Skip to main content

Optimal power allocation in cognitive radio based machine-to-machine network

Abstract

In this paper, we investigate the optimal power allocation strategy in a cognitive radio-based machine-to-machine (M2M) network where a licensed primary user and multiple unlicensed M2M devices coexist and operate in the same licensed spectrum. We develop a connectivity establishment mechanism in M2M network based on the cognitive radio scheme and propose an optimal power allocation scheme which achieves the maximum system utility while satisfying the QoS requirement of M2M devices and interference constraints of the primary user. The simulation results show that the proposed algorithm achieves better performance.

1 Introduction

It is envisioned that machine-to-machine (M2M) communications are rapidly developing based on the large diversity of machine-type terminals, including sensors, mobile phones, consumer electronics, utility metering, vending machines, and so on. With the dramatic penetration of embedded devices, M2M communications will become a dominant communication paradigm in the communication network, which currently concentrates on machine-to-human or human-to-human information production, exchange, and processing. M2M communications is characterized by low-power, low-cost, and low-human intervention [1].

M2M communications is typically composed of billions of wireless identifiable infrastructure sensors which will be developed and deployed over the coming years. The diversity of the M2M network structures, protocols, and standards, combined with even more diverse application services from users, pose big challenges for M2M network integration and service integration. The capabilities of sensors are generally limited which puts several constraints in M2M communications, including communication spectrum, energy, computation, and storage. These constraints pose a number of unique challenges in the design of network architecture and spectrum usage to achieve a highly connected, efficient, and reliable M2M communication.

The first challenge in M2M communication is the spectrum scarcity. Massive M2M terminals accessing wireless network require lots of spectrum resources, but the exploitable spectrum is becoming scarce resource. Thus, there should be a mechanism to solve the problem of imbalance between the M2M spectrum requirement and the spectrum scarcity.

Another main issue challenges the M2M communication is ever more intensive interference with more radio systems in M2M communication, including unlicensed systems operating in the industrial, scientific, and medical (ISM) frequency band, electronic equipment, and domestic appliances. The performance of M2M communications may be seriously degraded due to the self-existence/coexistence interference. Moreover, wireless channels in M2M communications are notoriously unreliable due to channel fluctuations and noise, which may become even worse due to the complicated construction in an indoor environment [2].

In this paper, we propose a cognitive radio (CR)-based communication scheme to solve the spectrum scarcity and severe interference problems within M2M communication. The CR is original from the fact that most of the licensed frequency bands are severely underutilized across time and space in the sense that each licensee is granted an exclusive license to operate in a certain frequency band. The CR, which was first proposed by Mitola and Maguire [3], is a promising approach to solve the problem of imbalance between the spectrum scarcity and low utilization. The main idea contained in CR technology is that the secondary user (SU) can sense and exploit temporarily and local available licensed spectrum and adapt its radio parameter to opportunistically communicate over the spectrum of interest without harmfully interfering with the ongoing primary user (PU). In order to fully utilize the limited spectrum, the spectrum sharing strategy between the PU and SUs is an important issue. Two approaches to spectrum sharing have been addressed: spectrum overlay and spectrum underlay [4, 5]. The spectrum underlay approach imposes restricted transmission power constraints on SUs so that they do not cause unacceptable interference to the PU. The advantage of this approach is that SUs can directly occupy the licensed spectrum without considering the behavior of the PU. However, SUs must carefully select their transmission power according to the severe power constraints. Also, they may suffer from the PU's interference. Differing from spectrum underlay, the spectrum overlay strategy does not necessarily impose transmission power restriction on SUs but rather than on when and where they can occupy the licensed spectrum. They can transmit only when the PU is inactive. The central issue of this approach is to identify the local and instantaneous unused spectrum with some detection probability.

