Opportunistic Spectrum Access in Wide-band Cognitive

advertisement
University of Genoa
Ph.D. Program in Space Science and Engineering
CYCLE XXVI
Doctor of Philosophy Thesis
Opportunistic Spectrum Access
in Wide-band Cognitive Radios
via Compressive Sensing
SSD: ING-INF 03
Author:
Supervisor:
Chairperson:
Sk. Shariful Alam
Prof. Carlo S. Regazzoni
Prof. Silvano Cincotti
April 2014
Design is not just what it looks like
and feels like - Design is how it works
( Steve Jobs)
Abstract
With the increasing emergence of new wireless systems and
the explosive development of mobile internet applications, the demands on Radio Frequency spectrum have been constantly increasing, and therefore, the related demands for bandwidth, wireless communication technology is facing a potentially scarcity of
radio spectrum resources. However, spectrum measurement campaigns have shown that the shortage of radio spectrum is due to
inefficient usage and static spectrum allocation policies. Thus, to
be able to meet the requirements of bandwidth and spectrum utilization, spectrum underlay access, one of the techniques in Cognitive Radio Networks, has been proposed as a frontier solution
to deal with this problem.
Nowadays, cognitive radio is one of the most promising paradigms
in the arena of wireless radio communications, as it provides the
proficient use of radio resources. In the Cognitive Radio networks,
the Cognitive Radio (CR) can dynamically regulate its transmission parameters. Proper utilization of the radio spectrum can be
performed by the scheme of dynamic spectrum accessing which
is undoubtedly necessary. To regulate its Radio Frequency (RF)
transmission properties, the CRs are required to sense the radio
spectrum periodically for being aware of the licensed users. The
enhancement of the spectrum efficiency can opportunistically be
iii
iv
achieved by dynamic spectrum management schemes
The thesis is divided into an introduction part and five parts
based on peer-reviewed international research publications. The
introduction part provides the reader with an overview and background on Cognitive Radio Networks. In this thesis work, we
wish to present various approaches for Dynamic Spectrum Access
schemes and a survey of spectrum sensing methodologies for cognitive radio networks. Also, the challenges associated with spectrum
sensing and dynamic spectrum access techniques are analyzed.
Wideband spectrum sensing is a challenging task due to the
constraints of Digital Signal Processing) unit using in extant wireless systems. Compressive Sensing is a new paradigm in signal
processing, chosen for sparse wideband spectrum estimation with
compressive measurements, thus provides relief of high-speed Digital Signal Processing (DSP) requirements of CR receivers. In CS,
whole wideband spectrum is estimated to find an opportunity for
a CR usage requiring significant computation as well as sensing
time, hence shrinkage the achievable throughput of CRs. In this
paper, a novel model-based CR receiver wideband sensing unit is
addressed where a significant portion of the wideband spectrum
is approximated through compressed sensing rather than recovering the entire wideband spectrum. This model necessitates lesser
sensing time and lower computational burden to detect a signal
and as a result a level up of throughput is obtained.
University of Genova – DITEN
Contents
Abstract . . . . .
List of Figures .
List of Tables . .
List of Acronyms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. iii
. viii
. xi
. xiii
1 Introduction
1.1 Motivations: Spectrum Sensing for Dynamic Spectrum Access . . . . . . . . . . . . . . . . . . . . . .
1.2 Preliminaries of Cognitive Radio Networks . . . . .
1.2.1 Spectrum holes . . . . . . . . . . . . . . . .
1.2.2 Cognitive radio features . . . . . . . . . . .
1.3 Challenges of Dynamic Spectrum Access in Cognitive Radio Networks . . . . . . . . . . . . . . . . .
1.4 Objectives and Research Contributions . . . . . . .
1.5 Thesis Outline . . . . . . . . . . . . . . . . . . . .
8
10
12
2 State of the Art and Literature Reviews
2.1 Introduction . . . . . . . . . . . . . . . . . .
2.2 Dynamic Spectrum Access in CR Networks
2.2.1 Hierarchical access model . . . . . .
2.2.2 Dynamic exclusive use model . . . .
2.2.3 Open sharing model . . . . . . . . .
15
16
18
19
21
23
v
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
3
4
5
6
vi
CONTENTS
2.3
.
.
.
.
.
.
.
.
.
26
27
32
40
41
41
42
42
43
Overview of the Proposed Approach
3.1 Introduction . . . . . . . . . . . . . . . . . . . . .
3.2 Measurement Matrix of Compressive Sensing (CS)
Recovery . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Sparsity Level Detection . . . . . . . . . . . . . . .
3.4 Signal Reconstruction Algorithm . . . . . . . . . .
3.4.1 Discrete Walsh-Hadamard transform coding
3.4.2 Discrete cosine transform . . . . . . . . . .
3.4.3 Discrete Fourier transform (DFT) . . . . .
3.5 Different Schemes of CS Recovery . . . . . . . . . .
3.5.1 Basis pursuit . . . . . . . . . . . . . . . . .
3.5.2 Orthogonal Matching Pursuit . . . . . . . .
3.6 Simulations and Analytic Results . . . . . . . . . .
3.6.1 Normalized Mean Squared Error (MSE) performance . . . . . . . . . . . . . . . . . . .
3.6.2 Average execution time comparisons: . . . .
3.6.3 Detection performance versus compression
ratio . . . . . . . . . . . . . . . . . . . . . .
45
45
2.4
2.5
2.6
2.7
3
Spectrum Sensing Techniques . . .
2.3.1 Narrowband sensing . . . .
2.3.2 Wideband sensing . . . . .
Cooperative Spectrum Sensing . .
Signal Estimation Schemes . . . .
2.5.1 Parametric methods . . . .
2.5.2 Nonparametric methods . .
MIMO Scheme in Cognitive Radios
Summary . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
46
48
49
50
51
53
54
56
57
59
60
61
62
4 Compressive Sensing for Wideband Cognitive Radios
65
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . 66
University of Genova – DITEN
CONTENTS
vii
4.2
Signal model . . . . . . . . . . . . . . . . . . . . .
70
4.3
System Model and Problem Formulation . . . . . .
72
4.4
Computational Complexity of the Proposed Method 73
4.5
Performance Analysis and Simulation Results . . .
76
4.6
Achievable Throughput of a Stand-Alone CR Terminal . . . . . . . . . . . . . . . . . . . . . . . . .
81
Summary . . . . . . . . . . . . . . . . . . . . . . .
85
4.7
5 Cooperative Compressive Sensing for Wideband Cognitive Radios
87
5.1
Introduction . . . . . . . . . . . . . . . . . . . . . .
87
5.2
System Model . . . . . . . . . . . . . . . . . . . . .
88
5.3
Decision Fusion . . . . . . . . . . . . . . . . . . . .
90
5.4
Performance Comparison and Simulation Results .
91
5.5
Practical Implementation Challenges . . . . . . . .
95
5.5.1
Degrees of freedom to enhance detection performance . . . . . . . . . . . . . . . . . . .
96
5.5.2
Detection without estimation . . . . . . . .
97
5.5.3
Shortcomings in signal detection . . . . . .
98
5.5.4
Random Demodulator (RD)/ Analog-to-Information
Converter (AIC) implementation issues . . 102
5.5.5
Summary . . . . . . . . . . . . . . . . . . . 103
6 MIMO Scheme for Opportunistic Radio Systems 105
6.1
Introduction . . . . . . . . . . . . . . . . . . . . . . 106
6.2
Problem Definition . . . . . . . . . . . . . . . . . . 109
6.3
Transmit Beamforming . . . . . . . . . . . . . . . . 113
6.4
6.3.1
Channel model . . . . . . . . . . . . . . . . 114
6.3.2
Derivation of the achievable rates . . . . . . 116
6.3.3
Computation of matrix A . . . . . . . . . . 118
Explicit ZF-BF Scheme for a CR System . . . . . . 118
University of Genova – DITEN
viii
6.5
6.6
6.7
CONTENTS
Linear Pre and Post Processing Requirements to
Exploit Unique Degree of Freedom . . . . . . . . . 121
Computational Load Required at the CR Nodes . . 125
Summary . . . . . . . . . . . . . . . . . . . . . . . 136
Conclusions and Future Work
136
Bibliography
143
University of Genova – DITEN
List of Figures
1.1
Spectrum used by Primary Users (PUs) . . . . . .
4
2.1
Fundamental classification of dynamic spectrum access . . . . . . . . . . . . . . . . . . . . . . . . . .
19
(a) Spectrum Underlay, (b) Spectrum Overlay (e.g.
Spectrum Pooling or OSA) . . . . . . . . . . . . .
20
2.3
Hierarchy of spectrum sensing in cognitive radio .
28
3.1
Normalized MSE performance versus compression
rate, M
N (setting SNR = 20 dB) . . . . . . . . . . .
61
2.2
3.2
3.3
3.4
4.1
4.2
M
N
Execution time versus compression rate,
(setting
SNR = 20 dB). . . . . . . . . . . . . . . . . . . . .
62
rate, M
N .(setting
Detection probability versus compression
SNR = 20 dB) . . . . . . . . . . . . . . . . . . . .
63
Influence of compression ratio on the detection performance. . . . . . . . . . . . . . . . . . . . . . . .
64
Schemetic block to detect the sparse wideband segment. . . . . . . . . . . . . . . . . . . . . . . . . .
73
Influence of compression ratio on the detection performance. . . . . . . . . . . . . . . . . . . . . . . .
77
ix
x
LIST OF FIGURES
4.3
Detection performance as a function of compression
ratio M
N . . . . . . . . . . . . . . . . . . . . . . . .
78
Order of computational burden needed with the influence of no. of filters. . . . . . . . . . . . . . . . .
79
4.5
Order of memory space requirement with the influence of no. of filters. . . . . . . . . . . . . . . . .
80
4.6
Graphical structure of a typical frame of a CR data
transmission. . . . . . . . . . . . . . . . . . . . . .
81
Simulation of achievable rate against sensing time
for a fixed frame length . . . . . . . . . . . . . . .
83
Illustration of the achievable rate against Frame
length for a fixed sensing time . . . . . . . . . . . .
84
Influence of the CR Achievable rate on the sensing
time . . . . . . . . . . . . . . . . . . . . . . . . . .
84
5.1
Detection probability as a function of sparsity. . .
93
5.2
ROC performance of stand-alone and cooperative
narrowband CR nodes. . . . . . . . . . . . . . . . .
94
ROC performance of stand-alone and cooperative
wideband CR nodes. . . . . . . . . . . . . . . . . .
95
4.4
4.7
4.8
4.9
5.3
6.1
The considered Multiple Input Multiple Output (MIMO)
interference channel model. In the same region
three primary systems, having overall M1 = 3 transmitting and N1 = 4 receiving antennas, operate in
a given frequency band. The primary systems are
thought as half-duplex systems but for full duplex
systems an analogous scheme applies. A MIMO
secondary system with M2 transmitting and N2 receiving antennas would like to reliably communicate in the same band without affecting the transmissions of primary systems. . . . . . . . . . . . . 111
University of Genova – DITEN
LIST OF FIGURES
6.2
6.3
6.4
6.5
Processing chain for the secondary transmitter and
receiver when just one degree of freedom is available
to the secondary system. . . . . . . . . . . . . . . .
Processing chain for the secondary transmitter and
receiver according to [17], independently of the number of degrees of freedom of the secondary system
(the case it is equal to one being included). . . . .
Computational load expressed in flops required by
the secondary transmitter and receiver proposed in
Fig. 6.2, when M1 = N1 . This load is compared
with some meaningful approximation of the flops
required by the secondary transmitter and receiver
shown in Fig. 6.3, under the same condition. . . .
Computational load expressed in flops required by
the secondary transmitter and receiver proposed in
Fig. 6.2, when M1 = N1 +1. This load is compared
with some meaningful approximation of the flops
required by the secondary transmitter and receiver
shown in Fig. 6.3, under the same condition. . . .
University of Genova – DITEN
xi
124
127
134
135
xii
LIST OF FIGURES
University of Genova – DITEN
List of Tables
2.1
Comparison of different spectrum sensing schemes
[73]. . . . . . . . . . . . . . . . . . . . . . . . . . .
xiii
33
xiv
LIST OF TABLES
University of Genova – DITEN
List of Acronyms
AWGN
Additive White Gaussian Noise
AIC
Analog-to-Information Converter
ADC
Analog-to-Digital Converter
AR
Auto-Regressive
ARMA
Auto-Regressive Moving Average
BP
Basis Pursuit
BPF
Band-Pass Filter
CR
Cognitive Radio
CM
Cognitive Manager
CRN
Cognitive Radio Network
CS
Compressive Sensing
CSI
Channel State Information
CoSaMP Compressive Sampling Orthogonal Matching Pursuit
DWHT
Discrete Walsh Hadamard Transform
xv
xvi
LIST OF TABLES
DFT
Discrete Fourier Transform
DCT
Discrete Cosine Transform
DoF
Degree of Freedom
DSA
Dynamic Spectrum Access
DSP
Digital Signal Processing
DM
Decision Maker
DVB-T
Digital Video Broadcasting-Terrestrial
FCC
Federal Communications Commission
GLRT
General Likelihood Ratio Test
iid
independent and identically distributed
KLT
KarhunenLove Transform
MA
Moving Average
MAC
Medium Access Control
MASS
Multi-rate Asynchronous wideband Sub-Nyquist
Sampling
MP
Matching Pursuit
MSE
Mean Squared Error
MWC
Modulated Wideband Converter
MIMO
Multiple Input Multiple Output
NP
Neyman-Pearson
NNZ
Number of Non-Zero
University of Genova – DITEN
LIST OF TABLES
OSA
Opportunistic Spectrum Access
OMP
Orthogonal Matching Pursuit
OSGA
One-Step Greedy Algorithm
OFDM
Orthogonal Frequency Division Multiplexing
PSD
Power Spectral Density
PU
Primary User
QoS
Quality of Service
RAN
Radio Access Network
RD
Random Demodulator
ROC
Receiver Operating Characteristics
RF
Radio Frequency
RIP
Restricted Isometry Property
SCF
Spectral Correlation Function
SDR
Software-defined Radio
SVD
Singular Value Decomposition
UR
Underlay Radio
VHF
Very High Frequency
WSS
Wide-Sense Stationary
WHT
Walsh Hadamard Transform
ZFBF
Zero-Forcing Beam-Forming
DBN
Dynamic Bayesian Network
University of Genova – DITEN
xvii
xviii
LIST OF TABLES
University of Genova – DITEN
Chapter 1
Introduction
The strategy of static spectrum allocation policies leads spectral underutilization, an innovative technology named Cognitive
Radio (CR), has been designed to exploit spectrum white spaces.
Spectrum sensing is the most crucial part upon which the full
operation of CR relies.
In particular, a CR should explore the information about spectrum white spaces and geographical location which is then opportunistically utilized by the CRs, thus leads enhanced spectrum
efficiency. Several narrowband spectrum sensing algorithms have
been studied in the literature [34], [10] [32] [82] [73] and references therein, including matched-filtering, energy detection, and
cyclostationary feature detection.
To obtain higher opportunistic throughput for different multimedia data services wideband spectrum sensing [25] [69] [61]
is necessary for future interoperable wireless networks as Shannons formula says that, under certain conditions, the maximum
theoretically throughput is directly proportional to the spectral
bandwidth. However, conventional wideband spectrum sensing
1
2
Chapter 1 : Introduction
techniques becomes challenging due to high sampling frequency
functioning at or above Nyquist rates could lead implementation complexity [53]. There are several wideband sensing approaches exploiting sub-Nyquist sampling commonly known as
Compressive Sensing (CS), thus employs relief of high-speed Digital Signal Processing (DSP)) units and is elaborately illustrated
in [53] [23] [15] [72] [19].Wideband spectrum sensing is the key
technology that enables the efficient operation of both the primary user and the CR networks. However, wideband spectrum
sensing systems are difficult to design, due to either high implementation complexity or high energy consumption from high-rate
analog-to-digital converter (ADC).
This thesis points out the issues of wideband spectrum sensing in CR networks. It is proposed an efficient way for wideband
cognitive receiver sensing unit that estimate the highly sparse segment of wideband through compressed sensing rather than entire
wideband signal and then discover spectral opportunity for a cognitive user. The proposed model deals with the highly-sparse signal segment which provides better spectral estimation and hence
improves the detection performance, demonstrated by the simulation. Eventually, reduction of computational complexity as well
as a level up of detection performance of the proposed method
has sorted out compared to a single Radio Frequency (RF) chain
followed by compressed sensing. Therefore, a reduction of computational complexity is addressed without interfering with the
detection performances, evaluated after spectrum estimation of a
preferred band of interest by means of a well-known energy detector.
University of Genova – DITEN
1.1 Motivations: Spectrum Sensing for Dynamic
Spectrum Access
1.1
3
Motivations: Spectrum Sensing for
Dynamic Spectrum Access
The radio frequency (RF) spectrum is a limited natural resource regulated by government agencies, such as the federal communications commission (FCC) [2] in the United States. Under
current policy, all frequency bands are exclusively and statistically
licensed to wireless networks on a particular time period for a specific geographical location, and every system has assigned a fixed
frequency band. In recent years, due to the support of huge number of wireless systems and wireless multimedia services, it has become evident that there will not be enough spectrum exclusively
available for all wireless systems currently under development.
Interestingly, the spectrum policy task force (SPTF) within the
FCC has reported that localized temporal and geographic spectrum utilization efficiency ranges from 15% to 85% [2].
Therefore, the most crucial task of unlicensed radio (also termed
as simply Cognitive Radio in literature) is to reliably identify
available frequency bands across multiple dimensions like time,
space, frequency, angle and code etc., and efficiently exploit them
by dynamically updating its transmission parameters under the
stringent requirement of avoiding interference to the Primary User
(PU)s of that spectrum. To accomplish this, the CRs rely on robust and efficient spectrum sensing to identify vacant frequency
bands under uncertain RF environment and to detect PUs with
high probability of detection, as soon as the incumbents become
active in the band of interest [73]. If the spectrum hole is reacquired by a PU, the CR should vacate the band or adjust its
transmission parameters to accommodate the PU or , if available/possible, shift to another spectrum hole. Many extensive
studies have been carried out to develop efficient and reliable specUniversity of Genova – DITEN
4
Chapter 1 : Introduction
trum sensing methods. Despite numerous spectrum sensing algorithms being reported in the literature [69] [15] [64] [53], few of
them are effective for wideband spectrum sensing due to energy
and hardware constraints.
Power
Frequency
Spectrum
used by PUs
Opportunistic
access
Spectrum
white space
Time
Figure 1.1: Spectrum used by Primary Users (PUs)
1.2
Preliminaries of Cognitive Radio Networks
In this section, we would like to address some basic features
which relate to Cognitive Radio. Cognitive radio is essentially
an evolution of Software-defined Radio which is formally defined
by Federal Communications Commission [2] as A Cognitive Radio is a radio that can change its transmitter parameters based
on interaction with the environment in which it operates. The ulUniversity of Genova – DITEN
1.2 Preliminaries of Cognitive Radio Networks
5
timate objective of CR is to utilize the underutilized spectrum.
In essence, this means that CR introduces intelligence to conventional radio such that it searches for a vacant spectrum spaces or
a spectrum hole [73].
1.2.1
Spectrum holes
A spectrum hole is originally defined as a band of frequencies
which are readily assigned to a PU, however, it may not be always
used by the PU at a specific time or a geographic area [41]. Depending on the communication environment, the spectrum holes
can be identified following frequency and time (Fig. 1.1):
• Spectrum hole in time domain: This is defined as a frequency band that is not currently being occupied by a PU
for a certain period of time. By using advanced spectrum
sensing techniques, a CR can detect spectrum holes and opportunistically access it without degrading any Quality of
Service (QoS) of the licensed user or the PU.
• Spectrum hole in frequency domain: It is a contiguous frequency band in which activities of the CR do not cause any
harmful interference to the PUs.
• Spectrum hole in spatial domain: This is a frequency band
in a specific geographic location area where the PU transmission is being occupied. The CR can utilize this empty
band opportunistically if it is outside this location (see 1.1).
Additionally, spectrum holes may also be categorized into socalled spaces as follows [41]
• White spaces: In spectrum white spaces, license bands
are no more exist at that time, only natural noises such as
broadband thermal noise and impulsive noise are present.
University of Genova – DITEN
6
Chapter 1 : Introduction
• Gray spaces: In gray spaces which partially filled by low
power interferers.
• Black spaces: Those places are occupied by the high priority licensed users which is also called as PUs.
According to the space classification, a CR node can transmit
in the gray and white spaces, but it is prohibited to operate in
the black space once the PU is active. On the basis of spectrum
hole concepts, an important definition of CR, which is generally
accepted by the research community, has been given in [41]: is an
intelligent wireless communication system that is aware of its surrounding environment (i.e., outside world), and uses the methodology of understanding-by-building to learn from the environment
and adapt its internal states to statistical variations in the incoming RF stimuli by making corresponding changes in certain
operating parameters (e.g.,transmit-power, carrier-frequency, and
modulation strategy) in real-time, with two primary objectives in
mind :
1. Highly reliable communications whenever and wherever needed;
2. Efficient utilization of the radio spectrum.
Clearly, the awareness and adjustment according to the fluctuations of the radio environment to create reliable communications
and efficient spectrum utilization are the most important criteria
in a Cognitive Radio Network (CRN).
1.2.2
Cognitive radio features
Cognitive capabilities are the most different characteristics of
a CRN from traditional wireless communication networks. These
capabilities allow an CR to observe the surrounding radio environment such as available frequency, interference temperature, noise
University of Genova – DITEN
1.2 Preliminaries of Cognitive Radio Networks
7
power, distance, and so on. Depending on the collected information, the CRs will make decisions about the selected frequency,
transmit power level, or modulation scheme, to achieve an optimal performance. In fact, to implement the CRN in practice, it
should have main characteristics as follows [48]
• A CR should take advantage of efficient spectrum sensing
and analysis techniques so that the CR can maintain continuous spectrum and keep a reliable communication.
• A CR should utilize dynamic spectrum access approaches
which can adapt to the fluctuating nature of the CRN.
• A CR should be equipped with a unified cross-layer architecture in order to meet different QoS demands.
• A CR should share the spectrum information with other
users and coordinate communication to cause minimal interference or no collisions to the PUs occupying the same
frequency bands.
Another key feature of CR is reconfigurability. In order to
adapt with the RF environment, the CR should have the capability of changing its operational parameters [5]
• The CR is capable of changing its operating frequency in
order to avoid the PU or to share spectrum with other users.
• The CR should adaptively reconfigure the modulation scheme,
according to the user requirements and the channel conditions.
• Within the power constraints, transmission power can be reconfigured in order to mitigate interference or improve spectral efficiency.
University of Genova – DITEN
8
Chapter 1 : Introduction
• The CR can also be used to provide interoperability among
different communication systems by changing modulation
scheme etc.
Spectrum sensing is the foundation of all other cognitive radio
functions. The other functionalities of the CR can be spectrum
sharing, spectrum management and spectrum mobility. The first
functionality (spectrum sharing) are related to coordination and
reconfiguration among cognitive radio terminals. However, the
last two functionalities require interactions with all other layers
for exchanging information about QoS requirements, application
control, routing, reconfiguration, and scheduling.
1.3
Challenges of Dynamic Spectrum Access in Cognitive Radio Networks
Overall, the benefits of the CRN are obvious. However, there
are many challenging problems that need to be solved before
CRNs can be implemented in practice such as [6]
1. Common control channel: A common control channel
supports many functionalities of a CRN. It is an efficient
approach to exchange information during spectrum sensing
and communication of the CR. However, this channel is
not always available due to the randomness appearance of
the PU. It can be occupied by the PU at an unpredictable
time. In this context, a fixed common control channel implemented for the CRN is in-feasible. In order to properly
operate in a CRN, the common control channel setup and
its maintenance mechanism are expected to need more advanced investigations.
University of Genova – DITEN
1.3 Challenges of Dynamic Spectrum Access in
Cognitive Radio Networks
9
2. Channel estimation: To protect the communication among
the PUs and enhance the performance of the CRNs, channel
information between the cognitive and the primary terminals are very important. Though,in real radio environment,
it is difficult to obtain the exact Channel State Information (CSI) due to fading, path loss, delay, and so on.
3. Common control channel: A common control channel
supports many functionalities of a CRN. It provides an efficient way to exchange information during spectrum sensing
and communication of the CRs. However, control channel is
not always available due to the randomness appearance of
the PU. It can be occupied by the PU at an unpredictable
time. In this context, a fixed common control channel implemented for the Cognitive Radio Network is in-feasible.
In order to properly operate in a CRN, the common control
channel setup and its maintenance mechanism are expected
to need more advanced investigations.
4. Joint sensing and access: The sensing and accessing
of spectrum are usually designed separately. Though their
should be a trade-off to optimize the Cognitive Radio sensing time and power allocation in multiband CRNs [63]. One
of the most concerned problems in CRNs is how to sense
multiple channels and utilize these multiple random channels efficiently.
5. Location information: Knowing distances between the
PU and the CR are crucial in a CRN. Based on the distance among users, the CR can regulate its communication
parameters to cancel interference and enhance system performance. Existing works often assume that the information about distance and PU transmit power are available
University of Genova – DITEN
10
Chapter 1 : Introduction
for simple investigation. However, this assumption may not
be always true in a practical CRN.
6. CRN architectures: To implement a CRN with full characteristics of CRN prototypes, a cross-layer architecture of
the CRs is essential. An expected cross-layer architecture
for the CR should be flexible to meet different QoS requirements. This is a complicated problem and desires more investigations.
1.4
Objectives and Research Contributions
The aim of this thesis is to study the performance of wideband spectrum sensing algorithms, and develop efficient wideband
spectrum sensing techniques which provides more opportunistic
access to the CRs, less computational burden that can be used in
distributed and cooperative cognitive radio networks. The main
contributions from the research activities are divided in:
• Opportunistic Spectrum Access: (the following contributions have been published in [10]. In this chapter, various
aspects of Dynamic Spectrum Access schemes are presented,
together with a brief discussion of the pros and cons of each
algorithm of spectrum sensing methodologies from CR perspective. Additionally, the future challenges are investigated
that are associated with Dynamic Spectrum Access (DSA)
and spectrum sensing techniques. Moreover, special attention is paid to the challenges associated with wideband sensing.
• Enhanced Performance in Wideband CS: A novel
wideband CR receiver sensing module has been proposed
University of Genova – DITEN
1.4 Objectives and Research Contributions
11
which estimates a highly-sparse part of the whole wideband
to find an opportunistic access to a CR (the following contributions have been published in [8] [11] [9]. Refer to chapter
4)
1. As this approach deals with a portion of the whole
wideband, thus requires less computational complexity and less physical memory [11].
2. Again, to estimate a portion of the wideband requires
less execution time for spectrum sensing which means
a CR may get more time for data transmission. Hence,
higher achievable rate is possible for the CR network
[9].
3. The theory of CS tells us that the more the sparsity
present in the signal, the better the signal reconstruction leading to better detection performance. As a result, our scheme provides better probability of detection, published in [8]
• Cooperative Compressed Sensing: Refer to Chapter 5
1. A cooperative Cognitive Radio Network is formed exploiting proposed cognitive radio receiver and analyze
the detection performance.
• Multiple Input Multiple Output scheme for Opportunistic Radio Systems We propose here a simple transceiver
for Multiple Input Multiple Output (MIMO) employing opportunistic radio systems having just a single degree of freedom. The proposed scheme requires less computational burden than the traditional approach under the same hypothesis resulting less power consumption of a Cognitive Radio.
University of Genova – DITEN
12
1.5
Chapter 1 : Introduction
Thesis Outline
This thesis has aimed at investigating CR opportunistic spectrum access in which the CR transmit power is subject to practical
constraints such as interference power and outage constraint of the
PU, and peak transmit power constraint of the CR.
The thesis consists of seven chapters based on a number of
peer-reviewed conference papers, and one published book chapter
as follows.
In Chapter 1, an introduction to the topics discussed in this
work is presented. In particular, Chapter 1 details the context of
this thesis and emphasizes the main contribution of the research
activities.
In Chapter 2, the state of art schemes of CR systems are described. In particular, state of art of dynamic spectrum access in
CR networks and the spectrum sensing techniques are presented
which are essential for understanding the rest of the chapters.
In section 3.4 of Chapter 3, we illustrate the overview of several
signal acquisition techniques which deals with sparse signals. Furthermore in section 3.6 of Chapter 3, we provide comparisons of
performance study of a well known signal acquisition study while
exploiting different transform coding in measurement matrix.
Chapter 4 describes the problems associated with the traditional wideband Compressive Sensing schemes and we have proposed an innovative CR receiver sensing module which could provides several advantages such as higher probability of detection,
less computational burden and higher achievable rate to the Cognitive Radio Networks.
While Chapter 4 presents an algorithm that extends the single
CR from Chapter 5 in order to deal with multiple CRs to support
a cooperative radio environment.
In Chapter 6, we propose a simple linear transceiver for MulUniversity of Genova – DITEN
1.5 Thesis Outline
13
tiple Input Multiple Output cognitive radio systems while the degree of freedom is considered one. By employing the proposed
approach, the computational burden is significantly reduced comparing with the conventional algorithms achieving the same results
under the same hypothesis.
Last but not least, Chapter 6.7 provides some recommendations and possible future direction of research in CR network.
University of Genova – DITEN
14
Chapter 1 : Introduction
University of Genova – DITEN
Chapter 2
State of the Art and
Literature Reviews
1
Radio spectrum is a precious resource which is shrinking progressively due to inventions of several multimedia applications incorporating in wireless communication systems. Cognitive Radio
is considered as a promising solution to the spectrum scarcity
problems that allows proficient use of radio resources through accessing radio spectrums opportunistically. In order to support
spectrum accessing functionality, the Cognitive Radio (CR) nodes
have the duty to sense the radio environment dynamically for being aware of the highly prioritized licensee while spectrum sensing
is one of the most challenging tasks in the promising CR networks.
1 Contents
of the current chapter have been published in [10]
15
16 Chapter 2 : State of the Art and Literature Reviews
2.1
Introduction
Spectrum scarcity problems occur due to the proliferation of
various wireless devices and services employing static frequency
access schemes and to cope up with this demand, CR is a solution of huge prospect. In the emerging paradigm of opportunistic
radio networks, unlicensed radio users are allowed to transmit opportunistically on a temporarily empty frequency band that is not
currently being accessed by the licensee. The CR can be described
as an intelligent and dynamically reconfigurable radio which itself
can regulate its radio parameters in temporal and spatial domain
according to the requirements of surrounding environment. As
the CR technology allows flexible and agile access to the spectrum, thus improves spectrum efficiency substantially [5]. It has
been reported by the Federal Communications Commission (FCC)
that localized temporal and spatial spectrum utilization is very
poor [2].
Currently, new spectrum policies are being developed by the
FCC that will allow CRs to opportunistically access a licensed
Primary User (PU) band, when the PU does not occupy a frequency band. The growing interest of Dynamic Spectrum Access (DSA) in CR is specially related to the fact that it is considered as a possible solution of the static spectrum allocation
policies and a number of DSA models are proposed in open literatures [5] [34] [86] [21] [10]. In order to dig up the benefit from
DSA, knowledge about the PU vacant bands are necessary and
CRs should be able to independently detect spectral opportunities
without any assistance from PUs; this ability is called spectrum
sensing, which is considered as one of the most challenging tasks
in CR networks [32]. In particular, a CR should explore the information about inactive PU bands and geographical location which
is then opportunistically utilized by the CRs, thus leads enhanced
University of Genova – DITEN
2.1 Introduction
17
spectrum efficiency.
Several narrowband spectrum sensing algorithms have been
studied in the literature [34], [10] [32] [82] [73] and references
therein, including matched-filtering, energy detection, and cyclostationary feature detection. To obtain higher opportunistic
throughput for different multimedia data services wideband spectrum sensing [25] [69] [69] is necessary for future wireless networks as Shannons formula says that, under certain conditions,
the maximum theoretically throughput is directly proportional to
the spectral bandwidth. However, conventional wideband spectrum sensing techniques becomes challenging due to high sampling
frequency functioning at or above Nyquist rates could lead implementation complexity [53]. There are several wideband sensing
approaches exploiting sub-Nyquist sampling commonly known as
Compressive Sensing (CS), thus employs relief of high-speed Digital Signal Processing (DSP) units and is elaborately illustrated
in [53] [23] [15] [72] [44].
This chapter presents an introductory tutorial on DSA schemes
and spectrum sensing for CR viewpoint featuring both non-cooperative
and cooperative sensing strategies and provides comparative analysis among various detection techniques. We begin with a short
review of DSA management methodologies and point out the characteristic features of DSA in Section 2.2. In Section 2.3, we would
like to deliver a comprehensive classification of narrowband and
wideband spectrum sensing schemes. A variety of conventional
and emerging wideband spectrum sensing techniques based on recent advances in detection of narrowband and wideband signal
at CR nodes are illustrated as long as performance comparisons
provided of few schemes. Moreover, the challenges are analyzed
that are associated with spectrum sensing and dynamic spectrum
access techniques. Sensing beacon transmitted from different cogUniversity of Genova – DITEN
18 Chapter 2 : State of the Art and Literature Reviews
nitive terminals creates significant interference to the primary
users if proper precautions have not be not taken into consideration.This is followed by a detailed discussion on the limitations
associated with spectrum sensing at individual CR terminal. Section 2.5 presents signal estimation techniques which is useful to
detect and distinguish of different radio signals( e.g., the PU status). Incorporating multiple antennas in CR improves achievable
capacity that is supporting for different wireless multimedia applications. Therefore, in Section 2.6, we discuss about different
Multiple Input Multiple Output (MIMO) schemes in Cognitive
Radio Network (CRN)s. Lastly, we have drawn some conclusions
in Section 2.7.
2.2
Dynamic Spectrum Access in CR
Networks
Nowadays, wireless communication is suffered from spectrum
scarcity due to newly developed various wireless applications of
them most of which are multimedia applications. The FCC disclosed that the licensed frequency bands are poorly utilized most
of the time and a particular geographic location mainly due to
the conventional command and control type spectrum regulation (i.e., static spectrum allocation) policy that has prevailed
for decades [2], [10]. In order to use the unused licensed spectrum
holes or white spaces, effort is put on achieving DSA. CR can
manage in order to mitigate the spectrum scarcity problem by enabling DSA scheme, which allows CRs to identify the unemployed
portions of licensed band and utilize them opportunistically as
long as the CRs do not interfere with the PUs communication.
A taxonomy of the DSA scheme [10] and references therein is illustrated in the following figure (Fig.2.1). In order to meet the
University of Genova – DITEN
2.2 Dynamic Spectrum Access in CR Networks
19
massive demand of radio spectrum, the CR network has opened
up flexible and agile access to the wireless radio resources, which
in turn, improve spectrum utilization efficiency [5]. The CR is a
dynamically reconfigurable radio which can adjust its radio parameters in response to the surrounding environment. The state
of art of DSA schemes will be discussed in this section.
Figure 2.1: Fundamental classification of dynamic spectrum access
2.2.1
Hierarchical access model
In this model, a hierarchical access pattern for the PUs and
CRs have been discussed. The fundamental concept is to open licensed spectrum to CRs while limiting the interference perceived
by the PUs. This model can be categorized as two different approaches for sharing the spectrum, i.e., spectrum underlay and
spectrum overlay. Spectrum underlay (Fig. 2.2 a) exploits the
spectrum by using it despite of a PU transmission, but by controlling the interference within a prescribed limits. This can be
obtained by using spread spectrum techniques, resulting in a signal with large bandwidth but having low Power Spectral Density (PSD), which can coexist with PUs. In an underlay sysUniversity of Genova – DITEN
20 Chapter 2 : State of the Art and Literature Reviews
tem, regulated spectral masks impose stringent limits on radiated
power as a function of frequency, and perhaps location [86]. Due to
power limitation, Underlay Radio (UR)s must spread their signals
across large bandwidths with lower energy, and/or operate at relatively low rates. An advantage of such a system is that radios can
be dumb, they do not need to sense the channel in order to defer
to PUs. The underlying principle is that the PUs are either sufficiently narrowband or sufficiently high-powered or the URs are
sufficiently fast frequency hopping with relatively narrow bandwidth usage in each dwell, so that there is little interference from
the URs. As the signal is spread out over a large bandwidth, URs
can use spread spectrum signaling systems, wideband Orthogonal Frequency Division Multiplexing (OFDM) or impulse radio.
Because of the large front-end bandwidth, URs are susceptible to
interference from a sort of co-existing sources, including relatively
narrowband signals from PUs. In summary, URs tend to be complex in terms of hardware implementation, front-end interference
suppression, high-fidelity low-power high-rate Analog-to-Digital
Converter (ADC) circuit design, and estimation and equalization
of long delay-spread channels. An UR could sense the spectrum
as to shape its transmitted signal to avoid band congestion which
requires reliable spectrum sensing like spectrum overlay systems.
Spectrum overlay intends to use empty PU bands in an oppor-
Figure 2.2: (a) Spectrum Underlay, (b) Spectrum Overlay (e.g.
Spectrum Pooling or OSA)
University of Genova – DITEN
2.2 Dynamic Spectrum Access in CR Networks
21
tunistic way without interfering PUs, indicating that the spectrum
should be monitored periodically by the CRs and seeking absence
of PUs to utilize the unoccupied band. Opportunistic Spectrum
Access (OSA) can be applied in either temporal or spatial domain.
For the first case, CRs exploit temporal spectrum opportunities
resulting from the bursty trafc of PUs and in latter case, CRs
aim to exploit frequency bands that are not being occupied by
the PUs in a specific geographic location [86], e.g., the reuse of
