 Research
 Open access
 Published:
Robust power allocation for massive connections underlaying cognitive radio networks with channel uncertainty
EURASIP Journal on Wireless Communications and Networking volume 2016, Article number: 145 (2016)
Abstract
This paper investigates a robust power allocation scheme for a cognitive radio network (CRN) with channel uncertainty, where a large number of secondary connections (SCs) share the same frequency spectrum with a primary user (PU). Specifically, considering the fact that the channel gain estimates from the secondary transmitters (STx) to the primary receiver (PRx) are typically uncertain and cannot be perfectly known in practice, this paper advocates a robust interference constraint. Meanwhile, we take the STx’s transmit power limitation and interference between SCs into account. The optimization problem is a nonconvex and nonlinear program (NCNLP) with an outage probability constraint. Both the original objective function and the outage probability constraint are converted into manageable forms via the mathematical transformation. Then, we introduce the convex optimization theory to solve the intractable problem. Additionally, we develop an efficient algorithm to obtain the nearoptimal solution based on the interior point method, where we take advantage of the Newton algorithm to make the search of the feasible solution simple and effective. Finally, we conduct the indepth simulations under various parameter configurations, which demonstrate that our proposed robust power allocation scheme can achieve higher performance in comparison to the existing scheme in the literature.
1 Introduction
Since wireless personal communications have been in widespread applied to exchange information among individuals so far, not only are massive wireless devices growing up but also requirement of ubiquitous communications among individuals drives the development of abundant advanced wireless technologies [1]. In addition to this, the increasing demand for scarce frequency spectrum brings an exciting prospect to the development of the cognitive radio (CR) technology [2]. CR is a highly promising wireless technology which can mitigate the scarcity of spectral resources. In a cognitive radio network (CRN), there is usually a primary user (PU) and massive secondary connections (SCs) sharing the same spectrum, i.e., they coexist with each other. There is a great deal of coexistence modes for a CRN. In general, we classify the transmission modes into three types: overlay, interweave, and underlay modes. In the overlay mode, it is assumed that SCs have to acquire the perfect knowledge of the PU’s messages. The secondary transmitters (STxs) send out their own signals along with the signal received from PU. The interference inflicted upon PU from SCs obtains the compensation via SC relaying the PU’s signal. The interweave spectrum sharing mode is also called “opportunistic spectrum access” [3]. There is no cooperation between SCs and PU in the interweave mode. SC is allowed to occupy the channel if and only if the transmitter channels of SC and PU are mutually orthogonal. In time domain, SC should abandon the spectrum resource once the PU returned to utilize the channel occupied by SC. In the underlay mode, SCs are permitted to transmit concurrently with PU sharing the same spectrum bands, provided that the interference experienced by PU is controlled less than a certain threshold which PU can tolerate to [3].
This paper focuses on the underlay mode. It should be noted that the massive SCs will interfere with the communication of PU in general. A significant design challenge related to this network is how to maximize the throughput capacity of SCs with the quality of service (QoS) of the PU being guaranteed in the underlay mode. Moreover, when we consider the uncertainty of the channel between the STx and the primary receiver (PRx), this problem becomes more troublesome.
The optimal or suboptimal power allocation policies in the underlay mode have been already investigated widely [4–20]. A heuristic algorithm in CR systems under OFDMA has been reported in [4]. Ghasemi and Sousa [4] do not take the transmit power constraint of SCs into account. However, the transmit power constraint of SCs cannot be ignored due to the hardware of the STx. In [5], ergodic and outage capacity of SCs over Rayleigh faded channel based on MMSE estimation is evaluated. The transmit power of the PRx is under the constraint of peak received power. In [6], transmission capacity of SCs is evaluated under the interference constraint of the PU. The SCs serve as cooperative relays in spectrum sharing environment. It is notable that perfect channel state information (CSI) is assumed in these works [4–11]. However, the CSI between SC and PU is usually difficult to be estimated accurately in actual situations mainly due to the lack of signaling cooperation between them. Therefore, power allocation with channel uncertainty should be considered in CRN [12–20]. A worstcase formulation is utilized in [12] for beamforming design, in which an ellipsoidal channel uncertainty region is assumed. Dall’Anese et al. [13] considers the probabilistic interference constraints for a CR power control problem, where uncertainty in composite fading channels comprising shadowing and Nakagami fading is accounted for. Power allocation problems for generic OFDMA systems with channel uncertainty have also been investigated extensively [14–16]. Ma et al. [17] shows the availability of imperfect CSI that includes probabilistic uncertainty and considers its worst effect when performing resource allocation. Different small cell networks is considered in [18], and there are tight interference constraints on PU. Power allocation along with relay selection schemes is optimized especially considering different channel uncertainty models in [18]. It is worth noting that [12–19] consider the channel uncertainty without the interference between massive SCs. Son et al. [20] study the power allocation problem via the waterfilling algorithm. Furthermore, Son et al. [20] consider neither a great deal of SCs nor the interference constraints between SCs in the system. However, to the best of our knowledge, power allocation involving both channel uncertainty and mutual interference between massive SCs has not been addressed in the existing literature, which is the motivation of this work.
