Open Access

Power control for cognitive relay networks with sensing uncertainties

Contributed equally
EURASIP Journal on Wireless Communications and Networking20162016:124

https://doi.org/10.1186/s13638-016-0617-1

Received: 19 December 2015

Accepted: 19 April 2016

Published: 4 May 2016

Abstract

Power control (PC) is a key solution to enable spectrum sharing between secondary users (SUs) and primary users (PUs). However, previous research lacks sensing uncertainties for the status of PUs. In this article, we focus on the PC problem for a cognitive relay network under the spectrum sensing uncertainties to minimize the total bit error rate (BER) of SUs under the constraints of maximum transmit power budgets, signal-to-interference-and-noise ratio (SINR) constraints, and interference requirements to provide protection for PUs. We first formulate the interference model by taking sensing uncertainties into account, while the worst-channel-state-information (worst-CSI) PC algorithm is introduced to limit the BER of SUs, which only needs to operate the algorithm in one link whose CSI is worst. And a cooperative spectrum sensing (CSS) strategy is considered to optimize the sensing performance. To deal with the optimization problem, the original min-max BER problem is converted into an equivalent max-min SINR problem solved by Lagrange dual decomposition method. Finally, simulation results are presented to indicate that our proposed algorithm can obtain good BER performance and guarantee quality of service of PU.

Keywords

Cognitive relay networksSensing uncertaintiesBER minimizationThe worst-CSI PC algorithm

1 Introduction

The spectrum survey conducted by the Federal Communications Commission has revealed that some frequency bands of the allocated spectrum are heavily used, but others are unused in most of the time with the spectrum utilization ranging only from 15 to 85 % [1]. Cognitive radio (CR) [2] as an intelligent technique for the next generation of wireless communication can significantly improve spectrum utilization and deal with spectrum shortage problem through the spectrum sharing scheme, in which secondary users (SUs) (i.e., unlicensed users or CR users) can opportunistically access to the licensed spectrum bands allocated to primary users (PUs) (i.e., licensed users) [3]. In general CR networks (CRNs), power control (or resource allocation) techniques are used based on perfect channel state information (CSI) and spectrum sensing results. Power control (PC) technology is to obtain a certain ideal goal (e.g., utility maximization, throughout maximization, total power minimization) by adjusting the transmit power of secondary system with no harmful interference for communications of PUs.

In wireless communication, the quality of service (QoS) of users may not be guaranteed when users locate in the edge of networks or the distance between users is far away. Thus, relay technology (i.e., cooperative technology) has been proposed as an effective way to overcome the problem [4]. The earliest emergence of relay networks can be traced back to the late 1970s in [5, 6], Cover and others indicate that the transmission scheme using relays can effectively increase the capacity and coverage of system by ensuring credible communications between users from the viewpoint of information theory. Since cognitive relay networks have more advantages than traditional CRNs (i.e., non-relay networks) and more suitable for actual communication scenarios (i.e., heterogeneous networks, 5G communications), in this paper, we study the PC problem in cognitive relay networks with a multi-user scenario.

As we know, PC technique as a key solution can improve the performance of CRNs and control the interference power of PUs so that SUs share licensed spectrums opportunistically. In order to obtain good system performance and improve spectral efficiency, PC is based on various network structures such as traditional CRNs, cellular CRNs, and multiple-input multiple-output (MIMO) CRNs. has been studied in many works [79]. In [7], an adaptive PC scheme relying on partial CSI for an underlay CRN is studied to obtain a good trade-off between the interference introduced by SUs on PUs and SU’s performance. In [8], for an overlay two-way cellular network, a spectrum sharing protocol is proposed for device-to-device (D2D) communication to maximize the sum rate of both D2D and cellular communication. In [9], based on Euclidean projection, a distributed PC algorithm with QoS requirements is studied to minimize total power consumption of SUs under time-varying channel scenario. In [10], the authors extend the pricing concept to a multi-channel MIMO CR scenario and propose two iterative PC and channel allocation algorithms.

Since there are many advantages of flexible spectrum scheduling of orthogonal frequency division multiplexing (OFDM) technology, OFDM has been widely introduced to CRNs [1113]. In [11], for an OFDM-based multi-hop CRN, a cross-layer optimization design is proposed to address both aggregate utility maximization and energy consumption minimization. In [12], radio resource allocation in an underlay CRN based on OFDMA is studied to maximize the sum capacity of the secondary service and to find the optimal allocated power, subcarrier, and rate across all subcarriers and different SUs. In [13], the authors propose a robust ergodic resource allocation (ERA) scheme in the framework of an OFDM-based underlay heterogeneous network to maximize the average sum rate while guaranteeing macro network interference requirements with any desired high probability.

Obviously, the articles mentioned above are mainly based on the perfect spectrum sensing information (i.e., without considering spectrum sensing uncertainties). In real communications, due to user’s mobility and time-varying characteristics and fading characteristics of wireless channels, a spectrum detector cannot exactly detect the status of PUs in the spectrum sensing phase. Thus, it is necessary to take sensing uncertainties or the imperfect spectrum sensing information into account since inevitable estimation errors and uncertainties may produce harmful interference to PUs for their communications and make the received signal-to-interference-and-noise ratio (SINR) at SU receiver below the target requirements of SUs. Over the last decade, PC problem with the spectrum sensing uncertainties has been extensively studied for various network structures (e.g., traditional CRNs, OFDM-based CRNs, heterogeneous cellular networks, micro CRNs). Considering traditional CRNs under the spectrum sensing uncertainties, PC problem is studied in [14, 15]. In [14], a joint bandwidth and power allocation is proposed to minimize total power of SUs and guarantee their QoS requirements. In [15], resource allocation problem with the imperfect spectrum sensing is considered to maximize capacity of SU. Considering OFDM-based CRNs under the spectrum sensing uncertainties, PC problem is studied in [16, 17]. In [16], the authors investigate the energy efficient resource allocation strategy to maximize energy efficiency of CR system subject to total transmission power budget and each PU interference constraints. In [17], for an OFDM-based heterogeneous CRN including single network and multi-homing network, the resource allocation problem with the imperfect spectrum sensing is solved to maximize system capacity and the joint subcarrier, and PC problem is formulated under total transmission power constraint, interference constraint, and QoS constraint. Considering Femtocell CRNs with the imperfect spectrum sensing in [18], PC in a two-tier OFDM-based heterogeneous cellular network to maximize the sum throughput of Femtocell users (FUs) is provided. Considering CRNs with the imperfect spectrum sensing and one primary network (PN) or many micro CRNs in [19], a hybrid spectrum access strategy is proposed to maximize the capacity of the secondary link over the Rayleigh fading channel, which is different from the traditional underlay or the overlay strategy. However, research on PC in cognitive relay networks with the spectrum sensing uncertainties is quite few.

In this paper, a PC algorithm is proposed to minimize total bit error rate (BER) of SUs in OFDM-based cognitive relay networks under the spectrum sensing uncertainties. Multiple PUs, multiple SUs, and multiple relays are considered in our model. The min-max criteria is used to minimize the total BER of SUs under maximum transmit power constraints, interference power constraints, and SINR constraints. Then, the original min-max BER optimization problem is transformed into an equivalent max-min SINR problem solved by Lagrange dual decomposition while the Lagrange multipliers can be updated by a sub-gradient method. Simulation results will show the effectiveness and reliability of the proposed algorithm. Compared with the existing research, our main contributions are as follows:
  • An OFDM-based cognitive relay network with multiple PUs, SUs, and relays is considered. The BER of the SUs with the spectrum sensing uncertainties is minimized under maximum transmit power constraints, SINR constraints, and interference constraints.

  • The uncertainties in the spectrum sensing and errors of the reporting channels are considered in order to adapt actual communication environment. The proposed algorithm conducts power allocation and update at secondary user transmitters and relay transmitters, respectively, to satisfy the requirements of device flexible adjustment.

  • The worst-CSI PC algorithm is introduced to limit the total BER of SUs, which only needs to operate the algorithm in one link so that the complexity and convergence time of the algorithm are reduced.

The remainder of this paper is organized as follows. In Section 2, a system model and a spectrum sensing model are described. Section 3 introduces a cooperative spectrum sensing (CSS) scheme and formulates the interference model under the spectrum sensing uncertainties. Then, PC problem is formulated and our proposed algorithm is given in Section 4. Section 5 presents simulation results and performance analysis of the system. Finally, Section 6 provides conclusion of the paper.