Recently, there are several previous works addressing the M2M spectrum sharing problem by the help of the CR. For example, in [6], a spectrum sensing model based on Markov chain was proposed to predict the spectrum hole for CR in M2M network, and the theoretical analysis and simulation results were evaluated that a Markov model with two states or four states works well enough in wireless Internet of things (IoT) whereas a model with more states was not necessary. In [7], the authors proposed a machine-to-machine network management architecture based on cognitive network management technology and service-oriented architecture to provide effective and efficient network management of machine to machine network. In [8], the authors proposed a new M2M communications paradigm, namely cognitive M2M (CM2M) communication and presented CM2M communications architecture for the smart grid, for which also proposed an energy efficiency driven spectrum discovery scheme. In [9], the authors considered the heterogeneous characteristics of smart grid traffic including multimedia and developed CR channel allocation and traffic scheduling schemes taking into consideration of channel switch and spectrum sensing errors and solve a system utility optimization problem for smart grid communication system.

In order to design the spectrum sharing strategies for M2M network, there are some more basic questions still remain unanswered. First, the M2M devices should take their locations into account when they adopt the spectrum sharing strategies. Specifically, if the M2M device is far from the PU, its transmission causes little interference to the PU if it carefully selects the transmitted power. In this case, the M2M device can occupy the spectrum by an underlay way; on the other hand, if the M2M device is near to the PU, in order to not cause the unacceptable interference to the PU, it is allowed to access the spectrum only when it detects that the PU is not active, i.e., the M2M device communicates over the spectrum by a overlay way. Therefore, considering the location of M2M devices, the overlay and underlay approaches can be employed simultaneously.

Motivated by the preceding discussion, in this paper, first, we give a M2M network communication scenario in which the spectrum is shared by a joint overlay and underlay approach and develop a connectivity establishment mechanism based on the cognitive radio technology. Then, we propose an optimal power allocation scheme in this scenario which holds the characteristics of achieving the maximum system utility and satisfying the QoS requirement of M2M devices and interference constraints of PU. Moreover, we propose a QoS sensitivity-based admission control algorithm to deal with the case that the optimal power allocation scheme is infeasible.

The rest of the paper is organized as follows. Section 2 gives a brief description of the system model and formulates the problems. Section 3 depicts the details of optimal power allocations algorithm. Our simulation results are given in Section 4. Section 5 concludes the paper.

2 System model and problem description

2.1 Cognitive-based M2M network

The cognitive-based M2M network we considered here is shown in Figure 1. The proposed M2M network is composed of a number of M2M devices, a licensed user (PU), and a dedicated cognitive M2M gateway, and the PU is not the M2M device.

Figure 1
figure 1

Cognitive radio-based M2M network scenario.

First of all, in the proposed M2M scenario, the gateway is responsible for managing the whole M2M network, and the network related functionalities are implemented in the gateway, including connectivity establishment, access control, and QoS management. In particular, the M2M gateway provides the connectivity to the devices and the connection between the M2M network and other network, and the devices within the M2M network could directly communicate with the gateway based on the established connectivity to upload information.

Furthermore, we model a situation where K M2M devices, each formed by a single transmitter-receiver pair, coexist and operate in a local circular region (the radius is denoted by R a ) with a PU. The PU's receiver (PU Rx) with omnidirectional antenna is assumed to be the center of the circle. Both the M2M gateway and the devices satisfy uniform distribution in this region. We assume that the cognitive radio network is decentralized with slotted transmission structure. At each slot, the PU has a ζP probability to access the spectrum, and each M2M device wants to opportunistically access the spectrum without causing the unacceptable interference to the PU Rx.

In order to facilitate the following discussion, we adopt the method in [10] to divide the circular region into two subregions, denoted by SubROVER and SubRUNDER, based on a carefully selected radius RP (0 < RP ≤ R a ). SubROVER is the region of the circle centered at PU Rx with radius RP. SubRUNDER denotes the region within a circle with radius R a but outside the circle with radius RP. In particular, the value of RP mainly depends on the transmitted power of M2M device and the acceptable interference to the PU. Based on the definition of SubROVER and SubRUNDER, we can classify M2M devices as two sets: the set SUNDER = {i|RP < R i  ≤ R a } and the set SOVER = {i|0 ≤ R i  ≤ RP}, where R i denotes the distance between the transmitter of M2M Device i (Device i Tx) and PU Rx. Since the M2M devices belonging to SOVER are near to the PU Rx, they can only adopt overlay approach to transmit information in order to not cause unacceptable interference to PU Rx and guarantee themselves QoS requirements (in terms of minimum required signal-to-interference-plus-noise ratio, SINR). For the devices in SUNDER, since they are relative far from the PU Rx, they can use the spectrum in an underlay way without considering the PU's usage. But these devices must carefully select their transmission power in order to make sure that the sum interference they cause is acceptable to the PU RX.

