2596 ieee sensors journal, vol. 17, no. 8, april 15, 2017...

11
2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An Opportunistic Spectrum Access Scheme for Multicarrier Cognitive Sensor Networks Donatella Darsena, Senior Member, IEEE , Giacinto Gelli, and Francesco Verde, Senior Member, IEEE Abstract—In this paper, we consider a broadband cognitive radio wireless sensor network operating in a crowded spectrum scenario, where a sensor transmitter (i.e., a sensor node that needs to transmit information to another sensor node or to a sink) opportunistically uses the channel of a primary system adopting an underlay paradigm. Both the primary and sensor systems employ an orthogonal frequency-division multiplexing (OFDM) modulation scheme. The proposed approach is reminiscent of additive superposition coding: specifically, the sensor transmitter behaves as an amplify-and-forward relay for the primary system, by sending a linearly weighted combination of the received primary signal and its own block of symbols. Such a superposition is performed by the sensor transmitter on the fly, in a single OFDM symbol of the primary system. Moreover, the proposed scheme does not require spectrum sensing at the sensor nodes and does not demand any cooperation between primary and sensor systems, thereby accounting for the inherent resource constraints of sensor nodes. With reference to both primary and sensor communications, we address the problem of power allocation by considering different amounts of channel state information and develop a worst case analysis of the achievable information rates. The developed algorithms and the derived formulas, which are corroborated by numerical Monte Carlo simulations, allow one to recognize and discuss interesting tradeoffs between the main parameters of the cognitive radio sensor transmission. Index Terms— Cognitive radio, ergodic channel capacity, opportunistic spectrum access, power allocation, orthogonal frequency-division multiplexing, sensor networks. I. I NTRODUCTION W IRELESS sensor networks (WSNs) [1] have a wide range of application domains, ranging from indoor applications (e.g., tele-medicine, home monitoring, emergency networks, and factory automation) to large-scale real-time multimedia surveillance applications (e.g., delivery of event features in the form of audio, image, and video, target detec- tion and training). WSNs can be designed to operate in either licensed or unlicensed bands: in the former case, an expensive spectrum lease has to be obtained, which may significantly impact on the cost of deployment; in the latter case, since unlicensed bands are also used by other devices, such as wire- less local area network hotspots, broadband satellite terminals, and broadcasting stations, a crowded spectrum problem might Manuscript received December 14, 2016; accepted February 20, 2017. Date of publication February 23, 2017; date of current version March 22, 2017. The associate editor coordinating the review of this paper and approving it for publication was Prof. I Koo. D. Darsena is with the Department of Engineering, Parthenope University, Naples I-80143, Italy (e-mail: [email protected]). G. Gelli and F. Verde are with the Department of Electrical Engineering and Information Technology, University of Naples Federico II, Naples I-80125, Italy (e-mail: [email protected]; [email protected]). Digital Object Identifier 10.1109/JSEN.2017.2674181 be experienced. Such issues have aroused considerable interest in spectrum sharing among WSNs and other wireless systems. Cognitive radio (CR) approaches [2] allow secondary users (SUs) to share a portion of the spectrum with licensed or unlicensed primary users (PUs). The stringent requirement is that transmissions of SUs should not degrade the quality of service that operators have agreed upon with their PUs. WSNs can be empowered by CR capabilities by allowing sensor nodes to act as SUs [3], thus yielding a sensor networking paradigm, referred to as cognitive radio WSN (CRWSN). As explained later, many CR methods are not suitable for WSNs, since they are developed without consid- ering the resource constraints in terms of communication and processing capabilities of sensor nodes, as well as the need for energy-efficient protocols. CR techniques can be categorized according to the coexis- tence strategy of the primary and secondary systems. On the basis of the overlay paradigm [4], the SUs transmit by using standard orthogonalization methods (in space, time, or fre- quency) with respect to the primary transmissions. The tem- porary space-time-frequency voids in the transmission of the PUs are collectively referred to as a white spaces (or spectrum holes). Implementation of overlay schemes in CRWSN may be awkward in practice: to identify the existence of the primary transmissions, sensor nodes should acquire – indi- vidually or collaboratively in a distributed way – accurate and timely knowledge of the white-space locations. Such a goal is difficult to achieve in practice: it is infeasible to equip sensor nodes with complex detection algorithms due to hardware limitations [1] and, moreover, location of spectrum holes causes excessive power consumption at the sensor nodes [3]. A way to relieve the burden of spectrum sensing in a CR network consists of resorting to the underlay paradigm [4], whereby the SU transmissions overlap the signal transmitted by the PUs in space, time, and frequency, provided that the interference level they cause to the PUs is below a given threshold [5]. The mutual interference between primary and secondary transmissions can be optimally (in the information- theoretic sense) removed by allowing SUs and PUs to coop- erate in a non-causal manner [6]–[9]. Such a family of underlay techniques are unsuitable for CRWSN, since they rely on encoding techniques like dirty paper coding [10], which require a priori knowledge at the sensor nodes of the primary user’s transmitted data and/or its codebook. A more practical underlay spectrum sharing paradigm has been recently pro- posed in [11] and [12] for frequency-flat and time-dispersive channels, respectively, whereby no a priori knowledge of the 1558-1748 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 19-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

An Opportunistic Spectrum Access Scheme forMulticarrier Cognitive Sensor Networks

Donatella Darsena, Senior Member, IEEE, Giacinto Gelli, and Francesco Verde, Senior Member, IEEE

Abstract— In this paper, we consider a broadband cognitiveradio wireless sensor network operating in a crowded spectrumscenario, where a sensor transmitter (i.e., a sensor node thatneeds to transmit information to another sensor node or to a sink)opportunistically uses the channel of a primary system adoptingan underlay paradigm. Both the primary and sensor systemsemploy an orthogonal frequency-division multiplexing (OFDM)modulation scheme. The proposed approach is reminiscent ofadditive superposition coding: specifically, the sensor transmitterbehaves as an amplify-and-forward relay for the primary system,by sending a linearly weighted combination of the receivedprimary signal and its own block of symbols. Such a superpositionis performed by the sensor transmitter on the fly, in a singleOFDM symbol of the primary system. Moreover, the proposedscheme does not require spectrum sensing at the sensor nodes anddoes not demand any cooperation between primary and sensorsystems, thereby accounting for the inherent resource constraintsof sensor nodes. With reference to both primary and sensorcommunications, we address the problem of power allocationby considering different amounts of channel state informationand develop a worst case analysis of the achievable informationrates. The developed algorithms and the derived formulas, whichare corroborated by numerical Monte Carlo simulations, allowone to recognize and discuss interesting tradeoffs between themain parameters of the cognitive radio sensor transmission.

Index Terms— Cognitive radio, ergodic channel capacity,opportunistic spectrum access, power allocation, orthogonalfrequency-division multiplexing, sensor networks.

I. INTRODUCTION

W IRELESS sensor networks (WSNs) [1] have a widerange of application domains, ranging from indoor

applications (e.g., tele-medicine, home monitoring, emergencynetworks, and factory automation) to large-scale real-timemultimedia surveillance applications (e.g., delivery of eventfeatures in the form of audio, image, and video, target detec-tion and training). WSNs can be designed to operate in eitherlicensed or unlicensed bands: in the former case, an expensivespectrum lease has to be obtained, which may significantlyimpact on the cost of deployment; in the latter case, sinceunlicensed bands are also used by other devices, such as wire-less local area network hotspots, broadband satellite terminals,and broadcasting stations, a crowded spectrum problem might

Manuscript received December 14, 2016; accepted February 20, 2017. Dateof publication February 23, 2017; date of current version March 22, 2017.The associate editor coordinating the review of this paper and approving itfor publication was Prof. I Koo.

