# Optimal power allocation in cognitive radio based machine-to-machine network

- Haipeng Yao
^{1}Email author, - Tao Huang
^{1}, - Chenglin Zhao
^{1}, - Xiaoyong Kang
^{2}and - Zhongya Liu
^{3}

**2014**:82

https://doi.org/10.1186/1687-1499-2014-82

© Yao et al.; licensee Springer. 2014

**Received: **3 April 2014

**Accepted: **5 May 2014

**Published: **21 May 2014

## Abstract

In this paper, we investigate the optimal power allocation strategy in a cognitive radio-based machine-to-machine (M2M) network where a licensed primary user and multiple unlicensed M2M devices coexist and operate in the same licensed spectrum. We develop a connectivity establishment mechanism in M2M network based on the cognitive radio scheme and propose an optimal power allocation scheme which achieves the maximum system utility while satisfying the QoS requirement of M2M devices and interference constraints of the primary user. The simulation results show that the proposed algorithm achieves better performance.

## Keywords

## 1 Introduction

It is envisioned that machine-to-machine (M2M) communications are rapidly developing based on the large diversity of machine-type terminals, including sensors, mobile phones, consumer electronics, utility metering, vending machines, and so on. With the dramatic penetration of embedded devices, M2M communications will become a dominant communication paradigm in the communication network, which currently concentrates on machine-to-human or human-to-human information production, exchange, and processing. M2M communications is characterized by low-power, low-cost, and low-human intervention [1].

M2M communications is typically composed of billions of wireless identifiable infrastructure sensors which will be developed and deployed over the coming years. The diversity of the M2M network structures, protocols, and standards, combined with even more diverse application services from users, pose big challenges for M2M network integration and service integration. The capabilities of sensors are generally limited which puts several constraints in M2M communications, including communication spectrum, energy, computation, and storage. These constraints pose a number of unique challenges in the design of network architecture and spectrum usage to achieve a highly connected, efficient, and reliable M2M communication.

The first challenge in M2M communication is the spectrum scarcity. Massive M2M terminals accessing wireless network require lots of spectrum resources, but the exploitable spectrum is becoming scarce resource. Thus, there should be a mechanism to solve the problem of imbalance between the M2M spectrum requirement and the spectrum scarcity.

Another main issue challenges the M2M communication is ever more intensive interference with more radio systems in M2M communication, including unlicensed systems operating in the industrial, scientific, and medical (ISM) frequency band, electronic equipment, and domestic appliances. The performance of M2M communications may be seriously degraded due to the self-existence/coexistence interference. Moreover, wireless channels in M2M communications are notoriously unreliable due to channel fluctuations and noise, which may become even worse due to the complicated construction in an indoor environment [2].

In this paper, we propose a cognitive radio (CR)-based communication scheme to solve the spectrum scarcity and severe interference problems within M2M communication. The CR is original from the fact that most of the licensed frequency bands are severely underutilized across time and space in the sense that each licensee is granted an exclusive license to operate in a certain frequency band. The CR, which was first proposed by Mitola and Maguire [3], is a promising approach to solve the problem of imbalance between the spectrum scarcity and low utilization. The main idea contained in CR technology is that the secondary user (SU) can sense and exploit temporarily and local available licensed spectrum and adapt its radio parameter to opportunistically communicate over the spectrum of interest without harmfully interfering with the ongoing primary user (PU). In order to fully utilize the limited spectrum, the spectrum sharing strategy between the PU and SUs is an important issue. Two approaches to spectrum sharing have been addressed: spectrum overlay and spectrum underlay [4, 5]. The spectrum underlay approach imposes restricted transmission power constraints on SUs so that they do not cause unacceptable interference to the PU. The advantage of this approach is that SUs can directly occupy the licensed spectrum without considering the behavior of the PU. However, SUs must carefully select their transmission power according to the severe power constraints. Also, they may suffer from the PU's interference. Differing from spectrum underlay, the spectrum overlay strategy does not necessarily impose transmission power restriction on SUs but rather than on when and where they can occupy the licensed spectrum. They can transmit only when the PU is inactive. The central issue of this approach is to identify the local and instantaneous unused spectrum with some detection probability.