various TV white spaces that are very often used for TV broadcasting (e.g., digital TV transmission) in a particular geographic
location. In the TV broadcasting system, TV-bands assigned to
adjacent regions are different to avoid co-site interference. This
results in unused frequency bands varying over space. Spectrum
overlay mechanism is shown in 2.2b. OSA is also termed as interweaving of frequencies, is therefore done by doing some pre-coding
at the transmitter to lessen the interference at the receiver. This
technique is also known as dirty paper coding [21] and references
therein. The majority of existing work on OSA focuses on the spatial domain where spectrum opportunities are considered static or
slowly varying in time. As a consequence, real-time opportunity
identification is not as critical a component in this class of applications, and the prevailing approach tackles network design in
two separate steps: (i) opportunity identification considering continuous full spectrum sensing (ii) opportunity allocation among
CRs assuming perfect knowledge of spectrum opportunities at any
location over the entire spectrum.
2.2.2
Dynamic exclusive use model
In this model, the radio spectrum is licensed to a user or a
service for exclusive usage under an agreement to enhance the
spectrum efficiency and this model maintains the basic structure
University of Genova – DITEN
22 Chapter 2 : State of the Art and Literature Reviews
of spectrum regulation policy. Two schemes like spectrum property rights and dynamic spectrum allocation have been proposed
under this model [86].
2.2.2.1
Spectrum property rights
Generally, when PUs do not utilize their spectrum the PUs can
sub-lease those underutilized spectrum to third party thus can do
spectrum trading. This type of spectrum trading can be given the
right to exclusively use those resources without being mandated by
a regulation authority. This approach is called spectrum property
rights, as the license or the right is based on the three spectrum
properties as fixed frequency band, time and a geographic location
and detailed can be found in [10]. One of the most important
difficulties in applying this scheme lies in the unpredictability of
radio wave propagation in both frequency and space. Spectral and
spatial spillover is unavoidable, unpredictable, and depending on
the characteristics of both transmitters and receivers.
2.2.2.2
Dynamic spectrum allocation
The temporal and spatial traffic statistics are explored, which
is valuable for sub-leasing long-period of applications. Sub-leasing
based on traffic statistics leads to a much more exible spectrum
allocation than in the previous fixed spectrum allocation scheme.
As an example, the spectrum assigned to UMTS and Digital Video
Broadcasting-Terrestrial (DVB-T) can differ over temporal basis
and geographic location. DSA opens new possibilities of multiple
radio communications infrastructures when optimized interworking is considered. Firstly, to access every service operators can
allocate spectrums inside a radio network according to local and
temporal needs. Secondly, users on the move are provided with
the benefit of accessing enhanced internet protocol (IP) based moUniversity of Genova – DITEN
2.2 Dynamic Spectrum Access in CR Networks
23
bile services on the fly and wherever they are in a cost efficient
way [34]. Multiple networks regulation policy and issues in the
context of temporal and spatial DSA algorithms are pointed out
in [34]. The typical operational steps in temporal DSA algorithm
include:
1. Periodic triggering of DSA algorithm,
2. Management of the traffic on the carriers,
3. Prediction of the loads on the networks and
4. Access decision while the goal of spatial DSA is to allocate
spectrum to Radio Access Network (RAN)s according to the
traffic requirements in each location using DSA scheme.
Still, the spectrum allocations of different RANs belong to adjacent DSA areas should not overlap in the same portion of spectrum
to avoid interference. A guard band of suitable size guarantees
the coexistence of the different radio systems. The structure of
an usual spatial DSA scheme can be summarized in three main
steps:
1. Calculating the spectrum overlap,
2. Performing initial assignment and
3. Optimize the spectrum usage.
2.2.3
Open sharing model
The two models addressed in dynamic exclusive model deals
with the opportunistic usage of the license band, while open sharing model accepts an empty band focused only peer users. Mostly,
technical features of this model are close to the traditional Medium
Access Control (MAC) issues and this model can be categorized as
University of Genova – DITEN
24 Chapter 2 : State of the Art and Literature Reviews
centralized and distributed modes. In a centralized model, there
is one Cognitive Manager (CM) presents controlling the entire
CM environment. The CM can be an intelligent system and the
problem can be seen as an optimization problem. The centralized
approach considers that there is a reliable pilot channel connecting
each CRs to the CM. In fact, the CM has great influence on the
proficient spectrum usage, as well as reconfigure other transmission parameters e.g., transmit-power, signal-to-noise ratio(SNR),
modulation scheme, etc. In this model, coordination between
pairs or coalitions of pairs can facilitate the spectrum sensing,
competent use of radio resources and enhance the quality of the
information by which the pairs can rely to make their decisions.
Centralized dynamic spectrum access can be studied in two ways
as optimization approach and auction-based approach [32]. With
an optimization-based approach, different types of optimization
problems can be formulated (e.g., convex optimization, assignment problem, linear programming, and graph theory). While
auction based spectrum access mainly states the spectrum trading in a business oriented viewpoint. Here, every CR offers price
for a specific band of interest to the spectrum owner or broker and
the highest bidder will then get access to utilize it for a certain
time period. Though, in most of practical scenarios e.g., in adhoc CR networks, incorporating a CM is problematic [32] while
distributed DSA suits well in such networks. As there is no CM
present, every CR user has to gather, exchange, and process the
information about the surrounding environment independently.
Further, independent decisions would be taken by the CRs based
on available radio environment information thus, the CRs obtain
its performance objective under interference constraints. In the
following we will present methodologies where a CM is absent in
the collaborative environment and how the learning capability can
University of Genova – DITEN
2.2 Dynamic Spectrum Access in CR Networks
25
be employed in such cooperative scenario.
2.2.3.1
Cooperative or non-cooperative behavior
Due to the absence of a CM, a CR user can adopt either cooperative or non-cooperative behavior. When a CR operating in
cooperative mode will make a decision on spectrum access concerning the performance of the overall network (i.e., a collective
objective), however, this decision may not result in the highest
individual benefit of individual CR user. On the other hand, a
CR user with non-cooperative behavior will make a decision that
is opposite to cooperative behavior i.e. it wants to maximize the
individual performance while without concerning about the network performance. This behavior is also known as selfish behavior
of a CR terminal. In [21], it is discussed that game theory and
iterative water filling approach can be used for the distributed
DSA. To pertain game theory to the process of decision making
in a CR, the decision making process needs to be modelled as a
game. First of all, it should be checked whether it is a centralized or a distributed DSA model (i.e., the centralized or the distributed open sharing model). Secondly, it must be decided which
performance metric (i.e., the throughput or the latency) is to be
optimized. Thirdly, all information about any CR in the environment of the decision maker needs to be collected (i.e., the possible
actions and the preferred strategy). With non-collaborative behavior, all network information is gathered and processed locally
by each CR nodes while without interactions among the CRs. In
contrary to collaborative behavior, the CR users can exchange network information with each other. Typically, collaboration among
CR users to exchange network information is required to achieve
collective goal. In fact, if the CRs are collaborative, they could
be either cooperative or non-cooperative as the CRs may agree
University of Genova – DITEN
26 Chapter 2 : State of the Art and Literature Reviews
to reveal some information (e.g., the chosen spectrum access action), but they make a decision to achieve their own objectives
(non-cooperative), rather than a group objective (cooperative).
A protocol will be needed to exchange network information for
the collaboration among CRs. However, when a CR node possesses non-cooperative behavior, the network information has to
be observed and learned individually. Therefore, learning ability
plays an important role for sorting out intelligent decisions concerning radio parameters in the CR distributed DSA management
systems. The learning process can be either non-collaborative or
collaborative. In the case of non-collaborative learning, the knowledge about the system is produced by each individual CRs without interaction with other nodes. On the other hand, the CRs can
exchange network information as well as to process and produce
overall system knowledge and based on this a CR can make the
decision whether to achieve the group objective or its individual
objective.
2.3
Spectrum Sensing Techniques
Radio spectrum is classified as black spaces, grey spaces and
white spaces based on the usage of it [34]. CRs take the advantages from grey and white spaces by opportunistic use. To
reuse the spectrum, spectrum sensing is necessary and there are
different approaches for CR to grasp the spectrum sensing issues.
Based on the band of interest, spectrum sensing techniques can be
classified as narrowband and wideband. The CR is liable to identify the presence of PU transmission hence it is called transmitter
based detection or stand-alone detection [34] which is addressed
for military and many civilian applications for signal detection,
automatic modulation classification, to locate radio source and to
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
27
perform the jamming activities in communication networks. As,
no collaboration is apparent among the CRs hence this method
cannot identify hidden PUs. In this section, some of the most
common transmitter based sensing schemes are addressed.
2.3.1
Narrowband sensing
The most efficient way to sense spectral opportunities is to
detect active primary transmitters in the vicinity of CRs. Here,
the term narrowband implies that the bandwidth of interest is less
than the coherence bandwidth of the channel. We would like to
address a number of narrowband spectrum sensing methods (Fig.
2.3) in the following:
2.3.1.1
Energy detection
A well-known method for spectrum sensing is based on energy
detection (ED) where received PU signal energy is measured in
a specific time period of a particular frequency band of interest.
This technique comprises low computational and implementation
complexities, thus leads to its popularity. In addition, the notable
advantage of this scheme is that it does not require any prior
information about the PUs transmission [82]. While the signal
received at CR node, the PU status is determined by comparing
the output of the ED with a threshold which depends on the
noise floor. The performance of the detection algorithm can be
determined by two probabilities as the probability of detection
Pd and probability of false alarm Pf . ED is considered a noncoherent detection method where knowledge of noise variance is
adequate for choosing threshold to obtain a predetermined false
alarm rate. Meanwhile, to design a standard CR system higher
value of detection probability Pd as well as lower value of false
alarm probability Pf is anticipated. The decision threshold E
University of Genova – DITEN
28 Chapter 2 : State of the Art and Literature Reviews
can be selected for finding an optimum balance between Pd and
Pf however this requires knowledge of noise and detected signal
powers. The noise power can be estimated, while the signal power
is difficult to predict as it changes depending on the transmission
characteristics and the distance between the CR and PU [82]. A
major drawback is that it has poor detection performance under
low SNR scenarios and cannot differentiate between the signals
from PUs and the interference from other cognitive radios.
Figure 2.3: Hierarchy of spectrum sensing in cognitive radio
2.3.1.2
Feature detection
Another promising spectrum sensing technique is based on feature detection. A feature is unique and inherent characteristics
of the PUs signal and it is drawn as pilot signal, segment sync,
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
29
field sync, and also the instantaneous amplitude, phase and frequency [73]. In practice, these features are commonly perceived
many signals employed in wireless communication and radar systems [82]. Cyclostationary feature detection method detects and
distinguishes between different types of PU signals by exploiting
their cyclostationary features. Nowadays, analog to digital conversion has made the use of signal transformation practical in
order to discover a specific feature. The fundamental and promising feature detection technique is based on the cyclic feature [82].
Cyclic-feature detection approaches are based on the fact that
modulated signal are usually coupled with sinusoidal carriers, hopping sequences, cyclic prefixes, spreading codes, or pulse trains,
which result in a built-in periodicity [73]. Cyclostationary features are originated by the periodicity in the signal in statistical
manner like mean and autocorrelation or they can be intentionally used in order to sustain the spectrum sensing by analyzing
a Spectral Correlation Function (SCF) or cyclic spectrum [73].
This detection algorithms can differentiate noise from the signals
as the noise is Wide-Sense Stationary (WSS) with no correlation
while modulated signals are cyclostationary with spectral correlation due to the redundancy of signal periodicities. Cyclostationary feature detector can overcome the energy detector limits in
detecting signals in low SNR environments [86]. In fact, signals
with overlapping features in the power spectrum, can have nonoverlapping features in the cyclic spectrum [82]. Waveform based
or coherent sensing is another promising feature detection scheme
which uses patterns like preambles, repeatedly transmitted pilot
patterns, spreading sequences, etc. in wireless systems. In the
presence of a known pattern, sensing can be performed by correlating the received PU signal with a known copy of itself [82]
which provides a barrier of this type of sensing. It is shown that
University of Genova – DITEN
30 Chapter 2 : State of the Art and Literature Reviews
waveform based sensing outperforms energy detector based sensing in terms of reliability and convergence time. Likewise, the
performance of the sensing algorithm increases if the length of the
known signal pattern increases. The OFDM waveform is altered
before transmission to generate cycle-frequencies at different frequencies which is effective to categorize the signals [82]. Again if
the number of features generated in the signal is increased, the
robustness against multipath fading is improved considerably at a
cost of bigger overhead and bandwidth loss. The main advantage
of the feature detection is easily distinguishable the signals from
the noise (even under low SNR value). In contrast, feature detection requires long observation time and higher computationally
complexity as it requires to calculate a two-dimensional function
dependent on both frequency and cyclic frequency and also this
scheme needs a-priori information of the PUs.
2.3.1.3
Matched filtering
The advantage is achieved by correlating the received signal
with a template for detecting the presence of a known signal in
the received signal. However, it requires a-priori knowledge of
the PUs and requires CRs to be equipped with carrier synchronization and timing devices that leads enhanced implementation
complexity. At a CR node, to maximize the output SNR for a
certain input signal a matched filter is designed which belongs
to the linear filter [10]. Matched filter detection is applied if a
CR has a-priori knowledge of PUs transmitted signal. Therefore,
matched-filtering is known as the optimal strategy for detection
of PUs in the presence of stationary Gaussian noise. The main
advantage of matched filtering is the short time as it requires
only O(1/SNR) samples to meet a given probability of detection
constraint as compared to other detection schemes. As matched
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
31
filtering requires a CR node to demodulate received PU signals
and thus, it requires a-priori information of the PUs transmission features such as bandwidth, operating frequency, modulation
type and order, pulse shaping, and frame format [73]. Further,
if the CRs want to process a variety of signals, the implementation complexity of sensing unit is impractically large. In addition,
this scheme consumes large power as various receiver algorithms
require to be executed for detection and a-priori knowledge requirement of PU signals place it in challenging to implement in
CR networks [10].
2.3.1.4
Covariance based detection
Another narrowband spectrum sensing is based on covariance
based detection which exploits the inherent correlation in received
signals at the CR terminal ensuing from the time dispersive nature
of wireless channel and oversampling of received signal [73]. Usually covariance based detection does not require any prior information about the PU signal or noise. Conversely, if some a-priori
knowledge concerning the correlation of PU signal becomes available, this helps to develop sample covariance matrix making the
decision test statistic more reliable. In particular, received PU signal samples in MIMO-CR systems are spatially correlated as they
originated from the same PU signals. Another significant feature
of this detection scheme is that the noise power estimation is not a
requisite here as the threshold is related to false alarm probability
and number of samples of the received signal at CR. The better
performance would possibly be achieved for highly correlated PU
signals while the performance of this detection degrades with the
uncorrelated PU signal. In multi-antenna CR systems, multiple
copies of the received PU signal can be coherently combined to
maximize the SNR of received signal. The diversity combining apUniversity of Genova – DITEN
32 Chapter 2 : State of the Art and Literature Reviews
proaches of maximum ratio combining (MRC) and selection combining (SC) are analyzed for ED in [57] and the references therein.
Although, MRC gives optimal detection performance but is difficult to implement as it necessitates a-priori knowledge of PU
signal and channel in the form of eigen vector corresponding to
maximum eigenvalue of the received PU signal covariance matrix
and the eigen vector can be estimated using the received PU signal
samples.
2.3.1.5
Eigenvalue based detection (EBD)
If the received signals exhibit time correlation as well, the concept of EBD can be extended to incorporate joint spacetime processing [73]. This approach is generally known as covariance based
detection, EBD being its one special case where the eigenvalues of
received signal sample covariance matrix are used for PU signal
detection. In [73], authors have indicated that number of significant eigenvalues is directly related to presence/absence of data
in received PU signal and may be exploited to identify the PU
occupancy status.
2.3.2
Wideband sensing
Wideband spectrum sensing techniques aim to sense a frequency bandwidth that exceeds the coherence bandwidth of the
channel (e.g., 300 MHz - 3 GHz). In the wideband regime, traditional narrowband sensing methods cannot be casted off directly
for performing wideband spectrum sensing, as of making a single binary decision (PU present or absent) in the entire wideband
signal, thus cannot locate individual spectral opportunities that
lie within the wideband spectrum. As shown in Fig. 2.3, wideband spectrum sensing can be broadly categorized into two types;
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
33
Table 2.1: Comparison of different spectrum sensing schemes [73].
SS
Advantages
Disadvantages
Comments
scheme
Energy
Detection
+ Implementation simplicity.
+ Low computational
complexity.
Feature
Detection
+ Robust to
Noise
uncertainty.
+ High reliability.
+ Less complex
than cyclostationary feature
detection.
+ Less susceptible
to
hidden terminal
problems.
Matchedfilter
Detection
Covariance- + High Accubased
racy, blind.
Detection + Low computational
complexity.
− Threshold strongly
depends on Noise uncertainties.
− Non Robust and
Low accuracy.
− More susceptible to
hidden terminal problem.
−
Implementation
complexity and nonblind.
− Non-blind.
− High complexity and
high sensitivity to PU
signals information.
− Performance degrades for uncorrelated
PU signals.
University of Genova – DITEN
Advanced power
estimation techniques become
feasible
wideband spectrum
sensing
such
as Compressive
Sensing [69].
Hybrid schemes
using
coarse
detection using
ED and feature
detection.
Provides all advantages of feature detection
at
reasonable
complexity cost
but
susceptible to errors
in
a-priori
information.
Computational
complexity
depends
on
blind detection
algorithm.
34 Chapter 2 : State of the Art and Literature Reviews
Nyquist rate wideband sensing and sub-Nyquist wideband sensing. The former type processes digital signals taken at or above
the Nyquist rate, while the latter acquires signals using sampling
rate lower than the Nyquist rate. In the rest of this paper, an
overview of the state-of-the-art wideband spectrum sensing algorithms will be provided.
2.3.2.1
Nyquist rate wideband sensing
A conventional approach of wideband multi-carrier signal sensing is to directly acquire the entire signal using a standard ADC
and then use DSP algorithms to detect spectral opportunities to
CRs. A promising solution for the multicarrier wideband sensing
would be the filter bank schemes as presented in [25]. A special
class of filter banks (prototype filters) was proposed to detect the
opportunity in the wideband spectrum. Besides, those filter banks
can be used for the multicarrier communications for the CR nodes.
The baseband can be directly estimated through using a prototype filter, and other bands can be obtained through modulating
the prototype filter [25]. From a filter-bank point of view, in each
subcarrier, the corresponding portion of the input wideband signal was down-converted to base-band, low-pass filtered, and then
decimated. Later, this technique finds the correlation properties
of the low rate samples comes from each sub-carrier band. Therefore, the same filter bank can be used demodulation as well as
signal analysis. In fact, this scheme offers parallel arrangement
of the filter banks demanding a large number of RF modules,
which put limit to implement it in economy CR systems design.
Moreover, a wavelet approach to efficient spectrum sensing algorithm is proposed by using a standard ADC in [69]. There, the
wideband spectrum has decomposed into a train of consecutive
subbands, where the power spectral property is regular within
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
35
each subband but exhibits discontinuities and irregularities between adjacent subbands. In order to locate the singularities and
irregular structures of the wideband PSD, the wavelet transform
is an attractive mathematical tool, chosen for this scheme. This
algorithm works well for the wide range of bandwidth to simultaneously identify all piecewise smooth subbands, without having
prior information about the number of subbands within the band
of interest. Furthermore, it leads more benefit than multiple narrowband band-pass filters, in terms of implementation costs and
flexibility in adapting to dynamic PSD structures. Furthermore, a
novel multiband joint spectrum detection was introduced in [61],
which jointly detects the PU occupancy status over multiple frequency bands rather than over one band at a time where the
spectrum sensing problem was considered as a class of optimization problems. Here, the wideband signal was firstly sampled at
Nyquist rate, after which a serial to parallel conversion circuit
was introduced to divide sampled data into parallel data streams.
Time domain wideband signal was converted to frequency domain
spectrum by using standard Fourier transformation. The whole
wideband spectrum was then divided into successive sequences of
narrowband spectra. Lastly, binary hypotheses tests was been
performed at the bank of multiple narrowband detectors to find
the empty PU bands for opportunistic usage by the CRs. By using
proper optimization technique the detection threshold was chosen
mutually as to maximize the aggregate opportunistic throughput
in an interference-limited CR network. This strategy allows CRs
to take maximum advantage of the unused spectra and limit the
subsequent interference.
University of Genova – DITEN
36 Chapter 2 : State of the Art and Literature Reviews
2.3.2.2
Sub-Nyquist rate wideband sensing
The high sampling rate as well as obligation of diverge DSP
utensils in Nyquist systems set limit to explore in wideband sensing hence, sub-Nyquist approaches are drawing more and more
attention in both academia and industry [53] [23] [15] [72] [44].
Sub-Nyquist wideband sensing refers to the procedure of acquiring
wideband signals/spectrums using sampling rates lower than the
Nyquist rate and detecting spectral opportunities in the wideband.
Two important types of sub-Nyquist wideband sensing are illustrated so far in the open literatures; wideband CS and wideband
multi-channel sub-Nyquist sensing. In the subsequent paragraphs,
we will deliver some discussions and comparisons regarding these
wideband sensing algorithms.
a) Compressive sensing
As wideband spectrum is inherently sparse due to its low utilization and capitalizing the sparseness, CS becomes a promising
approach to recover the wideband signal (or data) expending only
partial measurements. In the CS framework [23] a real-valued,
finite-length, one-dimensional time-variant signal x(t), 0 ≤ t ≤ x,
can be denoted as a finite weighted sum of orthonormal basis functions (e.g., Discrete Cosine Transform (DCT), Discrete Fourier
Transform (DFT), etc.) as follows:
x(t) =
N
X
bi ψi (t) = ψb
(2.1)
i=1
where only a small number of basis coefficientsbi signifying the
sparsity of wideband signal x(t). Let the acquisition of an N × 1
vector x = ψb whereψ is the sparsity basis matrix of size N × N
and b an M × 1 vector with S, the number non-zero entries in
bi . In case of sparse signals, an S-sparse depiction of x can be
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
37
realized as a linear combination of S orthonormal basis functions,
with S N and it can be obtained by considering only S of
the bi coefficients in (2.1) those are significant Number of NonZero (NNZ) elements, while the rest (N −S) of values representing
less significant elements or zeros leads to the basis of the transform
coding [15]. It is confirmed that the original signal x can be reconstructed by using M = SO(logN ) non-adaptive linear projection
measurements against a measurement matrix φ of size M × N
which is incoherent with sparsifying basis, ψ [15]. The formation
of measurement matrix φ is given by choosing elements that are
drawn independently from a random distribution functions, e.g.
Bernoulli, Gaussian, etc. thus the measuring expression, y can be
written as
y = Φx = ΦΨb = Θb
(2.2)
where Θ= ΦΨ is a matrix of size M × N . As M N , the the
dimension of y in (2.2) is much lower than that of x, thus there
are theoretically infinite solutions to the equation. However, if the
condition that x is S-sparse is satisfied and with a proper condition
of measurement matrix, Φ and the recovery of x can be achieved
with only y measurements by solving the l1 -norm minimization
problem [23] [15] as follows
b̂ = arg minkbk1 suchthatΘb = y
(2.3)
b
This is a convex optimization problem solved as a linear program
celebrated as Basis Pursuit (BP)), iterative greedy algorithms,
etc. Though, the CS scheme has concentrated on finite-length
and discrete-time signals and to acquire sparse, band limited signals an Analog-to-Information Converter (AIC) was introduced
in [16] which is also entitled as Random Demodulator (RD). An
AIC is theoretically similar to an ADC operating at Nyquist rate
followed by the above mentioned CS procedure. The AIC-based
University of Genova – DITEN
38 Chapter 2 : State of the Art and Literature Reviews
model consists of a pseudo-random number generator, a mixer,
an accumulator, and a low-rate sampler. To decline design time,
behavioral models of AIC yield the same results as the costly
circuit models, but reduce the complexity of simulation [72]. Usually, sub-Nyquist rate samples are employed for wideband spectral
reconstruction and classify the frequency bands via PSD, waveletbased edge detector tailored to the coarse sensing task of vacant
spectrum identification. The advantage of this scheme is robust
to noise and can afford less number of samples.
b) Multi-channel sub-Nyquist wideband sensing
Conventional CS scheme for analog signals require prior information about the signal sparsity pattern. The spectral estimation
becomes more challenging without having the spectral support
i.e., blind sub-Nyquist sampling of multiband signals. The authors in [53] presented a mixed analog-digital spectrum sensing
method also known as Modulated Wideband Converter (MWC)
that has multiple sampling channels, with the accumulator in each
channel replaced by a general low-pass filter. A unified digital
architecture for spectrum-blind reconstruction was introduced in
that scheme and the architecture consists of an analog back-end
and digital support recovery, the crucial part in this technique.
Very few number of measurements are required for the digital operations in support recovery, thus introducing a short delay and
making computationally efficient. When the signal support set
is identified, numerous real-time computations are possible with
this scheme. The multi-channel structure in MWC provides robustness against the noise. Another multi-channel sub-Nyquist
sampling approach employs multi-coset (MC) sampling which incorporates the advantages of CS when the frequency power distribution is sparse, but applies to both sparse and non-sparse power
University of Genova – DITEN
2.3 Spectrum Sensing Techniques
39
spectra [44]. An innovative PSD estimator was presented in their
works for continuous WSS random processes producing both compressive and non-compressive estimates at finite resolutions. The
method estimates the average PSD within specific sub-bands of
a WSS random process. Hence, it produces piece-wise constant
estimates that are in contrast to those supported on a discrete
frequency grid, while the DFT has been employed to sort the periodogram. Through proper estimating the PSD, the estimator
minimized the spectral aliasing effects that occurs in each channel to underpin the formation of a linear system of equations.
Therefore, MC sampling is often implemented by using multiple
channels with different sub-sampling rates while each sampling
channels having unlike time offsets. In order to obtain a unique solution for the WSS random process from the compressive measurements, the sampling pattern should be carefully designed in [44]
as a result multi-coset sampling approach requires the channel
synchronization for a robust spectral reconstruction. An alternative sub-Nyquist sampling scheme also accredited as Multi-rate
Asynchronous wideband Sub-Nyquist Sampling (MASS) scheme
was presented in [64] to perform wideband spectrum sensing. In
that scheme, the sampling of the wideband signals were performed
by the parallel low-rate samples. Consequently, spectral aliasing
generated by the sub-Nyquist samples is persuaded in each sampling branch to wrap the sparse spectrum occupancy map onto
itself, as of the low utilization factor of the spectrum. Specifically,
in the same observation time, the numbers of samples in multiple sampling channels are selected as different consecutive prime
numbers [64]. Additionally, this scheme only acknowledge the amplitudes of sub-Nyquist spectra are of interest, such a multi-rate
wideband sensing approach was perceived robust against lack of
time synchronization between multiple sampling channels, lead-
University of Genova – DITEN
40 Chapter 2 : State of the Art and Literature Reviews
ing to lower implementation complexity, better data compression
capability, to have excellent performance in realistic wireless channels, and is more suitable to implement in CR networks.
2.4
Cooperative Spectrum Sensing
Spectrum sensing by a stand-alone CR is a challenging task
due to shadowing, fading, and time-varying natures of wireless
channels. In CR systems, cooperative spectrum sensing has been
widely used to detect the PUs with a high agility and accuracy
and certainly enhanced detection performance has been obtained
exploiting cooperative scheme [26]. To combat these impacts, cooperative spectrum sensing schemes have been proposed to obtain
the spatial diversity in multiuser CRN [26], [38], [43].In order to
improve the detection performance, various cognitive users to collaborate by sharing their sensing information.
In a CRN, every cognitive node performs individual spectrum
sensing employing some detection scheme and then sends local decision (binary or decision statistic) through control channel to the
common receiver called CM. Usually, the local decision is made
by comparing the observation with a preset threshold value [43].
In order to minimize the control channel overhead, CRs only share
their final 1-bit hard decisions (H0 or H1 ) rather than their decision statistics [26]. A CM is responsible to collect the local sensing
decisions from all the member nodes present in a CRN and then
fusing the local decisions by employing different fusion rules [75].
In the following chapter, we will show the enhanced detection
performance in a cooperative CRN by exploiting compressive detection performance.
University of Genova – DITEN
2.5 Signal Estimation Schemes
2.5
41
Signal Estimation Schemes
The spectral estimation illustrates the distribution of the power
contained in a signal over the frequency band, based on a finite
set of data. Estimation of power spectra is useful in a variety of
applications, including the detection of signals buried in wideband
noise. The PSD of a stationary random process x(n) is mathematically related to the correlation sequence rx (n) by the discrete
time Fourier transform. This is given by
Sx (ejω ) =
+∞
X
rx (n)ejωn
− π < ω < +π
(2.4)
n=−∞
with
rx (n) = E[x∗ (m)x(m + n)].
(2.5)
The average power of a signal over a particular frequency band
[ω1 , ω2 ], 0 ≤ ω1 ≤ ω2 ≤ π, can be found by integrating the PSD
over that band
We can see from the above expression that Sx (ejω ) represents
the power content of a signal in an infinitesimal frequency band,
which is why it is called the power spectral density. The main
methods for wideband spectrum estimation can be divided into
non-parametric and parametric methods, described in the following [31].
2.5.1
Parametric methods
Parametric methods Parametric methods are those in which
the PSD is estimated from a signal that is assumed to be the output of a linear system driven by white noise. Examples can be
provided of this type are the Yule-Walker auto-regressive (AR)
method and the Burg method. These methods estimate the PSD
University of Genova – DITEN
42 Chapter 2 : State of the Art and Literature Reviews
by first estimating the parameters (coefficients) of the linear system that hypothetically generates the signal. They tend to produce better results than classical non-parametric methods while
dealing with relatively short signal length.
This selection may be based on a-priori knowledge about how
the process is generated or, perhaps on experimental results indicating that a particular model matches well. Models that are commonly used include Auto-Regressive (AR), moving average Moving Average (MA), and autoregressive moving average (ARMA).
2.5.2
Nonparametric methods
Non-parametric methods are those in which the PSD is estimated directly from the signal itself. The simplest of such methods
is the periodogram. An improved version of the periodogram is
Welch’s method. A more modern non-parametric technique is the
multi-taper method.
2.6
MIMO Scheme in Cognitive Radios
OSA leads to a dynamic and effective management of the spectrum, many problems arise since PUs should be protected from
detrimental interference while assuring an acceptable Quality of
Service (QoS) to the cognitive radio nodes [58]. The CRNs operate in a heavy interference corrupted environment and effective
interference management has to be addressed to permit the coexistence among primary and CR networks [33]. Most of prior
research about OSA and interference mitigation for CRNs focuses
on the detection of PUs activity in frequency, time or spatial domain considering single antenna at both primary and cognitive
transceivers [85].Though, it is well known that the introducing
multiple antennas at the transmitting and/or receiving end can
University of Genova – DITEN
2.7 Summary
43
provide many desirable advantages, such as capacity enhancement, effective co-channel interference mitigation, spatial division
multiple access, etc [85].
In spite of the introduction of multiple antennas in CR networks has gained attention from theoretical and practical perspectives, only few researches have been carried out and some
open issues persist [85]. In the open literature, in order to face
the complex problem of the coexistence among PU and CR networks, some simplifying hypotheses are considered. As an example, in [35] [36] it is assumed that a cognitive system, equipped
with multiple antennas, are provided with the message sent by
the primary transmitter. Under this assumption the capacity of
the cognitive system is evaluated and it is shown that significant
improvements can be obtained with respect to traditional single antenna system [16]. However, such an approach suffers in
practical opportunistic scenarios where PUs are unaware of the
presence of the cognitive system and cooperation (i.e. sharing of
the transmitted message) cannot be assumed. In [49], although
the secondary system does not know the primary message and an
interference free CR networks is obtained by implementing properly designed filters at both primary and secondary transceivers,
it is required some modifications to the legacy terminals which is
unpractical in real environment.
2.7
Summary
In this chapter, various aspects and issues of Dynamic Spectrum Access and spectrum sensing in CR networks have presented.
A variety of detection techniques have been briefly studied, compared and classified in this section. We found that spectrum blind
detection methods are most generic in their application and are
University of Genova – DITEN
44 Chapter 2 : State of the Art and Literature Reviews
robust to all kinds of channel uncertainties. Moreover, they provide highly accurate results at reliable complexity. However, if a
CR functions independently leads to drastic sensing performance
degradation in multipath fading or shadowing environment which
is more likely happening in practical wireless networks. Hence,
cooperative spectrum sensing could provide a mature solution of
this type of problems. In summary, future research is envisioned
to be focused more on implementation-friendly, low-complexity
sensing algorithms that are robust enough to timely provide requisite sensing performance with demanded reliability.
University of Genova – DITEN
Chapter 3
Overview of the
Proposed Approach
3.1
Introduction
Wideband spectrum sensing plays a significant role to Cognitive Radio cognitive radio systems as a means of identifying
spectrum holes or characterizing interference. Measurement matrix plays an important role to reconstruct the sparse signal. The
fact that compressible signals are well approximated by S-sparse
representations forms the foundation of transform coding [15]. As
for example, In data acquisition systems (i.e., digital cameras)
transform coding plays a central role. In this chapter, we would
like to focus on different signal acquisition schemes based on
Compressive Sensing (CS). Later, we provide some simulations
and analytic results based on a comparative study of the effect of
transform coding in signal acquisition schemes.
45
46
Chapter 3 :
3.2
Overview of the Proposed Approach
Measurement Matrix of CS Recovery
The goal is to make M measurements from which the length-N
signal x could be reconstructed, or equivalently its sparse coefficient vector s in the basis Ψ. Clearly reconstruction will not be
possible if the measurement process damages the information in x.
Hence, the measurement process is linear and defined in terms of
the matrices Φ and Ψ, solving for s given y in (2.9) is a linear algebra problem, with M < N , i.e., fewer equations than unknowns,
resulting in an infinite number of solutions (ill-posed). However
the S-sparsity of s comes to the rescue and an intuitive approach
to ensure the solution is that the measurement matrix Φ should
be incoherent with the sparsifying basis Ψ [18] in the sense that
M
N
the vectors {Φj }j=1 cannot sparsely represent the vectors {Ψi }i=1
and vice versa. Some favorable distributions to represent Φ are:
1
• Gaussian: Φi,j ∼ N 0, M
(
+ √1M with probability 0.5
• The Bernouilli/Rademacher: Φi,j =
− √1M with probability 0.5
 1
1

