Optimal power policies and throughput scaling analyses in fading cognitive broadcast channels with primary outage probability constraint
 Athipat Limmanee^{1},
 Subhrakanti Dey^{2}Email author and
 Ehsan Nekouei^{3}
https://doi.org/10.1186/16871499201435
© Limmanee et al.; licensee Springer. 2014
Received: 10 October 2013
Accepted: 3 March 2014
Published: 6 March 2014
Abstract
This paper focuses on a spectrumsharingbased fading cognitive radio broadcast channel (BC) with a singleantenna secondary base station (SBS) and M singleantenna secondary receivers (SRs) utilizing the same spectrum band with a delaysensitive primary user (PU). The servicequality requirement for the primary user is set by an outage probability constraint (POC). We address the optimal power allocation problem for the SBS ergodic sum capacity (ESC) maximization in the secondary BC network subject to POC and a transmit power constraint at SBS specified by either a longterm or a shortterm power constraint. The optimality conditions reveal that in each joint channel state, the SBS allocates transmission power to the only one selected SR with the highest value of a certain metric consisting of the ratio of the SR’s direct channel power gain and the sum of interference power and noise power at the SR. Then, the secondary network throughput scaling analysis as the number of SRs becomes large, is also investigated, showing that if PU applies a truncated channel inversion (TCI) power policy, the SBS ESC scales like ε_{ p } log(logM) where ε_{ p } is the PU outage probability threshold. To reduce the amount of channel side information (CSI) transferred between the two networks, we propose a suboptimal transmission scheme which requires only 1bit feedback from the delaysensitive PR (partial CSI). We show that the new power control policy is asymptotically optimal, i.e. the SBS ESC under this reduced feedback scheme still scales like ε_{ p } log(logM).
Keywords
Cognitive radio Power control Ergodic capacity Outage probability Throughput scaling Fading broadcast channels1 Introduction
Inefficiency of spectrum usage has become one of the main concerns in wireless communications technology today as most of the exclusively allocated spectrum remains underutilized by licensed/primary users (PUs) [1]. This has inspired the concept of cognitive radio (CR) technology, which was originally proposed in [2]. The rationale is that unlicensed/secondary users (SUs) are allowed to use the same spectrum with PUs as long as the qualityofservice (QoS) of the primary transmission is protected. To date, there are three main approaches for CR to manage resultant interference: interweave, overlay, and underlay [3]. In the underlay paradigm which is the paradigm of interest in this paper, SUs can share the spectrum regardless of the ON/OFF status of the primary network, providing that the QoS of primary link is still guaranteed. To protect the service quality of the primary transmission in underlay paradigm, several types of constraints have been proposed in literature including peak/average interference power constraint (PIPC/AIPC), primary capacity loss constraint, and primary outage probability constraint (see [4] and references therein).
Optimal power allocation strategy for noncognitive BC has been extensively investigated under various perspectives, such as achievable ergodic capacity [5] and outage capacity [6] regions in fading broadcast channels or the optimal power allocation for maximizing ergodic sum downlink capacity in noncognitive BC [7]. However, in a multiuser cognitive environment, optimal power allocation problems are even more challenging because of the strict guarantee of the QoS constraint in primary networks, especially in delaysensitive applications. Furthermore, the asymptotic behaviour of the secondary sum downlink throughput scaling under the optimal power allocation policy, termed as optimal throughput scaling, when the number of secondary receivers grows large, has not been previously addressed under a primary outage probability constraint. Thus motivated, our first aim is to provide an analysis of optimal throughput scaling with full channel side information (CSI) at the secondary transmitter. While the requirement of full CSI at the SU transmitter, in particular, those of the primary channels is impractical. Nonetheless, these results will constitute a benchmark for assessing the performance of any other suboptimal power allocation scheme which may be designed in practical scenarios with partial channel side information about primary and secondary channels. Indeed, our second aim in this paper is to analyze secondary throughput scaling with a suboptimal power allocation scheme that only requires partial information about the channels involving only the primary terminals (see Section 6 for further details).
1.1 Contributions
 1.
We derive the optimal power control policy for the ergodic sum capacity (ESC) maximization problem under a PU outage probability constraint (POC), under both longterm and shortterm power constraints at the SBS transmitter assuming perfect knowledge of all involved channel gains at the SBS along with the PU’s transmission power control policy. (A typical PU is oblivious to the secondary network and thus its power control policy only depends on the direct gain between primary terminals rather than interferences from the secondary network.)
 (a)
Since the primary outage probability constraint has no closedform expression in general, the MACBC duality result from [8] cannot be applied directly. Different from [8, 9], we propose a novel technique to establish the optimality of an opportunistic scheduling structure that maximizes the SBS ergodic sum rate. This result is then used to transform the originally nonconvex ESC maximization problem to a convex optimization problem.
 (a)
We solve the transformed convex optimization problem by a probabilistic power allocation technique [10, 11]. Our optimal power control solutions can be adapted to any arbitrary power control employed by the primary network.
 2.
We derive asymptotic scaling laws (also known as multiuser diversity gains) for the SBS ergodic sum capacity as the number of SUs, M, becomes large when SBS employs the optimal power allocation policy, assuming all channels undergo independent Rayleigh fading. In this part, we additionally presume that the delaysensitive PU uses a truncated channel inversion (TCI) policy. The significance of choosing TCI policy is that it minimizes the primary outage probability in the absence of the secondary network (see [12]). Under either longterm or shortterm power constraint at the SBS, we show that the SBS ESC scales according to ε _{ p } log(logM) with a prelog factor ε _{ p }, where ε _{ p } is the maximum allowable outage probability at the primary receiver in the presence of the SU network.
 3.
We also propose a suboptimal transmission scheme, namely, a 1bit primary feedback scheme, which substantially decreases the cooperation between the primary and the secondary networks compared to the optimal power allocation scheme. More specifically, we show that the secondary network just needs 1bit feedback from the primary receiver to guarantee the QoS in the primary, while the multiuser diversity gain of the suboptimal scheme remains the same as the optimal one.
1.2 Outline of the paper
The remainder of this paper is organized as follows. Related previous works are discussed in Section 2. The description of our system model is presented in Section 3. Under the assumption of full channel side information at SBS and PU’s power strategy being known to SBS, the optimal power control policies for ESC maximizing problem with POC and either longterm transmit power constraint (LTPC) or shortterm transmit power constraint (STPC) are presented in Section 4. In Section 5, we derive the optimal throughput scaling law of ε_{ p } log(logM) under additional assumptions that all channels involved in the problem undergo independent and identically distributed (iid) Rayleigh fading and the PU employs a TCI power control policy. A suboptimal transmission scheme for primary feedback reduction and the associated throughput scaling law are rigorously derived in Section 6. Numerical results are presented in Section 7 followed by some concluding remarks in Section 8.
1.3 Notations
Here is a list of important notations used in this paper. E[.] denotes the statistical expectation. Pr {.} represents probability. The cumulative density function (CDF) of a random variable Z is given by F_{ Z }(z) whereas F_{ Z }(zY) expresses the conditional CDF of Z given Y. Let X_{ w } be a Bernoulli random variable such that X_{ w }=1 with probability w and X_{ w }=0 with probability 1−w. π(i) denotes a permutation function from {1,2,…,M} to {1,2,…,M}. ℜ_{+} represents the set of positive real numbers. $\frac{\mathrm{\partial y}}{\partial {x}^{\ast}}$ denotes the partial derivative of y with respect to x, evaluated at x=x^{∗}. min(a,b)=a if a≤b. p^{T} represents the transpose of vector p. ${\mathcal{S}}^{c}$ represents the complement of the set . We also use the notation f(x)=O(g(x)) to imply that $lim\underset{x\to \infty}{sup}\mid \frac{f\left(x\right)}{g\left(x\right)}\mid <\infty $, f(x)=o(g(x)) to imply that $\underset{x\to \infty}{lim}\mid \frac{f\left(x\right)}{g\left(x\right)}\mid =0$ and f(x)=Θ(g(x)) as x→∞ to imply that there exist positive constants K_{1} and K_{2} such that ${K}_{1}<\mid \frac{f\left(x\right)}{g\left(x\right)}\mid <{K}_{2}$.
2 Related works
For a singleuser SISO cognitive underlay paradigm, POC was introduced in an ergodic capacity maximization problem [14], assuming that the delaysensitive PU uses a constant power control (which is not energyefficient from the primary user’s perspective). However, this result cannot be generalized to downlink channels due to nonconvexity in the expression of ESC for a CBC.
