Statistical modeling of cognitive network interference The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Rabbachin, Alberto, Tony Q. S. Quek, and Moe Z. Win. “Statistical Modeling of Cognitive Network Interference.” GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference 2010. 1-6. © 2011 IEEE. As Published http://dx.doi.org/10.1109/GLOCOM.2010.5683500 Publisher Institute of Electrical and Electronics Engineers Version Final published version Accessed Wed May 25 18:21:38 EDT 2016 Citable Link http://hdl.handle.net/1721.1/66167 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Detailed Terms This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. Statistical Modeling of Cognitive Network Interference Alberto Rabbachin∗, Tony Q.S. Quek†, and Moe Z. Win‡ † Institute ∗ Joint Research Centre European Commission 21027 Ispra, Italy, for Infocomm Research, A∗ STAR, 1 Fusionopolis Way, #21-01 Connexis, Singapore 138632, ‡ Massachusetts Institute of Technology Cambridge, MA 02139, USA. Abstract—In this paper, we propose a new statistical interference model for cognitive network based on the amplitude aggregate interference, which accounts for the parameters related to the sensing procedure, spatial reuse protocol employed by secondary users, and environment dependent conditions like channel fading and shadowing. We derive the characteristic function and the nth cumulant of the cognitive network interference on the primary user. By using the theory of truncated-stable distribution, we show how we can approximate the cognitive network interference analytically. We further show how to apply our model to derive system performance measure such as bit error probability in the presence of cognitive network interference. Moreover, this work can serve to bring additional understanding of cognitive network interference for successful deployment of cognitive networks in the future. I. I NTRODUCTION Opportunistic spectrum access allows the opening of underutilized portions of the licensed spectrum for secondary reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary network. To enable secondary users to accurately detect and to access the idle spectrum, cognitive radio has been proposed as the enabling technology.However, spectrum sensing is challenged by the uncertainty in the aggregate interference in the network. Such uncertainty can be resulted from the unknown number of interferers, the unknown location of the interferers, the effect of channel fading, shadowing, and other uncertain environment dependent conditions Therefore, it is crucial to study how such uncertainty can be incorporated in the statistical aggregate interference model and the effect of the cognitive network interference on the primary network system performance. Throughout this paper, we refer to the aggregate interference generated by secondary users sharing the same spectrum of the primary user as cognitive network interference [1]. In [2], the authors study the coexistence between wideband and narrowband communication systems, where they have applied stable distribution to model the aggregate interference. In [3], the authors assume the presence of a control channel to indicate the presence of primary receivers and the aggregate interference power is modeled as the sum of all interferers’ power. In [4], the authors compare bounded and unbounded path-loss models, showing that the unbounded path-loss model might results in significant deviations from more realistic performance. In [5], an expression for the moment of the aggregate interference distribution generated by nodes located in an arbitrary area is derived. Although the above models allow one to analyze cognitive network interference, they cannot be easily extended to perform error probability analysis of primary network in the presence of cognitive network interference. Moreover, these models usually assume unbounded path-loss