 Research
 Open Access
Resource allocation for OFDMbased multiuser cooperative underlay cognitive systems
 Marwa Chami^{1}Email authorView ORCID ID profile,
 Mylene Pischella^{1} and
 Didier Le Ruyet^{1}
https://doi.org/10.1186/s1363801709584
© The Author(s) 2017
 Received: 9 October 2016
 Accepted: 15 October 2017
 Published: 6 November 2017
Abstract
This paper investigates the resource allocation problem for a multiuser underlay cognitive system where the secondary system is allowed to transmit and cooperate with the primary system. In this scenario, the secondary users are subject to two main constraints in the presence of the primary user: their total power budget and the allowable interference threshold at the primary receiver. Power and subcarrier allocation problems are detailed in order to maximize the system sum rate. In this work, we highlight the benefits of the proposed multiuser adaptive algorithm which encompasses three phases. The first step includes the adaptive selection of the decoding strategy at the secondary receiver which is either treating interference as noise or performing successive interference cancelation or superposition coding. The second step describes the subcarrier allocation among the different users. Finally, the third step details the optimal distribution of the available power budget on the users. The problem is first treated assuming perfect channel state information (CSI). The simulation results show that our proposed scheme achieves higher secondary and sum rates compared to existing approaches with perfect CSI. The robustness of the proposed algorithm when the secondary user has only partial information about channel gains is also derived.
Keywords
 Cognitive radio
 Underlay
 Optimization
 Maximum sum rate
 OFDM
 Multiuser
 Imperfect CSI
1 Introduction
The idea of cognitive radios (CRs), which is a particular extension of softwaredefined radio that employs modelbased reasoning about the channel, users, and communications context [1], was born out of the wireless spectrum’s limitation. Advanced radio and signal processing technology along with novel spectrum allocation policies are used to support new wireless users operating in the existing spectrum without degrading the performance of licensed users called primary users (PUs) [2]. More specifically, the CR technology permits an unlicensed user called a secondary user (SU) to coexist with the PU without degrading his performance. In a CR system, the SUs have the ability to sense and adapt to their environment in order to detect possible frequency holes in the wireless spectrum which therefore increase the spectral efficiency. Consequently, the CR technology is very appealing since it provides a lowcost and highly flexible alternative to the classic singlefrequency band and singleprotocol wireless communication [3].
There exist three types of CR systems: interweave, underlay, and overlay cognitive radio. In an interweave scenario, the SUs adaptively utilize the spectrum band whenever it is not used by the PU [4]. In the underlay case, the SUs are allowed to coexist with the PU provided that the interference caused to the PU is below a predefined threshold [4]. In the latter category, the secondary system has the knowledge of the primary system codebook, channel gains, and transmitted information. A part of the SUs’ power can be used to retransmit the PU message so that the SUs are able to maintain or improve the primary rate while achieving their own communication goals [4]. Both overlay and underlay scenarios are compared in [5].
Multicarrier transmissions such as orthogonal frequencydivision multiplexing (OFDM) are largely used for CR networks due to their flexibility in allocating resources among SUs [6]. Adaptive resource allocation for the OFDM systems has been studied extensively during the past two decades. A comprehensive survey can be found in [7] and references therein. Moreover, resource allocation for OFDMbased CR networks has attracted much attention recently. An overview of the stateoftheart research results can be found in [8]. This issue has been studied for both singleuser and multiuser cases. For the singleuser case, optimal and suboptimal power allocation schemes were proposed to maximize the sum capacity of the CR system under the interference constraints of the PUs in [9]. In [10], a lowcomplexity optimal power allocation algorithm was derived by exploiting the structure of the considered optimization problem. A greedy maxmin algorithm was proposed to maximize the throughput of the CR system with a given power budget in [11]. In [12], the authors aimed to maximize the CR network throughput under interference limit and total power budget constraints. The optimal power allocation to achieve ergodic capacity and outage capacity in fading channel was derived in [13]. In [14], the authors maximized the secondary achievable rate under a new criterion referred to as rateloss constraint. The authors in [15] investigated the problem of random subcarrier allocation in OFDMbased CR networks without any spectrumsensing information at the SU. The SU’s transmit power was adjusted in order to maintain the interference on the primary receiver under a predefined threshold. The downlink resource allocation problem in a spectrumsharing environment is studied in [16]. A time averaging is introduced to approximate the interference constraints for both short and long terms. In [17], the authors have characterized a capacity region of a CR system assuming that the secondary transmitter has side information about the primary transmission. They supposed that the SU has to satisfy two conditions in order to be able to coexist with the PU: (i) no interference is accepted at the primary system and (ii) the primary receiver is unaware of the presence of the cognitive system.
In [18], a heuristic scheme is proposed where the secondary receiver either treats the interference as noise or uses successive interference cancelation (SIC) or is switched off. The achievable rate is studied under the constraint that (i) an interference level is allowable on the PU and (ii) the primary encoderdecoder pair is unaware of the presence of cognitive radio. We have extended this work in [19] by proposing a new algorithm where the cognitive user can also use superposition coding (SC) [20] under certain conditions. The same problem was investigated in [21] by optimally allocating the SU power using gradient descent algorithm.