Differently, this paper investigates the problem of the robust power allocation for massive connections underlaying CRNs, where channel uncertainty and interference constraints are jointly considered. It is noted that the problem of interest is a nonconvex and nonlinear program (NCNLP), which is very difficult to solve. Specifically, to tackle with the practical problem inherent in power control with massive SCs, this paper makes the following contributions:

Formulate an optimization problem which takes the SC’s mutual interference constraints and channel uncertainty between the STx and PRx into account, analyze the control of STx’s peak transmitpower constraints and adopt average interference to the probabilistic model for the QoS of the PU.

Convert the original objective function and the outage probability constraint into a form which is easy to handle by some mathematical transformation and derive the analytical expressions via the convex optimization.

Develop an efficient algorithm to obtain the nearoptimal solution based on the interior point method under the strict interference constraint of the PU. Furthermore, the Newton algorithm is set for searching viable power value because it uses the second derivative information in the calculation of lowering direction and has a faster rate of decline.

Conduct the indepth simulations under various parameter configurations, such as outage probability and the number of SCs, which demonstrate that our proposed robust power allocation scheme can achieve higher performance in comparison to the stateoftheart work in the literature.
The remainder of this paper is organized as follows. Section 2 presents our system model, and the optimization problem is formulated in Section 3, along with formulation analysis as well as problem transformation. The proposed power allocation algorithm is derived in Section 4. The results of extensive numerical simulations and the performance evaluation are presented in Section 5, followed by conclusions in Section 6.
2 System model
Consider a CRN as shown in Fig. 1. There is a PU and massive SCs which utilize the same spectrum as the PU in the underlay mode. We denote \( \mathcal {N}= \left \{ {1,2, \cdots,N} \right \}\) as the set of all SCs. A connection consists of a STx and a secondary receiver (SRx) and so does the PU. The SCs are supposed to be randomly distributed around the PU in the CRN. In addition, let p _{PU} and p _{ i } represent the transmit power of the PU and the ith SC, respectively. Also, let p _{max} denote the maximum transmit power of the STx, I _{max} the maximum interference allowed by the SC, and \(I_{_{\max }}^{p}\) the maximum interference allowed by the PU. Moreover, vector p collects {p _{ i }}.
The model of the channel propagation is made up of two main factors, i.e., large scale path loss and small scale multipath fading. First and foremost, the power received by the receiver is described as follows:
where P _{R} and P _{T} are the power of receiver and transmitter, respectively. m _{ r x,t x } is the large scale path loss from a transmitter to its receiver and β is constant. h _{ r x,t x } is the small scale multipath fading. Since we consider the spatial location distribution of SCs, so the large scale path loss is applied. Due to the multipath effect, so we take the small scale multipath fading into account. Then, we formulate the following expression to describe the large scale path loss from a transmitter to its receiver and it is the dB model of m _{ r x,t x } [21]:
where α denotes the link loss coefficient which depends on the specific environment, d is the distance in meters between the transmitter and the receiver, f is the center frequency of transmitted signal and its unit is MHz, l _{T} and l _{R} represent the height of the STx and the SRx in meters, respectively. It is hard to establish the model of the small scale multipath fading by rule and line. Generally speaking, we can obtain the similar effect qualitatively via certain probability distribution, such as Rayleigh distribution and Rice distribution [21]. It is assumed that the channel multipath fading follows Rayleigh distribution, so it is modeled as
where h _{1} and h _{2} are two independent Gaussian variables which follow the distribution of N∼(0,δ ^{2}).