Information theoretic capacity notions for noncognitive SISO fading broadcast channels were investigated in, e.g. [5, 7]. In [7], the authors showed that the base station allocates a given time slot (over which the fading channel remains invariant) to the user with the strongest reception only so as to maximize the total throughput, implying that an opportunistic scheduling or the socalled dynamic timedivisionmultipleaccess (DTDMA) is optimal. The amount of transmission power is allocated according to a waterfilling policy. Using the duality result from [8], the authors of [9] investigated the optimal power control for ESC maximization in the SISO fading CBC under both average/peak transmit power constraints and PIPC/AIPC, proving that opportunistic scheduling is the optimal scheme for achieving the ESC in CBC. However, the optimal power allocation policy under POC (which is a more suitable metric to assure the quality of service for a delaysensitive PU) has not been addressed so far in the existing literature.
Opportunistic user selection strategies have also motivated researchers to analyze how the ESC scales as the number of users M increases. The analysis for throughput scaling in noncognitive multipleinput multipleoutput (MIMO) BC is provided in [15]. For underlay cognitive radio networks, there are a number of works studying multiuser diversity. For example, in [16], the authors studied the cognitive multipleaccess (CMAC) system under a peak transmit power constraint at each secondary transmitter and a peak interference power constraint at the primary receiver and analyzed capacity scaling as the ratio of the transmit power to the interference power approaches infinity. In [17], secondary capacity gains in CMAC are investigated with the user selection criterion based on the strongest secondary direct channel and the weakest interference channel under a peak interference constraint. Later in [18], the multiuser interference diversity is examined for three types of cognitive networks, including CMAC, CBC, and cognitive parallel access channel (CPAC), under peak transmit power and peak interference power constraints. Later in [19], the authors investigated ergodic sum capacity scaling in SISO CMAC under a hybrid scheduling policy, i.e. by first selecting a set of eligible secondary transmitters which do not violate the interference quota and then choosing secondary transmitters that can be active. The same authors generalized the result in [19] to multiuser multiantenna cognitive networks [20] with peak transmit power constraint at the secondary network, and peak interference power constraint at the primary receivers for both uplink and downlink channels was examined.
In order to make asymptotic analyses more tractable, the multiuser diversity has been studied mainly under suboptimal power allocation schemes, e.g. in [15, 19–21]. Note that these results under suboptimal power allocation schemes simply provide lower bounds and do not necessarily reflect the optimal throughput scaling of the network. To establish a benchmark for justifying the efficiency of any suboptimal scheme, such as those based on partial CSI, it is crucial to derive throughput scaling under the optimal transmission power allocation scheme. Recently, the multiuser diversity gain under optimal power control in CMAC under average transmit and average interference power constraints with various types of fading channels was investigated in [22].
3 System model
Remark
1 . Clearly, the knowledge of full CSI at SBS of the channels involving the primary terminals is not easy to achieve. In recent literature, some practical schemes have been suggested for obtaining such information at the ST in [32]. For STPR channels in FDD, it is suggested that the CSI at the PR is fed back to the SBS from the primary base station (PBS) (which is in communication with its PR) through an errorfree backhaul link of negligible delay. Indeed, just as base station cooperation has become a reality via coordinated multipoint (CoMP) technology in the longterm evolution (LTE) systems, it is not unimaginable that the cooperation between SBS and PBS will become common, especially because it assists both the PUs and SUs in their interference management endeavour. It is also envisaged that some financial incentives may be used to encourage the primary service provider to facilitate such information exchange with the secondary service provider [33]. For PTPR channels, various suggestions have been made including that of eavesdropping on PR feedback to PT [34] and receiving feedback from a cooperative SU node employed near the PR [35], while information about PTSR and STSR channels can be obtained via classical channel feedback and training schemes based on pilot signals from the PT and ST, respectively. Finally, note that the analysis of throughput scaling in Section 5 based on full CSI serves the important purpose of a benchmark for any schemes based on imperfect CSI, such as the one with a 1bit primary feedback scheme proposed in Section 6.
In this work, we assume that the QoS guarantee of the delaysensitive PU with a target rate ${r}_{p}^{0}$ allows a maximum primary outage probability of ε_{ p }. In a typical wireless fading environment, even in the absence of interference from the secondary network, the PU may not be able to avoid an outage event when the PTPR channel is in deep fade. For example, with an average or peak transmit power constraint, the PU cannot meet the target rate for a Rayleigh fading channel if it falls below a certain threshold [12]. We further presume that the PU’s power policy is designed to allow for a maximum PU outage probability of ${\epsilon}_{p}^{0}\le {\epsilon}_{p}$ in the absence of the secondary interference. Thus, the secondary network is allowed to cause an additional outage with probability ${\epsilon}_{p}{\epsilon}_{p}^{0}$. Furthermore, let P_{ p }(g) define the transmission power policy at the PU. (As mentioned earlier, it is typical to assume that transmission power allocation policy at the PU is based on the direct gain g only.).
where π(.) is the permutation that specifies the optimal decoding order, i.e. z_{π(M)}>z_{π(M−1)}>⋯>z_{π(1)} and ${z}_{i}=\frac{{h}_{i}}{\alpha {P}_{p}\left(g\right)+{N}_{0}}$. In other words, z_{ i } represents the signaltointerferenceplusnoise ratio (SINR) of the i th user whereas z_{π(i)} is the SINR of the π(i)th user based on the optimal decoding order π(i). Note that the sumcapacity expression can be obtained by successive decoding with interference cancellation [8, 36]. Also, note that we drop the constant $\frac{1}{2}$ in the instantaneous rate expressions in (6) and use natural logarithm for simplicity. We also assume that the AWGN variance in each SR is given by N_{0}. Obviously, ${r}_{s}^{\text{BC}}(\chi ,\mathbf{P}(\chi \left)\right)$ is not concave over P(χ). In the next section, we first establish the optimality of an opportunistic scheduling structure in our setup which allows us to reformulate (5) as a convex optimization problem.
4 Optimal power strategies
In this section, we focus on the optimal power allocation strategy in the secondary network which maximizes ESC under POC at the primary link with a limited power budget at the SBS. The transmission power resource is confined by either LTPC (average transmit power constraint) or STPC (peak transmit power constraint). First, we look at the ESC maximizing problem subject to POC when the transmission power at the SBS is limited by LTPC in Section 4.1. Later, the ESC maximizing problem under POC and STPC will be considered in Section 4.2.
4.1 Optimal power policy for LTPC
The optimal power policy solving (7) is given by Theorem 1.
Theorem 1.
where ${i}^{\ast}=arg\underset{m\in \mathcal{I}}{max}\phantom{\rule{2.83795pt}{0ex}}{z}_{m}$, ${p}_{\mathit{\text{WF}}}^{\ast}\left(\chi \right)={(\frac{1}{{\Lambda}^{\ast}}\frac{1}{max{z}_{m}})}^{+}$, ${p}_{\mathit{\text{RP}}}^{\ast}\left(\chi \right)=\frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+}$, ${\mathcal{B}}_{1,\chi}^{B}={r}_{s}^{\mathit{\text{BC}}}(\chi ,{\mathbf{p}}_{1}^{\ast}(\chi \left)\right){\Lambda}^{\ast}{\mathbf{1}}^{T}{\mathbf{p}}_{1}^{\ast}\left(\chi \right)+{S}^{\ast}$ and ${\mathcal{B}}_{2,\chi}^{B}={r}_{s}^{\mathit{\text{BC}}}(\chi ,{\mathbf{p}}_{2}^{\ast}(\chi \left)\right){\Lambda}^{\ast}{\mathbf{1}}^{T}{\mathbf{p}}_{2}^{\ast}\left(\chi \right).$
The Lagrange multipliers Λ^{∗} and S^{∗} are the solutions to $E\left[\sum _{i=1}^{M}{P}_{i}^{\ast}\left(\chi \right)\right]={P}_{\text{av}}$ and E[w^{∗}(χ)]≥1−ε_{ p }. ■
Proof.
The proof relies on the optimality of an opportunistic scheduling structure as first proved in Appendix 1: opportunistic scheduling structure of the optimal power policy (see Lemmas 1 and 2). Based on this result, the proof of the optimal power control policy as presented by Theorem 1 above is given in Appendix 2
where ${r}_{s}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right)=log(1+\stackrel{\u0306}{P}(\chi \left){z}_{max}\right)$ represents the instantaneous sumcapacity expression of the secondary broadcast channels by using the opportunistic scheduling structure, and the objective function in (11) is concave over $\stackrel{\u0306}{P}\left(\chi \right)$.