D. Darsena is with the Department of Engineering, Parthenope University,Naples I-80143, Italy (e-mail: [email protected]).

G. Gelli and F. Verde are with the Department of Electrical Engineering andInformation Technology, University of Naples Federico II, Naples I-80125,Italy (e-mail: [email protected]; [email protected]).

Digital Object Identifier 10.1109/JSEN.2017.2674181

be experienced. Such issues have aroused considerable interestin spectrum sharing among WSNs and other wireless systems.

Cognitive radio (CR) approaches [2] allow secondaryusers (SUs) to share a portion of the spectrum withlicensed or unlicensed primary users (PUs). The stringentrequirement is that transmissions of SUs should not degradethe quality of service that operators have agreed upon withtheir PUs. WSNs can be empowered by CR capabilities byallowing sensor nodes to act as SUs [3], thus yielding asensor networking paradigm, referred to as cognitive radioWSN (CRWSN). As explained later, many CR methods are notsuitable for WSNs, since they are developed without consid-ering the resource constraints in terms of communication andprocessing capabilities of sensor nodes, as well as the needfor energy-efficient protocols.

CR techniques can be categorized according to the coexis-tence strategy of the primary and secondary systems. On thebasis of the overlay paradigm [4], the SUs transmit by usingstandard orthogonalization methods (in space, time, or fre-quency) with respect to the primary transmissions. The tem-porary space-time-frequency voids in the transmission of thePUs are collectively referred to as a white spaces (or spectrumholes). Implementation of overlay schemes in CRWSN maybe awkward in practice: to identify the existence of theprimary transmissions, sensor nodes should acquire – indi-vidually or collaboratively in a distributed way – accurate andtimely knowledge of the white-space locations. Such a goal isdifficult to achieve in practice: it is infeasible to equip sensornodes with complex detection algorithms due to hardwarelimitations [1] and, moreover, location of spectrum holescauses excessive power consumption at the sensor nodes [3].

A way to relieve the burden of spectrum sensing in a CRnetwork consists of resorting to the underlay paradigm [4],whereby the SU transmissions overlap the signal transmittedby the PUs in space, time, and frequency, provided that theinterference level they cause to the PUs is below a giventhreshold [5]. The mutual interference between primary andsecondary transmissions can be optimally (in the information-theoretic sense) removed by allowing SUs and PUs to coop-erate in a non-causal manner [6]–[9]. Such a family ofunderlay techniques are unsuitable for CRWSN, since they relyon encoding techniques like dirty paper coding [10], whichrequire a priori knowledge at the sensor nodes of the primaryuser’s transmitted data and/or its codebook. A more practicalunderlay spectrum sharing paradigm has been recently pro-posed in [11] and [12] for frequency-flat and time-dispersivechannels, respectively, whereby no a priori knowledge of the

1558-1748 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

DARSENA et al.: OPPORTUNISTIC SPECTRUM ACCESS SCHEME FOR MULTICARRIER COGNITIVE SENSOR NETWORKS 2597

PU transmission is required at the SU. In these schemes,the arithmetic operation of multiplication is used to superim-pose the SU information-bearing signal on a frame of multiplePU symbols, through an amplify-and-forward (AF) protocol.As a result, under reasonable conditions [11], [12], the SUcan transmit without a power constraint, while keeping thedesirable property of not degrading (but even improving) thePU performance. However, the use of [12] in a CRWSN is lim-ited, since high-data rates, which are required, e.g., in the caseof multimedia applications [13], can be achieved by the sen-sor nodes only if they employ channel-dependent precoders,whose design might be too computationally demanding.

Alternative underlay CR schemes can be obtainedby resorting to the concept of additive superpositioncoding (SPC) [14]–[16]. In its simplest form, an SPC schemecan be seen as a specific modulation technique, which consistsof linearly combining multiple coded symbols. The SPCapproach has been used to develop cooperative primary-secondary spectrum sharing schemes for flat-fading chan-nels [17]–[19]. According to such papers, the secondarytransmitter acts as an AF or decode-and-forward (DF) relay,which performs a symbol-by-symbol SPC, such that the outageperformance of the primary system is not affected in certainconditions. However, an optimization procedure to design theoptimal weights of the linear combination is not outlined.Requirements and challenges of CRWSN are not met alsoby [17]–[19]: such techniques would impose a cooperationbetween the primary and sensor systems, which is impracticalin many sensing applications, and, moreover, their employ-ment would lead to a two-phase protocol, i.e., a protocolspanning two time slots.

Herein, we consider broadband primary and sensor systemswhose modulation is based on orthogonal frequency-divisionmultiplexing (OFDM) [20], due to its many advantages, includ-ing multipath resistance, performance, spectral efficiency, flex-ibility, and computational complexity. We propose a simpleunderlay spectrum sharing scheme where a sensor transmitter(i.e., a sensor node that wishes to transmit information toanother sensor node or to a sink) acts as an AF relay. Specif-ically, the sensor transmitter forwards a linearly weightedcombination of the received primary signal and its own blockof multiple symbols, without degrading the performance of theprimary system. This scheme offers the following advantagesin a CRWSN: (i) the operation carried out by the sensor trans-mitter is very simple, since it consists of adding two signals;(ii) no cooperation is required between the primary and sensorssystems; (iii) only a single slot is required to superimposethe data of the sensor transmitter on the primary signal onthe fly. In particular, we develop power allocation strategiesfor both the primary and sensor transmissions by consideringdifferent channel state information (CSI) scenarios. Moreover,a worst-case theoretical performance analysis of the proposedscheme is developed on the basis of the input-output mutualinformation and the ergodic capacity of both the primary andsensor channels. Finally, numerical results are also reported,aimed at supporting our theoretical findings.

The rest of the paper is organized as follows. In Section II,the mathematical models of the primary and sensor systems are

introduced. In Sections III and IV a worst-case performanceanalysis of the primary and sensor communication links,respectively, is developed in terms of ergodic channel capacity.The theoretical results of Sections III and IV are corroboratedby Monte Carlo numerical simulations in Section V. Finally,concluding remarks are given in Section VI.

II. SIGNAL MODELS OF PRIMARY AND SENSOR SYSTEMS

The main objective of nodes in CRWSN [3] is to acquireinformation from the environment and, depending on theavailability of a primary channel, to transmit the collecteddata in an opportunistic manner to the next hop nodeuntil the information is delivered to the final destination(i.e., the sink). We assume that different pairs of sensor nodes,each one composed by a sensor transmitter (i.e, a sensor nodethat wishes to transmit information) and a sensor receiver(i.e., another sensor node or the sink), occupy orthogonal(in space, time, or frequency) primary channels. Therefore,as depicted in Fig. 1, we only need to consider one primarytransmitter-receiver pair (nodes PTx and PRx), which is autho-rized to operate in a certain portion of the spectrum, and onesensor transmitter-receiver pair (nodes STx and SRx), whichopportunistically operate on the same spectrum, provided thatthe performance of the primary communication link is notaffected by the secondary one. In the sequel, the PTx, STx,PRx, and SRx will be also referred to as nodes 1, 2, 3, and 4,respectively.