The channel gain g _{PU}≥0 between the primary transmitter (PTx) and PRx is assumed to have been easily acquired by some conventional channel estimation techniques [22]. Similarly, the channel gain g _{ i,j } between the ith STx and the jth SRx is also known accurately, i.e., the STx has perfect channel state information [20]. Because SC and PU rarely have any cooperation during the process of their transmissions, the channel gain \(g_{i}^{\text {PU}}\) between them can be hardly estimated precisely unlike the channel gain between SCs.
As mentioned above, the signaltonoise ratio (SNR) of the SCRx without any interference is
where \({\sigma _{0}^{2}}\) is the power of the noise. Since we consider all the SCs sharing the same channel with the PU in the paper, hence, we can get the signaltointerferenceplusnoise ratio (SINR) of the SRx as follows:
where p _{ i } g _{ i,i } is the received signal power of the SCRx and \({\sum \nolimits }_{j = 1,j \ne i}^{N} {{p_{j}}{g_{j,i}}}\) represents the mutual interference of SCs. The network throughput capacity of all SCs is described as the following:
As to the constraints, there are basically three types on the power allocation. One of them is that any transmit power of the STx is limited to the power budget [20]:
Due to the mutual interference, the secondary ones are the interference constraints with respect to the SCs, which are formulated as follows:
The final constraint concentrates on the protection for the PU. We assume that the PU has an average interference power tolerable capability. In other words, the SCs can coexist with the PU as long as the average interference power from all the STxs is limited below than a certain threshold [20]. It is necessary to explain the “average”. Because the interference from SCs is timevarying, we cannot guarantee that there will be always weak interference. If so, it is likely that there is some strong interference from several certain STxs. Thus, the weak one can make compensation for the PU’s performance in average. We define Pr[.] as the outage probability that the interference to the PU is more than a threshold value. We can write it as the following expression:
where the channel gain \(g_{i}^{\text {PU}}\) is an independent and identically distributed exponential random variable with mean θ and ε is the outage probability.
Besides, in this CRN system, there is the interference from the PTx to SRx. Set \({g_{\text {PU}}^{i}}\) as the channel gain between the PTx and SRx, which is perfectly known. Figure 2 reflects the system performance including the interference from the PTx to SRx. In the scenario of this paper, we assume that the PTx is far away from SCs and there is massive mutual interference between massive SCs which is much more than the interference from PTx. Based on the above phenomenon and explanations, we ignore the interference from the PTx when focusing on the optimization of the SCs’ capacity.
As we noted above, the optimization objective is to maximize the capacity of the SCs via determining the allocation of the optimal transmit power vector p={p _{1},p _{2},p _{3},⋯p _{ N }} of STxs, namely:
In (10), the goal of the optimal problem \((\mathcal {P})\) is to find the optimal power allocation method to maximize the total throughput capacity of the system. For the sake of the description convenience, we regard \((\mathcal {P})\) as the original problem. Among the three constraints, the first one is to restrict the transmit power of STx, the second one ensures the coexistence of the communication between the SCs, and the final one focuses on the protection for the PU. However, since the objective function is nonlinear and it is not even convex, it will become very complicated if we directly solve the optimization problem of the above form. Additionally, the mutual influence actually exists between multiple variables. Therefore, not only does the problem become tricky but also the complexity will rise steeply as the number of the variables increases. Paper [23, 24] suggest that a large number of iterations is needed in order to tackle with this problem. Because of the structure of the function, this problem cannot directly use the methods proposed by [25, 26]. As a result, intractability and unavailability of the uncertain channel gain along with SCs’ interference make the nonlinear and nonconvex expression mathematically difficult to handle. In addition, there is not yet any satisfactory solution to the open issue so far. In the following part, we try to introduce a feasible way to tackle with the difficulty, which takes advantage of the convex optimization theory.
3 Problem transformation
We can see that the problem (10) is an optimization problem with some constraints. The convex optimization is a powerful tool to solve these kinds of problems. A standard form of convex optimization problems is formulated as follows:
where all of f _{0},⋯,f _{ q } are convex functions, f _{ i }(x) is the constraint of inequality, and \({h_{j}}(x) = {a_{j}^{T}}x  {b_{j}}\) is the constraint of equality [27]. But as it is shown in problem (10), neither optimization objective nor the constraints is convex function. The convex optimization cannot be used straightly. So, we first investigate the primal objective function and approximate it with a series of convex ones.