+ √M with probability 6
• Database-friendly: Φi,j =
0
with probability 23

 √1
− M with probability 61
• Random orthoprojection to RM
A Gaussian measurement matrix has an important and useful
property: the matrix Θ = ΦΨ is also independent and identically
distributed (i.i.d) Gaussian regardless of the choice of the sparsifying basis matrix Ψ. Thus, random Gaussian measurements are
universal in the sense that Φ is incoherent with Ψ for every possible Ψ making the reconstruction possible with high probability
University of Genova – DITEN
3.2 Measurement Matrix of CS Recovery
47
if M > cK log(N ), with c a small constant. In order to study the
general robustness of the CS measurement matrix, the so-called
Restricted Isometry Property (RIP) has been proposed in the paper [18]. For each integer S = 1, 2, · · · , they define the isometry
constant δs of a matrix Θ = ΦΨ as the smallest number such
that
(1 − δs )ksk22 ≤ kΘs k22 ≤ (1 + δs )ksk22
(3.1)
holds for all S-sparse vectors s. A matrix Θ is said to obey the
RIP of order S if δs is not too close to one. When this property
holds, Θ approximately preserves the Euclidean length of S-sparse
signals. An equivalent description of the RIP is to say that all
subsets of S columns taken from Θ are in fact nearly orthogonal.
Therefore, the mutual coherence parameter µ represents as well a
good measure of robustness
√
µ(Φ, Ψ) =
N·
max |< Φk , Ψj >|
s≤Mj ≤N
√ µ(Φ, Ψ) ∈ 1, N (3.2)
(3.3)
µ is defined as a measure of the incoherence between the matrices involved in CS and it is proportional to the minimum number
of measurements which are needed to perfectly or near perfectly
reconstruct the sparse vector. Therefore, it is possible to define a
universal measurement process, based on projections over a random matrix in which the signal is not sparse. This is possible
because even if the projection Φ does not have full rank (M < N )
and loses information in general, it preserves structure and information in sparse signal models with high probability and it is
University of Genova – DITEN
48
Chapter 3 :
Overview of the Proposed Approach
invertible also for sparse models with high probability solving the
ill-posed inverse problem.
3.3
Sparsity Level Detection
Mostly all sub-Nyquist wideband sensing techniques require
that the wideband signal should be sparse in a suitable basis [65].
Given the low spectrum utilization, most of existing wideband
sensing techniques assumed that the wideband signal is sparse in
the frequency domain, i.e., the sparsity basis is a Fourier matrix.
However, as the spectrum utilization improves, e.g., due to the use
of Cognitive Radio (CR) techniques in future cellular networks,
the wideband signal may not be sparse in the frequency domain
any more. Thus, a significant challenge in future cognitive radio
networks is how to perform wideband sensing using partial measurements, if the wideband signal is not sparse in the frequency
domain. It will be essential to study appropriate wideband sensing
techniques that are capable of exploiting sparsity in any known
sparsity basis. Furthermore, in practice, it may be difficult to acquire sufficient knowledge about the sparsity basis in cognitive radio networks, e.g., when we cannot obtain enough prior knowledge
about the primary signals. Hence, future Cognitive Radio Network (CRN)s will be required to perform wideband sensing when
the sparsity basis is not known. In this context, a more challenging issue have to be studied named blind sub-Nyquist wideband
sensing algorithms (e.g., Modulated Wideband Converter (MWC)
proposed in [53], where prior knowledge regarding sparsity of the
signal has not been required for the sub-Nyquist sampling or the
spectral reconstruction.
University of Genova – DITEN
3.4 Signal Reconstruction Algorithm
3.4
49
Signal Reconstruction Algorithm
The recovery of a signal deeply influenced by the class of signals
which is responsible to fix the number of needed measurements
depending on different factors:
• The sparsity level S of the signals.
• The length of the signal N .
• The coherence between the measurement matrix Φ and the
sparsity basis Ψ.
To sum up, some important CS features are as follows:
1. Stable: Signal acquisition/reconstruction process is numerically stable .
2. Universal: the same random projections/hardware can be
used for any compressible signal class.
3. Asymmetrical: most of the signal processing carried out at
the receiver end.
4. Equal distribution: Each measurement carries the same amount
of information which makes it robust to measurement loss.
5. Weak encryption of the random projections.
In this chapter, we would like to illustrate some typical CS
schemes for signal acquisition which gives relief from the conventional high sampling rates needed for wideband spectrum sensing
in CR networks. In the following chapter, we shall provide a novel
wideband sensing approach to lessen the computational complexity, to improve the detection performance as well as to enhance
the achievable data rate to the CR nodes.
University of Genova – DITEN
50
Chapter 3 :
3.4.1
Overview of the Proposed Approach
Discrete Walsh-Hadamard transform coding
In mathematics, a Walsh matrix is a specific square matrix,
with dimensions a power of 2, the entries of which are +1 or 1,
and the property that the dot product of any two distinct rows
(or columns) is zero. Each row of a Walsh matrix corresponds to a
Walsh function. The natural ordered Hadamard matrix is defined
by the recursive formula, and the sequential ordered Hadamard
matrix is formed by rearranging the rows so that the number of
sign-changes in a row is in increasing order. Confusingly, different
sources refer to either matrix as the Walsh matrix. The Walsh
matrix (and Walsh functions) are used in computing the Walsh
transform and have applications in the efficient implementation of
certain signal processing operations.
Hadamard is a computationally simpler substitute than the
Fourier transform, since it requires no multiplication or division
operations (all factors are plus or minus one). Multiply and divide
operations were extremely time intensive on the small computers
used on board those spacecraft, so avoiding them was beneficial
both in terms of computing time and energy consumption. The
coefficients of the Hadamard transform are all +1 or −1. The
Fast Hadamard Transform can therefore be reduced to addition
and subtraction operations (no division or multiply). This allows
the use of simpler hardware to calculate the transform [59].
The basis vectors of the discrete Hadamard and the discrete
Walsh-Hadamard transforms consist of the values ±1; just like
the Walsh functions. Both transforms are unitary. Basically they
differ only in the order of the basis vectors.
We have
University of Genova – DITEN
3.4 Signal Reconstruction Algorithm
y = Hx,
51
(3.4)
x = Hy,
where x denotes the signal, y the representation, and H the
transform matrix of the Hadamard transform. H is symmetric
and self-inverse:
H T = H = H −1 .
(3.5)
The transform matrix of the 2 × 2-Hadamard transform is given
by
H
(2)
"
1 Hn
=√
2 Hn
#
Hn
.
−H n
(3.6)
The Walsh-Hadamard transform is obtained by taking the
Hadamard transform and rearranging the basis vectors according to the number of zero crossings [51]. Somehow, this yields an
order of the basis vectors with respect to their spectral properties.
3.4.2
Discrete cosine transform
A Discrete Cosine Transform (DCT) expresses a finite sequence
of data points in terms of a sum of cosine functions oscillating at
different frequencies. DCTs are important to numerous applications in science and engineering, from lossy compression of audio
(e.g., MP3) and images (e.g., JPEG) (where small high-frequency
components can be discarded), to spectral methods for the numerical solution of partial differential equations. It is expressed
the following four types of DCTs [51]:
DCT-I:
knπ
2
, k, n = 0, 1, · · · N.
(3.7)
CkI (n) = √ γk γn cos
N
N
University of Genova – DITEN
52
Chapter 3 :
Overview of the Proposed Approach
DCT-II:
2
CkII (n) = √ γk cos
N
k(n + 12 )π
N
, k, n = 0, 1, · · · N.
(3.8)
DCT-III:
2
CkIII (n) = √ γn cos
N
(k + 12 )nπ
N
, k, n = 0, 1, · · · N.
(3.9)
DCT-IV:
CkIV
2
(n) = √ cos
N
(k + 12 )(n + 12 )π
N
, k, n = 0, 1, · · · N.
(3.10)
The constants γj in 3.7-3.9 are given by
(
γj =
√1
2
for j = 0 or j = 1
1
otherwise
(3.11)
The coefficients ck (n) are the elements of the orthonormal basis
vectors ck (n) = [ck (0), ck (1), · · · ]T .
In order to point out clearly how 3.7-3.10 are to be understood,
let us consider the forward and inverse DCT-II:
XCII (k)
=
N
−1
X
x(n)cII
k (n)
n=0
r
= γk
2
N
N
−1
X
x(n) cos
n=0
k(n + 12 )π
N
(3.12)
,
and
x(n) =
n−1
X
XCII (k)cII
k (n)
k=0
r
=
2
N
N
−1
X
k=0
XCII (k)γk
cos
k(n + 12 )π
N
University of Genova – DITEN
(3.13)
.
3.4 Signal Reconstruction Algorithm
53
Especially the DCT-II is of major importance in signal coding
because it is close to the KarhunenLove Transform (KLT) for firstorder autoregressive processes with a correlation coefficient that
is close to one.
3.4.3
Discrete Fourier transform (DFT)
The transform pair of the Discrete Fourier Transform (DFT)
is defined as [51]
X(k) =
N
−1
X
x(n)WNnk ,
n=0
1
x(n) =
N
N
−1
X
(3.14)
X(k)WN−nk ,
k=0
where
WN = e−j2π/N ,
(3.15)
Due to the periodicity of the basis functions, the DFT can be
seen as the discrete-time Fourier transform of a periodic signal
with period N . With




x(0))
X(0))




 x(1) 
 X(1) 



,
x=
..
..
,X = 





.
.
x(N − 1)
X(N − 1)
(3.16)
and

1

1
W = [WNkn ] = 
 ..
.
1
1
WN
..
.
N −1
WN
···
···
···
1

WNN −1
..
.