2 System model

In this paper, we consider an overlay cognitive amplify-and-forward (AF) relay network with P PUs and L SUs as shown in Fig. 1 a. The related symbol explanation is given in Table 1. The set L={1,2,,L} denotes the number of SUs, P={1,2,,P} denotes the number of PUs, and l,jL, pP. Let SU-T and SU-R (PU-T and PU-R) denote the secondary (primary) transmitter and receiver, respectively, and RS denotes the relay node. We assume the CRN uses OFDM modulation mode, in which the total bandwidth is divided into N={1,2,,N} orthogonal subcarriers and nN. And we also assume that the subcarrier n can only be used by one PU. This model is a dual-hop relay network in which time-division half-duplex relays are used to help communication of SUs. The direct communications from the secondary source nodes to the secondary destination nodes are not considered. Under an overlay spectrum sharing scenario, multiple source nodes and relays are available to obtain spectrum information in the spectrum sensing phase. The relays first assist the SUs to detect vacant bands via cooperative spectrum sensing, then an access point (AP) collects local detection results from the SUs and relays. AP takes fusion criterion and makes a global decision for data transmission as shown in Fig. 1 b. Let \({V_{p}^{n}}\) and \({O_{p}^{n}}\) represent the licensed spectrum unoccupied and occupied over the subcarrier n by the pth PU, respectively. \(\hat {V_{p}^{n}} \) and \(\hat {O_{p}^{n}} \) are used to indicate the status of the licensed spectrum estimated by the secondary network. In this overlay scenario, SUs cannot access the licensed spectrum, unless they receive the positive sensing results (i.e., \(\hat {V_{p}^{n}} \)). The channels are assumed to be independent random variables. In addition, we assume the fading channels are flat and remain almost constant within a symbol period. In other words, the channels are time-invariant during the sensing phase and communication phase so that the BER is a meaningful value under this channel condition. In our study, the information is transferred by SUs under multiple phase shift keying (MPSK) or multiple quadrature amplitude modulation (MQAM). And binary phase shift keying (BPSK) modulation is used to support data transmission over the reporting channel in the spectrum sensing phase.
Fig. 1

System model and spectrum sensing networks. a Multiuser cognitive relay networks. b Spectrum sensing networks with an AP

Table 1

Important notation in the paper

Symbol

Specification

\({P_{p}^{n}}\)

Transmit power of the pth PU-T on the subcarrier n

\(P_{l,1}^{n}\)

Transmit power of the lth SU-T on the subcarrier n

\(P_{l,2}^{n}\)

Transmit power of the lth relay on the subcarrier n

\(h_{l,1}^{n}\)

Channel gain of the first-hop of the lth link on the subcarrier n

\(h_{l,2}^{n}\)

Channel gain of the second-hop of the lth link on the subcarrier n

\(h_{l,p,1}^{n}\)

Channel gain of the lth SU-T to the pth PU-R on the subcarrier n

\(h_{l,p,2}^{n}\)

Channel gain of the lth relay to the pth PU-R on the subcarrier n

\(g_{p,l,1}^{n}\)

Channel gain of the pth PU-T to the lth relay on the subcarrier n

\(g_{p,l,2}^{n}\)

Channel gain of the pth PU-T to the lth SU-R on the subcarrier n

\(z_{p,l}^{n}\)

Sensing channel gain of the pth PU-T to the lth SU-T on the subcarrier n

3 Spectrum sensing process

3.1 Cooperative Spectrum Sensing (CSS)

Energy detector (ED) [4] is used by sensing nodes in the spectrum sensing phase in order to make a decision about the spectrum occupied or unoccupied by PUs through comparing the energy of the received signal with a detection threshold. We assume that the observation time spent by each subcarrier is τ/N, where τ is the observation time window on the whole licensed spectrum. And each sensing node that performs ED in a fixed bandwidth for each subcarrier is f. Therefore, the time bandwidth product on each subcarrier is f τ/N [4]. Let \({x_{p}^{n}}(i)\) be the transmit signal from the pth PU on the subcarrier n and i{1,2,,2f τ/N}. The received signal from the pth PU on the subcarrier n at the lth SU-T and relay is given by
$$ \left\{ \begin{array}{l} y_{p,l,1}^{n}\left(i \right) = {{\sqrt{\alpha {P_{p}^{n}}} z_{p,l}^{n}{x_{p}^{n}}(i) + n_{p,l,1}^{n}(i)}}\\ y_{p,l,2}^{n}\left(i \right) = {{\sqrt {\alpha {P_{p}^{n}}} g_{p,l,1}^{n}{x_{p}^{n}}(i) + n_{p,l,2}^{n}(i)}} \\ \end{array} \right. $$
(1)
where \(y_{p,l,1}^{n}\left (i \right)\) and \(y_{p,l,2}^{n}\left (i \right)\) are the received signals from the pth PU on the subcarrier n at the lth SU-T and the lth relay. \({P_{p}^{n}}\) is the transmit power of the pth PU-T on the subcarrier n. \(n_{p,l,1}^{n}(i)\) and \(n_{p,l,2}^{n}(i)\) are the additive noise on the subcarrier n which are the independent zero-mean white Gaussian noise (AWGN) with power density N 0. α represents the state of the pth PU on the subcarrier n, which is given by
$$ \alpha = \left\{ \begin{array}{l} {1,\quad {O_{p}^{n}}} \\ {0,\quad {V_{p}^{n}}} \\ \end{array} \right. $$
(2)
When the subcarrier n is unoccupied by the pth PU (i.e., \({V_{p}^{n}}\)), α=0, otherwise α=1. According to the energy calculation formula [20], the expressions of the received signal energy from the pth PU on the subcarrier n at the lth SU-T (i.e., \(E_{p,l,1}^{n}\)) and the lth relay (i.e., \(E_{p,l,2}^{n}\)) are
$$ \left\{ \begin{array}{l} E_{p,l,1}^{n} = \sum\limits_{i = 1}^{2f\tau/N} \left|{y_{p,l,1}^{n}\left(i \right)} \right|^{2} \\ E_{p,l,2}^{n} = \sum\limits_{i = 1}^{2f\tau/N} \left| {y_{p,l,2}^{n}\left(i \right)} \right|^{2}\\ \end{array} \right. $$
(3)
We assume that the channel gains are time-invariant during the sensing phase and suppose the decision threshold of energy detector as ε at the lth SU-T and the lth relay on the subcarrier n. For k{1,2,,2L}, \({a_{p,k}^{n}}\) is a binary number denoting the status of the comparative results. The decision criterion is
$$ \left\{ \begin{array}{l} \hat {O_{p}^{n}}, \quad E_{p,l,1}^{n} \ge \varepsilon\quad \\ \hat {O_{p}^{n}}, \quad E_{p,l,2}^{n} \ge \varepsilon \\ \end{array} \right. $$
(4)
$$ a_{p,k}^{n} = \left\{ \begin{array}{l} {1,\quad \hat {O_{p}^{n}}} \\ {0,\quad \hat {V_{p}^{n}}} \\ \end{array} \right. $$
(5)

where \(\hat {V}_{p}^{n}\) and \(\hat {O}_{p}^{n}\) denote the sensing result of the sensing node on the subcarrier n unoccupied and occupied by the pth PU, respectively.

If \(E_{p,l,1}^{n} > \varepsilon \) and \(E_{p,l,2}^{n} > \varepsilon \), it indicates that the lth SU-T and the lth relay have successfully detected the presence of the pth PU on the subcarrier n that satisfies the hypothesis \({O_{p}^{n}}\) (the result of sensing is \(\hat {O_{p}^{n}}\)). The energy collected in the process of detecting the status of the pth PU on the subcarrier n at the sensing node in the frequency domain is denoted by \(E_{p,k}^{n}\), which serves as a decision with the following distribution [20]
$$ E_{p,k}^{n}\sim \left\{ \begin{array}{l} {\chi_{2u}^{2}\quad \quad \quad\;\;,\quad {V_{p}^{n}}} \\ {\chi_{2u}^{2}({2\gamma_{p,k}^{n}})\;\;,\quad {O_{p}^{n}}} \\ \end{array} \right. $$
(6)

where u is equal to f τ/N. \(\chi _{2u}^{2}\) follows a central chi-square distribution with 2u degrees of freedom, and \(\chi _{2u}^{2} ({2\gamma _{p,k}^{n}})\) follows a non-central chi-square distribution with 2u degrees of freedom and a non centrality parameter \(2\gamma _{p,k}^{n}\) [4]. And \(\gamma _{p,k}^{n}\) is the instantaneous signal-noise ratio (SNR) of the received signal from the pth PU at the kth sensing node on the subcarrier n.

