 Research
 Open Access
Spectrum sharing on interference channels with a cognitive relay
 Qiang Li^{1},
 Ashish Pandharipande^{2},
 See Ho Ting^{3} and
 Xiaohu Ge^{1}Email author
https://doi.org/10.1186/s1363801504080
© Li et al. 2015
 Received: 29 September 2014
 Accepted: 3 June 2015
 Published: 26 June 2015
Abstract
In this paper, an interference channel with a cognitive relay (IFCCR) is considered to achieve spectrum sharing between a licensed primary user and an unlicensed secondary user. The CR assists both users in relaying their messages to the respective receivers, under the constraint that the performance of the legacy primary user is not degraded. Without requiring any noncausal knowledge, the CR uses a successive interference cancellation to first decode the primary and secondary messages after a transmission phase. A power allocation is then performed to forward a linear weighted combination of the processed signals in the relaying phase. Closedform expressions of the endtoend outage probability are derived for both primary and secondary users under the proposed approach. Furthermore, by exploiting the decoded primary and secondary messages in the first phase, we propose the use of dirty paper coding (DPC) at CR to precancel the interference seen at the secondary (or primary) receiver in the second phase, which results in a performance upper bound for the secondary (or primary) user without affecting the other user. Simulation results demonstrate that with a joint consideration of the power control at the secondary transmitter and the power allocation at CR, performance gains can be achieved for both primary and secondary users.
Keywords
 Cognitive spectrum sharing
 Interference channel with a cognitive relay
 Successive interference cancellation
 Dirty paper coding
1 Introduction
1.1 Background and related work
A twouser symmetric Gaussian IFCCR was first introduced in [7], where the CR was assumed to be full duplex and adopt a decodeandforward (DF) processing. Through rate splitting [16] at both sources and joint decoding at each destination, an achievable rate region was obtained. Then, this achievable rate was improved in [8] by performing sophisticated coding strategies that require noncausal information of both transmitters at the CR prior to information transmission. By combining the HanKobayashi coding scheme [16] for interference channels with dirty paper coding (DPC) [17], a generalization of the achievable rate region obtained in [8] was derived in [9]. In [10], an outer bound for the capacity of a general IFCCR was first derived. New inner and outer bounds for the capacity of IFCCR were derived later in [11–15], under various conditions.
A Gaussian interference channel with an outofband relay was investigated in [18, 19] where the relay was assumed to operate over orthogonal bands to the underlying interference channel. In [18], the entire system was characterized by two parallel channels, namely a Gaussian interference channel and a Gaussian relay channel. To characterize the capacity, relay operations were optimized with separable or nonseparable encoding between the interference channel and the outofband relay channel. In [19], the impact of the outofband relay channel and the corresponding signal interactions on the capacity were investigated under general channel conditions.
In the above works, the two interfering users are assumed to be part of the peer users in the same radio system. A question that arises is as follows: what if the two interfering users belong to different radio systems that are of different priorities. In view of the mutual interference between the two users and the inherent cognition and cooperation ability equipped at the CR, it is natural to evaluate IFCCR under a cognitive spectrum sharing setup between, e.g., a licensed primary user and an unlicensed secondary user [20–23]. Under such circumstances, we assume that the CR belongs to the secondary system or a thirdparty agent. Then, instead of characterizing the capacity or sum rate of the entire system as in [7–15], it is more pragmatic to enhance the performance of the secondary user under the constraint that no harm is caused to the legacy primary user [24–26].
A spectrum sharing protocol was proposed on the interference channel in [26]. With the assumption that the secondary transmitter has noncausal knowledge of the codewords originated at the primary transmitter, achievable rates of the secondary user were characterized under the constraint that no rate degradation was created for the primary system. As a variant of [26], a spectrum sharing protocol was proposed between a primary and a secondary user on an IFCCR in [27]. With the assumption that noncausal knowledge of the primary codewords is available at both the secondary transmitter and the CR, an enhanced throughput was achieved for the secondary user without degrading the throughput of the primary user. In [28], a spectrum sharing protocol was proposed on an IFCCR where the CR helps both the primary and secondary transmissions. A DF relay protocol was considered where only when both primary and secondary messages are successfully decoded at CR, they are forwarded in the second phase with a certain power allocation. Conditioned on the decoding results at CR, the received SNR at each receiver was analyzed, through which an upper bound of the outage probability was derived. In [29], an opportunistic adaptive relaying protocol is proposed on IFCCR, where CR is able to determine when to cooperate with the primary user, when to cooperate with the secondary user, and when to cooperate with both users simultaneously. An upper bound of the secondary outage probability was derived under a primary outage probability threshold. In [30], an amplifyandforward (AF) relay protocol was performed at CR to help relay the signals of both primary and secondary users over independent Nakagamim fading channels. Assuming there are no cross links between primary and secondary users, endtoend outage probabilities of the primary and secondary users were obtained. Simulation results demonstrated a performance gain for both primary and secondary users.
