 Research
 Open access
 Published:
Probabilistic constrained multicast beamforming in cognitive relay systems
EURASIP Journal on Wireless Communications and Networking volume 2015, Article number: 17 (2015)
Abstract
In this paper, multicast beamforming in cognitive relay systems is investigated with the consideration of imperfect channel state information at the transmitter (CSIT). We focus at the design of the optimal signal forwarding matrix at the cognitive relay in both centralized relay mode (CRM) and distributed relay mode (DRM). The problem is formulated aiming at minimizing the total consumed power at the relay node with suitable QoS guarantee for secondary users and strict interference control for primary users. Due to the uncertainty of transmission channel gains, constraints for QoS guarantee and interference control cannot be expressed in closed forms, making it extremely difficult to solve the problem directly. To circumvent this, we first employ the Bernsteintype inequality to convert the probabilistic constraints into closedform expressions and then present both the semidefinite relaxation (SDR) algorithm and the penalty function (PenFun) algorithm to accomplish the nonconvex problem optimization. Simulation results show that CRM is more resource efficient than DRM, and the PenFun algorithm can achieve a much better solution than the SDR algorithm at the cost of complexity. Meanwhile, compared with existing schemes which do not consider the CSIT error, the proposed schemes can support a much lower outage probability and enjoy perfect interference control for primary users.
1 Introduction
In recent years, along with the development of wireless communication technologies and the proliferation of multimedia services, multicast transmission has become an indispensable part of mobile communication systems, e.g., Multimedia Broadcast/Multicast Service (MBMS) in 3GPP [1], Broadcast and Multicast Service (BCMCS) in 3GPP2 [2], and Multicast and Broadcast Service (MBS) in IEEE 802.16 [3]. As a result, large amounts of effort has been made to design resourceefficient multicast schemes, among which cooperative multicast with the help of multiantenna relay nodes has attracted many researchers’ attention [47].
In the cooperative multicast scheme, multiantenna relay nodes may operate in either the distributed or the centralized manner. When operating in the distributed manner, each antenna forwards its own received signal with a respective amplification factor. For example, aiming at minimizing the total transmit power, the authors in [4,5] have studied the amplification factor optimization for a single multicast session and multiple multicast sessions, respectively. The model is superior when information exchange among different antennas is difficult, e.g., cooperative multicast in wireless sensor networks. By contrast, when the relay node operates in the centralized manner, each antenna forwards a combination of all received signals. In other words, joint signal processing across different antennas is executed in this manner. Although the implementation complexity increases, the supported throughput is much higher due to more optimization degrees of freedom [6,7].
Meanwhile, cognitive radio (CR), allowing secondary users to access the authorized spectrum bands with suitable interference control, is able to significantly improve the spectrum utilization and has been acknowledged as one of the most potential technologies in the next communication system [8]. Although cognitive beamforming has been well developed for several years, existing researches mainly focus on beamformer design at cognitive base stations, either for secondary users’ data transmission with restricted transmit power [9,10] or for primarysecondary cooperation with careful designed cooperation protocols [11,12]. There are also some works paying attention to the combination of multicast transmission and CR technology [1315]. However, as far as we know, most of those researches concentrate on onehop transmission, with few papers concerning cooperative multicast, especially multicast transmission via multiantenna relays.
In this paper, the CR technology and the cooperative multicast are jointly considered, and the multicast beamforming problem in cognitive relay systems is investigated. As mentioned above, the relay node can operate in either the centralized manner or the distributed manner, and these two relay modes, denoted as centralized relay mode (CRM) and distributed relay mode (DRM) respectively, have their own strong points and weakness. Hence, both CRM and DRM are included in our problem formulation. Furthermore, due to the channel feedback error and the feedback delay, perfect channel state information at the transmitter (CSIT) is always unavailable in practice. Unfortunately, to the best of our knowledge, most of the existing researches [47,1315] only apply to perfect CSIT feedback model. Therefore, imperfect CSIT feedback is also considered in our research model to enhance the practicability of our study.
More specially, we pay attention to the design of the optimal multicast signal forwarding matrix at the multiantenna cognitive relay. The formulated problem aims at minimizing the total consumed power at the relay node, subject to the constraints that the minimum received signaltointerferenceplusnoise ratio (SINR) requirement at each cognitive destination and the maximum received interference requirement at each primary user are satisfied with a prescribed, usually very high, probability. Different from the model of perfect CSIT feedback, constraints for the SINR guarantee and the interference control are in probabilistic forms, instead of closed forms. This characteristic makes it difficult to solve the formulated problem as we cannot compute the probability directly.
In this paper, a safe approximation is presented to solve the question, and detailed algorithms for both DRM and CRM are carefully designed. In DRM, the optimal forwarding matrix is a diagonal matrix. To optimize the diagonal vector, the Bernsteintype inequality is utilized to transform the probabilistic constraints into closedform expressions, making the problem easy to tackle. Thereafter, the semidefinite relaxation (SDR) method and the penalty function (PenFun) method are adopted to solve the problem efficiently. In CRM, we first prove that the optimal forwarding matrix is the combination of a matchedfilter receiver and an adaptive beamformer and then jointly exploit the Bernsteintype inequality and the PenFun method to accomplish the adaptive beamformer design.