The objective function can be rewritten as the difference of two concave functions, u and w:
where both u(p) and w(p) are concave functions:
Then, we work out the derivation of w(p) about p _{ i }:
where \({e_{j,i}} = \left \{ \begin {array}{l} 0,j = i\\ \frac {g_{j,i}}{\ln 2},j \ne i \end {array} \right.\). The equation above is represented as a column vector \(\nabla w(\mathbf {p}) = \left \{ {{\tau _{i}}} \right \} = \left \{ {\frac {{\partial w(\mathbf {p})}}{{\partial {p_{i}}}}} \right \}\). We can approximately denote w(p) by the firstorder Taylor series expansion w(p ^{(k)})+〈∇w(p ^{(k)}),p−p ^{(k)}〉 of w(p) around the given any viable solution \(\left \{ {{p_{i}^{k}}} \right \}\). It is important to note that the superscript k represents the number of iterations. As a result, a conservative surrogate for the objective function is formulated as follows:
Since w(p) is concave function as mentioned previously, it can be easily captured as follows:
If {p _{ i }} is feasible and −f _{0}(p ^{(k+1)})≥−f _{0}(p ^{(k)}), the following formulation can be acquired:
It is can be seen that −f _{0}(p ^{(k)}) provides a lower bound. Maximizing function (12) is equivalent to maximizing the initial function. Through the above analysis, the original problem is nonconvex, but we can approximate it with convex functions.
Here, we analyze the characteristics of the constraints. Considering the fact that CSI can be robustly estimated between SCs, C1 is a simple linear constraint, so is C2. They can be equivalently written as:
Nevertheless, for constraint C3, the uncertainty of the channel between STx and PRx makes C3 intractable, i.e., C3 has no idea to satisfy the requirement of a convex function. As a result, we take different attitudes towards the three constraints. For the first two, we can acquire the goal through above steps (17). As to C3, we have to study its transformation as the following description.
Let \({X_{i}} = {p_{i}}g_{i}^{\text {PU}}\), which are independently exponential distributed with mean p _{ i } θ. Denote \(X = {\sum \nolimits }_{i} {{X_{i}}}\) as the sum of all the random variables. Therefore, we can change the original constraint into the following probability form:
How to test and verify the constraint (19)? The key lies in the distribution of X. To determine the distribution explicitly, we use Gaussian approximation based on the following Lemma 1 [28].
Lemma 1.
The Lyapunov’s central limit theorem (CLT): If X _{1},X _{2},…,X _{ n } are independent of each other with mean E(X _{ k })=μ _{ k } and variance \(D\left ({{X_{k}}} \right) = {\sigma _{k}^{2}} > 0\),we can obtain that
and
where \({B_{n}^{2}} = \sum \limits _{k = 1}^{n} {{\sigma _{k}^{2}}}\).
Due to the above Lemma 1, the Lyapunovcondition should be satisfied as follows to apply the Lyapunov’s (CLT):
where r _{ i } is the thirdorder center distance of X _{ i }, i.e., E[(X _{ i }−m _{ i })^{3}] and m _{ i } and \({\sigma _{i}^{2}}\) are the mean and variance of the exponential distributed random variable X _{ i }, respectively. We can easily check this condition [20].
In general, for massive connections, we can regard X as a normally distributed random variable whose mean is m and variance is σ ^{2} approximately
Therefore, the following constraint is a conservative surrogate for (19):
where F _{ N }(·) is the cumulative distribution function (CDF) of a normal distribution with mean m and variance σ ^{2} and \(\text {erfc}(z) = \frac {2}{{\sqrt \pi }}\int _{z}^{\infty } {{e^{ {t^{2}}}}dt}\). For (24), we assume that \({f_{3}}\left (\mathbf {p} \right) = \frac {1}{2}\text {erfc}(\frac {{I_{\max }^{p}  m}}{{\sqrt 2 \sigma }})  \varepsilon \). It is obvious that it is not a standard convex function at all which needs separate treatment. Inspired by the scheme proposed in [20], once a power allocation is given from the first two constraints, we can check whether it satisfies the outage constraint (24) or not.
In a word, we can easily confirm that \((\mathcal {P})\) is equivalent to
Since C3 is not a standard convex function at all as abovementioned, it does not satisfy the standard form of convex optimization problems (11). So we could not deal with the problem \((\mathcal {P}1)\) directly. In order to obtain a feasible solution, we divide the original problem \((\mathcal {P}1)\) into two parts to solve in this paper:
and
If we acquire an optimal solution p from \((\mathcal {SP}1)\), we will examine whether it meets or not by substituting into \((\mathcal {SP}2)\). In another word, the input of \((\mathcal {SP}2)\) is the output of \((\mathcal {SP}1)\).