(N −1)(N −1)
WN
the above relationships can also be expressed as
University of Genova – DITEN
(3.17)
54
Chapter 3 :
Overview of the Proposed Approach
X = Wx ↔ x =
1
W HX
N
(3.18)
It is observed from the above equation that W is orthogonal,
but not orthonormal.
The DFT can be normalized as follows:
where
α = ΦH x ↔ x = Φα,
(3.19)
1
Φ = √ W H.
N
(3.20)
−(n−1
The columns of Φ, can be represented as ψk = √1N [1, WN−k , WN−2k , · · · , WN
0, 1, · · · N − 1 which is then form an orthonormal basis.
3.5
Different Schemes of CS Recovery
In this section, we will outline several well-known formulation
for CS recovery schemes which can be used for spectral estimation.
Over the last decades, there has been an explosion of interest in
alternatives to traditional signal representations [20]. Instead of
just representing signals as superpositions of sinusoids (the traditional Fourier representation) we now have available alternate
dictionaries - collections of parameterized waveforms - of which the
Wavelets dictionary is only the best known. Wavelets, Steerable
Wavelets, Segmented Wavelets, Gabor dictionaries, Multi-scale
Gabor Dictionaries, Wavelet Packets, Cosine Packets, Chirplets,
Warplets, and a wide range of other dictionaries are now available.
Each such dictionary D is a collection of waveforms (Φγ )γ∈Γ with
γ a parameter, and we envision a decomposition of a signal s as
X
s=
αγ φγ ,
(3.21)
γ∈Γ
University of Genova – DITEN
3.5 Different Schemes of CS Recovery
55
or an approximate decomposition
s=
m
X
αγ i φγ i + R(m) ,
(3.22)
i=1
where R(m) is a residual. Depending on the dictionary, such a
representation decomposes the signal into pure tones (Fourier dictionary), bumps (wavelet dictionary),chirps (chirplet dictionary),
etc.
Most of the new dictionaries are over-complete, either because
they start out that way, or merging various complete dictionaries,
obtaining a huge dictionary containing numerous types of waveforms (e.g., Fourier and wavelet dictionaries). The decomposition
3.21 is then non-unique, because some elements can be represented
in terms of other elements in the dictionary.
3.5.0.1
Goals of adaptive representation
: Non-uniqueness gives the possibility of adaptation, i.e., from
many representations, one that is most suited to a specific problem
and motivated to achieve the following goals simultaneously:
• Speed: It should be possible to obtain a representation in
the order of O(n) or O(n) log(n) time.
• Sparsity: It is possible to obtain the sparsest possible representation of a signal - i.e., the one with fewer significant
elements.
• Perfect separation: When the signal is made up of a superposition of a few very disparate phenomena (e.g., impulses and
sinusoids), those should be clearly separated and marked.
• Superresolution: We should obtain a resolution of sparse
objects that is much higher-resolution than that possible
with traditional non-adaptive approaches.
University of Genova – DITEN
56
Chapter 3 :
Overview of the Proposed Approach
• Stability: Small perturbations of the signal s should not
seriously degrade the results.
3.5.1
Basis pursuit
The Time-Frequency and Time-Scale communities have recently developed a large number of overcomplete waveform dictionaries i.e., stationary wavelets, wavelet packets, cosine packets, chirplets, and warplets, to name a few. Decomposition into
over-complete systems is not unique, and several methods for decomposition have been proposed, including the Method of Frames
(MOF), Matching Pursuit (MP), and for special dictionaries, the
Best Orthogonal Basis (BOB). Basis Pursuit (BP) is a principle
for decomposing a signal into an optimal superposition of dictionary elements, where optimal means having the smallest l1 norm
of coefficients among all such decompositions [20]. BP has interesting relations to ideas in areas as diverse as ill-posed problems, in
abstract harmonic analysis, total variation denoising, and multiscale edge denoising [20].
BP in highly over-complete dictionaries leads to large-scale optimization problems. Such problems can be attacked successfully
only because of recent advances in linear programming by interiorpoint methods. We obtain reasonable success with a primal-dual
logarithmic barrier method and conjugate-gradient solver.
BP finds signal representations in over-complete dictionaries
by convex optimization: it obtains the decomposition that minimizes the l1 norm of the coefficients occurring in the representation. Because of the non-diffierentiability of the l1 norm, this
optimization principle leads to decompositions that can have very
different properties from the Method of Frames - specifically, they
can be much sparser. Because it is based on global optimization,
it can stably super-resolve the problems in ways that Matching
University of Genova – DITEN
3.5 Different Schemes of CS Recovery
57
Pursuit can not. BP can be used with noisy data by solving an optimization problem trading off a quadratic misfit measure with an
l1 norm of coefficients. Examples show that it can stably suppress
noise while preserving structure that is well-expressed in the dictionary under consideration. BP is closely connected with linear
programming. Recent advances in large-scale linear programming
- associated with interior-point methods - can be applied to BP,
and make it possible, with certain dictionaries, to nearly-solve the
BP optimization problem in nearly-linear time [20]. Among the
many possible solutions to Φα = s, they pick one whose coefficients have minimum l1 norm.
min kαk1 subject to Φα = s
(3.23)
To deal with the signal at the noise level σ > 0, it is proposed an
approximate decomposition as in 3.22, solving
2
min kΦα − sk2 + λn kαk1
(3.24)
p
with λn = σ 2 log(#D) depending on the number of #D of
distinct vectors in the dictionary.
3.5.2
Orthogonal Matching Pursuit
Let s be a d-dimensional real signal with at most nonzero components. This type of signal is called s-sparse. Let {x1 , · · · , xN }
be a sequence of measurement vectors in Rd that does not depend on the signal s. Those vectors can be used to collect N
linear measurements of the signal
hs, x1 i, hs, x2 i, · · · , hs, xN i
where h·, ·i denotes the usual inner product. The problem of
signal recovery depends mainly two distinct factors: number of
University of Genova – DITEN
58
Chapter 3 :
Overview of the Proposed Approach
measurements are necessary to recover the signal and the algorithm which can perform the recovery job. The algorithm of
Orthogonal Matching Pursuit (OMP) for signal recovery can be
illustrated as follows [71]: The input for this approach should be:
• An N -dimensional signal ν
• An N × d measurement matrix Φ
• The sparsity level s of the ideal signal.
While the output of this approach will be
• An estimate x̂ in Rd for the ideal signal
• A set Λm containing m-elements from {1, · · · , d}
• An N -dimensional approximation am of the data ν.
• An N -dimensional residual r m = ν − am
The procedure of this scheme is
1. Initialize the residual r 0 = ν, the index set Λ0 = 0, and the
iteration counter t = 1.
2. Find the index λt that solves the easy optimization problem
λt = arg maxj=1,··· ,d hr t−1 , ϕj i.
If the maximum occurs for multiple indices, break the tie
deterministically.
3. Augment the index set and the matrix of chosen atoms:Λt =
Λt−1 ∪ {λt } and Φt = [Φt−1 ϕλt ]. Here, Φ0 is an empty
matrix.
4. Solve a least squares problem to obtain a new signal estimate: xt = arg minx kν − Φt xk2 .
University of Genova – DITEN
3.6 Simulations and Analytic Results
59
5. Calculate the new approximation of the data and the new
residual at = Φt xt
r t = ν − at .
6. Increment t, and return to Step 2 if t < m.
7. The estimate ŝ for the ideal signal has nonzero indices at
the components listed in Λm . The value of the estimate ŝ
in component Λj equals the jth component of xt .
3.6
Simulations and Analytic Results
So far, we have discussed different CS schemes for sparse signal acquisition in an efficient way. Most of the CS based signal
acquisition scheme requires a measurement matrix based on specific mathematical basis: sparsity, which pertains to the signals
of interest, and incoherence, which pertains to the sensing modality [19]. Hence, the formation of measurement matrix plays an
important role for signal/data acquisition schemes. In this chapter, we would like to compare the performance of Walsh Hadamard
Transform (WHT) and DCT transform coding employed in measurement matrix, Φ of the sparse signal acquisition system. Usually, DFT and DCT transform coded measurement matrix provide the similar results which is less significant in our discussion
while the comparison between WHT and DCT transform coded
measurement matrix illustrates very significant in wideband sensing algorithm. Therefore, in this section, we compare the performance of the WHT and DCT transform coding employed in
measurement matrix, Φ in order to recover the wideband signal
at a single CR node. We consider, at baseband, a wideband spectrum range [0M Hz − 60M Hz] containing 30 channels of 2 MHz
each and encode it as c = {c1 , c2 , · · · , cn } where n = 30. Every
University of Genova – DITEN
60
Chapter 3 :
Overview of the Proposed Approach
channel is possible occupied by a Primary User (PU) using digital modulation scheme either 16-PSK or 16-QAM. So, the symbol
rate is 2 MHz and number of samples per symbol is 16 and number
of symbols in a frame is chosen 512. In a single attempt there are
three PUs communicating with the center frequency of 20.7 MHz,
45.3 MHz, 59.5 MHz respectively while their individual bandwidth
is 2 MHz each. Here, we have considered the Nyquist sampling
frequency,fs = 128 MHz and the sampling number, N = 8192.
We also consider, the received signal at the cognitive terminal is
corrupted by the Additive White Gaussian Noise (AWGN). The
received SNR of the active channels is considered 20dB. For CS
reconstruction, the chosen compression ratio, M
N is varying from
2.5% to 60%. The entries of the compressed measurement ma1
trix Φ be Gaussian distributed with zero mean and variance M
and this random matrices allow sparse recovery using l1 minimization. The DCT and the WHT coding is selected to form the
measurement matrix, Φ and then compare the normalized Mean
Squared Error (MSE) w.r.t. Power Spectral Density (PSD), detection performance and average execution time. The statistical
average of normalized MSE and execution time have set after 500
experimental realizations were taken into consideration.
3.6.1
Normalized MSE performance
we compute the normalized MSE of the PSD obtained from
Welch periodogram which is defined by:

2 



Ŝx − Sx 
2
M SE = E
(3.25)
2

 kSx k2 

where Sx denotes the average of the PSD estimates based
on Welch power periodogram, where the original signal sampled
University of Genova – DITEN
3.6 Simulations and Analytic Results
61
Performance test of the compressive sampling scheme
1
Normalized MSE
0.9
0.8
0.7
PSK-WHT: 20dB
0.6
PSK-DCT : 20dB
QAM-WHT: 20dB
0.5
QAM-DCT : 20dB
0.4
0
0.1
0.2
0.3
0.4
0.5
0.6
Compression rate, M/N
Figure 3.1: Normalized MSE performance versus compression
rate, M
N (setting SNR = 20 dB)
at Nyquist rate and Ŝx is the average PSD estimate from periodogram of same type of the reconstructed signal through compressed sampling. It is obvious from the Fig. 3.1 that the higher
the compression ratio, M
N the better the signal reconstruction
quality.
3.6.2
Average execution time comparisons:
In order to compare the execution time for two types (DCT
and WHT) of transformed measurement matrix, Φ, we consider
the compression rate M
N of interest in the range of 2.50%−60%. It
is clearly shown in Fig. 3.2 that WHT matrix executes 30% faster
than its DCT counterparts while their detection probability (as
shown in Fig. 3.3 is comparable.
University of Genova – DITEN
62
Chapter 3 :
Overview of the Proposed Approach
Execution time comparison Vs. compression rate
200
Average execution time
180
160
140
120
PSK-WHT: 20dB
PSK-DCT : 20dB
100
QAM-WHT: 20dB
QAM-DCT : 20dB
80
60
0
0.1
0.2
0.3
0.4
0.5
0.6
Compression rate, M/N
Figure 3.2: Execution time versus compression rate,
SNR = 20 dB).
3.6.3
M
N
(setting
Detection performance versus compression
ratio
We evaluate detection probability, based on the averaged PSD
estimate. The decision of the presence of a licensed transmission
signal in a certain channel is made by an energy detector used in
paper [76].
Q
N = Ŝx (k) =
1 X
2
|Xq (K))|
Q q=1
(3.26)
where Xq (K) is the Fourier transform of the q-th block of the
received time-domain signal xq (n), n denoting the sampling index,
each block contains 8 PSD samples and the total number of blocks,
Q = 1028 . The probability of detection, Pd is calculated as:
pd = P r(N > (γ | H1 ))
University of Genova – DITEN
(3.27)
3.6 Simulations and Analytic Results
63
Performance test of the compressive sampling scheme
1
Detection probability
0.95
0.9
0.85
0.8
PSK-WHT: 20dB
PSK-DCT : 20dB
0.75
QAM-WHT: 20dB
QAM-DCT : 20dB
0.7
0.65
0.6
0
0.1
0.2
0.3
0.4
0.5
0.6
Compression rate, M/N
Figure 3.3:
Detection probability
M
rate, N .(setting SNR = 20 dB)
versus
compression
where γ is the decision threshold and is centralized chi-square
distributed function which is found by fixing the probability of
false alarm, Pf = 0.05 and H1 represents the presence of PUs. Fig.
3.3 describes the Pd with different values of compression ratios, M
N.
From simulation results (Fig. 3.3) it is seen that the detection
probability of two types of transform coding is comparable with
respect to the two considered types of digital modulation schemes.
University of Genova – DITEN
64
Chapter 3 :
Overview of the Proposed Approach
Simulated Throughput (bits/Sec/Hz)
Influence of the Throughput on τ: T=50 msec.
8
7
WHT: 20dB
6
DCT: 20dB
5
WHT:10dB
4
DCT: 10dB
WHT: 5dB
3
DCT: 5dB
2
1
0
5
10
15
20
25
Sensing Time (msec.)
Figure 3.4: Influence of compression ratio on the detection performance.
University of Genova – DITEN
Chapter 4
Compressive Sensing
for Wideband
Cognitive Radios
1
Radio spectrum is an expensive resource and only licensed
users have the right to use it. In the emerging paradigm of interoperable radio networks, the unlicensed users are allowed to use
the radio frequency that is unoccupied by the licensed users in
temporal and spatial manner. To support this spectrum optimization functionality, the unlicensed users are required to sense the
radio environment periodically for being aware of the high-priority
licensed users. Wideband spectrum sensing is a challenging task
for the present analog-to-digital converters used in wireless systems due to the constraints of digital signal processing unit. Exploiting on the sparseness of the wideband signal, the spectrum
1 Contents
of the current chapter have been published in [11] [8] [9]
65
66
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
can be recovered with only few compressive measurements, consequently employs relief of high-speed signal processing units. This
paper presents a novel wideband sensing approach where a significant portion of wideband spectrum is approximated via compressive sensing rather than entire wideband spectrum estimation,
thus reducing computational complexity for the cognitive radios.
Detection performances are evaluated through spectrum estimation of the desired frequency band by means of a well-known energy detection method. Finally, reduction of computational burden and memory spaces obligation are described compared to the
conventional Compressive Sensing (CS) preceded over a single RF
chain, without interfering with the detection performances.
4.1
Introduction
With the rapid growth of mobile wireless services and systems,
the scarcity of the Radio Frequency (RF) spectrum is starting to
represent an important issue. Recent research shows that at any
particular spatial region and time, spectrum might not be fully occupied by the licensed or Primary User (PU)s). In particular, the
spectrum is often poorly utilized in television broadcasting has
licensed under very high frequency (VHF) bands [2, 32]. Those
unused spectrums can opportunistically be accessed by Cognitive
Radio (CR), thus improving overall spectrum efficiency. The enhancement of the spectrum usage can be speculatively achieved by
means of automatic frequency switching techniques [55]. Unfortunately, wideband spectrum sensing for CRs is a challenging task
and there are mostly two conventional ways to perform this operation [60, 67]. Firstly, wideband spectrum sensing is performed
by using a bank of tunable narrowband Band-Pass Filter (BPF)s
at the RF front-end to scan one narrowband frequency for every
University of Genova – DITEN
4.1 Introduction
67
sensing interval. The BPFs involve with a variable number of RF
components and the tuning range of each BPF is pre-selected.
Secondly, a single wideband RF front-end followed by high-speed
Digital Signal Processing (DSP) unit can be used to flexibly search
over multiple frequency bands simultaneously. In the later option,
high-speed Analog-to-Digital Converter (ADC) is required to cope
up with extremely high sampling rates. Nyquist rate sampling
requires high-rate ADCs and the ability for processing devices
to handle a huge number of samples resulting in excessive memory occupation and energy consumption requirements. Therefore,
lower computational complexity and reduced power consumption
is desired for wideband sensing algorithms [60]. CS can overcome
those difficulties effectively [15, 18, 19, 23]. CS is a method of acquisition of sparse signals considering very few samples which are
significantly lower than the Nyquist sampling rate. The problem of signal reconstruction can be solved by convex optimization
problem, called l1 -norm regularization, that uses the Basis Pursuit (BP) [20] or some other greedy pursuits such as Orthogonal
Matching Pursuit (OMP) [71] or compressed sensing orthogonal
matching pursuit [56]. All these schemes provide an effective way
to sense the discrete-time sparse (sparsity in frequency domain)
signals and perfectly (or near perfectly) reconstruct by using a
few number of random projections. CS relies on the empirical
observation that many types of signals or images can be wellapproximated by sparse representation in terms of a suitable basis functions, i.e., considering only a few significant coecients or
Number of Non-Zero (NNZ) elements in the signal vector. When
reconstructing the signal, the non-stored coecients are simply set
to zero. This is obviously a reasonable strategy when full information of the signal is unavailable or difficult to obtain. In
order to deal with wideband signal acquisition from compress-
University of Genova – DITEN
68
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
ible signals which enables sub-Nyquist data acquisition via an
Analog-to-Information Converter (AIC) or a Random Demodulator (RD) [?,40]. An AIC directly relates to the idea of sampling at
the information rate of the signal. The CR with a wider spectral
awareness could potentially exploit more spectral opportunities
and obtain greater achievable rates. Therefore, wide band spectrum sensing techniques have attracted much attention among
researchers [64]. In [25], a traditional filter-bank based approach
was presented for wideband spectrum sensing in a multi-carrier
communication environment. It has been shown to have a higher
spectral dynamic range than conventional power spectrum estimation approach. Another filter-based method has been discussed
for wideband spectrum sensing in [30] and here the filter outputs
has been considered for channel energy vector recovery via a CS
scheme. In [61], the authors proposed a multiband joint detection
scheme in order to detect the active PUs over multiple frequency
bands. Also, the authors have claimed this scheme outperforms in
some practical conditions. Compressed samples subsequent to a
wavelet based approach were employed to detect and classify the
wideband RF signals [69]. In [77], an estimation of the RF spectrum based on CS scheme was proposed for wideband spectrum
sensing in CR networks. In particular, authors in [77] introduced
the auto-correlation of the compressed signal to estimate the spectrum of the sparse signal. In most of the papers, the authors are
devoted to estimate the whole wideband spectrum to find a spectrum hole for opportunistic access of CRs [30,64]. To estimate the
whole wideband in CS domain implies computational burden as
well as it requires more memory space to store signal vector and
hence prohibitive energy cost.
To avoid the estimation of wideband spectrum, our emphasis is to reconstruct a significant portion (which is more sparse
University of Genova – DITEN
4.1 Introduction
69
than the other part of spectrum) of it, as a result of making computational complexity significantly lower. As soon as the wideband signal undergoes at different BPFs, it selects the RF band
of interest and divide the whole wideband spectrum into several
frequency bins (FBs). Sparsity is one of the fundamental requirements for spectral recovery that has already been proposed in
CS theory [19, 23]. Primarily, this paper aims to discover the
highly-sparse frequency bin (HSFB) by average energy comparison of each FB. The energy estimation of every FB has performed
by taking random sub-Nyquist rate samples coming out from the
RD. The HSFB exploits several indications; first, it ensures of
having minimum number of PUs active which substantially exploit maximum opportunistic accessibility for a CR user. Second,
the more the sparsity, the better would be the spectral estimation
which contributes better detection performance. Third, spectral
estimation of a single HSFB rather than entire wideband would
ask minor computational complexity. Now we give emphasis on
spectral estimation of the HSFB via a convex optimization approach called l1 -norm minimization. Later, we pay attention to
check the spectrum occupancy status of a PU by using the energy
detector (ED) [22]. The proposed approach outperforms existing
wideband spectrum sensing methods, in terms of lower computational burden, lower memory requirements as well as progressive
achievable throughputs for CR networks [9].
The remainder of this chapter is organized as follows. In section 4.3, compressive sampling basics are discussed and section 4.4
briefly describes compressed spectrum sensing from a single CR
node. Signal and system model for the problem is proposed in section IV and V, respectively. In section VI, performance analysis
and computational complexity are carried out through simulations
and analysis, respectively. Also, some advantages of the proposed
University of Genova – DITEN
70
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
model are highlighted in this section. Finally, some conclusions
are drawn in section VII.
4.2
Signal model
Our objective is to decide the primary signal occupancy state
of a specific frequency band within a frequency bin(FB) and the
band is denoted by l(l = 1, 2, · · · , L). To do so, the hypothesis
test for detecting the occupancy status of PU in a band of interest
is measured as H0,l (absences of a PU and H1,l (presence of a PU).
That is, we test the following binary hypotheses:
(
X̂[l] =
W [l]
H0,l
Hl S[l] + W [l] H1,l
(4.1)
where X is the spectrum of the band of interest estimated
through the promising l1 -minimization scheme, discussed in [6-7].
Hl stands for the discrete frequency response between the PU and
the CR, S[l] is the primary signal transmitted within a PU band
n along with complex Additive White Gaussian Noise (AWGN)
W [l] of zero mean and unity variance. For simplicity, we note
that the CRs keep quiet during every detection period while the
PU signals with background noises are in the environment which
is secured by the higher layer protocols e.g., medium access control schemes. Since the performance of an ED does not require
a-priori information of the PU network and less complex to implement [65] which make it popular to the designer in practical
cases. Therefore, the signal energy is calculated over an interval
of J samples by
E[l] =
J−1
X
2
X̂j [l] , l = 1, 2, · · · , L
j=0
University of Genova – DITEN
(4.2)
4.2 Signal model
71
where X̂j [l] indicates the spectral estimation of the j-th subchannel under concerning to CR and the decision parameter of
the ED is given by
H1,l
E[l]
≥
<
λl , l = 1, 2, · · · L
(4.3)
H0,l
where λl is the decision threshold of a PU sub-channel of interest
inside a FB xk . Following [65], the signal energy can be described
as
(
E[l] ∼
χ22j ,
2
χ2j (2γ[l]),
H0,l
H1,l
(4.4)
where γ[l] denotes the signal-to-noise ratio (SNR) at the CR
of a frequency band, and χ22j and χ22j (2γ[l]) denote central and
non-central chi-square distributions, respectively. Both those distributions have degrees of freedom of 2j. For simplicity, we assume that the primary radios deploy uniform power transmission
strategy. Both distributions have degrees of freedom of 2j. We assume for simplicity that the primary radios deploy uniform power
transmission strategy. The probability of detection, Pd and the
probability of false alarm, Pf a can be calculated as offered in [22].
Pf,l = P r(E[l] > λl | H0,l ) =
Pd,l = P r(E[l] > λl | H1,l ) = QJ
p
Γ(J, λ2l )
Γ(J)
(4.5)
√ 2γ[l], γl
(4.6)
where, Γ(u) is the gamma function, Γ(u, x) is the incomplete
gamma function, and Qj (u, x) denotes the generalized Marcum
Q-function.
University of Genova – DITEN
72
4.3
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
System Model and Problem Formulation
Suppose that a CR receiver has employed with a band-pass
filter bank as depicted in Fig. 4.1. Let the PUs of a radio network mutually share the wideband signal xc (t) of bandwidth W
Hz and the bandwidth of every non-overlapped PU is B Hz which
could potentially serve the demand of a CR node. In addition,
the signal xc (t) is comprised of a maximum of W
B PU bands as
depicted in Fig. 4.1 where a few bands are always randomly available for opportunistic accessing to CRs. Here, K number of idenK
tical BPFs {Hk (f )}k=1 (where Hk (f ) denotes transfer function
of the k-th BPF) divide the signal in K different frequency bins
(FBs), are denoted as xk of equal bandwidth wk = W
K Hz where
k = 1, 2, · · · , K. At any particular time each xk is accommodated
with different number of active PUs randomly from a maximum
of wBk bands. For simplicity, assume that at least one PU subband exists in a FB xk at a certain time. The energy estimation
of every FB has performed by taking random compressed samples
Mk derived from the RD. Those Mk samples are intended for calculating the average energy Ek of a single FB and compare those
K
average energies {Ek }k=1 at the energy estimate and compare
block. It is important to note that the comparator should restore
the sample values while comparing the values of Ek of various
FBs. Meanwhile, the HSFB of having minimum average energy,
Ek(min) is detected by the comparator along with the samples
which is then considered for approximating the spectral magni 2
tude X̂k via a well-known l1 -minimization algorithm [23]. The
HSFB indicates minimum number of PUs actively present which
substantially provides maximum opportunistic accessibility to a
CR user. Besides, the theory of CS tells that the more the sparUniversity of Genova – DITEN
4.4 Computational Complexity of the Proposed Method
73
sity, the better would be the spectral estimation which contributes
better detection performance. Moreover, spectral estimation of a
single HSFB rather than entire wideband require less computational burden. With HSFB spectrum, we proceed to look for a
vacant PU sub-band for opportunistic usage to a stand-alone CR
by exploiting a well-known ED approach proposed in [22]. Later,
to improve the reliability of sensing performance, a cooperative
CR network is set where each CR has the capability of wideband
sensing exploiting the schematic in Fig. 4.1.
Figure 4.1:
ment.
4.4
Schemetic block to detect the sparse wideband seg-
Computational Complexity of the
Proposed Method
Now we try to compute the computational complexity of this
CR receiver block expressed in Fig. 4.1. As the subsampled
Fourier matrix (it is customized by pooling of m rows selected
uniformly at random from the Discrete Fourier Transform (DFT)
matrix) is applied to the signal recovery hence it necessitates
O(N logN ) operation (in particular, the computational burden
= numberof iterations × N × logN , where number of iterations is
University of Genova – DITEN
74
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
not usually easy to bound, but in worst-case, it can be bounded
by N ). By using K number of filters, the computational complexN
N
ity is reduced in the order of O(KlogK) and it requires O K
log K
.
In addition, in a static manner, the floating point computation
needed to estimate the average energy of each FB by applying
linear algebra which in the order of O(2n − 1) ≈ O(2n) where n is
the percentage of random samples that considered for estimating
the average energy. Furthermore, large value of n (energy estimate block in Fig.4.1 gives the better estimate of choosing the
most suitable FB and let, O(2n) = O(P ). There is one additional
item of computation that is used for comparison of the average
energies of every FB that depends on the number of BPFs. So,
O(K) computation is needed for energy comparison of each FB.
Therefore, the total computational burden is the added form of
all those three items discussed above
Ω = O(
N
N
log + P + K)
K
K
(4.7)
As K P and K N , the 4.7 can be re-written in the following
form
Ω = O(
N
N
log + P )
K
K
(4.8)
Another important entity is to notice the memory space needed
for the proposed CR receiver system as well as convex optimization process. There are two terms to consider; firstly O(N ) bits of
memory spaces are to be required for the recovered spectrum of
length N and the later is O(M × N ) for the measurement matrix
N
to store [15]. In the proposed method, we require only O( K
) memory spaces to store the estimated spectrum as K numbers of filters
are used. Besides, memory space requirement is greatly reduced
by the measurement matrix as the space requirement is divided
University of Genova – DITEN
4.4 Computational Complexity of the Proposed Method
75
N
M ×N
by the K-th square of O(M × N ) i.e. O( M
K × K ) = O( K 2 ). Furthermore, we have to spend some static memory spaces for storing
the random samples comes out from the RD which is in the order
of O( 12 P ). The storing of the random samples is a prerequisite due
to average energy estimation of each FBs. Therefore, the expression of the total memory spaces required for the proposed method
is
Υ = O(
N
M ×N
1
+
+ P)
2
K
K
2
(4.9)
which is greatly influenced by the number of BPFs, K. As computational burden decreases with the increasing number of filters, K
and so this does not necessarily mean that high number of filters
K always increases the sparsity in some basis functions. If K is
too large, the sparsity is reduced in substantial order and hence
spectral recovery would be ambiguous to resolve. Therefore, selection of higher values of BPF, K have two complications; one is
budget constraints for designing such type of CR receiver sensing
block and later, too high value of K does not convey suitable sparsity S. Therefore, there should be a trade-off to choose the value
K in which sparsity and cost is bounded in a best possible way.
If all the PU sub-channels are empty of a FB, xk then the spectral estimation of that FB is based on only the background noise
(i.e. absent of NNZ values and the FB is no more sparse in arithmetic viewpoint) and spectral estimation via the l1 -minimization
methodology could give incorrect result that might mislead detection performance in wideband spectrum sensing.
University of Genova – DITEN
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
76
4.5
Performance Analysis and Simulation Results
We consider, at baseband, the wideband signal xc (t) falling in
the range of [1 ∼ 64]∆ Hz can accommodate a maximum of 32
32
non-overlapping PU bands of [1 ∼ 2]∆ Hz and encoded as {chl }l=1
, where ∆ is the frequency resolution. The received signal xc (t)
at the CR node is as follows [64]
xc (t) =
N p
X
(En Bn ). sinc(Bn (t − δ)). cos(2πfn (t − δ)) + z(t)
n=1
(4.10)
where sinc(x) = sin(πx)
πx , δ denotes a random time offset within
sampling branches, z(t) is the Additive White Gaussian Noise of
unit variance. In simulations, the number of BPFs are considered
as K = 4 so the bandwidth of each xk is wk = 16∆ Hz, i.e., a
single FB can comprise a maximum of wBk = 8 PUs having no
sparsity. A total of 15 PU bands with different carrier frequen15
cies {fn }n=1 present inside the wideband W when probing the
burst of transmissions. The distribution of active PUs in various
4
FBs are {xk }k=1 = {4, 5, 4, 2} with dissimilar sparsity levels. The
number of Nyquist rate samples N are taken from HSFB for an
observation time T . The average energy estimation of various FBs
are performed by reflecting a fixed compression ratio M
N = 40%
and from those FBs, the energy comparator selects x4 (t) as HSFB
(having average sparsity of 75%) tailored for spectral estimation.
DFT is selected as the sparsifying basis to form the measurement
matrix, and is used to solve the l1 -minimization scheme leading
to HSFB spectrum estimation. Centered on the HSFB spectrum,
the detection performance is tested of a band of interest of PU by
varying the compression ratio M
N from 1% to 40%. For comparUniversity of Genova – DITEN
4.5 Performance Analysis and Simulation Results
77
ison, detection performance of the same PU band is considered
after spectral estimation of the full wideband signal xc (t) preceded over a single radio block (with average sparsity of 53%).
Consequently, number of samples N changes accordingly to fix
the sampling time T = 32s.
Pd of a PU band with the influence of Compression Ratio
Simulated Detection Probability,Pd
1
SNR:10dB
SNR: 5dB
SNR: 0dB
0.8
0.6
0.4
0.2
0
0
10
20
30
40
Compression Ratio, M/N (%)
Figure 4.2: Influence of compression ratio on the detection performance.
Fig. 4.2 illustrates the influence of the compression ratio M
N on
the PU detection performance by setting Pf a = 0.01 and received
SNR of the active channels are set to 0 dB,5 dB and 10 dB which
also illustrates the detection performance is a function of signal
sparsity (shown in Fig. 4.3); the proposed block selects HSFB
which provides improved detection performance. The Fig. 4.3
satisfies the theory of compressed sensing as highly sparse signals
provides better spectral estimation and hence the probability of
detection.
To make simulation environment relaxed, we consider frequency
University of Genova – DITEN
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
78
Pd of a PU band with the influence of Compression Ratio
Simulated Detection Probability,Pd
1
0.8
0.6
Proposed method:10dB
traditional method:10dB
Proposed method: 5dB
traditional method: 5dB
0.4
0.2
0
0
10
20
30
40
Compression Ratio, M/N (%)
Figure 4.3: Detection performance as a function of compression
ratio M
N
resolution ∆ is 1 MHz so the signal has a global bandwidth of
W = 64 MHz. In this setting, the number of Nyquist samples,
N = 4096 if the band was sampled at Nyquist rate for T = 32µs.
For energy estimation inside each FB we chose a compression raM
tio, M
N of 40% while the compression ratio, N has varied from
1% to 40% for spectral estimation. Fig. 4.3 presents the trade-off
between performance and processing time for different values of
S which is the number of particles in the proposal and the only
additional parameter in the presented method. For a number of
particles S = 1000 one can obtain a good trade-off between relative increase in performance (Aprox. 75% decrease in error) while
having a low relative increase in processing time (Aprox. 25%).
In simulation, probability of detection Pd is chosen by statistical
averaging of 2000 experimental results.
There are several obtainable advantages of the proposed comUniversity of Genova – DITEN
4.5 Performance Analysis and Simulation Results
79
Complexity order with the influence of no. of filters
1
0.9
Complexity order
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1
2
3
4
5
6
7
8
No. of filters
Figure 4.4:
Order of computational burden needed with the
influence of no. of filters.
pressed sensing approach with the proposed CR receiver sensing
block. First, with l1 -minimization, the desired spectrum is estimated considering only a few (M ) number of random samples of
the designated FB, xk . In Fig. 4.4, it is analytically computed
the order of computational burden by using (4.7) which enables
to perform wideband spectrum sensing with fewer computational
complexity. Here, the number of samples are decreased by the
influence of the number of BPFs, K. Therefore, in the proposed
system saves arithmetic computations in the order of O(K log K).
As a rough estimate, the proposed approach saves computational
burden of 45% while using K = 4 (Fig. 4.4).
Moreover, this approach of wideband sensing saves the memory storage of bits in the order of O(K) according to 4.9. The
consequence of number of BPFs on the memory space requisite is
plotted in Fig. 4.5. It displays the proposed technique of wideUniversity of Genova – DITEN
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
80
Order of memory space required
Memory space required as a function of no. of filters
1
0.8
0.6
0.4
0.2
0
1
2
3
4
5
No. of filters
6
7
8
Figure 4.5: Order of memory space requirement with the influence of no. of filters.
band sensing involves only 10% of physical memory spaces than
that followed by a single RF chain.
Besides, the K-th number of filters introduced in the proposed
method are wideband BPF having much smaller impulse response
which make the filter less complex to be constructed. As the Kth filter having the bandwidth, wk larger than a single PU can
occupy, give the indications that the filtering complexity of the
proposed method is reduced by a factor of w1k × wK2 = wK2 over the
k
k
conventional channel-by-channel scanning [30].
The FB comprising minimum energy Ek(min) has two significant meaning; firstly, within this frequency bin xk , minimum
number of PU bands are possibly active at that time. Secondly,
Ek(min) suggests the enhanced sparsity level in the frequency domain of that FB which is one of the fundamental requirements
of signal recovery in CS from partial non-adaptive measurements.
University of Genova – DITEN
4.6 Achievable Throughput of a Stand-Alone CR
Terminal
81
As this method estimate the spectrum of a single FB which is
highly-sparse in frequency domain than the complete spectrum estimation, thus dry up computational burden as well sensing time.
Considering those issues in future, we will find improved detection
performance and enhanced achievable capacity [9] of the proposed
CR receiver sensing module.
4.6
Achievable Throughput of a StandAlone CR Terminal
To compute the achievable throughput for CR network we consider a simple problem which is collision free (as PU is absent and
so no false alarm is caused by the CR) achievable throughput for
CR network. Let us consider, τ is the time slot reserved for sensing operation and (T −τ ) is the data transmission slot duration as
shown in Fig. 4.6 [68]. Also, denote C0 as the achievable capacity
of a CR network considering PU data transmission off and C0 can
be written
Figure 4.6: Graphical structure of a typical frame of a CR data
transmission.
as C0 = log2 (1 + SN Rs ), where SN Rs denote the signal-toUniversity of Genova – DITEN
82
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
noise ratio (SNR) of a CR link. Inside an interoperable network,
we also consider PU data transmission, CR data transmission and
reception are Gaussian, white in nature and independent to each
other. For a particular band of interest, P (H0 ) signifies the probability for which the PU data transmission is absent. Therefore,
we recall the optimal achievable rate R(τ ) from [45] is
√
τ
R(τ ) = C0 P (H0 )(1 − )(1 − Q(α + N γ))
(4.11)
T
p
where α = 2γ + 1Q−1 Pd . From equation 4.11, it has been
noticed that the achievable rate of a CR node varies with the sensing slot duration as well as frame duration e.g., the throughput
is greater for shorter sensing time period τ with a fixed frame
length T . Hence, we try to sort out a trade-off between the sensing length and frame length. As the miss detection probability,
Pm can obligate with the possibility of data collision (a collapse
of achievable throughput) with the PU transmission while the
probability of false alarm Pf a recommends the CR to stop packet
transmission during the frame interval though PU channel is idle
at that instant which also decrease the throughput performance.
We assume Medium Access Control (MAC) layer of CR network
guarantees that only one CR can have the accessibility of a PU
sub-channel at a particular time to avoid the collisions among the
CR nodes inside the network [45]. Therefore, collisions can only
be possible between the CR and the PU.
Later, to testify the achievable rate of the proposed CR system, the throughput performance is investigated. To make easily
understandable, we choose low regime SNR value of the PU system, e.g., SNR= −10 dB, probability of detection Pd = 0.90 and
probability of PU transmission is absent, P (H0 ) = 0.90 when a
CR node wishes to transmit. Intuitively, the sensing time, τ engaged for the proposed approach and the full spectrum estimation
University of Genova – DITEN
4.6 Achievable Throughput of a Stand-Alone CR
Terminal
83
Simulated Throughput (bits/Sec/Hz)
Influence of the Throughput on τ: Frame=50 msec.
7
6
SNR:
SNR:
SNR:
SNR:
SNR:
SNR:
5
4
3
20dB-p.
20dB
10dB-p.
10dB
5dB-p.
5dB
2
1
0
2
4
6
8
10
12
Sensing Time, τ (msec)
Figure 4.7: Simulation of achievable rate against sensing time for
a fixed frame length
with a single RF chain followed by promising CS method is considered during simulation operation. Meanwhile, this sensing time, τ
is applied in equation 4.11 to find the optimum throughput for a
fixed frame length of 50 ms and different SNR values as illustrated
in Fig. 4.7. To proceed further, we again investigate (Fig. 4.8 and
4.9) the optimum throughput of the same arrangement but this
time a variation of the frame length is used with a fixed sensing
time, = 4.7 ms and = 11 ms. Both plots (Fig. 4.8 and Fig. 4.9)
demonstrate that the proposed method outperforms with respect
to a conventional CS based spectrum estimation. Inside the legends of the figures the notation · · · p. have marked ( Fig. 4.7, Fig.
4.8 and Fig. 4.9) our proposed approach.
University of Genova – DITEN
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
84
Achievable Throughput vs. varying T: τ=4.7 msec.
Simulated Throughput (bits/Sec/Hz)
6
5
SNR:
SNR:
SNR:
SNR:
SNR:
SNR:
4
3
5dB-p.
5dB
10dB-p.
10dB
20dB-p.
20dB
2
1
0
0
20
40
60
80
100
Frame Length, T (msec.)
Figure 4.8: Illustration of the achievable rate against Frame length
for a fixed sensing time
Throughput vs. variable Frame Length: τ=11.6msec.
Simulated Throughput (bits/Sec/Hz)
5.5
5
SNR:20dB
SNR:20dB-p.
SNR:15dB
SNR:15dB-p.
SNR:10dB
SNR:10dB-p.
4.5
4
3.5
3
2.5
2
0
0.1
0.2
0.3
0.4
0.5
Frame Length (sec.)
Figure 4.9: Influence of the CR Achievable rate on the sensing
time
University of Genova – DITEN
4.7 Summary
4.7
85
Summary
This chapter describes an innovative block of CR receiver module for wideband spectrum sensing by exploiting Compressive Sensing. Starting with a time domain signal, a single FB is estimated
and detection performance has been explored through simulations
to a band of interest of a CR. Finally, achievable throughput performance of a static frame duration as well as static sensing length
are compared to a traditional spectrum sensing methodology subsequent to a single RF chain with CS method. Corroborating simulation outcomes guarantee the worth of the proposed approach.
University of Genova – DITEN
86
Chapter 4 : Compressive Sensing for Wideband
Cognitive Radios
University of Genova – DITEN
Chapter 5
Cooperative
Compressive Sensing
for Wideband
Cognitive Radios
5.1
Introduction
Recent research claims that spectrum is heavily underutilized
( [10] [32] [43] [64]) most of the times by the Primary User (PU)s)
at any particular time and geographic location, thus degrades
spectrum utilization efficiency. To improve the efficiency, opportunistic spectrum access is employed by Cognitive Radio (CR)s;
a new paradigm of spectrum agile wireless networks. while the
CR searches opportunity in the wideband, it could potentially exploit more spectral opportunities and obtain greater data rates
for various mobile applications [64]. As sparsity plays a key role
87
88
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
in Compressive Sensing (CS) [23], the previous chapter [4] introduces a novel schematic block of spectrum sensing incorporated
in stand-alone wideband CR receiver which aims to discover the
highly-sparse frequency bin (HSFB) by compairing the average energies among the different frequency bins (FBs) come out from the
entire wideband. The spectrum of HSFB is then approximated via
a convex optimization approach [23] called l1 -norm minimization
and the detection performance of a Primary User band remains
in HSFB is identified by using an energy detector (ED) [22] and
compared it with the detection performance of the same band of
the entire wideband in terms of sparsity. In fact, the proposed
scheme provides better detection performance since the presence
of higher sparsity in HSFB. Besides, this scheme requires lower
computational burden and lower memory requirements.
Spectrum sensing performed by a stand-alone CR is critical
while dealing with multipath fading and hidden node problems