2 Notation
Throughout this paper, the following notations are defined. \(\mathbb {C}^{N\times M}\) and \(\mathbb {D}^{N}\) denote the set of all N×M complex matrices and the set of all N×N diagonal complex matrices, respectively. I is the identity matrix with a suitable dimension. \(\mathcal {CN}(\mu,\sigma ^{2})\) is the complex Gaussian distribution with mean value μ and variance σ ^{2}, and Pr{θ} is the probability that case θ occurs. A≽0 means that matrix A is positive semidefinite, and A ^{⊥} is the orthonormal basis for the null space of A. A ^{H}, ∥A∥, Re[A], Tr[A], Rank[A] and λ _{max}(A) mean the conjugate transpose, the Frobenius norm, the real part, the trace, the rank and the maximal eigenvalue of matrix A, respectively.
3 System model and problem formulation
We consider a cognitive relay system where a Nantenna cognitive relay forwards message transmitted by a cognitive source to K cognitive destinations. Meanwhile, L primary users are active and communicating on the same authorized spectrum band. Similar to [47], it is assumed that there is no direct link from the source node to destinations and the communication can only be completed via the relay. Figure 1 is a simple illustration of the considered cognitive relay system.
3.1 Imperfect CSIT feedback model
For the sake of convenience, some symbols are predefined here. \(\mathbf {f}\in \mathbb {C}^{N\times 1}\) is the transmission channel vector from the cognitive source to the cognitive relay. \(\mathbf {h}_{\mathrm {c},k}\in \mathbb {C}^{N\times 1}\) and \(\mathbf {h}_{\mathrm {p},l} \in \mathbb {C}^{N\times 1}\) are the transmission channel vectors from the cognitive relay to destination k and primary user l, respectively.
This paper concerns how to select the optimal forwarding matrix W at the cognitive relay (shown in the next subsection). Hence, f is assumed to be perfectly known since it can be obtained by channel estimation at the cognitive relay. By contrast, h _{c,k } and h _{p,l }, which are obtained by channel feedback from cognitive destinations and primary users, are imperfectly known at the cognitive relay.
The imperfect CSIT feedback is modeled as [16,17]
where \(\hat {\mathbf {h}}_{\mathrm {c},k}\) and \(\hat {\mathbf {h}}_{\mathrm {p},l}\) are the presumed CSIT at the cognitive relay for destination k and primary user l, respectively, and e _{c,k } and e _{p,l } are the corresponding CSIT feedback errors.
Similar to [17], it is assumed that the CSIT feedback errors are complex Gaussian distributed, i.e., \(\mathbf {e}_{\mathrm {c},k}\sim \mathcal {CN}\left (\mathbf {0}, \mathbf {C}_{\mathrm {c},k}\right)\), \(\mathbf {e}_{\mathrm {p},l}\sim \mathcal {CN}\left (\mathbf {0},\mathbf {C}_{\mathrm {p},l}\right)\). For brevity, C _{c,k } and C _{p,l } are simplified as \(\mathbf {C}_{\mathrm {c},k} = \sigma _{\mathrm {c},k}^{2}\mathbf {I}\), \(\mathbf {C}_{\mathrm {p},l} = \sigma _{\mathrm {p},l}^{2} \mathbf {I}\). This simplification is to facilitate our description below and does not change the overall analysis of our problem.
3.2 Transmission model and problem formulation
The total transmission process is divided into two slots. In the first slot, the cognitive source broadcasts message x to the cognitive relay.
where \(\mathbf {z}_{\mathrm {R}}\sim \mathcal {CN}\left (\mathbf {0},{\sigma _{z}^{2}}\mathbf {I}\right)\) is the the received noise at the cognitive relay.
In the second slot, the cognitive relay forwards the received message y _{R} to destinations with a forwarding matrix \(\mathbf {W}\in \mathbb {C}^{N\times N}\). The forwarding signal is
and the final received signal at destination k is
where \(z_{k}\sim \mathcal {CN}\left (0,{\sigma _{z}^{2}}\right)\) is the received interference plus noise.
Based on Equation 5, the final received SINR at destination k could be calculated as
where p _{s} is the transmit power of the cognitive source.
Similarly, the total received interference from the signal forwarding at the cognitive relay node to primary user l can be estimated as
And the total consumed power at the cognitive relay is
In this paper, two kinds of relay modes at the relay node are adopted for cooperative multicast transmission [47], i.e.,

Centralized relay mode (CRM): In this mode, joint signal processing is allowed. Therefore, each antenna forwards a combination of the received signals [7], and W can be chosen as any N×N complex matrix, i.e.,
$$\begin{array}{@{}rcl@{}} \mathbf{W}\in \mathbb{C}^{N\times N}. \end{array} $$((9))This mode is preferable when antennas are deployed together and information exchange is available.

Distributed relay mode (DRM): In this mode, each antenna forwards its own received signal independently [4,5], and as a result, W should be a diagonal matrix, i.e.,
$$\begin{array}{@{}rcl@{}} \mathbf{W}= \text{Diag}(\mathbf{w}) \in \mathbb{D}^{N}. \end{array} $$((10))This mode is suited for the case where relay antennas are far apart from each other and large amounts of information exchange is difficult, except for channel state information.