Resource allocation for a multiuser OFDMbased CR system was investigated in [22–27]. The authors in [22] made use of subcarrier allocation to improve the performance of cognitive networks by exploiting the socalled multiuser interference diversity. They considered that the SU with the largest achievable receiver signal to noise ratio is selected among all the SUs. In [23], a lowcomplexity algorithm is developed to maximize the sum capacity of a CR system with proportional rate constraints. The proposed algorithm exhibits a tradeoff between capacity and fairness by jointly considering channel gain and the interference to the PUs. The multiuser diversity in an interweave scenario was studied in [24]. In [25], two fast resource allocation algorithms were derived for both realtime and nonrealtime services in multiuser OFDMbased CR networks. In [26], the sum capacity of a multiuser OFDMbased CR system was maximized while satisfying the SUs’ proportional rate requirements. The adaptive resource allocation problem in multiuser OFDMbased CR networks with imperfect spectrum sensing was investigated in [27]. The problem was addressed in two steps: subcarrier allocation and then power allocation for subcarriers.
Most of the previous cited works considered perfect CSI at the secondary transmitter. However, obtaining perfect knowledge about the channel gains at the secondary user is very difficult to implement in practice. The impact of imperfect CSI was investigated in [28–30] with uncertainty, quantization, or estimation errors. In [31], Suraweera et al. investigated the impact of imperfect CSI of the SUPU link on the SU mean capacity, considering the effect of CSI quantization with a finite number of quantization levels. The ergodic capacity maximization problem with quantized information about CSI available at the SU through a limited feedback link was studied in [28], while optimum power strategy and ergodic capacity were derived under outage constraints in [29]. The impact of noisy CSI on spectral efficiency of multiuser multicarrier CRs was considered in [30], where novel interference management schemes were derived based on different averagecase and worstcase models of channel estimation error.

A heuristic approach is proposed for a multiuser underlay cognitive radio system. This heuristic is designed for the perfect CSI scenario by considering a cooperative underlay cognitive system. A complete resource allocation problem is addressed in three steps:

The decoding strategies are identified per subcarrier for each user according to several conditions that will be defined later.

A subcarrier allocation algorithm is described to choose the active subcarriers per user. Only one SU is activated per subcarrier following a criterion derived from the singleuser algorithm.

An optimization problem is then formulated, independently for each user, in order to maximize the secondary rate and the sum rate of the system under the constraint of power budget of each user and the maximum allowable interference on the PU.

Motivated by the alternating optimization method [33], we propose an approach that sequentially solves a feasibility problem using dual decomposition.


We identify several decoding strategy areas for different scenarios based on the mobile positions when two users exist in the secondary cell.

We investigate the same problem for two secondary users under the assumption that imperfect CSI on the links between both primary and secondary transmitters and the primary receiver is available at the secondary user. This study can be easily extended to more than two secondary users.
The rest of this paper is organized as follows. Section 2 describes the system model and gives an overview on the decoding strategies at the receivers. Section 3 explains the proposed algorithm to solve the resource allocation problem with perfect CSI. Section 4 investigates the problem when imperfect CSI is available at the SU. Section 5 evaluates the performance of the proposed algorithm with both perfect and imperfect CSI. Finally, Section 6 concludes the paper.
2 System model and problem formulation
2.1 System model
2.2 Problem formulation
where \(R_{s_{u_{[k]}}}\) denotes the SU achievable rate and \(\theta _{u}^{k}\) the subcarrier assignment parameter. Its explicit expression depends on the decoding strategies used by the SUs, and it will be given in the subsequent sections.
3 Resource allocation with perfect CSI
3.1 Description of the algorithm
Our proposed algorithm is executed alternatingly between the primary and the secondary systems. More specifically, given a starting power allocation P _{ p,0} and P _{ s,0}, the SUs apply a per subcarrier decoding strategy which depends on the primary and SUs’ power allocation obtained from the iteration n−1. Based on the applied decoding strategy, an achievable rate is computed for each SU on each subcarrier. Finally, the SU with the highest rate is activated within subcarrier k, and the SU power optimization problem is solved.
A summary of our proposed scheme is given in Algorithm 1, where at the nth iteration, \(\mathbf {P}_{i,n}=\left (P_{i,n}^{1}, \dots, P_{i,n}^{L}\right)^{T} \), with \(i=\left \{p,s_{u_{[k]}}\right \}\) and \(\mathbf {P}_{n} \in \left \{ \mathbf {P}_{p,n}, \mathbf {P}_{s_{u_{[k]}},n} \right \}\).
3.2 Decoding strategies and achievable rates at the secondary receiver
 1.Strategy 1: If \(P^{k}_{p,(n1)} = 0\), the secondary receiver decodes its message errorfree and the secondary rate is defined by$$ R_{s_{u_{[k]}},n}^{k} = \frac{B}{L} \log_{2} \left(1+ \frac{h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n}}{n_{0}} \right) $$(3)
In the rest of the paper, this strategy is called “interweave.”