[43], [75] and reliability of performance is questionable. Thus,
cooperative spectrum sensing (COSS) is introduced to get reliable
detection performance as well as to minimize the interference to
PUs and in consequence, the false alarm probability is reduced.
We compare different fusion rules in COSS environment in terms
of detection performance, control channel capacities, etc. and
in consequence the detection performance is again improved in
terms of number of CRs. In the later section 5.5, we discuss some
practical implementation issues related to wideband CR exploiting
compressed sensing.
5.2
System Model
Let the PUs of a radio network mutually share the wideband
signal xc (t) of bandwidth W Hz and the bandwidth of every nonUniversity of Genova – DITEN
5.2 System Model
89
overlapped PU is B Hz which could potentially serve the demand
of a CR node. In addition, the signal xc (t) is comprised of a maximum of W
B PU bands as depicted in Fig. 4.1 where a few bands
are always randomly available for opportunistic accessing to CRs.
K
Here, K number of identical BPFs {Hk (f )}k=1 (where Hk (f ) denotes transfer function of the k-th Band-Pass Filter (BPF)) divide
the signal in K different frequency bins (FBs), are denoted as xk
of equal bandwidth wk = W
K Hz where k = 1, 2, · · · , K. At any
particular time each xk is accommodated with different number of
active PUs randomly from a maximum of wBk bands. For simplicity, assume that at least one PU sub-band exists in a FB xk at a
certain time. The energy estimation of every FB has performed by
taking random compressed samples Mk derived from the Random
Demodulator (RD). Those Mk samples are intended for calculating the average energy Ek of a single FB and compare those
K
average energies {Ek }k=1 at the energy estimate and compare
block. It is important to note that the comparator should restore
the sample values while comparing the values of Ek of various
FBs. Meanwhile, the HSFB of having minimum average energy,
Ek(min) is detected by the comparator along with the samples
which is then considered for approximating the spectral magni 2
tude X̂k via a well-known l1 -minimization algorithm [23]. The
HSFB indicates minimum number of PUs actively present which
substantially provides maximum opportunistic accessibility to a
CR user. Besides, the theory of CS tells that the more the sparsity, the better would be the spectral estimation which contributes
better detection performance. Moreover, spectral estimation of a
single HSFB rather than entire wideband require less computational burden. With HSFB spectrum, we proceed to look for a
vacant PU sub-band for opportunistic usage to a stand-alone CR
by exploiting a well-known ED approach proposed in [22]. Later,
University of Genova – DITEN
90
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
to improve the reliability of sensing performance, a cooperative
CR network is set where each CR has the capability of wideband
sensing exploiting the schematic discussed in Chapter 4 in Fig.
4.1.
5.3
Decision Fusion
In COSS, all the member CRs take part independently in local spectrum sensing and based on this detection performance a
binary decision of a chosen PU band status is made. Now, all CRs
forward their local decisions ui ∈ {0, 1} to a Decision Maker (DM)
and it is responsible to find the global decision U of a chosen PU
band by combining the local hard decisions [75].
(
U =0
ui
F =
U =1
i=1
n
X
if F < J
otherwise
(5.1)
where U = 1 indicates that the PU is present whereas U = 0
indicates opposite to it. Note that the fusion rule reported in
(5.1) represents the J-out-of-N fusion rule and indicates global
decision U = 1 if at least J number of CR nodes over N decide
for the presence of the PU [75]. In fact, if J = 1 the fusion
rule in (5.1) coincides with logic-OR (LO) fusion rule, while logicAND (LA) fusion rule occurs when J = N , where both rules
represent the special cases of (5.1). Intuitively, the LO rule is
much conservative than the LA fusion rule while accessing PU
bands as LO fusion rule does not allow CR transmissions even if
a single CR detects the presence of PUs in COSS network [43]
whereas the LA rule stops CR transmission only if all the CR
nodes in the network detect the presence of PUs. Those logical
rules can provide a satisfactory performance in many practical
scenario while the optimality of the fusion is not guaranteed, hence
University of Genova – DITEN
5.4 Performance Comparison and Simulation Results 91
optimal fusion (OF) rule comes out which is employed by the
following likelihood ratio test [75]:
Λ0 =
n X
Pdi
1 − Pdi
P (H1 )
ui log
+ (1 − ui ) log
+ log
(5.2)
P
1
−
P
P (H0 )
f
f
i
i
i=1
When Λ0 ≥ 0, then the PU is present; otherwise, DM decides
the absence of PUs. The OF rule presented in (5.2) is monotonic assuming Pdi ≥ Pf i and can be implemented by adopting
a weighted sum of the incoming local decisions then, comparing
it with a threshold which also depends on prior probabilities and
cost [75]. Usually, the weights represent the reliability of the local
decisions in terms of the probability of detection and the probability of false alarm and OF rule tries to minimize the average cost
of making decisions. As OF scheme requires the local decision ui ,
along with the probability of false alarm Pf i , and the the probability of detection Pdi of the i-th CR node, thus, higher processing
and control channel capacities are required than the logical fusion
rules in (5.1).
5.4
Performance Comparison and Simulation Results
At baseband, the wideband signal xc (t) falling in the range of
[1 ∼ 64]∆ Hz can accommodate a maximum of 32 non-overlapping
32
PU bands of [1 ∼ 2]∆ Hz and encoded as {chl }l=1 , where ∆ is the
frequency resolution. The received signal xc (t) at the CR node is
as follows [64]
xc (t) =
N p
X
(En Bn ). sinc(Bn (t − δ)). cos(2πfn (t − δ)) + z(t)
n=1
(5.3)
University of Genova – DITEN
92
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
where sinc(x) = sin(πx)
πx , δ denotes a random time offset within
sampling branches, z(t) is the Additive White Gaussian Noise
(AWGN) of unit variance. In simulations, the number of BPFs
are considered as K = 4 so the bandwidth of each xk is wk = 16∆
Hz, i.e. a single FB can comprise a maximum of wBk = 8 PUs
having no sparsity. A total of 15 PU bands with different carrier
15
frequencies {fn }n=1 present inside the wideband W when probing the burst of transmissions. The distribution of active PUs in
4
various FBs are {xk }k=1 = {4, 5, 4, 2} with dissimilar sparsity levels. The number of Nyquist rate samples N are taken from HSFB
for an observation time T (e.g., the chosen frequency resolution
∆ = 1 MHZ and N = 1024 samples to satisfy T = 32µs). The average energy estimation of various FBs are performed by reflecting
a fixed compression ratio M
N = 40% and from those FBs, the energy comparator selects x4 (t) as HSFB (having average sparsity of
75%) tailored for spectral estimation. The Discrete Fourier Transform (DFT) is selected as the sparsifying basis to form the measurement matrix, and is used to solve the l1 -minimization scheme
leading to HSFB spectrum estimation. Centered on the HSFB
spectrum, the detection performance is tested of a band of interest of PU by varying the compression ratio M
N from 1% to 40%.
For comparison, detection performance of the same PU band is
considered after spectral estimation of the full wideband signal
xc (t) preceded over a single radio block (with average sparsity of
53%). Consequently, number of samples N changes accordingly
to fix the sampling time T = 32s. Fig. 5.1 illustrates the influence
of the compression ratio M
N on the PU detection performance by
setting Pf a = 0.01 and received SNR of the active channels are
set to 5 dB and 10 dB which also illustrates the detection performance is a function of signal sparsity; the proposed block selects
HSFB which provides improved detection performance. In simu-
University of Genova – DITEN
5.4 Performance Comparison and Simulation Results 93
lation, Pd is selected by statistical averaging of 2000 experimental
results.
Pd of a PU band with the influence of Compression Ratio
Simulated Detection Probability,Pd
1
0.8
0.6
Sparsity
Sparsity
Sparsity
Sparsity
0.4
S=75%
S=53%
S=75%
S=53%
&
&
&
&
SNR=
SNR=
SNR=
SNR=
10dB
10dB
5dB
5dB
0.2
0
0
5
10
15
20
25
30
35
40
Compression Ratio, M/N (%)
Figure 5.1: Detection probability as a function of sparsity.
Again, in COSS scenario, we assume two and threes identical
CRs, successively. The receiver operating characteristic (ROC)
is obtained in Fig. 5.3 by CRs which incorporate the receiver
block of Fig. 4.1 in Chapter 4 and forward the sensing decisions
to the DM which combines according to fusion rules. Fig. 5.2
demonstrates the optimal fusion rule of sensing decisions which
employs narrowband signal in CR while Fig. 5.3 represents the
fusion rules of sensing decisions that employs wideband signal in
CR systems. The curves in Fig. 5.2 and Fig. 5.3 illustrate the
superiority of different fusion rules in different regions and it illustrates the monotonic OF rule has overall better performances
than the considered logical fusion schemes. In addition, by using
COSS in a highly noisy case, the performance is much better than
the high SNR values used by a single CR node. Besides, the detecUniversity of Genova – DITEN
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
94
tion performance improves with the number of cooperative CRs
which is examined by considering three CRs in COSS setting.
ROC curves after applying different fusion rules
Probability of detection
1
0.8
OR Rule
AND Rule
0.6
OR3 Rule
AND3 Rule
0.4
ROC
CVfusion3node
0.2
0
0
0.2
0.4
0.6
0.8
1
Probability of false alarm
Figure 5.2: ROC performance of stand-alone and cooperative narrowband CR nodes.
The performance improvement is achieved with the optimal
fusion (OF) rule at the expense of the processing capabilities of
DM, CRs and control channel. In fact, the OF rule requires the
knowledge of the local decisions ui with the associated Pd and
Pf which must be obtained at the CRs to forward to the DM.
Moreover, the combining decisions at the DM is more complex
to apply OF rule, reported in (5.2), than its logical counterparts,
reported in (5.1). In the presence of channel fading, the detection performance and Receiver Operating Characteristics (ROC)
curves provided in [64] having similar characteristics except degraded detection performance with respect to AWGN channel.
Therefore, the fusion rule is proposed here to improve reliability in PU detection would also applicable for CR network which
University of Genova – DITEN
5.5 Practical Implementation Challenges
95
experiences the problem of multipaths and channel fading.
1
ROC curves in cooperative wideband CRNs
0.9
Detection probability
0.8
ROC-SNR5dB
0.7
CV-Fusion2Node
0.6
LO-Fusion2Node
0.5
LA-Fusion2Node
CV-Fusion3Node
0.4
LO-Fusion3Node
0.3
LA-Fusion3Node
0.2
ROC-SNR10dB
0.1
0
0
0.2
0.4
0.6
0.8
1
Probability of False Alarm
Figure 5.3: ROC performance of stand-alone and cooperative
wideband CR nodes.
5.5
Practical Implementation Challenges
In this section, we would like to point out some major practical
performance issues related with the proposed wideband spectrum
sensing module. We start with a a description of the influence of
the main parameters governing the scheme performance. Second,
we point out the shortcomings arise for this detector (for simplicity
we consider the linear and known noise variance which is not the
case in practice, also local channels of the distributed network is
considered as independent and identically distributed (iid). Then
we describe the main architectures which have already been proposed in the literature to implement the Analog-to-Information
Converter (AIC) and we finally conclude the chapter with a low
University of Genova – DITEN
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
96
complexity distributed compressive reconstruction algorithm to
perform the detection without going into the intermediate stage
of estimating the Power Spectral Density (PSD).
5.5.1
Degrees of freedom to enhance detection
performance
All simulations that have been performed throughout the thesis considering the preset value of the parameters. The influence
of the parameters are illustrated in the following:
• Spectral estimaion block size (N ): this parameter is related
to the bandwidth resolution of CR receiver, referred to as
the ability to distinguish the spectral features.
• Number of compressive measurements (M): the applied compression in the scheme influences the error in the formation
of PSD estimate. it has been shown from simulations that
a compression rate of 5% incurs a very similar performance
as the classic full rate Nyquist samples.
• Measurement Matrix (Φ): In the earlier section, we have introduced several possible measurement matrices. The main
significant issue of the measurement matrix is to provide the
incohorency with the sparsifying basis. The more the incoherency is, the less measurements are needed by the compressive edge optimization algorithm to converge. Owing to
the universal incoherency of the Gaussian matrix, we have
chosen this type of matrix to run the simulations all along
the thesis.
• Wavelet smoothing function (W): The matrix W introduced
in [ZTian:2006] to calculate the edge transform domain matrix G represents the discrete time wavelet smoothing funcUniversity of Genova – DITEN
5.5 Practical Implementation Challenges
97
tion. Due to the inversion involved when obtaining G, the
wavelet function can not be freely dilated. In fact, our
method is not eligible to perform a multiscale or multiresolution wavelet transform. The interest of a multi-resolution
transform comes from the fact that the edges of interest
would show up always at the same positions. On the contrary, noise-induced spurious edges are random at each scale
and thus tend not propagate through all scales; hence, if
a multiscale wavelet transform has been provided, an enhanced PSD estimation would be possible as well as improved detection performance of the CR networks.
5.5.2
Detection without estimation
A joint recovery algorithm has been proposed in [24], named as
One-Step Greedy Algorithm which is intended to recover the joint
common sparse support of a wideband signal ensemble with fewer
than O(K log N ) measurements per CR. Of course this approach
does not recover the coefficients for each signal but it provides a
sufficient statistic to perform detection at lower complexity, i.e.
theorem 1 in [24] claims that with M ≥ 1 measurements per signal, One-Step Greedy Algorithm (OSGA) recovers the common
sparse support with probability approaching 1 as J → ∞. We
next show from simulations that OSGA may be utilized as a recovery algorithm for the architecture shown in Figure 5.4 under
the same assumption of joint sparsity concerning the case of multiple sparse signals that share common sparse components, but
with different coefficients. The measurements can be obtained
following any of the acquisition schemes described in Chapter 3.
Again, for simplicity we shall develop the equations for our proposed architecture (Section 3.3). We assume that an equal number
of measurements is taken per CR and we write Θj in terms of its
University of Genova – DITEN
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
98
columns
Θj = [θj,1 , θj,2 , · · · θj,N ]
j = 1, 2, · · · J,
(5.4)
where Θj is given by
Θj = ΦII,j F where j = 1, 2, · · · J,
(5.5)
with ΦII,j denoting the 2M ×2N compressive sampling matrix
as defined in (3.14) at the j-th CR and F standing for the 2N ×2N
discrete Fourier matrix. The measurements obtained under the
architecture proposed in [76]
ry,j = ΦII,j FSx,j where j = 1, 2, · · · J,
(5.6)
with Sx,j denoting the PSD of the sought signal xj (t) at the
j-th CR. After gathering all of the measurements the following
statistic is computed
J
ξn =
1 X T
hr , θj,n i2 where n = 1, 2, · · · 2N,
Jχ j=1 y,j
(5.7)
where χ denotes the mean of the test statistic ξn in the absence
of the PU signal.
5.5.3
Shortcomings in signal detection
We have proposed signal detection algorithms are based on
some considerations which are common in literature. In the following, we illustrate them further [76]:
• We considered that noise variance is precisely known at the
receiver terminal, so that the threshold can be set accordingly. In contrary, this is impossible in practice, as noise
University of Genova – DITEN
5.5 Practical Implementation Challenges
99
could vary over time due to different parameters (e.g., temperature change, ambient interference, filtering, etc). The
deviation of the variance from the assumed known value becomes important when the signal strength is below the error
of the noise variance. In that case, the detection threshold,
which is set based on the known variance, should be changed
accordingly.
• It is assumed that the noise is a white, additive and Gaussian
Wide-Sense Stationary (WSS) process, with zero mean, and
known variance. Though, noise is an aggregation of various
sources including not only thermal noise at the receiver and
underlined circuits, but also interference due to the emissions from neighbor radio terminals, transmitters at very
far distance, etc [1].
• In modeling the channels we assumed that they are independent and identically distributed(iid). As a result, the
diversity gains that we obtained are maximized. However,
channel coefficients resulting of superposition of different parameters (e.g., path loss, shadowing, and multipath) that do
not necessarily need to be iid for all radios. While path loss
for small to medium networks can be assumed equal for all
radios, the other two effects could have quite different characteristics. For example, shadowing can exhibit high correlation if two radios are blocked by the same obstacle [1].
• Lastly, we consider equal distribution of noise and local interference across all radio nodes. Consequently, every CR
could apply the same detection threshold and obtain identical Pf a . However, in practice, these two assumptions do
not serve the purposes. First, due to circuits variability or
temperature difference, each radio node has a different agUniversity of Genova – DITEN
100
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
gregate local noise.
In a time-variant environment, a fixed threshold Neyman-Pearson
(NP) detector cannot be used, because, as the background conditions vary, the resulting value of pf a may be too high (i.e., decreasing the reuse of the unused spectrum) or the value of pd may be
too low (i.e., increasing the interference to the PU systems). This
suggests to exploit cognitive threshold schemes based on the estimate of mean power of the background noise. Several approaches
may be reused from the noise estimation literature to solve the
practical spectrum sensing problem: how can we set the threshold based on a real time estimation of the noise power, so that
a fixed probability of detection, pd or a fixed probability of false
alarm, pf a is ensured? A simple but reasonable method is to treat
the estimate of noise power as the true noise power and calculate
the threshold used in energy detection accordingly. In [54], the
practicality of performing real time noise estimation was justified
with two examples:
1. Assume the spectrum regulators still want to reserve certain
channels for special applications, and CRs are never allowed
to access this channel. In addition, this special channel is
rarely used and therefore can serve the purpose of noise estimation, e.g., in the United States, channel 37 (from 608
to 614 MHz) is reserved for radio astronomy and is used in
very few occasions.
2. Detecting pilot signals which are distinct narrowband spectral features. After performing the PSD estimation on the
received signal, the noise variance can be estimated from
some frequency bin not corresponding to the pilot frequency.
Intuitively, this approach may incur in an inherent loss of detection probability since the threshold is chosen while considering
University of Genova – DITEN
5.5 Practical Implementation Challenges
101
the total noise power from only a finite number of observed noise
samples. In [80], a method is proposed to determine the threshold
considering real time noise variance estimation which may provide
the desired probability of detection and probability of false alarm.
The previous approach relies on a noise variance estimated
from a possibly vacant channel. In [50], the authors presented a
new method of estimating noise power. The method is applicable
for ID and 2D signal processing. The essence of this method is estimation of the scatter of normally distributed data with high level
of outliers. The method is applicable to data with the majority
of the data points having no signal present. The method is based
on the shortest half sample method. The assumption is quite reasonable, since the current dynamic spectrum sharing research is
motivated by the fact that many parts of the spectrum are underutilized most of the times. This makes the concept of spectrum
sharing to be attractive. Therefore, one can estimate the noise
power without doing any explicit separation of the noise from the
noisy signal. In [66] a wideband detector for single CRs or multiple collaborative CRs which does not require the noise variance
is proposed based on the General Likelihood Ratio Test (GLRT).
They assume that among the sub-bands there is some minimum
number of vacant sub-bands. Basically, the estimate of the noise
variance in [66] is based on the average of the least energies of the
sub-bands when sorted in an ascending order. This approach is
intuitively justified, since it is more likely for the subbands with
lower energies to be vacant rather than the higher energy ones.
Most of the fusion approaches in the literature have focused on
the cases with conditionally iid observations. The correlated case
where it is assumed that each CR knows the geographic locations
of the other users and hence the correlation between the observations is studied in [74].
University of Genova – DITEN
102
5.5.4
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
RD/ AIC implementation issues
A significant part of the Compressive Sensing research has focused on advanced devices for AIC of large-bandwidth signals [40]
[?]. The goal as introduced in this thesis is to alleviate the pressure on conventional Analog-to-Digital Converter (ADC) technology, which is currently limited to sampling rates on the order
of 1 GHz. There are two contributions in the paper [40], the
first contribution is to provide a new framework for wideband signal acquisition purpose-built for compressible signals that enables
sub-Nyquist data acquisition via an AIC. The framework is based
on the recently developed theory of CS [23] in which a few number of non-adaptive, randomized measurements are sufficient to
reconstruct compressible signals. The second contribution of this
paper is to introduce an AIC implementation design and study of
the tradeoffs and non-idealities introduced by real hardware. The
goal is to identify and optimize the parameters that dominate the
overall system performance. In [?], the authors suggested a new
type of data acquisition system, called a RD, that is constructed
from robust, readily available components. Let L denote the total
number of frequencies in the signal, and let W denote its bandlimit in Hz. Simulations suggest that the random demodulator
requires just O(L log( W
L )) samples per second to stably reconstruct the signal. This sampling rate is exponentially lower than
the Nyquist rate of W Hz. The AIC bridges the gap between the
CS theory, which is based on discrete-time signals, and the needs
of real data acquisition devices, which deal with continuous-time
signals. The construction and behavioral models of AIC have
been provided in [40] which enabled to study the design space for
the four key building blocks in order to optimize the end-to-end
performance. The authors in [40] have studied the non-idealities
introduced by actual circuit implementations suggests that the
University of Genova – DITEN
5.5 Practical Implementation Challenges
103
mixer non-linearity dominates over the effects of clock jitter in
the chipping sequence generator and the non-ideal transfer function of the integrator. To obtain expected performance from AIC,
we need to enhance the performance of the following equipments:
• To enhance the mixer linearity
• To increase the number of quantization bits
• To enhance the integrator performance, and
• To improve the clock jitter.
5.5.5
Summary
In this chapter, we have proposed a schematic block of CR
receiver to distinguish HSFB in the wideband and estimates the
spectrum following a CS approach which indicates better detection performance than that achieved in full wideband estimation
which is investigated through simulations. Later, we have introduced this scheme in COSS scenario to have the reliable detection
performance and several fusion rules are compared in terms of detection performance, control channel capabilities and processing
capacities.
University of Genova – DITEN
104
Chapter 5 : Cooperative Compressive Sensing for
Wideband Cognitive Radios
University of Genova – DITEN
Chapter 6
MIMO Scheme for
Opportunistic Radio
Systems
1
As the growing number of multimedia applications introduced
in mobile radio devices, hence the achievable capacity of the radio
terminals should be improved. There are several ways to improve
the achievable capacity of the cognitive radio terminals. First,
when dealing with the highly sparse frequency segment of the
sparse wideband signal, the detection performance and the achievable capacity are improved which is drawn in Chapter 4. Second,
to form a cooperative environment of the Cognitive Radio (CR)s
could also improve the detection performance (as shown in Chapter 5) and the achievable capacity [45]. Third, exploiting multiple
antennas in Multiple Input Multiple Output (MIMO) systems can
1 Contents
of the current chapter are part of [7] [16]
105
106
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
increase the achievable capacity discussed in [16] [17] [7] [84].
In this chapter we would like to illustrate a simple linear
transceiver for MIMO cognitive radio systems having just one
degree of freedom. The computational burden required to implement our algorithm, which guarantees the decoupling of the
primary and secondary channels under perfect channel state information, is significantly reduced with respect to the conventional
algorithms achieving the same results under the same hypothesis.
This reduction is verified by a detailed evaluation of the floating
point operations required to implement the proposed algorithm.
This result could be of interest in order to reduce the power consumption of cognitive radio terminals.
6.1
Introduction
In the last few years several research studies have been focused
on the so-called MIMO) systems because wireless communications
can obtain many important benefits, like capacity enhancements
and interference reductions, from the use of multiple transmit and
multiple receive antennas [81], [35], [36], [28], [85]. For example,
the mitigation of the interference and the enhancement of the
channel capacity which can be obtained by using a Zero-Forcing
Beam-Forming (ZFBF)) algorithm is discussed in [81] while the
achievable rate which can be obtained by using the same algorithm for the two-user case is analyzed in [46]. Another algorithm, based on a combination of ZFBF and orthogonal BF, is
proposed in [83]. Other important studies are aimed at determining the degrees of freedom [35], [36] for different types of
MIMO interference channels (X-channel, Z-channel, etc.) or the
transmission strategies to achieve the Pareto optimal operating
points [54] (see also [37]). MIMO systems have also been considUniversity of Genova – DITEN
6.1 Introduction
107
ered for opportunistic (or secondary or even cognitive) communication systems [28], [85], [27], [84], [17], since their properties
are very useful to this kind of systems, which have to communicate without creating any significant interference to licensed (or
primary) users [27], [17]. Moreover, in the context of wireless communication systems and for cognitive radios and mobile devices
in particular [4], [62], [29], a special attention is dedicated to the
technological developments or to the studies which could allow a
reduction of the power consumption of the radio terminals. Needless to say, any algorithm allowing a significant reduction of the
computational load required to the terminals could be of help for
this target. Moreover, systems exploiting the minimum number of
antennas at the transmitting and receiving terminals could have
some advantages in this sense.
In this study we present an architecture which could be of
interest for MIMO opportunistic systems and for the minimization of the power consumption of these systems. The definition
of simple algorithms designed for simple architectures is, for the
reasons indicated above, the main target of our work. The general approach to these topics is very similar to the one we adopted
in [17]. In that paper, in particular, it is presented a closed form
expression for a linear precoding and linear reception scheme for
the secondary system, which allowed to obtain the achievable rate
and no mutual interference between primary and cognitive terminals. This result were obtained under the assumptions that just
one primary transmitter-receiver pair was present, that the link
between them was half-duplex, that both these terminals were
provided with just one antenna, that both sides of the secondary
system had two antennas and that the cognitive terminals had a
perfect knowledge of the channel matrices (perfect channel state
information [27], [79], [42]). The explicit form of the matrices
University of Genova – DITEN
108
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
defining the linear precoding and reception scheme deduced in [17]
was of fundamental importance to reduce the computational effort
required at the cognitive terminals to implement the algorithm
there presented. In this paper, we extend our previous work [17]
by removing many of the hypotheses which were there assumed.
In particular, we deduce, as before, a closed form expression for
a linear precoding and linear reception scheme for the secondary
system, which allows to obtain the achievable rate and no mutual
interference between primary and cognitive terminals, with no restrictions on the number of transmitting and receiving terminals,
on the type of link (half duplex or full duplex) and on the number
of antennas which are present on these terminals. Since we are
particularly interested in simple and energy-efficient terminals, we
perform this task by considering secondary terminals having the
smallest numbers of antennas which allow the opportunistic radio
to retain one degree of freedom. As a by-product of this analysis,
we deduce an algorithm which is much simpler and more general
than the one defined in [17]. A comparison of the computational
load required at the cognitive terminals between the algorithm
defined in [17] and the one we define in this work show that the
possible reduction of floating point operations for any secondary
system symbol time is bigger than two and could be included in
the range {2.5, 6}. It is important to notice that this analysis
is theoretical in nature and that in this work we do not analyze
the effects of imperfect channel knowledge [81], [79], [42] at the
secondary terminals.
For this topic the reader is referred, for example, to [81], [79],
[17], [42]. In particular, the same analysis carried out in [17] could
be repeated in the more general cases here considered. However,
it could be important to notice that the simplified algorithm here
defined allows to obtain an important by-product for this kind of
University of Genova – DITEN
6.2 Problem Definition
109
analysis, too. As a matter of fact, while the algorithm in [17] requires the knowledge or the estimation of three matrices (the ones
related to the secondary to primary, to the primary to secondary
and to the secondary to secondary links), the new algorithm requires the knowledge or the estimation of two matrices (the ones
related to the secondary to primary and to the primary to secondary).
This chapter is organized as follows. In Section ?? the general
setting of our study in defined. Section 6.4 is dedicated to the
explicit definition of the matrices allowing to decouple the secondary communication from those of the primary systems. Some
additional linear preprocessing and postprocessing techniques of
the secondary signals are discussed in Section 6.5. Finally, before the conclusions, we deeply analyze the computational load
(in section 6.6) required to the secondary terminals to implement
the new algorithm.
6.2
Problem Definition
In this paper we consider a set of primary systems working in
the same frequency band and having overall M1 transmitting and
N1 receiving antennas. In the same region and in the same band a
secondary system having M2 transmitting and N2 receiving antennas would like to operate without causing any interference on and
without suffering any interference from the primary systems. One
possible configuration involving different primary systems and a
secondary system is shown in Fig. 6.1. In black we have indicated
the possible primary links; the green arrow indicates the secondary
link of interest whereas the unwanted links between the M1 primary transmitters and the secondary receiver and between the
secondary transmitter and the N1 primary receivers are in red.
University of Genova – DITEN
110
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
In practice, different numbers of transmitting and receiving
antennas on the primary systems are required to take account of,
for example, broadcast or multicast communications. It could be
important to notice that our general setting allows to consider not
only half-duplex primary systems (as those considered in [17]) but
also full duplex ones, with transmitter and receiver operating on
the same frequency band. As a matter of fact, if a given antenna
works as a transmitting and as a receiving one, then it can be
considered twice, once in the M1 transmitting and once in the N1
receiving antennas, since in our model transmitters and receivers
can be spatially overlapped. Finally, this setting can also be of
interest for military applications, for example when a soldiers of
a squad would like to communicate with its squad head and vice
versa and the communication is disturbed by a set of jammers. In
this context, the soldier and the squad head are considered as the
secondary system which needs to avoid the intentional disturbing
interference of the jammers, considered, in this case, as primary
systems (with M1 given by the number of antennas of the jammers
and N1 = 0).
Remark 1. It could be interesting to observe that in our model
primary systems placed in the far-field region [14] (p. 33) of all the