In order to simplify the following discussion, we have adopted deterministic signal propagation model without considering the fading and shadowing. Note that this signal propagation model can be applied to general scenarios.

In the proposed architecture, the communication within the proposed M2M network typically consists of four phases: connectivity establishment, data collection, data transmission, and data processing. The connectivity establishment phase refers to the procedure used to exploit the temporarily and local available licensed spectrum and then establish the communication link between the device and the gateway based on the available spectrum. The data collection phase is the process executed by the devices to obtain the physical data. The data transmission phase includes the communication between the M2M gateway and devices and the M2M gateway and an external entity, respectively. The data processing phase is the process of dealing with and analyzing the data.

It is noteworthy that the connectivity establishment between the devices and the M2M gateway is the fundamental process for the M2M network communication. In this section, we adopt a cognitive-based connectivity establishment scheme, and more details are described in [11]. In the following, we will elaborate on the connectivity establishment mechanism and the performance analysis. Moreover, the main difference between the connectivity establishment mechanism based on cognitive radio and the traditional one is that the M2M devices can dynamically use the white spectrum based on the spectrum environment and the demands which can provide more flexibility.

Moreover, the key feature of the cognitive radio-based M2M network proposed in this paper is the capability of recognizing the communication environment and adaptively modifying the communication parameters, i.e., the M2M devices could sense the licensed spectrum based on the gateway kick-off information and then occupy the white spectrum holes. In order to improve the spectrum sensing performance and decrease the false detection probability, we adopt the distributed spectrum sensing scheme, that is, each M2M device self-organized senses the target spectrum and then returns the sensing results to the cognitive gateway. The gateway collects the available spectrum information and help to establish the connectivity. Based on the aforementioned discussion, the cognitive radio-based connectivity establishment mechanism in M2M network can be depicted in Figure 2, which mainly contains seven main steps:

Figure 2
figure 2

Connectivity establishment mechanism.

  1. (1)

    Kick-off: the M2M gateway informs the M2M devices through a predefined channel to start the spectrum sensing procedure.

  2. (2)

    Self-organization spectrum sensing: each M2M device independently implements the spectrum sensing to find the idle spectrum.

  3. (3)

    Collection of the available spectrum: the M2M gateway collects the available spectrum from the devices and selects an idle sub-spectrum to establish the connectivity between the related device and the gateway.

  4. (4)

    Spectrum selection confirmation: the gateway sends a notice to the device to confirm the selected idle sub-spectrum.

  5. (5)

    Connectivity establishment: both of the gateway and the device configure their RF with the selected spectrum and establish the connectivity.

  6. (6)

    Information transmission: the device and the gateway exchange information using the established connectivity. Furthermore, in the most cases of M2M communication scenario, information transmission will occupy the uplink channel, which means the M2M device report its collected data to the gateway and behind server.

  7. (7)

    Release the connectivity: both the device and the gateway disconnect the link.

To avoid the situation where the PU reuse the licensed spectrum occupying by the M2M network, we assume that the M2M device continues to periodically sense the target spectrum. More specifically, over each time slot and in a target spectrum, as illustrated in Figure 3, the frame structure consists of a spectrum sensing slot and a data transmission slot. For the i th target spectrum, suppose that the frame duration and the sensing duration at frame tag t is denoted by T and τi,t, respectively, and the date transmission duration is T − τi,t.

Figure 3
figure 3

Frame structure for interleaved sensing and utilization over the target spectrum of interest. τi,t, sensing slot duration; T − τi,t, data transmission slot duration.