In order to insure the generality of the sensing, we take the spectrum sensing uncertainties into consideration so that we can derive the expressions of the average detection probability, false-alarm probability, and miss-detection probability. In order to simplify the calculations, we assume that the decision threshold ε is a constant parameter.
$$ P_{d,p,k}^{n} = \mathrm{E}\left[{{Pr}\left({E_{p,k}^{n} > {\varepsilon}|{O_{p}^{n}}}\right)}\right] = {Pr}\left(\chi_{2u}^{2}(2\gamma_{p,k}^{n})> {\varepsilon}\right) \\ $$
(7)
$$ \begin{array}{l} P_{fa,p,k}^{n} = \mathrm{E}\left[{{Pr}\left({E_{p,k}^{n} > {\varepsilon}|{V_{p}^{n}}}\right)}\right] = \frac{{\Gamma \left({u,\frac{{{\varepsilon}}}{2}}\right)}}{{\Gamma(u)}} \\ \end{array} $$
(8)
$$ P_{md,p,k}^{n} = 1 - P_{d,p,k}^{n} $$
(9)

where E[·] denotes the expectation and P r(·) is the probability. \(\Gamma \left ({m,\tilde x} \right)\) is the incomplete gamma function given by \(\Gamma \left ({m,\tilde x} \right) = \int _{\tilde x}^{\infty } {{v^{m - 1}}{e^{- v}}d} v\), and Γ(m) is the gamma function. \({P_{d,p,k}^{n}}\) and \({P_{fa,p,k}^{n}}\) denote the detection probability and the false-alarm probability. And \({P_{md,p,k}^{n}}\) denotes the probability of miss-detection.

In the next sub-phase, the sensing nodes report detection results to AP, which makes the global decision to follow the OR fusion rule [4]
$$ S_{p}^{n} = \sum\limits_{k = 1}^{2L} {a_{p,k}^{n}} = \left\{ \begin{array}{l} \ge 1,\quad \hat{O}_{p}^{n} \\ 0~~,~\quad \hat{V}_{p}^{n} \\ \end{array} \right. $$
(10)
The decision at the kth sensing node is reported to AP and expressed by \(a_{p,k}^{n} \in \left \{ {0,1} \right \}\) for BPSK modulation. \({{S_{p}^{n}}}\) denotes a parameter that clearly identifies the state of the subcarrier n (unoccupied or occupied by the pth PU). We assume that the distance between any two sensing nodes (i.e., SUs and relays) is much smaller than the distance from any sensing nodes to the primary transmitters. Therefore, the received signal at every sensing node experiences an almost identical path loss, which results in the independent and identically distributed (i.i.d.) Rayleigh fading with the instantaneous SNRs of the received signal from PUs at the sensing nodes on the subcarrier n. In other words, the instantaneous SNRs \(\gamma _{p,1}^{n}, \cdots,\gamma _{p,2L}^{n}\) are i.i.d. and exponentially distributed random variables with the same mean \(\bar {\gamma _{p}^{n}}\). Based on the above, we can take false-alarm probabilities \({P_{fa,p,k}^{n}}\) as identical since \({P_{fa,p,k}^{n}}\) is independent of k, and the global decision of false-alarm probability can be denoted by \(P_{fa}^{n}\) (i.e., \(Pr({\hat {O}_{p}^{n}}|{V_{p}^{n}})\)). In the case of the AWGN channel, the detection probabilities at the sensing nodes are independent of k, so that the detection probabilities are identical and the global decision is expressed by \({P_{d}^{n}}\) (i.e., \(Pr({\hat {O}_{p}^{n}}|{O_{p}^{n}})\)). Similarly, taking the global decision of the mis-detection probability as \(P_{md}^{n}\) (i.e., \(Pr({\hat {V}_{p}^{n}}|{O_{p}^{n}})\)), we have
$$ P_{fa}^{n} = 1 - \prod\limits_{k = 1}^{2L}\left({1 - P_{fa,p,k}^{n}}\right) \approx 1 - \left({1 - P_{fa,p,k}^{n}}\right)^{2L} $$
(11)
$$ P_{d}^{n} = 1 - P_{md}^{n} $$
(12)
$$ P_{md}^{n} = \prod\limits_{k = 1}^{2L} P_{md,p,k}^{n} $$
(13)
Considering the error probability \({P_{e}^{n}}\) of the reporting channel on the subcarrier n, we change the expression of the miss-detection probability as
$$ P_{md}^{n} = \prod\limits_{k = 1}^{2L} \left[P_{md,p,k}^{n}\left(1 - {P_{e}^{n}}\right) + \left(1 - P_{md,p,k}^{n}\right)P_{e}^{n}\right] $$
(14)
According to the above explanations, the process of CSS can be summarized as follows:
  • Each sensing node (i.e., L SUs and L relays) independently evaluates its own spectrum detection, then makes detection information (i.e., a binary decision on status of PU).

  • The binary decisions made by all sensing nodes are reported to an AP in the local area network (LAN) or networks.

  • AP fuses all detection information and makes global decision about the status of PU to determine whether PU is present or not.

3.2 SINR expressions (AF protocol)

A dual-hop communication link is considered. The first hop instantaneous SINR on the subcarrier n is denoted by SINR\(_{l,1}^{n}\), and the second hop is SINR\(_{l,2}^{n}\). For the AF protocol, the expression of the equivalent SINR of the SU link is the following [21]
$$ \begin{aligned} \text{SINR}_{l,eq}^{n} &= T(\text{SINR}_{l,1}^{n},\text{SINR}_{l,2}^{n})\\&= \frac{\text{SINR}_{l,1}^{n}\text{SINR}_{l,2}^{n}}{\text{SINR}_{l,1}^{n} + \text{SINR}_{l,2}^{n} + 1} \end{aligned} $$
(15)
where
$$ T({x,y}) = \frac{xy}{x + y + 1} $$
(16)
and \(x=\text {SINR}_{l,1}^{n}\) and \(y=\text {SINR}_{l,2}^{n}\). Specifically, \(\text {SINR}_{l,1}^{n}\) and \(\text {SINR}_{l,2}^{n}\) can be expressed as
$$ \text{SINR}_{l,1}^{n} = \frac{P_{l,1}^{n}|h_{l,1}^{n}|^{2}}{N_{l,1}^{n} + \sum\limits_{p = 1}^{P} P_{p}^{n}|g_{p,l,1}^{n}|^{2}} $$
(17)
$$ \text{SINR}_{l,2}^{n} = \frac{P_{l,2}^{n}|h_{l,2}^{n}|^{2}}{N_{l,2}^{n} + \sum\limits_{p = 1}^{P} P_{p}^{n}|g_{p,l,2}^{n}|^{2}} $$
(18)

where \({N_{l,1}^{n}}\) and \({N_{l,2}^{n}}\) denote the additive noise power at the lth relay and SU-R.