Both PTx and STx employ OFDM modulation, with Msubcarriers and a cyclic prefix (CP) of length Lcp, andexperience independent and quasi-static frequency-selectiveRayleigh fading. In particular, for each i ∈ {1, 2} andk ∈ {2, 3, 4}, with i �= k, we model the baseband discrete-timechannel corresponding to the i → k link as a finite-impulseresponse system, whose impulse response hik (�) has order Lik .The channel coefficients hik(�), for � ∈ {0, 1, . . . , Lik }, aresupposed to be constant over one OFDM symbol, but canindependently change from one symbol to another. We denotewith θik ≥ 0 the integer time offset on the i → k link, whichencompasses both the propagation delay of the wireless linkand the processing time1 at node i . In the sequel, we assumethat Lik + θik ≤ P − 1, such that the block received at eachnode in the network is contaminated only by the interblockinterference (IBI) of the previous transmitted block. Finally,perfect frequency synchronization at each node is assumed.

In the nth symbol period (n ∈ Z), the PTx (node 1)transmits u1(n) = Tcp W IDFT s1(n) ∈ C

P , with P �M + Lcp and s1(n) � �1 s1(n) ∈ C

M , where Tcp �[Icp

T, I M ]T ∈ RP×M inserts the CP, with Icp ∈ R

Lcp×M

obtained from I M by picking its last Lcp rows, W IDFT ∈C

M×M is the unitary symmetric inverse discrete Fouriertransform (DFT) matrix, �1 ∈ R

M×M1 is a binary (0/1)matrix modeling the subcarrier allocation strategy of the PU,and s1(n) � [s1,0(n), s1,1(n), . . . , s1,M1−1(n)]T ∈ C

M1 is theinformation-bearing symbol vector, whose entries are modeledas independent and identically distributed (i.i.d.) zero-meancircularly symmetric complex random variables (RVs), with

1The fractional time offset is incorporated as part of {hik (�)}Lik�=0.

Page 3: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2598 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

Fig. 1. The considered CRWSN.

variance E[|s1,m(n)|2] = σ 21,m , for m ∈ {0, 1, . . . , M1 − 1}.

The PU transmission is subject to the (average) powerconstraint E[‖s1(n)‖2] = ∑M1−1

m=0 σ 21,m ≤ M1 σ 2

P . Finally,the entries of u1(n) undergo digital-to-analog (D/A) plusradio-frequency (RF) conversion.

The RF signal u1(t) transmitted by the PTx is receivedby both the STx and PRx. After analog-to-digital (A/D)conversion, the baseband signal received by the STx (node 2)can be compactly expressed as

r2(n) = ˜H(0)12 u1(n) + ˜H

(1)12 u1(n − 1) + w2(n) (1)

where w2(n) ∈ CP is thermal noise, ˜H

(0)12 ∈ C

P×P is aToeplitz lower-triangular channel matrix, whose first columnis given by [h12(−θ12), . . . , h12(−θ12 + L12), 0, . . . , 0]T and

˜H(1)12 ∈ C

P×P is a Toeplitz upper-triangular matrix, whosefirst row is [0, . . . , 0, h12(−θ12 + L12), . . . , h12(−θ12 + 1)].

The STx wishes to transmit towards the SRx the base-band signal block given by u2(n) = Tcp W IDFT s2(n), withs2(n) � �2 s2(n) ∈ C

M , where the entries of the vectors2(n) � [s2,0(n), s2,1(n), . . . , s2,M2−1(n)]T ∈ C

M2 are i.i.d.zero-mean circularly symmetric complex RVs, with varianceE[|s2,m(n)|2] = σ 2

2,m , for m ∈ {0, 1, . . . , M2 − 1}, whereas�2 ∈ R

M×M2 is the binary (0/1) subcarrier mapping matrix ofthe secondary system. The sensor transmission is subject to the

power constraint E[‖s2(n)‖2] = ∑M2−1m=0 σ 2

2,m ≤ M2 σ 2S . The

STx superimposes its transmission over the received signalr2(n) by transmitting a linear combination of the receivedsignal and its own signal

z2(n) = √α r2(n) + √

1 − α u2(n) (2)

where 0 ≤ α ≤ 1 represents a superposition weight, whosechoice will be discussed later on. 2 It is worth noting that,differently from [17]–[19], our protocol does not require atwo-slot transmission, since relaying and SPC are performedat the same time. Indeed, the signal corresponding to u2(n)is already available at node 2 when the STx receives the PTxtransmission and, thus, SPC given by (2) is carried out inreal-time, without any significant latency.

The discrete-time signal received by the PRx (node 3) canbe expressed as

r3(n) = ˜H(0)13 u1(n) + ˜H (1)

13 u1(n − 1)︸ ︷︷ ︸

(a)

+ ˜H(0)23 z2(n) + ˜H(1)

23 z2(n − 1)︸ ︷︷ ︸

(b)

+w3(n) (3)

2Even though SPC given by (2) can be carried out directly on the RF analogsignals, we consider herein an equivalent discrete-time baseband model, whichallows for easier derivation of the overall system equations.

Page 4: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

DARSENA et al.: OPPORTUNISTIC SPECTRUM ACCESS SCHEME FOR MULTICARRIER COGNITIVE SENSOR NETWORKS 2599

where the matrix pairs {˜H(0)13 , ˜H (1)

13 } and {˜H(0)23 , ˜H (1)

23 } aredefined similarly to {˜H(0)

12 , ˜H(1)12 } by replacing {h12(�),

L12, θ12} with {h13(�), L13, θ13} and {h23(�), L23, θ23},respectively, whereas w3(n) ∈ C

P is thermal noise.We observe that (a) is the contribution due to the primarytransmission and (b) takes into account the signal retransmittedby the STx.

If max(L13 + θ13, L12 + L23 + θ12 + θ23) ≤ Lcp, the IBIcontribution in (3) can be completely eliminated by removingthe CP at the PRx. Therefore, discarding the CP from (3)through multiplication by Rcp � [OM×Lcp, I M ] ∈ R

M×P ,and performing M-point DFT, through the matrix WDFT �W−1

IDFT = W∗IDFT ∈ C

M×M , taking into account (1) and (2),we get the frequency-domain data block

y3(n) � Rcp WDFT r3(n) = (H13 + √α H23 H12) s1(n)

+ √1 − α H23 s2(n) + d3(n)

(4)

where H ik � WDFT Rcp ˜H(0)ik Tcp W IDFT ∈ C

M×M are diago-nal matrices, for i ∈ {1, 2} and k ∈ {2, 3}, with i �= k, whosemth diagonal entry represents the M-point DFT of the channelimpulse response hik(� − θik), i.e.,

Hik(m) � e− j 2πM θik m

Lik∑

�=0

hik(�) e− j 2πM �m (5)

and d3(n) � W DFT Rcp [√α ˜H(0)23 w2(n) + w3(n)] ∈ C

M .Similarly to (3), the discrete-time signal received by the

SRx can be expressed as

r4(n) = ˜H(0)14 u1(n) + ˜H

(1)14 u1(n − 1) + ˜H

(0)24 z2(n)

+ ˜H(1)24 z2(n − 1) + w4(n) (6)

where the matrix pairs {˜H(0)14 , ˜H

(1)14 } and {˜H(0)

24 , ˜H(1)24 } are

defined similarly to {˜H(0)12 , ˜H(1)

12 } by replacing {h12(�),L12, θ12} with {h14(�), L14, θ14} and {h24(�), L24, θ24},respectively, whereas w4(n) ∈ C

P represents thermal noise.Provided that max(L14 + θ14, L12 + L24 + θ12 + θ24) ≤ Lcp,by removing the CP at the SRx and performing DFT, we obtain

y4(n) � WDFT Rcp r4(n) = √1 − α H24 s2(n)

+ (H14 + √α H24 H12) s1(n) + d4(n) (7)

where H14 ∈ CM×M and H24 ∈ C

M×M turn out to bediagonal matrices, whose mth diagonal entry is given by (5)with {i, j} equal to {1, 4} and {2, 4}, respectively, and d4(n) �WDFT Rcp [√α ˜H

(0)24 w2(n) + w4(n)] ∈ C

M .The diagonal entries of the frequency-domain channel matri-

ces H ik are modeled as i.i.d. zero-mean circularly symmetriccomplex Gaussian (ZMCSCG) RVs having variance σ 2

ik �d−η

ik , which depends on the average path loss associated to theunderlying link, where dik is the distance between nodes i andk, and η denotes the path-loss exponent.

