- Research
- Open Access

# GLR test for OFDM system identification using pilot tones pattern

- Mohamed-Rabie Oularbi
^{1}Email author, - Saeed Gazor
^{2}, - Sebastien Houcke
^{1}and - Abdeldjalil Aïssa-El-Bey
^{1}

**2013**:72

https://doi.org/10.1186/1687-1499-2013-72

© Oularbi et al.; licensee Springer. 2013

**Received:**17 July 2012**Accepted:**7 February 2013**Published:**15 March 2013

## Abstract

In the context of cognitive network architecture, an opportunistic cognitive receiver must identify the present active networks. In this article, we propose an efficient algorithm for the identification of OFDM networks exploiting the pilot patterns used in these standards which are prescribed uniquely by their underlying standards. These pilots are inserted for the channel estimation and synchronization between the base stations and their users. The proposed generalized likelihood ratio test (GLRT) not only allows a cognitive observer to detect the active networks by analyzing the observed signals but also performs channel estimation, time-frequency synchronization as well as estimation of the noise variance. These informations are of a great interest for Quality of Service estimation in the purpose of an association with the base station. The proposed solution is applicable to the existing standards (e.g., LTE, WiMAX, WiFi), doesn’t require any signaling overhead to be embedded on the pilot tones, is computationally inexpensive and only requires to know the pilot patterns. An other GLRT is proposed as a pre-detector which ignores the pilot information and allows to reduce the computational cost of the system for the cases where a large number of patterns/systems are to be tested.

## Keywords

- Orthogonal Frequency Division Multiplex
- Orthogonal Frequency Division Multiplex System
- Cyclic Prefix
- Orthogonal Frequency Division Multiplex Symbol
- Pilot Symbol

## 1 Introduction

The rapid growth of wireless communications resulted in the proliferation of wireless devices and services. The demand for radio spectrum is dramatically increasing, while, most of the usable electromagnetic spectrum has already been licensed out. This policy has led to a sporadic use and shortage of the spectrum for new emerging wireless applications. To remedy this inefficiency, dynamic spectrum access techniques are proposed [1, 2] allowing users to share spectrum where some licensed bands are opened to unlicensed cognitive users provided that they do not produce a perceptible interference to the primary users. This culminated in the formation of the IEEE 802.22 working-group [3] which aims at using the cognitive radio (CR) technology [4, 5] as a key to dynamic spectrum access in the prescribed portion of TV frequency spectrum [6]. Cognition is defined as the capability of sensing the radio environment and evaluating the capabilities of alternate configurations. This enables a more flexible, efficient and reliable spectrum utilization. In such a context, the need to identify the network appears when a cognitive receiver attempt to initiate a connection to a network. In fact, the cognitive users have to distinguish the IEEE 802.22 signals form the signals emitted by the TV broadcasting.

A second context where the cognitive receiver has to detect the activity of compatible surrounding wireless networks, is when applying the concept of always best connected (ABS) [7]. The concept of ABS allows multi-mode cognitive devices to move between different technologies in order to approach the QoS requirement. Seamless cognitive immigration from one technology to another one is known as vertical handover [8, 9]. Before triggering a vertical handover, an opportunistic cognitive device has no knowledge about the active surrounding networks and must identify them. In a static spectrum allocation, the devices can easily detect the activities in their allocated spectrum bands using some existing technique such as energy detection [10], matched filters [11], etc. Unfortunately in cognitive networks, the allocated spectrum to the base stations (BSs) changes dynamically over time and space. Under those conditions a CR device must be enabled to identify passively the active compatible systems which are accessible in a given set of frequency bands. The spectrum is divided into a finite number of sub-bands. The goal is to develop efficient algorithms for such a task in each sub-band. An intuitive approach is to perform detection using the cross-correlation between the observed signal and the known preamble sequence of the network of interest. Unfortunately, this approach involves long delays, for example, in the IEEE 802.22, the super-frame preamble is broad-casted only once every 160 ms [12]. Since, the cognitive device must sense multiple sub-bands, such a delay is not tolerable and makes this approach too expensive. In addition, this approach does not make use of extra knowledge about the structure of the signals in different networks (e.g., the involved pilot signals). In this article, we propose an alternative solution which exploits the known pilot patterns of the involved standards.

The orthogonal frequency division multiplexing (OFDM) is used in the physical layer of many of the existing networks and is also provisioned as the best candidate for most of future cognitive networks [13]. The OFDM is advantageous in cognitive networks not only because of its flexibility and scalability but more importantly because it is deemed that it allows simpler management of spectral resources.

We can categorize the existing algorithms for OFDM systems identification in four groups. The first group proposes some blind techniques [14–16] that permit to extract the OFDM signal parameters and then search those values in a lookup table to determine the corresponding system. These techniques have a high computational cost, and only the inter-carrier spacing appears to be a good signature for the actual existing systems [14]. In addition, new radio architectures such as the cognitive radio systems are converging to a common physical layer. For such future systems, it is very probable that this signature will be no longer available. The second group exploits the OFDM signal properties such as cyclic prefix (CP) cyclo-stationarity [17–19] to extract the inter-carrier spacing. Unfortunately, the performance of the CP cyclo-stationarity based algorithms degrades as the length of the channel impulse response approaches the cyclic prefix duration. In [20], CP and preamble cyclo-stationarity are jointly used. However, independent cognitive receivers often miss to catch the preamble, as they observe the signals at random time intervals. Specially for reducing the power consumption, the cognitive receivers shall acquire signals samples only over short intervals. In such cases, the preamble is highly likely lost, which leads to loss of the cyclo-stationary property. The third group proposes to embed some specific signatures in the physical signal and broadcast it, always. To allow unique identification of all possible co-existing systems, a number of signatures must be provisioned which adds spectral overhead. The cognitive devices must be able to regenerate these signatures and manipulate the received signals at low cost (i.e., the computational complexity must be reasonable). Authors in [21–23] proposed to dedicate some selected sub-carriers and induce a cyclo-stationary signature. Unfortunately such a technique add overhead, reduce network capacity and are not applicable for the existing OFDM networks. Finally, in [24–26], authors proposed to exploit the pilot patterns which is a signature already embedded in many existing OFDM networks (for example in WiFi, WiMAX, LTE). These pilot signals are transmitted for other reasons such as synchronization [27–29] and channel estimation [30–32]. This approach is more efficient since no spectral overhead is needed. In [25], a method is proposed for a comb-type configuration of the pilots where assuming a finite sequence of pilots. This method is only efficient for the assumed conditions. Unfortunately, the technique proposed in [26] is dedicated only to LTE signals. The first proposed method in [24] relies on the periodic redundancy often induced between pairs of pilot symbols. The second proposed method is dedicated to the case where the pilots are modulated by a pseudo random sequence, authors in [24] proposed to exploit the properties of the pseudo random generator. These methods require the knowledge of the position of the pilots in time and frequency, and are only applicable if these pilots have some known redundant relation (either in the form of known correlation or in the form of a pseudo random sequence), which make them not applicable in all cases. We must note that these pilot tones are often modulated initially by a pseudo random sequence and then by a binary phase-shift keying (BPSK) or a quadrature phase-shift keying (QPSK) signal to carry system control information; i.e., the modulating sequences are usually unknown to the third part observers. For example BPSK is used in WiFi and WiMAX and QPSK is used in LTE. Thus, we develop a method to identify the activity of such a system which is applicable under absence of the knowledge about the pilot modulating sequence.