3.3 Interference model

In order to guarantee the QoS of the PUs, the transmit power of the SUs and relays should be suitably controlled while the interference power at PU-R cannot break the interference temperature (IT) level. There are four situations for CSS as shown in Table 2. From Table 2, we can see that a miss-detection situation has a negative effect on the communications of the PUs. In other words, there are harmful interference to the PUs produced by the SUs and relays.
Table 2

Four situations for CSS

Spectrum state

CSS result

Relative probability

CR power

Occupied (\({O_{p}^{n}}\))

\(\hat {O}_{p}^{n}\)

\(P_{d}^{n}\)

0,0

Occupied (\({O_{p}^{n}}\))

\(\hat {V}_{p}^{n}\)

\(P_{md}^{n} = 1 - {P_{d}^{n}}\)

\(P_{l,1}^{n},P_{l,2}^{n} \)

Vacant (\({V_{p}^{n}}\))

\(\hat {O}_{p}^{n}\)

\(P_{fa}^{n}\)

0,0

Vacant (\({V_{p}^{n}}\))

\(\hat {V}_{p}^{n} \)

\(1 - P_{fa}^{n}\)

\(P_{l,1}^{n},P_{l,2}^{n}\)

Since there is a half-duplex scheme at the relay nodes, the interference to the pth PU in each hop can be written as
$$ I_{\text{SP}_{p}} = \sum\limits_{l = 1}^{L} \sum\limits_{n = 1}^{N} {Pr}\left({{O_{p}^{n}}} \right)P_{md}^{n}P_{l,1}^{n}{|h_{l,p,1}^{n}|^{2}} $$
(19)
$$ I_{\text{RP}_{p}} = \sum\limits_{l = 1}^{L} \sum\limits_{n = 1}^{N} {Pr}\left({{O_{p}^{n}}} \right)P_{md}^{n}P_{l,2}^{n}|h_{l,p,2}^{n}|^{2} $$
(20)

where \({Pr}(O_{p}^{n})\) is a probability that the subcarrier n is occupied by the pth PU. \(P_{md}^{n}\) is a miss-detection probability (i.e., \(Pr(\hat {V}_{p}^{n}|{O_{p}^{n}})\)). \(I_{\text {SP}_{p}}\phantom {\dot {i}\!}\) and \(\phantom {\dot {i}\!}{I_{\text {RP}_{p}}}\) are the interference produced by all SU transmitters and all relay transmitters, and they must be limited by the IT constraint.

4 Proposed algorithm

The BER expressions at SU-R for MQAM (21) or MPSK modulation (22) [22] over the AWGN channel are written as
$$\begin{array}{*{20}l} {}\text{BER}_{l,\text{MQAM}}^{n} &=\frac{4}{b}\left({1 - \frac{1}{{\sqrt M }}} \right)Q\left({\sqrt {\frac{{3b({\text{SINR}_{l,eq}^{n}}/b)}}{{M - 1}}}} \right) \\ &=\frac{4}{b}\left({1 - \frac{1}{{\sqrt M }}} \right)Q\left({\sqrt {\frac{{3}}{{M - 1}}} {{\left({\text{SINR}_{l,eq}^{n}} \right)}^{2}}} \right) \end{array} $$
(21)
$$\begin{array}{*{20}l} {\text{BER}_{l,\text{MPSK}}^{n} = \frac{2}{b}Q\left({\sqrt {2b ({\text{SINR}_{l,eq}^{n}}/b){{\sin }^{2}}\left({\frac{\pi }{M}} \right)}} \right)} \end{array} $$
(22)

where \(Q\left (\bar {x} \right) = \frac {1}{{\sqrt {2\pi } }}\int _{\bar x}^{\infty } {{e^{- \frac {{{w^{2}}}}{2}}}} dw\) is a Gaussian Q-function, b=log2M, and M is the number of bits of the modulation symbols.