Finally, the optimal forwarding matrix design is formulated as an optimization problem which aims at minimizing the total consumed power at the cognitive relay with prescribed transmission QoS guarantee for destination nodes and interference control for primary users.
where γ _{th} is the minimum required transmission SINR of the broadcast message, I _{th,l } is the interference threshold for primary user l, and P _{th} is the maximum transmit power at the cognitive relay. \(\mathcal {C}_{1}\) implies that the maximum outage probability for any cognitive destination should be no more than ρ _{c}. \(\mathcal {C}_{2}\) restricts that the probability that primary user l’s received interference exceeds the prescribed threshold I _{th,l } should be less than ρ _{p}. Throughout this paper, \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\) are also named as the maximum outage probability constraint for each cognitive destination and the maximum overinterference probability constraint for each primary user for short.
Remark 1.

To make a better understanding on these investigated two relay modes, we compare CRM and DRM to Joint Processing (JP) and Coordinated Beamforming (CB) in Coordinated MultiPoint transmission (CoMP) [18], where transmit antennas in our model correspond to transmit points in CoMP. In JP, both transmission data and channel information need to be shared among different transmit points, and a joint signal processing is required, while in CB, only channel information exchange is necessary and each point optimizes its own beamformer in a distributed manner.

Meanwhile, perfect synchronization among antennas is assumed in this paper, for both CRM and DRM. In CRM, synchronization could be simply achieved as antennas are deployed together. In DRM, although antennas are deployed apart from each other, a necessary backhaul link, either wired or wireless, is required to bear the channel information exchange, which could also be responsible for the antenna synchronization. This is similar to the case of CB, where a limited backhaul link is established to take charge of the channel information exchange and the point synchronization.
4 Algorithm design for DRM
In this section, the optimal forwarding matrix design problem for DRM is handled, which is indeed to optimize its diagonal vector. Toward this end, the Bernsteintype inequality and the SDR/PenFun method are jointly employed to solve the complex problem. In the next section, we prove that the optimal forwarding matrix W in CRM should be a rankone matrix. Based on this observation, the optimization of the forwarding matrix is transformed into the beamformer design, which can also be efficiently solved with the PenFun method.
4.1 Problem transformation
As the forwarding matrix W=Diag(w) is a diagonal matrix, the received signal at destination k in DRM can be simplified as
where F=Diag(f) and Z _{ R }=Diag(z _{ R }). Hence, the received SINR at destination k in Equation 6 can be rewritten as
Likewise, the received interference at primary user l can be rewritten as
And the total consumed power at the cognitive relay is
Combining Equations 10 ∼14, the optimal forwarding matrix design problem in DRM can be transformed as
4.2 Closedform expressions for constraints \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\)
Based on the imperfect CSIT model in Equation 1 and the SINR expression in Equation 12, let X=w w ^{H}, and it is derived that
where \(\mathbf {A}_{\mathrm {c}}= \frac {p_{\mathrm {s}}}{\gamma _{\text {th}}}\mathbf {F}\mathbf {X}\mathbf {F}^{H}  {\sigma _{z}^{2}} \mathbf {X}\), and the last step is obtained due to that A _{c} is a Hermitian matrix.
Let \(\tilde {\mathbf {e}}_{\mathrm {c},k} = \frac {1}{\sigma _{\mathrm {c},k}}\mathbf {e}_{\mathrm {c},k}\), \(\tilde {\mathbf {h}}_{\mathrm {c},k} = \frac {1}{\sigma _{\mathrm {c},k}}\hat {\mathbf {h}}_{\mathrm {c},k}\), \(c_{\mathrm {c},k}=\frac {1}{\sigma _{\mathrm {c},k}^{2}}\) \(\left ({\sigma _{z}^{2}}  \hat {\mathbf {h}}_{\mathrm {c},k}^{H} \mathbf {A}_{\mathrm {c}}\hat {\mathbf {h}}_{\mathrm {c},k} \right)\), and \(\mathcal {C}_{1}\) can be rewritten as
Using Lemma 2 in [19], \(\mathcal {C}_{1}\) can be safely approximated as
where β _{c}=− lnρ _{c}, and x _{c,k }≥0, y _{c,k }≥0 are some new added variables. Here, β _{c} could be deemed as a penalty factor for the uncertainty of \(\tilde {\mathbf {e}}_{\mathrm {c},k}\). Note that if constraint \(\mathcal {C}_{1}'\) is satisfied, then constraint \(\mathcal {C}_{1}\) is satisfied. Proof for detailed derivation could be found in Lemma 2 in [19]. In this sense, we state that the constraint transformation is safe.
Similarly, based on Equations 2 and 13, we can obtain
where \(\mathbf {A}_{\mathrm {p}}=p_{\mathrm {s}}\mathbf {F}\mathbf {X}\mathbf {F}^{H} + {\sigma _{z}^{2}}\mathbf {X}\).
Let \(\tilde {\mathbf {e}}_{\mathrm {p},l}=\frac {1}{\sigma _{\mathrm {p},l}}\mathbf {e}_{\mathrm {p},l}\), \(\tilde {\mathbf {h}}_{\mathrm {p},l} = \frac {1}{ \sigma _{\mathrm {p},l} } \hat {\mathbf {h}}_{\mathrm {p},l}\), \(c_{\mathrm {p},l}=\frac {1}{\sigma _{\mathrm {p},l}^{2}}\left (I_{\text {th},l}  \hat {\mathbf {h}}_{\mathrm {p},l}^{H} \mathbf {A}_{\mathrm {p}} \hat {\mathbf {h}}_{\mathrm {p},l}\right)\), β _{p}=− lnρ _{p}. Then, constraint \(\mathcal {C}_{2}\) can be rewritten as
which can also be safely transformed into the following closedform expression with the added variables x _{p,l }≥0 and y _{p,l }≥0.