Recently, there are several previous works addressing the M2M spectrum sharing problem by the help of the CR. For example, in [6], a spectrum sensing model based on Markov chain was proposed to predict the spectrum hole for CR in M2M network, and the theoretical analysis and simulation results were evaluated that a Markov model with two states or four states works well enough in wireless Internet of things (IoT) whereas a model with more states was not necessary. In [7], the authors proposed a machine-to-machine network management architecture based on cognitive network management technology and service-oriented architecture to provide effective and efficient network management of machine to machine network. In [8], the authors proposed a new M2M communications paradigm, namely cognitive M2M (CM2M) communication and presented CM2M communications architecture for the smart grid, for which also proposed an energy efficiency driven spectrum discovery scheme. In [9], the authors considered the heterogeneous characteristics of smart grid traffic including multimedia and developed CR channel allocation and traffic scheduling schemes taking into consideration of channel switch and spectrum sensing errors and solve a system utility optimization problem for smart grid communication system.

In order to design the spectrum sharing strategies for M2M network, there are some more basic questions still remain unanswered. First, the M2M devices should take their locations into account when they adopt the spectrum sharing strategies. Specifically, if the M2M device is far from the PU, its transmission causes little interference to the PU if it carefully selects the transmitted power. In this case, the M2M device can occupy the spectrum by an underlay way; on the other hand, if the M2M device is near to the PU, in order to not cause the unacceptable interference to the PU, it is allowed to access the spectrum only when it detects that the PU is not active, i.e., the M2M device communicates over the spectrum by a overlay way. Therefore, considering the location of M2M devices, the overlay and underlay approaches can be employed simultaneously.

Motivated by the preceding discussion, in this paper, first, we give a M2M network communication scenario in which the spectrum is shared by a joint overlay and underlay approach and develop a connectivity establishment mechanism based on the cognitive radio technology. Then, we propose an optimal power allocation scheme in this scenario which holds the characteristics of achieving the maximum system utility and satisfying the QoS requirement of M2M devices and interference constraints of PU. Moreover, we propose a QoS sensitivity-based admission control algorithm to deal with the case that the optimal power allocation scheme is infeasible.

The rest of the paper is organized as follows. Section 2 gives a brief description of the system model and formulates the problems. Section 3 depicts the details of optimal power allocations algorithm. Our simulation results are given in Section 4. Section 5 concludes the paper.

## 2 System model and problem description

### 2.1 Cognitive-based M2M network

First of all, in the proposed M2M scenario, the gateway is responsible for managing the whole M2M network, and the network related functionalities are implemented in the gateway, including connectivity establishment, access control, and QoS management. In particular, the M2M gateway provides the connectivity to the devices and the connection between the M2M network and other network, and the devices within the M2M network could directly communicate with the gateway based on the established connectivity to upload information.

Furthermore, we model a situation where *K* M2M devices, each formed by a single transmitter-receiver pair, coexist and operate in a local circular region (the radius is denoted by R_{
a
}) with a PU. The PU's receiver (PU Rx) with omnidirectional antenna is assumed to be the center of the circle. Both the M2M gateway and the devices satisfy uniform distribution in this region. We assume that the cognitive radio network is decentralized with slotted transmission structure. At each slot, the PU has a *ζ*_{P} probability to access the spectrum, and each M2M device wants to opportunistically access the spectrum without causing the unacceptable interference to the PU Rx.