In this article, we propose a method that exploit the pilot positions, and assume that they are modulated by a PSK signal. The proposed method is applicable to all existing standards since it does not require any knowledge or redundancy in the modulating symbols. A generalized likelihood ratio (GLR) detector which estimates the unknown channel gain, the unknown pilot modulating sequence, the noise variance and also performs time-frequency synchronization is here proposed. Thus, this method also allows third party observers to read the control channel information.

The remaining of the article is organized as follows. In Section 2, we present the OFDM signal model and formulate our detection problem. The GLR test is developed in Section 3.1. A pre-detection scheme is proposed in Section 3.2. An architecture for the receiver is proposed in Section 4. The Simulations results are detailed in Section 5. The synchronization impairments and the data modulating sequence impact on the performance of the algorithm are discussed in Sections 5.2 and 5.3, respectively. Finally, Section 6 concludes the article.

## 2 Signal model and problem statement

*N*sub-carriers, the discrete-time baseband equivalent transmitted signal is given by

*E*

_{ s }is the average signal power,

*n*and

*k*are the time and the frequency indexes, respectively,

*c*

_{n,k}is the

*n*th symbol on subcarrier

*k*,

*D*is the cyclic prefix length, and

*g*(

*m*) is the pulse shaping filter. The modulating symbol

*c*

_{n,k}is either a data symbol

*d*

_{n,k}or a pilot symbol

*p*

_{n,k}as follows

where the pilot pattern $\mathcal{P}$ represents the set of all pilot positions *ν* = (*n*, *k*) such that *n* and *k* are the temporal location and the subcarrier index of a pilot, respectively. We here assume that the pilot pattern $\mathcal{P}$ is known by the receiver and that the data symbols *d*_{n,k} are independent and identically distributed (i.i.d). In Section 5, we extend the proposed derivation to include the time and frequency synchronization. Interestingly, the pilot sequence *p*_{n,k} is either a QPSK or BPSK signal in existing systems, i.e., ${p}_{n,k}\in \{\pm 1,\pm \sqrt{-1}\}$. In this article, we exploit this property in order to detect if a given pattern $\mathcal{P}$ with such a modulation is present.

*N*=512(the FFT length) subcarriers which include 360

*data-sub-carriers*, 60

*pilot-subcarriers*and 92

*null-subcarriers*(46 left guard band and 45 right guard band and one DC). The pilot signals are dedicated for various estimation purposes and are reproducible at the receiver. No signal is transmitted in the

*null-subcarriers*in order to enable the signal to naturally decay and create the FFT “brick wall” shaping [33]. In this example, the set $\mathcal{P}$ is defined as

We must note that our proposed algorithm is applicable to other standards where the pilot pattern is defined differently.

*h*(

*l*)}

*l*= 0

*L*- 1 denotes the baseband equivalent discrete-time finite impulse response of the channel. In the derivation of our algorithm, we assume that the channel is time invariant and

*L*<

*D*. However, our simulation results reveal that the proposed algorithm performs well in slow time varying channels (see example in Section 5). The received samples of the OFDM signal are expressed as

*w*(

*m*) is a circularly symmetrical complex white Gaussian (CSCWG) process, i.e., $w\left(m\right)\sim \mathcal{N}\left(0,{\sigma}^{2}\right)$ with zero mean and unknown variance of

*σ*

^{2}. We define

*ε*as the carrier frequency offset (normalized by the sub-carrier spacing) between the active system and the observer,

*φ*is the initial arbitrary phase mismatch,

*τ*is the timing delay. For convenience and easy tailoring of our algorithm, we first assume that the system is synchronized, i.e., (

*ε*,

*τ*,

*φ*) is known and is pre-compensated to be zero. This can be realized using any existing algorithm in the literature. In Section 5, we show how the proposed algorithm can be used to perform the synchronization, or to initialize any other synchronization algorithm. Applying a fast Fourier transform (FFT) to (5), it can be easily shown that the symbols

*c*

_{n,k}are observed via

*Y*

_{n,k}as follows (for when (

*ε*,

*τ*,

*varphi*) = (0, 0, 0))

*h*(

*L*- 1), 0, …, 0] is the channel frequency response. Since the applied transformation in (6) is orthonormal, the noise process

*W*

_{n,k}in (7) is also a CSCWG process with zero mean and unknown variance of

*σ*

^{2}. We can rewrite (7) in a matrix form as

where ∥**Y** ∥ ^{2} = trace(**YY**^{
H
}), and ()^{
H
} stands for the Hermitian transpose.