1.2 Our contributions

In decoding the mixed signals using SIC, we define an event to describe whether a specific message can be successfully recovered. In order to illustrate the correlation between the successive events in decoding mixed signals, we introduce a graphical representation by which each event can be represented by the corresponding region in a 2dimensional (or 3dimensional) graph. On this basis, by integrating over the respective regions of events, accurate closedform expressions of the endtoend outage probability can be derived for both primary and secondary users under the proposed protocol.

Without requiring noncausal knowledge, CR attempts to decode both primary and secondary messages after a first transmission phase in the proposed protocol. For the case where both messages are successfully recovered at CR after the first transmission phase, in order to further mitigate the mutual interference, we propose using DPC at CR to precancel the interference seen at PR or SR in the subsequent relaying phase. Numerical results demonstrate a performance upper bound for the primary (or secondary) user, without affecting the performance of the other user.

To guarantee that no harm is caused to the primary system, besides the power allocation performed at CR to forward the primary and secondary messages respectively, we find that a power control at ST is also needed to facilitate the SIC decoding at CR as well as to limit the interference caused to PR. Numerical results demonstrate that with a proper design of the power allocation at CR and the transmit power at ST, the secondary user is allowed to access the licensed spectrum and at the same time performance gains can be achieved for both primary and secondary systems.
The rest of this paper is organized as follows. Section 2 describes the system model, where the two successive phases are discussed and the endtoend outage probability of IFCCR is defined. In Section 3, based on the possible decoding results at CR in the first transmission phase, the corresponding performance at PR and SR in the second phase is analyzed. By exploiting the decoded messages, in Section 4, we propose using DPC at CR, which provides a performance upper bound. Simulation results are presented in Section 5 where the effects of different parameters are evaluated. Finally, Section 6 concludes the paper.
2 System model and protocol description
A summary of abbreviations, notations, and symbols
SIC  Successive interference cancellation 

IFCCR  Interference channel with a cognitive relay 
DPC  Dirty paper coding 
AF/DF  Amplifyandforward/decodeandforward 
PT/PR  Primary transmitter/primary receiver 
ST/SR  Secondary transmitter/secondary receiver 
MRC  Maximalratio combining 
AWGN  Additive white Gaussian noise 
x _{ p }  Signal transmitted from PT 
x _{ s }  Signal transmitted from ST 
x _{ r }  Signal transmitted from CR 
y _{ p }  Signal received at PR 
y _{ s }  Signal received at SR 
y _{ r }  Signal received at CR 
n _{0}  AWGN that is with unitary variance 
h _{ ij }  Channel coefficient of link i→j 
γ _{ ij }=h _{ ij }^{2}  Channel power gain of link i→j 
exp(δ)  An exponential distribution with mean δ ^{−1} 
P _{ P }  Transmit power at PT 
P _{ S }  Transmit power at ST 
P _{ R }  Transmit power at CR 
R _{ pt }  Target rate at PT 
R _{ st }  Target rate at ST 
\(\mathcal {E}\), \(\overline {\mathcal {E}}\)  An event and its complementary event 
\(\Pr \{\mathcal {E}\}\)  Probability of event \(\mathcal {E}\) 
O _{ P }  Endtoend outage probability of the primary system 
O _{ S }  Endtoend outage probability of the secondary system 
α  Power allocation factor at CR 
θ  Ratio between P _{ S } and P _{ P } 
τ  Ratio between \(\delta _{\textit {sr}}^{1}\) and \(\delta _{\textit {pr}}^{1}\) 
φ  Ratio between \(\delta _{\textit {sp}}^{1}\) and \(\delta _{\textit {pp}}^{1}\) 
As shown in Fig. 2, in order to maintain the causality of the system, we divide the entire transmission process into two phases as discussed in the following.
2.1 First transmission phase
 1.
\(\mathcal {E}^{(1)}=\{\)Both x _{ p } and x _{ s } are successfully decoded at CR };
 2.
\(\mathcal {E}^{(2)}=\{\)Only x _{ p } is successfully decoded at CR };
 3.
\(\mathcal {E}^{(3)}=\{\)Only x _{ s } is successfully decoded at CR };
 4.
\(\mathcal {E}^{(4)}=\{\)Neither of x _{ p } and x _{ s } is successfully decoded at CR }.
The corresponding probabilities are defined as \(\Pr \left \{\mathcal {E}^{(1)}\right \}\), \(\Pr \left \{\mathcal {E}^{(2)}\right \}\), \(\Pr \left \{\mathcal {E}^{(3)}\right \}\), and \(\Pr \left \{\mathcal {E}^{(4)}\right \}\) that will be derived in Section 3.1.
2.2 Second transmission phase
When at least one of x _{ p } and x _{ s } is successfully decoded by CR, a power allocation is performed to forward a linear weighted combination of x _{ p } and x _{ s } in the second phase. Otherwise, CR simply stays silent and both PT and ST perform retransmissions simultaneously.