Furthermore, the total consumed power can be rewritten as
Therefore, problem \(\mathcal {Q}^{\text {DRM}}\) can be conservatively transformed as
Remark 2.

As constraints \(\mathcal {C}_{1}'\) and \(\mathcal {C}_{2}'\) are only sufficient conditions for \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\), the optimal value of \(\mathcal {Q}^{\text {DRM}}_{1}\) is only an upper bound of the minimum power consumption of the original problem \(\mathcal {Q}^{\text {DRM}}\).

Since the maximum outage probability constraint \(\mathcal {C}_{1}'\) and the maximum overinterference probability constraint \(\mathcal {C}_{2}'\) provide a lower bound and an upper bound for the power consumption Tr(B X) respectively, problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is not always feasible.
4.3 Detailed algorithm design
Problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is nonconvex due to the rankone constraint, i.e., Rank(X)=1. Fortunately, some effective methods have been proposed to cope with this kind of multicast beamforming problem with rankone constraints, including semidefinite relaxation (SDR) [17,20], secondorder cone programming (SOCP) [5,21], PenFun method [13,15] and so on.
As the most frequently used method, the SDR method is simple to implement and the complexity is relatively low. By comparison, the PenFun method can approximate the optimal solution better with an increased complexity. Therefore, in the following, we first analyze the SDR algorithm briefly as a benchmark algorithm and then present the PenFun algorithm in detail as an advanced algorithm.
4.3.1 SDR algorithm
In the SDR algorithm, we first relax the problem and solve the relaxed problem to obtain a relaxed optimal solution. As the relaxed solution is always close to the original optimal solution for the nonrelaxed problem, we can generate feasible solutions around the relaxed solution and select the best one. With regard to the formulated problem \(\mathcal {Q}^{\text {DRM}}_{1}\), the following two successive steps are executed to acquire a suboptimal solution.
In the first step, the rankone constraint is dropped, after which problem \(\mathcal {Q}^{\text {DRM}}_{1}\) turns to be a convex problem and could be solved by the frequently used convex optimization methods, for example, the interior point algorithm. In this paper, the semidefinite programming (SDP) [17] is adopted to solve the relaxed problem. The detailed algorithm procedure is omitted as it is not the focus of this paper, and the optimal solution obtained from SDP is denoted as X _{opt}.
Then, in the second step, a randomization process is implemented to obtain a series of candidate w(i),i=1,2,…,T according to X _{opt} [22]. For the ith randomization, the following substeps are executed. 1〉 Make the singular value decomposition (SVD): X _{opt}=U S V ^{H} and randomly generate a normalized beamforming vector \(\tilde {\mathbf {w}}(i)\) using \(\mathbf {x}\sim \mathcal {CN}\left (\mathbf {0},\mathbf {I}\right)\).
2〉 Scale \(\tilde {\mathbf {w}}(i)\) with a minimum factor \(\sqrt {p(i)}\) to satisfy constraints \(\mathcal {C}_{1}'\sim \mathcal {C}_{3}'\) if there exists a feasible solution. 3〉 Compute the candidate beamforming vector and the power consumption as
Finally, from those feasible candidates obtained in the randomization process, select the optimal w(i) with the minimum power consumption P _{c}(i) at the cognitive relay.
4.3.2 PenFun algorithm
The most related work concerning the PenFun method is [13], in which the authors transform the rankone constraint into a concave penalty in the objective function and then handle the transformed problem with the convexconcave processing (CCP). However, this work only applies to perfect CSIT models, and in our paper, the algorithm is extended to the imperfect CSIT model.
Obviously, as X≽0, the rankone constraint can be rewritten as
Furthermore, substitute this constraint by adding a penalty into the objective function. Then, problem \(\mathcal {Q}^{\text {DRM}}_{1}\) can be reformulated as
where μ>0 is a large enough weight to result in small Tr(X)−λ _{max}(X). As f _{ o }(X) is concave, problem \(\mathcal {Q}^{\text {DRM}}_{2}\) is minimization of a concave function over a convex set, which can be efficiently solved with CCP [13,15].
The core idea of CCP is to decompose the optimization of a nonconvex problem into an iterative procedure, and in each iteration, the problem is modified as a convex one by replacing the concave part in the objective function with a Taylor’s approximation. Specially, if X ^{(t)} is the solution in the tth iteration, we can approximate the objective function f _{ o }(X) in the (t+1)th iteration as follows.
with ∂ X ^{(t)} denoting the subgradient of λ _{max}(X ^{(t)}), which can be selected as
where x _{max} is the normalized principal eigenvector of X ^{(t)}, i.e., the eigenvector corresponding to the maximal eigenvalue λ _{max}(X ^{(t)}).
Therefore, the optimization problem in the (t+1)th iteration can be expressed as
Problem \(\mathcal {Q}^{\text {DRM}}_{3}\) is convex and can be efficiently solved by the SDP method [17]. The whole process of the PenFun algorithm for problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is summarized as follows.
Input:
1: μ, t=0, X ^{(0)}, ε _{ d }, ε _{ Δ }.