In this paper, a worst-CSI PC algorithm is presented to limit the BER of the SUs while keeping the interference leakage to the PUs below the IT level, the maximum transmit power of the SU and relay below certain thresholds. Here, we introduce the SINRs at SU-R and relay in order to guarantee the requirements for each hop. Thus, the optimization problem is formulated as OP1
$$ {}\begin{aligned} \textbf{OP1}\quad &\mathop {\min }\limits_{P_{l,1}^{n},P_{l,2}^{n}} \quad \mathop {\max }\limits_{\forall l} \quad \text{BER}_{l}^{n} \\ s.t.\quad \;\; &C1: 0 \le \sum\limits_{n = 1}^{N} {P_{l,1}^{n}} \le P_{l,1}^{\text{max} },\quad \forall l\\ \quad \quad \quad &C2:0 \le \sum\limits_{n = 1}^{N} {P_{l,2}^{n}} \le P_{l,2}^{\text{max} },\quad \forall l \\ \quad \quad \quad &C3: \text{SINR}_{l,1}^{n} \ge \text{SINR}_{l,1,\text{th}}^{n},\quad \forall l,\forall n \\ \quad \quad \quad &C4: \text{SINR}_{l,2}^{n} \ge \text{SINR}_{l,2,\text{th}}^{n},\quad \forall l,\forall n \\ \quad \quad \quad &C5: \sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({O_{p}^{n}})P_{md}^{n}P_{l,1}^{n}{{|h_{l,p,1}^{n}|^{2}}}}} \le {I_{p,\text{th}}},\quad \forall p \\ \quad \quad \quad &C6: \sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({O_{p}^{n}})}} P_{md}^{n}P_{l,2}^{n}{{|h_{l,p,2}^{n}|^{2}}} \le {I_{p,\text{th}}},\quad \forall p \end{aligned} $$
(23)
where \(P_{l,1}^{\text {max} }\) and \(P_{l,2}^{\text {max} }\) are the maximum power budgets of SU-T and relay, respectively. \(\text {SINR}_{l,1,\text {th}}^{n}\) and \(\text {SINR}_{l,2,\text {th}}^{n}\) are the SINR thresholds at the relay and SU-R, respectively. I p,th is the interference threshold prescribed by the pth PU receiver. C1 and C2 represent the transmit power constraints at the transmitters of the source node and relay node, respectively. C3 and C4 are the SINR constraints to keep basic communication requirements at the lth relay and SU-R. C5 and C6 denote the interference power constraints at tge source and relay nodes, respectively. Since the objection of OP1 is a monotonic function about the equivalent SINR \(\text {SINR}_{l,eq}^{n}\), OP1 can be converted into
$$\begin{array}{*{20}l} \textbf{OP2}\quad &\mathop{\max}\limits_{P_{l,1}^{n},P_{l,2}^{n}} \quad \mathop{\min}\limits_{\forall l}~\text{SINR}_{l,eq}^{n} \\ \quad \quad \quad s.t.\quad \quad &C1 \sim C6 \end{array} $$
(24)
Therefore, the original optimization problem OP1 becomes a worst-CSI SINR maximization problem OP2. The criterion about the selection of the worst-CSI user is
$$\begin{array}{*{20}l} {\left| {h_{l,1}^{n}} \right|^{2}}{\left| {h_{l,2}^{n}} \right|^{2}} \le {\left| {h_{j,1}^{n}} \right|^{2}}{\left| {h_{j,2}^{n}} \right|^{2}} \end{array} $$
(25)
If the channel gain of two hops can satisfy (25), we regard the lth SU as the worst case. OP2 is not convex due to the constraints C3 and C4. In order to simplify our analysis, we take C3 and C4 on reciprocal as
$$\begin{array}{*{20}l} C3:\frac{1}{{\text{SINR}_{l,1}^{n}}} \le \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}} \end{array} $$
(26)
$$\begin{array}{*{20}l} C4:\frac{1}{{\text{SINR}_{l,2}^{n}}} \le \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}} \end{array} $$
(27)
i.e.,
$$\begin{array}{*{20}l} {\frac{{\frac{{N_{l,1}^{n}}}{{{ {{{|h_{l,1}^{n}|^{2}} }}}}} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}\frac{{{{ {{|g_{p,l,1}^{n}|^{2}}} }}}}{{{{ {{|h_{l,1}^{n}|^{2}}} }}}}} }}{{P_{l,1}^{n}}} \le \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}}} \end{array} $$
(28)
$$\begin{array}{*{20}l} {\frac{{\frac{{N_{l,2}^{n}}}{{{ {{{|h_{l,2}^{n}|^{2}} }}}}} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}\frac{{{{ {{|g_{p,l,2}^{n}|^{2}}} }}}}{{{{ {{|h_{l,2}^{n}|^{2}}} }}}}} }}{{P_{l,2}^{n}}} \le \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}}} \end{array} $$
(29)
Define
$$ \left\{ \begin{array}{l} F_{l,1}^{n} = {\frac{{N_{l,1}^{n}}}{{{ {|h_{l,1}^{n}|^{2}} }}}}\\ F_{l,2}^{n} = {\frac{{N_{l,2}^{n}}}{{{ {|h_{l,2}^{n}|^{2}} }}}} \\ \end{array} \right. $$
(30)
$$ {\left\{ \begin{array}{l} G_{p,l,1}^{n} = {\frac{{{ {|g_{p,l,1}^{n}|^{2}} }}}{{{ {|h_{l,1}^{n}|^{2}} }}}}\\ G_{p,l,2}^{n} ={\frac{{{ {|g_{p,l,2}^{n}|^{2}} }}}{{{ {|h_{l,2}^{n}|^{2}} }}}} \\ \end{array} \right.} $$
(31)
then C3 and C4 can be written as
$$ {\frac{{F_{l,1}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,1}^{n}} }}{{P_{l,1}^{n}}} \le \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}}} $$
(32)
$$ {\frac{{F_{l,2}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,2}^{n}} }}{{P_{l,2}^{n}}} \le \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}}} $$
(33)
Then, the equivalent SINR is
$$ {{\begin{aligned} {}{\text{SINR}_{l,eq}^{n} \,=\, \frac{{\frac{{P_{l,1}^{n}}}{{F_{l,1}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,1}^{n}} }}\! \times\! \frac{{P_{l,2}^{n}}}{{F_{l,2}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,2}^{n}} }}}}{{\frac{{P_{m,1}^{n}}}{{F_{l,1}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,1}^{n}} }} + \frac{{P_{l,2}^{n}}}{{F_{l,2}^{n} + \sum\limits_{p = 1}^{P} {P_{l,2}^{n}G_{p,l,2}^{n}} }} + 1}} \,=\, \frac{{{a_{l}^{n}}P_{l,1}^{n}{b_{l}^{n}}P_{l,2}^{n}}}{{{a_{l}^{n}}P_{l,1}^{n} \,+\, {b_{l}^{n}}P_{l,2}^{n} \,+\, 1}}} \end{aligned}}} $$
(34)
where \({a_{l}^{n}}\) and \({b_{l}^{n}}\) are given by
$$ {\left\{ {\begin{array}{l} {{a_{l}^{n}} = \frac{1}{{F_{l,1}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,1}^{n}} }}} \\ {{b_{l}^{n}} = \frac{1}{{F_{l,2}^{n} + \sum\limits_{p = 1}^{P} {{P_{p}^{n}}G_{p,l,2}^{n}} }}} \\ \end{array}} \right.} $$
(35)
Furthermore, to make the equivalent SINR tractable, we adopt the following approximation [23]
$$ {\text{SINR}_{l,eq}^{n} \approx \frac{{{a_{l}^{n}}P_{l,1}^{n}{b_{l}^{n}}P_{l,2}^{n}}}{{{a_{l}^{n}}P_{l,1}^{n} + {b_{l}^{n}}P_{l,2}^{n}}}} $$
(36)
Define \(P_{l,1}^{n} = {x_{1}}\), \(P_{l,2}^{n} = {x_{2}}\), \(t = \frac {1}{{\text {SINR}_{l,eq}^{n}}}\), then
$$ {t = \frac{1}{{\text{SINR}_{l,eq}^{n}}} = \frac{1}{{{b_{l}^{n}}}}\frac{1}{{{x_{2}}}} + \frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}}}}} $$
(37)
Therefore, OP2 can be rewritten as
$$\begin{array}{*{20}l} \textbf{OP3}\quad &\mathop {\min }\limits_{{x_{1}},{x_{2}}} \quad \mathop {\max }\limits_{\forall l} \quad t \\ s.t.\quad &C1: 0 \le \sum\limits_{n = 1}^{N} {{x_{1}}} \le P_{l,1}^{\text{max} },\quad \forall l \notag\\ \quad \quad \;&C2: 0 \le \sum\limits_{n = 1}^{N} {{x_{2}}} \le P_{l,2}^{\text{max} },\quad \forall l \\ \quad \quad \;&C3:\frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}}}} \le \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}},\quad \forall l,\forall n \\ \quad \quad \;&C4: \frac{1}{{{{b_{l}^{n}}}}}\frac{1}{{{x_{2}}}} \le \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}},\quad \forall l,\forall n \\ \quad \quad \;&C5: \sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({O_{p}^{n}})P_{md}^{n}{x_{1}}{{|h_{l,p,1}^{n}|^{2}}}} \le {I_{p,\text{th}}},\quad \forall p }\\ \quad \quad \;&C6: \sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({O_{p}^{n}})}} P_{md}^{n}{x_{2}}{{|h_{l,p,2}^{n}|^{2} }} \le {I_{p,\text{th}}},\quad \forall p \end{array} $$