Under ${\mathcal{H}}_{1}$ two scenarios are possible. Either an OFDM system is active with the desired pilot pattern $\mathcal{P}$ or **Y** is produced by another OFDM network with an unknown pilot pattern. In this section, we propose a GLR detector to test ${\mathcal{H}}_{1}$ for a known pilot pattern. In Section 3.2, we recommend an algorithm as a pre-detection process which detects the activity of a system without using the pilot pattern information. This inexpensive detector allows us to reduce the computational cost without any performance loss. In this section, we test ${\mathcal{H}}_{0}$ against ${\mathcal{H}}_{1}$ given a known pattern $\mathcal{P}$.

*c*

_{n,k}is present including a given pilot pattern $\mathcal{P}$ as in (2). We use

*ν*=(

*n*,

*k*) as the time-frequency pair index. We denote ${\mathcal{P}}_{k}=\left\{\right(n,k\left)\right|\forall n\}\cap \mathcal{P}$ as the subset of pilot indexes for a given sub-carrier

*k*. It is obvious that ${\left\{{\mathcal{P}}_{k}\right\}}_{k=0}^{N-1}$ is a partition for $\mathcal{P}$. We denote ${\overline{\mathcal{P}}}_{k}=\left\{\right(n,k\left)\right|\forall n\}-\mathcal{P}$ as the subset of time-frequency pair indexes which are not pilot for a given frequency index

*k*. The cardinal number of a set $\mathcal{A}$ is denoted by $\left|\mathcal{A}\right|$. Since the transmitter uses the adaptive modulation and coding (AMC), and disposing of no information about the distribution of the received data symbols, we assume that the samples situated on a given sub-carrier

*k*follows a complex Gaussian distribution of zeros mean and a variance ${\sigma}_{k}^{2}$, constant over a given

*k*. Under provided that $\nu \in \mathcal{P}$ we have $({Y}_{\nu}-{H}_{k}{c}_{\nu};\nu \in \mathcal{P})\sim \mathcal{N}(0,{\sigma}^{2})$, and in such a case we get

where **C** is defined as the vector of transmitted pilot symbols with a length of $\left|\mathcal{P}\right|$.

## 3 Proposed algorithms

In this section, we first introduce the identification algorithm. Then by ignoring the pilot pattern we propose a pre-detection algorithm that allows to considerably reduce the computational cost of the identification process.

### 3.1 Identification algorithm

*σ*

^{2}and (10) with respect to $({\sigma}^{2},\{{\sigma}_{k}^{2}\left\}\right)$ and obtain the ML estimates of

*σ*

^{2}and ${\sigma}_{k}^{2}$, respectively, as follows

Now, we have to maximize (15) with respect to **C** and **H**. This is equivalent to minimize $\sum _{\nu \in {\mathcal{P}}_{k}}|{Y}_{\nu}-{H}_{k}{c}_{\nu}{|}^{2}$ with respect to *H*_{
k
} and the pilot symbols for all sub-carriers *k* with ${\mathcal{P}}_{k}\ne \varnothing $. The elements *c*_{
ν
} are PSK symbols. For this case, a fast optimal algorithm recently proposed in [34] that can be employed for this optimization problem with a computational complexity order of $\left|{\mathcal{P}}_{k}\right|\underset{2}{log}\left(\right|{\mathcal{P}}_{k}\left|\right)$ per sub-carrier. Using this fast algorithm in [34] the computational cost of this optimization is $\sum _{k}\left|{\mathcal{P}}_{k}\right|\underset{2}{log}\left(\right|{\mathcal{P}}_{k}\left|\right)$. A suboptimal algorithm is also proposed in [35] (involves very small performance loss) with a reduced computational complexity order of $\left|{\mathcal{P}}_{k}\right|$ per sub-carrier and hence its overall computational cost is $\left|\mathcal{P}\right|$.

*c*

_{ ν }hereafter denoted by $\hat{{c}_{\nu}}$. In this case, the ML estimate of

*H*

_{ k }is given by

*σ*

^{2}under ${\mathcal{H}}_{1}$ becomes

*MN*log(

*MN*),$\left|\mathcal{P}\right|log\left(\left|\mathcal{P}\right|\right)$ and $\sum _{k}\left|\overline{{\mathcal{P}}_{k}}\right|log\left(\left|\overline{{\mathcal{P}}_{k}}\right|\right)$ are constants. Thus, we define the following statistic test to decide if the pattern is present or not

where the detection threshold *η*_{det} can be obtained by Monte-carlo simulation, assuming that the pattern $\mathcal{P}$ is absent (see Section 5 for more details). This detection threshold is independent of the SNR and of the noise variance. Indeed, one can check easily that the test statistic presented in (20) is invariant to the transformation *G*(**Y**) = *α* **Y**, where *α* is an arbitrary number. This makes it computable as summarized in Algorithm 1 without the knowledge of these two lasts parameters.

#### Algorithm 1 Identification Algorithm

The proposed algorithm performs an *N*-point Fast Fourier Transform (FFT) on *M* frames, and then detects $\left|\mathcal{P}\right|$ PSK symbol by the algorithm proposed in [34]. Taking into account the complexity of each term in (20), the overall Computational Complexity (CC) is $\mathit{\text{MN}}(2+\underset{2}{log}N)+\sum _{k}\left|{\mathcal{P}}_{k}\right|\underset{2}{log}\left|{\mathcal{P}}_{k}\right|+\left|\mathcal{P}\right|$ for *M* frames using the optimal algorithm in [34] and $\mathit{\text{MN}}(2+\underset{2}{log}N)+2\left|\mathcal{P}\right|$ using the suboptimal algorithm in [35]. For example in [24], authors have considered a case with *M* = 24, 30 pilots pairs and *N* = 2048. In this case, the overall complexity of their algorithm is approximately 5.4×10^{5} MAC where each MAC consists of one complex multiplication and one addition. For this case, the complexity of our proposed algorithm is 6.45 × 10^{5} operations which is slightly more expensive (less than 19 %) than the one proposed in [24]. Since the computational cost of the FFT is predominant in the both algorithm, these algorithms have similar order of computational costs.