 2.Strategy 2: If \({P^{k}_{p,(n1)}} \neq 0\) and \(h^{k}_{sp}^{2} < h^{k}_{ss_{u_{[k]}}}^{2}\), the interference to the SU is weak and is treated as noise. The secondary rate is given by$$ R_{s_{u_{[k]}},n}^{k} = \frac{B}{L} \log_{2} \left(1+ \frac{h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n}}{h^{k}_{sp}^{2} P^{k}_{p,n1}+n_{0}} \right) $$(4)
 3.Strategy 3: If \({P^{k}_{p,(n1)}} \neq 0\) and \(h^{k}_{sp}^{2} \geqslant h^{k}_{ss_{u_{[k]}}}^{2}\), the interference on the SU is strong. Therefore, if$$ a^{k} P_{{s_{u_{[k]}}}}^{k} \geq c^{k} $$(5)is verified, SIC can be applied [36], where$$\begin{array}{*{20}l} a^{k} &= \lefth_{sp}^{k}\right^{2} \lefth_{ps_{u_{[k]}}}^{k}\right^{2}  \lefth_{pp}^{k}\right^{2} \lefth_{ss_{u_{[k]}}}^{k}\right^{2}\\ c^{k} &= n_{0} \left(\lefth_{pp}^{k}\right^{2}  \lefth_{sp}^{k}\right^{2} \right) \end{array} $$In this case, the achievable secondary rate is$$ R_{s_{u_{[k]}},n}^{k} = \frac{B}{L} \log_{2} \left(1 + \frac{ h_{ss_{u_{[k]}}}^{k}^{2} P_{s_{u_{[k]}},n}^{k}}{n_{0}} \right) $$(6)
 4.Strategy 4: If \({P^{k}_{p,(n1)}} \neq 0\) and \(h^{k}_{sp}^{2} \geqslant h^{k}_{ss_{u_{[k]}}}^{2}\) but (5) is not verified, the ability to apply SC at the SU is tested subject to the validation of the following set of inequalities [19]$$\begin{array}{*{20}l} & \frac{{\left({{h^{k}_{pp}}^{2}  {h^{k}_{sp}}^{2}}\right)}}{{{h^{k}_{p{s_{u_{[k]}}}}}^{2} {h^{k}_{sp}}^{2}}} < \frac{P^{k}_{s_{u_{[k]}}}}{n_{0}} \end{array} $$(7a)$$\begin{array}{*{20}l} & P^{k}_{s_{u_{[k]}}} a^{k} < c^{k} \end{array} $$(7b)Thus, the secondary achievable rate can be given by [19]$$ \begin{aligned} R_{s_{u_{[k]}},n}^{k} &= \frac{B}{L} \log_{2} \left(1 + \frac{\alpha^{k} h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n}}{n_{0}} \right)\\ &+ \frac{B}{L} \log_{2} \left(1 + \frac{(1\alpha^{k}) h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n}}{\alpha^{k} h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n} + h^{k}_{sp}^{2} P^{k}_{p,n} + n_{0}} \right) \end{aligned} $$(8)with$$\begin{array}{*{20}l} \alpha^{k} =& \frac{\left(h^{k}_{sp}^{2}h^{k}_{pp}^{2}\right)n_{0} + h^{k}_{ps_{u_{[k]}}}^{2}h^{k}_{sp}^{2} P^{k}_{s_{u_{[k]}},n} }{h^{k}_{pp}^{2}h^{k}_{ss_{u_{[k]}}}^{2} P^{k}_{s_{u_{[k]}},n}} \\ \end{array} $$(9)
 5.
Strategy 5: If \({P^{k}_{p,(n1)}} \neq 0\) and \(h^{k}_{sp}^{2} \geqslant h^{k}_{ss_{u_{[k]}}}^{2}\) but neither SIC nor SC can be applied, the SU is turned off.
3.3 Subcarrier allocation
We start by assuming perfect PUPU and SUPU channel link knowledge available at the SU. We evaluate within each subcarrier the data rate that can be achieved in all the links between SUs and the secondary BS by assuming equal power allocation. The data rate \(\hat {R}^{k}_{{u_{[k]}}}\) is obtained depending on the decoding strategy applied in the subcarrier and by taking into account the power limitation due to the interference threshold. This rate is defined in Eqs. (10) to (13), where equal power allocation is also set in each subcarrier of the PU. For each subcarrier, the SU with the highest estimated rate is activated.
3.4 Power allocation optimization
We assume that optimization is performed at the BS (primary and secondary, respectively). Regarding secondary transmission, the decoding strategy and the power allocation is performed by the secondary BS based on the channel gains and on the transmit power of the previous iteration (n−1). They are then transmitted to the secondary user on a feedback channel (identifying which decoding strategy and which power level), so that the secondary user can use them at the next Transmission Time Interval (TTI) that includes several time slots. In order to implement this, we shall assume that the channel coherence time is large and that the fading values do not vary over at least two consecutive uplinkdownlink TTI. This assumption is valid for low to medium speeds of the mobile users.
Now, we investigate the power allocation problem for the SU. The objective is to optimally choose the power vector \(\mathbf {P}_{s_{u_{[k]}},n}\) in order to maximize the secondary rate, while satisfying the interference and the power constraints. If the interference constraints are not met, the subcarrier is switched off. The power control problem is solved iteratively. The decoding strategy and power allocation are run for each SU independently.
where \(R_{s,n} = \sum _{k \in \mathcal {S}_{2}} R_{s,n}^{k,\text {int}} + \sum _{k \in \mathcal {S}_{1} \cap \mathcal {S}_{3}} R_{s,n}^{k,\text {SIC}} + \sum _{k \in \mathcal {S}_{4}} R_{s,n}^{k,\text {SC}}\) and \(\mathcal {S}_{{u_{[k]}}}\) is the set of subcarriers allocated to user u _{[k]}.
