Convex Sensing-Reporting Optimization for Cooperative Spectrum Sensing by Adam Noel B.Eng, Memorial University of Newfoundland, 2009 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Applied Science in THE FACULTY OF GRADUATE STUDIES (Electrical and Computer Engineering) The University Of British Columbia (Vancouver) August 2011 c Adam Noel, 2011 Abstract In this thesis, we consider the cooperative spectrum sensing problem in cognitive radio with energy detection. Secondary users with non-identical, independent sensing channels make 1-bit sensing decisions and report their decisions to the secondary base station over orthogonal noisy fading channels. The base station has knowledge of the reporting channel coefficients and acts as a fusion center by combining the decisions with an M-out-of-K rule. We allow the secondary users to trade sensing time slots for additional reporting time slots to increase the signalto-noise ratios of the reporting channels. We derive the corresponding false alarm and missed detection probabilities, which are functions of the secondary sensor decision thresholds and the durations for sensing and reporting. Furthermore, we bound these probabilities and impose a practical convex region to enable the application of convex optimization for minimization of the false alarm probability for a target missed detection probability. We consider the two cases where the instantaneous and the average reporting channels are known for optimization. Allowing secondary users to trade sensing time slots for additional reporting time slots is shown to significantly improve sensing performance in both cases, even with poor sensing channels and a small number of secondary users. ii Preface Some of the content in this thesis has previously been accepted for publication. Specifically, • A. Noel and R. Schober, “Convex sensing-reporting optimization for coop- erative spectrum sensing,” Proceedings of IEEE PIMRC, September 2011. Content contained in this publication includes portions of all Chapters, except for most of Section 1.1, Section 3.3, most of Section 5.1, and the portions of Chapters 4 and 5 that discuss fusion rules other than OR-rule. I am the primary author for the publication above and have performed the majority of the work. My tasks included but were not limited to literature review, analytical derivations, simulation coding and execution, and writing of the manuscripts. My supervisor, listed as the second author above, provided invaluable help and guidance in a secondary role. The IEEE holds the copyright for the publication above. However, I retain the right to extract material verbatim from the work for the publication of my thesis. iii Table of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Cognitive Radio . . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 Spectrum Sensing . . . . . . . . . . . . . . . . . . . . . 2 1.1.3 Decision Fusion . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Scope and Contributions . . . . . . . . . . . . . . . . . . . . . . 6 1.4 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.1 Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2 Sensing Channels . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3 Reporting Channels . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.4 Sensing Performance Metrics . . . . . . . . . . . . . . . . . . . . 11 2 iv 3 Single-Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.1 FC Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.1.1 Local Sensing . . . . . . . . . . . . . . . . . . . . . . . . 13 3.1.2 Sensor Reporting . . . . . . . . . . . . . . . . . . . . . . 14 3.2 . . . . . . . . . . 15 3.2.1 Upper Bounds on Performance . . . . . . . . . . . . . . . 15 3.2.2 Convexity of Upper Bounds . . . . . . . . . . . . . . . . 17 3.3 Performance Averaged Over Reporting Channels . . . . . . . . . 18 3.4 Single-Sensor Optimization Problem . . . . . . . . . . . . . . . . 19 Multi-Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4.1 Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.1 Exact Expressions for Decision Fusion . . . . . . . . . . 22 4.1.2 Exact Expressions and Bounds for Decision Fusion . . . . 23 4.1.3 Bounds Applied to OR-Rule . . . . . . . . . . . . . . . . 24 4.1.4 Generalized Convex Multiplicative Programming . . . . . 24 Suboptimal Convex Problem for OR-Rule . . . . . . . . . . . . . Suboptimal Convex Problem for Generalized Counting Rule . . . 25 27 Numerical Results and Discussion . . . . . . . . . . . . . . . . . . . 28 5.1 Single-Sensor Results . . . . . . . . . . . . . . . . . . . . . . . . 29 5.2 Multi-Sensor Results and Discussion . . . . . . . . . . . . . . . . 32 5.2.1 Comparison of Fusion Rules . . . . . . . . . . . . . . . . 32 5.2.2 Sensitivity to Channel Quality with OR-Rule . . . . . . . 34 5.2.3 Sensitivity to Channel Quality with Other Rules . . . . . . 36 Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . 39 6.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 6.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 A Proof of Theorem 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 4 4.2 4.3 5 6 Closed-Form, Convex Bounds on Performance v B Proof of Convexity of Bound on (3.16) . . . . . . . . . . . . . . . . . 49 C Proof of Convexity of Bound on (3.15) . . . . . . . . . . . . . . . . . 52 D Proof of Theorem 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 E Proof of Theorem 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 vi List of Figures Figure 2.1 Secondary network near a primary transmitter. . . . . . . . . 9 Figure 2.2 Division of sensing and reporting time slots for the kth sensor. 10 Figure 5.1 ROC for γR,k = −6dB with 1 sensor and three different values Figure 5.2 of N. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 ROC for γ R,k = −6dB with 1 sensor and N = 5000. . . . . . . 31 Figure 5.3 Secondary network ROC with 4 sensors and N = 5000 . . . . Figure 5.4 Effect of sensing channels on Pf FC with 4 sensors using ORrule and PmFCTAR = 0.005. Figure 5.5 . . . . . . . . . . . . . . . . . . . Figure 5.7 34 Effect of reporting channels on Pf FC with 4 sensors and N = 5000, using OR-rule, and PmFCTAR = 0.005. . . . . . . . . . . Figure 5.6 33 35 Effect of sensing channels on Pf FC with 4 sensors using M = 2 and PmFCTAR = 0.005. . . . . . . . . . . . . . . . . . . . . . . 37 Effect of reporting channels on Pf FC with 4 sensors and N = 5000, using M = 2, and PmFCTAR = 0.005. . . . . . . . . . . . 38 vii Glossary The following are abbreviations and acronyms used in this thesis, listed in alphabetical order. AWGN Additive White Gaussian Noise BPSK Binary Phase-Shift Keying FC Fusion Center IEEE The Institute of Electrical and Electronics Engineers PU Primary User ROC Receiver Operating Characteristic SNR Signal-to-Noise Ratio SU Secondary User viii Acknowledgments My sincerest thanks go to my supervisor, Prof. Robert Schober, whose continued patience and advice made this thesis possible. Funding for this thesis was provided by the Natural Sciences and Engineering Research Council of Canada, as well as the University of British Columbia. I owe many thanks for the support and encouragement of my family. My parents Josiah and Pauline have been the pillars of my life, even as I have pursued my education “on the Mainland.” My wife Joanne has been particularly supportive, even though she will claim (and I will agree) that our wedding was the most important accomplishment this year. ix Chapter 1 Introduction 1.1 Background 1.1.1 Cognitive Radio The introduction of cognitive radio in [1] set the foundation for what has become a very active research area for wireless communications in the last decade. Cognitive radio envisions the deployment of wireless devices that are sufficiently intelligent to operate autonomously and adaptively. In [2], two primary objectives for cognitive radio were identified: reliable communication and efficient use of wireless spectrum. The latter objective is often regarded as requiring modifications to the traditional wireless spectrum licensing model to enable implementation. The traditional licensing model is an approach where specific companies or applications are given exclusive rights to a particular frequency band. In practice, many licensed bands are actually unoccupied in either time or space or both. However, it is unreasonable to expect license holders to sacrifice their exclusivity to a band to permit gains in wireless efficiency. If unlicensed wireless users could access spectrum when it is unoccupied by licensed users, i.e., by taking advantage of spectral holes, then a significant increase in wireless spectral efficiency could result while protecting the interests of those who hold licenses. Unlicensed access would require not only major technological advances, but also regulatory approval to condone its use. Regulatory bodies are interested in 1 modifying the traditional spectrum access model [3], thereby motivating research to guide these changes. One standard has already been written to implement aspects of cognitive radio technology in real environments. The Institute of Electrical and Electronics Engineers (IEEE) Standard 802.22 was recently published with the aim of enabling wireless internet access for sparsely populated rural areas using frequency bands licensed to television broadcasters [4]. Publication of the standard means that companies can now build and sell devices that meet the specifications of the standard. In a cognitive radio context, licensed users (such as television transmitters or cellphones) are called Primary Users (PUs) while unlicensed users are called Secondary Users (SUs) [5]. This naming convention is more general because some applications with rights to a particular frequency band may not hold an actual license, e.g., wireless microphones are also considered incumbents for IEEE Standard 802.22 [4]. Referring to unlicensed users as secondary emphasizes that their access to spectrum is contingent on the existent of a spectral hole. 1.1.2 Spectrum Sensing The monitoring of frequency bands in order to identify the presence of an active transmitter is known as spectrum sensing, and is one of the fundamental problems in cognitive radio [5]. It is particularly critical for scenarios where primary and secondary networks do not communicate directly, and is listed as one of the cognitive radio capabilities required for IEEE Standard 802.22 devices [4]. The correct identification of spectral holes is then dependent on the reliability of the secondary network’s spectrum sensing. There are three main categories of spectrum sensing [6]: 1. Coherent detection with a matched filter can be deployed when the channel realization between the PU and the SU is known. This is not necessarily a realistic assumption because direct communication is normally required in order to learn the instantaneous channel. 