Initialization:
2: Calculate d=Tr(X ^{(t)})−λ _{max}(X ^{(t)}). If d≤ε _{ d }, terminate the initialization stage.
3: Calculate λ _{max}(X ^{(t)}), x _{max} and solve problem \(\mathcal {Q}^{\text {DRM}}_{3}\), acquiring the optimal X ^{(t+1)}.
4: Calculate Δ=∥X ^{(t+1)}−X ^{(t)}∥. If Δ≤ε _{ Δ }, let μ=2μ.
5: Set t=t+1, and go back to step 2.
Iteration:
6: Calculate λ _{max}(X ^{(t)}), x _{max} and solve problem \(\mathcal {Q}^{\text {DRM}}_{3}\), acquiring the optimal solution X ^{(t+1)}.
7: Calculate Δ=∥X ^{(t+1)}−X ^{(t)}∥. If Δ≤ε _{ Δ }, terminate the Iteration stage.
8: Set t=t+1, and go back to step 6.
5 Algorithm design for CRM
In this section, Lemma 1 is presented to show that the optimal W in CRM is a rankone matrix. Specially, W is the combination of the matchedfilter receiver f ^{H} and the adaptive beamformer w. Based on this lemma, the matrix optimization is transformed into the beamformer design, which is similar to the problem in DRM. Finally, the Bernsteintype inequality and the PenFun method are jointly employed to solve the beamformer design problem.
5.1 Optimal structure of the forwarding matrix W
Lemma 1.
The optimal forwarding matrix W has the following structure.
Proof.
See Appendix A.
Lemma 1 indicates that the optimal forwarding matrix W is the combination of a matchedfilter receiver f ^{H} and an adaptive beamformer w as shown in Figure 2. In other words, we first receive the signal with maximal ratio combining (MRC) to achieve the best signal quality and then precode the received signal with a suitable beamforming vector to balance the received power at different cognitive destinations.
Based on the optimal structure, Equations 6 ∼8 can be rewritten as
Let \(\tilde {\gamma }_{\text {th}} = \frac {\gamma _{\text {th}} {\sigma _{z}^{2}}}{ p_{\mathrm {s}}\\mathbf {f}\^{4}  \gamma _{\text {th}} {\sigma _{z}^{2}}\\mathbf {f}\^{2} }\), it is derived that
Moreover, define \(\alpha = p_{s}\\mathbf {f}\^{4}+{\sigma _{z}^{2}}\\mathbf {f}\^{2}\), \(\tilde {I}_{\text {th},l} = I_{\text {th},l}/\alpha \), problem \(\mathcal {Q}^{\text {CRM}}\) can be rewritten as follows.
Obviously, \(\tilde {\gamma }_{\text {th}}\geq 0\) is required in practice, and hence the maximum achieved transmission SINR γ _{th} is \(p_{\mathrm {s}}\\mathbf {f}\^{2}/{\sigma _{z}^{2}}\), i.e.,
This is because the achieved transmission SINR is limited by the channel gain from the cognitive source to the cognitive relay.
5.2 Closedform expressions for constraints \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\)
Similar to the analysis for DRM, let X=w w ^{H}, and the following expression can be derived based on the imperfect CSIT model in Equation 1.
Let \(\tilde {\mathbf {e}}_{\mathrm {c},k}=\frac {1}{\sigma _{\mathrm {c},k}}\mathbf {e}_{\mathrm {c},k}\), \(\tilde {\mathbf {h}}_{\mathrm {c},k}=\frac {1}{\sigma _{\mathrm {c},k}}\hat {\mathbf {h}}_{\mathrm {c},k}\), \(c_{\mathrm {c},k}=\frac {1}{\sigma _{\mathrm {c},k}^{2}}\left (\tilde {\gamma }_{\text {th}}  \hat {\mathbf {h}}_{\mathrm {c},k}^{H} \mathbf {X}\hat {\mathbf {h}}_{\mathrm {c},k}\right)\), \(\mathcal {C}_{1}\) can be rewritten as
Using Lemma 2 in [19], \(\mathcal {C}_{1}\) can be safely transformed into
where β _{c}=− lnρ _{c}, and x _{c,k }≥0, y _{c,k }≥0 are some new added variables.
Moreover,
Let \(\tilde {\mathbf {e}}_{\mathrm {p},l}=\frac {1}{\sigma _{\mathrm {p},l}}\mathbf {e}_{\mathrm {p},l}\), \(\tilde {\mathbf {h}}_{\mathrm {p},l} = \frac {1}{ \sigma _{\mathrm {p},l} } \hat {\mathbf {h}}_{\mathrm {p},l}\), \(c_{\mathrm {p},l}=\frac {1}{\sigma _{\mathrm {p},l}^{2}}\left (\tilde {I}_{\text {th},l}  \hat {\mathbf {h}}_{\mathrm {p},l}^{H} \mathbf {X}\hat {\mathbf {h}}_{\mathrm {p},l} \right)\), β _{p}=− lnρ _{p}. Then, constraint \(\mathcal {C}_{2}\) can be rewritten as
which can also be safely transformed into the following closedform expression with the added variables x _{p,l }≥0 and y _{p,l }≥0.
