 1 ( α m , n ) α m , n , m n
(41)

where z k r k R sin ϕ m + ϕ n - 2 Ψ k 2 , and the pdf of z k has been presented in [6],

f z ( z k ) = 2 π 1 - z k 2 , z k 1
(42)
1 K u m H u n * = 1 K k = 1 K e - j 2 π λ r k [ cos ( ϕ n - Ψ k ) + cos ( ϕ m - Ψ k ) - 2 cos ( ϕ 0 - Ψ k ) ]
(43)

The above exponential item can be further simplified by the following

cos ( ϕ n - Ψ k ) + cos ( ϕ m - Ψ k ) - 2 cos ( ϕ 0 - Ψ k ) = 2 cos ϕ n + ϕ m - 2 Ψ k 2 cos ϕ n - ϕ m 2 - 2 cos ϕ n + ϕ m - 2 Ψ k 2 + ϕ 0 - ϕ n + ϕ m 2 = 2 a 1 cos ϕ n + ϕ m - 2 Ψ k 2 + 2 a 2 sin ϕ n + ϕ m - 2 Ψ k 2
(44)

where

a 1 = cos ϕ n - ϕ m 2 - cos ϕ 0 - ϕ n + ϕ m 2 a 2 = sin ϕ 0 - ϕ n + ϕ m 2

We define

a a 1 2 + a 2 2 = 1 + cos 2 ϕ m - ϕ n 2 - cos ( ϕ 0 - ϕ n ) - cos ( ϕ 0 - ϕ m ) θ tan - 1 a 1 a 2

Equation (43) can be written as

1 K u m H u n * = 1 K k = 1 K e - j 4 π R λ a r k R sin ( θ + ϕ n + ϕ m - 2 Ψ k 2 ) = 1 K k = 1 K e - j 4 π R λ a z ̃ k P 1 E e - j 4 π R λ a z ̃ k
(45)

where

z ̃ k = r k R sin θ + ϕ n + ϕ m - 2 Ψ k 2 = r k R sin θ + ϕ n + ϕ m 2 - Ψ k
(46)

z ̃ k has the same distribution with z k , because the pdf of z k in (42) has nothing to do with ϕ m , ϕ n . Therefore, using the same method, (45) can be further written as

1 K u m H u n * P 1 E e - j 4 π R λ a z ̃ k = 2 J 1 ( α ̃ m , n ) α ̃ m , n
(47)

where

α ̃ m , n =4π R λ a=4π R λ 1 + cos 2 ϕ m - ϕ n 2 - cos ( ϕ 0 - ϕ n ) - cos ( ϕ 0 - ϕ m )
(48)

Especially, when m = n,

E e - j 4 π R λ a z ̃ k | m = n = E [ e - j 2 α m , 0 z k ] = J 1 ( 2 α m , 0 ) α m , 0
(49)

Equations (41), (47) and (49) show the results of Theorem 1.

Appendix 2

Proof of Theorem 2

Based on the definition of Γ,

Γ= X H X X H Y Y H X Y H Y
(50)

and

Γ 1 = 1 K E [ X H X ]
(51)
Γ 2 = 1 K E [ Y H Y ]
(52)

Using the results in Theorem 1,

( Γ 1 ) m , n = E x m H x n K = E ( u m H + u m T ) ( u n + u n * ) 4 K = J 1 ( 2 α m , 0 ) 2 α m , 0 + 1 2 , m = n = 1 , 2 , . . . , M J 1 ( α ̃ m , n ) α ̃ m , n + J 1 ( α m , n ) α m , n , m n ; m , n = 1 , 2 , . . . , M
(53)
1 K E [ ( X H Y ) m , n ] = E x m H y n K = 1 K E ( u m H + u m T ) ( u n - u n * ) j 4 K = 0
(54)
1 K E [ ( Y H X ) m , n ] = E x m H y n K H = 0
(55)
( Γ 2 ) m , n = E y m H y n K = E ( u m H + u m T ) ( u n + u n * ) 4 K = 1 2 - J 1 ( 2 α m , 0 ) 2 α m , 0 , m = n = 1 , 2 , . . . , M J 1 ( α m , n ) α m , n - J 1 ( α ̃ m , n ) α ̃ m , n , m n ; m , n = 1 , 2 , . . . , M
(56)

Equations (53), (54), (55) and (56) demonstrate the results of Theorem 2.