For the first part \((\mathcal {SP}1)\), it is suitable to use the above convex optimization to deal with. The Lagrangian function of the problem \((\mathcal {SP}1)\) is given by
where λ and ν are the nonnegative dual variables associated with the corresponding constraints C1 and C2, respectively. The Lagrangian dual function is defined as follows:
If there is no lower bound of the Lagrangian, the dual function value is −∞.
Next, we carry on the feasibility analysis of the part. Problem (26) is feasible if and only if the following linear programming (LP) is feasible:
The corresponding dual function is given by
where λ ^{′}=[λ ^{′} _{1},⋯,λ ^{′} _{ N }]≥0 and ν ^{′}=[v ^{′} _{1},⋯,v ^{′} _{ N }]≥0 consist of the Lagrange multipliers associated with the N connections constraints. The dual function of problem (S P1^{′}) is then given by
Theorem 1.
For a given I _{max}>0,p _{max}>0, problem \((\mathcal {SP}1')\) is infeasible if and only if there exists λ ^{′}≥0,ν ^{′}≥0 such that G ^{′}(λ ^{′},ν ^{′})>0; otherwise, \((\mathcal {SP}1')\) is feasible.
Proof.
See Appendix for details.
For the second part \((\mathcal {SP}2)\), we can check whether the optimal value p t ^{∗} obtained by \((\mathcal {SP}1)\) satisfies the outage constraint (27) or not. If it does, we think it is the optimal solution to \(\mathcal {P}1\); otherwise, all the transmit power decreases by a step γ and we search for the optimal one again.
Since the original complex problem is transformed into a more tractable form, we obtain the nearoptimal solution along with acceptable computational complexity. Detailed algorithm design will be provided in the following section. □
4 Power allocation algorithm
In the above section, we transfer the constraint C3 into a tractable form and approximate the original problem with convex functions. As is mentioned, once a power allocation is given, we can check whether it satisfies the outage constraint C3 or not. So our power allocation algorithm consists of two steps. Firstly, we apply the convex optimization to getting over the problem \((\mathcal {SP}1)\) based on the interior method. Note that the optimal solution must satisfy the constraints C1 and C2. Then, we should check the optimal solution whether satisfies the outage constraint C3 or not. If it does, the optimal solution of problem \((\mathcal {SP}1)\) is also the optimal solution of the original problem; otherwise, all the transmit power decreases by a step γ until the constraint C3 is satisfied.
The duality properties should be analyzed first of all, which can demonstrate the existence of the optimum solution. We formulate the optimal value of the Lagrange dual problem as follows:
It is assumed that o p t ^{∗} is the optimal value of the problem \((\mathcal {SP}1)\). We denote the optimal duality gap of the primal problem by the difference o p t ^{∗}−d ^{∗}. If the strong duality is established, the optimal duality gap will hold zero [29]. In particular, \((\mathcal {SP}1)\) is convex and satisfies Slater’s condition [27]: there exists any valid p and this can make the following expressions hold,
where the inequality constraints must meet the condition strictly. Since \((\mathcal {SP}1)\) is convex as is mentioned above and we can learn from Slater’s theorem that the Lagrangian dual function (29) satisfies the strong duality, so it also satisfies the following important theorem [27] which is its sufficient and necessary condition.
Lemma 2.
If both an objective function and its constraints of a convex optimization problem are differentiable and satisfy Slater’s condition, we can capture that the KarushKuhnTucker (KKT) [27] conditions are the sufficient and necessary conditions for obtaining the optimality of the solution:
The above formulation is only one of the KKT conditions. According to the Lemma 2 mentioned above, we can ensure that the optimal duality gap is zero. So when p ^{∗} is optimal, we can attain the dual optimum as well as λ ^{∗},ν ^{∗}. Nevertheless, we can hardly tackle with the KKT conditions analytically of the intractable problem in this paper. As a result, we introduce the interior point method to deal with the problem together with the KKT conditions.
It can be seen that the nonconvex optimization problem \((\mathcal {P})\) has already been approximated by \((\mathcal {P}1)\) in which only the third constraint is not convex. Then, we research for the existence of an optimal solution. Moreover, the optimality conditions (KKT conditions) are captured. In this section, we attempt to develop a quick and effective iterative algorithm. The barrier method is introduced to search for the global optimal solution throughout the previous analysis. As is well known, the barrier method is a representative technique of the class of interior point methods. It usually contains a logarithmic barrier function and the Newton method for minimization without constraints [21]. The advantage of the barrier method is that it is simple to implement and it can surely outperform other methods in performance.