antennas of the secondary system can be considered as having a
single antenna even if they are actually equipped with an antenna
array. This fact could be useful to simplify the model of interest
for civil or military applications.
In this configuration we can define two complex vectors xp ∈
C
and yp ∈ CN1 having as components the complex baseband
signals generated by the primary transmitters or arriving to the
primary receivers. The link between these two vectors is provided
by the primary to primary channel matrix Hpp ∈ CN1 M1 . The
signals received by the primary terminals are affected by zeroM1
University of Genova – DITEN
6.2 Problem Definition
primary receiver
with 1 antenna
primary transmitter
with 1 antenna
111
primary receiver
with 1 antenna
MIMO cognitive
receiver with N2
antennas
primary transmitter
with 1 antenna
primary receiver
with 1 antenna
Primary receiver
with 1 antenna
primary transmitter
with 1 antenna
MIMO cognitive
transmitter with M2
antennas
Figure 6.1: The considered MIMO interference channel model. In
the same region three primary systems, having overall M1 = 3
transmitting and N1 = 4 receiving antennas, operate in a given
frequency band. The primary systems are thought as half-duplex
systems but for full duplex systems an analogous scheme applies.
A MIMO secondary system with M2 transmitting and N2 receiving antennas would like to reliably communicate in the same band
without affecting the transmissions of primary systems.
University of Genova – DITEN
112
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
mean complex Gaussian noise signals, defining np ∈ CN1 . The
secondary system is described in terms of a transmitted complex
baseband signal vector xs ∈ CM2 and of a received complex baseband signal vector ys ∈ CN2 . The secondary transmitter is
coupled to the primary receivers by the secondary to primary
channel matrix Hsp ∈ CN1 ×M2 and to the secondary receiver by
the secondary to secondary channel matrix Hss ∈ CN2 ×M2 . Of
course, also a zero-mean complex Gaussian noise ns ∈ CN2 and the
primary transmitters could affect the signals arriving at the secondary receiver. The latter is taken into account by the primary
to secondary channel matrix Hps ∈ CN2 ×M1 . All these considerations determine the following input-output relationships [35]
(
yp = Hpp xp + Hsp xs + np
ys = Hps xp + Hss xs + ns .
(6.1)
These relationships assume that all signals are narrowband,
since all entries in Hpp , Hsp , Hps and Hss are frequency independent. However, we can extend our developments to multicarrier systems by applying it on a subcarrier basis, so extending
in a significant way the importance of our analysis [17]. In this
study, as we did in [17], we assume a zero mean complex Gaussian noise ns having [79] E {ns ns } = σs2 IN1+1 , where E {} is
the expectation operator [17] and IN1+1 is the identity matrix of
dimensions (N1 + 1) × (N1 + 1). According to [35] we will assume, moreover, that all channel matrices are full rank. In this
paper we are interested in the simplest, cheapest and, possibly,
low-power-consumption hardware set up for the secondary system allowing the secondary system itself to communicate without
causing any interference on the primary receivers and, at the same
time, without suffering interference from the primary transmitters [17]. With these constraints, in order to retain at least one
degree of freedom for the secondary radio link the secondary terUniversity of Genova – DITEN
6.3 Transmit Beamforming
113
minals have to be equipped with at least M2 = N1 +1 transmitting
and N2 = M1 +1 receiving antennas [35], [79]. We do not consider
secondary terminals with more antennas because this choice would
imply an increase of complexity, cost and power-consumption. In
order to decouple the N1 ×M1 MIMO channels of the primary systems from the N2 × M2 MIMO channel of the secondary one we
proceed as in [17] (see also [79]). In particular, we introduce a precoding matrix A ∈ CM2 ×M2 and a postcoding matrix B ∈ CN2 ×N2
, such that xs = Ax˜s and y˜s = Bys . With these additional linear
preprocessing and post processing operations we determine the
following input-output relationships:
(
yp = Hpp xp + Hsp Ax˜s + np
y˜s = Bys = BHps xp + BHss Ax˜s + Bns .
(6.2)
The indicated decoupling is achieved by requiring that, during any
symbol time of the secondary system, the following coexistence
conditions hold true [17], [79]:
(
Hsp A = 0
BHps = 0.
(6.3)
In the following we define an explicit algorithm for calculating
the matrices A and B. It is important to point out that we will
assume that the matrices Hsp and Hps are stable during the secondary system symbol time. Moreover, it will be assumed that the
secondary transmitter knows Hsp and that the secondary receiver
knows Hps .
6.3
Transmit Beamforming
Generally speaking, the simplest CR problem can be represented by a communication scenario in which a couple of primary
University of Genova – DITEN
114
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
terminals and a couple of cognitive radios wish to communicate
over the same resource [37], [27].
As remarked in section 6.2, in spite of the simplicity of the
model, few algorithms have been proposed. In this section, the
benefits coming from the introduction of multiple antennas at the
cognitive terminals is analyzed. In particular a transmit beamforming scheme is introduced to satisfy the constraint imposed by
the CR communications. For the sake of simplicity, the primary
terminals are equipped with a single antenna system, while the
cognitive terminals are equipped with two antennas, but the analysis can be easily extended to a high number of antennas, both at
the primary and cognitive systems.
6.3.1
Channel model
Transmit beamforming can be used by a CR system to steer
the power towards the direction of interest (i.e. secondary receivers) while minimizing the interference to primary receivers
[33]. In particular, this technique, employed by different approaches [58], [39], allows minimizing the interference caused to
primary users while maximizing the SINR for the cognitive users.
In the proposed approach transmit beamforming is implemented,
by introducing a linear pre-processing scheme which guarantee,
under specific conditions, to perform complete interference cancellation at the primary receiver.
The equations which describe the channel of interest, known
in the open literature as the MIMO Z channel [36] and usually
assumed for treating the problem of interest [85], [39] shown in
Fig. 1, are the following
yp = gtr xc + hxp + np
University of Genova – DITEN
(6.4)
6.3 Transmit Beamforming
yc = Hxc + nc
115
(6.5)
in which yp ∈ C and xp ∈ C are respectively the received and
transmitted complex baseband signals of the primary terminals,
yc ∈ C 2 and xc ∈ C 2 are respectively the received and transmitted complex baseband signal vectors (represented in bold, in the
entire paper) of the cognitive terminals, H ∈ C 2×2 is the complex
channel matrix between the cognitive terminals, h ∈ C is the complex channel coefficient between the primary terminals, gr ∈ C 2
is the complex channel vector between the cognitive transmitter
and the primary receiver (·T stands for transpose), and np ∈ C
and nc ∈ C 2 are the zero-mean complex Gaussian noise quantities [12] respectively for the primary and the cognitive receivers.
In the following,
E np n∗p = ηp2
E nc n⊥
= ηp2 I2
c
will be assumed [62] where ·⊥ stands for transpose and complex
conjugate, I2 is an 2×2 identity matrix and E (·) is the expectation
operator.
It is important to note that, in this case, the interference
caused by primary users is included in the additive noise term.
Moreover, although the channel model in equations 6.4 and 6.5
refers to the narrowband case (all channel coefficients are frequency independent), it can be easily extended to multi-carrier
systems by applying it on a sub-carrier basis [29]. To perform
the transmit beamforming, let us introduce a transmit precoding
matrix A ∈ C 2×2 such that xc = Axa . By substituting it in the
channel model expressed by 6.4 and 6.5, one can obtain
yp = gTr xc + hxp + np = gTr Axa + hxp + np
University of Genova – DITEN
(6.6)
116
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
yc = HAxa + nc
(6.7)
To guarantee that the cognitive transmitter causes no interference
to the primary receiver
gTr A = 0
(6.8)
has to be enforced, together with kAk2 = 1, where the symbol
k·k2 stands for 2-norm, in order to avoid signal amplification or
reduction, to obtain
yp = hxp + np
(6.9)
e a + nc
yc = Hx
(6.10)
e = HA. Such a process allows an effective decoupling
in which H
of the scalar Additive White Gaussian Noise (AWGN) channel of
the primary users 6.9 from that one of the cognitive users 6.10.
6.3.2
Derivation of the achievable rates
As suggested by the large amount of literature dedicated to
MIMO transmissions [12], [29], [79] the 2 × 2 channel expressed by
6.10 can be exploited through the Singular Value Decomposition
e = U P V ⊥ , with P diagonal matrix
(SVD). Hence by writing H
and U and V unitary matrices, and by introducing x = V ⊥ xa and
y = U ⊥ yc , from 6.10
e x + U ⊥ nc =
y = U ⊥ yc = U ⊥ HV
X
x + U ⊥ nc
(6.11)
can be obtained. Equation 6.11 represents two parallel Gaussian
channels
University of Genova – DITEN
6.3 Transmit Beamforming
y=z+n
117
(6.12)
P
with input z = x and complex Gaussian noise n = U ⊥ nc . The
noise has zero-mean and covariance matrix ηc2 I2 , since the multiplication by a unitary matrix does not change the distribution of
P
the noise [29], while the input has covariance E zz⊥ =
Kx
⊥
where Kx = E xx .
The obtained linear processing scheme, shown in Fig. 6.2,
allows, under the hypotheses of a perfect knowledge of the Channel State Information (CSI) between cognitive terminals and the
channel from cognitive transmitter to primary receiver, to exploit
the degrees of freedom of the 2 × 2 MIMO channel for the transmission of the cognitive users, and, at the same time, to cancel
the interference to the primary receiver. It is important to note
that, in order perform such a cancelation, the available degrees of
freedom of the MIMO Z-channel which models the CR problem,
expressed by the equations 6.4 and 6.5, are reduced. In particular,
since the number of Degree of Freedom (DoF)s of the considered
MIMO Z-channel is 2 [17] and the number of DoFs of the primary
link is 1, one can deduce that the number of DoFs available for
the cognitive link is 1 and for this reason Σ will have at most one
non-trivial diagonal entry.
This property allows simplifying the computation of the achievable rates of the proposed processing scheme. From [16] and by
taking into account the statistical variations of the channel, the
achievable rats of the cognitive link is expressed as
1
Φ
C = EH,gr max log 1 + 2
A,Φ 2
ηc
University of Genova – DITEN
(6.13)
118
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
6.3.3
Computation of matrix A
In order to complete the analysis, an explicit expression for C
has to be found. To this end, the expression of matrix A (and
consequently ε) which guarantees the maximum achievable rate
has to be computed. By assuming that gr,i 6= 0 (i = 1, 2, ...) (otherwise, a partial spatial orthogonalization is already performed by
the channel) and by enforcing (5), one can obtain
6.4
Explicit ZF-BF Scheme for a CR
System
In this section we would like to discuss about a special case
of CR system where the CRs are equipped with a fixed number
of antennas (e.g., number of transmit antennas M2 = N1 + 1 and
number of receive antennas N2 = M1 + 1). With the indicated
number of antennas on the secondary terminals we deduce that the
matrices Hsp and Hps are rectangular, of dimension respectively
N1 × (N1 + 1) and (M1 + 1) × M1 .
Let us firstly analyze the effects of the constraint in Fig. 6.31 .
Since, according to our hypotheses, the rank of Hsp is N1 , we
can find one and only one [52] (pp. 57-61) non-trivial solution
v ∈ CN1 +1 of
Hsp v = 0
(6.14)
having euclidean norm [52] (p. 270) kvk2 = 1 (uniqueness is
achieved apart from a possible complex scalar factor of absolute
value 1). Now, since the constraint 6.3 can be equivalently written
as
Hsp Ax = 0 ∀x ∈ CN1 + 1
University of Genova – DITEN
(6.15)
6.4 Explicit ZF-BF Scheme for a CR System
119
it is immediate to understand that any column of the matrix A
should necessarily be equal to v multiplied by an arbitrary complex coefficient. This means that in order to satisfy the constraint
6.3 matrix A should necessarily have the following form
A = [b1 v|b2 v| . . . |bN1 +1 v] = vbT
(6.16)
where bi , i = 1, · · · , N1 + 1, are arbitrary complex coefficients
T
defining the entries of the column vector b ∈ CN1 +1 and (·)
denotes the transpose (row) vector. If the precoding matrix A has
to avoid any signal amplification we have to enforce kAk2 = 1 [17],
being k k2 the so called matrix 2-norm induced by the euclidean
vector norm, that is [52] (p. 281)
kAk2 = max kAxk2 .
(6.17)
kxk2 =1
If we denote by xi one of the N1 + 1 coefficients of the generic
column vector x ∈ CN1 +1 , from (6.16) we deduce
kAxk2 = NX
1 +1
i=1
N +1
N +1
! 1
1
X
X
bi xi v = bi xi kvk2 = bi x i .
2
i=1
i=1
(6.18)
We have to enforce
N +1
1
X
1 = kAk2 = max kAxk2 = max bi x i kxk2 =1
kxk2 =1 (6.19)
i=1
and a trivial application of the Cauchy-Schwarz inequality [52]
(p. 271) implies that this constraint is enforced if and only if the
euclidean norm of the vector b ∈ CN1 +1 is equal to 1. No other
constraints have to be enforced on b, which, as a consequence, is
highly undetermined. In summary, we satisfy constraint 6.3 and
University of Genova – DITEN
120
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
avoid any signal amplification or attenuation by the precoding
whenever the matrix A is determined by:
A = vbT
(6.20)
for any b ∈ CN1 +1 such that kbk2 = 1. It could be useful to
observe that in order to define the matrix A just the knowledge
of Hsp is necessary. Let us now consider the constraint in Fig.
6.3. It is important to observe that B Hps = 0 if and only if
∗
Hps
B ∗ = 0, where ∗ denotes the conjugate transpose (matrix or
vector). The latter condition has the same form as of Fig. 6.3.
∗
and B ∗ are, respectively, M1 × (M1 + 1) and (M1 +
Moreover, Hps
1) × (M1 + 1), whereas Hsp and A are of dimensions N1 × (N1 + 1)
and (N1 + 1) × (N1 + 1), respectively. Thus, if we define w from
∗
by using the same procedure adopted to definevfrom Hsp ,
Hps
by using6.16 we deduce that the postcoding matrix B should be
such that B ∗ = wcT , where c is an arbitrary column vector
belonging to CM1 +1 . Contrary to what is stated in [17], there is
no need to enforce a constraint on the 2-norm on the matrix B
since any signal amplification or reduction is present in all addends
appearing in equation (2)2. Since kBk2 = kB ∗ k2 [52] (p. 283) we
conclude that on c no restriction is required and that
∗ B = cT w∗ , dw∗
(6.21)
being d the column vector having the ith entry equal to the
complex conjugate of the ith entry of c, i = 1, . . . , M1 + 1.
The determination of the infinite many matrices A and B satisfying the constraint of interest for this analysis is now complete.
It remains to define in which way we can exploit the unique degree
of freedom we have on the secondary system.
Remark 2. The matrices Hps and Hsp are managed as indicated above and no limitation can arise due to the presence of priUniversity of Genova – DITEN
6.5 Linear Pre and Post Processing Requirements to
Exploit Unique Degree of Freedom
121
mary antennas working, at the same time, as transmitting (considered in Hps ) and as receiving (considered in Hsp ). Thus, full
duplex primary systems need not be avoided as in [17].
6.5
Linear Pre and Post Processing Requirements to Exploit Unique Degree of Freedom
By using one of the infinite many precoding and postcoding
matrices A and B defined in the previous section, system 6.2 becomes
(
yp = Hpp xp + np
ỹs = Bys = BHss Ax̃s + Bns
(6.22)
and, of course, the primary transmissions are completely decoupled from the secondary ones. We now focus our attention on
the secondary channel, governed by equation 6.222 . As we have
already pointed out we have only one degree of freedom on this
channel. In general the available degrees of freedom can be exploited by using aSVD of the channel matrix BHss A [17], but
in this case this exploitation is particularly simple as it will be
pointed out in the following. In particular, these considerations
will allow a significant reduction of the information necessary and
of the algebraic operations required to the secondary transmitter
and receiver with respect to those required according to [17] when
M1 = N1 = 1. For this reason, these considerations are provided
in full details. From 6.20 and 6.21 we deduce
BHss A = (dw∗ )Hss (vbT ) = d(w∗ Hssv )bT
University of Genova – DITEN
(6.23)
122
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
the last equality being a direct consequence of the associative property of matrix multiplication [52](p. 105). It is important to notice that w∗ Hss v is a complex number and that
b ∈ CN1 +1 and d ∈ CM1 +1 are completely arbitrary apart from
the requirementkbk2 = 1. In particular, w∗ Hssv depends just on
Hps , Hss and Hsp . It is equal to zero if and only if it is not
possible to transmit from the secondary transmitter to the secondary receiver in an orthogonal way with respect to the primary
transmissions.
If we substitute 6.23 into 6.5 we obtain for the secondary system
ỹs = d(w∗ Hss v)bT x˜s + Bns .
(6.24)
Let us denote by e1 ∈ CN1 +1 the column vector whose entries
are the complex conjugate of those of b. It is a vector, actually,
since ke1 k2 = kbk2 = 1. We can define an orthonormal basis
{e1 , e2 , . . . , eN1 +1 } for CN1 +1 . It is clear that, if we denote by
a∗ b the standard scalar product in CN1 +1 [70] (p. 12),
x̃s =
NX
1 +1
(e∗i x˜s ) ei
(6.25)
i=1
However, by definition we have bT e1 = 1 and bT ei = 0 for
i = 2, · · · , N1 + 1, so that from 6.33 and 6.25 we obtain
∗
T
ỹs = d(w Hss v)b
NX
1 +1
!
(e∗i x˜s ) ei
+ Bns .
(6.26)
i=1
which can also be expressed as in simplified form
ỹs = d(w∗ Hss v)(bT e1 ) (e∗i x˜s )+dw∗ ns = d ((w∗ Hss v) (e∗i x˜s ) + w∗ ns ) .
(6.27)
University of Genova – DITEN
6.5 Linear Pre and Post Processing Requirements to
Exploit Unique Degree of Freedom
123
For the Cauchy-Schwarz inequality it is now evident that, in
order to maximize the information transfer on the secondary system, at the secondary transmitter we should generate
x̃s = ei xss
(6.28)
and at the secondary receiver we should perform
yss = d∗ ỹs
(6.29)
so that the best input-output relationship at the secondary
system can be finally written as
yss = d∗ ỹs = (d∗ d) ((w∗ Hss v) (e∗i x˜s ) + w∗ ns )
(6.30)
Therefore, 6.30 can be expressed as
2
yss = kdk2 ((w∗ Hss v) xss + w∗ ns )
(6.31)
2
Since d is arbitrary, we can choose it in such a way that kdk2 =
1 and we finally obtain
yss = (w∗ Hss v) xss + w∗ ns
(6.32)
In 6.2 we show the processing chain for a secondary system
which operates as indicated in equation 6.32.
Thus, we deduce that the achievable rate for the secondary
system, under the hypotheses considered in [7], is
1
C = EHps ,Hsp ,Hss
2
(
2
|w∗ Hss v|
log 1 + P
σs2
!)
(6.33)
which simplify and extend the covering of eq. (13) of [17].
Now we could proceed as in [17] the evaluate the performances of
University of Genova – DITEN
124
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
for each T
estimate Hsp
find
v
1
xss
multiply v vx ss transmitter
by x ss
M2= N1+1
1
N2 =M1+1
receiver
Hssvx ss
for each T
estimate Hps
multiply by w*
yss
find
w
Figure 6.2: Processing chain for the secondary transmitter and
receiver when just one degree of freedom is available to the secondary system.
University of Genova – DITEN
6.6 Computational Load Required at the CR Nodes 125
the proposed secondary system in practical scenarios. However,
there would be nothing new in this analysis since, for example, all
considerations reported in [17] on this aspect apply in this case,
too. The only significant novelty of this paper is related to the
possibility of implementing by using much simpler algorithms the
processing required to a secondary system with one degree of freedom in order to be able to avoid disturbing primary ones without
suffering, at the same time, any interference from the primary
systems. For this reason, in the following we focus our analysis
on the computational load required to implement the proposed
algorithm.
6.6
Computational Load Required at the
CR Nodes
As the reader may have noticed from Fig.6.2 the processing
chain indicated in Fig. 6.2 of [17] can be significantly simplified,
without any reduction of the performances and under more general conditions, without any limitation on M1 and N1 (as already
pointed out, in [17] we had M1 = N1 = 1), provided that we assume the secondary system to be the simplest one (that is, having
just one degree of freedom). In order to ease the reading we report
in Fig. 6.3 in more details the processing chain required to implement the secondary system proposed in 6.2 of [17], independently
of the number of degrees of freedom of the secondary system and
then also in the case it is equal to one. This processing chain
should be compared with the one shown in 6.2. In particular, one
can notice that with the new algorithm it is not necessary anymore
to compute the matrices A and V at the secondary transmitter
and that it is not necessary anymore to compute the matrices B
and U at the secondary receiver. The only operations required for
University of Genova – DITEN
126
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
the new algorithm to be implemented are those which allow the
calculation of v at the secondary transmitter and of w at the secondary receiver. As another important by-product, one can notice
that, moreover, the transmitter and the receiver implementing the
new algorithm have just to know or estimate, respectively, Hsp or
Hps . With the standard algorithm both transmitter and receiver
have to know or estimate Hsp , Hps and Hss , in order to be able to
carry out the singular value decomposition of the matrix BHss A.
This is an additional simplification allowing an additional reduction of the computational load for the secondary terminals. The
problem of the estimation of the channel matrices and of the effects of the errors of these estimations is not developed in this
paper. Some considerations on these important and widely analyzed topics can be found, for example, in [17], [81], [79] and [42].
For this reason we do not analyze the reduction of the computational load due to the reduced requirements on the estimation of
the channel matrices of the new algorithm. Moreover, we observe
that the transmitter and the receiver blocks shown in Fig. 6.2 and
Fig. 6.3 could be the same. Thus, we focus our attention on the
different computational load required to implement the processing chains shown in Fig.6.2 and Fig. 6.3, without considering the
blocks related to the estimation of the channel matrices, to the
transmitter and to the receiver. In order to develop this analysis,
we observe that we can calculate v by solving the homogeneous
linear system (4), having N1 equations and N1 + 1 unknowns.
By using, as suggested in [52] (p. 57), Gaussian elimination and
back substitution [52] (pp. 3-10), [70] (pp. 147-154), a vector
proportional to the vector v appearing in equation (4) can be calculated after 13 N1 3 + N1 2 − 13 N1 multiplications or divisions and
3
2
1
1
5
3 N1 + 2 N1 − 6 N1 additions or subtractions.
Remark 3. According to [52] (p. 57) Gaussian elimination
University of Genova – DITEN
6.6 Computational Load Required at the CR Nodes 127
1
N2+1
Hssv xss
multiply byw1*
receiver
multiply by w2*
for each T
estimate Hps
w1* Hss v x ss
w2*Hssv x ss
multiply by d1
multiply by d2
1
2
find w1 and w2
for each T
define d1 and d2
1
2
d1(w1*Hssv xss )
BH ssAVx
multiply by u*1
yss
d2(w2*Hssv xss)
find u1
Figure 6.3: Processing chain for the secondary transmitter and
receiver according to [17], independently of the number of degrees
of freedom of the secondary system (the case it is equal to one
being included).
University of Genova – DITEN
128
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
for homogeneous systems is applied just to the coefficient matrix.
In particular, if the homogeneous system has n equations and n+1
unknowns the coefficient matrix has n rows and n + 1 columns.
Moreover, according to [52] (p. 8), Gaussian elimination should
be executed on the associated augmented matrix [A|b] for nonhomogeneous systems of the form [Ax = b]. This matrix has n
rows and n + 1 columns if the non-homogeneous system has n
equations and n unknowns. Finally, the indicated expressions for
the number of multiplications or divisions and for the number of
additions or subtractions are provided in [52] (p. 10) for Gaussian
elimination with back substitution when it is applied to an n × n
non-homogeneous system.
Then, N1 + 1 multiplications and N1 additions are required
to find the square of the euclidean norm of the solution. Moreover, one square root and one division is necessary to normalize the solution and find v. This completes the operation count
implemented by the find v block. Finally, we need N1 + 1 multiplication to implement the multiply v by xss block and find
vxss . In summary, the secondary transmitter shown in Fig. 6.2
requires 13 N1 3 + N1 2 + 53 N1 + 3 multiplications or divisions and
3
2
1
1
1
3 N1 + 2 N1 + 6 N1 additions or subtractions and one square root.
All these operations are floating point operations, the so-called
flops [70] (pp. 58-59). Even if in some cases different floating
point operations are considered separately [52] (p. 10), in order
to simplify the following analysis we use the approach proposed
in [70] (pp. 58-59) and avoid any distinction among addition, subtraction, multiplication, division or square root operations involving floating point numbers.With this simplification we conclude
that the secondary transmitter shown in Fig. 6.2 requires overall
ftxnew (N1 ) =
2 3 3 2 11
N1 + N1 + N1 + 4
3
2
6
flops.
University of Genova – DITEN
(6.34)
6.6 Computational Load Required at the CR Nodes 129
Analogously, the secondary receiver shown in Fig.6.2 requires
the calculation of w, resulting in the same expressions as before
with N1 replaced by M1 for the implementation of the find w
block. However, in this case the following multiply w by xss block
of Fig. 6.2 is replaced by a multiply by w∗ block. In this case
the multiplication of a vector by a scalar is replaces by the scalar
multiplication of two vectors and this requires not only multiplications but also additions. Precisely, M1 + 1 multiplications and
M1 additions are required to finally obtain yss . In summary, the
secondary receiver shown in Fig. 6.2 requires overall
ftxnew (M1 ) =
2
3
17
M1 3 + M 1 2 + M 1 + 4
3
2
6
(6.35)
flops.
This completes the operation count required to implements the
blocks of interest in Fig. 6.2. Now we try to do the same for the
blocks of interest in Fig. 6.3. The find A and find B blocks of Fig.
6.3 could be implemented in several ways. However, to carry out
the comparison of interest, we assume that they can be calculated
as indicated in equations (10) and (11), with generic vectors or
vectors b and d. Thus, the operations of the find v and find
w block are required in this case too and we have, moreover, to
perform the column vector by a row vector multiplications shown
in (10) and (11). We conclude that we should be fair if we assume
that the find A (find B) blocks of Fig. 6.3 requires the same flops
required by the find v and multiply v by xss (find w and multiply
by w∗ ) blocks of the secondary transmitter (receiver) shown in
Fig. 6.2. The operation count required by the blocks multiply by
V , multiply by A, multiply by B and multiply by U ∗ in Fig. 6.3
is easy, since just multiplications of square matrices by column
vectors are involved. This means that each of the blocks multiply
by V and multiply by A requires (N1 + 1)2 multiplications and
University of Genova – DITEN
130
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
N1 (N1 + 1) additions, that is, with the indicated simplification,
gmul (N1 ) = 2N1 2 + 3N1 + 1
(6.36)
flops. Analogously, each of the blocks multiply by B and multiply by U ∗ requires at least gmul (M1 ) flops. It remains to consider
the block find U − V in Fig. 6.3, related to the singular value
decomposition of the matrix BHss A ∈ C(M1 +1)×(N1 +1) .
Remark 4. It is important to point out that all the indicated
floating point operations relative to the blocks find A, find B and
find U − V , appearing in Fig. 6.3, should be performed by both the
secondary transmitter and receiver, if the matrices B and U are
not being transmitted from one side to the other of the secondary
system. On the contrary, the secondary transmitter and receiver
of Fig. 6.2 does not need to share the same calculations.
It is not easy to deduce how many flops are necessary to compute this singular value decomposition. The difficulties are related
to the fact that any single algorithm which permits this calculation
is not simple and to the fact that several algorithms are present
in the open literature [70] (pp. 234-240). For this reason this
flop count is taken from [70] (pp. 234-240), where the estimates
provided express the computational load for large values of the
number of rows and columns. This is not the case of greatest
interest but we think it provides in any case a significant information. In particular, it is shown that the different algorithms which
can be considered to compute the singular value decomposition
require a number of flops larger than
2
gsvd (M1 , N1 ) = 2(M1 + 1)(N1 + 1)2 + (N1 + 1)3 .
3
(6.37)
Remark 5. The above asymptotic count refers to a matrix
with a number of rows larger than or equal to the number of
University of Genova – DITEN
6.6 Computational Load Required at the CR Nodes 131
columns [70] (p. 234). In our case BHss A has M1 + 1 rows
and N1 + 1 columns and in practical applications we can have
M1 < N1 . In these cases, the above estimate is correct if the role
of M1 and N1 is exchanged (corresponding to the singular value
decomposition of (BHss A)∗ .
With these considerations we can easily deduce the behaviors
of the leading terms of the flop counts for the transmitters and
receivers considered in Fig. 6.2 and Fig. 6.3. We have that:
• the secondary transmitter in Fig. 6.2 asymptotically requires 32 N1 3 flops,
• the secondary receiver in Fig. 6.2 asymptotically requires
3
2
3 M1 flops,
• both the secondary transmitter and receiver in Fig. 6.3
asymptotically requires at least 23 N1 3 + 23 M1 3 + 2(M1 +
1)(N1 + 1)2 + 23 (N1 + 1)3 ' 43 N1 3 + 23 M1 3 + 2M1 N1 2 flops
(if M1 < N1 replace M1 with N1 and vice-versa in the last
addend of the right-hand member).
For example, if M1 = N1 the new algorithm (the one of Fig.
6.2) asymptotically requires 23 N1 3 flops at the transmitter and at
the receiver while the older one (of Fig. 6.3) asymptotically requires 43 N1 3 + 23 N1 3 + 2N1 3 = 4N1 3 flops on both sides. This
means that there is a reduction of a factor equal to six in the
number of flops required at both the transmitter and the receiver.
It is now important to recall that these calculations have, in general, to be performed once for any ∆T (secondary system symbol
time) in narrowband systems. This effect is then repeated for
all sub-carriers in the case of a multi-carrier system. In practice,
as already pointed out, we could be interested in calculating the
number of flops in cases involving primary systems with small values of M1 and N1 . In these cases all terms should be retained,
University of Genova – DITEN
132
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
since the leading terms are not guaranteed to be dominant, and
we obtain that
• the secondary transmitter in Fig. 6.2 requires at most ftxnew N1
flops,
• the secondary transmitter in Fig. 6.2 requires at most ftxnew M1
flops,
• the secondary transmitter in Fig. 6.3 requires ftxnew (N1 ) +
frxnew (M1 ) + 2gmul (N1 ) flops plus those required by the
block calculating the singular value decomposition).
• the secondary receiver in Fig. 6.3 requires ftxnew (N1 ) +
frxnew (M1 ) + 2gmul (M1 ) flops plus those required by the
block calculating the singular value decomposition.
For the block relative to the singular value decomposition we
have just an asymptotic estimate. For this reason, in order to
give an idea of what can happen and of the possible advantages
which can be obtained when M1 and N1 are small, in the following figures we compare the behavior of the flops required by
the secondary transmitter and receiver proposed in Fig. 6.2 with
the underestimates, obtained neglecting the computational load
due to the singular value decomposition, of the numbers of flops
required by the older release of the secondary transmitter or receiver. In the same figures we provide also another kind of estimate of the numbers of flops required by the old transmitter
and receiver. The one obtained by taking account of the computational cost of the singular value decomposition, assumed to
be given by the available asymptotic expression. In Fig. 6.4 we
show the results obtained when M1 = N1 . The flops required by
the the new secondary transmitter and receiver are added to show
a cumulative result for the secondary system. The same is done
University of Genova – DITEN
6.6 Computational Load Required at the CR Nodes 133
for the two estimates of the flops required by the two terminals
of the old secondary system. On the one hand it is interesting to
observe that, for M1 = N1 = 10 the three curve assume the values
' 11398.67, 4300 and 1688. As indicated in Fig. 4, these three results refer, respectively,to the secondary system of Fig. 6.3, when
the flops required by the singular value decomposition are deduced
from the asymptotic estimate, to the secondary system of Fig. 6.3,
when the flops required by the singular value decomposition are
neglected, and to the secondary system of Fig. 6.2. If we divide
the first two values by the last one we obtain ' 6.75 and ' 2.55.
This could be an indication that for M1 = N1 = 10 in practice we
can already obtain a reduction of flops similar to what we obtain
asymptotically. Moreover, for M1 = N1 = 10 we have the smallest
difference between the flops required by the secondary system of
Fig. 6.3, when the singular value decomposition is neglected, and
the flops required by the secondary system of Fig. 6.2. Since we
plot these quantities by using a logarithmic scale on the vertical
axis this difference actually refers to a factor of proportionality between them. From these considerations we conclude, in particular,
that the new algorithm allows a reduction of the computational
load with respect to an underestimate of the computational load
required by the older algorithm by a factor bigger than or equal
to 2.55, at least for the small values of M1 = N1 considered. On
the other hand, for M1 = N1 = 1 the three curves assume the
values ' 100.67, 58 and 17. In this case, if we consider the contribution of the asymptotic estimate of the flops required by the