Furthermore, we suppose that the PU maintains the same spectral-temporal usage characteristics in one frame. In practice, this assumption is reasonable since IEEE 802.22 has developed an air interface for opportunistic secondary access to the TV spectrum in which the primary signals change slowly, and the frame duration should be designed to be smaller than the average duration of the PU's transmission.

It also notes that the M2M gateway will coordinate the spectrum selection conflict in selecting the idle sub-spectrum.

2.2 Spectrum sensing scheme over the target channel

Whether for the detection of the spectrum holes, the spectrum sensing involves deciding whether the primary signal is present or not from the observed signals. We suppose that the received signal at the i th M2M device is sampled at sampling frequency f s over the target channel. The primary signal detection problem can be modeled as the following binary hypotheses:

x i n = η i n , H 0 , i h i s i n + η i n , H 1 , i
(1)

where x i (n) is the n th received sample, s i (n) is the primary transmitted signal, and each sample is assumed to be independent and identically distributed (i.i.d) with zero mean and variance σ s 2 , i.e., s i n ~ CN 0 , σ s 2 , η i (n) is the noise and assumed to be i.i.d circularly symmetric complex Gaussian with zero mean and variance σ η 2 , η i n ~ CN 0 , σ η 2 . Moreover, h i is the target channel gain between the primary transmitter and the i th M2M device receiver with the variance E h i 2 = σ h , i 2 ,0,i and1,i denote the hypotheses corresponding to the absence and presence of the PU, respectively. Suppose s i (n), η i (n), and h i (n) are independent of each other and the average received signal-to-noise ratio (SNR) can be calculated by

γ i = σ s 2 σ h , i 2 σ η 2 .
(2)

Let N t denote the number of samples over the target channel; without loss of the generality, we assume that N i  = τ i f s . The test statistics is thus obtained as the observed energy summation within N t consecutive components, i.e.,

X i = 1 N i j = 1 N i η i j 2 , H 0 , i 1 N i j = 1 N i h i s i j + η i j 2 . H 1 , i
(3)

Then under hypothesis0,i, the test statistic X i follows a central chi-square distribution with 2N i degrees of freedom and a noncentral chi-square distribution with 2N i degrees of freedom and a noncentrality parameter 2γ i for1,i. i.e.,

f X i X i = χ 2 N i 2 , H 0 , i χ 2 N i 2 2 γ i , H 1 , i
(4)

where f X i X i denotes the probability density function (PDF) of X i .

The performance of spectrum sensing algorithm in M2M network can be characterized by two parameters: probability of detection P d and probability of false alarm P f . P d is the probability of detecting the presence of the PU, while P f is the probability that the test incorrectly decides that the considered frequency is occupied by the PU when it actually is not. The probabilities of detection and false alarm have unique implications for both the PU and M2M devices. More specifically, from the PU's point of view, a large detection probability is desired in order to sufficiently protect the PU from the interference caused by the M2M device. From the M2M device's perspective, P f should be kept as small as possible for preventing underutilization of transmission opportunities. Therefore, the design of a detection algorithm leads to a tradeoff between the probability of detection and the probability of false alarm.

In order to facilitate the following discussion, we assume that the PU's signal is a complex-valued PSK signal. Based on the PDF of the test statistic, using central limit theorem, for large N i, , the energy detector's probabilities of detection and false alarm for the i th target channel can be approximated as [12]

P d , i τ i , ϵ i , γ i = Q ϵ i σ η 2 γ i h i 2 1 τ i f s 2 γ i h i 2 + 1 1 2 ,
(5)
P f , i τ i , ϵ i = Q ϵ i σ η 2 1 τ i f s 1 2 ,
(6)

where ϵ i denotes the detection thresholds, Q(.) is the complementary distribution function of the normalized Gaussian given by

Q x = 1 2 π x exp u 2 2 du .
(7)

Furthermore, the probability of missed detection for the i th M2M device is defined as

P m , i τ i , ϵ i , γ i = 1 P d , i τ i , ϵ i , γ i .
(8)