It is important to observe that the signal models (4) and (7)hold if the CP is designed such that

max(L13 + θ13, L14 + θ14, L12 + L23 + θ12 + θ23,

L12 + L24 + θ12 + θ24) ≤ Lcp. (8)

It is worth noticing that both the maximum excess delay ofthe involved channels and the maximum distances among thePTx, the STx, and the PRx are upper limited by (8). Such aninequality requires only upper bounds (rather than the exactknowledge) on the channel orders and TOs, whose supportscan be typically predicted in many wireless scenarios [21].

III. POWER ALLOCATION AND ERGODIC CAPACITY

ANALYSIS FOR THE PRIMARY SYSTEM

In this section, we consider the problem of power allocationfor the primary system and calculate a lower bound on itsergodic capacity. To this aim, omitting the dependence on thesymbol index n, we rewrite (4) as follows

y3 = HP �1 s1 + vP (9)

where HP � H13 +√α H23 H12 is the “composite” diagonal

channel matrix and vP �√

1 − α H23 s2 + d3 is the “equiva-lent” noise seen by the PRx. We assume that, in the consideredquasi-static fading scenario, the PRx has perfect knowledgeof HP, which can be acquired through training-based channelestimation techniques [22]. It is worth noticing that in generalα, �2, and σ 2

2,m , with m ∈ {0, 1, . . . , M2 − 1}, might be opti-mized to enhance the performance of the sensor system and,hence, they may be a function of the relevant random chan-nel coefficients (see Subsection IV-A). However, we assumeherein that they are deterministic unknown parameters.

The computation of the mutual information I(s1, y3|HP)(in bit/s/Hz) between s1 and y3, given HP, is complicated bythe fact that vP is not a Gaussian random vector. However,recalling that the ZMCSCG distribution represents the worst-case noise distribution under a variance constraint [14], [23],we can obtain a lower bound on the primary user capacityassuming that vP is ZMCSCG, with diagonal covariancematrix given by

RvP � E[

vP vHP

]

= (1 − α) σ 223 �2 Rs2 �T

2

+ (α σ 2w2

σ 223 + σ 2

w3) I M (10)

with Rs2 � E[s2 sH2 ] = diag(σ 2

2,0, σ22,1, . . . , σ

22,M2−1) being

the correlation matrix of s2, where we have also replaced w2 ind3 with w2 � Tcp Rcp w2, which are both ZMCSCG randomvectors with correlation matrix E[w2 wH

2 ] = σ 2w2

I P andE[w2 wH

2 ] = σ 2w2

Tcp TTcp, respectively. For sufficiently large

values of M , the matrices I P and Tcp TTcp are asymptotically

equivalent in weak norm [24]. Therefore, in the large M limit,the random vectors w2 and w2 have the same distribution.

Under the worst-case noise distribution, the optimum inputdistribution maximizing the channel capacity is the ZMCSCGdistribution [14], [23]: more precisely, s1 is a ZMCSCGrandom vector, with covariance matrix Rs1 � E[s1 sH

1 ] =diag(σ 2

1,0, σ21,1, . . . , σ

21,M1−1). Therefore, the mutual informa-

tion, given HP, under an average transmit power constraintcan be lower-bounded as reported in (11) at the top of thenext page. Thus, let IP,uc ⊆ M � {0, 1, . . . , M − 1} be theset of subcarriers used by the primary communication link,which can be deduced from �1. By substituting (10) into (11),we can rewrite (11) as shown in (12) at the top of the nextpage, where σ 2

vP(m) � σ 2

23 [ρm (1 −α)+α σ 2w2

]+σ 2w3

denotes

Page 5: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2600 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

I(s1, y3|HP) ≥ Imin(s1, y3|HP) � 1

Plog2 det

(

I M + R−1/2vP HP �1 Rs1 �T

1 H∗P R−1/2

vP

)

(11)

= 1

P

m∈IP,uc

log2

[

1 + μm |H13(m) + √α H23(m) H12(m)|2

σ 2vP

(m)

]

(12)

the mth diagonal entry of RvP , whereas μm = σ 21,im

if m ∈IP,uc, zero otherwise, with im1 �= im2 ∈ {0, 1, . . . , M1 − 1}.Similarly, ρm = σ 2

2,kmif m ∈ IS,uc, zero otherwise, with

IS,uc ⊆ M denoting the set of subcarriers used by theSTx, which can be inferred from �2, and km1 �= km2 ∈{0, 1, . . . , M2 − 1}.

A. Power Allocation Strategies for the Primary Transmission

The problem of power allocation for the primary systemconsists of choosing the parameters μm for m ∈ IP,uc, whichhave an impact on the information rate of the primary channel,as it can be seen from (12). Such a choice depends on theavailable CSI at the PU. When the PTx has no CSI, the uni-form power allocation strategy can be employed over the usedsubcarriers of the PU, i.e., μm = σ 2

P , for each m ∈ IP,uc.Alternatively, in order to perform non-uniform power alloca-tion over the used subcarriers of the PU, the parameters μm ,for m ∈ IP,uc, can be chosen so as to maximize the worst-casemutual information Imin(s1, y3|HP) given by (12), subject to(s.to) the power constraint

m∈IP,ucμm = M1 σ 2

P . So doing,the PTx must have knowledge of the diagonal entries

HP(m) � H13(m) + √α H23(m) H12(m) , for m ∈ IP,uc

(13)

of the composite channel matrix HP and the diagonal entriesσ 2

vP(m) of the correlation matrix RvP , for m ∈ IP,uc. The

diagonal entries of HP can be acquired either by means ofa feedback channel or by application of the channel reci-procity property [15], whereas the diagonal entries of RvP

can be acquired from (9) as in conventional waterfilling algo-rithms [25]. Specifically, we propose to solve the optimizationproblem

arg max{μm }m∈IP,uc

m∈IP,uc

log2

[

1 + μm |HP(m)|2σ 2

vP(m)

]

s.to∑

m∈IP,uc

μm = M1 σ 2P and μm ≥ 0 ∀m ∈ IP,uc. (14)

The solution of the above problem is given by (see, e.g., [15])

μoptm =

[

κ − σ 2vP

(m)

|HP(m)|2]+

, ∀m ∈ IP,uc (15)

where the constant κ is chosen so as to fulfil the powerconstraint

m∈IP,ucμ

optm = M1 σ 2

P .