model and are unable to capture the instantaneous cognitive interference conditions. In this paper, we propose a new statistical interference model for cognitive network based on the amplitude aggregate interference, which accounts for the parameters related to the sensing procedure, spatial reuse protocol employed by secondary users, and environment dependent conditions like channel fading and shadowing. Moreover, our statistical model allows us to model the cognitive network interference generated by secondary users confined in a limited region. By using the theory of truncated-stable distribution, we show how we can approximate the cognitive network interference analytically. We further show how to derive system performance measure such as bit error probability (BEP) in the presence of cognitive network interference. The paper is organized as follows. Section II presents the system model. Section III derives the exact and approximate instantaneous interference distribution. Section IV demonstrates how these results can be applied in BEP analysis. Section V provides numerical results to illustrate the coexistence between primary and secondary networks depends on various system parameters. Section VI gives the conclusion. II. S YSTEM M ODEL For cognitive networks, the secondary users need to sense channels before transmission in order not to cause harmful interference to a primary network. In this paper, we consider the primary network in frequency division duplex mode. Therefore, to detect the presence of active primary users, the secondary user senses the uplink channel while the transmission occupies the downlink channel of the primary system. Furthermore, we consider the secondary network as a simple ad-hoc network where secondary users join/exit the network and sense/access the channel independently without coordinating with other secondary users As such, there exists the possibility that secondary users can transmit at the same 978-1-4244-5638-3/10/$26.00 ©2010 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. time regardless of their distances between each other.1 B. Interference Model A. Cognitive Network Activity Model The interference signal at the primary receiver generated by the ith cognitive interferer can be written as Ii = PI ri−ν Xi , (6) The activity of each secondary user depends on its received signal strength of the uplink signal transmitted by the primary user. In the following, we consider two types of secondary spatial reuse protocols, namely: single-threshold and multiplethreshold protocols. 1) Single-Threshold Protocol: In this case, a secondary user is said to be active if KPp Y ≤ β, (1) r2ν or equivalently, r−2ν Y ≤ ζ, (2) β is the normalized where β is the activating threshold; ζ KP p threshold; Pp is the transmitted power of the primary user; Y is the squared fading path strength from the primary user to the secondary user; K is the gain accounting for the loss in the near-field; r is the distance between the primary and secondary users; and ν is the amplitude pass-loss exponent.2 Therefore, the activity of the secondary network users can be represented by the Bernoulli random variable: 1[0,ζ] r−2ν Y ∼ Bern FY r2ν ζ , (3) with the indicator function defined as 1, if a ≤ x ≤ b 1[a,b] (x) = 0, otherwise, (4) where the value one of the Bernoulli variable denotes that the secondary user is active. 2) Multiple-Threshold Protocol: For this case, the transmission power of the secondary network users is set according to the detected power level of the primary network uplink signal [6]. We consider N − 1 normalized threshold values ζ1 , ζ2 , . . . , ζN −1 in increasing order to identify N different zones (or sets) of active secondary users, denoted by Ak , k = 1, 2, . . . , N . Let ζ0 = 0 and ζN = ∞. Then, the kth active zone Ak obeys the following activating rule:3 (pt) 0, r2ν ζk−1 , r2ν ζk . (5) 1[ζk−1 ,ζk ] r−2ν Y ∼ Bern μY Note that the received primary network signal power at the active secondary user in the zone Ak is between KPp ζk−1 and KPp ζk . 