(38)
Now OP3 is a convex problem which can be solved by the dual decomposition method [24]. First, we give a Lagrange function with Lagrange multipliers \(\lambda _{l,1},\lambda _{l,2},\lambda _{l,3}^{n},\lambda _{l,4}^{n},\lambda _{p,5},\lambda _{p,6} \ge 0\) as follows
$$ {{\begin{aligned} &{}L\left({t,\{ {\lambda_{l,1}} \},\{ {\lambda_{l,2}} \},\{ {\lambda_{l,3}^{n}} \},\{ {\lambda_{l,4}^{n}} \},\{ {\lambda_{p,5}} \},\{ {\lambda_{p,6}} \}}\right) \\ &{}= t + \sum\limits_{l = 1}^{L} {\left({ {\lambda_{l,1}\left({\sum\limits_{n = 1}^{N}{x_{1}} - P_{l,1}^{\text{max} }} \right)}} \right)} + \sum\limits_{l = 1}^{L} {\left({ {\lambda_{l,2}\left({\sum\limits_{n = 1}^{N}{x_{2}} - P_{l,2}^{\text{max} }}\right)}} \right)} \\ & \;\;\;\;{}+ \sum\limits_{l = 1}^{L}\! {\left(\!{\sum\limits_{n = 1}^{N}\! {\lambda_{l,3}^{n}\!\left(\!{\frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}}}} - \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}}}\!\right)}}\!\right)} \,+\,\! \sum\limits_{l = 1}^{L}\! {\left(\!{\sum\limits_{n = 1}^{N}\! {\lambda_{l,4}^{n}\left(\! {\frac{1}{{{b_{l}^{n}}}}\!\frac{1}{{{x_{2}}}} \,-\, \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}}}\!\right)}}\!\right)} \\ & \;\;\;\;{}+ \sum\limits_{p = 1}^{P} {\left({{\lambda_{p,5}\left({\sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({{O_{p}^{n}}})P_{md}^{n}{x_{1}}{|h_{l,p,1}^{n}|^{2}} }} - {I_{p,\text{th}}}} \right)}}\right)} \\ & \;\;\;\;{}+ \sum\limits_{p = 1}^{P} {\left({{\lambda_{p,6}\left({\sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({{O_{p}^{n}}})P_{md}^{n}{x_{2}}{|h_{l,p,2}^{n}|^{2}}}} - {I_{p,\text{th}}}}\right)}}\right)}\\ \end{aligned}}} $$
(39)
The dual problem of the Lagrange function (39) is
$$ {\begin{array}{l} D\left(t, {\{ \lambda_{l,1}\},\{ \lambda_{l,2}\},\{ \lambda_{l,3}^{n}\},\{ \lambda_{l,4}^{n}\},\{ \lambda_{p,5}\},\{ \lambda_{p,6}\}}\right) \\ = \sum\limits_{l = 1}^{L} {\left({\sum\limits_{n = 1}^{N} {\mathop {\min }\limits_{{x_{1}},{x_{2}}} \;{L_{l}^{n}}\left(t, {\lambda_{l,1},\lambda_{l,2},\lambda_{l,3}^{n},\lambda_{l,4}^{n},\{ \lambda_{p,5}\},\{ \lambda_{p,6}\}} \!\right)}} \right)} \\ \;\;\;\;- \sum\limits_{l = 1}^{L} {\left({{\lambda_{l,1}P_{l,1}^{\text{max} }}}\right)} - \sum\limits_{l = 1}^{L} {\left({ {\lambda_{l,2}P_{l,2}^{\text{max}}}}\right)} \\ \;\;\;\;- \sum\limits_{l = 1}^{L} {\left({\sum\limits_{n = 1}^{N} {\lambda_{l,3}^{n}\frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}}}}\right)} - \sum\limits_{l = 1}^{L} {\left({\sum\limits_{n = 1}^{N} {\lambda_{l,4}^{n}\frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}}}}\right)} \\ \;\;\;\;- \sum\limits_{p = 1}^{P} {\left({ { {{\lambda_{p,5}{I_{p,\text{th}}}}} }}\right)} - \sum\limits_{p = 1}^{P} {\left({{ {{\lambda_{p,6}{I_{p,\text{th}}}}} }}\right)} \\ \end{array}} $$
(40)
Define \({L_{l}^{n}}\) as a function of x 1 and x 2
$$ {{\begin{aligned} &{}{L_{l}^{n}}\left(t, {\lambda_{l,1},\lambda_{l,2},\lambda_{l,3}^{n},\lambda_{l,4}^{n},\{ \lambda_{p,5}\},\{ \lambda_{p,6}\}}\right) \\ &{}=\! t \,+\, \lambda_{l,1}{x_{1}} \,+\, \lambda_{l,2}{x_{2}} \,+\, \lambda_{l,3}^{n}\frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}}}} \,+\, \lambda_{l,4}^{n}\frac{1}{{{b_{l}^{n}}}}\frac{1}{{{x_{2}}}} \,+\, {x_{1}}\!\sum\limits_{p = 1}^{P} \!{\lambda_{p,5}{Pr}\!\left(\!{{O_{p}^{n}}}\right)\!P_{md}^{n}{{|h_{l,p,1}^{n}|^{2}}}}\\ &{}\;\;\;\;+ {x_{2}}\sum\limits_{p = 1}^{P} {\lambda_{p,6}{Pr}\left({{O_{p}^{n}}}\right)P_{md}^{n}{{|h_{l,p,2}^{n}|^{2}}}} \end{aligned}}} $$
(41)
Since the primal problem in (38) is convex, strong duality holds, and the dual problem can be solved by an iterative manner using the gradient projection method [24]. By the Karush-Kuhn-Tucker (KKT) condition, the optimal transmit power \(P_{l,1}^{n}\) and \(P_{l,2}^{n}\) at SU-T and relay can be calculated by
$$ {{\begin{aligned} {}{\frac{{\partial {L_{l}^{n}}}}{{\partial {x_{1}}}} \!= - \frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}^{2}}}} \!+ \!\lambda_{l,1} - \lambda_{l,3}^{n}\frac{1}{{{a_{l}^{n}}}}\frac{1}{{{x_{1}^{2}}}} \,+\, \sum\limits_{p = 1}^{P} {\lambda_{p,5}Pr\left(\!{{{O_{p}^{n}}}} \right)P_{md}^{n}{{|h_{l,p,1}^{n}}|^{2}}} = 0} \end{aligned}}} $$
(42)
$$ {{\begin{aligned} {}{\frac{{\partial {L_{l}^{n}}}}{{\partial {x_{2}}}} \!= \!- \frac{1}{{{b_{l}^{n}}}}\frac{1}{{{x_{2}^{2}}}} \,+\, \lambda_{l,2} \,-\, \lambda_{l,4}^{n}\frac{1}{{{b_{l}^{n}}}}\frac{1}{{{x_{2}^{2}}}} + \sum\limits_{p = 1}^{P} {\lambda_{p,6}Pr\left({{{O_{p}^{n}}}} \right)P_{md}^{n}{{|h_{l,p,2}^{n}|^{2}}}} = 0} \end{aligned}}} $$
(43)
The optimal solutions are
$$ {\fontsize{8.5}{6}\begin{aligned} P_{l,1}^{n}{~}^{*} = x_{1}^{*}= \sqrt {\frac{{\frac{1}{{{a_{l}^{n}}}}\left({1 + \lambda_{l,3}^{n}} \right)}}{{\lambda_{l,1} + \sum\limits_{p = 1}^{P} {\lambda_{p,5}Pr\left({{{O_{p}^{n}}}} \right)P_{md}^{n}{{|h_{l,p,1}^{n}|^{2}}}} }}} \end{aligned}} $$
(44)
$$ {\fontsize{8.5}{6}\begin{aligned} P_{l,2}^{n}{~}^{*} = x_{2}^{*}= \sqrt {\frac{{\frac{1}{{{b_{l}^{n}}}}\left({1 + \lambda_{l,4}^{n}} \right)}}{{\lambda_{l,2} + \sum\limits_{p = 1}^{P} {\lambda_{p,6}Pr\left({{{O_{p}^{n}}}}\right)P_{md}^{n}{{|h_{l,p,2}^{n}|^{2}}}} }}} \end{aligned}} $$
(45)
The lagrange multipliers λ l,1, λ l,2, \(\lambda _{l,3}^{n}\), \(\lambda _{l,4}^{n}\), λ p,5, and λ p,6 must be carefully chosen to ensure a fast convergence rate. A simple but effective way to decide these multipliers is to employ the subgradient method as follows
$$ {}{{\lambda_{l,1}}({d + 1}) = {\left[ {{\lambda_{l,1}}(d) + {\beta_{1}}\left({\sum\limits_{n = 1}^{N} {P_{l,1}^{n}} - P_{l,1}^{\textit{max} }}\right)}\right]^ +}} $$
(46)
$$ {}{{\lambda_{l,2}}({d + 1}) = {\left[ {{\lambda_{l,2}}(d) + {\beta_{2}}\left({\sum\limits_{n = 1}^{N} {P_{l,2}^{n}} - P_{l,2}^{\textit{max} }}\right)}\right]^ + }} $$
(47)
$$ {}\lambda_{l,3}^{n}({d +1})= \left[{\lambda_{l,3}^{n}(d)+{\beta_{3}}\left({\frac{1}{{{a_{l}^{n}}}}\frac{1}{{P_{l,1}^{n}}} - \frac{1}{{\text{SINR}_{l,1,\text{th}}^{n}}}}\right)}\right]^+ $$
(48)
$$ {}\lambda_{l,4}^{n}({d +}1)= \left[{\lambda_{l,4}^{n}(d)+{\beta_{4}}\left({\frac{1}{{{b_{l}^{n}}}}\frac{1}{{P_{l,2}^{n}}} - \frac{1}{{\text{SINR}_{l,2,\text{th}}^{n}}}}\right)} \right]^{+} $$
(49)
$$ {{\begin{aligned} {}{{\lambda_{p,5}}({d + 1}) = {\left[{{\lambda_{p,5}}(d) \,+\, {\beta_{5}}\left({\sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({{O_{p}^{n}}})P_{md}^{n}{{|h_{l,p,1}^{n}|^{2}}} - {I_{p,\text{th}}}}} }\right)} \right]^ + }} \end{aligned}}} $$
(50)
$$ {{\begin{aligned} {}{{\lambda_{p,6}}({d + 1}) = {\left[ {{\lambda_{p,6}}(d) \,+\, {\beta_{6}}\left({\sum\limits_{l = 1}^{L} {\sum\limits_{n = 1}^{N} {{Pr}({{O_{p}^{n}}})P_{md}^{n}{{|h_{l,p,2}^{n}|^{2}}} - {I_{p,\text{th}}}}} } \right)} \right]^ + }} \end{aligned}}} $$
(51)