B. Worst-Case Ergodic Capacity of the Primary Channel

The ergodic capacity of the primary channel is givenby CP � E[I(s1, y3|HP)] [14], [23], where the ensemble

average is taken with respect to HP. Therefore, the worst-case ergodic capacity of the primary channel can be obtainedby averaging Imin(s1, y3|HP) in (12) with respect to HP.In this regard, to simplify the analysis, we assume that theprimary system adopts a uniform power allocation strategy,i.e., μm = σ 2

P , for each m ∈ IP,uc, and, moreover,both ρm , for each m ∈ IS,uc, and α are independent ofthe realization of the channels. In this case, in order toanalytically evaluate such an ensemble average, we observethat, conditioned on H23, the random variable H13(m) +√

α H23(m) H12(m) in (12), for each m ∈ M, is ZMCSCG,with variance σ 2

13+α |H23(m)|2 σ 212. Consequently, the squared

magnitude |H13(m)+√α H23(m) H12(m)|2 has an exponential

distribution with mean (σ 213 +α |H23(m)|2 σ 2

12)−1. Henceforth,

by applying the conditional expectation rule [26], we get

CP ≥ CP,lower � E[Imin(s1, y3|HP)]= log2(e)

P

m∈IP,uc

E[(�(m)SPC)] (16)

where the ensemble average is taken with respect to therandom variable |H23(m)|2, and (·) is defined [27] as

(A) �∫ +∞

0e−u ln(1 + A u) du = −e

1A Ei

(

− 1

A

)

(17)

with Ei(x) denoting, for x < 0, the exponential integralfunction, and, finally,

�(m)SPC �

σ 2P

(

σ 213 + α |H23(m)|2 σ 2

12

)

σ 2vP

(m). (18)

Let us assume that σ 2w2

= σ 2w3

� σ 2w hereinafter. In the

high signal-to-noise ratio (SNR) regime, i.e., when σ 2P /σ 2

w issufficiently large, by approximating (A) ≈ ln(1 + A) − γ ,which is valid for A � 1, with γ ≈ 0.57721 denoting theEuler-Mascheroni constant, we can approximate (16) as

CP,lower ≈ log2(e)

P

m∈IP,uc

{

E[

ln(

1 + �(m)SPC

)]

− γ}

(19)

where the ensemble average is taken with respect to therandom variable |H23(m)|2, which is exponentially-distributedwith mean σ 2

23. Therefore, one has

E[

ln(1 + �(m)SPC)

]

=∫ +∞

0ln

[

σ 2vP

(m) + σ 2P σ 2

13 + b u

σ 2vP

(m)

]

·e−u du (20)

where b � α σ 2P σ 2

12 σ 223. By exploiting the properties of the

logarithm and taking again into account the approximation of

Page 6: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

DARSENA et al.: OPPORTUNISTIC SPECTRUM ACCESS SCHEME FOR MULTICARRIER COGNITIVE SENSOR NETWORKS 2601

(·), the lower bound CP,lower can be approximated as

CP,lower ≈ log2(e)

P

m∈IP,uc

σ 2P

σ 2w(σ 2

13 + α σ 212 σ 2

23)

1 + α σ 223 + ρm

σ 2w

(1 − α) σ 223

− γ log2(e)M1

P(21)

where we remember that M1 is the cardinality of the set IP,uc.We observe that γ log2(e) M1/P ≤ γ log2(e)M/P = 0.662,where we have used the typical value Lcp/M = 1/4. Hence-forth, the term γ log2(e) M1/P in (21) can be safely neglectedin the high-SNR regime and we will ignore it in the sequel.

At this point, some comments are in order. We note that,when α = 1, i.e., when the STx does not perform SPC, in thehigh-SNR regime, eq. (21) becomes

CP,lower ≈ log2(e)

PM1

σ 2P

σ 2w(σ 2

13 + σ 212 σ 2

23)

1 + σ 223

⎦(22)

which represents the ergodic channel capacity of a multicarrierAF relay system. On the contrary, when α = 0, i.e., the STxdoes not perform relaying, eq. (21) boils down to

CP,lower ≈ log2(e)

P

m∈IP,uc

SNRP,direct

1 + ρmσ 2

wσ 2

23

⎠ (23)

where SNRP,direct � σ 2P σ 2

13/σ2w denotes the average SNR of

the primary direct link between the PTx and PRx, i.e., withoutthe opportunistic access of the sensor system. By observingthat the capacity of the primary direct link between the nodes1 and 3 is given by (see [27])

CP,direct = log2(e)

PM1 (SNRP,direct) (24)

one can infer that, in this case, CP,lower turns out to be lessthan CP,direct due to the presence in (23) of the term ρm σ 2

23/σ2w

caused by SPC. Such a term tends to increase as the SNR ofthe secondary user, i.e., σ 2

S /σ 2w, grows and/or when the STx

approaches the PRx, i.e., σ 223 → 0.

Let us compare (21) with (24). To investigate the conditionsunder which the proposed underlay CR scheme does not leadto a capacity degradation of the primary channel, we focus onthe worst case where both the PTx and STx share the sameset of subcarriers, i.e., IS,uc = IP,uc, and the sensor systemuniformly allocates its power over them, i.e., ρm = σ 2

S , ∀m ∈IP,uc. In the high-SNR regime, one has CP,lower > CP,directwhen

σ 2P

σ 2w(σ 2

13 + α σ 212 σ 2

23)

1 + α σ 223 + σ 2

Sσ 2

w(1 − α) σ 2

23

> SNRP,direct (25)

thus, recalling that σ 2ik = d−η

ik , in order not to degradethe performance of the primary communication link, thesuperposition weight has to be chosen as

αmin �σ 2

Sσ 2

w(

d13d12

)η + σ 2S

σ 2w

− 1< α ≤ 1 . (26)

One can observe from (26) that αmin → 1 (i.e., the STxexclusively acts as a relay and does not perform SPC) as theSNR of the secondary user σ 2

S /σ 2w grows without bound and/or

d13/d12 → 0, i.e., the distance between the PTx and the STxis significantly greater than the distance between the PTx andthe PRx. We will propose in the next section optimizationprocedures for the choice of α.

IV. POWER ALLOCATION AND ERGODIC CAPACITY

ANALYSIS FOR THE SENSOR SYSTEM

In this section, we consider the problem of power allocationfor the sensor system and derive a lower bound on its ergodiccapacity. To this aim, we rewrite (7) as

y4 = HS �2 s2 + vS (27)

where HS �√

1 − α H24 is the composite diagonal channelmatrix and vS � (H14+√

α H24 H12) s1+d4 is the equivalentnoise seen by the SRx, and, for simplicity, we have againomitted the dependence on the time index n. We assume that,in the considered quasi-static fading scenario, the SRx hasperfect knowledge of the matrix HS, which can be estimatedvia training sent by the STx [22].

As in Section III, we consider a lower bound on the mutualinformation I(s2, y4|HS) (in bit/s/Hz) between s2 and y4,given HS, by considering the worst-case distribution for theequivalent noise term at the SRx under a variance constraint,i.e., vS is modeled as a ZMCSCG random vector with condi-tional diagonal correlation matrix

RvS � E[

vS vHS

]

=(

σ 214 + α σ 2

24 σ 212

)

�1 Rs1 �T1

+ α σ 2w2

σ 224 + σ 2

w4I M (28)

where, as already done in Section III, we have replaced in d4the noise vector w2 with w2 = Tcp Rcp w2 and assumed that�1 and Rs1 are deterministic unknown parameters. Recallingthat, in this case, the optimum input distribution maximizingthe channel capacity is the ZMCSCG distribution [14], [23],i.e., s2 is a ZMCSCG random vector with covariancematrix Rs2 , we get I(s2, y4 | HS) ≥ Imin(s2, y4 | HS), whereImin(s2, y4 | HS) is reported in (29) at the top of the next page.