Combining Equations 35 and 38, problem \(\mathcal {Q}^{\text {CRM}}\) can be conservatively transformed as
Similar to the analysis in Remark 2, \(\mathcal {Q}^{\text {CRM}}_{1}\) only gives an upper bound of the original problem \(\mathcal {Q}^{\text {CRM}}\) as constraints \(\mathcal {C}_{1}'\) and \(\mathcal {C}_{2}'\) are sufficient but not necessary conditions for \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\). Meanwhile, problem \(\mathcal {Q}^{\text {CRM}}_{1}\) is also not always feasible.
5.3 Detailed algorithm design
Similarly, both SDR and PenFun methods can be employed to solve problem \(\mathcal {Q}^{\text {CRM}}_{1}\). For brevity, the detailed explanation for the SDR algorithm is omitted, and in the following, we explain the PenFun algorithm simply.
First, redefine the constraint Rank(X)=1 as Tr(X)−λ _{max}(X)≤0 and add the penalty for this constraint into the objective function.
Then, the CCP method is adopted to solve the nonconvex optimization problem \(\mathcal {Q}^{\text {CRM}}_{2}\), in which the optimization of problem \(\mathcal {Q}^{\text {CRM}}_{2}\) is decomposed into the iterative optimization of a series of convex problems.
Given that X ^{(t)} is the solution of the convex problem in the tth iteration, the objective function f _{ o }(X) in the (t+1)th iteration can be approximated as
with ∂ X ^{(t)} denoting the subgradient of λ _{max}(X ^{(t)}) defined in Equation 30. And the optimization problem in the (t+1)th iteration can be expressed as
Problem \(\mathcal {Q}^{\text {CRM}}_{3}\) can be solved with the SDP method. The detailed process of the PenFun algorithm for \(\mathcal {Q}^{\text {CRM}}_{1}\) is similar to the one for \(\mathcal {Q}^{\text {DRM}}_{1}\) and is omitted due to space limitation.
6 Performance evaluation
In this paper, the channel gain between any antenna pair is modeled as h=d ^{−c/2} e ^{jθ} [12], where d is transmission distance, c, chosen as 3.5, is the path loss exponent, and θ is uniformly distributed in [ 0,2π). The distance between the cognitive source and the cognitive relay is set as 1, and the distance between the cognitive relay and cognitive destinations ranges from 1 to 2 uniformly. Meanwhile, for brevity, the distance from the cognitive relay to primary users is fixed as 3.
The CSIT errors for the Rayleigh channel are σ _{c,k }=0.1 and σ _{p,l }=0.2 by default. While calculating the overall CSIT errors, the path loss d ^{−c/2} should be multiplied. The prescribed maximum outage probability threshold and the maximum overinterference probability threshold are set as ρ _{c}=ρ _{p}=0.1.
Other simulation parameters which are fixed throughout the following simulations include: N=4, K=8, L=2, p _{s}=1 W, \({\sigma _{z}^{2}}=30\) dBW.
The results are averaged by 2,000 channel realizations; and for the SDR algorithm, 5,000 times of randomization are performed in each channel realization. The computer used in the simulations is Lenovo PC with the following configuration.

Processor: Intel(R) Core(TM) i32130 CPU@ 3.40 GHz;

RAM: 2 GHz (1.8 GHz available);

System type: a 32bit operation system.
In Figures 3, 4, 5, 6, and 7, performance comparison with different minimum required transmission SINR is demonstrated. Four schemes are simulated, including ‘DRM+SDR’, ‘DRM+PenFun’, ‘CRM+SDR’, and ‘CRM+PenFun’. Figures 3 and 4 plot the successful transmission probabilities and the total power consumption of different schemes. The successful transmission probability is defined as the probability that the formulated problem for DRM (CRM), i.e., \(\mathcal {Q}_{1}^{\text {DRM}}\) (\(\mathcal {Q}_{1}^{\text {CRM}}\)), is successfully solved with the proposed SDR (PenFun) algorithm.
It is shown that no matter in DRM or CRM, the successful transmission probability of the PenFun algorithm is much higher than that of the SDR algorithm. Meanwhile, for the SDR algorithm, CRM can sustain a higher successful transmission probability than DRM. It is also found that along with the increase of the required transmission SINR γ _{th}, the average consumed power of all four schemes increases correspondingly. Moreover, CRM with the PenFun algorithm consumes the least transmit power, and DRM with the SDR method consumes the most transmit power. In addition, compared to DRM with the SDR algorithm, improving the optimization algorithm (employing the PenFun algorithm) is able to reduce more power consumption than improving the relay mode (employing CRM). In other words, during the observed range of γ _{th}, the performance gain obtained from the algorithm improvement is larger than that from the mode improvement.
Figures 5 and 6 are the comparison of the average outage probability of cognitive destinations and the average overinterference probability of primary users. To be fair, only outage probability and overinterference probability in the channel realization with successful transmission are averaged in simulations.
It is observed that when the formulated problem is feasible, all these four schemes can provide robust data reception for destinations. The maximum outage probability is about 0.006, much lower than the prescribed threshold ρ _{c}=0.1. However, it is easy to prove that the maximum outage probability constraint \(\mathcal {C}_{1}\) in problem should be satisfied tightly, indicating an achieved outage probability equal to ρ _{c}. The achieved results do not agree with our analysis. This is because that constraint \(\mathcal {C}_{1}\) is conservatively transformed into \(\mathcal {C}_{1}'\) in problems \(\mathcal {Q}^{\text {DRM}}_{1}\) and \(\mathcal {Q}^{\text {CRM}}_{1}\), and hence the achieved outage probabilities in these two transformed problems become much lower than the prescribed thresholds.