Newton algorithm is a universal descent method, where the iteration consists of damping Newton stage and quadratic convergence stage, i.e., pure Newton stage. The trail of steps is the direction of searching in Newton algorithm. The backtracking line search is applied to the iteration, which is a kind of nonaccurate line search approach. Newton algorithm plays a role as the internal iteration of the interior point method. In terms of searching the feasible solution, it works simply and effectively [27].
Next, we have formulated the following approximation of the inequality:
where \(\phi \left (\mathbf {p} \right) =  \sum \limits _{i = 1}^{N} {\log \left ({{f_{1,i}}\left (\mathbf {p} \right)  {f_{2,i}}\left (\mathbf {p}\right)}\right)} \) is called the logarithmic barrier function of problem \((\mathcal {SP}1)\). Because −(1/t) log(−u) is convex, differentiable, and increasing when u<0, Newton algorithm can be applied to searching for the minimum of (35) within p _{ i }∈[0,p _{max}]. Why do we select Newton algorithm? As is mentioned above, it uses the second derivation information when computing the descent direction. It exhibits the quite quick convergence rates. As [29] suggests, the approximation quality will improve apparently as the parameter t grows.
Finally, the overall procedure for solving the optimization problem is presented in the following algorithm.
In order to verify its effectiveness, the proposed algorithm is compared with the algorithm in paper [20] and this will be discussed further with the simulation results.
5 Performance evaluation
The proposed power allocation algorithm is verified via the following numerical tests. In Table 1, we list the system parameters used in the simulations.
The presented results are obtained by simulating 1000 independent trials and then taking the expected value. To benchmark performance of the proposed nearoptimal scheme, a simple suboptimal algorithm in paper [20] is considered. In paper [20], Son et al. investigate power allocation algorithms for OFDMbased cognitive radio systems, where the intrasystem channel state information (CSI) of the SC is perfectly known and the intersystem CSI is only partially available to the STx. They develop a suboptimal power allocation algorithm, which repeatedly solves a subproblem having only a transmitpower constraint and then adjusts the available transmit power until the desired outage probability is achieved. In this paper, we regard this algorithm as a comparison with our proposed algorithm. More information can be referred to paper [20].
Figure 3 illustrates the simulation scenario for the sum throughput under the different algorithms where γ=0.2, ε=0.05. It is assumed that there are 50 SCs. We can see that the proposed algorithm can acquire higher throughput than the algorithm proposed in [20]. When each STx uses the maximum transmit power, the sum throughput is highest, but the strong interference on the PU limits the transmit power. On the other hand, from the tendency of the curve in Fig. 3, it can be observed that the sum throughput derived from our proposed scheme has always outperformed the other one derived from paper [20]. This is due to the algorithm proposed in [20], which is based on the binary search, causes great waste of power resource. Hence, the proposed algorithm can perform better. In our paper, when the number of SUs becomes large, the corresponding iteration will be more. Additionally, −f _{0}(p) as the approximate lower bound of the best solution updates itself after each iteration. In this case, −f _{0}(p) will become more and more close to the optimal solution. Therefore, our proposed algorithm is able to obtain the better effect of the system performance.
Figure 4 compares the spectral efficiency in the cases of different step values, where the number of SCs is assumed 50. A few interesting observations can be obtained. It is shown that the rapidity of the convergence correlates closely with the value of γ. That is to say, the convergence of the sum throughput turns faster as γ becomes larger. Moreover, the faster the convergence is, the lower the accuracy is and the deviation increases when the accuracy of the transmit power becomes lower. Therefore, the value of γ is better to the optimal transmitpower if it is smaller. Notably, γ should be set within [0.05,0.25] through a lot of tests and trials. In Fig. 5, γ is set as 0.1. We examine the sum throughput by varying the outage probability ε. The number of SCs still remains 50. There are some conclusions that can be drawn from Fig. 5 including that the throughput improves as ε grows larger, and the outage probability and the interference threshold have the same impact on the sum throughput.