singular value decomposition we obtain that the factor giving the
reduction of the computational load is ' 5.92, whereas the underestimate of this factor, obtained by neglecting the load due to the
singular value decomposition, is ' 3.41.
It could be interesting to notice that both these values are
University of Genova – DITEN
134
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
12000
Computational Load [flops]
10000
8000
New secondary tx and rx
Old secondary tx and rx: neglecting SVD
Old secondary tx and rx: asymptotic
6000
4000
2000
0
1
2
3
4
5
6
7
8
9
10
M1 =N1
Figure 6.4: Computational load expressed in flops required by
the secondary transmitter and receiver proposed in Fig. 6.2, when
M1 = N1 . This load is compared with some meaningful approximation of the flops required by the secondary transmitter and
receiver shown in Fig. 6.3, under the same condition.
relatively stable: the first has a value of about 5.92 for M1 =
N1 = 1, of about 6.75 for M1 = N1 = 10 and of 6 for M1 =
N1 → ∞; the second is equal to ' 3.41 for M1 = N1 = 1, to
' 2.55 for M1 = N1 = 10, and to 2 for M1 = N1 → +∞. In
order to give an indication of what can happen when for a given
N1 we have M1 > N1 (but the reader can obtain similar results
when M1 < N1 , provided the roles of M1 and N1 are exchanged;
see Remark 5), let us consider the case in which M1 = N1 + 1.
The cumulative results are shown in Fig. 6.5. As the reader can
easily check, the behavior of the plots is similar to the one of the
plots reported in Fig. 6.4. In order to check that the reduction
of the computational load is significant in this case, too, let us
consider that, for example, for N1 = 1 (respectively, N1 = 10)
the obtained values are (the same order as before is used, as can
be easily checked from Fig. 6.4): 158.67, 100 and 29 (respectively,
University of Genova – DITEN
6.6 Computational Load Required at the CR Nodes 135
12482.67, 4900 and 1943). One can observe that the underestimate
of the factor giving the reduction of the computational load for
N1 = 1 (respectively, N1 = 10) and M1 = N1 + 1 is equal to
4900
' 100
29 ' 3.45 (respectively, ' 1943 ' 2.52), which is almost equal
to value of ' 3.41 (respectively, ' 2.55 ) we obtained in the case
M1 = N1 = 1 (respectively, M1 = N1 = 10).
14000
Computational Load [flops]
12000
new secondary tx and rx
old secondary tx and rx (neglecting SVD)
old secondary tx and rx:asymptotic
10000
8000
6000
4000
2000
0
1
2
3
4
5
6
7
8
9
10
N1 (M1=N1+1)
Figure 6.5: Computational load expressed in flops required by the
secondary transmitter and receiver proposed in Fig. 6.2, when
M1 = N1 + 1. This load is compared with some meaningful approximation of the flops required by the secondary transmitter
and receiver shown in Fig. 6.3, under the same condition.
Similar analysis can be easily performed for different values of
M1 and N1 . For example, in the case we have M1 = N1 + 2 the
results for N1 = 1 (respectively, N1 = 10) are: 246.67, 172 and 52
(respectively, 13668.67, 5602 and 2245) and the corresponding underestimate of the reduction of the computational load becomes
' 3.31 (' 2.50). The results are not shown in an independent
figure since it would be very similar to 6.4 and 6.5. From these
results we are able to deduce that the new algorithm provides
significant reductions of the computational load required to the
University of Genova – DITEN
136
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
secondary system in some important cases for practical applications (M1 = N1 , M1 = N1 + 1 and M1 = N1 + 2). Finally, from all
these considerations we infer that the reduction of the number of
floating point operations the secondary system has to perform is
in any case given by a factor larger than 2.5. In many significant
cases, this factor can be much larger.
6.7
Summary
The focus of this chapter is on the possibility of designing
simple and power efficient radio terminals for opportunistic communications. For this reason we consider only radio terminals
which has the minimum number of antennas allowing a secondary
communication to be established. For the same reason we define
a very simple linear transceiver with respect to other algorithms
giving the decoupling of the primary and secondary channels under perfect CSI, permits a significant reduction of the number
of floating point operations. This result could have a significant
impact on the choices of a designer of secondary terminals, for
example in terms of reduced computational power required to the
hardware or reduced battery capacity.
University of Genova – DITEN
Conclusions and
Future Work
With the rapid growth in wireless applications, spectrum resource becomes scarce. Although the current static spectrum
management avoids interference effectively, this comes with the
price of very low spectrum utilization. Cognitive Radio (CR)
promises to increase the spectrum utilization factor employing
several Dynamic Spectrum Access schemes. The under-utilization
in most of assigned spectrum bands results in signals that are
sparse in frequency domain. Such sparsity has motivated the use
of Compressive Sensing in reconstructing the frequency representation of the signal with far-less time samples than their Nyquist
counterpart. By exploiting wide-band spectrum sensing techniques, CR nodes can scan the whole spectrum or a large portion
of the spectrum at once and avoid the delay and complexity of
channel-by-channel scanning. Besides, wideband spectrum sensing provides higher possibility of opportunistic access to a Cognitive Radio. Several architectures and algorithms were provided
depending on whether or not there was coordination between different CRs in the CR network. Due to the low implementation
complexity, energy detection is commonly used for spectrum sens137
138
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
ing in a cognitive radio network.
The work presented in this thesis provides practical solutions
to important problems exploiting several Compressive Sensing
methods for wideband Cognitive Radio systems and presented
three main objectives:
The first one was finding efficient methods for a CR to detect
the spectrum holes in a wide-band radio signal. The proposed
scheme was described in Chapter 4 where we figure out a CR
receiver module for wideband sensing. The proposed module deals
with a highly sparse segment of a wideband signal and finds a
spectrum opportunity to a CR. Simulation results have shown the
higher detection performance, lower computational burden and
enhanced achievable rate which satisfies to the theoretical concept.
The second objective employs the proposed technique in a cooperative CR atmosphere to overcome the hidden node problems
and improve the reliability in detection performance. In this context, several well-known fusion rules have been studied and simulated results have shown in Chapter 5.
In addition, the third objective has to propose a simple linear
transceiver for Multiple Input Multiple Output (MIMO) cognitive
radio systems which has a single Degree of Freedom. This approach requires less computational burden than the conventional
algorithms under the same hypothesis. This approach illustrates
in Chapter 6 and added a new dimension to the MIMOCognitive
Radio Networks
Future Works and Recommendations
In this section, we would like to focus some research challenges
that outstretched while implementing the CR scenario in practical
cases. Especially, attention is paid to the issues related to the
University of Genova – DITEN
6.7 Summary
139
wideband spectrum sensing in heterogeneous radio environment
as it gives more opportunistic access to the future CR networks.
Since Compressive Sensing (CS) scheme has lot of prospers and
applications, hence in future, the possible research include that
could extend the contents of this thesis:
Spectrum blind detection
It will open a new domain for possible future approach [53] [3]
[47] [13]. To date, recovery methods for multi-coset sampling [44]
strategy ensure perfect reconstruction either when the band locations are known, or under strict restrictions on the possible
spectral supports. In [53], only the number of bands and their
widths are considered without any other limitations on the support. To estimate the signal, the continuous reconstruction is
replaced by a single finite-dimensional problem without the need
for discretization. Numerical experiments are presented in [53]
demonstrating blind sampling and reconstruction with minimal
sampling rate while this approach ensures perfect reconstruction
for a wide class of signals sampled at the minimal rate, and provides a first systematic study of CS in a real analog set up.
Cooperative wideband sensing
Research is still carried out for deploying the dynamic spectrum management; the received Primary User (PU) signal (either narrowband or wideband) at a single CR terminal may be
severely degraded, basically due to hidden terminal problems,
multipath fading or shadowing problems, lead to sensing performances in a challenge. Such a scenario can be employed with
cooperative sensing strategies to obtain highly reliable detection
performance while the computational complexity and hardware
University of Genova – DITEN
140
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
constraints push those schemes into challenge. Cooperative spectrum sensing is considered as a solution to some common problems. Several approaches of this kind was proposed in [26] [28] and
the references therein. Usually, control channels can be employed
using suitable methodologies schemes to share common spectrum
sensing outcomes. When considering centralized and distributed
sensing, optimization technique could be a good choice to implement in both data and decision fusion. There are several fusion
schemes presented in [75] with their performances wireless network which could be explored in cooperative CR environment. In
fact, in a distributed CR network, the wideband signal is observed
by different CRs, while each CRs sense a precise spectral components with compressive measurements. Those compressed data
from different CR nodes are fused together at the fusion center
and exploit the spectral opportunities in entire wideband in order
to save the total number of measurements at CR node leads to
computationally efficient. As the data transmission burden is too
high for control channels in such a data fusion method, thus, to
lessen the data load, decision fusioning is introduced when each
CR is able to detect wideband spectrum independently and at
the global decision is originated from fusing the local decisions.
When the CR nodes perceive fading or shadowing independently,
in such a scenario cooperative sensing performs better. Flexible
radio, will possibility be employed for future wireless network;
which will be increasingly complex and certainly heterogeneous in
nature and the idea of flexible radio will play a vital role in the
future wireless communications that must satisfy the scalability,
adaptability, reconfigurability, modularity, and many more.
University of Genova – DITEN
6.7 Summary
141
Direct detection from compressive measurements
Most of the research try to figure out the reconstructs or estimates of the Power Spectral Density (PSD) (relying on the assumption of sparsity) prior detecting a PU band presence. However, to reduce the complexity of the algorithms involved, we must
not forget that the fundamental task is not estimating the PSD
but detecting the presence of the primary users, subsequently, the
full reconstruction of the signal should not be required. In [76],
it is described an approach meeting this goal, without going into
the intermediate stage of estimating the PSD.
Sparsity basis and level selection
Practically most of the CS techniques assume that the signal
is sparse in some suitable basis functions (frequency domain) i.e.,
the sparsity basis is a Fourier matrix while estimating wideband
spectrum. The theory of CS states that the more the sparsity the
better would be the signal estimation which directs to better detection performance [8] [65] at the CR node as shown in Fig. 5.1.
In future, the spectrum usage improves in cellular networks and
the sparsity in Fourier domain shrinks while sparsity may exist
in other domain (e.g., sparsity based on mathematical functions).
Therefore, forthcoming CR receiver exploiting CS will have the
capability to find the effective basis functions which will computationally efficient to estimate dynamic sparse spectrum and thus
minimizes prohibitive energy cost.
Hence, one possibility for future CR would be to perform the
sparsity pattern recovery based on the PU received signal. The
authors in [78] addressed the problem of collaborative sparsity
pattern recovery of a sparse signal with multiple measurement
data in a distributed network. In that paper, it is considered that
University of Genova – DITEN
142
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
every node in the network takes measurements via random projections while considering the same sparse signal. For this reason,
the authors proposed a distributed greedy algorithm based on
Orthogonal Matching Pursuit (OMP) in which the locations of
non zero coefficients of the sparse signal are estimated iteratively
while performing fusion of estimates at distributed nodes to get
a global estimate. Another promising candidate will be exploiting spectrum blind sub-Nyquist wideband sensing, where a-priori
information of sparsity pattern is insignificant for the spectral
estimation. In most of CS schemes, the required number of compressive measurements will proportionally varies with the sparsity
level of wideband signal. Therefore, to calculate the exact number
of compressive measurement for doing wideband spectral estimation sparsity level estimation is often required. Yet, due to the
dynamic behavior of the PUs and time variant fading channels,
the sparsity level of wideband signal is often time-varying and difficult to estimate. This type of uncertainty in sparsity level will
be studied in future CR networks for the minimum number of
compressive measurements which will also be energy efficient.
Sequential compressed sensing
Existing analytical results on CS provide guidelines on how
many measurements are needed to ensure exact recovery with
high probability, but these are often seen to be pessimistic and
rely on a-priori knowledge about the sparsity of the unknown signal. A more suitable scenario would then be to get observations
in sequence, and perform computations in between observations
to decide whether enough samples have been obtained. Exact
recovery would be in that case, possible from the smallest possible number of observations, and without any a-priori knowledge
about how sparse the underlying wideband signal is.
University of Genova – DITEN
6.7 Summary
143
CS recovery algorithm
When the wavelet transform is involved, a multi-resolution solution may be available by dilating the wavelet basis function.
The interest in a multi-resolution transform comes from the fact
that the edges of interest would show up always at the same positions for different scaling, however, noise-induced spurious edges
are random at each scale and thus tend not to propagate through
all scales; hence, if a multiscale wavelet transform was available,
an improved recovery could be applied.
Decentralized computation
When performing joint recovery in a distributed wireless network under the assumption of common sparse support set when no
Channel State Information (CSI) is available, reliability depends
on the fusion center. It could be interesting if a detection consensus has to be acquired to completely distribute the computation
of compressive measurements to different radio users.
University of Genova – DITEN
144
Chapter 6 : MIMO Scheme for Opportunistic Radio
Systems
University of Genova – DITEN
Bibliography
[1] “Distributed compressive wide-band spectrum sensing,” in
Cognitive Wireless Networks:Concepts, Methodologies and
Visions Inspiring the Age of Enlightenment of Wireless Communications, F. H. P. Fitzek and M. D. Katz, Eds., 2007.
[2] “Federal communications commission - first report and order
and further notice of proposed rulemaking, unlicensed operation in the tv broadcast bands,,” FCC 06-156,, Tech. Rep.,
Oct. 2006.
[3] A. and A. Coulson, “Blind wideband spectrum sensing using cluster analysis,” in Communications Theory Workshop
(AusCTW), 2010 Australian, Feb 2010, pp. 133–138.
[4] A. Abidi, G. Pottie, and W. Kaiser, “Power-conscious design
of wireless circuits and systems,” Proceedings of the IEEE,
vol. 88, no. 10, pp. 1528–1545, 2000.
[5] I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty,
“Next generation/dynamic spectrum access/cognitive radio
wireless networks: a survey,” Comput. Netw., vol. 50,
no. 13, pp. 2127–2159, Sept. 2006. [Online]. Available:
http://dx.doi.org/10.1016/j.comnet.2006.05.001
145
146
BIBLIOGRAPHY
[6] I. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio networks,”
Communications Magazine, IEEE, vol. 46, no. 4, pp. 40–48,
2008.
[7] S. S. Alam, L. Bixio, M. Ottonello, M. Raffetto, and
C. S. Regazzoni, “An explicit zero forcing beamforming
algorithm for simple and low-power-consumption opportunistic systems,” Department of Biophysical and Electronic
Engineering, University of Genoa, Via Opera Pia 11a,
I16145, Genoa, Italy, Tech. Rep. Cognitive Radio Laboratory: report no. 1.22.2.2012, February 2012. [Online].
Available:
http://www.aem.dibe.unige.it/RAFFETTO/
JOURNAL PAPERS/cr mimo simpleandefficient.pdf
[8] S. S. Alam, L. Marcenaro, and C. S. Regazzoni, “Enhanced
performance in wideband cognitive radios via compressive
sensing,” in in Proc. of 1st IEEE Global Conference on Signal and Information Processing (GlobalSIP), Texas, U.S.A.,
Dec. 2013.
[9] ——, “Improved throughput performance in wideband cognitive radios via compressive sensing,” in in Proc. of 8th
EUROSIM Congress on Modeling and Simulation, Cardiff,
Wales, United Kingdom, Sept. 2013, pp. 585–590.
[10] ——, “Opportunistic spectrum sensing and transmissions,
cognitive radio and interference management: Technology
and strategy,” Book chapter, pp. 1–28, 2013.
[11] S. S. Alam, M. O. Mughal, L. Marcenaro, and C. S. Regazzoni, “Computationally efficient compressive sensing in wideband cognitive radios,” in Seventh International Conference
University of Genova – DITEN
BIBLIOGRAPHY
147
on Next Generation Mobile Apps, Services and Technologies
(NGMAST), 2013, Sept 2013, pp. 226–231.
[12] E. T. Ar and I. E. Telatar, “Capacity of multi-antenna gaussian channels,” European Transactions on Telecommunications, vol. 10, pp. 585–595, 1999.
[13] D. Ariananda and G. Leus, “Compressive wideband power
spectrum estimation,” Signal Processing, IEEE Transactions
on, vol. 60, no. 9, pp. 4775–4789, Sept 2012.
[14] C. A. Balanis., ANTENNA THEORY: ANALYSIS
AND DESIGN, 2ND ED. Wiley India Pvt. Limited,
2007. [Online]. Available: http://books.google.it/books?id=
3qOrxC8IGNMC
[15] R. G. Baraniuk, “Compressive sensing [lecture notes],” Signal
Processing Magazine, IEEE, vol. 24, no. 4, pp. 118–121, 2007.
[16] L. Bixio, L. Ciardelli, M. Ottonello, M. Raffetto, C. S. Regazzoni, S. S. Alam, and C. Armani, “A transmit beamforming technique for mimo cognitive radios,” in Wireless Innovation Forum Conference on Communications Technologies
and Software Defined Radio, SDR’11 - WInnComm- Europe,
Brussels, Belgium, June 22-24,2011.
[17] L. Bixio, G. Oliveri, M. Ottonello, M. Raffetto, and C. Regazzoni, “Cognitive radios with multiple antennas exploiting
spatial opportunities,” Signal Processing, IEEE Transactions
on, vol. 58, no. 8, pp. 4453–4459, 2010.
[18] E. Candes, J. Romberg, and T. Tao, “Robust uncertainty
principles: exact signal reconstruction from highly incomplete frequency information,” Information Theory, IEEE
Transactions on, vol. 52, no. 2, pp. 489–509, 2006.
University of Genova – DITEN
148
BIBLIOGRAPHY
[19] E. Candes and M. Wakin, “An introduction to compressive
sampling,” Signal Processing Magazine, IEEE, vol. 25, no. 2,
pp. 21–30, 2008.
[20] S. S. Chen, D. L. Donoho, Michael, and A. Saunders, “Atomic
decomposition by basis pursuit,” SIAM Journal on Scientific
Computing, vol. 20, pp. 33–61, 1998.
[21] S. Couturier and B. Scheers, “The state of the art
of dynamic spectrum access,” Military Communication
and Information Systems Conference (MCC 2009),Prague,
Czech Republic,, no. 0, pp. –, September 29-30, 2009.
[Online]. Available: http://www.sciencedirect.com/science/
article/pii/S1874490712000687
[22] F. F. Digham, M. S. Alouini, and M. K. Simon, “On the
energy detection of unknown signals over fading channels,”
Proc. IEEE International Conference on Communications,
no. 64, pp. 3575–3579, 2003.
[23] D. L. Donoho, “Compressed sensing,” Information Theory,
IEEE Transactions on, vol. 52, no. 4, pp. 1289–1306, 2006.
[24] M. Duarte, S. Sarvotham, D. Baron, M. Wakin, and R. Baraniuk, “Distributed compressed sensing of jointly sparse signals,” in Signals, Systems and Computers, 2005. Conference
Record of the Thirty-Ninth Asilomar Conference on, 2005,
pp. 1537–1541.
[25] B. Farhang-Boroujeny, “Filter bank spectrum sensing for
cognitive radios,” Signal Processing, IEEE Transactions on,
vol. 56, no. 5, pp. 1801–1811, 2008.
[26] A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” in New
University of Genova – DITEN
BIBLIOGRAPHY
149
Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First IEEE International Symposium on,
2005, pp. 131–136.
[27] A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, “Breaking
spectrum gridlock with cognitive radios: An information theoretic perspective,” Proceedings of the IEEE, vol. 97, no. 5,
pp. 894–914, 2009.
[28] K. Hamdi, W. Zhang, and K. Letaief, “Opportunistic spectrum sharing in cognitive mimo wireless networks,” Wireless
Communications, IEEE Transactions on, vol. 8, no. 8, pp.
4098–4109, 2009.
[29] C. Han, T. Harrold, S. Armour, I. Krikidis, S. Videv, P. M.
Grant, H. Haas, J. Thompson, I. Ku, C.-X. Wang, T. A.
Le, M. Nakhai, J. Zhang, and L. Hanzo, “Green radio: radio techniques to enable energy-efficient wireless networks,”
Communications Magazine, IEEE, vol. 49, no. 6, pp. 46–54,
2011.
[30] V. Havary-Nassab, S. Hassan, and S. Valaee, “Compressive detection for wide-band spectrum sensing,” in Acoustics
Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on, 2010, pp. 3094–3097.
[31] M. H. Hayes., Statistical digital signal processing
and modelling. John Wiley and Sons., 1996. [Online]. Available:
http://books.google.com.bd/books/
about/Statistical Digital Signal Processing An.html?id=
z0GqhOe9GNQC&redir esc=y
[32] S. Haykin, D. Thomson, and J. H. Reed, “Spectrum sensing
for cognitive radio,” Proceedings of the IEEE, vol. 97, no. 5,
pp. 849–877, 2009.
University of Genova – DITEN
150
BIBLIOGRAPHY
[33] X. Hong, Z. Chen, C. Wang, S. Vorobyoyv, and J. Thompson, “Interference cancellation for cognitive radio networks,”
IEEE Vehicular Technology Magazine, vol. 4/4, pp. 76–84,
2009.
[34] E. Hossain, D. Niyato, and Z. Han, “Dynamic spectrum access and management in cognitive radio networks,” Cambridge University Press, Tech. Rep., July 2009.
[35] S. Jafar and M. Fakhereddin, “Degrees of freedom for
the mimo interference channel,” Information Theory, IEEE
Transactions on, vol. 53, no. 7, pp. 2637–2642, 2007.
[36] S. Jafar and S. Shamai, “Degrees of freedom region of the
mimo x channel,” Information Theory, IEEE Transactions
on, vol. 54, no. 1, pp. 151–170, 2008.
[37] E. Jorswieck and E. Larsson, “Monotonic optimization framework for the two-user miso interference channel,” Communications, IEEE Transactions on, vol. 58, no. 7, pp. 2159–2168,
2010.
[38] M. Jun, Z. Guodong, and L. Ye, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” Wireless Communications, IEEE Transactions on,
vol. 7, no. 11, pp. 4502–4507, 2008.
[39] M. S. Kang, B. C. Jung, D. K. Sung, and W. Choi, “A prewhitening scheme in a mimo-based spectrum-sharing environment,” Communications Letters, IEEE, vol. 12, no. 11,
pp. 831–833, 2008.
[40] S. Kirolos, T. Ragheb, J. Laska, M. Duarte, Y. Massoud,
and R. Baraniuk, “Practical issues in implementing analogto-information converters,” in System-on-Chip for Real-Time
University of Genova – DITEN
BIBLIOGRAPHY
151
Applications, The 6th International Workshop on, 2006, pp.
141–146.
[41] L. Le and E. Hossain, “Qos-aware spectrum sharing in cognitive wireless networks,” in Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, 2007, pp. 3563–3567.
[42] K. Lee, C.-B. Chae, R. Heath, and J. Kang, “Mimo
transceiver designs for spatial sensing in cognitive radio networks,” Wireless Communications, IEEE Transactions on,
vol. 10, no. 11, pp. 3570–3576, 2011.
[43] K. B. Letaief and W. Zhang, “Cooperative communications for cognitive radio networks,” Proceedings of the IEEE,
no. 97, pp. 878–893, 2009.
[44] M. A. Lexa, M. Davies, J. Thompson, and J. Nikolic, “Compressive power spectral density estimation,” in Acoustics,
Speech and Signal Processing (ICASSP), IEEE International
Conference on, 2011, pp. 3884–3887.
[45] Y. C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang,
“Sensing-throughput tradeoff for cognitive radio networks,”
Wireless Communications, IEEE Transactions on, vol. 7,
no. 4, pp. 1326–1337, 2008.
[46] P. Lu and H.-C. Yang, “Sum-rate analysis of multiuser mimo
system with zero-forcing transmit beamforming,” Communications, IEEE Transactions on, vol. 57, no. 9, pp. 2585–2589,
2009.
[47] T.-X. Luan, L. Dong, K. Xiao, and X.-D. Zhang, “Blind
multiband joint detection in cognitive radio networks based
on model selection,” in Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International
Conference on, Sept 2010, pp. 1–4.
University of Genova – DITEN
152
BIBLIOGRAPHY
[48] J. Ma, G. Li, and B.-H. Juang, “Signal processing in cognitive
radio,” Proceedings of the IEEE, vol. 97, no. 5, pp. 805–823,
May 2009.
[49] M. Maddah-Ali, A. Motahari, and A. Khandani, “Communication over mimo x channels: Interference alignment, decomposition, and performance analysis,” Information Theory, IEEE Transactions on, vol. 54, no. 8, pp. 3457–3470,
2008.
[50] D. Makovoz, “Noise variance estimation in signal processing,”
in Signal Processing and Information Technology, 2006 IEEE
International Symposium on, Aug 2006, pp. 364–369.
[51] A. Mertins,
Signal Analysis:
Wavelets,
Filter Banks, Time-Frequency Transforms and Applications.
John Wiley and Sons., Chichester, 1999.
[Online]. Available: http://www.amazon.com/gp/search?
index=books&linkCode=qs&keywords=0471986267
[52] C. D. Meyer, Matrix analysis and applied linear algebra.
SIAM, 2000. [Online]. Available: http://www.ec-securehost.
com/SIAM/ot71.html
[53] M. Mishali and Y. C. Eldar, “Blind multiband signal reconstruction: Compressed sensing for analog signals,” Signal
Processing, IEEE Transactions on, vol. 57, no. 3, pp. 993–
1009, 2009.
[54] R. Mochaourab and E. Jorswieck, “Optimal beamforming
in interference networks with perfect local channel information,” Signal Processing, IEEE Transactions on, vol. 59,
no. 3, pp. 1128–1141, 2011.
University of Genova – DITEN
BIBLIOGRAPHY
153
[55] P. Morerio, K. Dabcevic, L. Marcenaro, and C. Regazzoni,
“Distributed cognitive radio architecture with automatic frequency switching,” in Complexity in Engineering (COMPENG), 2012, 2012, pp. 1–4.
[56] D. Needell and J. A. Tropp, “Cosamp: iterative signal
recovery from incomplete and inaccurate samples,” Commun.
ACM, vol. 53, no. 12, pp. 93–100, Dec. 2010. [Online].
Available: http://doi.acm.org/10.1145/1859204.1859229
[57] A. Pandharipande and J. P. M. G. Linnartz, “Performance
analysis of primary user detection in a multiple antenna cognitive radio,” in Communications, 2007. ICC ’07. IEEE International Conference on, June 2007, pp. 6482–6486.
[58] K. Phan, S. Vorobyov, N. Sidiropoulos, and C. Tellambura,
“Spectrum sharing in wireless networks via qos-aware secondary multicast beamforming,” Signal Processing, IEEE
Transactions on, vol. 57, no. 6, pp. 2323–2335, 2009.
[59] W. Pratt, J. Kane, and H. C. Andrews, “Hadamard transform image coding,” Proceedings of the IEEE, vol. 57, no. 1,
pp. 58–68, 1969.
[60] Z. Quan, S. Cui, A. H. Sayed, and H. Poor, “Wideband
spectrum sensing in cognitive radio networks,” in Communications, 2008. ICC ’08. IEEE International Conference on,
2008, pp. 901–906.
[61] Z. Quan, S. Cui, A. Sayed, and H. Poor, “Optimal multiband joint detection for spectrum sensing in cognitive radio
networks,” Signal Processing, IEEE Transactions on, vol. 57,
no. 3, pp. 1128–1140, 2009.
University of Genova – DITEN
154
BIBLIOGRAPHY
[62] V. Rodoplu and T. Meng, “Minimum energy mobile wireless
networks,” in Communications, 1998. ICC 98. Conference
Record. 1998 IEEE International Conference on, vol. 3, 1998,
pp. 1633–1639 vol.3.
[63] S. Stotas and A. Nallanathan, “Optimal sensing time and
power allocation in multiband cognitive radio networks,”
Communications, IEEE Transactions on, vol. 59, no. 1, pp.
226–235, 2011.
[64] H. Sun, C. Wei-Yu, J. Jing, A. Nallanathan, and H. Poor,
“Wideband spectrum sensing with sub-nyquist sampling in
cognitive radios,” Signal Processing, IEEE Transactions on,
vol. 60, no. 11, pp. 6068–6073, 2012.
[65] H. Sun, A. Nallanathan, C.-X. Wang, and Y. Chen, “Wideband spectrum sensing for cognitive radio networks: a survey,” Wireless Communications, IEEE, vol. 20, no. 2, pp.
74–81, 2013.
[66] A. Taherpour, S. Gazor, and M. Nasiri-Kenari, “Wideband
spectrum sensing in unknown white gaussian noise,” Communications, IET, vol. 2, no. 6, pp. 763–771, July 2008.
[67] L. T. Tan and H.-Y. Kong, “A novel and efficient mixedsignal compressed sensing for wide-band cognitive radio,” in
Strategic Technology (IFOST), 2010 International Forum on,
2010, pp. 27–32.
[68] W. Tang, M. Shakir, M. Imran, R. Tafazolli, and M.-S.
Alouini, “Throughput analysis for cognitive radio networks
with multiple primary users and imperfect spectrum sensing,” Communications, IET, vol. 6, no. 17, pp. 2787–2795,
2012.
University of Genova – DITEN
BIBLIOGRAPHY
155
[69] Z. Tian and G. B. Giannakis, “A wavelet approach to wideband spectrum sensing for cognitive radios,” in Cognitive Radio Oriented Wireless Networks and Communications, 2006.
1st International Conference on, 2006, pp. 1–5.
[70] L. N. Trefethen and D. B. III., Numerical Linear Algebra.
SIAM, 1997. [Online]. Available: http://www.ec-securehost.
com/SIAM/ot50.html
[71] J. A. Tropp and A. C. Gilbert, “Signal recovery from random measurements via orthogonal matching pursuit,” Information Theory, IEEE Transactions on, vol. 53, no. 12, pp.
4655–4666, 2007.
[72] J. Tropp, J. Laska, M. Duarte, J. Romberg, and R. Baraniuk,
“Beyond nyquist: Efficient sampling of sparse bandlimited
signals,” Information Theory, IEEE Transactions on, vol. 56,
no. 1, pp. 520–544, 2010.
[73] R. Umar and U. H. S. Asrar, “A comparative study of
spectrum awareness techniques for cognitive radio oriented
wireless networks,” Physical Communication, no. 0, pp. –,
2012. [Online]. Available: http://www.sciencedirect.com/
science/article/pii/S1874490712000687
[74] J. Unnikrishnan and V. Veeravalli, “Cooperative spectrum
sensing and detection for cognitive radio,” in Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, Nov
2007, pp. 2972–2976.
[75] P. K. Varshney, “Distributed detection and data fusion,”
Springer-Verlag,1st ed.,” Book chapter, 1996.
[76] Y. Wang, A. Pandharipande, Y. Polo, and G. Leus, “Distributed compressive wide-band spectrum sensing,” in InforUniversity of Genova – DITEN
156
BIBLIOGRAPHY
mation Theory and Applications Workshop, 2009, 2009, pp.
178–183.
[77] ——, “Distributed compressive wide-band spectrum sensing,” in Information Theory and Applications Workshop,
2009, 2009, pp. 178–183.
[78] T. Wimalajeewa and P. K. Varshney, “Cooperative
sparsity pattern recovery in distributed networks via
distributed-omp,” in Proc. IEEE International Conference
on Acoustics, Speech, and Signal Processing (ICASSP’13),,
no. 0, pp. –, Vancouver, Canada, May 2013. [Online].
Available:
http://www.sciencedirect.com/science/article/
pii/S1874490712000687
[79] P. Xiao and M. Sellathurai, “Improved linear transmit processing for single-user and multi-user mimo communications
systems,” Signal Processing, IEEE Transactions on, vol. 58,
no. 3, pp. 1768–1779, 2010.
[80] Z. Ye, G. Memik, and J. Grosspietsch, “Energy detection using estimated noise variance for spectrum sensing in cognitive
radio networks,” in Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, March 2008, pp.
711–716.
[81] T. Yoo and A. Goldsmith, “On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming,” Selected Areas in Communications, IEEE Journal on,
vol. 24, no. 3, pp. 528–541, 2006.
[82] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” Communications
Surveys Tutorials, IEEE, vol. 11, no. 1, pp. 116–130, 2009.
University of Genova – DITEN
BIBLIOGRAPHY
157
[83] C. Zhang, W. Xu, and M. Chen, “Hybrid zero-forcing
beamforming/orthogonal beamforming with user selection for
mimo broadcast channels,” Communications Letters, IEEE,
vol. 13, no. 1, pp. 10–12, 2009.
[84] R. Zhang, F. Gao, and Y.-C. Liang, “Cognitive beamforming
made practical: Effective interference channel and learningthroughput tradeoff,” in Signal Processing Advances in Wireless Communications, 2009. SPAWC ’09. IEEE 10th Workshop on, 2009, pp. 588–592.
[85] R. Zhang and Y.-C. Liang, “Exploiting multi-antennas for
opportunistic spectrum sharing in cognitive radio networks,”
Selected Topics in Signal Processing, IEEE Journal of, vol. 2,
no. 1, pp. 88–102, 2008.
[86] Q. Zhao and A. Swami, “A survey of dynamic spectrum
access: Signal processing and networking perspectives,” in
Acoustics, Speech and Signal Processing, 2007. ICASSP
2007. IEEE International Conference on, vol. 4, 2007, pp.
IV–1349–IV–1352.
University of Genova – DITEN
158
BIBLIOGRAPHY
University of Genova – DITEN
Acknowledgements
Over three years working towards my Ph.D. degree, I was very
lucky to receive the help of many people. Without their kind support and advice, I would not have been able to complete this
thesis. It is a huge opportunity for me to thank all of them.
This research project would not have been possible without the
support of many people. I would like to express my sincere thanks
to my supervisor, Prof. Carlo Regazzoni, who has introduced me
into research, for his guidance, support, and patience. Without
his expert guidance and knowledge, it would have not been possible to come to an end with this dissertation. I feel very lucky and
absolutely happy to work with him. I would also like to thank my
cooperative colleague Prof. Mirco Rafetto and Dr. Lucio Marcenaro for their advice on grasping and dealing with a problem.
To my colleagues: Pietro, Simone, Stefano, Teddy, Muhit,
Francesca, Giuseppe, Luca, Matteo, because they have been more
than work colleagues but real friends.
Finally, I want to express my hearty gratitude to my family
members, particularly to my parents, my wife Afroza Akter, and
other family members for their unmeasurable love and support
which helped me to overcome the difficulties of living far away
159
160
BIBLIOGRAPHY
from my country. Thank you so much!
University of Genova – DITEN
Download