Since the optimization problem is separable, it can be efficiently solved using the Lagrange dual decomposition method by decomposing the original problem into three subproblems, depending on the decoding strategies applied at the SU.
where the subtracted term in the objective function represents the total power constraint which is common for all subproblems. It can be verified that subproblem C _{int} and subproblem C _{SIC} are convex problems. On the other hand, \(R_{s_{u_{[k]}},n,2}^{k,\text {SC}}\) is not concave in \(P_{s_{u_{[k]}},n}^{k}\). Thus, \(R_{s_{u_{[k]}},n}^{k,\text {SC}}\) is not concave and the subproblem C _{SC} is not a convex problem. \(R_{s_{u_{[k]}},n,2}^{k,\text {SC}}\) can then be approximated using the first order Taylor approximation at a feasible point \(\overline {P_{s_{u_{[k]}},n}^{k}}\), in order to have a convex optimization problem. Once we obtain a convex problem for R _{ s,n } and since the optimization problem of R _{ p,n } is convex, the global problem can be handled by alternating optimization method [38].
Thus, an analytical solution of all subproblems can be obtained with the KarushKuhnTucker conditions [39].
which depends on the sign of a ^{ k } and c ^{ k }. (See also Table 1 in [19].)
Optimized values of \(P_{s_{u_{[k]}},n}^{k}\)
Conditions  Decoding strategies  \(P_{s_{u_{[k]}},n}^{k}\) 

\(P_{p,(n1)}^{k}= 0\) any value for a ^{ k } and c ^{ k }  Interweave  \(\left [\frac {1}{\mu _{s,n}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}\) 
\(P_{p,(n1)}^{k}\neq 0\) {a ^{ k }=0;c ^{ k }=0}  Int = noise  \(\text {min}\left \{\left [\frac {1}{\mu _{s,n}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \}\) 
\(P_{p,(n1)}^{k}\neq 0 \left \{a^{k} <0; c^{k} > 0\right \}\)  SIC  0 
SC  \(\text {min}\left \{\text {max}\left \{\left [\frac {1}{\hat {\mu _{s,n}}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {n_{0}\left (h^{k}_{pp}^{2}  h^{k}_{sp}^{2}\right)}{h^{k}_{sp}^{2} h^{k}_{ps_{u_{[k]}}}^{2}}\right \}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \} \)  
\( P_{p,(n1)}^{k}\neq 0 \left \{a^{k} >0; c^{k} < 0\right \}\)  SIC  \(\text {min}\left \{\left [\frac {1}{\mu _{s,n}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \}\) 
SC  0  
\(P_{p,(n1)}^{k}\neq 0 \left \{a^{k} <0; c^{k}<0\right \}\)  SIC  \(\text {min}\left \{\frac {c^{k}}{a^{k}}; \left [\frac {1}{\mu _{s,n}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \}\) 
SC  \(\text {min}\left \{\text {max}\left \{\left [\frac {1}{\hat {\mu _{s,n}}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {n_{0}\left (h^{k}_{pp}^{2}  h^{k}_{sp}^{2}\right)}{h^{k}_{sp}^{2} h^{k}_{ps_{u_{[k]}}}^{2}}; \frac {c^{k}}{a^{k}}\right \}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \} \)  
\(P_{p,(n1)}^{k}\neq 0 \left \{a^{k} >0; c^{k}>0\right \}\)  SIC \(\text {if} \frac {c^{k}}{a^{k}}\leq \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}} \)  \(\text {min}\left \{\text {max}\left \{\left [\frac {1}{\mu _{s,n}}  \frac {1}{b_{s,(n1)}^{k}}\right ]^{+}; \frac {c^{k}}{a^{k}}\right \}; \frac {I_{\text {th}}^{k}}{\left h_{ps_{u_{[k]}}}^{k}\right ^{2}}\right \} \) 
otherwise  0  
SC  \(\min \left \{\max \left \{\left [\frac {1}{\mu ^{\wedge }_{s,n}}\frac {1}{b^{k}_{s,(n1)}}\right ]^{+} ;\frac {n_{0}\left (\left h^{k}_{pp}\right ^{2}\left h^{k}_{sp}\right ^{2}\right)}{\left h^{k}_{sp}\right ^{2}\left h^{k}_{ps_{u_{[k]}}}\right ^{2}}\right \}; \frac {c^{k}}{a^{k}};\frac {I^{k}_{\text {th}}}{\left h^{k}_{ps_{u_{[k]}}}\right ^{2}}\right \}\) 
Optimization coefficients for problem (16)
Cases  \(b_{s,(n1)}^{k}\) 
\(P_{p,(n1)}^{k}\neq 0\) and \(\left h_{sp}^{k}\right ^{2} \leq \left h_{ss_{u_{[k]}}}^{k}\right ^{2}\)  \(\frac {\left h_{ss_{u_{[k]}}}^{k}\right ^{2}}{n_{0}+ \left h_{sp}^{k}\right ^{2} P_{p,(n1)}^{k}} \) 
\(P_{p,(n1)}^{k}\neq 0\) and \(\left h_{sp}^{k}\right ^{2} > \left h_{ss_{u_{[k]}}}^{k}\right ^{2}\)  \(\frac {\left h_{ss_{u_{[k]}}}^{k}\right ^{2} }{n_{0}}\) 
\(P_{p,(n1)}^{k}=0\)  \(\frac {\left h_{ss_{u_{[k]}}}^{k}\right ^{2} }{n_{0}}\) 
Cases  a ^{ k } 
\(P_{p,(n1)}^{k}\neq 0\) and \(\left h_{sp}^{k}\right ^{2}\geq \left h_{ss_{u_{[k]}}}^{k}\right ^{2}\)  \(\left h_{sp}^{k}\right ^{2} \left h_{ps_{u_{[k]}}}^{k}\right ^{2}  \left h_{pp}^{k}\right ^{2} \left h_{ss_{u_{[k]}}}^{k}\right ^{2}\) 
All other cases  0 
Cases  c ^{ k } 
\(P_{p,(n1)}^{k}\neq 0\) and \(\left h_{sp}^{k}\right ^{2}\geq \left h_{ss_{u_{[k]}}}^{k}\right ^{2}\)  \(n_{0} \left (\left h_{pp}^{k}\right ^{2}  \left h_{sp}^{k}\right ^{2} \right)\) 
All other cases  0 
4 Algorithm evaluation with imperfect CSI
4.1 System parameters
where γ is a complex Gaussian noise. To simplify the notations, we assume that only one user is present in the secondary cell. We further assume that no outage is allowed at the SU.