Similarly, all these schemes support perfect interference control for primary users, with the maximum overinterference probability less than 0.015. The achieved overinterference probability is much lower than the prescribed threshold ρ _{p}=0.1 because the maximum overinterference probability constraint \(\mathcal {C}_{2}\) is strengthened in the transformed problems \(\mathcal {Q}^{\text {DRM}}_{1}\) and \(\mathcal {Q}^{\text {CRM}}_{1}\).
Figure 7 shows the average computation time of different schemes. We can observe that the average computation time of the PenFun algorithm is about 3 (7.5) times higher than that of the SDR algorithm for DRM (CRM). And moreover, DRM consumes more computation time than CRM does.
In summary, we conclude that in the observed range of γ _{th},

1) As the optimization degree of freedom of CRM is larger than that of DRM, CRM provides better resource utilization, resulting in higher successful transmission probability and less consumed power.

2) No matter in DRM or CRM, the PenFun algorithm can achieve a much better solution than the SDR algorithm, i.e., the PenFun algorithm supports higher successful transmission probability and consumes less transmit power. However, an iterative optimization is required as shown in Sections 3.3.2 and 4.3, leading to a much higher computation complexity.

3) With respect to the successful transmission probability and the total consumed power, improving the optimization algorithm results in larger performance gain than improving the relay mode.

3) The achieved outage probability and overinterference probability in the proposed schemes are much lower than the prescribed thresholds. To approximate the original constraints and reduce the power consumption, β _{c}=− lnρ _{c}/ε _{c} (β _{p}=− lnρ _{p}/ε _{p}) can be adopted in the constraint transformation, where ε _{c}>1 (ε _{p}>1) is the adjustment parameter, and can be obtained by the training process and the bisection search [16].
Moreover, the performance of relaying schemes which do not consider CSIT error is also simulated. In the following figures, the proposed relaying schemes are denoted as ‘DRM w.c. CSIT error’ and ‘CRM w.c. CSIT error’, where the PenFun algorithm is adopted in the simulations. By contrast, ‘DRM w/o.c. CSIT error’ and ‘CRM w/o.c. CSIT error’ denote the relaying schemes which do not consider CSIT error, and the adopted algorithms are mainly modified from [5,7] respectively.
In Figures 8, 9, 10, and 11, γ _{th}=150 is set, and the performance comparison is plotted with different interference threshold I _{th,l }. It is observed that although ‘DRM w/o.c. CSIT error’ and ‘CRM w/o.c. CSIT error’ acquire higher successful transmission probabilities and lower power consumption, the achieved average outage probability and overinterference probability violate the prescribed thresholds seriously. For example, when I _{th,l }=0.03 W, the average outage probability and overinterference probability are 0.1994 (0.1952) and 0.3198 (0.3065) in ‘DRM w/o.c. CSIT error’ (‘CRM w/o.c. CSIT error’), much higher than the prescribed maximum threshold ρ _{c}=ρ _{p}=0.1. Moreover, it is shown in Figure 11 that as the interference threshold decreases, the achieved overinterference probabilities in these two schemes increase greatly.
In contrast, the proposed schemes can guarantee the maximum outage probability constraint and the maximum overinterference probability constraint perfectly no matter what value I _{th,l } is set. The guarantee for the maximum outage probability and the maximum overinterference probability is achieved at the cost of lower successful transmission probability and larger power consumption.
7 Conclusion
This paper investigates the optimal forwarding strategy design for multicast transmission in cognitive relay systems with both DRM and CRM. Meanwhile, to improve the practicability of our research, imperfect CSIT feedback is considered. For DRM, we employ the Bernsteintype inequality to transform the probabilistic constraints into closedform expressions and then utilize the SDR/PenFun method to optimize the diagonal vector. For CRM, we first derive the optimal structure of the forwarding matrix and then jointly exploit the Bernsteintype inequality and the PenFun method to solve the transformed problem. Simulation results show that CRM provides higher resource utilization, and the PenFun algorithm can achieve better solution than the SDR algorithm at the cost of increased complexity. Moreover, compared with the existing schemes, which concentrate on perfect CSIT feedback model, the proposed scheme can provide a superior user experience for secondary users and protect the communications of primary users better by keeping both the outage probability for secondary users and the overinterference probability for primary users below the prescribed thresholds. However, only one multicast session and one relay node are considered in this paper. In our future work, the research will be extended to multiple mulicast sessions and multiple relay nodes.
8 Appendix A: Proof of Lemma 1
Let H=[h _{c,1},…,h _{c,K },h _{p,1},…,h _{p,L }], and the optimal structure of W is analyzed in the following two different cases.
In case one where K+L≥N, W can be rewritten as
where \(\mathbf {a}\in \mathbb {C}^{(K+L)\times 1}\), \(\mathbf {B}\in \mathbb {C}^{(K+L)\times (N1)}\).
A closer observation of problem reveals that the optimal W should minimize ∥W f∥^{2}, ∥W∥^{2}, \(\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\mathbf {f}^{2}\), \(\\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\^{2}\), \(\\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\^{2}\) and meanwhile maximize \(\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\mathbf {f}^{2}\). It is obvious that B does not affect \(\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\mathbf {f}^{2}\), ∥W f∥^{2}, \(\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\mathbf {f}^{2}\), and setting B=0 reduces ∥W∥^{2}, \(\\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\^{2}\), \(\\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\^{2}\). As a result, the optimal W can be written as
In case two where K+L<N, W can be rewritten as
where \(\mathbf {c}\in \mathbb {C}^{(NKL)\times 1}\), \(\mathbf {D}\in \mathbb {C}^{(NKL)\times (N1)}\).