In order to facilitate the following discussion, we adopt the method in [10] to divide the circular region into two subregions, denoted by *SubR*_{OVER} and *SubR*_{UNDER}, based on a carefully selected radius *R*_{P} (0 < *R*_{P} ≤ *R*_{
a
}). *SubR*_{OVER} is the region of the circle centered at PU Rx with radius *R*_{P}. *SubR*_{UNDER} denotes the region within a circle with radius *R*_{
a
} but outside the circle with radius *R*_{P}. In particular, the value of *R*_{P} mainly depends on the transmitted power of M2M device and the acceptable interference to the PU. Based on the definition of *SubR*_{OVER} and *SubR*_{UNDER}, we can classify M2M devices as two sets: the set *S*_{UNDER} = {*i*|*R*_{P} < *R*_{
i
} ≤ *R*_{
a
}} and the set *S*_{OVER} = {*i*|0 ≤ *R*_{
i
} ≤ *R*_{P}}, where *R*_{
i
} denotes the distance between the transmitter of M2M Device_{
i
} (Device_{
i
} Tx) and PU Rx. Since the M2M devices belonging to *S*_{OVER} are near to the PU Rx, they can only adopt overlay approach to transmit information in order to not cause unacceptable interference to PU Rx and guarantee themselves QoS requirements (in terms of minimum required signal-to-interference-plus-noise ratio, SINR). For the devices in *S*_{UNDER}, since they are relative far from the PU Rx, they can use the spectrum in an underlay way without considering the PU's usage. But these devices must carefully select their transmission power in order to make sure that the sum interference they cause is acceptable to the PU RX.

In order to simplify the following discussion, we have adopted deterministic signal propagation model without considering the fading and shadowing. Note that this signal propagation model can be applied to general scenarios.

In the proposed architecture, the communication within the proposed M2M network typically consists of four phases: connectivity establishment, data collection, data transmission, and data processing. The connectivity establishment phase refers to the procedure used to exploit the temporarily and local available licensed spectrum and then establish the communication link between the device and the gateway based on the available spectrum. The data collection phase is the process executed by the devices to obtain the physical data. The data transmission phase includes the communication between the M2M gateway and devices and the M2M gateway and an external entity, respectively. The data processing phase is the process of dealing with and analyzing the data.

It is noteworthy that the connectivity establishment between the devices and the M2M gateway is the fundamental process for the M2M network communication. In this section, we adopt a cognitive-based connectivity establishment scheme, and more details are described in [11]. In the following, we will elaborate on the connectivity establishment mechanism and the performance analysis. Moreover, the main difference between the connectivity establishment mechanism based on cognitive radio and the traditional one is that the M2M devices can dynamically use the white spectrum based on the spectrum environment and the demands which can provide more flexibility.

- (1)
Kick-off: the M2M gateway informs the M2M devices through a predefined channel to start the spectrum sensing procedure.

- (2)
Self-organization spectrum sensing: each M2M device independently implements the spectrum sensing to find the idle spectrum.

- (3)
Collection of the available spectrum: the M2M gateway collects the available spectrum from the devices and selects an idle sub-spectrum to establish the connectivity between the related device and the gateway.

- (4)
Spectrum selection confirmation: the gateway sends a notice to the device to confirm the selected idle sub-spectrum.

- (5)
Connectivity establishment: both of the gateway and the device configure their RF with the selected spectrum and establish the connectivity.

- (6)
Information transmission: the device and the gateway exchange information using the established connectivity. Furthermore, in the most cases of M2M communication scenario, information transmission will occupy the uplink channel, which means the M2M device report its collected data to the gateway and behind server.

- (7)
Release the connectivity: both the device and the gateway disconnect the link.

*i*th target spectrum, suppose that the frame duration and the sensing duration at frame tag

*t*is denoted by

*T*and

*τ*

_{i,t}, respectively, and the date transmission duration is

*T*−

*τ*

_{i,t}.

Furthermore, we suppose that the PU maintains the same spectral-temporal usage characteristics in one frame. In practice, this assumption is reasonable since IEEE 802.22 has developed an air interface for opportunistic secondary access to the TV spectrum in which the primary signals change slowly, and the frame duration should be designed to be smaller than the average duration of the PU's transmission.