1 When a more intelligent medium access control protocol that involves some form of coordination or local information exchange is feasible for the secondary network, our results can still serve as a worst-case scenario analysis. 2 For brevity, we assume that the noise effect is negligible on the primary detection procedure as in [3]. This assumption is intuitively due to the fact that the harmful interference is especially caused by nodes in the vicinity of the victim receiver. In this case, the power of the primary user signal is much higher than the noise power. 3 The zeroth-order partial moment μ(pt) (0, l, u) of the random variable X X can be written in terms of its cumulative distribution function (CDF) as (pt) μX (0, l, u) = FX (u) − FX (l) . where PI is the interference signal power at the limit of the near-far region;4 ri is the distance between the ith interferer and the primary receiver; and Xi is the per-dimension fading channel gain, i.e., the real or imaginary part of the channel gain Hi from the ith cognitive interferer to the primary receiver. In the following, we assume that Y in (1) and Xi in (6) are statistically independent. In our model, we consider that the secondary users are spatially scattered according to an homogeneous Poisson point process in a two-dimensional plane R2 , where the victim primary user is assumed to be located at the center of the region. The probability that k secondary users lie inside a region R ⊂ R2 depends only on the total area AR of the region, and is given by [7] (λAR )k −λAR e , k = 0, 1, 2, . . . (7) k! where λ is the spatial density (in nodes per unit area). Furthermore, we assume that the region R is limited by minimum and maximum distances from the primary receiver, denoted by Rs and Rf , respectively.5 In this way, this model will enable us to consider a scenario where the secondary users are only located within a limited region. P {k in R} = III. I NSTANTANEOUS I NTERFERENCE D ISTRIBUTION To introduce our statistical model for the cognitive network interference, we first derive the cumulants of the cognitive network interference for random activity (the activity of each secondary user is regulated by a spatial reuse protocol) in Section III-A. Next, in Section III-B we develop the symmetric truncated-stable approximation for the cognitive network interference using its cumulant expressions. A. Random Activity 1) Single-Threshold Protocol: In this spatial reuse protocol, the secondary users in the region R are activated by the single normalized threshold ζ using (3). Therefore, the cognitive network interference for the single-threshold protocol can be written as −ν Ist = PI ri Xi , (8) i∈Ast Zst (ζ;R) where Ast defines the set of secondary users activated by the single normalized threshold ζ in the region R: Ast = i ∈ R : 1[0,ζ] ri−2ν Y = 1 . (9) consider the near-far region limit at 1 meter. that ri in (6) can be smaller than 1. Therefore, the received interference power can be larger than PI but it is finite since Rs > 0. 4 We 5 Note 978-1-4244-5638-3/10/$26.00 ©2010 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. The characteristic function (CF) of Zst (ζ; R) can be expressed as Rf exp jsxr−ν − 1 ψZst (ζ;R) (js) = exp 2πλ X ×1[0,ζ] r −2ν Y Rs y fX (x) fY (y) rdrdydx . (10) Using (10), we can then calculate the nth cumulant of the interference as 1 dn ln ψZst (js) Zst (ζ; R) = n j dsn s=0 2πλ μX (n) Rs2−nν − Rf2−nν FY Rs2ν ζ = nν − 2 nν−2 2 − nν (pt) 2ν 2ν , Rs ζ, Rf ζ + ζ 2ν μY 2ν 2−nν (pt) 2ν 2ν − Rf 0, Rs ζ, Rf ζ . μY (11) Using the cumulant of Zst (ζ; R), we can obtain the nth cumulant of the cognitive network interference Ist for the single-threshold protocol as follows: n/2 κIst (n) = PI κZst (ζ;R) (n) . (12) 2) Multiple-Threshold Protocol: Using (5), the per-zone cognitive