2.2.1 2.2.1 Conditioned on event \(\mathcal {E}^{(1)}\)
2.2.2 2.2.2 Conditioned on event \(\mathcal {E}^{(2)}\)
2.2.3 2.2.3 Conditioned on event \(\mathcal {E}^{(3)}\)
2.2.4 2.2.4 Conditioned on event \(\mathcal {E}^{(4)}\)
2.3 Endtoend performance
For the decoding at PR at the end of the second phase, MRC is performed to decode x _{ p } by utilizing the received signals in two successive phases, i.e., y _{ p }(1) and y _{ p }(2), while treating the secondary component of x _{ s } simply as noise. Then, depending on the decoding results \(\mathcal {E}^{(1)}\), \(\mathcal {E}^{(2)}\), \(\mathcal {E}^{(3)}\), and \(\mathcal {E}^{(4)}\), at CR at the end of the first phase, we define \(O_{P}^{(1)}\), \(O_{P}^{(2)}\), \(O_{P}^{(3)}\), and \(O_{P}^{(4)}\) as the corresponding outage probabilities at PR at the end of the second phase. On the other hand, SIC is performed at SR to decode the desired message x _{ s } by utilizing both received signals y _{ s }(1) and y _{ s }(2). Similarly, we define \(O_{S}^{(1)}\), \(O_{S}^{(2)}\), \(O_{S}^{(3)}\), and \(O_{S}^{(4)}\) as the corresponding outage probabilities at SR at the end of the second phase.
Theorem 1.
Next, we proceed to analyze the decoding performance at CR as well as PR and SR in two successive phases, respectively.
3 Numerical analysis
3.1 Decoding performance at CR in the first phase
occurs, where \(R_{\textit {st}}^{\prime }=2^{2R_{\textit {st}}}1\).
occurs.
where \(f(\gamma _{\textit {sr}})=\delta _{\textit {sr}}e^{\delta _{\textit {sr}}\gamma _{\textit {sr}}}\phantom {\dot {i}\!}\) and \(f(\gamma _{\textit {pr}})=\delta _{\textit {pr}}e^{\delta _{\textit {pr}}\gamma _{\textit {pr}}}\phantom {\dot {i}\!}\) denote the respective probability density functions (PDF) of γ _{ sr } and γ _{ pr }, and f(γ _{ sr },γ _{ pr })=f(γ _{ sr })f(γ _{ pr }) denotes the joint PDF [34].
Lemma 1.
Please find in Appendix A for the detailed derivations.
3.2 Decoding performance at PR in the second phase
3.2.1 3.2.1 Conditioned on event \(\mathcal {E}^{(1)}\)
where the approximation is obtained assuming P _{ R }≫1 [24, 25].
Lemma 2.
Please find in Appendix B for the detailed derivations.
3.2.2 3.2.2 Conditioned on event \(\mathcal {E}^{(2)}\)
3.2.3 3.2.3 Conditioned on event \(\mathcal {E}^{(3)}\)
3.2.4 3.2.4 Conditioned on event \(\mathcal {E}^{(4)}\)
Lemma 3.
Please find in Appendix C for the detailed derivations.
Substituting (23), (25), (27), and (29) into (9), we can thus obtain the endtoend outage probability O _{ P } of the primary system.
Theorem 2.
Remark 1.
From Theorem 2, CR may simply select a power allocation factor \(\alpha =\alpha ^{\ast }=\frac {R_{\textit {pt}}^{\prime }}{R_{\textit {pt}}^{\prime }+1}\) such that a reasonably good performance is achieved for the primary system, without requiring the CSI or other relevant information.
Remark 2.
Remark 3.
From (30) and (31), if \(\Pr \left \{\mathcal {E}^{(4)}\right \}O_{P}^{(4)}\leq O_{P}^{\prime }\), then it is possible to find a suitable power allocation factor α, e.g., α≥α ^{∗}, such that the condition in (32) is satisfied. If however, \(\Pr \left \{\mathcal {E}^{(4)}\right \}O_{P}^{(4)}>O_{P}^{\prime }\), then the primary system experiences a performance loss compared to the benchmark case even when α→1. Thus, in order to guarantee the performance of the legacy primary system, apart from selecting a proper power allocation factor α≥α ^{∗} at CR, the transmit power P _{ S } also needs to be properly designed.
For the power control of P _{ S }, it is assumed that the statistical CSI of h _{ sp } and h _{ pp } is available at ST, which is a common assumption made in existing works [20–23]. Assuming that the channels are reciprocal, the CSI can be acquired at ST through a feedback channel from PR [35–37]. In addition, other relevant information is also required, i.e., P _{ P } and R _{ pt }, which is usually inserted in the header of a packet that can be overheard by ST. With these information, both \(\Pr \left \{\mathcal {E}^{(4)}\right \}O_{P}^{(4)}\leq O_{P}^{\prime }\) and \(O_{P}^{\prime }\) can be estimated at ST. Furthermore, we assume that the probability \(\Pr \left \{\mathcal {E}^{(4)}\right \}\) is available at ST through a feedback channel from CR. Thus, although it is intractable to analytically derive P _{ S } such that \(O_{P}\leq O_{P}^{\prime }\), as long as a suitable P _{ S } is found to make sure that \(\Pr \left \{\mathcal {E}^{(4)}\right \}O_{P}^{(4)}\leq O_{P}^{\prime }\), it is possible to achieve cognitive spectrum sharing while proving a performance gain to the primary system.