Theorem 1 also reveals that the optimal power policy of the problem (7) can be constructed by utilizing two deterministic power allocation schemes with opportunistic scheduling structure, i.e. ${\mathbf{P}}^{\ast}\left(\chi \right)={\mathbf{p}}_{1}^{\ast}\left(\chi \right)$ in (8) if w^{∗}(χ)=1 and ${\mathbf{p}}_{2}^{\ast}\left(\chi \right)$ in (9) if w^{∗}(χ)=0. The intuitive explanation of the optimal power control policy is that for a given joint channel state χ, the SBS can design the power control policy under only two options, i.e. by either putting the PU in outage or not putting the PU not in outage. The deterministic power policy ${\mathbf{p}}_{2}^{\ast}\left(\chi \right)$ in (9) represents the optimal power policy which the PU is in outage, i.e. the SBS allocates power ${p}_{2,i}^{\ast}\left(\chi \right)={p}_{\text{WF}}^{\ast}\left(\chi \right)$ for the i th SR with $i=arg\underset{m\in \mathcal{I}}{\text{max}}\phantom{\rule{2.77626pt}{0ex}}{z}_{m}$ according to the wellknown waterfilling power policy and zero power to the other remaining SRs. Note that the solution is similar to the optimal power policy of the sum capacity maximizing problem in noncognitive broadcast channels [7] since the SBS decides to put the PU in outage. On the other hand, ${\mathbf{p}}_{1}^{\ast}\left(\chi \right)$ denotes the optimal power policy when the SBS ensures the service quality in the primary link. In this case, the SBS still allocates a transmission power with waterfilling power policy to the scheduled user as long as ${p}_{\text{WF}}^{\ast}\left(\chi \right)\le {p}_{\text{RP}}^{\ast}\left(\chi \right)=$. However, if ${p}_{\text{WF}}^{\ast}\left(\chi \right)>{p}_{\text{RP}}^{\ast}\left(\chi \right)$, the transmission power is ${p}_{\text{RP}}^{\ast}\left(\chi \right)$ since ${p}_{\text{RP}}^{\ast}\left(\chi \right)$ is the maximum transmission power from the SBS that can ensure that the PU is not in outage, i.e. the primary rate equals the primary target rate. Therefore, the waterfilling power policy is capped by ${p}_{\text{RP}}^{\ast}\left(\chi \right)$. Between these two deterministic power policies, the SBS utilizes the policy which returns the highest benefit, i.e. if the benefit function ${\mathcal{B}}_{1,\chi}^{B}$ of the power policy ${\mathbf{p}}_{1}^{\ast}\left(\chi \right)$ is greater than the benefit function ${\mathcal{B}}_{2,\chi}^{B}$ of the power policy ${\mathbf{p}}_{2}^{\ast}\left(\chi \right)$, then w^{∗}(χ)=1. If ${\mathcal{B}}_{1,\chi}^{B}<{\mathcal{B}}_{2,\chi}^{B}$, w^{∗}(χ)=0, implying that the SBS uses the power policy ${\mathbf{p}}_{2}^{\ast}\left(\chi \right)$.
4.2 Optimal power policy for STPC
The optimal power policy solving (12) is given by Theorem 2. See Appendix 3: optimal solution of for STPC for a detailed proof.
Theorem 2.
where ‘st’ in the superscript stands for ‘shortterm’ and ${i}^{\ast}=arg\underset{m\in \mathcal{I}}{max}\phantom{\rule{2.83795pt}{0ex}}{z}_{m}$. Also, ${\mathcal{B}}_{1,\chi}^{B,\mathit{\text{st}}}={r}_{s}(\chi ,{\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}(\chi \left)\right){\Lambda}^{\ast ,\mathit{\text{st}}}\left(\chi \right){\mathbf{1}}^{T}{\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}\left(\chi \right)+{S}^{\ast ,\mathit{\text{st}}}$ and ${\mathcal{B}}_{2,\chi}^{B,\mathit{\text{st}}}={r}_{s}(\chi ,{\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}(\chi \left)\right){\Lambda}^{\ast ,\mathit{\text{st}}}\left(\chi \right){\mathbf{1}}^{T}{\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}\left(\chi \right)$. Lagrange multipliers Λ^{∗,s t}(χ) and S^{∗,s t} are the solutions to $\sum _{i=1}^{M}{P}_{i}^{\ast ,\mathit{\text{st}}}\left(\chi \right)\le {P}_{O}$ and E[w^{∗,s t}(χ)]≥1−ε_{ p }. ■
Similar to Section 4.1, it can be shown that the objective function in (16) is concave over ${\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)$.
For the STPC, Theorem 2 reveals that the SBS also chooses one of the two deterministic power allocation policies, i.e. the SBS can either decide to ensure the QoS in the primary link by using the power policy ${\mathbf{p}}_{1}^{\ast ,\text{st}}\left(\chi \right)$ in (14) or ignore the PU’s QoS requirement by using the power policy ${\mathbf{p}}_{2}^{\ast ,\text{st}}\left(\chi \right)$ in (14). This decision relies on w^{∗,st}(χ) in (15). However, the SBS allocates transmission power based on the constant power control with peak power P_{ O } to the scheduled SR in the STPC case instead of using the waterfilling power policy in the LTPC case.
Remark 2.
As opposed to the result in [14] where the PU utilizes a constant power policy, the optimal power allocation strategies in Theorems 1 and 2 are applicable to any arbitrary PU power allocation policy as long as the primary user is oblivious to the secondary network, i.e. the PU’s power allocation policy is not a function of the SBS’s transmission power allocation function.
5 Throughput scaling with truncated channel inversion policy at PU
In this section, we derive asymptotic scaling laws of the SBS ergodic sum capacity when the number of SUs grows large, under the assumption that all channel power gains are independent and identically distributed and they are also presumed to be exponentially distributed with unity mean. Also, we focus on the case where the PU uses the TCI policy. The motivation behind the assumption of a TCI power policy at the PU is that TCI is the optimal power allocation policy for minimizing the information outage probability under a long/short transmit power constraint for a delaysensitive user. More specifically, the TCI power control policy employed at the PU in this paper can be described as follows: PU’s transmit power adapts according to the direct channel gain g when the PU is ON with transmission power ${P}_{p}\left(g\right)=\frac{({e}^{{r}_{p}^{0}}1){N}_{0}}{g}$ when g≥g_{ T } and P_{ p }(g)=0 otherwise. Note also that g_{ T } is chosen such that for $\text{Pr}(g<{g}_{T})={\epsilon}_{p}^{0}$.
Given that the PU employs a TCI power policy, in Section 5.1, we present the optimal channel partitioning structures dictated by the optimal power allocation strategies in Theorem 1 for LTPC and in Theorem 2 for STPC. We show that the space of joint channel states $\chi \in {\Re}_{+}^{2M+2}$ can be separated into three regions for the ESC maximizing problem subject to POC and either LTPC or STPC. Aided by these results in Section 5.1, the optimal throughput scaling laws of the SBS ergodic sum capacity under POC and LTPC will be derived in Section 5.2. Finally, Section 5.3 will present the optimal throughput scaling laws of the SBS ergodic sum capacity under POC and STPC.