It also notes that the M2M gateway will coordinate the spectrum selection conflict in selecting the idle sub-spectrum.

### 2.2 Spectrum sensing scheme over the target channel

*i*th M2M device is sampled at sampling frequency

*f*

_{ s }over the target channel. The primary signal detection problem can be modeled as the following binary hypotheses:

*x*

_{ i }(

*n*) is the

*n*th received sample,

*s*

_{ i }(

*n*) is the primary transmitted signal, and each sample is assumed to be independent and identically distributed (i.i.d) with zero mean and variance ${\mathit{\sigma}}_{\mathit{s}}^{2}$, i.e., ${\mathit{s}}_{\mathit{i}}\left(\mathit{n}\right)~\mathcal{CN}\left(0,{\mathit{\sigma}}_{\mathit{s}}^{2}\right)$,

*η*

_{ i }(

*n*) is the noise and assumed to be i.i.d circularly symmetric complex Gaussian with zero mean and variance ${\mathit{\sigma}}_{\mathit{\eta}}^{2}$, ${\mathit{\eta}}_{\mathit{i}}\left(\mathit{n}\right)~\mathcal{CN}\left(0,{\mathit{\sigma}}_{\mathit{\eta}}^{2}\right)$. Moreover,

*h*

_{ i }is the target channel gain between the primary transmitter and the

*i*th M2M device receiver with the variance $\mathbf{E}\left({\left|{\mathit{h}}_{\mathit{i}}\right|}^{2}\right)={\mathit{\sigma}}_{\mathit{h},\mathit{i}}^{2}$,

_{0,i}and

_{1,i}denote the hypotheses corresponding to the absence and presence of the PU, respectively. Suppose

*s*

_{ i }(

*n*),

*η*

_{ i }(

*n*), and

*h*

_{ i }(

*n*) are independent of each other and the average received signal-to-noise ratio (SNR) can be calculated by

*N*

_{ t }denote the number of samples over the target channel; without loss of the generality, we assume that

*N*

_{ i }=

*τ*

_{ i }

*f*

_{ s }. The test statistics is thus obtained as the observed energy summation within

*N*

_{ t }consecutive components, i.e.,

_{0,i}, the test statistic

*X*

_{ i }follows a central chi-square distribution with 2

*N*

_{ i }degrees of freedom and a noncentral chi-square distribution with 2

*N*

_{ i }degrees of freedom and a noncentrality parameter 2

*γ*

_{ i }for

_{1,i}. i.e.,

where ${\mathit{f}}_{{\mathit{X}}_{\mathit{i}}}\left({\mathit{X}}_{\mathit{i}}\right)$ denotes the probability density function (PDF) of *X*_{
i
}.

The performance of spectrum sensing algorithm in M2M network can be characterized by two parameters: probability of detection *P*_{
d
} and probability of false alarm *P*_{
f
}. *P*_{
d
} is the probability of detecting the presence of the PU, while *P*_{
f
} is the probability that the test incorrectly decides that the considered frequency is occupied by the PU when it actually is not. The probabilities of detection and false alarm have unique implications for both the PU and M2M devices. More specifically, from the PU's point of view, a large detection probability is desired in order to sufficiently protect the PU from the interference caused by the M2M device. From the M2M device's perspective, *P*_{
f
} should be kept as small as possible for preventing underutilization of transmission opportunities. Therefore, the design of a detection algorithm leads to a tradeoff between the probability of detection and the probability of false alarm.

*N*

_{ i, }, the energy detector's probabilities of detection and false alarm for the

*i*th target channel can be approximated as [12]

*ϵ*

_{ i }denotes the detection thresholds,

*Q*(.) is the complementary distribution function of the normalized Gaussian given by

*i*th M2M device is defined as

*P*

_{d,i}, the probability of the false alarm is given by plugging (5) into (6),

### 2.3 M2M network power allocation algorithm formulation

In this section, we follow the method in [10] to formulate the power allocation algorithm. In the joint spectrum overlay and underlay M2M network, there exist some basic problems that must be carefully investigated. The most important two are power allocations and interference managements of M2M devices. An ideal power allocation scheme should maximize the system utility of M2M network while causing acceptable interference to the PU. In this paper, we assume that both the M2M devices in *S*_{N} and *S*_{F} adopt a spread spectrum signaling format in which the transmitted power is evenly spread across the entire available spectrum.