3.3 Decoding performance at SR in the second phase
3.3.1 3.3.1 Conditioned on event \(\boldsymbol {\mathcal {E}^{(1)}}\)
Lemma 4.
Please find in Appendix D for the detailed derivations. where
3.3.2 3.3.2 Conditioned on event \(\boldsymbol {\mathcal {E}^{(2)}}\)
3.3.3 3.3.3 Conditioned on event \(\boldsymbol {\mathcal {E}^{(3)}}\)
where the approximation in (44a) is obtained assuming P _{ P },P _{ R }≫1 and the approximation in (44c) is obtained assuming P _{ R }≫1 [24, 25], respectively.
3.3.4 3.3.4 Conditioned on event \(\boldsymbol {\mathcal {E}^{(4)}}\)
where \(\delta _{\textit {ss}}e^{\delta _{\textit {ss}}\gamma _{\textit {ss}}}\phantom {\dot {i}\!}\) and \(\delta _{\textit {ps}}e^{\delta _{\textit {ps}}\gamma _{\textit {ps}}}\phantom {\dot {i}\!}\) denote the respective PDFs of γ _{ ss } and γ _{ ps }.
Substituting \(O_{S}^{(1)}\), \(O_{S}^{(2)}\), \(O_{S}^{(3)}\), and \(O_{S}^{(4)}\) into (10), we can thus obtain the overall endtoend outage probability of the secondary system.
4 A performance upper bound
Conditioned on event \(\mathcal {E}^{(1)}\) that both x _{ p } and x _{ s } are successfully decoded at CR at the end of the first phase, we propose using DPC at CR to precancel the interference seen at SR (or PR) in the second phase.
4.1 A performance upper bound for secondary user
That is, SR sees no interference in the second phase. Then, together with (1) and (50), SR attempts to decode x _{ s } using SIC. Following the same steps as in Lemma 4, the corresponding outage probability at SR at the end of the second phase can be similarly derived. The details are omitted here for the sake of brevity.
On the other hand, with the same power α P _{ R } allocated to forward x _{ p } at CR, the outage performance of the primary user is the same as that in (23).
4.2 A performance upper bound for primary user
That is, PR sees no interference in the second phase. Again, together with (1) and (52), MRC is employed at PR to decode x _{ p }. The details are omitted here for the sake of brevity.
On the other hand, with the same power (1−α)P _{ R } allocated to forward x _{ s } at CR, the outage performance of the secondary user is the same as that in (36).
Remark 4.
From the above analysis, with a DPC performed at CR to exploit the successfully decoded messages received in the first phase, the interference seen at SR (or PR) in the second phase can be precancelled, thus obtaining a performance upper bound for the secondary (or primary) user without affecting the performance of the other user.
5 Simulation results
5.1 SIC decoding at CR
From Theorem 2, in order to fully exploit the relay transmissions, event \(\mathcal {E}^{(4)}\) that neither of x _{ p } and x _{ s } is decoded at CR should be avoided as much as possible. Figure 4 displays the probability of \(\Pr \left \{\mathcal {E}^{(4)}\right \}\) with respect to θ where P _{ S }=θ P _{ P }. Various channel conditions are considered where \(\delta _{\textit {pr}}^{1}=10\) dB and \(\delta _{\textit {sr}}^{1}=\tau \delta _{\textit {pr}}^{1}\). As can be seen from Fig. 4, with an increase in θ, the probability of \(\Pr \left \{\mathcal {E}^{(4)}\right \}\) first increases and then decreases. This is reasonable as when there is a significant difference between the power levels of x _{ p } and x _{ s } received at CR, e.g., τ θ≪1 or τ θ≫1, SIC is facilitated and it would be easy to decode x _{ p } and x _{ s } successively. In contrast, if the components of x _{ p } and x _{ s } are of comparable power levels, e.g., τ θ≈1, then the SIC decoding is limited by the mutual interference and it would be difficult to decode either of x _{ p } and x _{ s }. This can be observed in Fig. 4 where \(\Pr \left \{\mathcal {E}^{(4)}\right \}\) takes peak values at θ=−10,0,10 dB for τ=10,0,−10 dB, respectively.