Appendix 3

Proof of Theorem 3

Based on Equations (7) and (10)

P ̃ ( ϕ ) = 1 K 2 E k = 1 K e - j α , 0 z k + j μ k 2 = 1 K 2 K + E k = 1 K l = 1 , l k K e - j α , 0 ( z k - z l ) + j ( μ k - μ l )
(57)

As mentioned before, μ k is a small perturbation of the phase of each node. We here adopt the approximation of ex by ex ≈ 1+x , and it holds the following result [31],

E e j x - ( 1 + j x ) E j x 2 2 = E x 2 2
(58)

Then we have

e j ( μ k - μ l ) 1+j ( μ k - μ l )
(59)

Equation (57) can be approximated by

P ̃ ( ϕ ) P ̃ a ( ϕ ) = 1 K 2 K + k = 1 K l = 1 , l k K E e - j α , 0 z k e j α , 0 z l ( 1 + j μ k - j μ l )
(60)

We define a new random variable

ξ k e - j α , 0 z k μ k
(61)

Based on the pdf of z k , we have the following results [6]

E [ ( u ) k ] = E e - j α , 0 z k = E ( u * ) k = 1 , ϕ = ϕ 0 2 J 1 ( α , 0 ) α , 0 , ϕ = ϕ 0
(62)

Using the result in Theorem 1, it is easy to calculate the expectations of the following variables,

E [ ( u ) k ( u m * ) k ] = 1 , ϕ = ϕ m , m = 1 , 2 , . . . , M 2 J 1 ( α , m ) α , m , ϕ = ϕ m , m = 1 , 2 , . . . , M
(63)
E [ ( u ) k ( u m ) k ] = J 1 ( 2 α m , 0 ) α m , 0 , ϕ = ϕ m , m = 1 , 2 , . . . , M 2 J 1 ( α ̃ , m ) α ̃ , m , ϕ = ϕ m , m = 1 , 2 , . . . , M
(64)

Consequently from Equations (63), (64) and (23), the expectation of ξ k can be calculated by

E [ ξ k ] =E e - j α , 0 z k μ k = m = 1 M q m E ( u ) k ( u m ) k - ( u ) k ( u m * ) k 2 j = m = 1 M q m 2 j ς , m
(65)

where

ς , m = J 1 ( 2 α m , 0 ) α m , 0 - 1 , ϕ = ϕ m , m = 1 , 2 , . . . , M 2 J 1 ( α ̃ , m ) α ̃ , m - 2 J 1 ( α , m ) α , m , ϕ ϕ m , m = 1 , 2 , . . . , M
(66)

From Equation (65), it is easy to verify that

E ξ k * =-E ξ k
(67)

Meanwhile, e j α , 0 z k and e j α , 0 z l , l k are identical independently distributed variables. ξ k and e j α , 0 z l , l k are independently distributed random variables. Thus, with the result in Equations (62) and (65), considering the general case that ϕϕ0, we can deduce the second item in Equation (60) further by

k = 1 K l = 1 , l k K E e - j α , 0 z k e j α , 0 z l ( 1 + j μ k - j μ l ) = ( K 2 - K ) 2 J 1 ( α , 0 ) α , 0 2 + j E [ ξ k ] 2 J 1 ( α , 0 ) α , 0 - j E [ ξ l * ] 2 J 1 ( α , 0 ) α , 0 = ( K 2 - K ) 2 J 1 ( α , 0 ) α , 0 2 + 2 J 1 ( α , 0 ) α , 0 m = 1 M q m ς , m
(68)

Substituting Equation (68) into Equation (60), we have final results

P ̃ ( ϕ ) P ̃ a ( ϕ ) = 1 K + K - 1 K 2 J 1 ( α , 0 ) α , 0 2 + J 1 ( α , 0 ) α , 0 m = 1 M q m ς , m
(69)

The error of the approximation in (61) can be bounded using the result of (58) by

E e j ( μ k - μ l ) - 1 - j μ k + j μ l 1 2 E μ k - μ l 2 =E μ k 2 - E μ k 2
(70)
E [ ( y ) k ] =E ( u ) k - ( u ) k * 2 j =0
(71)

Based on Equation (23) and the results of Equation (62), we can deduce that

E [ μ k ] = c Γ 2 - 1 E [ ( y 1 ) k , ( y 2 ) k , . . . , ( y M ) k ] H = 0
(72)

In Theorem 2, it holds that

E [ ( y m * ) k ( y n ) k ] = ( Γ 2 ) m , n
(73)

Therefore,

E { [ ( y 1 ) k , ( y 2 ) k , . . . , ( y M ) k ] H [ ( y 1 ) k , ( y 2 ) k , . . . , ( y M ) k ] } = Γ 2
(74)
E [ μ k 2 ] = E c Γ 2 - 1 [ ( y 1 ) k , ( y 2 ) k , . . . , ( y M ) k ] H 2 = c Γ 2 - 1 c H
(75)