2. Cyclostationary feature detectors can identify PUs by analyzing the spectral correlation of the frequency band. Modulated signal energy can be differentiated from uncorrelated noise because of the cyclostationarity embedded in 2 the transmitted signal. While accurate, these detectors are computationally complex. 3. Energy detection measures the energy of the received signal at the sensor and makes a decision based on a sensing threshold. This method is preferred when the information known about the PU is limited; the power of the PU signal is sufficient, though this information must be accurate in order for energy detection to be reliable. Nevertheless, energy detection is the most popular method for spectrum sensing due to its low complexity [6–10], and we adopt it for the analysis in this thesis. Cooperative spectrum sensing, where multiple SUs share sensing data to improve performance in detecting the status of a PU, was first applied to cognitive radio in [5] and has seen significant research interest in the past few years. A recent survey that summarizes the many challenges in applying cooperative spectrum sensing to cognitive radio is found in [6]. SUs act as local sensors that independently assess whether the PU is active or idle. Most literature in this area considers the presence of a secondary base station that receives sensing results reported from the SUs, cf. e.g. [7–16]. The base station then acts as a Fusion Center (FC) by fusing the individual reporting results to obtain a global decision. Detecting the PU as idle indicates the ability to use the PU’s frequency band for secondary data transmission, thereby increasing wireless efficiency. The feasibility of SU operation depends on the false alarm and missed detection probabilities of cooperative spectrum sensing. False alarm occurs when the secondary network declares that the PU is active and it is actually idle. When there is a false alarm, the secondary network is not taking advantage of a legitimate opportunity to transmit. Missed detection occurs when the secondary network declares that the PU is idle and it is actually active. When there is missed detection, the secondary network may attempt transmission and thereby generate undesired interference to the PU. Furthermore, its own transmission may be unsuccessful due to the PU’s activity. There is typically a tradeoff between these two probabilities, and while the PU would prefer a low missed detection probability, the secondary network would prefer a low false alarm probability. 3 1.1.3 Decision Fusion As noted, the FC is used to combine information received by the sensors to obtain a global decision. There are two main categories of fusion, depending on what is transmitted by the sensors. If the sensors transmit their raw sensing data or statistics, i.e., the power of the received signal, then the FC can deploy soft combining. If the sensors make a local decision based on their sensing thresholds and transmit their decisions to the FC, then the FC deploys hard combining or decision fusion [6]. Decision fusion is advantageous in a cognitive radio context where we cannot assume that sensors have large reporting bandwidth available; every sensor must report no more than 1 bit of information, so a narrow dedicated channel is sufficient for the secondary network’s reporting requirements. Soft combining, however, requires much more bandwidth to sufficiently quantize the sensing results. Decision fusion can be optimally implemented by the Chair-Varshney rule, which requires previous knowledge of the false alarm and missed detection probabilities associated with each sensor [17]. Simpler methods include counting rules, such that sensors effectively vote with their sensing decisions and the FC uses a vote threshold to make a global decision. The most common counting rules are the OR-rule, where one sensor detecting the PU as active is sufficient for the FC to declare the same, and the AND-rule, where all sensors must declare that the PU is active [17]. 1.2 Related Work The derivation of false alarm and missed detection probabilities where the SUs use an L p -norm detector and perfect reporting has been recently performed in [18], for which the energy detector is a special case (i.e., p = 1). The missed detection probability was averaged over the Rayleigh-faded sensing channels, since it was assumed that the instantaneous sensing channels were unknown to the SUs. Furthermore, in [7], these probabilities have been derived using energy detectors where band-limited reporting channels are impaired by noise and fading. In practice, it is of interest to optimize performance by minimizing the false alarm probability given a target missed detection probability (or vice versa). Op4 timization has previously been performed for cooperative spectrum sensing with perfect reporting, cf. e.g. [8, 9, 11–13]. In [8], network throughput is maximized by optimizing the division of time slots between sensing the PU and performing secondary data transmission. Both soft and hard combining are considered. In [9], the number of SUs and the SU sensing thresholds are optimized to minimize the total error probability (false alarm plus missed detection), under the assumption that all SUs have identical sensing channels. The analysis determines the optimal counting rule, the optimal local sensing threshold, and the optimal number of users to select for sensing when the number of sensors becomes large. In [11], throughput is maximized by optimizing the SU sensing thresholds and decision fusion weights. Convexity of the sensing error probabilities is shown with respect to the SU thresholds but the results are for a sensing channel that is known at the base station. In both [12] and [13], one error probability is minimized with respect to a target for the other. In [12], the decision threshold is optimized for a model where the FC knows the distances between the PU and the SUs. Small-scale fading is ignored, so the analysis is relatively simplified. The FC applies AND-rule and OR-rule. In [13], the number of local sensing operations is optimized, given that each operation has known false alarm and missed detection probabilities. The FC uses OR-rule, and multiple antennas at the SUs enable simultaneous sensing and reporting. The optimization of spectrum sensing with imperfect reporting channels has usually been performed with the assumption that the reporting channel has unlimited bandwidth, cf. e.g. [14–16]. Furthermore, optimization with limited reporting bandwidth has focussed primarily on OR-rule and AND-rule (cf. e.g. [8, 12, 13]), whereas optimization generalized to M-out-of-K rules has assumed that all sensors have identical sensing performance, as in [9]. A realistic physical environment is inhomogeneous, so we can expect that the strength of the sensing and reporting channels vary among the SUs. For example, the relative location of the SUs to both the PU and base station, and the placement of obstacles, can contribute to channel strength. Thus, it is of interest to optimize scenarios where SUs report over fading channels, and where the inhomogeneity of the physical environment results in some SUs having stronger reporting channels than others. 5 1.3 Scope and Contributions This thesis considers SUs that sense a single PU using energy detection. The Rayleigh fading sensing channels are modelled as independent and non-identical. We also assume that we have limited reporting bandwidth. Thus, after sensing, each SU makes a local decision (“active” or “idle”) about the PU that is reported to the base station over a Rayleigh fading channel. All reporting channels are also modelled as independent and non-identical. The base station acts as a FC by inferring the decision of each SU before combining the decisions with an M-out-of-K rule to reach a global decision. M-out-of-K rules facilitate closed-form expressions for the network false alarm and missed detection probabilities. The contributions of this thesis are as follows: 1. In constrast to existing work, we allow the SUs to increase the number of reporting time slots by sacrificing sensing time slots. This is motivated by [10], which showed notable performance gain by perfectly reporting 2 bits instead of 1. However, in contrast to [10], our design repeats the binary decisions of the SUs to increase the Signal-to-Noise Ratios (SNRs) of the faded and noisy reporting channels. 2. We derive expressions for the false alarm and missed detection probabilities of the network, as functions of the SU decision thresholds and the number of reporting time slots for each SU. Our analysis assumes that each SU senses long enough such that its energy detection decision variables can be modelled as Gaussian distributed via the central limit theorem. We derive these probabilities for instantaneous reporting channel realizations as well as for average reporting channels. We begin with the single-SU network case as a foundation to extend to the general, multi-SU network case. 3. We apply upper bounds and impose convex constraints that make the false alarm and missed detection probabilities jointly convex with respect to the SU decision thresholds and the number of reporting time slots for each SU. This enables the application of convex optimization techniques to quickly and efficiently minimize the secondary network’s false alarm probability under a target missed detection probability (or vice versa). We consider the 6 two cases where the instantaneous and average reporting channel gains are known for optimization to investigate the tradeoffs of optimizing less frequently. 