5.2 Endtoend outage performance of the primary user
Firstly, we evaluate how the interference due to cross talk affects the endtoend performance of the primary system. Let \(\delta _{\textit {sp}}^{1}=\varphi \delta _{\textit {pp}}^{1}\), O _{ P } is plotted with respect to φ in Fig. 5. The outage probability \(O_{P}^{\prime }\) of the benchmark case considered in Remark 1 is also demonstrated. With an increase in φ, since the interference link ST →PR becomes stronger, the corresponding performance of the primary system is impaired. On the other hand, with an increase in θ, ST transmits at a higher power that impedes the SIC decoding at CR as well as cause more interference to PR, thus similarly impairing the performance of the primary system. In addition, it is observed that a performance improvement is achieved for the primary system with a higher power allocation factor α. When α=0.4, even though ST transmits at a low power, e.g., θ=−20 dB, and the interference link ST →PR is very weak, e.g., φ=−20 dB, the primary user experiences a performance loss, i.e., \(O_{P}>O_{P}^{\prime }\). Whereas when α=0.9, with all other parameters being the same, a significant performance improvement is achieved for the primary system. This means that besides the power control at ST, the power allocation at CR also needs to be designed to compensate the interference caused to the primary system due to secondary transmissions.
To further illustrate the effects of P _{ S } and power allocation factor α, O _{ P } is plotted with respect to θ and α in Fig. 6. The outage probability \(O_{P}^{\prime }\) of the benchmark case (31) is also illustrated. It is observed that when θ takes values smaller than 0.05 AND when α takes values greater than 0.75, even subject to the interference from the secondary transmissions, the condition in (32) is always satisfied and a performance gain is achieved for the primary system. Otherwise, if θ>0.05, then we have \(O_{P}>O_{P}^{\prime }\) even when α→1.
This can be better observed in Fig. 7 where a crosssectional view of Fig. 6 is demonstrated. With an increase in θ, since the SIC at CR is impeded meanwhile more interference is caused to PR, the corresponding outage performance of the primary user is degraded. When θ=−20,−15 dB, it is observed that we can always find a suitable power allocation factor \(\alpha \geq \alpha ^{\ast }=\frac {R_{\textit {pt}}^{\prime }}{R_{\textit {pt}}^{\prime }+1}=0.75\) such that a performance gain is achieved for the primary system. However, when θ is increased to −10 dB, it is observed that \(O_{P}>O_{P}^{\prime }\) even when α→1. Similar phenomena can be observed for a benchmark case considered in [28], where a linear weighted combination of primary and secondary messages is forwarded by CR only when both messages are successfully decoded. Otherwise, CR simply stays silent and both PT and ST perform a retransmission in the second phase. It is observed that with the same system parameters, a better performance is achieved by the proposed approach compared to that in [28]. This is reasonable as in the proposed approach, CR is able to help forward the received messages more frequently, which is more beneficial compared to a retransmission by PT and ST simultaneously that will cause severe interference to one another.
Furthermore, from Figs. 6 and 7, it is observed that when α takes values greater than \(\alpha ^{\ast }=\frac {R_{\textit {pt}}^{\prime }}{R_{\textit {pt}}^{\prime }+1}=0.75\), O _{ P } experiences a floor. This validates Theorem 2 that when α≥α ^{∗}, \(O_{P}^{(1)}\), \(O_{P}^{(2)}\), and \(O_{P}^{(3)}\) all approach 0 and thus \(\Pr \left \{\mathcal {E}^{(4)}\right \}O_{P}^{(4)}\), which is irrelevant to α, dominates the overall outage performance. For a better illustration, the outage performance using DPC at CR is also presented in Fig. 7. Conditioned on event \(\mathcal {E}^{(1)}\) that both x _{ p } and x _{ s } are successfully decoded at CR, by using DPC to precancel the interference seen at PR, it is observed that a performance upper bound is achieved for the primary system.
For a better illustration of Theorem 2, O _{ P } is plotted with respect to R _{ pt } in Fig. 8. With an increase in R _{ pt }, the corresponding outage performance of the primary system is degraded. Whereas with an increase in α, a better outage performance is achieved. When \(\alpha =\alpha ^{\ast }=\frac {R_{\textit {pt}}^{\prime }}{R_{\textit {pt}}^{\prime }+1}\), the corresponding performance outperforms that with fixed power allocation factor, e.g., α=0.8,0.9, thus validating Theorem 2 that the endtoend outage performance of the primary system is optimized with respect to α when α≥α ^{∗}. Similar results can be observed for the benchmark case [28]. Again, a better performance is achieved by the proposed approach compared to that in [28]. Furthermore, in modest rate region where R _{ pt }<2.2, the condition in (32) is satisfied and a performance gain is achieved for the primary system compared to the benchmark case. Whereas in the high rate region, since both the SIC decoding at CR and the decoding at PR become more difficult, the primary user experiences a performance loss.
Figure 9 displays O _{ P } with respect to P _{ P } where a power allocation factor of α=α ^{∗} is adopted at CR. When P _{ S }=10 dB, it is observed that a diversity order of 2 is achieved for the primary system when P _{ P }→∞. This is reasonable as in the proposed protocol, two independent copies of x _{ p } are received at PR from PT →PR and CR →PR respectively in two successive phases. However, when there is a fixed power ratio between P _{ P } and P _{ S }, i.e., P _{ S }=θ P _{ P }, it is observed that the performance of the primary system is limited by the interference from secondary transmissions and no diversity gain is achieved.