### 3.2 Pre-detection algorithm

Assume that there is multiple candidates for the pilot pattern. For such a case if none of systems are active, executing the detector proposed in the previous section is a waste of resources, specially if the pilot pattern at the receiver is not synchronized with the true value. For such a cases, we propose a coarse pre-detector to test of any system is active or not without using the information about the pilot locations. This computationally inexpensive pre-detection algorithm considers no information about pilot samples assuming that the corresponding symbols are Gaussian like data and is insensitive to time and frequency synchronization. We must emphasize the aim of the proposed pre-detector is not to detect PUs like in [36–39], but is to filter out the unlikely cases and to reduce the computational cost of the detection procedure, specially in the cases cited above. In this context, the detection of a system at very low SNRs is a waste of time and resources. Indeed, detecting a system in a range of SNR where our identifier does not perform well is inconvenient. In addition, a vertical handover process is only performed if a system with a reasonably high SNR is detected to satisfy the link quality condition.

**Y**is the same as expressed in equation (10) with the exception that we must ignore $\mathcal{P}$. Therefore, the first product term is the same as the second term, i.e.,

**Y**(

*k*) denotes the

*k*th column of the matrix

**Y**and is assumed to have a Gaussian distribution with zero-mean and variance of ${\sigma}_{k}^{2}$. The ML estimate of ${\sigma}_{k}^{2}$ is $\hat{{\sigma}_{k}^{2}}=\frac{1}{M}\parallel \mathbf{Y}\left(k\right){\parallel}^{2}$ and $f(\mathbf{Y};{\mathcal{H}}_{2},\hat{{\sigma}_{k}^{2}})={\left(\frac{M}{\Pi e}\right)}^{\mathit{\text{MN}}}\prod _{k=0}^{N-1}{\left(\parallel \mathbf{Y}\left(k\right){\parallel}^{2}\right)}^{-M}$. Thus using Equation (15), the LR function is given by

*L*(

**Y**) is minimized. Otherwise, as the BS is using the AMC, the energy in different sub-carriers are not necessarily equal and hence

*L*(

**Y**) is increased. Taking logarithm of (22), the log-LR for the pre-detector is defined as the decision statistic as follows

**Y**(

*k*)∥

^{2})}

*k*= 0

*N*- 1. This pre-detector is summarized in Algorithm 2. The distribution of the ratio of the geometric mean to the arithmetic mean of random samples from a

*Γ*distribution has been studied in [40]. Unfortunately, the obtained expression is very hard to manipulate. In current standards, the product

*MN*is a large number

^{a}. To the best of our knowledge for this detector, the exact analysis is very complicated and the only existing analysis is recently carried out by S Akhavan-Astaneh and S Gazor (unpublished work) for the asymptotic case where

*MN*is large enough. We can prove that the distribution of the decision statistic $\mathcal{L}\left(\mathbf{Y}\right)$ in (24) under both ${\mathcal{H}}_{0}$ and ${\mathcal{H}}_{1}$ converges to a normal distribution as

*M*

*N*→

*∞*with means and variances that cost in our case

*ψ*(

*z*) =

*Γ*

^{′}(

*z*) /

*Γ*(

*z*) is the digamma function and hereafter, we referee to $\Omega ({\sigma}_{0}^{2},\dots ,{\sigma}_{N-1}^{2})=log\left(\frac{\underset{0}{\overset{2}{\sigma}}+\cdots +{\sigma}_{N-1}^{2}}{N}\right)-\frac{log{\sigma}_{0}^{2}+\cdots +log{\sigma}_{N-1}^{2}}{N}$ as the homogeneity index of the bands energies $({\sigma}_{0}^{2},\dots ,{\sigma}_{N-1}^{2})$. This is why a better performance is achieved when the center of the two normal pdfs are far apart, which happens only if the ${\sigma}_{k}^{2}$s are heterogeneous, i.e., the source spectrum observed is non flat. Figure 2 depicts the empirical pdfs, the normal pdfs in (25) and (26) of $\mathcal{L}$ under ${\mathcal{H}}_{0}$ and ${\mathcal{H}}_{1}$, where

*M*= 12,

*N*= 512 and the ${\sigma}_{k}^{2}$ are random variables chosen uniformly in the interval [1,2]. This reveals that our theoretical expressions are accurate.Therefore, the probabilities of false alarm and mis-detection of $\mathcal{L}$ are approximated as follows [41]

where $Q\left(z\right)=\frac{1}{\sqrt{2\Pi}}\underset{z}{\overset{\infty}{\int}}{e}^{-{t}^{2}}\mathit{\text{dt}}$.

#### Algorithm 2 Pre-detection Algorithm

If $\mathcal{L}$ is greater than the threshold, the hypothesis ${\mathcal{H}}_{2}$ is validated. Only in this case, we need to test ${\mathcal{H}}_{1}$ against ${\mathcal{H}}_{0}$ using $\mathcal{P}$ and (20). We propose to chose *η*_{pre} in (24) and *η*_{det} in (20) such that the constant false alarm probability *P*_{fa, pre} of (24) is slightly higher than *P*_{fa} of (20). The reason is that possible false alarms of (24) are further processed in (20). In contrast, if (24) fails to detect the activity of the system no further processing is applied. The proposed pre-detector has a computational cost of *M* *N* log*N* + 2*M* *N*. Assuming that there are *N*_{
p
} feasible pilot pasterns that needed to be tested, the overall computational cost of the combined pre-detection and *N*_{
p
} detection is $\mathit{\text{MN}}logN+2\mathit{\text{MN}}+{N}_{p}{P}_{\text{fa,pre}}\left({\sum}_{k}\left|{\mathcal{P}}_{k}\right|\underset{2}{log}\left|{\mathcal{P}}_{k}\right|+\left|\mathcal{P}\right|\right)$ MAC. Such a combination is more cost effective for larger values of *N*_{
p
} since we can set *P*_{fa, pre} to a relatively feasible small number.

## 4 Summary of the proposed sensing unit

Our proposed detector should be implemented in the base-band processing unit [42, 43] of a cognitive receiver. We assume that the spectrum is divided to a finite number of frequency channels which are used by different networks. The proposed detector is used to identify and to detect the activity of these networks.