5.1 Optimal channel state partitioning structure
Three possible channel state regions for the fading channel state χ for LTPC
Region  Channel  Optimal  Outage  Probability 

state  power  at PU  
region  control  
1  g<g_{ T }  ${p}_{\text{WF}}^{\ast}$  Yes (PU turns OFF)  ${\epsilon}_{p}^{0}$ 
2  g≥g_{ T }, ${\mathcal{B}}_{1,\chi}^{B}\le {\mathcal{B}}_{2,\chi}^{B}$  ${p}_{\text{WF}}^{\ast}$  Yes  ${\epsilon}_{p}{\epsilon}_{p}^{0}$ 
3  g≥g_{ T }, ${\mathcal{B}}_{1,\chi}^{B}>{\mathcal{B}}_{2,\chi}^{B}$  ${p}_{\text{RP}}^{\ast}=0$  No  1−ε_{ p } 
Table 1 reveals the intuitive explanation of the transmission mechanism at the SBS for the LTPC case. In region 1, the PU stops transmitting as g<g_{ T } and faces an outage even if there is no interference from the secondary network. In this case, the SBS will allocate power based on waterfilling power policy to the scheduled SR. Also note that there is no interference from the primary transmitter to the secondary network as the PU turns off in this case. When g≥g_{ T }, the PU is ON with ${P}_{p}\left(g\right)=\frac{{k}_{1}}{g}$ where ${k}_{1}=\left({e}^{{r}_{p}^{0}}1\right){N}_{0}$ and thus, any positive transmission power from the SBS can put the PU in outage. Therefore, the SBS must switch OFF if the SBS decides to protect the service quality in the primary link. In region 2, the SBS still decides to transmit because the power policy that puts PU in outage (${\mathbf{p}}_{2}^{\ast}$) returns a higher profit than the power policy that protects the primary transmission (${\mathbf{p}}_{1}^{\ast}$), i.e. ${\mathcal{B}}_{1,\chi}^{B}\le {\mathcal{B}}_{2,\chi}^{B}$. The SBS then allocates power ${p}_{\text{WF}}^{\ast}$ to the scheduled SR. In region 3, the SBS knows that it is more profitable to stop its data transmission and ensure the service quality in the PU’s link, i.e. ${\mathcal{B}}_{1,\chi}^{B}>{\mathcal{B}}_{2,\chi}^{B}$.
Three possible channel state regions for the fading channel state χ for STPC
Region  Channel  Optimal  Outage  Probability 

state  power  at PU  
region  control  
1  g<g_{ T }  P _{ O }  Yes (PU turns OFF)  ${\epsilon}_{p}^{0}$ 
2  g≥g_{ T }, ${\mathcal{B}}_{1,\chi}^{B,\text{st}}\le {\mathcal{B}}_{2,\chi}^{B,\text{st}}$  P _{ O }  Yes  ${\epsilon}_{p}{\epsilon}_{p}^{0}$ 
3  g≥g_{ T }, ${\mathcal{B}}_{1,\chi}^{B,\text{st}}>{\mathcal{B}}_{2,\chi}^{B,\text{st}}$  ${p}_{\text{RP}}^{\ast}=0$  No  1−ε_{ p } 
Remark 3.
Note that if S^{∗}=0 in the LTPC case (or S^{∗,st}=0 in the STPC case), the SBS can transmit with ${p}_{\text{WF}}^{\ast}$ (waterfilling) in the LTPC case or P_{ O } in the STPC case without making the POC active, as if the primary network never existed. This scenario then simplifies to a noncognitive broadcast channel, and it has been shown in [15] that in this case the ergodic sum rate scales according to log(logM) as M becomes large. In this paper, we will analyze the throughput scaling laws only for the case when S^{∗}>0 for LTPC and S^{∗,st}>0 for STPC.
5.2 Throughput scaling for the LTPC case
In this section, we focus on the derivation of throughput scaling when the SBS employs the optimal power allocation policy according to Theorem 1 (LTPC case). The main result of this section is summarized in Theorem 3, a detailed proof of which is provided in Appendix 4: proof of Theorem 3.
Theorem 3.
The intuitive explanation for Theorem 3 is that when PU uses a TCI power control, the SBS is forced to turn off for the channel fading states in which the PU link QoS can be compromised since the SBS transmission results in the violation of POC. Since the primary outage probability threshold is ε_{ p }, the SBS is allowed to transmit with probability ε_{ p } which leads to the prelog factor term.
5.3 Throughput scaling for the STPC case
In this section, we will derive the throughput scaling result due to the optimal power allocation in Theorem 2 (STPC). The main result of this section can be summarized in Theorem 4, a detailed proof of which is provided in Appendix 5: proof of Theorem 4.
Theorem 4.
The intuitive reason for the appearance of the prelog factor ε_{ p } is similar to the LTPC case with TCI power control at PU.
6 Suboptimal transmission scheme with feedback reduction
In the optimal power policy, the SBS requires the information of the entire channel state χ which includes g and β in order to schedule the SR as well as compute the optimal outage region of the PU and the optimal transmission power. As mentioned earlier, the SBS can obtain the perfect CSI of the interference gain β between the SBS and the primary receiver by measuring the received power of signals transmitted by the PR. For PTPR channels, it is suggested that the SBS can eavesdrop on PR feedback to PT [34] or receive the feedback from a cooperative SU node employed near the PR [35]. Both STPR and PTPR link information can also be obtained via backhaul links from a cooperative PBS possibly via pricing [33]. In this section, we propose a new suboptimal scheme which can further reduce the cooperation between the primary receiver and the secondary network by receiving just only 1bit feedback from the PR, or if the SBS can feedback from PR, no cooperation is required. In this scheme, the PU predefines the PU outage region (suboptimal) based on the direct gain g only, so the outage/nonoutage status of the PU can be realized at the SBS by using just 1bit feedback from the PR. The corresponding opportunistic scheduling and power allocation policy for either LTPC or STPC are also proposed. It is important to note that by using this scheme, the SBS ESC still scales like ε_{ p } log(logM) as M grows large (asymptotically optimal). The details of the suboptimal scheme are as follows:

Initially, the channel state for the direct channel gain g between the PT and the PR is divided into two regions: the nonoutage region $g\in [\phantom{\rule{0.3em}{0ex}}{g}_{T},{\stackrel{~}{g}}_{T}]$, where the secondary network must not transmit in order to guarantee the primary link’s service quality, and the outage region, $g\in {G}_{\text{outage}}=\phantom{\rule{2.77626pt}{0ex}}[\phantom{\rule{0.3em}{0ex}}0,{g}_{T}]\bigcup \left[{\stackrel{~}{g}}_{T},\right.\left(\right)close=")">\infty $, where the secondary network can transmit. The value ${\stackrel{~}{g}}_{T}$ is chosen such that ${\epsilon}_{p}{\epsilon}_{p}^{0}=1{F}_{G}\left({\stackrel{~}{g}}_{T}\right)$, so that the outage probability in the primary link is ensured to be less than ε_{ p }. Further note that g_{ T } and ${\stackrel{~}{g}}_{T}$ depend on the distribution of the channel gain g rather than their instantaneous values.

Feedback policy The primary receiver sends a feedback of ‘0’ to its transmitter (and the SBS if cooperating) if $g\notin {G}_{\text{outage}}$ to halt the transmission activity in the secondary network, whereas it sends a feedback of ‘1’ if the SBS is allowed to transmit when $g\in {G}_{\text{outage}}$.

Opportunistic scheduling policy In the perfect CSI case, the SBS will schedule the SR with maximum $\frac{{h}_{m}}{{\alpha}_{m}{P}_{p}\left(g\right)+{N}_{0}}$ which requires the knowledge of P_{ p }(g). However, in the new scheme, we can assume that the SBS is pessimistic by always assuming that ${P}_{p}\left(g\right)={P}_{p}\left({\stackrel{~}{g}}_{T}\right)$, i.e. the PU transmits the maximum power of the range $g\in {G}_{\text{outage}}$. Therefore, the SBS will schedule the SR with maximum ${\stackrel{~}{\rho}}_{m}=\frac{{h}_{m}}{{\alpha}_{m}{P}_{p}\left({\stackrel{~}{g}}_{T}\right)+{N}_{0}}$ and the ergodic sum rate can be expressed as$\begin{array}{l}{C}_{\text{Partial}}^{\text{BC}}\phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}\mathit{\text{Pr}}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\right\}\phantom{\rule{0.3em}{0ex}}E\left[log(1\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}{P}_{\text{Partial}}(\chi \left){\stackrel{~}{\rho}}_{max}\right)\right\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\left(\right)close="]">{G}_{\text{outage}}\end{array}$(17)

where ${\stackrel{~}{\rho}}_{max}=\underset{m}{max}\phantom{\rule{2.77626pt}{0ex}}{\stackrel{~}{\rho}}_{m}$ and P_{Partial}(χ) is the SBS’s transmission power allocated to the SR with maximum ${\stackrel{~}{\rho}}_{max}$. Note that the statistical behaviour of ${\stackrel{~}{\rho}}_{m}$ is independent of g.