4.2 Algorithm
In the first step, the estimated decoding strategy for any subcarrier k is determined based on the estimated channel gains, i.e., \(\tilde {h}_{pp}^{k}\) and \(\tilde {h}_{ps}^{k}\), and is compared with the true decoding strategy determined by utilizing the exact values of channel gains, i.e., \(h_{pp}^{k}\) and \(h_{ps}^{k}\). If the estimated decoding strategy is more strict than the true one, outage on the SU is reported and the estimated achievable rate is set to zero. For example, if the SU makes a false judgment by assuming it is able to apply SIC while in reality it is not because criterion (5) is not fulfilled with \(h_{pp}^{k}\) and \(h_{ps}^{k}\), then the secondary rate is set to zero.
Otherwise, if the estimated decoding strategy coincides with the true one, or if it is different than the true decoding strategy but still feasible at the SU, we proceed to the second step. This corresponds, for instance, to a case where the SU treats interference as noise although SIC could have been applied with the exact channel gains. Then, a test on the estimated achievable rate according to this estimated strategy is done. If this estimated rate is greater than the exact capacity calculated according to the true decoding strategy and the exact allocated power, the SU is in outage within the corresponding subcarrier and its rate is set to zero.
5 Simulation results
The performance of the proposed algorithm is assessed using Monte Carlo simulations, where the location of the primary and secondary transmitters both follow a uniform distribution. The performance is evaluated with perfect and imperfect CSI. In the former case, the performance of both singleuser and multiuser cases is compared. The power constraint per transmitter is 21 dBm, and the thermal noise has a spectral density N _{0}=− 174 dBm/Hz. The number of subcarriers is L=64 and B=0.5 MHz and \(n_{0} = \frac {N_{0} B}{L}\). The allowed degradation on the primary rate due to interference from the secondary transmitter is ε=0.1, which means that 90% of the interferencefree rate is guaranteed. The influence of the distance between the primary and secondary BSs, d _{sec} will be evaluated in the simulations. In all of our simulation results, all rates are normalized with respect to the bandwidth B. The complexity of the proposed algorithm is calculated as N(1+M)L log2L, where M is the number of iterations needed to update the Lagrange multiplier λ in (14).
5.1 Simulation results with perfect CSI
With perfect CSI, the complex channel gains \(h^{k}_{ij}\) take into account path loss, lognormal shadowing, and Rayleigh fading. We suppose here that all subcarriers are subject to independent Rayleigh fading. The path loss model is COST 231 extension to Hata model at 800 MHz in dense urban environment, L _{dB}(d)=125.08+35.22× log10(d), and the shadowing standard deviation is equal to 6 dB. Both primary and secondary cells have omnidirectional antennas with the same radius d _{ p }=d _{ s }=1 km. The stopping criterion of Algorithm 2 is either \(\frac {\sum _{k} R_{s,m}^{k,\text {SC}}  \sum _{k} R_{s,m1}^{k,\text {SC}}}{\sum _{k} R_{s,m1}^{k,\text {SC}}} < \omega \) or m=10. It is important to note that for the power allocation algorithm, a convergence at 2% on the secondary rate is reached after six iterations.
5.1.1 Performance evaluation for one secondary user
5.1.2 Statistics
In order to get an insight on the distribution of the different studied cases in terms of mobile terminal positions, we consider three different scenarios. In the first and second scenarios, the primary BS is considered as the center of reference for the terminal coordinates with \(\phantom {\dot {i}\!}x_{\text {BS}_{p}} = y_{\text {BS}_{p}} = 0\) km, and the secondary BS is fixed at (1 km, 0 km).
The weak interference case, where the interference is treated as noise, depends exclusively on \(h_{sp}^{k}^{2}\) and \(h_{ss_{u_{[k]}}}^{k}^{2}\). With a large number of runs, represented by subfigure “Int,” this case is only affected by the path loss and consequently by the distance between the selected SU and its BS. On the other hand, subfigures “SC” and “SIC” prove that these two methods are complementary and the application of SC in the algorithm will improve the system rates. When neither SIC nor SC can be applied, or whenever the interference constraints are not satisfied for all secondary users, the randomly chosen user is switched off. This case is inversely proportional to \(h_{ps_{u_{[k]}}}^{k}^{2}\) as shown in subfigure “OFF.”