4. Simulation results show that our proposed upper bounds are reasonably tight while enabling very good performance with only a small number of sensors. We also show that the secondary network sensing performance benefits substantially from the ability to optimize the number of reporting time slots over optimization of the local decision thresholds alone. 1.4 Organization The rest of this thesis is organized as follows. In Chapter 2, we introduce the cognitive radio network model with the notation used for the rest of the work. In Chapter 3, we derive the sensing error probabilities of the single-SU network and formulate convex upper bounds. In Chapter 4, we extend the work in Chapter 3 to the general, multi-SU network. In Chapter 5, we present and discuss detailed simulation results for a secondary network in both the single-SU and multi-SU cases. In Chapter 6, we present conclusions and possibilities for future work. 7 Chapter 2 Network Model This chapter introduces the network model studied and the notation used throughout the rest of this thesis. In Section 2.1, we describe the topology of the primary and secondary networks. We present our assumptions regarding the operation of the two networks, and we briefly motivate the need for spectrum sensing in this environment. In Sections 2.2 and 2.3, we describe the secondary network’s sensing and reporting channels, respectively. We also define how much the secondary network knows about these channels. In Section 2.4, we formally define the secondary network’s probabilities of false alarm and missed detection, which are the core performance metrics for our spectrum sensing analysis. We include notation for referring to specific subsets of SUs in the network. 2.1 Network Topology There is a single transmitting PU, as in Fig. 2.1. The PU could be serving, for example, as the broadcast tower for a licensed network. The PU transmits with average transmission power Pt over the frequency band monitored by the secondary network. For convenience of the analysis, we do not consider the broadcasting carrier frequency by representing all signals with their complex baseband equivalents. The secondary network has K SUs in addition to its own base station. The 8 Figure 2.1: Secondary network near a primary transmitter. network intends to utilize the PU’s frequency band only when it believes that the PU is idle. Thus, we do not need to consider the PU’s intended receivers in our analysis. We assume that the secondary network is not in direct communication with the PU, so the secondary network must perform spectrum sensing to assess the current activity of the PU. The spectrum sensing is cooperative in the sense that the SUs make local sensing decisions that are reported to the base station, which fuses the results to obtain a global sensing decision. Thus, we hereafter refer refer to the SUs as (local) sensors and the base station as the Fusion Center (FC). 2.2 Sensing Channels The channel between the PU and the kth sensor, hk , is Rayleigh fading with vari2 , k ∈ {1, 2, . . . , K}. The PU-SU channels are modelled as independent and ance σh,k non-identically distributed. The signal received by the kth sensor is impaired by 2 . Thus, the complex Additive White Gaussian Noise (AWGN) with variance σn,k 2 /σ 2 , and we let γ = [γ , γ , . . . , γ kth sensor’s sensing SNR is γ S,k = Pt σh,k S S,1 S,2 S,K ]. n,k Each sensor has a fixed interval of N time slots during which it has to perform 9 Figure 2.2: Division of sensing and reporting time slots for the kth sensor. sensing and reporting with a single antenna, as in Fig. 2.2. The time slots are assumed to all be of the same length, whether for sensing or reporting. The sensing channel is assumed to have a coherence time sufficiently long for hk to be assumed constant for the entire interval. We also assume that the PU is either active or idle for the entire interval, i.e., it does not cease or resume transmission within the interval. This is not a particularly strong assumption; [19] shows only a minor improvement for energy detectors that take into account PUs that arrive or depart randomly. Furthermore, we assume that each sensor has an accurate estimate of 2 , but does not know the instantaneous fading gain h . Therefore, the sensors Pt σh,k k use energy detection by sensing for NS,k time slots and applying decision threshold τk to decide whether the PU is active or idle. 2.3 Reporting Channels The remaining NR,k = N − NS,k time slots are used by the local sensor to report its binary decision to the Fusion Center (FC). Each sensor transmits +1 if the PU is deemed active, and −1 otherwise. The reporting channel between the kth 2 . The channels between sensor and the FC, gk , is Rayleigh fading with variance σg,k the SUs and the FC are modelled as orthogonal, independent, and non-identically distributed. The instantaneous reporting channel gains and variances are assumed to be known at the fusion center. 2 . The repeated reports are impaired by complex AWGN with variances σz,k 2 , and we Thus, the kth sensor’s instantaneous reporting SNR is γR,k = |gk |2 /σz,k let γR = [γR,1 , γR,2 , . . . , γR,K ]. The kth sensor’s average reporting SNR is γ R,k = 10 2 /σ 2 , and we let γ = [γ σg,k R R,1 , γ R,2 , . . . , γ R,K ]. We assume that γR is constant for z,k the interval of N time slots, while γ S and γ R are constant for multiple intervals. 2.4 Sensing Performance Metrics Our goal is to detect when the PU is idle, so we are interested in characterizing the false alarm and missed detection probabilities. Let H define the current state of the PU, where H = 1 means that the PU is active and H = 0 means that it is idle. The ˆ defined analogously to H. The network false alarm FC makes global decision H, probability Pf FC and missed detection probability PmFC are defined as Pf FC = Pr{Hˆ = 1 | H = 0}, PmFC = Pr{Hˆ = 0 | H = 1}. (2.1) (2.2) If the FC is basing its decision on only the inferred decision from the kth sensor, using the instantaneous reporting channel realization of that sensor, then we define these single-sensor probabilities as PmFC,k and Pf FC,k . For fusion rule analysis, we must be able to refer to subsets of the sensors in the network. Let SK,i be the union of all sets that combine i out of a total of K sensors, i.e., SK,i contains K i sets of i sensors. Furthermore, let SK,i, j be the jth set in SK,i . The ordering of these sets is arbitrary but constant. 11 Chapter 3 Single-Sensor Network In this chapter, we derive and analyze PmFC,k and Pf FC,k at the fusion center for a given reporting channel. We present a set of constraints that enable upper bounds on PmFC,k and Pf FC,k to be convex with respect to the sensor’s local decision threshold and the number of reporting time slots. PmFC,k and Pf FC,k are also averaged over the Rayleigh-faded reporting channel (then written as PmFC,k and P f FC,k , respectively), for which the same constraints ensure convexity. The bounds enable us to optimize PmFC,k and Pf FC,k , and in Chapter 4 they facilitate the relaxation of the general K-sensor problem to a convex optimization problem. Detailed proofs of some of the results in this chapter are omitted for narrative clarity and are deferred to the appendices. In Section 3.1, we derive the analytical forms of PmFC,k and Pf FC,k , assuming that the sensor’s sensing decision variables can be modelled as Gaussian distributed. We also assume that the FC uses a coherent detector for receiving the sensor’s reporting signal. The sensor is able to sacrifice sensing time slots for more reporting time slots in order to increase the reporting SNR. In Section 3.2, we derive closed-form upper bounds on PmFC,k and Pf FC,k . These bounds are shown to be jointly convex with respect to the local sensor decision threshold and the number of reporting time slots with the imposition of a set of convex constraints. In Section 3.3, we derive PmFC,k and P f FC,k by averaging PmFC,k and Pf FC,k over the Rayleigh-faded reporting channel, respectively, while still assuming coherent 12 detection at the FC. The intent is to save on computation and communication time by optimizing less often, i.e., only when the variance of the reporting channel changes. The constraints imposed in Section 3.2 still apply here for convexity. In Section 3.4, we formulate the single-sensor optimization problem where we minimize the false alarm probability while satisying a target for the missed detection probability. 3.1 FC Performance 3.1.1 Local Sensing For our analysis, as in [18], we assume that NS,k is large enough such that the energy detection decision variables at the local sensor can be modelled as Gaussian distributed via the central limit theorem. We favor the Gaussian approximation approach to facilitate tractability, unlike the analysis in [7], which relies on the moment generating functions of the received signals. Thus, if the PU is idle, then 2 /N , and we obtain the the variance of the signal received at the sensor is σn,k S,k probability of false alarm at the local sensor, Pf L,k , as [18, Eq. 16] 2 − 1) N − NR,k , Pf L,k = Q (τk /σn,k (3.1) 2 , then where Q(·) is the Gaussian Q-function. We immediately see that if τk < σn,k the argument of Q(·) would be negative and Pf L,k > 0.5. Furthermore, an active PU would only add to the energy of the signal received at the local sensor. Thus, 2 , and the corresponding expression for we will subsequently assume that τk ≥ σn,k the probability of missed detection at the local sensor, PmL,k , averaged over the Rayleigh-faded sensing channel, is [18, Eq. 26] 2 PmL,k = 1 − exp −ξ /(Pt σh,k ) + I, 13 (3.2) where π 2 1 −ξ I =√ exp 2 2 Pt σh,k 2π Pt σh,k S = 1+erf √ 0 sin θ exp sin2 θ 2 4 2Pt σh,k Sd θ , ξ sin θ sin θ −2 erf √ −√ 2 2 2Pt σh,k 2 sin θ 2Pt σh,k , (3.3) (3.4) 2 ξ = (τk /σn,k − 1) NS,k , (3.5) Pt = Pt (3.6) 2 , NS,k /σn,k and erf(·) is the error function [20, p. 406]. Eqs. (3.1) and (3.2) (ignoring I in the latter) show that increasing τk causes an increase in PmL,k and a decrease in Pf L,k , and vice versa. 