Power allocation policies and throughput scaling results For STPC, the power allocation policy at the SBS is straightforward. The SBS transmits with the maximum power P_{ O } when $g\in {G}_{\text{outage}}$. The ergodic sum rate for STPC becomes$\begin{array}{ll}{C}_{\text{Partial}}^{\text{BC, STPC}}& =\text{Pr}\left\{{G}_{\text{outage}}\right\}E\left[log(1+{P}_{O}{\stackrel{~}{\rho}}_{max})\right\left(\right)close="]">{G}_{\text{outage}}\end{array}={\epsilon}_{p}E\left[log(1+{P}_{O}{\stackrel{~}{\rho}}_{max})\right]$(18)

For LTPC, we have to solve the following optimization problem:$\begin{array}{l}\underset{{P}_{\text{Partial}}\left(\chi \right)}{max}\phantom{\rule{2.77626pt}{0ex}}\phantom{\rule{0.3em}{0ex}}\text{Pr}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\right\}\phantom{\rule{0.3em}{0ex}}\xb7\phantom{\rule{0.3em}{0ex}}E\left[log(1\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}{P}_{\text{Partial}}(\chi \left){\stackrel{~}{\rho}}_{max}\right)\right\left(\right)close="]">\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}{G}_{\text{outage}}\end{array}\phantom{\rule{0.75em}{0ex}}\mathit{\text{s.t.}}\text{Pr}\left\{{G}_{\text{outage}}\right\}E\left[{P}_{\text{Partial}}\left(\chi \right)\right\left(\right)close="]">{G}_{\text{outage}}& \le {P}_{\text{av}}.$(19)

It is easy to show that the solution to the optimization problem in (19) is still waterfilling, i.e. ${P}_{\text{Partial}}\left(\chi \right)={\left(\frac{1}{{\Lambda}_{\text{Partial}}}\frac{1}{{\stackrel{~}{\rho}}_{max}}\right)}^{+}$ for $g\in {G}_{\text{outage}}$ and P_{Partial}(χ)=0 for otherwise. Note that Λ_{Partial} satisfies LTPC with equality.

Therefore, the ergodic sum rate for LTPC becomes$\phantom{\rule{17.0pt}{0ex}}\begin{array}{ll}{C}_{\text{Partial}}^{\text{BC, LTPC}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}& \phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}\text{Pr}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\phantom{\rule{0.3em}{0ex}}\right\}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\xb7\phantom{\rule{0.3em}{0ex}}E\left[log\left(\frac{{\stackrel{~}{\rho}}_{max}}{{\Lambda}_{\text{Partial}}}\right){1}_{\left\{{\Lambda}_{\ge \text{Partial}}{\stackrel{~}{\rho}}_{max}\right\}}\phantom{\rule{0.3em}{0ex}}\right\left(\right)close="]">\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}{G}_{\text{outage}}\end{array}={\epsilon}_{p}E\left[log\left(\frac{{\stackrel{~}{\rho}}_{max}}{{\Lambda}_{\text{Partial}}}\right){1}_{\left\{{\stackrel{~}{\rho}}_{max}\ge {\Lambda}_{\text{Partial}}\right\}}\right]$(20)

It is easy to show that both $E\left[log(1+{P}_{O}{\stackrel{~}{\rho}}_{max})\right]$ in the STPC case and $E\left[log\left(\frac{{\stackrel{~}{\rho}}_{max}}{{\Lambda}_{\text{Partial}}}\right){1}_{\left\{{\stackrel{~}{\rho}}_{max}\ge {\Lambda}_{\text{Partial}}\right\}}\right]$ in the LTPC case scale according to log(logM). Therefore, the ergodic sum capacity scales according to ε_{ p } log logM for LTPC as well as STPC under this suboptimal scheme.
7 Numerical results
In this section, we present some numerical results on the performance of the proposed optimal power policies for the capacity maximization problem with POC and LTPC or STPC. All channel gains involved are assumed to be Rayleigh fading, and the corresponding channel power gains are taken to be exponentially distributed with unit mean. Noises at PR and all SRs are presumed to be equal and AWGN with unit variance, i.e. N_{0}=1. Note that this allows the transmit power at the primary and secondary transmitters to be interpreted as signaltonoise ratio at the transmitter side. Unless specified otherwise, PU’s target rate is ${r}_{p}^{0}=1.25$ nat/channel use and the primary outage probability threshold ε_{ p }=0.1. For the primary TCI power policy, we set ${\epsilon}_{p}^{0}=0.05$. For convenience, we further assume that all secondary receivers are identical. The simulation results are based on a Monte Carlo method averaged over 10^{5} channel realizations.
7.1 The effect of POC on the ergodic sum capacity of CBC
7.2 Throughput scaling results with TCI power policy at the PU
8 Conclusions
In this paper, we have investigated the information theoretic results of the ergodic sum capacity in fading cognitive broadcast channels, sharing the same frequency band as a delay sensitive PU. Under an outage probability constraint at the primary receiver, we have derived optimal power allocation strategies to maximize the SBS ergodic sum capacity, under an average (longterm) transmit power constraint or a peak (shortterm) transmit power constraint. As the duality result is not directly applicable, we established a new approach to show that the opportunistic scheduling structure is also optimal under the primary outage probability constraint. This result allowed us to reformulate the ergodic sum capacity expression as a concave function, and the corresponding optimal power policies were derived by using a probabilistic power allocation technique. Under these opportunistic optimal power allocation schemes, we have also analyzed how the SBS sum throughput scales as the number of secondary receivers goes to infinity when all relevant channels undergo independent Rayleigh fading. These asymptotic capacity scaling laws are derived under the assumption that the PU uses a truncated channel inversion policy. Rigorous theoretical analyses show that the SBS sum throughput scales like ε_{ p } log(logM). Further, an asymptotically optimal reduced feedback scheme is proposed. With only a 1bit feedback from the primary receiver, we have shown that the SBS sum throughput for this suboptimal scheme retains like ε_{ p } log(logM) scaling property of the optimal schemes.
Appendix 1: opportunistic scheduling structure of the optimal power policy
Prior to proving that the optimal power policy has an opportunistic scheduling structure, the following Lemma is required.
Lemma 1.
Proof.
We will prove (21) by using induction. For M=2, $log\left(1+\frac{{\gamma}_{1}{x}_{1}}{1+{\gamma}_{1}{x}_{2}}\right)+\phantom{\rule{2.77626pt}{0ex}}log(1+{\gamma}_{2}{x}_{2})=log\left(1+{\gamma}_{1}\sum _{i=1}^{2}{x}_{i}\right)+log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right)$. Since $log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right)$ is increasing in x_{2} as γ_{2}>γ_{1}, we have $log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right)<log\left(\frac{1+{\gamma}_{2}\sum _{i=1}^{2}{x}_{i}}{1+{\gamma}_{1}\sum _{i=1}^{2}{x}_{i}}\right)$. Hence, we have $log\left(1+\frac{{\gamma}_{1}{x}_{1}}{1+{\gamma}_{1}{x}_{2}}\right)+log(1+{\gamma}_{2}{x}_{2})<log\left(1+{\gamma}_{2}\sum _{i=1}^{2}{x}_{i}\right)$.
Again, the last inequality is due to the fact that $log\left(\frac{1+{\gamma}_{K+1}{x}_{K+1}}{1+{\gamma}_{K}{x}_{K+1}}\right)$ is increasing in x_{K+1}. Hence, it follows that (21) is also true for M=K+1, thus completing the proof.
Lemma 2.
Let$\stackrel{~}{\mathbf{P}}\left(\chi \right)$be the optimal power policy of the problem (5). Then,$\stackrel{~}{\mathbf{P}}\left(\chi \right)$has an opportunistic scheduling structure; i.e. for each channel state χ, the SBS allocates power only to the user with maximum z_{ i }and zero power to other remaining users.
Proof.
We will prove Lemma 2 by using contradiction. Let i^{∗}= arg maxz_{ i }. Suppose that the optimal power policy $\stackrel{~}{\mathbf{P}}\left(\chi \right)$ does not possess an opportunistic scheduling structure, i.e. the SBS allocates power to more than one users. Then, we construct another power policy with an opportunistic scheduling structure ${\stackrel{~}{\mathbf{P}}}^{\prime}\left(\chi \right)$ such that ${\stackrel{~}{P}}_{{i}^{\ast}}^{\prime}\left(\chi \right)=\sum _{i=1}^{M}{\stackrel{~}{P}}_{i}\left(\chi \right)$ and ${\stackrel{~}{P}}_{i}^{\prime}\left(\chi \right)=0$ for i≠i^{∗}. It is worth noting that $\sum _{i=1}^{M}{\stackrel{~}{P}}_{\pi \left(i\right)}^{\prime}\left(\chi \right)=\sum _{i=1}^{M}{\stackrel{~}{P}}_{\pi \left(i\right)}\left(\chi \right)$. Therefore, the new power policy ${\stackrel{~}{\mathbf{P}}}^{\prime}\left(\chi \right)$ does not affect the power consumption at the SBS and the outage/nonoutage status in the primary link.