*α*in

*S*

_{UNDER}, its SINR can be expressed as

where *n*_{0} is the background noise power that is assumed to be the same for all users, *G*_{
αα
} is the channel direct gain for M2M device *α*' transmitter to its receiver, *G*_{
iα
} (*G*_{Pα}) is the channel cross gain from M2M Device_{
i
} (PU)'s transmitter to *α*'s receiver, *P*_{Si} (*P*_{P}) is the transmitted power of M2M Device_{
i
} (PU). Note that in (11), we actually consider the worst case of PU interference by treating the PU as all being active, i.e., the access probability of PU is equal to 1.

*β*in

*S*

_{OVER}, its SINR can be represented by

*β*accesses the spectrum,

*β*does not suffer from the PU interference. In order to guarantee the M2M device's QoS, the power allocations scheme should satisfy the following SINR constraints

*β*

_{ i }is the required SINR corresponding to the desired value of bit error rate. Let

*I*

_{P}denote the interference threshold tolerable at PU Rx; the power allocations scheme must satisfy the interference constraint

*G*

_{α P}is the channel cross gain from

*α*'s transmitter to PU Rx. Note that devices in

*S*

_{OVER}are forbidden to access the spectrum when PU transmits information, so they contribute no interference to the PU. Recall the distribution assumption of devices, the number of devices in

*S*

_{UNDER}(denoted by

*n*

_{F}) can be calculated by

where ⌊*n*⌋ denotes the integer part of *n*. It is easy to find that *n*_{F} is a monotone decreasing function in *R*_{P}. When *R*_{P} is small, the number of devices in *S*_{F} is corresponding large. Thus, the performance of PU will be declined because of the unacceptable interference caused by the devices in *S*_{F}. In contrast, when *R*_{P} is large, the number of devices in *S*_{N} is correspondingly large. If the PU has high access probability, then, the system utility of devices will be decreased because there are only a few devices that can use the spectrum by an underlay way. So *R*_{P} must be carefully investigated when designing the power allocation scheme.

_{ i }, we adopt the following utility function as the metric

For each time slot, since the M2M devices belonging to *S*_{OVER} have (1 − *P*_{d,j}(*τ*_{
j
})) probability to access the spectrum, we add access probability multiple to the utility function of devices in *S*_{OVER}.

## 3 Optimal power allocation scheme

One of the most important goals we want to achieve is the optimal power allocation for different M2M devices. Specifically, the power allocation scheme should coordinate the device's transmitted power to achieve the maximum system utility. In this section, we assume that the devices in *S*_{N} can perfect sense the PU's activity, i.e., they can exactly sense the PU's behavior in a particular slot.