3.1.2 Sensor Reporting We next derive an expression for PmFC,k . The sensor makes 1-bit decision Hˆ L,k and transmits it to the FC with a repetition code as bk [n] = bk = +1 if Hˆ L,k = 1, −1 if Hˆ L,k = 0, NS,k + 1 ≤ n ≤ N, NS,k + 1 ≤ n ≤ N. (3.7) We note that, for a single reporting interval, if Hˆ L,k = 1, then bk = −1 with probability PmL,k and bk = +1 with probability (1 − PmL,k ). The FC receives yk [n] = gk bk [n] + zk [n], NS,k + 1 ≤ n ≤ N, (3.8) where zk [n] is complex AWGN. The fusion center forms yk = N 1 yk [n] = gk bk + zk , ∑ NR,k n=NS,k +1 (3.9) 2 /N . Thus, we see how increaswhere zk is complex AWGN with variance σz,k R,k ing the number of reporting time slots corresponds to an increase in the effective reporting SNR. We construct a coherent detector where we multiply yk by g∗k /|gk | and take the real component ((·)∗ denotes complex conjugation). Thus, we obtain 14 PmFC,k as PmFC,k = Pr {|gk |bk + ℜ {g∗k zk /|gk |} < 0 | H = 1} = Pr {ℜ {g∗k zk /|gk |} < |gk |} (1−PmL,k ) + Pr {ℜ {g∗k zk /|gk |} < −|gk |} PmL,k 2 2 = Q |gk | 2NR,k /σz,k (1 − PmL,k ) + Q −|gk | 2NR,k /σz,k PmL,k , (3.10) where ℜ{·} denotes the real component of a complex number. From the first line of (3.10), we see that the FC uses 0 as a decision threshold. Given that one of our two design parameters is the local sensor decision threshold τk , one may validly question whether the network could benefit by making the FC threshold variable. In fact, this threshold was initially incorporated as a variable in our analysis. However, it was found to complicate the convexity conditions while providing negligible performance improvement. Thus, we set it to 0. Analogously, Pf FC,k is obtained as 2 2 Pf FC,k = Q −|gk | 2NR,k /σz,k Pf L,k + Q |gk | 2NR,k /σz,k (1 − Pf L,k ). (3.11) 3.2 Closed-Form, Convex Bounds on Performance 3.2.1 Upper Bounds on Performance Unfortunately, we cannot obtain (3.10) in closed form due to the integral in (3.3). We will, however, require a closed-form expression in order to define tractable optimization problems. Therefore, we derive a closed-form upper bound on (3.3) that leads to a closed-form upper bound on (3.10). Theorem 1 (Upper bound on (3.3)): Eq. (3.3) can be upper-bounded in closed 15 form by Ibound = Ak xk Bk − Ak + NSmax − (N − NR,k ) +Ck 2 exp (−Ak xk ) + exp −NSmin x2k √ 3/2 2π NSmax Dk exp (−Ak xk ) (N − NR,k ) 2 σn,k −Ak xk − NSmin x2k Ak , +√ exp 2 2π NSmin xk −Ak+ NSmin (3.12) where 2 xk = τk /σn,k − 1, (3.13) positive constants Ak , Bk ,Ck , and Dk are given by Ak = 2 σn,k 2 Pt σh,k Bk = exp Ck = , 1 A2 erf 2NSmax k 1 erfi 25 1 Ak , 2NSmax 1 1 A2 , Ak exp − 2NSmax k 2NSmin NSmax Pt σh,k π 1 −1 Dk = √ Ak 2 + 2 2 2 σn + NSmax Pt σh,k 2π 2 , (3.14) and erfi(·) is the imaginary error function [20, p. 427]. NSmin and NSmax are bounds on NS,k that are introduced to simplify convexity analysis with minimal impact on the value of Ibound . Proof: Refer to Appendix A. The proof converts the error functions in (3.3) into equivalent Q-functions, and then applies the “supertight bound” on the Q-function given in [21] in addition to two Taylor series approximations. If the argument of Q(·) is negative, then 0.5 < Q(·) < 1. We also aim to achieve low PmL,k (i.e., PmL,k 1). Therefore, we upper-bound (3.10) by 2 + Ak xk + Ibound , PmFC,k ≤ Q |gk | 2NR,k /σz,k 16 (3.15) where we used a first degree Taylor series approximation of the non-integral com2 ) , at τ = σ 2 , as otherwise P ponents of PmL,k , i.e., 1 − exp −ξ /(Pt σh,k mL,k (igk n,k noring the I term) is concave with respect to τk . Eq. (3.11) is already in closed form. However, to define tractable optimization problems, we upper-bound it by 2 Pf FC,k ≤ Q |gk | 2NR,k /σz,k + Q xk N − NR,k , (3.16) where we used again that 0.5 < Q(·) < 1 when the argument of Q(·) is negative, and Pf L,k 1. 3.2.2 Convexity of Upper Bounds We relax NR,k to be a real number for optimzation (though in simulations and in practice we round it to the nearest natural number), and present the following theorem: Theorem 2 (Convexity of (3.15) and (3.16)): Eqs. (3.15) and (3.16) can be shown to be jointly convex with respect to τk and NR,k , if we impose the following convex constraints: 2 − τk ≤ 0, σn,k 1 ≤ NR,k ≤ NRmax , √ x−2 k − (1 + 2)NSmin ≤ 0, A2k exp (2Ak xk ) + A2k (N − NR,k )3 exp (E) − NS3max (3.17) (3.18) (3.19) 2 σn,k − Ak xk < 0, N − NR,k (3.20) 2Ak xk − E ≤ 0, (3.21) − D2k ≤ 0, (3.22) 3/2 2Ak Dk NSmin 3/2 NSmax where NRmax = N − NSmin , xk is as in (3.13), and E is a tunable parameter, defined in (3.21), that limits the maximum value of τk . Proof: We prove the convexity of (3.16) and (3.15) in Appendices B and C, respectively, by showing that the Hessians of (3.15) and (3.16) are non-negative once 17 (3.17) to (3.22) are imposed [22, 23]. As discussed earlier, (3.17) is imposed so that we are able to use (3.2). The local sensor must be able to report for at least one time slot, so NR,k ≥ 1. Eq. (3.19) couples τk with NR,k to make Ibound convex with respect to τk . Eq. (3.20) is used with the “supertight bound” [21] to evaluate (3.3) in closed form. Eq. (3.22) is less intuitive, but it ensures the joint convexity of τk and NR,k in Ibound . Eq. (3.21) is imposed to improve the tightness of (3.22) while maintaining convexity. We observe that there are both upper and lower bounds on τk and NR,k . This means that there are both upper and lower limits on the values of PmFC,k and Pf FC,k , i.e., we cannot achieve arbitrarily small or large PmFC,k or Pf FC,k while maintaining convexity. This phenomenon will become evident when analyzing Receiver Operating Characteristics (ROCs). 3.3 Performance Averaged Over Reporting Channels The sensing error performance as given by (3.15) and (3.16) must be re-evaluated every time the reporting channel changes. Thus, the coherence time of the reporting channel influences the optimization frequency. Significant network resources (both time and energy) could be consumed performing computations and communicating both environment parameters and optimal results. It may then be beneficial to optimize less frequently, which we may do if we average performance over the Rayleigh-faded reporting channel. Eqs. (3.15) and (3.16) share a common reporting component that we define as 2 PR,k = Q |gk | 2NR,k /σz,k . (3.23) We can save on computation time and the corresponding communications overhead by averaging (3.23) over the Rayleigh-faded reporting channel, since γ R,k is constant for longer than γR,k . This probability, PR,k , is defined and upper-bounded in the following theorem: 18 Theorem 3 (Upper bound on PR,k ): PR,k is defined and then upper-bounded by PR,k = 2 σz,k 2 π NR,k σg,k π 2 0 dθ 2 σz,k 2 NR,k σg,k + 1/ sin2 θ ≤ 2 σz,k 2 4NR,k σg,k . (3.24) Proof: Refer to Appendix D. The proof of the definition is found using the Craig representation of the Q-function (as in [18]) and a variable substitution. The upper 2 /(N σ 2 ) is relatively small (though we bound is derived by assuming that σz,k R,k g,k are not required to impose another constraint). The exact form in (3.24) allows us to average (3.10) and (3.11) over gk and write PmFC,k = PR,k (1 − PmL,k ) + (1 − PR,k )PmL,k , (3.25) P f FC,k = PR,k (1 − Pf L,k ) + (1 − PR,k )Pf L,k . (3.26) The upper bound in (3.24) is trivially convex with respect to NR,k . Eqs. (3.15) and (3.16) become PmFC,k ≤ Ak xk + Ibound + P f FC,k ≤ Q xk 2 σz,k 2 4NR,k σg,k N − NR,k + , 2 σz,k 2 4NR,k σg,k (3.27) , (3.28) respectively. Note that, since (3.17) to (3.22) are derived from the sensing component of (3.15) and (3.16), (3.27) and (3.28) are jointly convex with respect to τk and NR,k under the same set of constraints. 3.4 Single-Sensor Optimization Problem Our goal is to optimize performance by minimizing one probability while satisfying a target for the other probability. Since we would like to guarantee a ceiling on interference to the PU, we choose a target missed detection probability, PmFCTAR , as in [13]. Thus, when the instantaneous reporting channel is known, the optimization 19 problem for the single-sensor network can be formulated as minimize Pf FC,k subject to PmFC,k ≤ PmFCTAR (3.17) to (3.22). (3.29) Analogously, when only the average reporting channel is known, the optimization problem for the single-sensor network can be formulated as minimize P f FC,k subject to PmFC,k ≤ PmFCTAR (3.17) to (3.22). (3.30) Due to the convexity of the objective function and all of the constraints, problems (3.29) and (3.30) can both be solved by efficient algorithms such as the interior-point method [22]. We emphasize that the frequency for solving (3.29) depends primarily on the reporting channel coherence time (though also on the sensing channel coherence time). Solving (3.29) offers improved spectrum sensing performance while using (3.30) is less demanding on network resources. 20 Chapter 4 Multi-Sensor Network In this chapter, we derive and analyze PmFC and Pf FC for the K-sensor network using PmFC,k and Pf FC,k . We can analogously derive PmFC and P f FC (averaging probabilities over reporting channels) using PmFC,k and P f FC,k if only the average reporting channels are known. We upper-bound PmFC and Pf FC to obtain a generalized convex multiplicative problem [24] for OR-rule. Subsequently, we relax this problem to arrive at a convex optimization problem and extend the analysis to any M-out-of-K rule. Detailed proofs of some of the results in this chapter are omitted for narrative clarity and are deferred to the appendices. Throughout this chapter we assume that K ≥ 2. In Section 4.1, we present the analytical forms of PmFC and Pf FC as functions of the individual PmFC,k and Pf FC,k . These expressions apply to any M-out-of-K rule. We derive upper bounds on both PmFC and Pf FC . For OR-rule, we show that the upper bounds lead to a generalized convex multiplicative problem for network optimization. In Section 4.2, we relax the optimization problem for OR-rule to arrive at a set of independent convex optimization subproblems. We achieve this by uncoupling the missed detection target probability, resulting in one convex optimization subproblem corresponding to each sensor. We briefly discuss the tradeoffs of solving the problems at the FC versus at the sensors. In Section 4.3, we show that the approach used to formulate a set of convex optimization subproblems when using OR-rule can be generalized to any M-out21 of-K rule. 4.1 Optimization Problem The fusion center combines the K inferred local sensor decisions into a global decision using an M-out-of-K rule. We focus attention on analysis for OR-rule (i.e., M = 1) for three reasons: 1) simplicity, 2) the analysis will lead to optimization of any M-out-of-K rule as a convex problem, and 3) we will suggest in Section 5.1 that optimized network