interference generated by the secondary users in the kth active zone Ak can be written as ri−ν Xi , (13) Imt,k = PI,k i∈Ak Zk (R) where PI,k is the transmitted power of the secondary users in the kth active zone Ak and (14) Ak = i ∈ R : 1[ζk−1 ,ζk ] ri−2ν Y = 1 . Similar to (10), the CF of Zk (R) can be expressed as Rf exp jsxr−ν − 1 ψZk (R) (js) = exp 2πλ ×1[ζk−1 ,ζk ] r X −2ν Y Rs y fX (x) fY (y) rdrdydx . (15) The cognitive network interference generated by the secondary users in all the N active zones is then given by Imt N = PI,k Zk (R) . (16) k=1 Since all the Zk (R)’s are statistically independent,6 we obtain the nth cumulant of the cognitive network interference Imt for 6 The cumulants have the linear property for independent random variables, i.e., if X and Y are independent, then κX+Y (n) = κX (n) + κY (n) . the multiple-threshold protocol as κImt (n) = N k=1 n/2 PI,k κZk (R) (n) , (17) where κZk (R) (n) are given by (11), (18), and (20) for k = 1, k = 2, 3, . . . , N − 1, and k = N , respectively. B. Truncated-Stable Distribution Approximation The truncated-stable distributions are a relatively new class of distributions that follow from the class of stable distributions [8]. The attractiveness of using stable distributions to model interference in wireless networks are: 1) the ability to capture the spatial distribution of the interfering nodes; and 2) the ability to accommodate heavy tails that exhibit the dominant contribution of a few interferers in the vicinity of the primary user [9]. However, as shown in [1], the aggregate interference converges to a stable distribution only if the number of interferers is unbounded and if ri ∈ [0, ∞]. The main drawback of this model is that, with small but nonzero probability, the distance r can be zero and hence, the interference power can be infinite. This singularity at r = 0 is taken account of in the stable distributions with unbounded (infinite) second or higher order moments. However, the truncatedstable distributions with smoothed tails and finite moments can offer an alternative statistical tool to model the aggregate interference in more realistic scenarios where this singularity can be avoided. The CF of a symmetric truncated-stable random variable T ∼ St (γ , α, g) is given by [11] α α (g + js) (g − js) α + −g , ψT (js)=exp γ Γ (−α) 2 2 (21) where Γ (·) is the Euler’s gamma function; and γ , α and g are the parameters associated with the truncated-stable distribution. The parameters γ and α are akin to the dispersion and the characteristic exponent of the stable distribution, respectively. The parameter g is the argument of the exponential function used to smooth the tail of the stable distribution. The nth cumulant of the truncated-stable distribution can be obtained using (21) as n−1 1 dn ln ψT (js) α−n = γ Γ (−α) g (α − i) . (22) jn dsn i=0 s=0 To approximate the cognitive network interference to the truncated-stable distribution, we first fix the characteristic exponent to α = 2/ν. This choice is motivated by the fact that as Rs → 0 and Rf → ∞, the cognitive network interference follows a stable distribution with the characteristic exponent α = 2/ν. Let IA be the cognitive network interference corresponding to the activity model A ∈ {fa, st, mt}, i.e., full activity, the single-threshold protocol, or the multiplethreshold protocol. Then, we can approximate the cognitive network interference IA to the symmetric truncated-stable random variable as IA ∼ St (γA , α = 2/ν, gA), where the 978-1-4244-5638-3/10/$26.00 ©2010 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. nν−2 2πλ μX (n) 2−nν (pt) 2 − nν 2ν (pt) 2ν Rs , Rs ζk−1 , Δmin 0, Rs2ν ζk−1 , Δmin − ζk−1 κZk (R) (n) = μY μY nν − 2 2ν nν−2 2 − nν (pt) (pt) + c1 μY (c2 , Δmin , Δmax ) + ζk 2ν μY , Δmax , Rf2ν ζk 2ν (pt) − Rf2−nν μY 0, Δmax , Rf2ν ζk , where Δmin = min Rf2ν ζk−1 , Rs2ν ζk , Δmax = max Rf2ν ζk−1 , Rs2ν ζk , and 2−nν − Rf2−nν , 0 , if Rs2ν ζk ≥ Rf2ν ζk−1 Rs nν−2 nν−2 (c1 , c2 ) = 2ν ζk 2ν − ζk−1 , if Rs2ν ζk < Rf2ν ζk−1 . , 2−nν 2ν (19) nν−2 2πλ μX (n) 2−nν (pt) 2 − nν 2ν (pt) 2ν Rs , Rs ζk−1 , Rf2ν ζk−1 κZN (R) (n) = 0, Rs2ν ζk−1 , Rf2ν ζk−1 − ζk−1 μY μY nν − 2 2ν + Rs2−nν − Rf2−nν F̄Y Rf2ν ζk−1 . simulation truncated−stable distribution −1 CCDF 10 −2 10 −3 10 Ist = −4 −0.3 −0.2 −0.1 0 0.1 0.2 0.3 0.4 0.5 Received signal strength dispersion and smoothing parameters γA and gA are given in terms of the second and fourth cumulants of IA , using the relationship between the cumulants and parameters in (22), as follows [10]: gA L PI, ri−ν Xi , =1 Fig. 1. CCDF of the cognitive network interference Imt for the multiplethreshold protocol with λ = 0.1, PI,1 = 0 dBm for A1 , PI,2 = −23.7 dBm for A2 , and PI,3 = −38.7 dBm for √ A3 . Both primary and secondary signals experience Rayleigh fading, i.e., Y ∼ Rayleigh (1/2) and |Hi | ∼ Rayleigh (1/2). γA κIA (2) = , α−2 2 κIA (2)(α−2)(α−3) Γ (−α) α (α − 1) κIA (4) κIA (2) (α − 2) (α − 3) . = κIA (4) (20) two thresholds (i.e., N = 3). Fig. 1 shows the complementary CDF (CCDF) of the cognitive network interference Imt . We can observe from Fig 1 that the simulation results match well with the truncated-stable statistical approximation. With the symmetric truncated-stable approximation, we can also account for shadowing in the statistical characterization of the cognitive network interference. For example, consider the single-threshold protocol and divide the whole region R into different subregions R1 , R2 , . . . , RL corresponding to the positions of the obstacles and the additional attenuation for users behind those obstacles. Then, the cognitive network interference can be written as 0 10 10 (18) (23) To validate our statistical model, we consider a circular region defined by Rs = 1 meter, Rf = 60 meters. We consider the multiple-threshold protocol implemented using Zst (ζ β̆ ;R ) (25) where PI, and β̆ account for an additional attenuation for the subregion R behind the obstacle and Ast, = i ∈ R : 1[0,ζ β̆ ] ri−2ν Y = 1 . (26) The CF of Zst ζ β̆ ; R ) can be expressed as ψZst (ζ β̆ ;R ) (js) = exp θ λ (24) i∈Ast, ×1[0,ζ β̆ ] r X −2ν Y b a exp jsxr−ν − 1 y fX (x) fY (y) rdrdydx . (27) where a and b are the limits of the subregion R ; and θ is the angle covered by R . If the obstacle is present, the angle θ corresponds to the angle covered by the obstacle. For a single obstacle placed at distance d from the origin, we have 978-1-4244-5638-3/10/$26.00 ©2010 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. 0 60 10 analysis simulation 40 SIR = −16 dB −1 10 SIR = −12 dB 20 −2 BEP meters 10 0 −3 10 SIR = −8 dB −20 −4 10 −40 −60 −60 −40 −20 0 20 40 60 0 5 Fig. 2. Node displacements of a cognitive radio network with the singlethreshold protocol in the presence of shadowing (not only a single realization snapshot). Rs = 1 meter, Rf = 60 meters, λ = 0.01, ζ = −40 dBm, θ1 = θ2 = π/2, and β̆1 = β̆2 = 20 dB. The shadowing is characterized by two obstacles present at 10 and 25 meters from the primary receiver, covering the angle of π/2, and causing additional attenuation of 20 dB. The blue and green colors represent inactive and active nodes, respectively. two subregions in front and behind the obstacle: (a1 , b1 ) = (Rs , d) and (a2 , b2 ) = (d, Rf ), respectively. The nth cumulant of the cognitive network interference for the single-threshold protocol in the presence of shadowing can be written as κIst (n) = L =1 n/2 10 15 20 25 Eb /N0 [dB] meters PI, κZst (ζ β̆ ;R ) (n) (28) where the cumulant κZst (ζ β̆ ;R ) (n) is obtained from κZst (ζ;R) (n) in (11) by setting ζ, 2π, Rs , and Rf to ζ β̆ , θ , a , and b , respectively. Fig. 2 shows realization snapshots of secondary users activated by the single-threshold protocol in the presence of shadowing. C. BEP Analysis Consider a binary phase-shift keying (BPSK) narrowband system in the presence of