By substituting Equations (75), (72) into (70), we can write

E e j ( μ k - μ l ) - 1 - j μ k + j μ l c Γ 2 - 1 c H
(76)

The approximation error in the second item of Equation (60) can be written

E e - j α , 0 ( z k - z l ) ( e j ( μ k - μ l ) - 1 - j μ k + j μ l ) = E e j ( μ k - μ l ) - 1 - j μ k + j μ l c Γ 2 - 1 c H
(77)

Then the estimation error ε between P ̃ a ( ϕ ) and P ̃ ( ϕ ) can be written based on the result of Equation (77)

ε = E P ̃ ( ϕ ) - P ̃ a ( ϕ ) = K - 1 K E e - j α , 0 ( z k - z l ) ( e j ( μ k - μ l ) - 1 - j μ k + j μ l ) K - 1 K c Γ 2 - 1 c H
(78)

Appendix 4

Proof of Equation (27)

When ϕ = ϕ0 , the average beam pattern at ϕ0 can be written as:

P ̃ ( ϕ 0 ) = E 1 K F ( ϕ 0 ) 2 = 1 K 2 E k = 1 K e - j 4 π λ r k sin ( ϕ 0 + ϕ 0 - Ψ k 2 ) sin ( ϕ 0 - ϕ 0 2 ) + j μ k 2 = 1 K + 1 K 2 k = 1 K l = 1 , l k K E e j ( μ k - μ l )
(79)

Using the same approximation method in Equation (59)

P ̃ ( ϕ 0 ) 1 K + 1 K 2 k = 1 K l = 1 , l k K E 1 + j μ k - j μ l
(80)

Based on the result in Equation (72), we can further write

E [ 1 + j μ k - j μ l ] =1
(81)

Substituting Equation (81) into (80), we have the result of Equation (27)

P ̃ ( ϕ 0 ) 1 K + 1 K 2 ( K 2 - K ) = 1
(82)

Appendix 5

Proof of Equation (28)

Theorem 3 and the definition of Γ2 in Theorem 2 illustrate that, when ϕ = ϕ m , m = 1,2,...,M,

ς , n | ϕ = ϕ m =2 ( Γ 2 ) m , n ,m,n=1,2,...,M
(83)

Therefore,

ς m , 1 , ς m , 2 , . . . , ς m , M T = - 2 Γ 2 T v m = - 2 Γ 2 v m , m = 1 , 2 , . . . , M
(84)

where v m denotes a M × 1 vector with ones as the entities of the m th row.

Meanwhile based on the definition of (q1, q2, ..., q M ) we can write when ϕ = ϕ m , m = 1,2,...,M,

n = 1 M q n 2 ς , n | ϕ = ϕ m =- c Γ 2 - 1 Γ 2 v m =- c m =- 2 J 1 ( α m , 0 ) α m , 0
(85)

By substituting (85) into the average beam pattern in Theorem 3,

P ̃ ( ϕ m ) 1 K + K - 1 K 2 J 1 ( α m , 0 ) α m , 0 2 - 2 J 1 ( α m , 0 ) α m , 0 2 J 1 ( α m , 0 ) α m , 0 = 1 K
(86)

Which shows the result of Equation (28).

Appendix 6

Proof of Theorem 4

P ( ϕ ) = 1 K 2 k = 1 K e - j α , 0 z k + j μ k 2
(87)

We define a new random variable

χ k = 1 K 1 K e - j α , 0 z k + j μ k k = 1 K ( 1 + j μ k ) e - j α , 0 z k K = K = 1 K e - j α , 0 z k + j ξ k K
(88)

Definition of ξ k is shown in Appendix 3 Equation (61).

e - j α , 0 z k + j ξ k and e - j α , 0 z l + j ξ l , l k are identical independently distributed variables. Thus, if K is large enough, according to the Central Limit Theorem, χ has a Gaussian distribution, i.e. χ ~ N(ρ, σ2), where

ρ = E [ χ ] = E [ e - j α , 0 z k + j ξ k ]
(89)
σ 2 = D [ χ ] = 1 K D [ e - j α , 0 z k + j ξ k ]
(90)

Using the result discussed in Equations (62) and (65) in Appendix 3

ρ = E [ e - j α , 0 z k + j ξ k ] = 2 J ( α , 0 ) α , 0 + m = 1 M q m 2 ς , m
(91)

From Equation (75) in Appendix 3,

σ 2 = D [ e - j α , 0 z k + ξ k ] = E e - j α , 0 z k ( 1 + j μ k ) 2 - E e - j α , 0 z k + j ξ k 2 = 1 + c Γ 2 - 1 c H - ρ 2
(92)

Thus, by adopting the results shown in (91) and (92),

χ~N ( ρ , 1 + c Γ 2 - 1 c H - ρ 2 K )
(93)

From Equation (93), if we define a new random variable γ by γ |χ-ρ|, the distribution of γ is Rayleigh distribution, i.e. γ~ Rayleigh ( σ 0 2 ) , where σ 0 2 = σ 2 2 . We then are able to calculate the probability Prob{P(ϕ)|P(ϕ) ≤ P0}. We next discuss the outcome for the different cases.