5.3 Endtoend outage performance of the secondary user
In Fig. 10, the endtoend outage probability of the secondary user O _{ S } is plotted with respect to α where P _{ P }=30 dB and P _{ S }=θ P _{ P }. It is observed that O _{ S } experiences a plateau when α takes the values between 0.3 and 0.7. And when α is less than 0.25 or greater than 0.75, a reasonably good outage performance is achieved for the secondary user. This is because of the employment of SIC at SR. In the regions where α≤0.25 and α≥0.75, there is a significant difference between the power levels of x _{ p } and x _{ s } received at SR in the second phase, thus x _{ s } can either be first decoded or successively decoded using SIC with a high probability. Conversely, when α takes values between 0.3 and 0.7, SIC is limited by the comparable interference between x _{ p } and x _{ s }, which makes it difficult to decode either of them. For comparison purposes, the outage performance of the secondary user in the benchmark case [28] is also presented, where SR attempts to recover the desired signal x _{ s } by using MRC of the received signals in two phases and considers the primary component simply as noise. As illustrated in Fig. 10, with an increase in α, since more power is allocated to forward the primary signal meanwhile higher interference is seen at SR, the outage performance of the secondary user is severely degraded.
Furthermore, it is observed from Fig. 10 that the performance of the secondary system is degraded with an increase in θ. This is because with a higher θ, e.g., θ is increased from −20 to −15 dB, from (34a), it becomes difficult to first decode and remove x _{ p } and then decode x _{ s } successively using SIC. In other words, it is not always beneficial to adopt a high transmit power at ST, even if the condition in (32) is met. Again, the outage performance using DPC at CR is illustrated in Fig. 10. Conditioned on event \(\mathcal {E}^{(1)}\), by using DPC to precancel the interference seen at SR, it is observed that a performance upper bound is achieved for the secondary user.
Together with Figs. 7 and 10, when α≥α ^{∗}, it is possible to bring a performance gain for the primary system and at the same time achieve a reasonably good outage performance around 10^{−2} for the secondary system by the proposed approach. Whereas for the benchmark case considered in [28], although it is also possible to provide a performance gain to the primary user when α≥α ^{∗}, the secondary message x _{ s } can be hardly delivered from ST to SR.
In Fig. 11, O _{ S } is plotted with respect to R _{ pt } when α=α ^{∗}. Similarly, with an increase in R _{ pt }, from (34a), it becomes difficult to decode x _{ p } first and then decode x _{ s } successively using SIC, thus the corresponding outage performance of the secondary system is degraded. On the other hand, with other parameters being the same, it is observed that a performance degradation is experienced by the secondary system with an increase in R _{ st }.
From the above observations in Figs. 4, 5, 6, 7, 8, 9, 10, and 11, with properly designed parameters to facilitate the SIC decoding at CR as well as to limit the interference caused to PR due to the cross talk in the first phase, it is possible to find a suitable power allocation factor α≥α ^{∗} such that a performance gain is achieved for the primary user meanwhile the secondary user gains an opportunity to access the spectrum. Furthermore, with the same system parameters, performance gains are achieved for both primary and secondary systems by the proposed approach compared to a benchmark case in [28].
6 Conclusions
In this paper, the interference channel with a cognitive relay is exploited to achieve spectrum sharing between a licensed primary user and an unlicensed secondary user. A causal cognitive twophase spectrum sharing protocol is proposed and closedform expressions of the endtoend outage probability are derived. In view of the inherent interferencelimited property of the system, to guarantee the performance of the primary system, we consider a power control at ST together with a power allocation at CR to forward the processed primary and secondary messages, respectively. Simulation results demonstrate that by designing both the power control at ST and power allocation at CR, spectrum sharing is achieved between the primary and secondary systems and performance gains can be achieved for both parties.
7 Appendix A: Derivations of \(\boldsymbol {\Pr \left \{\mathcal {E}^{(1)}\right \}}\), \(\boldsymbol {\Pr \left \{\mathcal {E}^{(2)}\right \}}\), \(\boldsymbol {\Pr \left \{\mathcal {E}^{(3)}\right \}}\), and \(\boldsymbol {\Pr \left \{\mathcal {E}^{(4)}\right \}}\)
where \(\delta _{\textit {sr}}e^{\delta _{\textit {sr}}\gamma _{\textit {sr}}}\phantom {\dot {i}\!}\) and \(\delta _{\textit {pr}}e^{\delta _{\textit {pr}}\gamma _{\textit {pr}}}\phantom {\dot {i}\!}\) denote the respective PDFs of γ _{ sr } and γ _{ pr }.