A. Power Allocation Strategies for the Sensor Transmission

The problem of power allocation for the sensor systemamounts to choosing the parameters ρm , for m ∈ IS,uc, and thesuperposition weight α, without affecting the performance ofthe primary system, i.e., such that CP,lower ≥ CP,direct. In orderto fulfill such a constraint, the sensor system assumes thatσ 2

w2= σ 2

w3= σ 2

w4= σ 2

w and the PU is uniformly allocatingthe power over all its used subcarriers,3 i.e., μm = σ 2

P , for eachm ∈ IP,uc. Regarding the CSI of the 2 → 4 link, we considertwo scenarios: in the former one, the STx knows the statis-tical (or long-term) characterization of the channel, i.e., thevariance σ 2

24; in the latter one, instantaneous (or short-term)

3This is a conservative assumption: indeed, if the PU allocates the availablepower over the used subcarriers according to (15), the corresponding capacityis greater than or equal to the case when the power is allocated uniformly.

Page 7: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2602 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

Imin(s2, y4 | HS) � 1

Plog2 det

(

I M + R−1/2vS HS �2 Rs2 �T

2 H∗S R−1/2

vS

)

= 1

P

m∈IS,uc

log2

[

1 + ρm (1 − α) |H24(m)|2μm(

σ 214 + α σ 2

24 σ 212

)+ α σ 2w σ 2

24 + σ 2w

]

(29)

arg max0≤α≤1

m∈IS,uc

log2

[

1 + σ 2S (1 − α) σ 2

24

σ 2P δm

(

σ 214 + α σ 2

24 σ 212

)+ α σ 2w σ 2

24 + σ 2w

]

s.tolog2(e)

P

m∈IP,uc

[

σ 2P (σ 2

13 + α σ 212 σ 2

23)

σ 2S βm (1 − α) σ 2

23 + α σ 223 σ 2

w + σ 2w

]

≥ CP,direct (30)

arg maxIS,uc

{ρm}m∈IS,uc

0 ≤ α ≤ 1

m∈IS,uc

log2

[

1 + ρm (1 − α) |H24(m)|2σ 2

P δm(

σ 214 + α σ 2

24 σ 212

)+ α σ 2w σ 2

24 + σ 2w

]

m∈IS,uc

ρm = M2 σ 2S ,

s.to ρm ≥ 0 ∀m ∈ IS,uc andlog2(e)

P

m∈IP,uc

[

σ 2P (σ 2

13 + α σ 212 σ 2

23)

ρm (1 − α) σ 223 + α σ 2

23 σ 2w + σ 2

w

]

≥ CP,direct (31)

CS,lower = log2(e)

P

m∈IS,uc

[

σ 2S (1 − α) σ 2

24

μm(

σ 214 + α σ 2

24 σ 212

)+ α σ 2w σ 2

24 + σ 2w

]

(33)

CSI is available at the STx, i.e., the diagonal entries of H24are assumed to be known.

Let us consider the former scenario where the STx hasstatistical CSI of the 2 → 4 link. In such a scenario,the uniform power allocation strategy can be employed overthe used subcarriers of the sensor system, i.e., ρm = σ 2

S , foreach m ∈ IS,uc, whereas we propose to choose α accordingto the optimization problem reported in (30) at the top ofthis page, where δm = 1 if m ∈ IP,uc, zero otherwise, andwe have used (21) to make the constraint CP,lower ≥ CP,directexplicit, with βm = 1 if m ∈ IS,uc, zero otherwise. Such aproblem only requires knowledge of the average powers ofthe primary and sensor transmissions, the (common) noisefigure of nodes 2, 3, and 4, as well as the average path-loss model of the environment, which are typically knownin advance in many WSNs. Since the cost function in (30)decreases for increasing values of α, the solution αopt ofthe constrained optimization problem (30) corresponds to theminimum value αmin of α such that the constraint is satisfied,i.e., αopt = αmin. The value of αmin can be obtained whenIP,uc �= IS,uc by numerically solving CP,lower = CP,direct,whereas, in the case of IP,uc ≡ IS,uc, it is given in closed-formby (26).

At this point, we focus on the latter scenario where, inaddition to the knowledge required in the former one, the chan-nel coefficients H24(m) are also known, for each m ∈ IS,uc,through a feedback channel or capitalizing on the channelreciprocity property [15]. In this scenario, the parameters ρm ,for m ∈ IS,uc, and the superposition weight α can be jointlyoptimized as proposed in (31) at the top of this page. Similarlyto other power allocation problems [28]–[30], the closed-formsolution of (31) is intractable: indeed, since this problemis nonconvex, its global-optimal solution is hard to obtain.

In Table I, we provide a fast and simple algorithm to obtain asolution of (31), which consists of fixing the cardinality M2of the subset IS,uc and, then, choosing the best M2 subcarriers(i.e., those with the highest channel magnitudes); finally, thevalues of α and ρm , for m ∈ IS,uc, are obtained by employingan iterative optimization technique.

B. Worst-Case Ergodic Capacity of the Sensor Channel

The ergodic capacity of the sensor channel is defined asCS � E[I(s2, y4 | HS)] [14], [23]. Accounting for (29), onehas the lower bound

CS ≥ CS,lower � E[Imin(s2, y4 | HS)] . (34)

For the sake of simplicity, we assume that the sensor systemadopts a uniform power allocation strategy, i.e., ρm = σ 2

S ,for each m ∈ IS,uc, and, moreover, both μm , for eachm ∈ IP,uc, and α are independent of the realization ofthe channels. Since the squared magnitude |H24(m)|2 has anexponential distribution with mean σ 2

24, it can be shown that,using (17), the worst-case capacity CS,lower assumes the formreported in (33) at the top of this page. Low- and high-SNRapproximation of (33) can be obtained by using the asymptoticexpressions of the function (A), when σ 2

S /σ 2w is vanishingly

small or sufficiently large, respectively.

V. NUMERICAL PERFORMANCE ANALYSIS

In this section, we report numerical simulations aimedat corroborating the performance of the proposed underlayCR scheme in terms of ergodic capacities of both the primaryand sensor channels. Both the primary and sensor communi-cation links employ OFDM modulation, with M = M1 = 64subcarriers (i.e., there are no white spaces in the primaryspectrum), a CP of length Lcp = 8, and M2 = 16. We consider

Page 8: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

DARSENA et al.: OPPORTUNISTIC SPECTRUM ACCESS SCHEME FOR MULTICARRIER COGNITIVE SENSOR NETWORKS 2603

TABLE I

PROPOSED ALGORITHM TO SOLVE (31)

a network topology wherein the nodes are collinear andassume that the distances among them are all normalizedwith respect to d13 = 1. Specifically, the node 1 (PTx) and3 (PRx) have coordinates equal to (0, 0) and (0, 1), respec-tively, whereas the node 4 (SRx) has coordinates (0, 0.5). Thenode 2 (STx), instead, is placed along the line joining thenodes 1 and 4. The orders of the discrete-time channels amongthe nodes are set to L12 = L13 = L23 = L14 = L24 = 3,whereas the corresponding time offsets are set to θ12 = θ13 =θ23 = θ14 = θ24 = 1. The path-loss exponent is chosen equalto η = 3. We fix σ 2

S = σ 2P = 1 and σ 2

w2= σ 2

w3= σ 2

w4� σ 2

w .

A. Primary System Performance

In this subsection, we focus on the performance of theprimary system when the ratio δ12 � d12/d13 ∈ {0.2, 0.3, 0.4}and the sensor system uniformly allocates its power overthe subcarriers IS,uc = {48, 49, . . . , 63}, i.e., ρm = σ 2

S ,∀m ∈ IS,uc, by additionally setting α = 0.25.