To evaluate the performance of the energy detection algorithm, the main metric is either minimizing the miss probability for a target false alarm probability or minimizing the false alarm probability for a target miss probability. Thus, for a targeted detection probability Pd,i, the probability of the false alarm is given by plugging (5) into (6),

P f , i τ i = Q Q 1 p d , i T 2 γ i h i 2 + 1 + γ i h i 2 τ i f s .
(9)

While, for a targeted false alarm probability p f , i T , the probability of the detection is given by substituting (6) into (5),

P d , i τ i = Q Q 1 p f , i T γ i h i 2 τ i f s 2 γ i h i 2 + 1 .
(10)

2.3 M2M network power allocation algorithm formulation

In this section, we follow the method in [10] to formulate the power allocation algorithm. In the joint spectrum overlay and underlay M2M network, there exist some basic problems that must be carefully investigated. The most important two are power allocations and interference managements of M2M devices. An ideal power allocation scheme should maximize the system utility of M2M network while causing acceptable interference to the PU. In this paper, we assume that both the M2M devices in SN and SF adopt a spread spectrum signaling format in which the transmitted power is evenly spread across the entire available spectrum.

For any devices α in SUNDER, its SINR can be expressed as

μ α = P S α G αα n 0 + i α P S i G + P P G P α ,
(11)

where n0 is the background noise power that is assumed to be the same for all users, G αα is the channel direct gain for M2M device α' transmitter to its receiver, G (GPα) is the channel cross gain from M2M Device i (PU)'s transmitter to α's receiver, PSi (PP) is the transmitted power of M2M Device i (PU). Note that in (11), we actually consider the worst case of PU interference by treating the PU as all being active, i.e., the access probability of PU is equal to 1.

For any devices β in SOVER, its SINR can be represented by

μ β = P S β G ββ n 0 + i β P S i G .
(12)

Since the PU is not active when β accesses the spectrum, β does not suffer from the PU interference. In order to guarantee the M2M device's QoS, the power allocations scheme should satisfy the following SINR constraints

μ i β i i = 1 , 2 , K .
(13)

Here, β i is the required SINR corresponding to the desired value of bit error rate. Let IP denote the interference threshold tolerable at PU Rx; the power allocations scheme must satisfy the interference constraint

α S UNDER P S α G α P I P ,
(14)

where Gα P is the channel cross gain from α's transmitter to PU Rx. Note that devices in SOVER are forbidden to access the spectrum when PU transmits information, so they contribute no interference to the PU. Recall the distribution assumption of devices, the number of devices in SUNDER (denoted by nF) can be calculated by

n F = K R a 2 R P 2 R a 2 ,
(15)

where n denotes the integer part of n. It is easy to find that nF is a monotone decreasing function in RP. When RP is small, the number of devices in SF is corresponding large. Thus, the performance of PU will be declined because of the unacceptable interference caused by the devices in SF. In contrast, when RP is large, the number of devices in SN is correspondingly large. If the PU has high access probability, then, the system utility of devices will be decreased because there are only a few devices that can use the spectrum by an underlay way. So RP must be carefully investigated when designing the power allocation scheme.

In order to evaluate the performance of the M2M Device i , we adopt the following utility function as the metric

U S j = ln μ j if j S UNDER ( 1 P d , j τ j ) ln ( μ j ) if j S OVER .
(16)

For each time slot, since the M2M devices belonging to SOVER have (1 − Pd,j(τ j )) probability to access the spectrum, we add access probability multiple to the utility function of devices in SOVER.

3 Optimal power allocation scheme

One of the most important goals we want to achieve is the optimal power allocation for different M2M devices. Specifically, the power allocation scheme should coordinate the device's transmitted power to achieve the maximum system utility. In this section, we assume that the devices in SN can perfect sense the PU's activity, i.e., they can exactly sense the PU's behavior in a particular slot.