8 Appendix B: Derivations of \(\boldsymbol {O_{P}^{(1)}}\)
where \(\phantom {\dot {i}\!}\delta _{\textit {sp}}e^{\delta _{\textit {sp}}\gamma _{\textit {sp}}}\) and \(\phantom {\dot {i}\!}\delta _{\textit {pp}}e^{\delta _{\textit {pp}}\gamma _{\textit {pp}}}\) denote the respective PDFs of γ _{ sp } and γ _{ pp }. Then, this integration can be solved to obtain the results in (23).
9 Appendix C: Derivations of \(\boldsymbol {O_{P}^{(4)}}\)
Then, this integration can be solved to obtain the result in (29).
10 Appendix D: Derivations of \(\boldsymbol {O_{S}^{(1)}}\)
respectively. Then, these integrations can be solved to obtain the results in (37a)–(37c).
Declarations
Acknowledgements
The authors would like to acknowledge the support from the Ministry of Science and Technology (MOST) of China under the grants 2014DFA11640 and 2015DFG12580, the National Natural Science Foundation of China (NSFC) under the grants 61301128, 61461136004, and 61271224, the NFSC Major International Joint Research Project under the grant 61210002, the Hubei Provincial Science and Technology Department under the grants 2011BFA004 and 2013BHE005, the Fundamental Research Funds for the Central Universities under the grant 2015XJGH011, and the Special Research Fund for the Doctoral Program of Higher Education (SRFDP) under the grant 20130142120044. This research is partially supported by EU FP7PEOPLEIRSES, project acronym S2EuNet (grant no. 247083), project acronym WiNDOW (grant no. 318992), and project acronym CROWN (grant no. 610524).
Authors’ Affiliations
References
 H Cheng, YD Yao, Cognitiverelaybased intercell interference cancellation in cellular systems. IEEE Trans. Veh. Tech. 59(4), 1901–1909 (2010).View ArticleGoogle Scholar
 D Li, Cognitive relay networks: opportunistic or uncoded decodeandforward relaying. IEEE Trans. Veh. Tech. 63(3), 1486–1491 (2014).View ArticleGoogle Scholar
 JN Laneman, DNC Tse, GW Wornell, Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory. 50(12), 3062–3080 (2004).MathSciNetView ArticleMATHGoogle Scholar
 G Kramer, M Gastpar, P Gupta, Cooperative strategies capacity theorems for relay networks. IEEE Trans. Inf. Theory. 51(9), 3037–3063 (2005).MathSciNetView ArticleMATHGoogle Scholar
 X Zhang, W Wang, X Ji, Multiuser diversity in multiuser twohop cooperative relay wireless networks: system model and performance analysis. IEEE Trans. Veh. Tech. 58(2), 1031–1036 (2009).View ArticleGoogle Scholar
 F Yang, M Huang, M Zhao, S Zhang, W Zhou, Cooperative strategies for wireless relay networks with cochannel interference over timecorrelated fading channels. IEEE Trans. Veh. Tech. 62(7), 3392–3408 (2013).View ArticleGoogle Scholar
 O Sahin, E Erkip, in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM). Achievable rates for the gaussian interference relay channel (IEEEWashington, DC, 2007), pp. 1627–1631.Google Scholar
 O Sahin, E Erkip, in Proceedings of 41st Asilomar Conference on Signals, Systems and Computers (ACSSC). On achievable rates for interference relay channel with interference cancelation (IEEEPacific Grove, CA, 2007), pp. 805–809.Google Scholar
 S Sridharan, S Vishwanath, S Jafar, S Shamai, in Proceedings of IEEE International Symposium on Information Theory (ISIT). On the capacity of cognitive relay assisted Gaussian interference channel (IEEEToronto, ON, 2008), pp. 549–553.Google Scholar
 S Rini, D Tuninetti, N Devroye, in Proceedings of IEEE Information Theory Workshop (ITW). Outer bounds for the interference channel with a cognitive relay (IEEEDublin, Ireland, 2010), pp. 1–5.Google Scholar
 Y Tian, A Yener, The Gaussian interference relay channel: improved achievable rates and sum rate upperbounds using a potent relay. IEEE Trans. Inf. Theory. 57(5), 2865–2879 (2011).MathSciNetView ArticleGoogle Scholar
 S Rini, D Tuninetti, N Devroye, New inner and outer bounds for the memoryless cognitive interference channel and some new capacity results. IEEE Trans. Inf. Theory. 57(7), 4087–4109 (2011).MathSciNetView ArticleGoogle Scholar
 S Rini, D Tuninetti, N Devroye, Inner and outer bounds for the Gaussian cognitive interference channel and new capacity results. IEEE Trans. Inf. Theory. 58(2), 820–848 (2012).MathSciNetView ArticleGoogle Scholar
 H Charmchi, GA Hodtani, M NasiriKenari, A new outer bound for a class of interference channels with a cognitive relay and a certain capacity result. IEEE Commun. Lett. 17(2), 241–244 (2013).View ArticleGoogle Scholar