interference generated by the cognitive network confined within the region R. The nodes of the cognitive network are active according to (3). The decision variable of the primary received symbol after the correlation receiver can be written as V = GU Eb + Ist + W , (29) Fig. 3. BEP of BPSK versus Eb /N0 in the presence of the cognitive network interference Ist for the single-threshold protocol when SIR = −16, −12, and −8 dB. λ = 0.1 and ζ = −40 dBm, and Rayleigh fading for primary and secondary links. For comparison, the BEP in the absence of interference is also plotted (black line) Assuming that G and Ist are statistically independent, the CF of the decision variable conditioned on U = +1 is given by N 0 s2 . ψV jsU = +1 = ψG js Eb ψIst (js) exp − 4 (31) For the cognitive network interference Ist , we use the symmetric truncated-stable approximation , α = 2/ν, gst ), where the parameters γst Ist ∼ St (γst and gst are determined by using (23) and (24), respectively. Since Ist is approximated as a symmetric random variable, the average BEP Pe is equal to the BEP conditioned on U = +1, which can be expressed, using the inversion theorem [12], as Pe = P V < 0U = +1 ∞ ψV jsU = +1 + ψV −jsU = +1 1 1 ds. = + 2 2π 0 js (32) IV. N UMERICAL RESULTS In this section, we illustrate how our interference model can provide insight into the coexistence of primary and secondary networks. In numerical examples, we consider Rs = 1 meter, Rf = 60 meters, ν = 1. We first investigate the effect of the cognitive network interference on the BEP performance of the primary user. In Fig. 3, the BEP of BPSK versus Eb /N0 is depicted at the signal-to-interference ratio SIR Eb /PI in the presence of Rayleigh fading for both primary and secondary where G is the channel fading affecting the victim signal; signals. We can observe from Fig. 3 that the simulation and U ∈ {1, −1} is the information data; Eb is the energy per bit; analytical results match very well, which verify both our BEP and W is the zero-mean additive white Gaussian noise with analysis and the truncated-stable interference approximation. variance N0 /2. Conditioned on G, Ist , and U = +1, the CF To demonstrate the effect of fading on the cognitive network of the decision variable V can be written as interference, we next consider Nakagami-m fading for both N s2 ! primary and secondary signals. Fig. 4 shows the variance 0 . ψV jsG, Ist , U = +1 = exp js G Eb + Ist − (or equivalently, average power) of the cognitive network 4 (30) interference Ist for the single-threshold protocol.as a function 978-1-4244-5638-3/10/$26.00 ©2010 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. −3 2 x 10 −1 10 m=1 m=3 m=5 1.8 1.6 Rf Rf Rf Rf −2 10 1.4 = 30m, ζ = −40dB = 60m, ζ = −40dB = 60m, ζ = −60dB = 120m, ζ = −60dB −3 Var {Ist } Var {Ist } 10 1.2 1 0.8 −4 10 −5 10 0.6 0.4 −6 10 0.2 0 0 10 20 30 40 50 60 Maximum distance Rf (meters) −7 10 1 1.5 2 2.5 3 3.5 4 4.5 5 ν Fig. 4. Variance of the cognitive network interference Ist for the singlethreshold protocol as a function of the maximum distance Rf of the region R when the Nakagami fading parameters m = 1, 3, and 5. λ = 0.01, ζ = −30 dBm,√PI = 0 dBm, and Nakagami-m fading for primary and secondary links Y ∼ Nakagami (m, 1) and |Hi | ∼ Nakagami (m, 1). of the maximum distance Rf from the primary user.This example reveals that for fixed threshold ζ, as the the fading parameter m increases (less severe fading), the cognitive interference vanishes in the vicinity of the primary user due to rare secondary activity. We can also see that less severe fading (i.e., larger m) reduces the cognitive interference power for all the values of Rf . This is due to the fact that more severe fading increases the secondary activity in the proximity of the primary user, leading consequently to a higher cognitive interference power. This finding is in contrast to common folklore that more severe fading on the