where [·]+= max(0,·). d denotes the iteration number. β 1β 6 are the small step sizes which satisfy β q >0, q={1,2,3,4,5,6}. Apparently, λ l,1(d+1), λ l,2(d+1), \(\lambda _{l,3}^{n}({d + 1})\), and \(\lambda _{l,4}^{n}({d + 1})\) are locally updated, whereas λ p,5(d+1) and λ p,6(d+1) are updated through cooperation. In addition, the Lagrange multipliers λ p,5(d+1) and λ p,6(d+1) in (50) and (51) can only be updated by obtaining the interference channels information (i.e., \(h_{l,p,1}^{n}\) and \(h_{l,p,2}^{n}\)) about other SUs and relays, respectively.

Finally, taking the optimal solutions \({P_{l,1}^{n}}{~}^{*}\) and \({P_{l,2}^{n}}{~}^{*}\) into (21) and (22), respectively, the optimal BER can be calculated.

Based on the above development, we get our algorithm reaching the optimum control power at SU-T and relay for the optimization problem. And the specific power allocation algorithm can be given in Algorithm 1.

5 Simulation results

In this section, we present the simulation results to show the effectiveness of the proposed algorithm. We assume that there are four SUs and relays (i.e., L=4), one PU (i.e., P=1), and four subcarriers (i.e., N=4), and each SU occupies one subcarrier. The sensing channel suffers with the Rayleigh fading and the average SNR ranges from 0 to 15 dB. The error rate of the transmit symbol for BPSK modulation on the reporting channel is \({P_{e}^{n}}\)= 10−3. We set the target SINR on each subcarrier at relay, and SU-R is \(\text {SINR}_{l,1,\text {th}}^{n}/\text {SINR}_{l,2,\text {th}}^{n}= 3\) dB. The maximum transmit power of each SU-T and relay is \(P_{l,1}^{\text {max} }/P_{l,2}^{\text {max} }=\) 1.5 mW. And we also assume that \(P{r}({{O_{p}^{n}})}\) is the same for every subcarrier, e.g., \(P{r}({{O_{p}^{n}})}=0.1\). Similar to [25], the normal values of the interference channel gains \(h_{l,p,1}^{n}\), \(h_{l,p,2}^{n}\), \(g_{p,l,1}^{n}\), and \(g_{p,l,2}^{n}\) are selected from the interval (0, 0.3) respectively. The normal values of the channel gains \(h_{l,1}^{n}\) and \(h_{l,2}^{n}\) are randomly chosen from the intervals (0, 1) and (0, 1), respectively. And the normal value of the sensing channel gain \(z_{p,l}^{n}\) is also randomly chosen from the interval (0, 0.3). The background noise power on each subcarrier is assumed to be identical and equal to 0.01 mW, i.e., \(N_{l,1}^{n} =N_{l,2}^{n}=0.01\) mW [26]. The termination condition ρ is 10−6. The simulation results are presented in Figs. 2, 3, 4, 5, 6, 7, 8, and 9 and in Table 3.
Fig. 2

Convergence of the SINR of the selected link under \({P_{md}^{n}}=0.1\) and \({P{r}({{O_{p}^{n}})=0.1}}\)

Fig. 3

Maximum BER of the secondary user under \({P_{md}^{n}}=0.1\) and \({P{r}({{O_{p}^{n}})=0.1}}\). a Convergence of the maximum BER. b Maximum BER against the equivalent SINR

Fig. 4

Convergence of the maximum BER under \({P_{md}^{n}}=0.1\) and \({P{r}({{O_{p}^{n}})=0.1}}\)

Fig. 5

Convergence of interference at PU-R under \({P_{md}^{n}}=0.1\) and \({P{r}({{O_{p}^{n}})=0.1}}\)

Fig. 6

Interference at PU-R against different \(P_{l}^{\text {max}}\)

Fig. 7

Maximum BER under different I p,th and \(P_{md}^{n}\) with \(P_{l}^{\text {max}}=1.5\) mW and \(P{r}({{O_{p}^{n}})}=0.1\)

Fig. 8

Maximum BER under different I p,th and \(P_{l}^{\text {max}}\) with \(P_{md}^{n}=0.1\) and \(P{r}({{O_{p}^{n}})}=0.1\)

Fig. 9

Interference at PU-R under different I p,th and \(P_{md}^{n}\) with \(P_{l}^{\text {max}}=1.5\) mW and \(P{r}({{O_{p}^{n}})}=0.1\)

Table 3

Maximum BER at SU-R for different \(P_{md}^{n}\)

Modulation form

\(P_{md}^{n}=0.08\)

\(P_{md}^{n}=0.10\)

\(P_{md}^{n}=0.12\)

BPSK

1.102e−5

1.898e−5

4.412e−5

QPSK

9.401e−4

1.247e−3

1.936e−3

16PSK

9.777e−2

1.010e−1

1.064e−1

2QAM

4.264e−8

9.523e−8

3.309e−7

4QAM

9.401e−4

1.247e−3

1.936e−3

16QAM

6.618e−2

6.610e−2

7.367e−2

Figure 2 shows the convergence of SINRs at relay and SU-R of the selected link. And the equivalent SINR of the selected link also quickly converges to a stable point. From Fig. 2, we can see that the SINRs of the link increase first with the increase of iteration number, then they converge to the equilibrium points that satisfy the basic SINR requirements of each hop without outage probability all the time. It indicates that our proposed algorithm can provide SU normal communication. Based on the normal communication of SUs, the minimization of BER of the system is meaningful.

To evaluate the effectiveness and reliability of our proposed algorithm on the BER performance of the SU, we demonstrate the convergence characteristic of the BER in Fig. 3 a and the characteristic curve of the BER versus the equivalent SINR of the selected link in Fig. 3 b. Combining Fig. 3 a with Fig. 3 b, we find that our algorithm can effectively reduce the maximum BER of the system through increasing the SINR of each hop while keeping the interference power at PU-R belows the IT level.

Figures 4 and 5 give the comparison of the BER performance of SU and the interference power at PU-R between the proposed PC algorithm and the PC algorithm without sensing errors. Figure 4 shows the maximum BER performance of the selected SU link. The BER of proposed algorithm for the given IT level I p,th=0.01 mW is higher than that of the PC algorithm without sensing errors, which provides the protection of PU when SUs share the spectrum opportunistically. From Fig. 4, we can see that the maximum BER of the proposed algorithm for both MPSK and MQAM modulation quickly converges to the stable point, and the optimization goal is achieved by minimizing the maximum BER of the worst-CSI channel to limit the total BER of the SUs. Briefly, the purpose of minimizing the BER of the system is obtained by adjusting the transmit power of SU-T and relay transmitter, which improves the performance and ensures the QoS of SUs.

From Fig. 5, we can see that the PC algorithm under the imperfect spectrum sensing can guarantee the interference power at PU-R always below the IT level, whereas the PC algorithm without sensing errors fail to keep the actual received interference power at PU-R in the allowable region. From Figs. 4 and 5, we conclude that the proposed algorithm can provide well protection for PU at the cost of little BER increases.

Figure 6 shows the characteristics of the interference to PU produced by secondary system for different maximum transmit power budget \(P_{l}^{\text {max} }\) (i.e., \(P_{l,1}^{\text {max} }\)=\(P_{l,2}^{\text {max} }\)=\(P_{l}^{\text {max} }\)) with and without sensing errors in PC algorithm. From Fig. 6, we know that the interference power at PU-R of the algorithm without sensing errors is higher than that of our proposed algorithm and exceeds the IT level.

In Fig. 7, we present the maximum BER versus the IT level from I p,th=−20 dBm to I p,th=−5 dBm of our proposed algorithm for different \(P_{md}^{n}\) and show the maximum BER performance against the interference threshold I p,th and the miss-detection probability \(P_{md}^{n}\) for MPSK (M=2) and MQAM (M=2) modulation. For \(P_{md}^{n}\)=0.1, the maximum BER of the SUs decreases first with the increasing interference power constraint, then keeps flat because of the maximum transmit power constraints. We find that the BER performance of our proposed algorithm under different \(P_{md}^{n}\) is the same when the interference power constraint is large, for example, when I p,th is larger than −12 dBm. The BER performance for \(P_{md}^{n}=0.08\) is the best under three modulations when the IT level is low. Since larger \(P_{md}^{n}\) stands for more harmful interference to PU, less transmit power is allocated to provide the protection to PUs for their communications.

Table 3 shows the maximum BER versus different miss-detection probabilities \(P_{md}^{n}\) for I p,th=0.01 mW, the transmission data for MPSK (M=2,4, and 16) and MQAM (M=2, 4, and 16) modulation. From Table 3, we find that the spectrum sensing requirement is improved from \(P_{md}^{n}=0.12\) to \(P_{md}^{n}=0.08\) for the given modulation, and the maximum BER of the system decreases accordingly. This implies that, with the improved spectrum sensing requirement, a spectrum hole is accurately detected, thus less interference occurs between the primary network and the secondary network, resulting in decreased BER for the secondary transmission. Furthermore, we also find that the maximum BER of the system increases with the increase of the number of bits of modulation symbols. Since the decision region of the corresponding received signal decreases with the increase of M, when the signal suffers to the interference and the damage caused by noise, the error probability of the received signal will be bigger.

Figure 8 shows the maximum BER performance of our proposed algorithm against I p,th under different maximum transmit power budgets \(P_{l}^{\text {max} }\). In Fig. 8, for the given transmit power budget \(P_{l}^{\text {max} }=1.5\) mW, the maximum BER decreases first then keeps flat when I p,th increases. We find that the BER performance of our proposed PC algorithm under different maximum transmit power budgets is almost the same when the interference power constraint is low, and the BER performance for \(P_{l}^{\text {max} }=1.6\) mW is significant when the interference power constraint is large, for example, larger than −12 dBm. In fact, from another perspective, the interference power constraints represent the distance, with the increasing distance between the SU and the PU, more transmit power is allocated to achieve a lower BER.