*N*,

*D*and $\mathcal{P}$ are given for all specific networks of interest. A flow chart for the proposed spectrum sensing unit is illustrated in Figure 3. First, the sampled data are processed using FFT in order to obtain

*Y*

_{n,k}as in (6). Then, the pre-detection is performed by computing LLR $\mathcal{L}\left(\mathbf{Y}\right)$ and comparing it with a (pre-calculated) threshold

*η*

_{pre}as in (24). This threshold

*η*

_{pre}is set to satisfy a desired

*P*

_{fa, pre}. If this LLR $\mathcal{L}\left(\mathbf{Y}\right)$ is less than the threshold, this sub-channel is declared as vacant and the next sub-channel will be processed. Otherwise if $\mathcal{L}\left(\mathbf{Y}\right)>{\eta}_{\text{pre}}$, the system will make more investigation about all possible candidate networks, by using $\mathcal{P}$ and the test statistic expressed in (20) by comparing $\mathcal{T}(\mathbf{Y},\mathcal{P})$ to a threshold

*η*

_{det}. The decision of (20) indicates if a network using pilot $\mathcal{P}$ is active or not. To ensure that the pre-detector is not eliminating potential events that are susceptible of being active systems, its probability of false alarm must be chosen large enough. This is because it filters some of the events and the miss-detection probability of a cascade system is less than that of each sub-system. Simulations in Section 5 show that to achieve good results we should choose

*P*

_{fa, pre}> 10

*P*

_{fa}.

## 5 Simulations

### 5.1 Synchronous case

Simulations are investigated on OFDMA signals, all the results are averaged over 1000 Monte-Carlo runs assume a perfect synchronization. In our simulations, the thresholds are determined experimentally, as follows: the decision statistics for 10^{4} independent trials in the absence of signal are sorted in a descending order and the threshold is chosen as the *%* 100 × *P*_{fa}-percentile of the resulting data. For example for *P*_{fa} = 0.02, the threshold is chosen as the 0.02 × 10^{4} = 200th ordered data; i.e., such that *%* 100 × *P*_{fa} of the decision statistics are above the threshold. We have chosen *M* = 24 as the number of observed symbols for our simulations, (note that in WiMAX Mobile 24 symbols represents 2.5 ms).

*D*= 64, 60 pilots, 360 data, 91 guard and 1 DC sub-carrier. The data symbols

*d*

_{n,k}are randomly chosen from a QPSK, 16-QAM or 64-QAM constellations with equal probabilities. The signal to noise ratio is defined as $\text{SNR}=10\underset{10}{log}\left(\frac{{E}_{s}}{{\sigma}^{2}}\right)$. The propagation channel is simulated as a discrete time frequency selective channel assuming that {

*h*(

*l*)}

*l*= 0

*L*- 1 are independent with zero-mean Gaussian distribution. We assume an exponential decay profile for the variance of

*h*(

*l*), i.e.,

*E*[|

*h*(

*l*)|

^{2}] =

*G*

*e*

^{ - l / μ}for

*l*= 0, …,

*L*- 1, where

*G*is chosen such that $\sum _{l=0}^{L-1}E\left[\right|h\left(l\right){|}^{2}]=1$. Figure 4 shows the probability of missed detection (

*P*

_{mis}= 1 -

*P*

_{d}, where

*P*

_{d}is the detection probability) versus the SNR for various values of false alarm probability. As expected, we could achieve a lower probability of missed detection without using the pilot pattern information provided that we allow a higher false alarm rate

*P*

_{fa, pre}for the pre-detector than

*P*

_{fa}.

*n*), the correlation induced between pilots is such that

*p*

_{n,k}=

*p*

_{n + 2, k + 210}, the pilots are BPSK symbols. We also normalize the data vector in each sub-carrier by its own standard deviation in order to obtain a less sensitive criterion to the unknown received signal gain as proposed in [24]. Figure 5 shows the performance of the proposed GLRT when compared to the pilot induced cyclo-stationarity detector (PICD) proposed in [24] for

*P*

_{fa}= 0.02 and

*P*

_{fa}= 0.001. We clearly see that the GLRT outperforms the PICD by almost a 1 dB gain.

^{b}. We assume that the transmit power for all data sub-carriers are equal, and

*d*

_{n,k}are randomly and independently chosen from a QPSK, 16-QAM or 64-QAM constellation. The propagation channel is generated by the same manner as in the previous simulation. We assume that

*p*

_{n,k}=

*p*

_{n,k + 210}since the algorithm in [24] requires such a intentionally embedded correlation. Figure 6 compares the performance of GLRT with that of the PICD for Mobile WiMAX DL-PUSC configuration for

*P*

_{fa}= 0.02 and

*P*

_{fa}= 0.001. We observe that the GLRT still conserves its 1 dB gain noticed in the previous context. In addition to this performance gain, the GLRT also extracts and provides several additional information, e.g., it estimates the noise variance and the channel response which are very good metrics that can be used to evaluate the link between the cognitive user and the base station.

*d*

_{n,k}(2) has a CSCWG distribution with zero mean and variance of

*σ*

*k*2 -

*σ*

^{2}. However in practice, this assumption is not necessarily true; and in most standards, this sequence is selected from a set of constellation points and is not a normal random process. To investigate the robustness of the proposed detectors versus this assumption, we have performed a number of simulations where

*d*

_{n, k}are randomly and independently chosen from a QPSK, 16-QAM or 64-QAM constellation and compared the results with the case of Gaussian data. For Figure 7 the false alarm rate is set to

*P*

_{fa}= 0.02 and the sequence

*d*

_{n,k}is generated to have either a Gaussian pdf or a non-Gaussian pdf. In the non-Gaussian case,

*d*

_{n,k}generated as

*Q*-QAM sequence where

*Q*is 4, 16, or 64 with equal probabilities. For each of these distributions, we considered two cases (1) an equal power is allocated to all frequency bins (

*d*

_{n,k}is a white noise) and (2) the transmitter allocates different power to different frequency bins (for example, this non-flat power allocation could be the result of a water-filling). For non-uniform power allocation, the power allocated to each frequency bin depends on the channel between the user and the base station which is unknown to the observer. Thus for simplicity, for

*Q*-QAM the allocated power

*E*[|

*d*

_{n,k}|

^{2}is adjusted/normalized as a function of

*Q*such that the minimum constellation distance is constant for all bins. This figure reveals that the performance proposed detectors are not sensitive the validity of the assumption that

*d*

_{n,k}is Gaussian. However, the power allocation has significant impact on the detection performance of all algorithms.