Figure 6 discloses the average throughput of each SC and the sum throughput in terms of different numbers of SCs. In this figure, the left vertical axis represents the average throughput of each SC and the right one is the sum throughput. As can be seen obviously, with the number of SCs increasing, the average throughput is decreasing and the sum throughput rises first and then gradually falls. When there are about 160 SCs, the up trend of the sum throughput becomes gentle since the interference constraints between SCs has offset the rise in throughput. When there are about 210 SCs, the sum throughput declines sharply. This is because when the number of SCs increases seriously, the interference between SCs is also increasing seriously, even more than the throughput. It is also observed that both of the average throughput of each SC and the sum throughput under ε=0.01 are extremely close to those under ε=0.2. In a word, the constraint of the PU becomes more and more relaxed with the number of the users increasing. On the one hand, if the number of SCs is large, the interference constraints of SCs play a dominant role in the problem. On the other hand, when there are a small number of SCs, however, the interference limitation of PU would become principal.
6 Conclusions
In this paper, the robust power allocation scheme solved the problem on how to maximize the throughput capacity of SCs on the condition that the quality of service of the PU would be ensured. This problem was formulated for a CRN with massive connections. Due to the uncertainty present in the channel between the STx and the PRx, a robust interference constraint with probability was imposed to protect the PU system, which utilized the convex optimization theory. In this paper, we also introduced the iterated algorithm including Newton algorithm based on the interior point method and compared it with the algorithm proposed in [20]. We evaluated the spectral efficiency through extensive simulations and showed that the SCs can achieve higher performance in the proposed algorithm than that in the algorithm showed in [20]. As future work, a subject of extension to more general channel models including correlation or feedback delay might be researched further.
7 Appendix
7.1 The proof of Theorem 1
We first prove the “if” part. If p is a feasible solution given I _{max}>0,p _{max}>0, then for any λ ^{′}≥0,ν ^{′}≥0 it follows that
and thus \(\mathop {\max }\limits _{\mathbf {\lambda },\mathbf {\nu }} G'\left ({\mathbf {\lambda '},\mathbf {\nu '}} \right) \le 0\), which contradicts with the given assumption that there exists an λ ^{′}≥0,ν ^{′}≥0 such that G ^{′}(λ ^{′},ν ^{′})>0. The part is thus proved.
Then, we prove the “only if” part of Theorem 1 by showing that its transposition is true. Suppose that problem \((\mathcal {SP}1')\) is feasible and there exists λ ^{′}≥0,ν ^{′}≥0 such that G ^{′}(λ ^{′},ν ^{′})>0. However, since \((\mathcal {SP}1')\) is assumed to be feasible and λ ^{′}≥0,ν ^{′}≥0, there exists a solution such that it can satisfy all the constraints:
We thus have G ^{′}(λ ^{′},ν ^{′})≤L ^{′}(p,λ ^{′},ν ^{′})≤0.
This contradicts G ^{′}(λ ^{′},ν ^{′})>0, and thus, problem \((\mathcal {SP}1')\) is feasible if G ^{′}(λ ^{′},ν ^{′})<0. The “only if” part is thus proved.
Combining the above proofs of both “if” and “only if” parts, Theorem 1 thus follows.
References
Y Lien, C Chen, Y Lin, Toward ubiquitous massive accesses in 3GPP machinetomachine communications. IEEE Commun. Mag. 49(4), 66–74 (2011).
G Ding, J Wang, Q Wu, Y Yao, F Song, TA Tsiftsis, Cellularbasestation assisted devicetodevice communications in tv white space. IEEE J. Sel. Areas Commun. 34(1), 107–121 (2016).
M Song, C Xin, Y Zhao, X Cheng, Dynamic spectrum access: from cognitive radio to network radio. IEEE Trans. Wireless Commun. 19(1), 23–29 (2012).
A Ghasemi, ES Sousa, Fundamental limits of spectrumsharing in fading environments, vol. 6, (2007).
L Musavian, S Aissa, Ergodic and outage capacities of spectrumsharing systems in fading channels (IEEE GLOBECOM, Washington, America, 2007).
X Chen, T Jing, Y Huo, W Li, X Cheng, T Chen. Achievable transmission capacity of cognitive radio network with cooperative relaying (IEEE CROWNCOMStockholm, Sweden,2012), pp. 1–6.
AT Hoang, YC Liang. A twophase channel and power allocation scheme for cognitive radio networks. IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications (Helsinki, Finland,2006), pp. 1–5.
K Seong, M mohseni, JM Cioffi. Optimal resource allocation for OFDMA downlink systems (IEEE International Symposium on Information TheorySeattle, America, 2006), pp. 1394–1398.
G Li, H Liu, Downlink radio resource allocation for multicell OFDMA system. IEEE Trans. Wireless Commun. 5(12), 3451–3459 (2006).