3.1 The power allocation scheme with utility function

Based on the aforementioned discussion, the optimal power allocation problem can be expressed as follows:

max P S 1 , P S K α S UNDER , α = 1 n F U S α + β S OVER , β = 1 K n F U S β , s . t . 0 P S j P S j Max j = 1 , 2 , K , μ i β i i = 1 , 2 , K , α S UNDER P S α G α P I P ,
(17)

where P S j Max is the maximum transmitted power of M2M Device i . Note that the objective function α S UNDER , α = 1 n F U S α + β S OVER , β = 1 K n F U S β is equivalent to ln ( ( j S UNDER , j = 1 n F μ j ) i S OVER , i = 1 K n F μ i ) 1 P d , i τ i which provides the well-known proportional fair among devices [13]. Moreover, if Pd,i(τ i ) = 0, i.e., the PU is inactive in the slot, the objective function can be reduced to i = 1 K μ i ; otherwise, if Pd,i(τ i ) = 1, i.e., the PU occupies the spectrum all the time, the objective function can be reduced to i = 1 N F μ i . The above two extreme cases are easier solved. Thus, in this paper, we mainly consider the case 0 < Pd,i(τ i ) < 1. It is easy to find that (17) is a constraint optimization problem, it can be solved by the method of generalized geometric programming [14].

3.2 Power allocation scheme with optimal achievable throughput

In this subsection, we propose a power allocation scheme to achieve the optimal achievable throughput.

The throughput of any M2M device α in SUNDER can be expressed as

T α = W log 2 1 + P S α G αα n 0 + i α P S i G + P P G P α ,
(18)

where W is the spectrum bandwidth.

The throughput of any device β in SOVER can be represented by

T β = 1 P d , β τ β W log 2 1 + P S β G ββ n 0 + i β P S i G
(19)

Since the central issue that we want to investigate is the throughput of each device, it is important whether or not a power allocation scheme can yield a requested throughput vector T = [T1, T2, … T K ]. A throughput vector is called an achievable throughput vector of a power allocation scheme if the scheme can yield the throughput T i of M2M Device i , and the achievable throughput region is defined by the set of all achievable throughput vectors

T = T T α α S UNDER , T β β S OVER , and P S j P Sj Max , j = 1 , 2 , , K , α S UNDER P S α G α P I P , and P S α , P S α satisfies 13
(20)

Let T* be the set of Pareto optimal points of T[14]

T * = { T 1 , T 2 , T K T⏟ T i T i ~ ( T 1 , T i 1 , T i ~ , T i + 1 , T K ) T , for i = 1 , 2 , K } .
(21)

Therefore, a throughput is Pareto optimal (or efficient) if it is not possible to increase the throughput of any device without decreasing the throughput of some other devices.

Note that the above optimization problem is a nonlinear optimization one; it can be solved by the method of Karush-Kuhn-Tucker (KKT).

4 Simulation results

In this section, we present the simulation results. All simulations consist of the following setup: n0 = 0.01, K varies from 2 to 80, RP varies from 20 to 100, GSi Si = 2, P S i Max = 2 , β i  = 0.1, IP = 4, R a  = 100, GSi Sj = 0.1,  i ≠ j, GPSi = GSi P = 0.02, W = 1. We also assume the M2M devices satisfy uniform distribution with density λ, and here, we set λ =1.

In Figure 4, without loss of generality, we consider two M2M devices case where user S1 and S2 belong to SUNDER and SOVER, respectively. It is easy to extend the results to the multiple M2M devices scenarios. We show the achievable throughput set T and the Pareto optimal points set T* for different strategies. It can be seen that the achievable throughput set T of our proposed strategy is more efficient than the overlay strategy. Although the throughput of our strategy is smaller than the underlay strategy, it causes less interference to the PU comparing to the underlay strategy; thus, the proposed strategy can ensure the better QoS of the PU.

Figure 4
figure 4

Achievable throughput set T and Pareto optimal points set T * for different strategy.

Figure 5 depicts the M2M network utility in terms of the spectrum sensing time τ for different numbers of M2M devices. Here, we set the number of the target subchannels sensed by the M2M devices J = 10. We can see that the network utility is increasing with M (the number of M2M devices). It is noted that the utility is saturated when M is larger. Thus, for a targeted Mmax, it is not an optimal solution to more M2M devices.