We can see that the interference is treated as noise when it is weak, i.e., whenever the distance between the PU and the secondary BS is greater than the distance between the secondary mobile and its BS, which is equal to 0.4 km in our case. Otherwise, the strong interference case is activated and several methods can be applied depending on the conditions studied previously. Since \(h_{ss_{u_{[k]}}}^{k}^{2}\) is fixed, all cases depend on \(h_{sp}^{k}^{2}\).
When d _{ p }<d _{ s }, the interference is weak and is treated as noise at the secondary receiver. In the opposite side, SIC or SC can be used. The SU is turned off whenever either methods cannot be applied or the interference threshold is not satisfied.
5.1.3 Rates improvement and comparison with several methods
The improvement provided by the power optimization in presence of SC strategy is highlighted. When both superposition coding and dual decomposition are applied, the proposed algorithm denoted by “SIC & SC & power control,” the sum and secondary rates are compared with “SIC.” The improvement is then between 2.3 and 3% on the sum rate, while it is between 16.9 and 43.5% on the secondary rate. In all these cases, there is a negligible degradation on the PU rate which never exceeds 0.7%. This degradation is due to the increased power level allocated to the SU with our algorithm.

The case where the secondary system is always switched off (denoted by “RP” for “Reference on Primary”). In this case, waterfilling is applied on the primary user and the complexity is calculated as O(L log2L) [35].

The classical power allocation scheme where the secondary system can transmit on the whole bandwidth of a cognitive underlay/interweave system by considering the primary system’s interference as noise in all subcarriers. This algorithm is denoted by “FB” for “Full Band” and its complexity is 2·N·O(L log2L), with N as the number of iterations.

An algorithm where the secondary system can only transmit in the subcarriers with weak interference (\({h^{k}_{sp}} ^{2} \leq  {h^{k}_{ss}} ^{2}\)) by considering the primary system’s interference as noise in these subcarriers. This algorithm is denoted by “PB” for “Partial Band,” and its complexity is 3/2·N·O(L log2L).
Both sum and primary rates are shown in Fig. 6. The adaptive decoding strategy with the proposed power control scheme achieves the highest sum rate. Compared with “RP,” the achievable sum rate gain increases with d _{sec} from 0.9 to 14.27%. Moreover, the data rate gain obtained by comparing the proposed method with “FB” and “PB” is respectively 4.3–5.02% and 1.22–3.38%.
The proposed method presents the lowest primary rate but the degradation comparing to “FB” does not exceed 0.8%, where this gain reaches 4% when comparing with “PB,” while the achieved gain on the secondary rate is about 40%, as shown in Fig. 7.
5.1.4 Performance evaluation with several secondary users
Finally, the proposed algorithm is compared with exhaustive search, where the SU with the maximum estimated rate is allocated to each subcarrier, without selecting the users based on their decoding strategies. The achievable rates with the proposed algorithm are 4% less than those of the exhaustive search which represents an upper bound for the secondary rates. Consequently, we can conclude that our heuristic subcarrier allocation algorithm is less complex than the exhaustive search but still quite effective.
5.2 Simulation results with imperfect CSI
6 Conclusions
In this paper, we proposed a resource allocation algorithm for a multiuser cognitive radio system. In a first step, an adaptive decoding algorithm based on both successive interference cancelation and superposition coding strategy is proposed in order to determine the achievable rates of different secondary users. After an orthogonal subcarrier allocation, the secondary rate maximization problem is formulated as a nonlinear problem and an iterative algorithm is proposed using waterfilling and dual decomposition methods. A general solution for the power optimization problem in an uplink underlay CR system is proposed. Both theoretical analysis and simulation results have shown that the proposed algorithm achieves higher sum rate than classical algorithms, providing highenough data rates for the secondary system at the expense of a very low degradation of the primary system’s rate. In the second part, we show by simulation analysis that the proposed algorithm is efficient and robust in the singleuser case when imperfect CSI is available at the secondary user. For further work, the proposed algorithm could be extended to the statistical CSI case.
7 Appendix 1
7.1 Proof of Eq. (8)

Step 1: \(x_{s}^{k,(1)}\) is decoded from \(y^{k}_{s}\) by treating \(\sqrt {\alpha ^{k}} h^{k}_{ss}x_{s}^{k,(2)} + h^{k}_{sp}x^{k}_{p}\) as noise, then \(y^{k^{\prime }} = y^{k}  h^{k}_{ss} \sqrt {(1  \alpha ^{k})}x_{s}^{k,(1)}\) is obtained. The achievable rate is equal to:$$ R_{s}^{k,(1)} =\frac{B}{L} \log_{2}\left(1+ \frac{\left(1\alpha^{k}\right)h^{k}_{ss}^{2} P^{k}_{s}}{\alpha^{k}h^{k}_{ss}^{2} P^{k}_{s} + h^{k}_{sp}^{2} P^{k}_{p} + n_{0}}\right) $$

Step 2: \(x^{k}_{p}\) is decoded from \(\phantom {\dot {i}\!}y^{k^{\prime }}\) by treating \(\sqrt {\alpha ^{k}} h^{k}_{ss}x_{s}^{k,(2)}\) as noise, then \(\phantom {\dot {i}\!}y^{k^{\prime \prime }} = y^{k^{\prime }}  h^{k}_{sp}x^{k}_{p}\) is obtained. Thus, we have$$ R^{k}_{p} = \frac{B}{L} \log_{2}\left(1+ \frac{h^{k}_{sp}^{2} P^{k}_{p}}{\alpha^{k} h^{k}_{ss}^{2} P^{k}_{s} + n_{0}}\right) $$

Step 3: \(x_{s}^{k,(2)}\) is decoded from \(\phantom {\dot {i}\!}y^{k^{\prime \prime }}\). Consequently$$R_{s}^{k,(2)} = \frac{B}{L} \log_{2}\left(1+ \frac{\alpha^{k} h^{k}_{ss}^{2} P^{k}_{s}}{n_{0}}\right) $$
whence we got Eq. (8).