*M*. As expected the performance of the algorithm increases as

*M*increase. This is justified intuitively, as more samples results in more information and more accurate estimation of unknown parameters and hence the detection performance improves. Unfortunately we can not increase

*M*arbitrarily since it determines the acquisition time (the time lag before a decision is made), for instance 12, 24, and 48 observed OFDM symbols represent 1.25, 2.5, and 5 ms time-lag for WiMAX Mobile. Thus in practice, these curves represent the trade-off between the time-lag

*M*and (

*P*

_{fa},

*P*

_{fa,pre}) for a given required performance.

*P*

_{fa}= 0.02. For the cascade combination, first the pre-detection in (24) is performed with a

*P*

_{fa,pre}= 0.2. Then if any signal is pre-detected, the identification algorithm in (20) is performed with a

*P*

_{fa}= 0.02. We observe that their performance are very similar. This is justified by the fact that the pre-detector performs well in the SNR operating range, i.e., the missed detection probability of the pre-detector is very small and it is very unlikely that potential candidate is rejected by the pre-detector. This is why the performance of the cascade combination is not deteriorated compared with that of GLRT.

*f*

_{ d }= 0, 100 and 200 Hz and a false alarm rate of

*P*

_{fa}= 0.02. We clearly observe that the proposed method is also robust to Doppler spread. For example for a doppler of 200 Hz, both algorithms lose about 1.33 dB.

### 5.2 Asynchronous case

All derivations in this article so far was based on the assumption that the observer is fully synchronized with the active systems. Unfortunately in practice, the observer could not be synchronized with the systems which are not detected yet. Thus here, we consider the case in which (*ε*, *τ*, *φ*) defined in (5) is not zero. It is easy to see that the phase shift mismatch *φ* has no impact on the proposed algorithms, since the decision statistics are invariant to the transformation *G*(*y*(*m*)) = *y*(*m*)*e*^{
j
φ
}. However, the frequency offset *ε* and the time delay *τ* result in inter-carrier interference (ICI) and inter-symbol interference (ISI), respectively. In other words, the impact of *ε* and *τ* appear as an unknown shift in frequency and time, respectively. A number of techniques are proposed in the literature like Schmidl-Cox [45], Minn-Bhargava [46] or Shi-Serpedin [47]. Unfortunately, these techniques require that a periodic pattern to be present in the signal. This requirement is practically not satisfied for the defined standards. Moreover, the cognitive receiver can only process a random portion of the signal; this makes it highly unlikely to pick up one OFDM symbol containing the periodic pattern.

*τ*as a multiple integer factor of

*N*+

*D*and

*ε*as a multiple integer factor of inter carrier frequency spacing. So, we could either shift in time and in frequency the received signal to match the pilot pattern or equivalently shift back the pilot pattern to math the unknown discrete values of (

*ε*,

*τ*). Let ${\mathcal{P}}_{\epsilon ,\tau}$ denotes the known pilot pattern shifted back in frequency

*ε*and in time

*τ*. We define the following decision statistic

*ε*and

*τ*. Thus, this detector jointly performs synchronization along with the detection. This is highlighted in Figure 11, where the values of the test statistic are plotted for different frequencies and timing offsets using a signal model similar to the one depicted in Figure 1 for a fully synchronized case. The SNR is set to 0 dB, the number of observed OFDM symbols is set to

*M*=24. The time offset is varying in the interval

*τ*∈ [-0.5(

*N*+

*D*), 0.5(

*N*+

*D*)] and the frequency offset

*ε*∈ [-0.5, 0.5]. The Figure shows that the test statistic is maximum for

*ε*= 0 (no ICI) and

*τ*= 0 (no ISI) which confirms that $\hat{\epsilon},\hat{\tau}$ are the ML estimates of

*ε*and

*τ*.

*τ*∈ [-0.5(

*N*+

*D*), 0.5(

*N*+

*D*)] and the frequency offset

*ε*∈ [-0.5, 0.5]. The maximization described in 29 is achieved by exploring discrete value within the two described intervals. Each interval is sampled into 11 uniformly distributed values. Thus we have to compute 121 values of the decision statistic, the maximum is achieved when the couple $(\widehat{\tau},\widehat{\epsilon})$ is nearest to the true values (

*τ*,

*ε*). In order to keep the false alarm rate to the expected value, maximizing the cost function implies to adjust the detection threshold. In fact, if

*K*

_{ ε }and

*K*

_{ τ }denote the number of discrete frequency and time shifts, respectively, then

*K*

_{ ε }

*K*

_{ τ }test statistics have to be computed. Assuming that under ${\mathcal{H}}_{0}$ the test statistic values are independent from one shift to another. Thus, the detection threshold has to verify

*ε*,

*τ*). This shows that for the synchronization our criterion compared to the PIC criterion is much sharper and has faster decay around the true value (

*ε*,

*τ*).

*K*

_{ ε }

*K*

_{ τ }times that of (20). However, employing the cascade combination and using a judiciously chosen value

*P*

_{fa, pre}, the average computational cost is considerably reduced. In this case, if no signal is present less computational resource is wasted for synchronization. Under ${\mathcal{H}}_{0}$, the computational cost is CC

_{0}= CC

_{pre}+

*K*

_{ ε }

*K*

_{ τ }

*P*

_{fa,pre}CC

_{GLRT}, where CC

_{pre}and CC

_{GLRT}are the computational cost of the pre-detector and the GLRT detector, respectively. Under ${\mathcal{H}}_{1}$, the computational cost is CC

_{1}= CC

_{pre}+

*K*

_{ ε }

*K*

_{ τ }

*P*

_{d, p re}CC

_{GLRT}, where

*P*

_{d,pre}is the detection probability of the pre-detector. The overall CC of the receiver is $\text{CC}=P\left[{\mathcal{H}}_{0}\right]{\text{CC}}_{0}+(1-P[{\mathcal{H}}_{0}\left]\right){\text{CC}}_{1}$. Figures 13, illustrate the overall computational cost of the receiver versus

*P*

_{fa, pre}for different values of

*P*

_{0}and SNR. The CC increases as

*P*

_{fa, pre}increases, and thus, a judicious choice on

*P*

_{fa, pre}has to be done to maintain a good performance of the pre-detector providing a reasonable overall CC.