Figure 5
figure 5

The M2M network utility vs. the spectrum sensing time τ for different numbers of M2M devices N.

5 Conclusions

In this paper, we have considered the power allocation problem in joint spectrum overlay and underlay M2M networks. We develop a connectivity establishment mechanism in M2M network based on the cognitive radio technology and proposed an optimal power allocation scheme aiming at maximizing the system utility and satisfied the QoS of M2M devices and interference of PU at the same time.

References

  1. Inhyok C, Shah Y, Schmidt AU, Leicher A, Meyerstein MV: Trust in M2M communication. IEEE Vehic. Tech. Mag. 2009, 4(3):69-75.

    Article  Google Scholar 

  2. Zhang Y, Yu R, Xie S, Yao W, Xiao Y, Guizani M: Home M2M networks: architectures, standards, and QoS improvement. IEEE Commun. Mag. 2011, 49(4):44-52.

    Article  Google Scholar 

  3. Mitola J III, Maguire G Jr: Cognitive radio: making software radios more personal. Pers. Commun. IEEE [see also IEEE Wireless Commun] 1999, 6(4):13-18.

    Google Scholar 

  4. Haykin S: Cognitive radio: brain empowered wireless communications. IEEE J. Selected Area Commun. 2005, 23(2):201-220.

    Article  Google Scholar 

  5. Qing Z, Sadler BM: A survey of dynamic spectrum access: signal processing, networking, and regulatory policy. IEEE Signal Process. Mag. 2007, 55(5):2294-2309.

    Article  Google Scholar 

  6. Zhigang W, Jie L: Spectrum sensing model for wireless internet of things. China Commun. 2011, 8(1):8-13.

    Google Scholar 

  7. Yifang Q, Qiang S, Tao L, Zhijun Z, Hui T, Song C, Zhiyong F: Cognitive network management in internet of things. China Commun. 2011, 8(1):1-7.

    Google Scholar 

  8. Zhang Y, Yu R, Nekovee M, Liu Y, Xie S, Gjessing S: Cognitive machine-to-machine communications: visions and potentials for the smart grid. IEEE Netw. 2012, 26(3):6-13.

    Article  Google Scholar 

  9. Huang J, Wang H, Qian Y, Wang C: Priority-based traffic scheduling and utility optimization for cognitive radio communication infrastructure-based smart grid. IEEE Trans. Smart Grid. 2013, 4(1):78-86.

    Article  MathSciNet  Google Scholar 

  10. Haipeng Y, Zhou Z, Zhang L, Liu H, Tang L, Kwak KS: An efficient power allocation scheme in joint spectrum overlay and underlay cognitive radio networks. Icheon: IEEE 9th International Symposium on Communications and Information Technology (ISCIT2009); 2009:102-105.

    Google Scholar 

  11. Yao H, Wang W, Liu Y, Zhang J: Spectrum sharing and power allocation analysis in machine to machine network. J. Conv. Inf. Technol. 2012, 7(19):242-250.

    Google Scholar 

  12. Seo H, Lee BG: Proportional-fair power allocation with CDF-based scheduling for fair and efficient multiuser OFDM systems. IEEE Trans. Wireless Commun. 2006, 5(5):978-983.

    Article  MathSciNet  Google Scholar 

  13. Tandra R, Sahai A: SNR walls for signal detection. IEEE J. Select. Topics Sig. Proc. 2008, 2: 4-17.

    Article  Google Scholar 

  14. Boyd S, Vandenberghe L: Convex Optimization. Cambridge: Cambridge University Press; 2004.

    Book  MATH  Google Scholar 

Download references

Acknowledgement

This work was supported by NSFC (61379016, 61271180), Important National Science and Technology Specific Projects (2013ZX03001020-003), Doctoral Program of Higher Education (20130005110016), and BUPT Youth Research and Innovation Plan (2014RC0103).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haipeng Yao.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, H., Huang, T., Zhao, C. et al. Optimal power allocation in cognitive radio based machine-to-machine network. J Wireless Com Network 2014, 82 (2014). https://doi.org/10.1186/1687-1499-2014-82

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2014-82

Keywords