performance will favor a rule that multiplies missed detection probabilities, i.e., OR-rule. 4.1.1 Exact Expressions for Decision Fusion Conveniently, PmFC and Pf FC can be writen as functions of the corresponding single-sensor probabilities. Pf FC for any M-out-of-K rule, using our notation, is [25, Eq. 10] Pf FC = K i−M i=M p=0 ∑ ∑ (−1) p i p ∑ ∏ Pf FC,k . (4.1) SK,i, j ∈SK,i k∈SK,i, j In other words, we sum every combination of products of M false alarm probabilities, M + 1 false alarm probabilities, . . . , and K false alarm probabilities, and every combination has a coefficient calculated by [26, p. 165] i−M ∑ (−1) p p=0 i i−1 = (−1)i−M . p i−M (4.2) Similarly, [25] provides an expression for the probability of detection. However, PmFC is more relevant here, which we write as K PmFC = ∑ i=K−M+1 i+M−K−1 ∑ p=0 (−1) p i p 22 ∑ ∏ SK,i, j ∈SK,i k∈SK,i, j PmFC,k , (4.3) where [26, p. 165] i+M−K−1 ∑ (−1) p p=0 i i−1 = (−1)i+M−K−1 . p i+M−K −1 (4.4) 4.1.2 Exact Expressions and Bounds for Decision Fusion Our goal is to upper bound Pf FC and PmFC by only considering the products of the fewest probabilities, i.e. by only considering i = M in (4.1) and i = K − M + 1 in (4.3). Products of more probabilities should be smaller since they are the product of more positive terms less than or equal to one. However, this may not be the case if the coefficients become large. We impose a constraint on the average sensing error probability that guarantees an upper bound, as given in the following theorem: Theorem 4 (Upper Bound on Pf FC and PmFC ): Pf FC and PmFC are upper-bounded by Pf FC ≤ PmFC ≤ ∑ ∏ SK,M, j ∈SK,M k∈SK,M, j ∑ Pf FC,k , ∏ (4.5) PmFC,k , (4.6) SK,K−M+1, j ∈SK,K−M+1 k∈SK,K−M+1, j if we impose the following constraints: 2M + 4 ∑Kk=1 Pf FC,k ≤ , K KM + K − M 2 − 2M − 1 2K − 2M + 6 ∑Kk=1 PmFC,k ≤ , K KM − 2K − M 2 + 4M − 4 (4.7) (4.8) which are convex with respect to τk and NR,k , ∀k. Proof: Refer to Appendix E. We compare binomial coefficients to show that, when applying (4.7) and (4.8), the negative terms in (4.2) and (4.3) are greater than the positive terms in (4.2) and (4.3) that are ignored in (4.5) and (4.6). 23 4.1.3 Bounds Applied to OR-Rule For OR-rule (M = 1), the upper bound (4.6) for PmFC is equivalent to (4.3), so we can ignore (4.8). The upper bound on Pf FC is K Pf FC ≤ ∑ Pf FC,k , (4.9) k=1 which is tight when the individual Pf FC,k terms are small. The upper bound (4.9) is convex since it is a sum of convex functions. Furthermore, (4.7) becomes K 6K ∑ Pf FC,k ≤ 2K − 4 . (4.10) k=1 Assuming physically reasonable Pf FC (i.e., Pf FC,k < 1), (4.10) can also be ignored. Our optimization problem becomes K minimize ∑ Pf FC,k k=1 K subject to ∏ PmFC,k ≤ PmFC TAR k=1 (3.17) to (3.22), ∀k, (4.11) where we use upper bounds for PmFC,k and Pf FC,k (from (3.15) and (3.16)). 4.1.4 Generalized Convex Multiplicative Programming Since PmFC is the product of convex functions, (4.11) is not convex in general. Problem (4.11) is an example of generalized convex multiplicative programming, where a problem that is otherwise convex has either an objective term or one constraint that is a product of convex functions. This is a relatively new field of optimization [24], though it has been shown that such a problem can be transformed into a series of convex problems. Problem (4.11) can be globally solved by the simplicial branch-and-reduce method described in [27]. Simplicial branch-and-reduce represents the problem in an equivalent form where K-simplices (K-dimensional shapes with certain prop24 erties) are used to represent the individual convex functions in the multiplicative constraint. In each iteration of the method, one of the simplices is removed and replaced with K more K-simplices, and a corresponding convex problem is solved. With each iteration, the convex problem complexity grows from the net gain of (K − 1) K-simplices. However, the algorithm will eventually converge to the op- timal solution. In practice, the execution time of the branch-and-reduce algorithm in [27] grows prohibitively large as K increases. Thus, it is of interest to find a simpler method for solving (4.11). 4.2 Suboptimal Convex Problem for OR-Rule For OR-rule, we observe that PmFC is a product of independently convex functions, since each PmFC,k is only a function of its corresponding τk and NR,k . Therefore, dividing the missed detection target in (4.11) into K targets, PmFCTAR ,k (one for each sensor), will create K independent convex subproblems. A simple way to derive PmFCTAR ,k would be to take the Kth root of PmFCTAR , as in [12]. However, this ignores that some sensors can achieve better performance than others due to stronger sensing or reporting channels. As noted in Section 3.2.2, there is a lower limit on every achievable PmFC,k , which will vary from sensor to sensor. Therefore, we propose scaling the target probability of each sensor based on the best achievable PmFC,k of that sensor. So, we first solve minimize PmFC,k subject to (3.17) to (3.22), (4.12) for all k sensors, which are convex optimization problems, and define PmFCmin ,k as the solution to (4.12). The network’s minimum missed detection probability, PmFCmin , using OR-rule is then K PmFCmin = ∏ PmFCmin ,k . (4.13) k=1 Obviously, if PmFCTAR = PmFCmin , then we require PmFCTAR ,k = PmFCmin ,k , ∀k. Oth- erwise, at least one sensor will have an unachievable target, i.e., PmFCTAR ,k < 25 PmFCmin ,k for some k. When PmFCTAR > PmFCmin , it is reasonable to assign relatively lower PmFCTAR ,k to sensors that have lower PmFCmin ,k . We propose achieving this by scaling each sensor’s target relative to its minimum as PmFCTAR ,k = PmFCmin ,k PmFCTAR PmFCmin 1/K , (4.14) where it is then straightforward to verify that K PmFCTAR = ∏ PmFCTAR ,k . (4.15) k=1 Thus, we relax (4.11) to arrive at the new problem K minimize ∑ Pf FC,k k=1 subject to PmFC,k ≤ PmFCTAR ,k , ∀k (3.17) to (3.22), ∀k. (4.16) Problem (4.16) readily decomposes into K convex subproblems that can be efficiently solved [22] either at the FC or at the sensors. The FC knows gk and 2 , ∀k, but in order for it to solve all subproblems, it also needs to learn P σ 2 σz,k t h,k 2 2 and σn,k , ∀k, via a feedback channel. However, the kth sensor knows Pt σh,k and 2 , so in order for it to solve the kth subproblem it only needs to learn |g | and σn,k k 2 σz,k via a feedback channel. Either method requires feedback of the optimal τk and NR,k , ∀k, between the sensors and the FC. For this thesis, we do not consider where (4.16) is solved. Relaxed problem (4.16) does not in general yield the optimal solution. Recall from Section 3.2.2 that there is also an upper limit on every achievable PmFC,k . In the event that our scaling assigns PmFCTAR ,k < PmFCmax ,k for some k, where PmFCmax ,k is the sensor’s maximum missed detection probability, then solving (4.16) will yield PmFC < PmFCTAR . There is generally a tradeoff between false alarm and missed detection, so having a missed detection probability below the target means that we are probably not minimizing the false alarm probability. Nevertheless, as will be shown in Section 5.2 of this thesis, the target scaling approach usually yields PmFC 26 and Pf FC that are very close to the optimal solution of (4.11). 4.3 Suboptimal Convex Problem for Generalized Counting Rule We can generalize the formulation of (4.16) from (4.11) to any M-out-of-K rule. Again, we use upper bounds for PmFC,k and Pf FC,k (from (3.15) and (3.16)). We keep the same objective function as in (4.16), even though it is no longer representative of the actual Pf FC , in order to enable decomposition into convex subproblems. PmFCTAR ,k requires scaling to achieve the upper bound defined by (4.6). As a generalization of (4.14), we propose scaling each sensor’s target relative to its minimum as PmFCTAR ,k = PmFCmin ,k 1/(K−M+1) PmFCTAR PmFCmin , (4.17) where it is then straightforward to verify that ∑ PmFCTAR = ∏ PmFCTAR ,k . (4.18) SK,K−M+1, j ∈SK,K−M+1 k∈SK,K−M+1, j As an example, we will verify (4.18) for the case of K = 3, M = 2, as follows: ∑ ∏ PmFCTAR ,k SK,K−M+1, j ∈SK,K−M+1 k∈SK,K−M+1, j = PmFCTAR ,1 PmFCTAR ,2 + PmFCTAR ,1 PmFCTAR ,3 + PmFCTAR ,2 PmFCTAR ,3 PmFCTAR = (PmFCmin ,1 PmFCmin ,2 + PmFCmin ,1 PmFCmin ,3 + PmFCmin ,2 PmFCmin ,3 ) PmFCmin PmFCTAR PmFCmin = PmFCTAR (4.19) = PmFCmin Thus, for any M-out-of-K rule, we can solve (4.16) using PmFCTAR ,k , ∀k, found by (4.17). Of course, we must also consider constraints (4.7) and (4.8), which we were able to ignore for OR-rule. 27 Chapter 5 Numerical Results and Discussion In this Chapter, we present and discuss simulation results based on the analytical results in Chapter 3 and Chapter 4. In Section 5.1, we present Receiver Operating Characteristics (ROCs) for a single-sensor optimization problem. We show the loss in accuracy and achievable sensing performance due to bounding, and the performance loss incurred when optimizing less often (by optimizing based on the reporting channel variance instead of the instantaneous reporting channel). We show that simulations are consistent with the exact performance of the optimized network. We also consider the effects of using different interval length N. In Section 5.2, we present ROCs for multi-sensor optimization problems. We compare the application of different M-out-of-K rules, showing that OR-rule enables the best performance. We also consider the sensitivity of Pf FC to the quality of the sensing and reporting channels using two different fusion rules while showing the benefits of optimizing the number of reporting time slots over only optimizing the local decision thresholds. Unless otherwise noted, results in this Chapter are for a simulated secondary 2 = 1, σ 2 = 1, and P = 1 (the network with N = 5000 time slots. We let σn,k t z,k power units are arbitrary). For optimization, we set NRmax = N − NSmin = 1500, NSmax = N − 1, and E = 1. We assume that the PU is transmitting a Binary PhaseShift Keying (BPSK) signal. 