### 5.3 Discussion on the case where the data symbols are PSK signals

## 6 Conclusion

In this article, we presented a new method for the detection of active OFDM based systems. The proposed method exploit the pilot pattern embedded into existing standards as a characteristic for such a detection and is based on a GLR test. The presented algorithm is computationally inexpensive and does not require any overhead or modification into the actual structure of the PHY layer of the networks of interest. The performance of the proposed method is compared against the PICD proposed in [24]. The proposed technique outperforms the pilot based identifiers proposed in the literature and shows an equivalent robustness to the propagation environment. Since this algorithm, in contrast to the PICD, does not exploit any a-priori information about the pilot correlation it could be employed for all other existing standards such as LTE, DVB-T. We also proposed another GLRT-based pre-detector which ignores the pilot information and is just used as a filter in order to reduce the computational cost for the cases where a large number of possible systems/patterns need to be tested. Moreover as a side product, the proposed detector performs noise variance estimation, channel magnitude estimation and time-frequency synchronization. These extracted information can be used to sense the quality of service of the detected network.This knowledge will also help the user to chose the network offering the best link quality, approaching the always best connected concept.

## Endnote

^{a}e.g., when observing 24 symbols (2.5 ms) in the WiMAX standards using 512 sub-carriers *MN* costs 12288.

^{b}Note that as we can see in Equation (20), the test statistic does not depend on the pilots power. Thus, the algorithm works even if the pilot and data tones have the same power.