8 Appendix 2
8.1 Proof of Eq. (9)
9 Appendix 3
9.1 Proof of inequalities (7a) and (7b)
Declarations
Funding
This work was partially funded through the French National Research Agency (ANR) project ACCENT5 with grant agreement code: ANR14CE28002602. This work is supported by the national project ACCENT5 under the grant ANR14CE28002601.
Authors’ contributions
All authors read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 J Mitola, in IEEE International Workshop on, Mobile Multimedia Communications 1999, (MoMuC ’99). Cognitive radio for flexible mobile multimedia communications (IEEE, San Diego, 1999), pp. 3–10.Google Scholar
 N Devroye, T Vahid, V Mai, Cognitive radio networks: highlights of information theoretic limits, models and design. IEEE Signal Proc. Mag. 52(6), 12–23 (2008).View ArticleGoogle Scholar
 N Devroye, P Mitran, V Tarokh, Achievable rates in cognitive radio channels. IEEE Trans. Inf. Theory. 52:, 1813–1827 (2006).View ArticleMATHMathSciNetGoogle Scholar
 A Goldsmith, SA Jafar, I Maric, S Srinivasa, Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE. 97:, 894–914 (2009).View ArticleGoogle Scholar
 R BlascoSerrano, J Lv, R Thobaben, E Jorswieck, M Skoglund, Multiantenna transmission for underlay and overlay cognitive radio with explicit messagelearning phase. EURASIP J. Wirel. Commun. Netw. 2013(1), 195 (2013).View ArticleGoogle Scholar
 H Mahmoud, T Yucek, H Arslan, OFDM for cognitive radio: merits and challenges. IEEE Trans. Wirel. Commun. 16(2), 6–15 (2009).View ArticleGoogle Scholar
 S Sadr, A Anpalagan, K Raahemifar, Radio resource allocation algorithms for the downlink of multiuser OFDM communication systems. IEEE Commun. Surv. Tutor. 11(3), 92–106 (2009).View ArticleGoogle Scholar
 R Zhang, YC Liang, S Cui, Dynamic resource allocation in cognitive radio networks. IEEE Signal Proc. Mag. 27(3), 102–114 (2010).View ArticleGoogle Scholar
 G Bansal, MJ Hossain, VK Bhargava, Optimal and suboptimal power allocation schemes for OFDMbased cognitive radio systems. IEEE Trans. Wirel. Commun. 7(11), 4710–4718 (2008).View ArticleGoogle Scholar
 S Wang, F Huang, ZH Zhou, Fast power allocation algorithm for cognitive radio networks. IEEE Commun. Lett. 15(8), 845–847 (2011).View ArticleGoogle Scholar
 Y Zhang, C Leung, Resource allocation in an OFDMbased cognitive radio system. IEEE Trans. Commun. 57(7), 1928–1931 (2009).View ArticleGoogle Scholar
 SM Almalfouh, GL Stuber, Interferenceaware radio resource allocation in OFDMAbased cognitive radio networks. IEEE Trans. Veh. Technol. 60(4), 1699–1713 (2011).View ArticleGoogle Scholar
 X Kang, YC Liang, A Nallanathan, HK Garg, R Zhang, Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity. IEEE Trans. Wirel. Commun. 8(2), 940–950 (2009).View ArticleGoogle Scholar
 X Kang, HK Garg, YC Liang, R Zhang, Optimal power allocation for OFDMbased cognitive radio with new primary transmission protection criteria. IEEE Trans. Wirel. Commun. 9(6), 2066–2075 (2010).View ArticleGoogle Scholar
 S Ekin, MM Abdallah, KA Qarage, E Serpedin, Random subcarrier allocation in OFDMbased cognitive networks. IEEE Trans. Signal Process. 60(9), 4758–4774 (2012).View ArticleMathSciNetGoogle Scholar
 MG Khoshkholgh, NM Yamchi, K Navaie, H Yanikomeroglu, VCM Leung, KG Shin, Radio resource allocation for OFDMbased dynamic spectrum sharing: duality gap and time averaging. IEEE J. Sel. Areas Commun. 33(5), 848–864 (2015).View ArticleGoogle Scholar
 A Jovicic, P Viswanath, Cognitive radio: an informationtheoretic perspective. IEEE Trans. Inf. Theory.55:, 3945–3958 (2006).View ArticleMATHMathSciNetGoogle Scholar
 M Pischella, D Le Ruyet, in International Workshop on, Signal Processing Advances in Wireless Communications (SPAWC 2013). Cooperative allocation for underlay cognitive radio systems (IEEE, Darmstadt, 2013), pp. 1–5.Google Scholar
 M Chami, M Pischella, D Le Ruyet, in Proceedings of European Wireless 2014 20th European Wireless Conference. Adaptive decoding strategy with superposition coding for cognitive radio systems (VDE, Barcelona, 2014), pp. 1–6.Google Scholar
 T Cover, Broadcast channels. IEEE Trans. Inf. Theory.18:, 2–14 (1972).View ArticleMATHMathSciNetGoogle Scholar