In order to further specify the effect of the sensing uncertainties on the PU, we demonstrate the characteristic of the interference to the PU produced by a secondary system in Fig. 9. And the characteristics of the interference is versus the IT level from I p,th=−20 dBm to I p,th=−5 dBm of our proposed algorithm for different \(P_{md}^{n}\). From Fig. 9, we find that the interference power at PU-R of our proposed algorithm increases with the increasing miss-detection probability from \(P_{md}^{n}=0.06\) to \(P_{md}^{n}=0.12\). For the given miss-detection probability \(P_{md}^{n}=0.1\), the interference power at PU-R of the proposed algorithm increases first then keeps constant when I p,th increases because of the maximum transmit power constraints. As emphasized, the larger the miss-detection probability \(P_{md}^{n}\) is, the more the concurrent transmission of the PUs and SUs and the greater the harmful interference to PU. In conclusion, the sensing uncertainties should be considered to adapt actual communication scenarios and provide better protection for the communication of the PU.

6 Conclusions

This paper studies the PC problem in a cognitive relay network under the spectrum sensing uncertainties. We propose a PC algorithm under maximum transmit power constraints, SINR constraints and interference constraints to minimize the total BER for all SUs according to the actual situations. The worst-CSI PC algorithm and min-max criteria formulation are applied to the optimization problem converted into the max-min equivalent SINR problem solved by the Lagrangian duality theory. Compared with the PC algorithm without the spectrum sensing uncertainties, simulation results show the advantages of our proposed PC algorithm which can well protect the communication of the PU though there is a little BER increase of the secondary system at the expense. We also find that the BER of the secondary system decreases as the probability of miss-detection decreases in our proposed algorithm. In our future research, the PC optimization problem with the introduction of more complicated channels in the underlay cognitive relay networks will be conducted.

Declarations

Acknowledgements

The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. The work of this paper is supported by the National Natural Science Foundation of China under grant no. 61571209.

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors’ Affiliations

(1)
College of Communication Engineering, Jilin University, Changchun, China

References

  1. Spectrum Policy Task Force: Report of the spectrum rights and responsibilities working group. Federal Communications Commission. Technical Report, Nov (2002).Google Scholar
  2. J Mitola III, GQ Maguire Jr, Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999).View ArticleGoogle Scholar
  3. S Haykin, Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005).View ArticleGoogle Scholar
  4. KB Letaief, W Zhang, Cooperative communications for cognitive radio networks. Proc. IEEE. 97(5), 878–893 (2009).View ArticleGoogle Scholar
  5. TM Cover, AE Gamal, Capacity theorems for the relay channel. IEEE Trans. Inf. Theory. 25(5), 572–584 (1979).MathSciNetView ArticleMATHGoogle Scholar
  6. AE Gamal, TM Cover, Multiple users information theory. Proc. IEEE. 68(12), 1466–1483 (1980).View ArticleGoogle Scholar
  7. HY Huang, Z Li, JB Si, L Guan, Underlay cognitive relay networks with imperfect channel state information and multiple primary receivers. IET Commun.9(4), 460–467 (2015).View ArticleGoogle Scholar
  8. YY Pei, YC Liang, Resource allocation for device-to-device communication overlaying two-way cellular networks. Proc. IEEE Inf. Conf. on Wireless Communications and Networking Conference (WCNC): PHY. Apr. 9(4), 3346–3351 (2013).Google Scholar
  9. YJ Xu, XH Zhao, Optimal power allocation for multiuser cognitive radio networks under QoS and interference temperature constrains. China Commun.10(10), 91–100 (2013).View ArticleGoogle Scholar
  10. MG Adian, H Aghaeinia, Spectrum sharing and power allocation in multiple-in multiple-out cognitive radio networks via pricing. IET Commun.6(16), 2621–2629 (2012).MathSciNetView ArticleMATHGoogle Scholar
  11. MV Nguyen, CS Hong, SW Lee, Cross-layer optimization for congestion and power control in OFDM-based multi-hop cognitive radio networks. IEEE Trans. Commun. 60(8), 2101–2112 (2012).View ArticleGoogle Scholar
  12. M Dashti, P Azmi, K Navaie, Radio resource allocation for orthogonal frequency division multiple access-based underlay cognitive radio networks utilising weighted ergodic rates. IET Commun.6(16), 2543–2552 (2012).MathSciNetView ArticleMATHGoogle Scholar
  13. N Mokari, H Saeedi, P Azmi, Quantized ergodic radio resource allocation in cognitive femto networks with controlled collision and power outage probabilities. IEEE J. Sel. Areas Commun. 32(11), 2090–2104 (2014).View ArticleGoogle Scholar
  14. Y Wu, DH Tsang, Joint bandwidth and power allocations for cognitive radio networks with imperfect spectrum sensing. Wireless Per. Commun. 57(1), 19–31 (2011).View ArticleGoogle Scholar
  15. SB Behera, DD Seth, in Proc. IEEE Inf. Conf. on Electrical, Electronics, Signals, Communication and Optimization (EESCO). Efficient resource allocation in cognitive radio network under imperfect spectrum sensing and unsecured environment, (2015), doi:10.1109/EESCO.2015.7253850.
  16. Y Gao, WJ Xu, SY Li, K Niu, JR Lin, in Proc. IEEE Inf. Conf. on 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Sept. Energy efficient resource allocation for cognitive radio networks with imperfect spectrum sensing. Sept, (2013), pp. 3318–3322, doi:10.1109/PIMRC.2013.6666720.
  17. F Chen, WJ Xu, YC Guo, JR Lin, in Proc. IEEE Inf. Conf. on Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on. Aug. Resource allocation in OFDM-based heterogeneous cognitive radio networks with imperfect spectrum sensing and guaranteed QoS, (2013), pp. 46–51, doi:10.1109/ChinaCom.2013.6694563.
  18. YJ Zhang, SW Wang, Resource Allocation for Cognitive Radio-Enabled Femtocell Networks with Imperfect Spectrum Sensing and Channel Uncertainty. IEEE Trans. Veh. Technol (2015). doi:10.1109/TVT.2015.2500902.
  19. XB Tan, H Zhang, J Hu, Capacity maximization of the secondary link in cognitive radio networks with hybrid spectrum access strategy. IET Commun.8(5), 689–696 (2014).View ArticleGoogle Scholar
  20. FF Digham, MS Alouini, MK Simon, On the energy detection of unknown signals over fading channels. IEEE Trans. Commun. 55(1), 21–24 (2007).View ArticleGoogle Scholar
  21. ZX Liu, HH Yuan, HX Li, XP Guan, HJ Yang, Robust power control for amplify-and-forward relaying scheme. IEEE Commun. Lett. 19(2), 263–266 (2015).View ArticleGoogle Scholar
  22. XR Xu, JR Bao, HY Cao, YD Yao, SQ Hu, Energy efficiency based optimal relay selection scheme with a ber constraint in cooperative cognitive radio networks. IEEE Trans. Veh. Technol (2015). doi:10.1109/TVT.2015.2389810.
  23. MY Ge, SW Wang, in Proc. IEEE Inf. Conf. on 2013 IEEE Wireless Communications and Networking Conference (WCNC). Apr. Energy-efficient power allocation for cooperative relaying cognitive radio networks, (2013), pp. 691–696, doi:10.1109/WCNC.2013.6554647.
  24. S Boyd, L Vandenberghe, Convex Optimization (Cambridge Univ. Press, Cambridge, U.K., Mar. 2004).View ArticleMATHGoogle Scholar
  25. P Setoodeh, S Haykin, Robust transmit power for cognitive radio. Proc. IEEE. 97(5), 915–939 (2009).View ArticleGoogle Scholar
  26. S Biyanwilage, U Gunawardana, R Liyanapathirana, in Proc. IEEE Inf. Conf. on TENCON Spring Conference, 2013 IEEE, Apr. Resource allocation in multiple DF relay assisted OFDM cognitive radio relay networks with the knowledge of fading statistics, (2013), pp. 406–410, doi:10.1109/TENCONSpring.2013.6584480.

Copyright

© Li et al. 2016