(25) suggests that the SBS allocates the transmit power, $\stackrel{\u0306}{P}\left(\chi \right)$, to the SR with the maximum z _{ m }, where ties can be broken arbitrarily.
Appendix 2: optimal solution of ${\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)$ for LTPC
By the opportunistic scheduling structure shown in Appendix 1: opportunistic scheduling structure of the optimal power policy, the original nonconvex problem in (7) can be converted to convex problem as shown in (11). However, there is no closedform expression of the primary outage probability function in POC. Hence, the convex optimization technique is not directly applicable. By using the same technique as in [10, 11], the following result in Lemma 3 is required.
Lemma 3.
The optimal solution of the problem (11) can be expressed by${\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)=w\left(\chi \right){\stackrel{\u0306}{p}}_{1}\left(\chi \right)+(1w(\chi \left)\right){\stackrel{\u0306}{p}}_{2}\left(\chi \right)$, where E[w(χ)]≥1−ε_{ p }, $E\left[{\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)\right]\le {P}_{\mathit{\text{av}}}$and${r}_{p}(\chi ,{\stackrel{\u0306}{p}}_{1}(\chi \left)\right)\ge {r}_{p}^{0}$ for all χ. ■
Proof.
Following a similar procedure to that in [11], we will show that an optimal power control for (11) can be constructed by randomizing between two deterministic power allocation schemes, i.e. ${\stackrel{\u0306}{p}}_{1}\left(\chi \right)$$=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}\right]$ and ${\stackrel{\u0306}{p}}_{2}\left(\chi \right)=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)<{r}_{p}^{0}\right]$. The probability of using the power policy ${\stackrel{\u0306}{p}}_{1}\left(\chi \right)$ is indicated by the weighting function w(χ), which can be expressed as $w\left(\chi \right)=\mathit{\text{Pr}}\left\{{r}_{p}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right)\ge {r}_{p}^{0}\left\right.\chi \right\}$ and therefore the probability of using the power policy ${\stackrel{\u0306}{p}}_{2}\left(\chi \right)$ equals 1−w(χ).
We first show that given an arbitrary feasible probabilistic power scheme $\stackrel{\u0306}{P}\left(\chi \right)$, we can always construct another feasible scheme ${\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)$ which is randomized among deterministic power schemes ${\stackrel{\u0306}{p}}_{k}\left(\chi \right),\phantom{\rule{2.77626pt}{0ex}}k=1,2$ with a timesharing factor w(χ) and performs equally well or better than $\stackrel{\u0306}{P}\left(\chi \right)$. Since $\stackrel{\u0306}{P}\left(\chi \right)$ is feasible, $\stackrel{\u0306}{P}\left(\chi \right)$ satisfies all the constraints, i.e. $E\left[\stackrel{\u0306}{P}\right(\chi \left)\right]\le {P}_{\text{av}}$ and $\text{Pr}\left\{log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta \stackrel{\u0306}{P}\left(\chi \right)})<\underset{p}{\overset{0}{r}}\right\}\le {\epsilon}_{p}$. Note that when ${r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}$, it implies that $\stackrel{\u0306}{p}\left(\chi \right)\le \frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+}$ i.e. the possible solution lies in a halfspace. Therefore, ${\stackrel{\u0306}{p}}_{1}\left(\chi \right)=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}\right]\le \frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+}$, i.e. a convex combination of the possible solutions in that halfspace weighted by the probability that each solution can happen also lies in that halfspace. So, $log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta {\stackrel{\u0306}{p}}_{1}\left(\chi \right)})\ge \underset{p}{\overset{0}{r}}$.
Thus, ${\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)$ satisfies POC since $\text{Pr}\left\{{\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)={\stackrel{\u0306}{p}}_{1}\left(\chi \right)\right.\phantom{\rule{1em}{0ex}}\phantom{\rule{1em}{0ex}}\left(\right)close="\}">\left(\right)close="">\chi =w\left(\chi \right)$ and then it can be shown that $E\left[\text{Pr}\left\{log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)})\ge \underset{p}{\overset{0}{r}}\left(\right)close="">\chi \right\}\right]$.
Next, we can show that ${\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)$ also satisfies LTPC since $E\left[{\stackrel{\u0306}{P}}^{\prime}\right(\chi \left)\right]=E\left[w\right(\chi \left){\stackrel{\u0306}{p}}_{1}\right(\chi )+(1w\left(\chi \right)\left){\stackrel{\u0306}{p}}_{2}\right(\chi \left)\right]=E\left[\stackrel{\u0306}{P}\right(\chi \left)\right]\le {P}_{\text{av}}$.
Due to concavity of ${r}_{s}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right)$ in (11), we can apply Jensen’s inequality to arrive at the final result that $E\left[{r}_{s}\right(\chi ,{\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)\left)\right]\ge E\left[{r}_{s}\right(\chi ,\stackrel{\u0306}{P}\left(\chi \right)\left)\right]$, i.e. ${\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)$ achieves higher ergodic sum rate than $\stackrel{\u0306}{P}\left(\chi \right)$.
where ${p}_{\text{WF}}^{\ast}\left(\chi \right)={(\frac{1}{{\Lambda}^{\ast}}\frac{1}{{z}_{max}})}^{+}$. Finally, by applying the opportunistic scheduling structure shown in (25), we have the result in Theorem 1.
Appendix 3: optimal solution of ${\stackrel{\u0306}{P}}^{\ast ,\text{st}}\left(\chi \right)$ for STPC
Similar to Section 4.1, the objective function in (11) is concave over ${\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)$. To apply the same technique as in Appendix 3: optimal solution of ${\stackrel{\u0306}{P}}^{\ast ,\text{st}}\left(\chi \right)$ for STPC, the following result in Lemma 4 is required.
Lemma 4.
The optimal solution of the problem (16) can be expressed by${\stackrel{\u0306}{P}}^{\ast ,\mathit{\text{st}}}\left(\chi \right)={w}^{\mathit{\text{st}}}\left(\chi \right){\stackrel{\u0306}{p}}_{1}^{\mathit{\text{st}}}\left(\chi \right)+(1{w}^{\mathit{\text{st}}}(\chi \left)\right){\stackrel{\u0306}{p}}_{2}^{\mathit{\text{st}}}\left(\chi \right)$, where E[w^{ s t }(χ)]≥1−ε_{ p }, ${\stackrel{\u0306}{P}}^{\ast ,\mathit{\text{st}}}\left(\chi \right)\le {P}_{O}$and${r}_{p}(\chi ,{\stackrel{\u0306}{p}}_{1}^{\mathit{\text{st}}}(\chi \left)\right)\ge {r}_{p}^{0}$for all χ. ■
Proof.
Following a similar procedure to the proof of Lemma 3, we can prove that an optimal power control for (16) can be constructed by randomizing between two deterministic power allocation schemes, i.e. ${\stackrel{\u0306}{p}}_{1}^{\text{st}}\left(\chi \right)=E\left[{\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)\left\right.{r}_{p}(\chi ,{\stackrel{\u0306}{p}}^{\text{st}}(\chi \left)\right)\ge {r}_{p}^{0}\right]$ and ${\stackrel{\u0306}{p}}_{2}^{\text{st}}\left(\chi \right)=E\left[{\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)\left\right.{r}_{p}(\chi ,{\stackrel{\u0306}{p}}^{\text{st}}(\chi \left)\right)<{r}_{p}^{0}\right]$. The probability of using the power policy ${\stackrel{\u0306}{p}}_{1}^{\text{st}}\left(\chi \right)$ is indicated by the weighting function w^{st}(χ), which can be expressed as ${w}^{\text{st}}\left(\chi \right)=\text{Pr}\left\{{r}_{p}(\chi ,{\stackrel{\u0306}{P}}^{\text{st}}(\chi \left)\right)\ge {r}_{p}^{0}\left\right.\chi \right\}$, and therefore the probability of using the power policy ${\stackrel{\u0306}{p}}_{2}^{\text{st}}\left(\chi \right)$ equals 1−w^{st}(χ).
By Lemma 4, we can get the reformulated version of (16). Following the same procedure as in the LTPC case in Appendix 2: optimal solution of ${\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)$ for LTPC, we can apply the necessary and sufficient KKT conditions and the fact that the fading channel state is continuous, use the opportunistic scheduling structure in (25) and arrive at the optimal power policy summarized in Theorem 2.