Similarly, it can be observed that c and D does not affect \(\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\mathbf {f}^{2}\), \(\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\mathbf {f}^{2}\), \(\\mathbf {h}_{\mathrm {p},l}^{H}\mathbf {W}\^{2}\), \(\\mathbf {h}_{\mathrm {c},k}^{H}\mathbf {W}\^{2}\), and setting them as zero will reduce ∥W f∥^{2} and ∥W∥^{2}. Hence, the optimal W can be also written as
In conclusion, the optimal structure of the forwarding matrix W in Lemma 1 is acquired.
References
3GPP, Improvement of the Multimedia Broadcast Multicast Service (MBMS) in UTRAN,3GPP TR 25.905 (2007).
GPP, 2, CDMA2000 High Rate BroadcastMulticast Packet Data Air Interface Specification,2GPP2 Std. C.S0054, Rev. 1.0 (2005).
IEEE, Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment2 : Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1. IEEE Std 802. 16e (2005).
A Abdelkader, M Pesavento, AB Gershman. IEEE International. Workshop Compun. Adv. MultiSensor Adaptive Process. San Juan, (2011), pp. 225–228.
N Bornhorst, M Pesavento, AB Gershman, Distributed beamforming for multigroup multicasting relay networks. IEEE Trans. Signal Process. 60(1), 221–232 (2012).
V HavaryNassab, S Shahbazpanahi, A Grami, Joint receivetransmit beamforming for multiantenna relaying schemes. IEEE Trans. Signal Process. 58(9), 4966–4972 (2010).
M Dong, B Liang, in IEEE International Workshop on Compun. Adv. MultiSensor Adaptive Process., St. Martin. Multicast Relay Beamforming through Dual Approach, (2013), pp. 492–495.
A Goldsmith, SA Jafar, I Maric, I Maric, S Srinivasa, Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE. 97(5), 894–914 (2009).
L Zhang, YC Liang, Y Xin, HV Poor, Robust cognitive beamforming with partial channel state information. IEEE Trans. Wireless Commun. 8(8), 4143–4153 (2009).
R Zhang, Y Liang, S Cui, Dynamic resource allocation in cognitive radio networks. IEEE Signal Process Mag. 27(3), 102–114 (2010).
SH Song, MO Hasna, KB Letaief, Prior zero forcing for cognitive relaying. IEEE Trans. Wireless Commun. 12(2), 938–947 (2013).
G Zheng, S Song, K Wong, B Ottersten, Cooperative cognitive networks : optimal, distributed and lowcomplexity algorithms. IEEE Trans. Signal Process. 61(11), 2778–2790 (2013).
AH Phan, HD Toan, HH Kha, DT Ngo, in IEEE Int. Conf. Commun. Electron., Nha Trang. A reverse convex programming for beamforming in cognitive multicast transmission, (2010), pp. 211–215.
M Beko, Efficient beamforming in cognitive radio multicast transmission. IEEE Trans. Wirelesss Commun. 11(11), 4108–4117 (2012).
AH Phan, HD Tuan, HH Kha, DT Ngo, Nonsmooth optimization for efficient beamforming in cognitive radio multicast transmission. IEEE Trans. Signal Process. 60(6), 2941–2951 (2012).
K Wang, T Chang, W Ma, AM So, C Chi, in IEEE ICASSP, Prague. Probabilistic SINR constrained robust transmit beamforming A Bernsteintype inequality based conservative approach, (2011), pp. 3080–3083.
C Shen, TH Chang, KY Wang, Z Qiu, CT Chi, in IEEE Global Conference on Communications, Anaheim, CA. Chanceconstrained robust beamforming for multicell coordinated downlink, (2012), pp. 4957–4962.
P Marsch, G Fettweis, Coordinated MultiPoint in Mobile Communications (Cambridge University Press, 2011).
I Bechar, A Bernsteintype Inequality for Stochastic Processes of Quadratic Forms of Gaussian Variables,. ArXiv eprints (2009). arxiv.org/pdf/0909.3595.pdf.
E Karipidis, ND Sidiropoulos, ZQ Luo, Quality of service and maxmin fair transmit beamforming to multiple cochannel multicast groups. IEEE Trans. Signal Process. 56(3), 1268–1279 (2008).
X Liu, H Li, H Wang, in IEEE International Conference on Communications and Networking in China, Guilin. Probability constrained robust multicast beamforming in cognitive radio network, (2013), pp. 708–712.
Z Luo, W Ma, A So, Y Ye, S Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20–34 (2010).
Acknowledgements
This work is supported by National Natural Science Foundation of China (61471059), the 863 Project No.2014AA01A701, fundamental Research Funds for the Central Universities (2014ZD0301), Special Youth Science Foundation of Jiangxi (20133ACB21007).
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Li, S., Xu, W., Lu, X. et al. Probabilistic constrained multicast beamforming in cognitive relay systems. J Wireless Com Network 2015, 17 (2015). https://doi.org/10.1186/s1363801502531
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801502531