 S Rini, D Tuninetti, N Devroye, AJ Goldsmith, On the capacity of the interference channel with a cognitive relay. IEEE Trans. Inf. Theory. 60(4), 2148–2179 (2014).MathSciNetView ArticleGoogle Scholar
 TS Han, K Kobayashi, A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory. 27(1), 49–60 (1981).MathSciNetView ArticleMATHGoogle Scholar
 M Costa, Writing on dirty paper. IEEE Trans. Inf. Theory. 29(3), 439–441 (1983).View ArticleMATHGoogle Scholar
 O Sahin, O Simeone, E Erkip, Interference channel with an outofband relay. IEEE Trans. Inf. Theory. 57(5), 2746–2764 (2011).MathSciNetView ArticleGoogle Scholar
 Y Tian, A Yener, Symmetric capacity of the gaussian interference channel with an outofband relay to within 1.15 bits. IEEE Trans. Inf. Theory. 58(8), 5151–5171 (2012).MathSciNetView ArticleGoogle Scholar
 S Haykin, Cognitive radio: brainempowered wireless communications. IEEE J. Select Areas Commun. 23(2), 201–220 (2005).View ArticleGoogle Scholar
 Y Xing, CN Mathur, MA Haleem, R Chandramouli, KP Subbalakshmi, Dynamic spectrum access with QoS and interference temperature constraints. IEEE Trans. Mobile Comput. 6(4), 423–433 (2007).View ArticleGoogle Scholar
 A Goldsmith, SA Jafar, I Marić, S Srinivasa, Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE. 97(5), 894–914 (2009).View ArticleGoogle Scholar
 YC Liang, KC Chen, GY Li, P Mahonen, Cognitive radio networking and communications: an overview. IEEE Trans. Veh. Tech. 60(7), 3386–3407 (2011).View ArticleGoogle Scholar
 Y Han, A Pandharipande, TS Ting, Cooperative decodeandforward relaying for secondary spectrum access. IEEE Trans. Wireless Commun. 8(10), 4945–4950 (2009).View ArticleGoogle Scholar
 Q Li, SH Ting, A Pandharipande, Y Han, Cognitive spectrum sharing with twoway relaying systems. IEEE Trans. Veh. Tech. 60(3), 1233–1240 (2011).View ArticleGoogle Scholar
 A Jovičić, P Viswanath, Cognitive radio: an informationtheoretic perspective. IEEE Trans. Inf. Theory. 55(9), 3945–3958 (2009).View ArticleGoogle Scholar
 M Cheng, J Mao, L Li, in Proceedings of 4th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM). Investigation of mutual interference channel with relay in cognitive transmission (IEEEDalian, China, 2008), pp. 1–4.Google Scholar
 W Jaafar, W Ajib, D Haccoun, in Proceedings of IEEE Global Communications Conference (GLOBECOM). A novel relayaided transmission scheme in cognitive radio networks (IEEEHouston, TX, 2011), pp. 1–6.Google Scholar
 W Jaafar, W Ajib, D Haccoun, in Proceedings of IEEE International Conference on Communications (ICC). Opportunistic adaptive relaying in cognitive radio networks (IEEEKyoto, Japan, 2012), pp. 1811–1815.Google Scholar
 TMC Chu, H Phan, HJ Zepernick, in Proceedings of 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Amplifyandforward relay assisting both primary and secondary transmissions in cognitive radio networks over nakagamim fading (IEEESydney, Australia, 2012), pp. 932–937.Google Scholar
 Q Li, A Pandharipande, SH Ting, in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC). Spectrum sharing on interference channels with a cognitive relay (IEEEShanghai, China, 2013), pp. 2982–2987.Google Scholar
 TM Cover, JA Thomas, Elements of Information Theory, 2nd edition (John Wiley & Sons, Inc., Hoboken, New Jersey, 2006).Google Scholar
 Q Li, SH Ting, A Pandharipande, Y Han, Adaptive twoway relaying and outage analysis. IEEE Trans. Wireless Commun. 8(6), 3288–3299 (2009).View ArticleGoogle Scholar
 A Papoulis, SU Pillai, Probability, Random Variables and Stochastic Processes, 4th Edition (McGraw Hill, New York, 2002).Google Scholar
 V Asghari, S Aissa, Endtoend performance of cooperative relaying in spectrumsharing systems with quality of service requirements. IEEE Trans. Veh. Tech. 60(6), 2656–2668 (2011).View ArticleGoogle Scholar
 K Tourki, KA Qaraqe, MS Alouini, Outage analysis for underlay cognitive networks using incremental regenerative relaying. IEEE Trans. Veh. Tech. 60(2), 721–734 (2013).View ArticleGoogle Scholar
 F Guimaraes, D Da Costa, T Tsiftsis, C Cavalcante, G Karagiannidis, Multiuser and multirelay cognitive radio networks under spectrumsharing constraints. IEEE Trans. Veh. Tech. 63(1), 433–439 (2014).View ArticleGoogle Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License(http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.