28 5.1 Single-Sensor Results Chapter 3 presented numerous bounds to formulate (3.29) as a convex optimization problem. Before considering the overall, K-sensor network, we consider an example to show the loss in accuracy and achievable sensing performance due to the approximations and bounds of the single-sensor network. Consider the kth sensor in a simulated secondary network where, unless otherwise noted, the average sensing SNR is γ S,k = −5dB. Figs. 5.1 and 5.2 show the Receiver Operating Characteristic (ROC) when solv- ing (3.29) for γR,k = −6dB and solving (3.30) for γ R,k = −6dB, respectively. In Fig. 5.1, we use different interval lengths N and for each we set NRmax = 0.3N and NSmax = N − 1. In Fig. 5.2, solving (3.30) once via (3.28) and (3.27) is contrasted with solving (3.29) 106 times via (3.16) and (3.15), each time with γR,k generated based on γ R,k , to show the loss due to optimizing less often and only using the average reporting channels instead of the instantaneous ones. Missed detection is represented by PmFCTAR ,k , defined analogously to PmFCTAR ,k . In both figures, the upper bound curves were obtained from the solutions of (3.29) and (3.30). To assess bounding losses, curves are shown that were obtained using the solutions of (3.29) in the exact expressions (3.10) and (3.11) and the solutions of (3.30) in the exact expressions and (3.25) and (3.26). We also show curves obtained by using the solutions of (3.29) and (3.30) in the simulation of 106 noise and channel realizations. In Fig. 5.1, the looseness of the upper bound curves is primarily horizontal; the upper bounds on PmFC,k are looser than those on Pf FC,k due to the upper bound on (3.3) and the Taylor series upper bound of the non-integral components of PmL,k . The looseness means that the actual performance would be better than that given by the optimal solution of (3.29). For larger N, the upper bound is tighter and lower sensing error probabilities are achievable. Arbitrarily increasing N is constrained by the coherence time of the sensing channel and the need of time to use the frequency band for data transmission in the event that FC decides that the PU is absent. The smallest false alarm probability plotted for N = 1000 in Fig. 5.1 is approximately 0.002 and constitutes the smallest possible within the convex feasibility region due to the constraints on τk and NR,k . While it is possible to obtain a smaller 29 0 10 N = 1000 −1 Pf FC,k 10 −2 N = 15000 N = 5000 10 −3 10 Upper Bound (Convex Optimization) Simulation (Using Con. Opt. Solution) Exact (Using Con. Opt. Solution) −4 10 −1 10 PmFCT AR ,k Figure 5.1: ROC for γR,k = −6dB with 1 sensor and three different values of N. The convex optimal curves were obtained using the solutions of (3.29) via (3.16) and (3.15). The exact and simulation curves were obtained with the solutions of (3.29) in exact expressions (3.10) and (3.11), and for the simulation of 106 realizations of noises and sensing channels, respectively. false alarm probability, convex optimization methods would no longer apply and we would have to rely on less efficient and more time-consuming methods, such as exhaustive search. In Fig. 5.2, we see a decrease in performance when we optimize once based on the variance of the reporting channel, as expected. The looseness of the upper bound when optimizing once is comparable to the upper bound looseness when optimizing for the instantaneous reporting channel and averaging over many channel realizations. If we can accept the computational and communications overhead of optimizing more often, then we can achieve a measureable gain in performance. However, if the overhead becomes cumbersome, then optimizing less often becomes a viable alternative. In both Figs. 5.1 and 5.2, we see a small difference between the curve(s) obtained from the exact expressions and the simulation curve(s), due to the Gaussian 30 Upper Bound (Convex Optimized) Exact (Using Con. Opt. Solution) Simulation (Using Con. Opt. Solution) −1 P f FC,k 10 Optimize Once −2 10 Optimize For Every Reporting Channel Realization −3 10 −1 10 P mFCT AR ,k Figure 5.2: ROC for γ R,k = −6dB with 1 sensor and N = 5000. One set of curves was obtained by optimizing once, based on γ R,k , by solving (3.30) via (3.28) and (3.27), then using the solutions of (3.30) in exact expressions (3.25) and (3.26), and finally the simulation of 106 realizations of noise and sensing channels. The second set was obatined by optimizing for 104 reporting channel realizations by solving (3.29) via (3.16) and (3.15), then using the solutions of (3.29) in exact expressions (3.10) and (3.11), and finally the simulation of 100 realizations of noise and sensing channels for each reporting channel realization. approximation of the local energy detector decision variables and the rounding of the optimal NR,k to the nearest integer for simulation. Fig. 5.1 shows that this difference shrinks with increasing N, as expected from the central limit theorem. We also see that low Pf FC,k is more readily achievable than low PmFC,k , as the lower bounds on τk (i.e., (3.17) and (3.19)) are tighter constraints than the upper bound (i.e., (3.21)). This implies that the design of a multi-sensor network will favor a rule that multiplies missed detection probabilities and sums false alarm probabilities (i.e., OR-rule). 31 5.2 Multi-Sensor Results and Discussion Unless otherwise noted, results in this section are for a simulated secondary network with K = 4 sensors. For this value of K, it is easy to show that constraints 2 = 1 and σ 2 = 1, (4.7) and (4.8) can be ignored for all rules. For all sensors, σn,k z,k and we define γ S = [−7, −8, −9, −7]dB and γR = [−6, 0, −4, −2]dB, so that the sensors have unique pairs of sensing and reporting SNRs. Due to similarity of the results, we do not include optimizing for the average Rayleigh-faded reporting channels, γ R . Such results would only serve to further illustrate the loses due to optimizing with less information. All figures in this section show upper bounds obtained using the solutions of the convex problem (4.16), where the upper bound Pf FC ’s are calculated from (4.5). Curves are also shown that were obtained using the solutions of (4.16) in the exact expressions (3.10) and (3.11), and then combining the single-sensor probabilities with (4.1). 5.2.1 Comparison of Fusion Rules Fig. 5.3 shows the ROCs for the secondary network using all possible M-out-of-K rules when K = 4. In addition to the aforementioned curves, it shows curves obtained by using the solutions of (4.16) in the simulation of 106 realizations of noises and sensing channels. Furthermore, for OR-rule (M = 1) it shows a curve obtained by solving (4.11) with the branch-and-reduce method as a direct comparison to the suboptimal convex approach. In Fig. 5.3, we see that OR-rule is generally superior to all other rules and that solving (4.16) yields performance identical to solving (4.11) for OR-rule, i.e. our suboptimal convex problem yields the same solutions as applying the branchand-reduce method. The overall performance for AND-rule is weaker due to high missed detection probabilities; we can only achieve PmFCTAR ≥ 0.3 since the missed detection performance of AND-rule (M = K = 4) is derived from the addition of the single-sensor PmFC,k ’s, which in turn are constrained by the lower bounds on τk (i.e., via (3.17) and (3.19)). The performance of rules M = 2 and M = 3 lie in between that of OR-rule and AND-rule, as expected. The upper bounds on all rules, which formed the basis of the optimization, are reasonably close to the 32 0 10 Upper Bound (Convex Optimal) Upper Bound (Branch−and−Reduce, OR−rule) Exact (Using Con. Opt. Solution) Simulation (Using Con. Opt. Solution) −1 10 PfFC m=2 −2 m=1 (OR−rule) m=3 10 m=4 (AND−rule) −3 10 −4 10 −4 10 −3 10 −2 PmFC 10 −1 10 TAR Figure 5.3: Secondary network ROC with 4 sensors and N = 5000, using Mout-of-K rules. The convex optimal and branch-and-reduce curves were obtained using the solutions of (4.16) and (4.11), respectively, where the latter was only solved for OR-rule. The exact and simulation curves were obtained with the solutions of (4.16) in exact expressions (3.10), (3.11), and (4.1), and for the simulation of 106 realizations of noises and sensing channels, respectively. exact performance. The looseness of the upper bounds has propagated from the looseness of the upper bounds of the single-sensor false alarm and missed detection probabilities. As observed in the single-sensor case, there is a small difference between the curves obtained from the exact expressions and the simulation curves, again due to the Gaussian approximation of the energy detector decision variables and the rounding of the optimal NR,k ’s to the nearest integers; the accuracy of the exact analytical curves can be arbitrarily improved by increasing N. Importantly, we observe that very good performance can be achieved using energy detection, especially using OR-rule, even though the sensing channels have γ S,k ≤ −7dB, ∀k. 33 0 10 N = 1000, N −1 R,k 10 Optimized N = 5000, N R,k = 10 −2 Pf FC 10 N = 5000, N −3 R,k 10 Optimized N = 5000, NR,k = 1500 −4 10 N = 15000, NR,k Optimized −5 10 Upper Bound (Convex Optimized) Exact (Using Con. Opt. Solution) −6 10 −10 −9.5 −9 −8.5 −8 −7.5 −7 ∆γ S,k added to [0 -1 -2 0]dB −6.5 −6 −5.5 −5 Figure 5.4: Effect of sensing channels on Pf FC with 4 sensors using OR-rule and PmFCTAR = 0.005. Reporting channel SNRs are γR = [−6, 0, −4, −2]dB. For NR,k = 10 and NR,k = 1500, only the thresholds τk , ∀k, are optimized. 