interference signals would be beneficial. Moreover, we observe that the aggregate average interference power tends to saturate since secondary users located far from the primary user contribute marginally to cognitive interference. An important insight is given in Fig. 5 where the interference power is plotted versus the amplitude path-loss coefficient. As shown in this figure, the cognitive network interference exhibits a non-monotonic behavior with an increasing path-loss coefficient. Similarly to the channel fading, a variation of the path-loss coefficient affects both the interference signal power and the primary signal detection. Under certain condition of m, Rf , and ζ, an higher path-loss coefficient might lead to an higher activity of the nodes that is not compensated by a reduction of the interference signal power. V. C ONCLUSIONS In this paper, we have proposed a new statistical interference model for cognitive network based on the amplitude aggregate interference. Based on two spatial reuse protocols, we have derived the characteristic function and the nth cumulant of the cognitive network interference at the primary user. By using the theory of truncated-stable distribution, we have shown how we can approximate the cognitive network interference Fig. 5. Variance of the cognitive network interference Ist for the singlethreshold protocol as a function of the path-loss coefficient ν of the region R for λ = 0.1, √ ζ = −30 dBm, PI = 0 dBm, and fading for primary and secondary links Y ∼ Nakagami (2, 1) and |Hi | ∼ Nakagami (2, 1). analytically. We further extendeded our model to include the effect of shadowing and showed how to derive the bit error probability in the presence of cognitive network interference. In summary, the proposed framework can help to understand cognitive interference for successful deployment of future cognitive networks. ACKNOWLEDGMENT The authors gratefully acknowledge helpful discussions with H. Shin. R EFERENCES [1] M. Z. Win, P. C. Pinto, and L. A. Shepp, “A mathematical theory of network interference and its applications,” Proc. of the IEEE, vol. 97, no. 2, pp. 205–230, Feb. 2009. [2] A. Rabbachin, T. Q. S. Quek, P. C. Pinto, I. Oppermann, and M. Z. Win, “Non-coherent UWB communications in the presence of multiple narrowband interferers,” IEEE Trans. Wireless Commun., to appear. [3] A. Ghasemi and E. S. Sousa, “Interference aggregation in spectrumsensing cognitive wireless networks,” IEEE J. Select. Topics Signal Processing, vol. 2, no. 1, pp. 41–56, Feb. 2008. [4] H. Inaltekin, M. Chiang, H. V. Poor, and S. B. Wicker, “On unbounded path-loss models: Effects of singularity on wireless network performance,” IEEE J. Select. Areas Commun., vol. 27, no. 7, pp. 1078–1092, Sep. 2009. [5] E. Salbaroli and A. Zanella, “Interference analysis in a poisson field of nodes of finite area,” IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1776–1783, May 2009. [6] ECC, “Technical requirements for UWB DAA (Detect and avoid) devices to ensure the protection of radiolocation services in the bands 3.1 - 3.4 GHz and 8.5 - 9 GHz and BWA terminals in the band 3.4 4.2 GHz,” 2008. [7] J. Kingman, Poisson Processes, 1st ed. Oxford University Press, 1993. [8] G. Samoradnitsky and M. S. Taqqu, Stable Non-Gaussian Random Processes, 1st ed. Chapman and Hall, 1994. [9] R. K. Ganti and M. Haenggi, “Interference in ad hoc networks with general motion-invariant node distributions,” in Proc. IEEE Int. Symp. on Inform. Theory, Toronto, CANADA, Jul. 2008, pp. 1–5. [10] H. Cramer, Mathematical methods of statistics, Princeton University Press, 1999 [11] P. Carr, H. Geman, D. Madan, and M. Yor, “The fine structure of asset returns: An empirical investigation,” The Journal of Business, vol. 75, no. 2, pp. 305–332, 2002. [12] J. Gil-Pelaez, “Note on the inversion theorem,” Biometrika, vol. 38, no. 3/4, pp. 481–482, Dec. 1951. 978-1-4244-5638-3/10/$26.00 ©2010 IEEE