Appendix 4: proof of Theorem 3
where t^{−1}(.) represents the inverse function of t.
Lemma 5.
and Λ^{∗} is bounded away from 0 for all M.
Proof.
Now suppose that $\underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}=0$. Then, for an arbitrarily small ε>0, there exists M_{ o } such that for M≥M_{ o }, ${\Lambda}_{M}^{\ast}\le \epsilon $. Therefore, ${(\frac{1}{{\Lambda}_{M}^{\ast}}\frac{1}{{z}_{max}})}^{+}\ge {(\frac{1}{\epsilon}\frac{1}{{z}_{max}})}^{+}$. For an M sufficiently large, $\frac{1}{{z}_{max}}$ converges to 0 in probability, implying that ${(\frac{1}{\epsilon}\frac{1}{{z}_{max}})}^{+}$ converges to $\frac{1}{\epsilon}$ in probability. Hence, ${(\frac{1}{{\Lambda}_{M}^{\ast}}\frac{1}{{z}_{max}})}^{+}\ge \frac{1}{\epsilon}$ with high probability. So, with an arbitrary small ε, SU will violate the power constraint with high probability if $\underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}=0$. Consequently, $\underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}>0$.
Note that the last equality from (33) is because of $\underset{{z}_{max}={\Lambda}_{M}^{\ast}}{\overset{\infty}{\int}}\frac{1}{{z}_{max}}d{F}_{Z}^{M}\left({z}_{max}\left\right.{\mathcal{S}}_{1}\right)$ and ${F}_{Z}^{M}\left({\Lambda}_{M}^{\ast}\left\right.{\mathcal{S}}_{1}\right)$ approach zero as M→∞.
Lemma 6.
For${\epsilon}_{p}>{\epsilon}_{p}^{0}$, $\frac{1}{{t}^{1}\left({S}^{\ast}\right)}=\Theta (logM)$.
Proof.
First, notice that the SBS will allocate transmission power only to the user with z_{max} and $max\frac{{h}_{i}}{\frac{{k}_{1}}{{g}_{T}}{\alpha}_{i}+{N}_{0}}\le {z}_{max}\le max\frac{{h}_{i}}{{N}_{0}}$ regardless the value of g. This fact allows us to study how the upper and lower bounds of z_{max} scales as M grows large. By using the results from [22, 37], we can show that z_{max} is upperandlowerbounded by logM as M→∞. Hence, z_{max} also scales as logM when M tends to infinity.
Now we assume that $\frac{1}{{t}^{1}\left({S}^{\ast}\right)}$ grows faster than logM as M→∞. This implies that for a large enough M, $\text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{2}}\right)$ converges to 0, which contradicts the fact that $\text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{2}}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}>0$ for all M. Next, assume that $\frac{1}{{t}^{1}\left({S}^{\ast}\right)}$ grows slower than logM. This implies that when M is large enough, $\text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{3}}\right)$ converges to 0, which contradicts the fact that $\text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{3}}\right)=1{\epsilon}_{p}>0$ for all M. Thus, $\frac{1}{{t}^{1}\left({S}^{\ast}\right)}=\Theta (logM)$.
Observe that the SBS gains no throughput from the region 3. We will show that the asymptotic throughput achieved by the secondary network scales as ε_{ p } log(logM), where the optimal power control policy in the region 1 contributes ${\epsilon}_{p}^{0}log(logM)$ of the optimal throughput scaling, while the remaining $({\epsilon}_{p}{\epsilon}_{p}^{0})log(logM)$ is obtained from the optimal power control policy in the region 2. In order to do so, the results derived above will facilitate us to arrive at the result in Theorem 3 for both (1) when ${\epsilon}_{p}={\epsilon}_{p}^{0}$ (additional outage probability is not allowed) and (2) when ${\epsilon}_{p}>{\epsilon}_{p}^{0}$ (the delaysensitive PU’s link can tolerate an additional outage).
When${\epsilon}_{p}={\epsilon}_{p}^{0}$
In this case, region 2 shrinks to an empty set, i.e. $\text{Pr}\left({\stackrel{~}{\mathcal{S}}}_{2}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}=0$, and the overall optimal throughput scaling is due to transmission power in region 1.
Clearly, as M becomes large, the optimal throughput scaling is due to the effect of the scaling result of z_{max}=h_{max} with the number of SRs in ${\stackrel{~}{\mathcal{S}}}_{1}$. Moreover, we know that ${\Lambda}^{\ast}\le \frac{{\epsilon}_{p}}{{P}_{\text{av}}}$ and Λ^{∗} is bounded away from 0 for all M (see Lemma 5.) Then, the SBS ergodic sum capacity under optimal power allocation is expressed as ${C}_{s}^{\mathit{\text{BC}}\ast}=E\left[log\left(\frac{{z}_{max}}{{\Lambda}^{\ast}}\right){1}_{\left\{{z}_{max}\ge {\Lambda}^{\ast},\phantom{\rule{2.22144pt}{0ex}}{\stackrel{~}{\mathcal{S}}}_{1}\right\}}\right]={\epsilon}_{p}^{0}E\left[log\left(\frac{{h}_{max}}{{\Lambda}^{\ast}}\right)\right]={\epsilon}_{p}E\left[log\left(\frac{{h}_{max}}{{\Lambda}^{\ast}}\right)\right]$. As the maximum of M independent and identically distributed exponentially distributed random variables, $\frac{{h}_{max}}{logM}$ converges in probability to 1. (see Example 10.5.1 of [37]). Using this result and the rigorous techniques used in [22] to show convergence in mean from convergence in probability, we can conclude that $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\mathit{\text{BC}}\ast}}{log(logM)}={\epsilon}_{p}$.
When${\epsilon}_{p}>{\epsilon}_{p}^{0}$
Note that in the previous subsection, we showed that $E\left[log\frac{{z}_{max}}{{\Lambda}^{\ast}}{1}_{\left\{g<{g}_{T},\phantom{\rule{2.22144pt}{0ex}}{z}_{max}\ge {\Lambda}^{\ast}\right\}}\right]$ scales according to ${\epsilon}_{p}^{0}log(logM)$ when M→∞. Now, we show that
Note that the last equality in (39) follows from Lemma 6. Thus, it follows that $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC*}}}{log(logM)}\ge {\epsilon}_{p}$.
Combining the upper and lower bounds, we have the desired asymptotic throughput scaling result that $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC*}}}{log(logM)}={\epsilon}_{p}$.
Appendix 5: proof of Theorem 4
For STPC, the optimal throughput scaling is also contributed by regions 1 and 2 because transmission in secondary network is halted in region 3. In what follows, we show that ${\epsilon}_{p}^{0}$ fraction of the total optimal throughput scaling is from the optimal power policy in region 1, whereas the remaining $({\epsilon}_{p}{\epsilon}_{p}^{0})$ fraction is due to data transmission in region 2. We also use the result that z_{max} scales like logM as M tends to infinity. The rest of the proof is divided into two parts: (i) ${\epsilon}_{p}={\epsilon}_{p}^{0}$ and (ii) ${\epsilon}_{p}>{\epsilon}_{p}^{0}$.
When ${\epsilon}_{p}={\epsilon}_{p}^{0}$
In this case, we have $\text{Pr}\left({\stackrel{~}{\mathcal{S}}}_{2}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}=0$ and z_{max}=h_{max} in ${\stackrel{~}{\mathcal{S}}}_{1}$. Then, the throughput from the SBS is expressed as ${C}_{s}^{\text{BC}\ast}=E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{{\stackrel{~}{\mathcal{S}}}_{1}\right\}}\right]={\epsilon}_{p}^{0}E\left[log(1+{z}_{max}{P}_{O})\right]$. By using the fact that z_{max} scales as logM as M becomes large, we can conclude that $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)}={\epsilon}_{p}$.
When ${\epsilon}_{p}>{\epsilon}_{p}^{0}$
As shown previously, $E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g<{g}_{T}\right\}}\right]$ scales as ${\epsilon}_{p}^{0}log(logM)$. Now, we will show that $E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g\ge {g}_{T},\phantom{\rule{2.22144pt}{0ex}}1+{z}_{max}{P}_{O}\ge \frac{1}{{t}^{1}\left({S}^{\ast}\right)}\right\}}\right]$ scales as $({\epsilon}_{p}{\epsilon}_{p}^{0})log(logM)$.