### 3.1 The power allocation scheme with utility function

where ${\mathit{P}}_{{}_{\mathrm{S}\mathit{j}}}^{\mathrm{Max}}$ is the maximum transmitted power of M2M Device_{
i
}. Note that the objective function $\sum _{\mathit{\alpha}\in {\mathit{S}}_{\mathrm{UNDER}},\mathit{\alpha}=1}^{{\mathit{n}}_{\mathrm{F}}}{U}_{\mathrm{S}\mathit{\alpha}}}+{\displaystyle \sum _{\mathit{\beta}\in {\mathit{S}}_{\mathrm{OVER}},\mathit{\beta}=1}^{\mathit{K}-{\mathit{n}}_{\mathrm{F}}}{\mathrm{U}}_{\mathrm{S}\mathit{\beta}}$ is equivalent to $ln\left(\right({\displaystyle \prod _{\mathit{j}\in {\mathrm{S}}_{\mathrm{UNDER}},\mathit{j}=1}^{{\mathit{n}}_{\mathrm{F}}}{\mathit{\mu}}_{\mathit{j}})}\left(\left({{\displaystyle \prod _{\mathit{i}\in {\mathrm{S}}_{\mathrm{OVER}},\mathit{i}=1}^{\mathit{K}-{\mathit{n}}_{\mathrm{F}}}{\mathit{\mu}}_{\mathit{i}})}}^{\left(1-{\mathit{P}}_{\mathit{d},\mathit{i}}\left({\mathit{\tau}}_{\mathit{i}}\right)\right)}\right)\right)$ which provides the well-known proportional fair among devices [13]. Moreover, if *P*_{d,i}(*τ*_{
i
}) = 0, i.e., the PU is inactive in the slot, the objective function can be reduced to $\prod _{\mathit{i}=1}^{\mathit{K}}{\mathit{\mu}}_{\mathit{i}}$; otherwise, if *P*_{d,i}(*τ*_{
i
}) = 1, i.e., the PU occupies the spectrum all the time, the objective function can be reduced to $\prod _{\mathit{i}=1}^{{\mathrm{N}}_{\mathrm{F}}}{\mathit{\mu}}_{\mathit{i}}$. The above two extreme cases are easier solved. Thus, in this paper, we mainly consider the case 0 < *P*_{d,i}(*τ*_{
i
}) < 1. It is easy to find that (17) is a constraint optimization problem, it can be solved by the method of generalized geometric programming [14].

### 3.2 Power allocation scheme with optimal achievable throughput

In this subsection, we propose a power allocation scheme to achieve the optimal achievable throughput.

*α*in

*S*

_{UNDER}can be expressed as

where *W* is the spectrum bandwidth.

*β*in

*S*

_{OVER}can be represented by

**T**= [

*T*

_{1},

*T*

_{2}, …

*T*

_{ K }]. A throughput vector is called an

*achievable throughput vector*of a power allocation scheme if the scheme can yield the throughput

*T*

_{ i }of M2M Device

_{ i }, and the achievable throughput region is defined by the set of all achievable throughput vectors

*T*

^{ * }be the set of Pareto optimal points of

*T*[14]

Therefore, a throughput is Pareto optimal (or efficient) if it is not possible to increase the throughput of any device without decreasing the throughput of some other devices.

Note that the above optimization problem is a nonlinear optimization one; it can be solved by the method of Karush-Kuhn-Tucker (KKT).

## 4 Simulation results

In this section, we present the simulation results. All simulations consist of the following setup: *n*_{0} = 0.01, *K* varies from 2 to 80, *R*_{P} varies from 20 to 100, *G*_{Si Si} = 2, ${\mathit{P}}_{{}_{\mathrm{S}\mathit{i}}}^{\mathrm{Max}}=2$, *β*_{
i
} = 0.1, *I*_{P} = 4, *R*_{
a
} = 100, *G*_{Si Sj} = 0.1, *i* ≠ *j*, *G*_{PSi} = *G*_{Si P} = 0.02, *W* = 1. We also assume the M2M devices satisfy uniform distribution with density *λ*, and here, we set *λ* =1.

*S*

_{1}and

*S*

_{2}belong to

*S*

_{UNDER}and

*S*

_{OVER}, respectively. It is easy to extend the results to the multiple M2M devices scenarios. We show the achievable throughput set

*T*and the Pareto optimal points set

*T**for different strategies. It can be seen that the achievable throughput set

*T*of our proposed strategy is more efficient than the overlay strategy. Although the throughput of our strategy is smaller than the underlay strategy, it causes less interference to the PU comparing to the underlay strategy; thus, the proposed strategy can ensure the better QoS of the PU.