## Declarations

## Authors’ Affiliations

## References

- U.S. FCC: Review of Spectrum Management Practicies. Tech. Rep. Federal Communications Commission (2002)Google Scholar
- U.S. FCC: Second Report and Order and Memorandum Opinion and Order, in the Matter of Unlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz Band. Tech. Rep. Federal Communications Commission (2008)Google Scholar
- IEEE 802.22 WG: IEEE 802.22 Working Group on Wireless Regional Area Networks Enabling Rural Broadband Wireless Access Using Cognitive Radio Technology. . [Online; accessed 24-Sep-2010] http://www.ieee802.org/22/
- Mitola J, Maguire GQ: Cognitive radio: making software radios more personal.
*IEEE Personal Commun*1999, 6(4):13-18. 10.1109/98.788210View ArticleGoogle Scholar - Haykin S: Cognitive radio: brain-empowered wireless communications.
*IEEE J. Sel. Areas Commun*2005, 23(2):201-220.View ArticleGoogle Scholar - U.S. FCC: Notice of Proposed Rulemaking, in the Matter of Unlicensed Operation in the TV Broadcast Bands (ET Docket no. 04-186) and Additional Spectrum for Unlicensed Devices below 900 MHz and in the 3 GHz Band. Tech. Rep. FCC ET Docket 04–113 (2004)Google Scholar
- Gustafsson E, Jonsson A: Always best connected.
*IEEE Trans. Wirel. Commun*2003, 10(1):49-55. 10.1109/MWC.2003.1182111View ArticleGoogle Scholar - Dai Z, Fracchia R, Gosteau J, Pellati P, Vivier G: Vertical Handover Criteria and Algorithm in IEEE802.11 and 802.16 Hybrid Networks.
*IEEE International Conference on Communications, ICC’08*2008, 2480-2484.View ArticleGoogle Scholar - McNair J, Zhu F: Vertical handoffs in fourth-generation multinetwork environments.
*IEEE Trans. Wirel. Commun*2004, 11(3):8-15. 10.1109/MWC.2004.1308935View ArticleGoogle Scholar - Urkowitz H: Energy detection of unknown deterministic signals.
*Proc. IEEE*1967, 55(4):523-531.View ArticleGoogle Scholar - Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. In
*Conference on Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar*. IEEE; 772-776.Google Scholar - Stevenson C, Chouinard G, Lei Z, Hu W, Shellhammer S, Caldwell W: IEEE 802.22: the first cognitive radio wireless regional area network standard.
*IEEE Commun. Mag*2009, 47(1):130-138.View ArticleGoogle Scholar - Birru D, Shankar S, Cordeiro C, Challapali K: IEEE 802.22: an introduction to the first wireless standard based on cognitive radios.
*J. Commun.*2006, 1(1):38-47.Google Scholar - Bouzegzi A, Ciblat P: Jallon, New algorithms for blind recognition of OFDM based systems.
*Elsevier Signal Process*(2010), 90(3):900-913. 10.1016/j.sigpro.2009.09.017View ArticleGoogle Scholar - Punchihewa A, Bhargava VK, Despins C: Blind estimation of OFDM parameters in cognitive radio networks.
*IEEE Trans. Wirel. Commun*2011, 10(3):733-738.View ArticleGoogle Scholar - Han N, Zheng G, Sohn SH, Kim JM: Cyclic autocorrelation based blind OFDM detection and identification for cognitive radio.
*4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM’08*2008, 1-5.Google Scholar - Oner M, Jondral F: On the extraction of the channel allocation information in spectrum pooling systems.
*IEEE J. Sel. Areas Commun*2007, 25(3):558-565.View ArticleGoogle Scholar - Yucek T, Arslan H: OFDM signal identification and transmission parameter estimation for cognitive radio applications. 2007.View ArticleGoogle Scholar
- Li H, Bar-Ness Y, Abdi A, Somekh OS, Su W: OFDM modulation classification and parameters extraction.
*1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications*2006, 1-6.Google Scholar - Al-Habashna A, Dobre OA, Venkatesan R, Popescu DC: Joint cyclostationarity-based detection and classification of mobile wimax and lte ofdm signals.
*IEEE International Conference on Communications (ICC)*2011, 1-6.Google Scholar - Sutton PD, Nolan KE, Doyle LE: Cyclostationary signatures in practical cognitive radio applications.
*IEEE J. Sel. Areas Commun*2008, 26(1):13-24.View ArticleGoogle Scholar - Maeda K, Benjebbour A, Asai T, Furuno T, Ohya T: Recognition among OFDM-based systems utilizing cyclostationarity-inducing transmission.
*IEEE 2nd International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN*2007, 516-523.Google Scholar - Maeda K, Benjebbour A, Asai T, Furuno T, Ohya T: Cyclostationarity-inducing transmission methods for recognition among OFDM-based systems.
*Eurasip Journal on Wireless Communications and Networking*2008, 1-14. 10.1155/2008/586172Google Scholar - Socheleau F-X, Houcke S, Ciblat P, Aissa-El-Bey A: Cognitive OFDM system detection using pilot tones second and third-order cyclostationarity.
*Elsevier Signal Process*2011, 91(2):1-17.Google Scholar - Jung Y-H, Lee YH: Use of periodic pilot tones for identifying base stations of FH-OFDMA systems.
*IEEE Commun. Lett*2006, 10(3):192-194. 10.1109/LCOMM.2006.1603381View ArticleGoogle Scholar - Al-Habashna A, Dobre OA, Venkatesan R, Popescu D C: Cyclostationarity-based detection of lte ofdm signals for cognitive radio systems.
*GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference*2010, 1-6.Google Scholar - Coulson AJ: Maximum likelihood synchronization for OFDM using a pilot symbol: algorithms.
*IEEE J. Sel. Areas Commun*(2001), 19(12):2486-2494. 10.1109/49.974613View ArticleGoogle Scholar - Schmidl TM, Cox DC: Robust frequency and timing synchronization for OFDM.
*IEEE Trans. Commun*1997, 45(12):1613-1621. 10.1109/26.650240View ArticleGoogle Scholar - Viholainen A, Stitz T, Ihalainen T, Renfors M: Pilot-based synchronization and equalization in filter bank multicarrier communications. In
*EURASIP Journal on Advances in Signal Processing*. EURASIP; 2010:1-18.Google Scholar - Li Y: Pilot-symbol-aided channel estimation for OFDM in wireless systems.
*IEEE Trans. Veh. Technol*2000, 49(4):1207-1215. 10.1109/25.875230View ArticleGoogle Scholar - Colieri S, Ergen M, Puri A, Bahai A: A study of channel estimation in OFDM systems. In
*IEEE 56th Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall*. IEEE; 2002:894-898.Google Scholar - Colieri S, Ergen M, Puri A, Bahai A: Channel estimation techniques based on pilot arrangement in OFDM systems.
*IEEE Trans. Broadcast*2002, 48(3):223-229. 10.1109/TBC.2002.804034View ArticleGoogle Scholar - IEEE Std 802.16:
*Part 16: air interface for broadband wireless access systems, Amendment 2: Physical and Medium Access Control layers for Combined Fixed and Mobile Operation in License Bands and Corrigendum, IEEE*. 2005.Google Scholar - Gazor S, Derakhtian M, Tadaion AA, Computationally efficient maximum likelihood sequence estimation and activity detection for M-PSK signals in unknown flat fading channels:
*IEEE Signal Process. Lett*. 2010, 17(10):871-874.View ArticleGoogle Scholar - Tadaion AA, Derakhtian M, Gazor S, Nayebi MM, Aref MR: Signal activity detection of phase-shift keying signals.
*IEEE Trans. Commun*2006, 54(6):1143-1143.View ArticleGoogle Scholar - Axell E, Larsson EG: Optimal and sub-optimal spectrum sensing of OFDM signals in known and unknown noise variance.
*IEEE J. Sel. Areas Commun*2011, 29(2):290-304.View ArticleGoogle Scholar - Bokharaiee S, Nguyen HH, Shwedyk E: Blind spectrum sensing for OFDM-based cognitive radio systems.
*IEEE Trans. Veh. Technol*2011, 60(3):858-871.View ArticleGoogle Scholar - shin Chen H, Gao W, Daut D: Spectrum sensing for OFDM systems employing pilot tones.
*IEEE Trans. Wirel. Commun*2009, 8(12):5862-5870.View ArticleGoogle Scholar - Font-Segura J, Wang X: Glrt-based spectrum sensing for cognitive radio with prior information.
*IEEE Trans. Commun*2010, 58(7):2137-2146.View ArticleGoogle Scholar - Glaser RE: The ratio of the geometric mean to the arithmetic mean for a random sample from a gamma distribution.
*J. Am. Stat. Assoc*1976, 71(354):480-487. 10.1080/01621459.1976.10480373MathSciNetView ArticleGoogle Scholar - Kay S-M:
*Fundamentals of Statistical Signal Processing, Volume II: Detection Theory*. (Prentice Hall, Upper Saddle River; 1998. ISBN 0-13-504135-XGoogle Scholar - Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey.
*Comput. Netw. Elsevier*2006, 50(13):2127-2159. 10.1016/j.comnet.2006.05.001View ArticleGoogle Scholar - Jondral F-K: Software-defined radio basics and evolution to cognitive radio.
*EURASIP J. Wirel.Commun. Network*2005, 3: 275-283.Google Scholar - Jakes WC:
*Microwave Mobile Communications*. New York: John Wiley and Sons Inc.; 1975.Google Scholar - Williams C, Beach MA, McLaughlin S: Robust OFDM timing synchronisation.
*Electron. Lett*2005, 41(13):751-752. 10.1049/el:20051249View ArticleGoogle Scholar - Minn H, Bhargava VK: A simple and efficient timing offset estimation for OFDM systems. In
*2000 IEEE 51st Vehicular Technology Conference Proceedings*. VTC 2000-Spring Tokyo; 2000:51-55.Google Scholar - Shi K, Serpedin E: Coarse frame and carrier synchronization of ofdm systems: a new metric and comparison.
*IEEE Trans. Wirel. Commun*2004, 3(4):1271-1284. 10.1109/TWC.2004.828282View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.