In (43), (a) follows the from the fact that $\text{Pr}({z}_{max}\ge ilogM)\le O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right)$ because z_{max} grows like logM, while (b) is from the fact that $\sum _{i=1}^{\infty}log(1+{P}_{O}(i+1)logM)O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right)$ is finite [38].
We then apply Lemma 6, the results from (43) and (44), and the fact that $E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g<{g}_{T}\right\}}\right]$ scales as ${\epsilon}_{p}^{0}log(logM)$ to show that $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)}$ is upperbounded and lowerbounded by ε_{ p }, i.e. $\underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)}={\epsilon}_{p}$.
Declarations
Authors’ Affiliations
References
 Federal Communications Commission (FCC): Spectrum policy task force. Technical report, Federal Communications Commission (FCC). Rep. ET Docket no. 02–135, Nov 2002Google Scholar
 Mitola J: Cognitive radio: an integrated agent architecture for software defined radio. PhD thesis. Stockholm, Sweden: KTH; 2000.Google Scholar
 Goldsmith A, Jafar SA, Marić I, Srinivasa S: Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 2009, 97(5):894914.View ArticleGoogle Scholar
 Zhang L, Liang YC, Cui S: Dynamic resource allocation in cognitive radio networks. IEEE Signal Process. Mag 2010, 27(3):102114.MathSciNetView ArticleGoogle Scholar
 Li L, Goldsmith A: Capacity and optimal resource allocation for fading broadcast channels  part I: ergodic capacity. IEEE Trans. Inf. Theory 2001, 47(3):10831101. 10.1109/18.915665MathSciNetView ArticleGoogle Scholar
 Li L, Goldsmith A: Capacity and optimal resource allocation for fading broadcast channels  part II: outage capacity. IEEE Trans. Inf. Theory 2001, 47(3):11031127. 10.1109/18.915667MathSciNetView ArticleGoogle Scholar
 Tse DNC: Optimal power allocation over parallel Gaussian broadcast channels. In IEEE International Symposium on Information Theory (ISIT). Ulm; July 1997.Google Scholar
 Jindal N, Vishwanath S, Goldsmith A: On the duality of Gaussian multipleaccess and broadcast channels. IEEE Trans. Inf. Theory 2004, 50(5):768783. 10.1109/TIT.2004.826646MathSciNetView ArticleGoogle Scholar
 Zhang R, Cui S, Liang YC: On ergodic sum capacity of fading cognitive multipleaccess and broadcast channels. IEEE Trans. Inf. Theory 2009, 55(11):51615178.MathSciNetView ArticleGoogle Scholar
 Luo J, Yates R, Spasojevic P: Service outage based power rate allocation for parallel fading channels. IEEE Trans. Inf. Theory 2005, 51(7):25942611. 10.1109/TIT.2005.850099MathSciNetView ArticleGoogle Scholar
 Limmanee A, Dey S, Evans JS: Serviceoutage capacity maximization in cognitive radio for parallel fading channels. IEEE Trans. Commun 2013, 61(2):507520.View ArticleGoogle Scholar
 Caire G, Taricco G, Biglieri E: Optimum power control over fading channels. IEEE Trans. Inf. Theory 1999, 45(5):14681489. 10.1109/18.771147MathSciNetView ArticleGoogle Scholar
 Limmanee A, Dey S: Optimal power policy and throughput analysis in cognitive broadcast networks under primary’s outage constraint. In The 8th International Workshop on Resource Allocation and Cooperation in Wireless Networks (RAWNET2012). Paderborn, Germany; May 2012. ,pp. 391 – 397Google Scholar
 Kang X, Zhang R, Liang YC, Garg HK: Optimal power allocation strategies for fading cognitive radio channels with primary user outage constraint. IEEE J. Selected Areas Commun 2011, 29(2):374383.View ArticleGoogle Scholar
 Sharif M, Hassibi B: On the capacity of MIMO broadcast channels with partial side information. IEEE Trans. Inf. Theory 2005, 51(2):506522. 10.1109/TIT.2004.840897MathSciNetView ArticleGoogle Scholar
 Ban TW, Choi W, Jung BC, Sung DK: Multiuser diversity in a spectrum sharing system. IEEE Trans. Wireless Commun 2009, 8(1):102106.View ArticleGoogle Scholar
 Wang H, Lee J, Kim S, Hong D: Capacity of secondary users exploiting multispectrum and multiuser diversity in spectrumsharing environments. IEEE Trans. Vehicular Technol 2010, 59(2):10301036.View ArticleGoogle Scholar
 Zhang R, Liang YC: Investigation on multiuser diversity in spectrum sharing based cognitive radio networks. IEEE Commun. Lett 2010, 14(2):133135.View ArticleGoogle Scholar
 Li Y, Nosratinia A: Hybrid opportunistic scheduling in cognitive radio networks. IEEE Trans. Wireless Commun 2012, 11(1):328337.View ArticleGoogle Scholar
 Li Y, Nosratinia A: Capacity limits of multiuser multiantenna cognitive networks. IEEE Trans. Inf. Theory 2012, 58(7):44934508.MathSciNetView ArticleGoogle Scholar
 Huang K, Heath RW, Andrews JG: Uplink SDMA with limited feedback: throughput scaling. EURASIP J. Adv. Signal Process 2008, 2008: 75.Google Scholar
 Nekouei E, Inaltekin H, Dey S: Throughput scaling in cognitive multiple access with power and interference constraints. IEEE Trans. Signal Process 2011, 60(2):927946.MathSciNetView ArticleGoogle Scholar
 Stockhammer T, Bystrom M: H.264/AVC data partitioning for mobile video communication. In International Conference on Image Processing. Singapore; October 2004:545548.Google Scholar
 Hossain MJ, Alouini MS, Bhargava VK: Hierarchical constellation for multiresolution data transmission over block fading channels. IEEE Trans. Wireless Commun 2006, 5(4):849857.View ArticleGoogle Scholar
 Shen C, van der Schaar M: Optimal resource allocation for multimedia applications over multiaccess fading channels. IEEE Trans. Wireless Commun 2008, 7(9):3546.View ArticleGoogle Scholar
 Kang X, Liang YC, Nallanathan A, Garg HK, Zhang R: Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity. IEEE Trans. Wireless Commun 2009, 8(2):940950.View ArticleGoogle Scholar
 Kang X, Garg HK, Liang YC, Zhang R: Optimal power allocation for OFDMbased cognitive radio with new primary transmission protection criteria. IEEE Trans. Wireless Commun 2010, 9(6):20662075.View ArticleGoogle Scholar
 Zhang L, Xin Y, Liang YC, Poor HV: Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization. IEEE Trans. Commun 2009, 57(9):27542762.View ArticleGoogle Scholar
 Kim JB, Kim D: Outage probability achievable diversity order of opportunistic relaying in cognitive secondary radio networks. IEEE Trans. Commun 2012, 60(9):24562466.View ArticleGoogle Scholar
 Etkin R, Parekh A, Tse D: Spectrum sharing for unlicensed bands. IEEE J. Selected Areas Commun 2007, 25(3):517528.View ArticleGoogle Scholar
 Lee J, Wang H, Andrews JG: Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wireless Commun 2011, 10(2):390395.View ArticleGoogle Scholar
 Zhang R: Optimal power control over fading cognitive radio channels by exploiting primary user CSI. In Proceedings of IEEE GLOBECOM 2008. New Orleans, USA; December 2008:15.Google Scholar
 He YY, Dey S: Power allocation in spectrum sharing cognitive radio networks with quantized channel information. IEEE Trans. Commun 2011, 59(6):16441656.View ArticleGoogle Scholar
 Eswaran K, Gastpar M, Ramchandran K: Bits through ARQs: spectrum sharing with a primary packet system. In IEEE International Symposium on Information Theory. Nice, France; June 2007:21712175.Google Scholar
 Ganesan G, Li Y: Cooperative Spectrum sensing in cognitive radio networks,. November 2005.View ArticleGoogle Scholar
 Cover T, Thomas J: Elements of Information Theory. Hoboken: Wiley; 2006.Google Scholar
 David HA, Nagaraja HN: Order Statistics. Hoboken: Wiley; 2003.View ArticleGoogle Scholar
 Nekouei E, Inaltekin H, Dey S: Throughput scaling in cognitive multiple access networks with power and interference constraints. In IEEE International Conference on Communications. Kyoto, Japan; June 2011:16.Google Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License(http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.