 M Chami, M Pischella, D Le Ruyet, in 11th International Symposium on Wireless Communications Systems (ISWCS) 2014. Optimal power control for cooperative underlay cognitive system (IEEE, Barcelona, 2014), pp. 558–562.View ArticleGoogle Scholar
 R Zhang, YC Liang, Investigation on multiuser diversity in spectrum sharing based cognitive radio networks. IEEE Commun. Lett. 14(2), 133–135 (2010).View ArticleGoogle Scholar
 S Wang, F Huang, M Yuan, S Du, Resource allocation for multiuser cognitive OFDM networks with proportional rate constraints. Int. J. Commun. Syst. 25(2), 254–269 (2012).View ArticleGoogle Scholar
 JP Hong, W Choi, in 2010 IEEE International Symposium on Information Theory Proceedings (ISIT). Capacity scaling law by multiuser diversity in cognitive radio systems (IEEE, Austin, 2010), pp. 2088–2092.View ArticleGoogle Scholar
 M Ge, S Wang, Fast optimal resource allocation is possible for multiuser OFDMbased cognitive radio networks with heterogeneous services. IEEE Trans. Wirel. Commun. 11(4), 1500–1509 (2012).View ArticleGoogle Scholar
 S Wang, F Huang, C Wang, Adaptive proportional fairness resource allocation for OFDMbased cognitive radio networks. IEEE Trans. Wirel. Commun. 19(3), 273–284 (2013).Google Scholar
 S Wang, ZH Zhou, M Ge, C Wang, Resource allocation for heterogeneous cognitive radio networks with imperfect spectrum sensing. IEEE J. Sel. Areas Commun. 31(3), 464–475 (2013).View ArticleGoogle Scholar
 YY He, S Dey, Throughput maximization in cognitive radio under peak interference constraints with limited feedback. IEEE Trans. Veh. Technol. 61(3), 1287–1305 (2012).View ArticleGoogle Scholar
 Z Rezki, MS Alouini, Ergodic capacity of cognitive radio under imperfect channelstate information. IEEE Trans. Veh. Technol. 61(5), 2108–2119 (2012).View ArticleGoogle Scholar
 A Shojaeifard, H Saki, MM Mahyari, M ShikhBahaei, in 2014 IEEE International Conference on Communications (ICC). Resource allocation and interference management for adaptive modulation and codingbased OFDMA cognitive radio networks (IEEE, Sydney, 2014), pp. 5908–5913.View ArticleGoogle Scholar
 HA Suraweera, PJ Smith, M Shafi, Capacity limits and performance analysis of cognitive radio with imperfect channel knowledge. IEEE Trans. Veh. Technol. 59(4), 1811–1822 (2010).View ArticleGoogle Scholar
 T Han, K Kobayashi, A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory. 27(1), 49–60 (1981).View ArticleMATHMathSciNetGoogle Scholar
 DP Bertsekas, Nonlinear programming (Athena scientific Belmont, USA, 1999).MATHGoogle Scholar
 A Ghasemi, ES Sousa, Spectrum sensing in cognitive radio networks: requirements, challenges and design tradeoffs. IEEE Commun. Mag. 46(4), 32–39 (2008).View ArticleGoogle Scholar
 DP Palomar, JR Fonollosa, Practical algorithms for a family of waterfilling solutions. IEEE Trans. Signal Process. 53(2), 686–695 (2005).View ArticleMATHMathSciNetGoogle Scholar
 M Pischella, D Le Ruyet, Adaptive resource allocation and decoding strategy for underlay multicarrier cooperative cognitive radio systems. Trans. Emerg. Telecommun. Technol. 24:, 748–761 (2013).View ArticleGoogle Scholar
 G Scutari, D Palomar, S Barbarossa, in Information Theory and Applications Workshop, 2007. Asynchronous iterative waterfilling for Gaussian frequencyselective interference channels (IEEE, Cannes, 2007).Google Scholar
 WC Li, RY Chang, KY Wang, CY Chi, in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Energyefficient precoding matrix design for relayaided multiuser downlink networks (IEEE, Brisbane, 2015), pp. 3098–3102.View ArticleGoogle Scholar
 S Boyd, L Vandenberghe, Convex optimization (Cambridge University Press, UK, 2004).View ArticleMATHGoogle Scholar
 K Schittkowsk, C Zillober, Sequential convex programming methods (Springer Berlin Heidelberg, Berlin, 1995).View ArticleMATHGoogle Scholar
 B Maham, P Popovski, X Zhou, A Hjorungnes, Cognitive multiple access network with outage margin in the primary system. IEEE Trans. Wirel. Commun. 10(10), 3343–3353 (2011).View ArticleGoogle Scholar
 L Musavian, S Aissa, Fundamental capacity limits of cognitive radio in fading environments with imperfect channel information. IEEE Trans. Commun. 57(11), 3472–3480 (2009).View ArticleGoogle Scholar