If ρ > P 0 ,γ ρ - P 0 , ρ + P 0 ,

then

Prob P ( ϕ ) | P ( ϕ ) P 0 = F | ρ | + P 0 - F | ρ | + P 0
(94)

If ρ < P 0 ,γ 0 , ρ + P 0 ,

then

Prob P ( ϕ ) | P ( ϕ ) P 0 = F | ρ | + P 0
(95)

where

F ( γ 0 ) = Prob ( γ | γ γ 0 ) =1-exp - γ 0 2 2 σ 0 2 =1-exp [ - γ 0 2 K / ( 1 + c Γ 2 - 1 c H - ρ 2 ) ]
(96)

By combining (94) and (95), it is easy to verify Theorem 4.

Prob P ( ϕ ) | P ( ϕ ) P 0 = F | ρ | + P 0 - sgn ( | ρ | + P 0 ) + 1 2 F | ρ | + P 0 .

.

Appendix 7

Proof of Equation (31)

Using the result of Equation (59) in appendix E, we can write

ρ | ϕ = ϕ m = 2 J ( α m , 0 ) α m , 0 + n = 1 M q n 2 ς m , n =0
(97)

As a result,

Prob { P ( ϕ m ) | P ( ϕ m ) P 0 } = F ( P 0 ) = 1 - exp - P 0 K / ( 1 + c Γ 2 - 1 c H )
(98)

References

  1. Mitola J: Cognitive radio: making software radios more personal. IEEE Person Commun 1999, 6(4):13-18. 10.1109/98.788210

    Article  Google Scholar 

  2. Mitola J: Dissertation. Royal Inst. Technol. (KTH); 2000.

    Google Scholar 

  3. Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE J Sel Area Commun 2005, 23(2):201-210.

    Article  Google Scholar 

  4. Lian X, Nikookar H, Zhou J: Adaptive robust beamformers for cognitive radio. In Proc IEEE Wireless Technology (EuWiT). Amsterdam, The Netherlands; 103-106.

  5. Lian X, Nikookar H, Ligthart LP: Adaptive OFDM beamformer with constrained weights for cognitive radio. In Proc IEEE 69th Vehicular Technology Conference (VTC Spring). Bacelona, Spain; 2009:1-5. doi:10.1109/VETECS.2009.5073362

    Google Scholar 

  6. Ochiai H, Mitran P, Poor HV, Tarokh V: Collaborative beamforming for distributed wireless ad hoc sensor networks. IEEE Trans Signal Process 2005, 53(11):4110-4124.

    Article  MathSciNet  Google Scholar 

  7. Dong L, Petropulu AP, Poor HV: A cross-layer approach to collaborative beamforming for wireless ad hoc networks. IEEE Trans Signal Process 2008, 56(7):2981-2993.

    Article  MathSciNet  Google Scholar 

  8. Zarifi K, Affes S, Ghrayeb A: Distributed beamforming for wireless sensor networks with random node location. In Proc Int Conf Acoustics, Speech, and Signal Process (ICASSP'09). Taipei, Taiwan; 2009:2261-2264. doi:10.1109/ICASSP.2009.4960070

    Google Scholar 

  9. Mudumbai R, Barriac G, Madhow U: On the feasibility of distributed beamforming in wireless sensor networks. IEEE Trans Wirel Commun 2007, 6(5):1754-1763.

    Article  Google Scholar 

  10. Jing Y, Jafarkhani H: Network beamforming using relays with perfect channel information. In Proc Int Conf Acoustics, Speech, and Signal Process (ICASSP'07). Hawaii, USA; 2007:473-476. doi:10.1109/ICASSP.2007.366575

    Google Scholar 

  11. Zheng G, Wong KK, Paulraj A, Ottersten B: Collaborativerelay beamforming with perfect CSI: optimum and distributed implementations. IEEE Signal Process Lett 2009, 16(4):257-260.

    Article  Google Scholar 

  12. Havary-Nassab V, Shahbazpanahi S, Grami A, Luo ZQ: Distributed beamforming for relay networks based on second-order statistics of the channel state information. IEEE Trans Signal Process 2008, 56(9):4306-4316.