H Zhu, Radio resource allocation for OFDMA systems in high speed environments. IEEE J. Sel. Areas Commun. 30(4), 748–759 (2012).
O EI Ferkouss, W Ajib, Game theory based resource allocation for cognitive radio networks. IEEE Global Commun. Conf, 1174–1179 (2012).
G Zheng, KK Wong, B Ottersten, Robust cognitive beamforming with bounded channel uncertainties. IEEE Trans. Signal Process. 57(12), 4871–1881 (2009).
E Dall’Anese, SJ Kim, GB Giannakis, S Pupolin, Power control for cognitive radio networks under channel uncertainty. IEEE Trans. Wireless Commun. 10(10), 3541–3551 (2011).
IC Wong, BL Evans, Optimal resource allocation in the OFDMA downlink with imperfect channel knowledge. IEEE Trans. Wireless Commun. 57(1), 232–241 (2009).
R Aggarwal, M Assaad, CE Koksal, P Schniter, Joint scheduling and resource allocation in the OFDMA downlink: utility maximization under imperfect channelstate information. IEEE Trans. Signal Process. 59(11), 5589–5604 (2011).
N Mokari, S Parsaeefard, H Saeedi, P Azmi, E Hossain, Secure robust ergodic uplink resource allocation in relayassisted cognitive radio networks. IEEE Trans. Signal Process. 63(2), 291–304 (2015).
X Ma, F Li, J Ilow, Z Chen. Robust resource allocation for bidirectional decodeandforward OFDM relaying systems with network coding and imperfect CSI. (IEEE Vehicular Technology ConferenceSeoul, Korea, 2015), pp. 1–5.
S Milana, A Fregolent, A Culla, Robust resource optimization for cooperative cognitive radio networks with imperfect CSI. IEEE Trans. Wireless Commun. 14(2), 907–920 (2015).
JB Wang, Q Su, J Wang, M Feng, Imperfect CSIbased joint resource allocation in multirelay OFDMA networks. IEEE Trans. Vehicular technology. 63(8), 3806–3817 (2014).
K Son, CJ Bang, C Song, KS Dan, Power allocation for OFDMbased cognitive radio systems under outage constraints. IEEE Intl. Conf. Commun. 29(16), 1–5 (2010).
Z Xue, L Shen, GR Ding, QH Wu, Geolocation spectrum database assisted optimal power allocation: devicetodevice communications in tv white space. KSII Trans. Internet Inf. Syst. 12(9), 4837–4855 (2015).
CK Wen, S Jin, KK Wong, JC Chen, P Ting, Channel estimation for massive MIMO using gaussianmixture bayesian learning. IEEE Trans. Wireless Commun. 14(3), 1356–1368 (2015).
JW Huang, RA Berry, ML Honig, Distributed interference compensation for wireless networks. IEEE J. Sel. Areas Commun. 24(5), 1074–1084 (2006).
N Vucic, S Shi, M Schubert. DC programming approach for resource allocation in wireless networks, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) 2010 Proceedings of the 8th International Symposium on (Avignon, France, 2010), pp. 380–386.
W Yu, R Lui, Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Wireless Commun. 54(7), 1310–1322 (2006).
GR Ding, Wu QH, JL Wang, Sensing confidence levelbased joint spectrum and power allocation in cognitive radio networks. Wireless Pers. Commun. 72(1), 283–298 (2013).
B Stephen, V Lieven, Convex optimization (Cambridge University Press, Cambridge, 2009).
BV Gnedenko, AN Kolmogorov, Limit distributions for sums of independent random variables.reading (AddisonWesley, America, 1954).
H Hindi. A tutorial on convex optimization II: duality and interior point methods. (American Control ConferenceMinneapolis, America, 2006), pp. 686–696.
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China under Grant No. 61501510 and No. 61301160, and Natural Science Foundation of Jiangsu Province under Grant No. BK20150717, and Jiangsu Planned Projects for Postdoctoral Research Funds.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ information
Guoru Ding is with National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China, and also with College of Communications Engineering, PLA University of Science and Technology, Yudao Street, 210007 Nanjing, China. The other authors are with College of Communications Engineering, PLA University of Science and Technology, Yudao Street, 210007 Nanjing, China.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Wang, L., Ren, G., Chen, J. et al. Robust power allocation for massive connections underlaying cognitive radio networks with channel uncertainty. J Wireless Com Network 2016, 145 (2016). https://doi.org/10.1186/s1363801606420
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801606420