Fig. 2 depicts the worst-case ergodic capacity CP,lower ofthe primary channel (16) as a function of SNRP � σ 2

P /σ 2w ,

when the primary system adopts the uniform power alloca-tion strategy, i.e., μm = σ 2

P , for each m ∈ {0, 1, . . . , 63}.In the same figure, we also report the approximated expression(21) of CP,lower. Results show that there is a good agreementbetween the curves of CP,lower given by (16) and those of itsapproximated expression (21), for moderate-to-high values ofSNRP, thus showing that (21) can be used for SNR values ofpractical interest.

In Figs. 3 and 4, the performance (16) of the proposedunderlay CR scheme is compared with that of the primarydirect link given by (24). We consider in Fig. 3 the scenariowhen the PTx allocates the power uniformly in both cases,i.e., μm = σ 2

P , for each m ∈ {0, 1, . . . , 63}. On the otherhand, results of Fig. 4 refer to the scenario where the PTxemploys the power allocation strategy (15). It is noteworthythat, in this latter scenario, the waterfilling solution for the

Page 9: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2604 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

Fig. 2. Worst-case ergodic capacity of the primary channel versus SNRP(uniform power allocation).

Fig. 3. Ratio between the worst-case ergodic capacity of the primary channeland the ergodic capacity of its direct link versus SNRP (uniform powerallocation for both cases).

direct link can also be obtained from (15) by setting α = 0.It is seen that, in both power allocation schemes, the primarysystem can benefit from the presence of the superimposedsensor transmission, exhibiting a slight performance gain overthe direct approach, especially for smaller values of δ12,i.e., when the STx is closer to the PTx than the PRx, and forlow-to-moderate values of SNRP. Therefore, the primary com-munication link does not incur any performance penalty dueto the opportunistic spectrum usage by the STx. As pointedout in Section III, such a result stems from the fact that theSTx not only performs SPC, but also acts as a relay for theprimary communication.

B. Sensor System Performance

In this subsection, we study the worst-case performance(34) of the sensor system as a function of SNRS � σ 2

S /σ 2w,

for different values of the ratio δ12 ∈ {0.2, 0.3, 0.4}, when the

Fig. 4. Ratio between the worst-case ergodic capacity of the primary channeland the ergodic capacity of its direct link versus SNRP (optimal powerallocation for both cases).

Fig. 5. Worst-case ergodic capacity of the sensor channel versus SNRS fordifferent power allocation strategies (δ12 = 0.2).

primary system adopts the uniform power allocation strategy,i.e., μm = σ 2

P , for each m ∈ {0, 1, . . . , 63}.We consider the scenario (referred to as “α-opt;

pow-unif”) where α is optimized according to the algo-rithm (30) and the sensor system uniformly allocates itspower over the subcarriers IS,uc = {48, 49, . . . , 63}, i.e.,ρm = σ 2

S , ∀m ∈ IS,uc. Additionally, we study the scenario(referred to as “α-opt; pow-opt”) where the subset IS,uc, theparameters ρm , for m ∈ IS,uc, and the superposition weight αare jointly optimized as reported in Table I, with �α = 0.005.Finally, with reference to the case of known instantaneousCSI at the STx, we evaluate the worst-case ergodic capacityof the scheme [5], where the worst-case input-output mutualinformation of the sensor system is maximized with respectto the parameters ρm , for m ∈ IS,uc = {48, 49, . . . , 63},subject to the power constraint

m∈IS,ucρm = M2 σ 2

S and

Page 10: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

DARSENA et al.: OPPORTUNISTIC SPECTRUM ACCESS SCHEME FOR MULTICARRIER COGNITIVE SENSOR NETWORKS 2605

Fig. 6. Worst-case ergodic capacity of the sensor channel versus SNRS fordifferent power allocation strategies (δ12 = 0.3).

Fig. 7. Worst-case ergodic capacity of the sensor channel versus SNRS fordifferent power allocation strategies (δ12 = 0.4).

the interference constraint SNR(m)13,direct/SINR(m)

13 = 0.9, where

SNR(m)13,direct � σ 2

P |H13(m)|2/σ 2w is the (instantaneous) SNR at

the PRx over the subcarrier m ∈ {0, 1, . . . , M − 1} when theSTx is inactive and SINR(m)

13 � σ 2P |H13(m)|2/(σ 2

w + σ 223 ρm)

is the signal-to-noise-plus-interference ratio at the PRx overthe mth subcarrier when the STx is transmitting.

Results of Figs. 5–7 show that, the larger the ratio δ12,the higher the ergodic capacity of the sensor channel, since,in this case, the STx gets closer to the SRx. Nevertheless,when the power is optimally allocated over the used subcarrier,the proposed scheme outperforms its non-optimized (i.e., withuniform power allocation) counterpart over the entire rangeof SNRS, showing that the sensor communication link canachieve satisfactory data rates. Compared to the proposedschemes, the interference-controlled transmission method pro-posed in [5] performs significantly worse, by also introducinga controlled degradation of the quality of the primary channel,according to the interference constraint.

VI. CONCLUSIONS

We proposed an underlay CR scheme for multicarrierWSNs, which is based on SPC in a single OFDM symbol ofthe primary system and does not require a cooperation betweensensor and primary networks. We analytically demonstratedthat even such a simple superposition code is able to ensurea satisfactory data-rate for a sensor transmitter-receiver pair,without degrading the performance of the primary commu-nication link. Simple procedures were proposed to optimizethe power allocation strategy of both the primary and sensorsystems, as well as the superposition weight α used by thesensor transmitter, based on either statistical (i.e., transmittingpowers and average path-loss) or instantaneous CSI. Althoughit can be applied to other CR scenarios, due to its simplicity,the proposed underlay scheme seems to be particularly suitablefor resource-constrained WSNs.

REFERENCES

[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A surveyon sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114,Aug. 2002.

[2] S. Haykin, “Cognitive radio: Brain-empowered wireless communica-tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220,Feb. 2005.

[3] O. B. Akan, O. B. Karli, and O. Ergul, “Cognitive radio sensornetworks,” IEEE Netw., vol. 23, no. 4, pp. 34–40, Jul./Aug. 2009.

[4] E. Biglieri, A. J. Goldsmith, L. J. Greenstein, N. B. Mandayam, and H.V. Poor, Principles of Cognitive Radio. New York, NY, USA: CambridgeUniv. Press, 2013.

[5] W. Qiu, B. Xie, H. Minn, and C.-C. Chong, “Interference-controlledtransmission schemes for cognitive radio in frequency-selective time-varying fading channels,” IEEE Trans. Wireless Commun., vol. 11, no. 1,pp. 142–153, Jan. 2012.

[6] W. Yu, A. Sutivong, D. Julian, T. M. Cover, and M. Chiang, “Writing oncolored paper,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Washington,DC, USA, Jun. 2001, p. 302.

[7] A. Khisti, U. Erez, and G. Wornell, “Writing on many pieces of dirtypaper at once: The binary case,” in Proc. IEEE Int. Symp. Inf. Theory(ISIT), Chicago, IL, USA, Jun./Jul. 2004, p. 535.

[8] N. Devroye, P. Mitran, and V. Tarokh, “Achievable rates in cognitiveradio channels,” IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 1813–1827,May 2006.

[9] A. Jovicic and P. Viswanath, “Cognitive radio: An information-theoreticperspective,” IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 3945–3958,Sep. 2009.

[10] M. H. M. Costa, “Writing on dirty paper,” IEEE Trans. Inf. Theory,vol. 29, no. 3, pp. 439–441, May 1983.