*τ*for different numbers of M2M devices. Here, we set the number of the target subchannels sensed by the M2M devices

*J*= 10. We can see that the network utility is increasing with

*M*(the number of M2M devices). It is noted that the utility is saturated when

*M*is larger. Thus, for a targeted

*M*

_{max}, it is not an optimal solution to more M2M devices.

## 5 Conclusions

In this paper, we have considered the power allocation problem in joint spectrum overlay and underlay M2M networks. We develop a connectivity establishment mechanism in M2M network based on the cognitive radio technology and proposed an optimal power allocation scheme aiming at maximizing the system utility and satisfied the QoS of M2M devices and interference of PU at the same time.

## Declarations

### Acknowledgement

This work was supported by NSFC (61379016, 61271180), Important National Science and Technology Specific Projects (2013ZX03001020-003), Doctoral Program of Higher Education (20130005110016), and BUPT Youth Research and Innovation Plan (2014RC0103).

## Authors’ Affiliations

## References

- Inhyok C, Shah Y, Schmidt AU, Leicher A, Meyerstein MV: Trust in M2M communication.
*IEEE Vehic. Tech. Mag.*2009, 4(3):69-75.View ArticleGoogle Scholar - Zhang Y, Yu R, Xie S, Yao W, Xiao Y, Guizani M: Home M2M networks: architectures, standards, and QoS improvement.
*IEEE Commun. Mag.*2011, 49(4):44-52.View ArticleGoogle Scholar - Mitola J III, Maguire G Jr: Cognitive radio: making software radios more personal.
*Pers. Commun. IEEE [see also IEEE Wireless Commun]*1999, 6(4):13-18.Google Scholar - Haykin S: Cognitive radio: brain empowered wireless communications.
*IEEE J. Selected Area Commun.*2005, 23(2):201-220.View ArticleGoogle Scholar - Qing Z, Sadler BM: A survey of dynamic spectrum access: signal processing, networking, and regulatory policy.
*IEEE Signal Process. Mag.*2007, 55(5):2294-2309.View ArticleGoogle Scholar - Zhigang W, Jie L: Spectrum sensing model for wireless internet of things.
*China Commun.*2011, 8(1):8-13.Google Scholar - Yifang Q, Qiang S, Tao L, Zhijun Z, Hui T, Song C, Zhiyong F: Cognitive network management in internet of things.
*China Commun.*2011, 8(1):1-7.Google Scholar - Zhang Y, Yu R, Nekovee M, Liu Y, Xie S, Gjessing S: Cognitive machine-to-machine communications: visions and potentials for the smart grid.
*IEEE Netw.*2012, 26(3):6-13.View ArticleGoogle Scholar - Huang J, Wang H, Qian Y, Wang C: Priority-based traffic scheduling and utility optimization for cognitive radio communication infrastructure-based smart grid.
*IEEE Trans. Smart Grid.*2013, 4(1):78-86.MathSciNetView ArticleGoogle Scholar - Haipeng Y, Zhou Z, Zhang L, Liu H, Tang L, Kwak KS:
*An efficient power allocation scheme in joint spectrum overlay and underlay cognitive radio networks*. Icheon: IEEE 9th International Symposium on Communications and Information Technology (ISCIT2009); 2009:102-105.Google Scholar - Yao H, Wang W, Liu Y, Zhang J: Spectrum sharing and power allocation analysis in machine to machine network.
*J. Conv. Inf. Technol.*2012, 7(19):242-250.Google Scholar - Seo H, Lee BG: Proportional-fair power allocation with CDF-based scheduling for fair and efficient multiuser OFDM systems.
*IEEE Trans. Wireless Commun.*2006, 5(5):978-983.MathSciNetView ArticleGoogle Scholar - Tandra R, Sahai A: SNR walls for signal detection.
*IEEE J. Select. Topics Sig. Proc.*2008, 2: 4-17.View ArticleGoogle Scholar - Boyd S, Vandenberghe L:
*Convex Optimization*. Cambridge: Cambridge University Press; 2004.View ArticleMATHGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.