    Article  MathSciNet  Google Scholar 

  13. Fazeli-Dehkordy S, Shahbazpanahi S, Gazor S: Multiple peer-to-peer communications using a network of relays. IEEE Trans Signal Process 2009, 57(8):3053-3062.

    Article  MathSciNet  Google Scholar 

  14. Chen H, Gershman AB, Shahbazpanahi S: Filter-and-forward distributed beamforming in relay networks with frequency selective fading. IEEE Trans Signal Process 2010, 58(3):1251-1262.

    Article  MathSciNet  Google Scholar 

  15. Brown DR III, Poor HV: Time-slotted round-trip carrier synchronization for distributed beamforming. IEEE Trans Signal Process 2008, 56(11):5630-5643.

    Article  MathSciNet  Google Scholar 

  16. Bucklew JA, Sethares WA: Convergence of a class of decentralized beamforming algorithms. IEEE Trans Signal Process 2008, 56(6):2280-2288.

    Article  MathSciNet  Google Scholar 

  17. Mudumbai R, Brown DR, Madhow U, Poor HV: Distributed transmit beamforming: challenges and recent progress. IEEE Commun Mag 2009, 47(2):102-110.

    Article  Google Scholar 

  18. Stuber GL: Principles of Mobile Communication. Kluwer, Boston, MA; 1996.

    Book  Google Scholar 

  19. Sadowsky JS, Kafedziski V: On the correlation and scattering functions of the WSSUS channel for mobile communication. IEEE Trans Veh Technol 2008, 47(1):270-282.

    Article  Google Scholar 

  20. Abdi A, Barger JA, Kaveh M: A parametric model for the distribution of the angle of arrival and the associated correlation function and power spectrum at the mobile station. IEEE Trans Veh Technol 2002, 51(3):425-434. 10.1109/TVT.2002.1002493

    Article  Google Scholar 

  21. Deng Y, Buur AG, Pearce D, Grace D: Distributed beamforming for cognitive radio networks. In Proc Communications and Networking in China (CHINACOM'08). Hangzhou, China; 2008:1206-1210. doi:10.1109/CHINACOM.2008.4685243

    Google Scholar 

  22. Liu J, Chen W, Cao Z, Zhang Y: A distributed beamforming approach for enhanced opportunistic spectrum access in cognitive radios. In Proc Global Telecommunications Conference (Globecom). Hawaii, USA; 2009:1-6. doi:10.1109/GLOCOM.2009.5425809

    Google Scholar 

  23. Zarif K, Affes S, Ghrayeb A: Collaborative null-steering beamforming for uniformly distributed wireless sensors networks. IEEE Trans Signal Process 2010, 58(3):1889-1903.

    Article  MathSciNet  Google Scholar 

  24. Budiarjo I, Lakshmanan MK, Nikookar H: Cognitive radio dynamic access technique. Wirel Person Commun 2008, 45(3):293-324. 10.1007/s11277-008-9473-6

    Article  Google Scholar 

  25. Lian X, Nikookar H, Ligthart LP: Efficient radio transmission with adaptive and distributed beamforming for intelligent WiMAX. J Wirel Person Commun 2011, 53(3):405-431.

    Article  Google Scholar 

  26. Steyskal H: Simple method for pattern nulling by phase perturbation. IEEE Trans Antenna Propagat 1983, 31(1):163-166. 10.1109/TAP.1983.1142994

    Article  Google Scholar 

  27. Mailloux RJ: Covariance matrix augmentation to produce adaptive array pattern troughs. Electron Lett 1998, 31(10):771-772.

    Article  Google Scholar 

  28. Zatman M: Production of adaptive array troughs by dispersion synthesis. Electron Lett 1998, 31(25):2141-2142.

    Article  Google Scholar 

  29. Guerci JR: Theory and application of covariance matrix tapers for robust adaptive beamforming. IEEE Trans Signal Process 1999, 47(4):977-985. 10.1109/78.752596

    Article  Google Scholar 

  30. Riba J, Goldberg J, Vazquez G: Robust beamforming for interference rejection in mobile communications. IEEE Trans Signal Process 1997, 45(1):271-275. 10.1109/78.552229

    Article  Google Scholar 

  31. Billingsley P: Probability and Measure. John Wiley & Sons, New York, NY; 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaohua Lian.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Lian, X., Nikookar, H. & Ligthart, L.P. Distributed beam forming with phase-only control for green cognitive radio networks. J Wireless Com Network 2012, 65 (2012). https://doi.org/10.1186/1687-1499-2012-65

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-65

Keywords