[11] F. Verde, A. Scaglione, D. Darsena, and G. Gelli, “An amplify-and-forward scheme for spectrum sharing in cognitive radio channels,” IEEETrans. Wireless Commun., vol. 14, no. 10, pp. 5629–5642, Oct. 2015.

[12] D. Darsena, G. Gelli, and F. Verde, “Convolutive superposition formulticarrier cognitive radio systems,” IEEE J. Sel. Areas Commun.,vol. 34, no. 11, pp. 2951–2967, Nov. 2016.

[13] N. Mastronarde, F. Verde, D. Darsena, A. Scaglione, andM. van der Schaar, “Transmitting important bits and sailing highradio waves: A decentralized cross-layer approach to cooperativevideo transmission,” IEEE J. Sel. Areas Commun., vol. 30, no. 9,pp. 1597–1604, Oct. 2012.

[14] T. M. Cover and J. A. Thomas, Elements of Information Theory.New York, NY, USA: Wiley, 1991.

[15] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.Cambridge, U.K.: Cambridge Univ. Press, 2005.

[16] A. Goldsmith, Wireless Communications. Cambridge, U.K.: CambridgeUniv. Press, 2005.

[17] Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative spectrumsharing via controlled amplify-and-forward relaying,” in Proc. IEEE Int.Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Cannes, France,Sep. 2008, pp. 1–5.

Page 11: 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 ...sprint.dieti.unina.it/images/Riviste/sensors_2017.pdf · 2596 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017 An

2606 IEEE SENSORS JOURNAL, VOL. 17, NO. 8, APRIL 15, 2017

[18] Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Trans. WirelessCommun., vol. 8, no. 10, pp. 4945–4950, Oct. 2009.

[19] E.-H. Shin and D. Kim, “Time and power allocation for collabora-tive primary-secondary transmission using superposition coding,” IEEECommun. Lett., vol. 15, no. 2, pp. 196–198, Feb. 2011.

[20] C. R. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. J. Shellhammer,and W. Caldwell, “IEEE 802.22: The first cognitive radio wirelessregional area network standard,” IEEE Commun. Mag., vol. 47, no. 1,pp. 130–138, Jan. 2009.

[21] M. Morelli, C. C. J. Kuo, and M. O. Pun, “Synchronization techniquesfor orthogonal frequency division multiple access (OFDMA): A tutorialreview,” Proc. IEEE, vol. 95, no. 7, pp. 1394–1427, Jul. 2007.

[22] M. Morelli and U. Mengali, “A comparison of pilot-aided channelestimation methods for OFDM systems,” IEEE Trans. Signal Process.,vol. 49, no. 12, pp. 3065–3073, Dec. 2001.

[23] R. G. Gallager, Information Theory and Reliable Communication.New York, NY, USA: Wiley, 1968.

[24] R. M. Gray, “Toeplitz and circulant matrices: A review,” Found. TrendsCommun. Inf. Theory, vol. 2, no. 3, pp. 155–239, 2006.

[25] P. S. Chow, J. M. Cioffi, and J. A. C. Bingham, “A practical discrete mul-titone transceiver loading algorithm for data transmission over spectrallyshaped channels,” IEEE Trans. Commun., vol. 43, no. 234, pp. 773–775,Feb./Mar./Apr. 1995.

[26] A. Papoulis, Probability, Random Variables and Stochastic Processes,3rd ed. Singapore: McGraw-Hill, 1991.

[27] L. H. Ozarow, S. Shamai (Shitz), and A. D. Wyner, “Informationtheoretic considerations for cellular mobile radio,” IEEE Trans. Veh.Technol., vol. 43, no. 2, pp. 359–378, May 1994.

[28] M. Shaat and F. Bader, “Computationally efficient power allocationalgorithm in multicarrier-based cognitive radio networks: OFDM andFBMC systems,” EURASIP J. Adv. Signal Process., vol. 2010, no. 1,Jan. 2010, Art. no. 528378.

[29] S. D’Oro, P. Mertikopoulos, A. L. Moustakas, and S. Palazzo,“Interference-based pricing for opportunistic multicarrier cognitiveradio systems,” IEEE Trans. Wireless Commun., vol. 14, no. 12,pp. 6536–6549, Dec. 2015.

[30] J.-S. Pang, G. Scutari, D. P. Palomar, and F. Facchinei, “Designof cognitive radio systems under temperature-interference constraints:A variational inequality approach,” IEEE Trans. Signal Process., vol. 58,no. 6, pp. 3251–3271, Jun. 2010.

Donatella Darsena (M’06–SM’16) received thePh.D. (summa cum laude) degree in telecommuni-cations engineering and the Ph.D. degree in elec-tronic and telecommunications engineering from theUniversity of Napoli Federico II, Italy, in 2001 and2005, respectively. From 2001 to 2002, she wasan Engineer with the Telecommunications, Periph-erals and Automotive Group, STMicroelectronics,Milano, Italy. Since 2005, she has been an Assis-tant Professor with the Department of Engineering,Parthenope University of Naples, Italy. She has held

teaching positions at the University of Napoli Federico II. Her researchactivities lie in the area of statistical signal processing, digital communications,and communication systems. In particular, her current interests are focused onequalization, channel identification, narrowband-interference suppression formulticarrier systems, space-time processing for co-operative communicationssystems and cognitive communications systems, and software-defined net-works. She has served as an Associate Editor of the IEEE COMMUNICATIONS

LETTERS since 2017. Since 2016, she has been on the Editorial Board ofWireless Communications and Mobile Computing (WILEYHINDAWI), andsince 2015, she has been on the Editorial Board of the Journal of DistributedSensor Networks (SAGE).

Giacinto Gelli was born in Napoli, Italy, in 1964.He received the Ph.D. (summa cum laude) degreein electronic engineering and the Ph.D. degree incomputer science and electronic engineering fromthe University of Napoli Federico II, in 1990 and1994, respectively. From 1994 to 1998, he was anAssistant Professor with the Department of Infor-mation Engineering, Second University of Napoli.Since 1998, he has been with the Department ofElectrical Engineering and Information Technology,University of Napoli Federico II, as an Associate

Professor, and since 2006, has been a Full Professor of Telecommunications.He also held teaching positions at the University Parthenope of Napoli. Hisresearch interests are in the broad area of signal and array processing forcommunications, with current emphasis on multicarrier modulation systemsand space-time techniques for co-operative and cognitive communicationssystems.

Francesco Verde (M’10–SM’14) was born in SantaMaria Capua Vetere, Italy, in 1974. He received thePh.D. (summa cum laude) degree in electronic engi-neering from the Second University of Napoli, Italy,in 1998, and the Ph.D. degree in information engi-neering from the University of Napoli Federico II,in 2002. Since 2002, he has been with the Universityof Napoli Federico II. He served as an AssistantProfessor of Signal Theory and Mobile Commu-nications and has been an Associate Professor ofTelecommunications with the Department of Elec-

trical Engineering and Information Technology since 2011. His researchactivities include cyclostationarity-based techniques for blind identification,equalization and interference suppression for narrowband modulation sys-tems, code-division multiple-access systems, multicarrier modulation systems,space-time processing for co-operative and cognitive communications systems,and software-defined networks. He has served as an Associate Editor of theIEEE SIGNAL PROCESSING LETTERS since 2014. He was an Associate Editorof the IEEE TRANSACTIONS ON SIGNAL PROCESSING from 2010 to 2014and a Guest Editor of the EURASIP Journal on Advances in Signal Processingin 2010.