5.2.2 Sensitivity to Channel Quality with OR-Rule We next study the sensitivity of Pf FC to the quality of the sensing and reporting channels when using OR-rule. At the same time, we consider the benefits of optimizing NR,k versus holding NR,k constant, since the current literature has not optimized NR,k . When we keep NR,k constant, we only optimize the thresholds τk , ∀k. We note that attempting to optimize NR,k while keeping τk constant significantly restricts performance so we do not consider it in this thesis. Figs. 5.4 and 5.5 show the sensitivity of Pf FC using OR-rule to the quality of the sensing and reporting channels, respectively, for PmFCTAR = 0.005. We note that, because of the upper-bounding, the exact missed detection probabilities are PmFC < 0.005. Both figures show that a wide operating range exists where the false alarm probability can be guaranteed to be below 1% when N = 5000. Comparative curves show results for NR,k = 10 and NR,k = 1500, ∀k. For Fig. 5.4, we also have curves optimizing NR,k for different interval length N where we set NRmax = 0.3N 34 0 10 N R,k −1 NR,k = 10 = 1500 P fFC 10 NR,k Optimized −2 10 Upper Bound (Convex Optimized) Exact (Using Con. Opt. Solution) −3 10 −30 −25 −20 −15 −10 −5 ∆γ added to [−6 0 −4 −2]dB 0 5 10 R,k Figure 5.5: Effect of reporting channels on Pf FC with 4 sensors and N = 5000, using OR-rule, and PmFCTAR = 0.005. Sensing channel SNRs are γ S = [−7, −8, −9, −7]dB. For NR,k = 10 and NR,k = 1500, only the thresholds τk , ∀k, are optimized. and NSmax = N − 1. In Fig. 5.4, we decrease the sensing SNRs from base values γ S = [0, −1, −2, 0] dB. Allowing NR,k to be optimized when N = 5000 permits significantly lower false alarm probabilities than when using NR,k = 10 or NR,k = 1500 for the majority of the considered range of sensing SNRs. When the sensing channels are particularly weak, i.e., γ S < [−9, −10, −11, −9]dB, we see that using NR,k = 10 is comparable to using the optimal NR,k . Thus, as sensing channels weaken, it is beneficial to sacrifice reporting time slots to allow more time slots for sensing. Using NR,k = 1500 is not advised for the range of sensing channel SNRs considered in Fig. 5.4, since the reporting channels are relatively strong. When the sensing channels are relatively strong, having NR,k = 1500 does outperform NR,k = 10, so we see that the bottleneck in performance shifts from the sensing to the reporting channels. Still, significantly improved PmFC and Pf FC are possible by optimizing NR,k . For example, we can achieve Pf FC ≈ 1.5× 10−6 when γ S = [−5, −6, −7, −5]dB, which 35 is almost two orders of magnitude lower than if we set NR,k = 1500 for the same sensing channels. Finally, the size of N is also a major factor when optimizing NR,k ; significantly lower false alarm probabilities are achievable when N = 15000, whereas performance when N = 1000 is poor for the considered range of sensing SNRs due to the aggressive PmFCTAR . In Fig. 5.5, we vary the reporting channels from base values γR = [−6, 0, −4, −2]dB. Optimizing NR,k allows lower Pf FC than when setting NR,k = 10 or NR,k = 1500. When NR,k = 10, we see a sharp performance deterioration as the report- ing channels weaken; the effective reporting SNR is too low for the reports of the sensors to reach the FC. Furthermore, when γR < [−29, −23, −27, −26]dB, NR,k = 1500 becomes the optimal value for all sensors. However, as reporting channels improve, the excessive reporting with NR,k = 1500 creates a bottleneck in performance that limits Pf FC to almost an order of magnitude lower than when using the optimal NR,k . Figs. 5.4 and 5.5 both show that optimizing τk and NR,k enable a reasonable operating range with an aggressive missed detection target probability. Poor sensing or reporting channels can be mitigated to maintain network performance. The benefits of optimizing NR,k versus holding NR,k constant are substantial. 5.2.3 Sensitivity to Channel Quality with Other Rules We now briefly study the sensitivity of Pf FC to the quality of the sensing and reporting channels when not using OR-rule. Specifically, we consider the case of M = 2. Figs. 5.6 and 5.7 show the sensitivity of Pf FC using M = 2 to the quality of the sensing and reporting channels, respectively, for PmFCTAR = 0.005. The setup is identical to that used for Figs. 5.4 and 5.5 with OR-rule, respectively, except that in Fig. 5.7 the sensing channel SNRs are γ S = [−5, −6, −7, −5]dB in order to enable false alarm probabilities that are comparable to those in Fig. 5.5. In Fig. 5.6, we decrease the sensing SNRs from base values γ S = [0, −1, −2, 0] dB. As when using OR-rule, allowing NR,k to be optimized when N = 5000 permits significantly lower false alarm probabilities than when using NR,k = 10 or NR,k = 1500 for the majority of the considered range of sensing SNRs. Overall, we 36 0 10 −1 10 N = 1000, N −2 10 R,k N = 5000, NR,k = 10 −3 10 Pf FC Optimized −4 10 N = 5000, NR,k = 1500 −5 10 −6 10 −7 10 N = 15000, N R,k Optimized N = 5000, N R,k Optimized Upper Bound (Convex Optimized) Exact (Using Con. Opt. Solution) −8 10 −8 −7 −6 −5 −4 ∆γ S,k added to [0 -1 -2 0]dB −3 −2 Figure 5.6: Effect of sensing channels on Pf FC with 4 sensors using M = 2 and PmFCTAR = 0.005. Reporting channel SNRs are γR = [−6, 0, −4, −2]dB. For NR,k = 10 and NR,k = 1500, only the thresholds τk , ∀k, are optimized. observe the same general trends for using M = 2 as we did with M = 1; we can mitigate the effects of weaker sensing channels by dedicating more time to sensing, we can take advantage of stronger sensing channels by dedicating more time to reporting, and increasing the total number of time slots N enables an overall performance improvement. By comparing Fig. 5.6 with Fig. 5.4, we observe that a weak sensing channel obstructs performance more easily when M = 2 than when M = 1. This is as expected from the results in Fig. 5.3, where OR-rule is shown to be generally superior to the other rules. In Fig. 5.7, we vary the reporting channels from base values γR = [−6, 0, −4, −2]dB. Once again, the general result trends are the same as those shown in Fig. 5.5; optimizing NR,k allows lower Pf FC than when setting NR,k = 10 or NR,k = 1500. When NR,k = 10, we see a sharp performance deterioration as the reporting channels weaken, so the number of reporting time slots has become a major performance bottleneck. As noted previously, we used stronger sensing channel SNRs in order to observe false alarm probabilities comparable to those in Fig. 5.5; OR-rule 37 −1 10 Upper Bound (Convex Optimized) Exact (Using Con. Opt. Solution) N R,k = 1500 Pf FC NR,k = 10 −2 10 NR,k Optimized −20 −15 −10 −5 ∆γ R,k added to [-6 0 -4 -2]dB 0 5 Figure 5.7: Effect of reporting channels on Pf FC with 4 sensors and N = 5000, using M = 2, and PmFCTAR = 0.005. Sensing channel SNRs are γ S = [−5, −6, −7, −5]dB. For NR,k = 10 and NR,k = 1500, only the thresholds τk , ∀k, are optimized. has once again shown to be superior in this framework. 38 Chapter 6 Conclusions and Future Work 6.1 Conclusions In this thesis, we considered the problem of cooperative spectrum sensing for cognitive radio. The secondary network optimized the decision thresholds at the SUs and the division between time slots used for sensing the PU and time slots used for reporting the sensing results to the FC. We selected the network probabilities of false alarm and missed detection as our performance metrics. We derived these probabilities for a single-sensor network and then found bounds to facilitate convex optimization techniques. The analysis was extended to multi-sensor networks using M-out-of-K rules. Using OR-rule, we represented the multi-sensor network optimization problem as a generalized convex multiplicative problem. We then relaxed the problem to formulate a convex suboptimal problem that usually yields the same results. The relaxation was then generalized to maintain convexity for any M-out-of-K rule. Furthermore, we showed that we could optimize for the average reporting channel gains instead of the instantaneous ones if we were willing to accept a decrease in sensing performance. Simulation results showed that our convex upper bounds were close to the exact analytical performance, and that joint optimization of thresholds and sensing/reporting time slots enables very good sensing performance. 39 6.2 Future Work The following areas are identified as potential interesting extensions for the work in this thesis: • Investigate scenarios with larger numbers of SUs where some may have sensing or reporting channel gains that are so weak that they should be explicitly omitted from optimization. • Account for primary networks that have more than one transmitting PU. Even if only one PU transmits at a time, the SUs would have different channels to each PU, likely with different channel gains. • Extend our approach to the case of imperfect channel estimation by account- ing for additional performance loss due to the imperfect estimation of both the sensing channel variances and the instantaneous reporting channels. • Seek improved codes for the reporting channel. Our implementation applied a basic repetition code. The sensing reports could be quantized at the cost of reporting SNR. It is unknown whether convexity would be maintained, especially since the FC would then need to implement soft decision combining. 40 Bibliography [1] J. Mitola and G. Q. Maguire. Cognitive radio: Making software radios more personal. IEEE Pers. Comm., 6(4):13–18, Aug. 1999. → pages 1 [2] S. Haykin. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun., 23(2):201–220, Feb. 2005. → pages 1 [3] FCC. Spectrum Policy Task Force. Rep. ET Docket no. 02-135, Nov. 2002. → pages 2 [4] IEEE Std 802.22-2011, IEEE Standard for information technology Telecommunications and information exchange between systems wireless regional area networks (WRAN) - specific requirements part 22: Cognitive wireless RAN medium access control (MAC) and physical layer (PHY) specifications: Policies and procedures for operation in the tv bands, Jul. 2011. → pages 2 [5] D. Cabric, S. M. Mishra, and R. W. Brodersen. Implementation issues in spectrum sensing for cognitive radios. In Proc. ACSSC 2004, pages 772–776, Nov. 2004. → pages 2, 3 [6] Ian F. Akyildiz, Brandon F. Lo, and Ravikumar Balakrishnan. Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4(1):40–62, Mar. 2011. → pages 2, 3, 4 [7] S. Atapattu, C. Tellambura, and H. Jiang. Energy detection based cooperative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Comm., 10(4):1232–1241, Apr. 2011. → pages 3, 4, 13 [8] Ying-Chang Liang, Yonghong Zeng, Edward C. Y. Peh, and Anh Tuan Hoang. Sensing-throughput tradeoff for cognitive radio networks. IEEE Trans. Wireless Comm., 7(4):1326–1337, Apr. 2008. → pages 5 41 [9] Wei Zhang, Ranjan K. Mallik, and Khaled Ben Letaief. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE Trans. Wireless Comm., 8(12):5761–5766, Dec. 2009. → pages 5 [10] Jun Ma, Guodong Zhao, and Ye Li. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Comm., 7(11):4502–4507, Nov. 2008. → pages 3, 6 [11] Zhi Quan, Shuguang Cui, Ali H. Sayed, and H. V. Poor. Optimal multiband joint detection for spectrum sensing in cognitive radio networks. IEEE Trans. Sig. Process., 57(3):1128–1140, Mar. 2009. → pages 5 [12] E. Peh and Ying-Chang Liang. Optimization for cooperative sensing in cognitive radio networks. In Proc. IEEE WCNC 2007, pages 27–32, Mar. 2007. → pages 5, 25 [13] Woongsup Lee and Dong-Ho Cho. Enhanced spectrum sensing scheme in cognitive radio systems with MIMO antennae. IEEE Trans. Veh. Tech., 60(3):1072–1085, Mar. 2011. → pages 5, 19 [14] Seung-Jun Kim and Georgios B. Giannakis. Sequential and cooperative sensing for multi-channel cognitive radios. IEEE Trans. Sig. Proc., 58(8):4239–4253, Aug. 2010. → pages 5 [15] Tao Cui, Feifei Gao, and Arumugam Nallanathan. Optimization of cooperative spectrum sensing in cognitive radio. IEEE Trans. Veh. Tech., 60(4):1578–1589, May 2011. → pages [16] Zhi Quan, Shuguang Cui, and Ali H. Sayed. Optimal linear cooperation for spectrum sensing in cognitive radio networks. IEEE J. Sel. Top. Sig. Process., 2(1):28–40, Feb. 2008. → pages 3, 5 [17] P. K. Varshney. Distributed Detection and Data Fusion. Springer-Verlag, New York, 1997. → pages 4 [18] F. Moghimi, A. Nasri, and R. Schober. Lp-norm spectrum sensing for cognitive radio networks impaired by non-Gaussian noise. In Proc. IEEE GLOBECOM 2009, pages 1–6, Dec. 2009. → pages 4, 13, 19, 56 [19] N. C. Beaulieu and Y. Chen. Improved energy detectors for cognitive radios with randomly arriving or departing primary users. IEEE Sig. Proc. Letters, 17(10):867–870, Oct. 2010. → pages 10 42 [20] K. B. Oldham, J. C. Myland, and J. Spanier. An Atlas of Functions with Equator, the Atlas Function Calculator. Springer, 2nd edition, 2008. → pages 14, 16, 46 [21] G. T. F. de Abreu. Supertight algebraic bounds on the Gaussian Q-function. In Proc. ACSSC 2009, pages 948–951, Nov. 2009. → pages 16, 18, 44 [22] S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, Cambridge, 2004. → pages 18, 20, 26, 49, 59 [23] R. Horn and C. Johnson. Matrix Analysis. Cambridge University Press, Cambridge, 1985. → pages 18, 49 [24] C. A. Floudas and P. M. Pardalos. Encyclopedia of Optimization. Kluwer Academic Publishers, 2001. → pages 21, 24 [25] A. R. Elias-Fuste, A. Broquetas-Ibars, J. P. Antequera, and J. C. M. Yuste. CFAR data fusion center with inhomogeneous receivers. IEEE Trans. Aero. Elec. Sys., 28(1):276–285, Jan. 1992. → pages 22 [26] R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics. Addison-Wesley, Reading, MA, 1994. → pages 22, 23 [27] H. P. Benson. Simplicial branch-and-reduce algorithm for convex programs with a multiplicative constraint. J. Optim. Theory Appl., 145(2):213–233, 2010. → pages 24, 25 [28] D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, Cambridge, 2005. → pages 56 43 Appendix A Proof of Theorem 1 To upper-bound (3.3), we first convert (3.4) to an equivalent form using the relation √ erf(x) = 1 − 2Q( 2x) to obtain √ √ S = −2 + 2Q( 2a) + 4Q( 2b), (A.1) where a = b = NS,k 2 τk 1 −1 − 2 sin θ σn,k 2 sin θ σn,k 2 2NS,k Pt σh,k 2 sin θ σn,k 2 2NS,k Pt σh,k . , (A.2) (A.3) We observe that an upper bound on (A.1) results in an upper bound on (3.3). Considering tractability of the integral in (3.3), we propose the use of the recentlydeveloped “supertight bound” on the Q-function [21], defined as Q(c) ≤ 1 −c2 1 exp(−c2 ) + exp 50 2(c + 1) 2 44 . (A.4) Eq. (A.4) is tight for all values of c, and allows us to write 1 2 1 exp(−2a2 ) + √ exp(−a2 ) exp(−2b2 ) 25 a+1 25 2 +√ exp(−b2 ). b+1 S ≤ −2 + (A.5) Before plugging S back into I, we further upper-bound some of its terms, as follows: 2 −2a ≤ 2 σn,k 4 τk τk sin2 θ σn,k −1 − − NS,k −1 2 2 4 2 NS,k Pt σh,k σn,k σn,k 2 Pt σh,k 2 NS,k Pt σh,k √ 1 ≤ a+1 √ 1 ≤ 1 + sin θ b+1 2 NS,k Pt σh,k τk 2 σn,k −1 2 + − σn,k 2 NS,k Pt σh,k 2 + σn,k 2 NS,k Pt σh,k 2 , , (A.6) (A.7) 2 NS,k Pt σh,k −1 , (A.8) where for (A.6) we used the fact that 1 ≥ sin2 θ , for (A.8) we used a linear approx√ imation with respect to sin θ (which is an upper bound since 1/( b + 1) is convex with respect to sin θ ), and for (A.7) to be satisfied we impose the constraint 2 σn,k τk 2 − Pt σh,k −1 < 0. 2 N − NR,k σn,k (A.9) This constraint is convex with respect to both NR,k and τk . I is now bounded by I≤ 2 τk − σn,k 1 exp − 2 Pt σh,k 2π NS,k 45 π 2 0 S1 d θ , (A.10) where 2 NS,k Pt σh,k S1 = − 2β1 + 2 + σn2 + 2 NS,k Pt σh,k 2 σn,k 2β3 β3 + exp 2 25 25 Pt σh,k + 2+ 2 NS,k Pt σh,k τk 2 σn,k − 1 β22 τk τk −1 − NS,k −1 2 2 σn,k σn,k 2 NS,k Pt σh,k −1 − σn2 + 4 sin2 θ σn,k 4 2NS,k Pt2 σh,k 2 NS,k Pt σh,k 2 NS,k τk τk 1 σn,k −1 − −1 × exp 2 2 2 2 Pt σh,k σn,k 2 σn,k β1 = sin θ exp 2 2 β2 , , (A.11) (A.12) β2 = sin θ , (A.13) β3 = sin θ exp 4 sin2 θ σn,k − 4 2NS,k Pt2 σh,k . (A.14) The integral over S1 can be computed in closed form. The integration of β22 and β2 from 0 to π 2 yields π 4 and 1, respectively. The integration of β1 and β3 can be solved by exploiting the identity sin2 θ = 1 − cos2 θ and the substitution t = p cos θ , where p is the magnitude of the exponential term that is independent of θ . This leads to π 2 √ π erf(p), 2a 0 √ π 2 π erfi(p), sin θ exp(−p2 sin2 θ )d θ = exp(−a2 ) 2a 0 sin θ exp(p sin θ )d θ = exp(a ) 2 2 2 (A.15) (A.16) where [20] 2 erf(p) = √ π 2 erfi(p) = √ π p exp(−t 2 )dt, (A.17) exp(t 2 )dt. (A.18) 0 p 0 46 Thus, I is bounded in closed form by 2 2 σn,k τk − σn,k 1 exp − 2 2 Pt σh,k 2π NS,k Pt σh,k I≤ 2 2π NS,k Pt σh,k − 2 σn,k exp 2 σn,k 1 + 2+ exp 2 25 Pt σh,k 2 4 σn,k 1 4 2NS,k Pt2 σh,k 2 2 σn,k 1 2 2NS,k Pt σh,k erfi 2 NS,k Pt σh,k + τk 2 2 2 NS,k Pt σh,k NS,k Pt σh,k 2 −1 − σn,k + σn,k 2 NS,k τk 1 σn,k τk × exp −1 − −1 2 2 2 2 Pt σh,k σn,k 2 σn,k + 2 σn,k 1 2 2NS,k Pt σh,k τk τk −1 −NS,k −1 2 2 σn,k σn,k 2 4 π NS,k Pt σh,k σn,k 1 √ 2 exp − 4 2NS,k Pt2 σh,k 2σn,k × erf π 2 2 NS,k Pt σh,k 2 + σn,k 2 NS,k Pt σh,k −1 2 . (A.19) Eq. (A.19) can be evaluated quickly. However, it is not necessarily jointly convex with respect to τk and NR,k ; additional bounding is required. First, the placements of NS,k in (A.19) (especially inside of the exponentials and square roots) make analysis of convexity with respect to NR,k cumbersome, if not impossible. To address this issue, we bound most of the NS,k terms to either NSmin or NSmax (whichever is appropriate to upper bound). Second, the summation term with the error function, once multiplied by the outside exponential, results in a term that is concave with respect to τk . We linearize and upper-bound this term using the first degree Taylor series approximation 2 . at τk = σn,k 47 Performing these approximations leads to I ≤ β5 + 1 erfi 25 + exp −NSmin 1 √ 2π 2 4 σn,k σn,k 1 1 exp − 2 4 2NSmax Pt2 σh,k 2NSmin Pt σh,k 2 τk −1 + 2 σn,k 2 τk − σn,k 2 Pt σh,k 2 σn,k τk 2 2 2 NSmin Pt σh,k NSmin Pt σh,k 2 −1 − σn,k + σn,k 2 2 − τ σ 1 k τk NS n,k × exp − − min −1 2 2 2 Pt σh,k 2 σn,k + 2 exp − 2 2 σn,k τk − σn,k 1 exp − 2 2 Pt σh,k 2π NS,k Pt σh,k π 2+ 2 2 NSmax Pt σh,k 2 + σn,k 2 NSmax Pt σh,k −1 , (A.20) where β5 = 2 τk − σn,k 2 Pt σh,k − 1 exp 4 σn,k 1 4 2NSmax Pt2 σh,k erf 2 σn,k 1 2 2NS,k Pt σh,k . (A.21) Observe that the only values of NS,k that are not bounded in (A.20) and (A.21) are the one inside the error function and the one in the denominator of the last summation term. β5 in (A.21) is concave with respect to NR,k for NR,k > 0. We linearize and upper-bound this term using the first degree Taylor series approximation at NR,k = 0. The final result is (3.12), which upper-bounds I. 48 Appendix B Proof of Convexity of Bound on (3.16) The convexity of Pf FC,k as given in (3.16) can be proven by showing that its Hessian is positive semi-definite (PSD) [22]. The Hessian of (3.16) is not always PSD, but we will show that it is PSD over a convex region once we impose a set of additional constraints. From [23], a matrix is PSD if and only if all of its principal minors are nonnegative. The minor Rαβ of matrix R is the determinant of the matrix formed by removing the rows of R defined by the set α and the columns of R defined by the set β . Rαβ is a principal minor if R is a square matrix and α = β . In other words, we prove joint convexity of Pf FC,k with respect to τk and NR,k by proving that ∂ 2 Pf FC,k ≥ 0, ∂ τk2 (B.1) ∂ 2 Pf FC,k ≥ 0, 2 ∂ NR,k (B.2) ∂ 2 Pf FC ∂ 2 Pf FC,k ∂ 2 Pf FC,k − 2 ∂ τk ∂ NR,k ∂ τk2 ∂ NR,k 49 2 ≥ 0. (B.3) The individual second derivatives are ∂ 2 Pf FC,k (N − NR,k )3/2 N − NR,k √ , = xk exp −x2k 2 4 2 ∂ τk σz,k 2π ∂ 2 Pf FC,k N−NR,k 1 = xk exp −x2k 2 2 ∂ NR,k 4 2π (N − NR,k ) + 1 2 2 NR,k πσz,k |gk | exp −|gk |2 ∂ 2 Pf FC,k N − NR,k 1 = 2 √ exp −x2k ∂ τk ∂ NR,k σn,k 2π 2 NR,k 2 σz,k (B.4) 1 + x2k N − NR,k 1 |gk |2 + 2 , 2NR,k σz,k 1 − 2 N − NR,k (B.5) N − NR,k 2 xk , 2 (B.6) √ where we used dQ(w)/dw = − exp(−w2 /2)/ 2π and xk as defined in (3.13). To satisfy (B.1) and (B.2), we immediately obtain the following convex constraints by inspection: 2 − τk ≤ 0, σn,k (B.7) 1 ≤ NR,k ≤ N. (B.8) Since we have previously defined NSmin , we have NRmax = N − NSmin . Therefore, (B.8) must be more tightly bound as 1 ≤ NR,k ≤ NRmax . (B.9) We observe that (B.5) has a positive term with an exponential that is different from those in (B.4) and (B.6). Therefore, we will ignore the unique term in (B.5) 50 to satisfy (B.3). Thus, it is straightforward to show that ∂ 2 Pf FC,k ∂ τk2 ∂ 2 Pf FC,k 2 ∂ NR,k − ∂ 2 Pf FC,k 2 ≥ ∂ τk ∂ NR,k 2 1 τk −1 (N − NR,k ) exp − 2 4 2πσn σn,k 2 1 3 τk . −1 − × 2 4 σn,k 4(N − NR,k ) β6 (B.10) Non-negativity can then be guaranteed by making β6 non-negative, or in other words imposing the convex constraint τk −1 2 σn,k −2 + 3NR,k − 3N ≤ 0. (B.11) Thus, by imposing contraints to satisfy (B.1) to (B.3), we have defined a convex region where (3.16) is convex. 51 Appendix C Proof of Convexity of Bound on (3.15) Analogously to the Pf FC,k case in Appendix B, for the convexity of PmFC,k as given in (3.15) we must prove that ∂ 2 PmFC,k ≥ 0, ∂ τk2 (C.1) ∂ 2 PmFC,k ≥ 0, 2 ∂ NR,k (C.2) ∂ 2 PmFC,k ∂ 2 PmFC,k ∂ 2 PmFC,k − 2 ∂ τk ∂ NR,k ∂ τk2 ∂ NR,k 2 ≥ 0. (C.3) The individual second derivatives of (3.15) are ∂ 2 PmFC,k ∂ 2 Ibound = , ∂ τk2 ∂ τk2 (C.4) NR,k ∂ 2 PmFC,k |gk | exp −|gk |2 2 = 2 2 ∂ NR,k σz,k 4 πσn NR,k ∂ 2 PmFC,k ∂ 2 Ibound = , ∂ τk ∂ NR,k ∂ τk ∂ NR,k 2|gk |2 ∂ 2 Ibound 1 + 2 + , (C.5) 2 NR,k σz,k ∂ NR,k (C.6) 52 where Ibound is from (3.12). It can be shown that ∂ 2 Ibound Ck = 4 A2k exp (−Ak xk ) + NSmin exp −NSmin x2k 2NSmin x2k − 1 2 σn ∂ τk + × + σn4 A2k Dk 1 NS A exp − Ak xk − min x2k exp (−Ak xk ) + √ 4 2 2 N − NR,k 2πσn 3/2 2NS2min NSmin xk − Ak + NSmin NSmin xk − Ak + NSmin 3 A2k /4 + Ak NSmin xk + NS2min x2k + 2Ak NSmin + NS2min xk − NSmin NSmin xk − Ak + NSmin , 2 (C.7) 3Dk ∂ 2 Ibound = exp (−Ak xk ) , 2 ∂ NR,k 4(N − NR,k )5/2 (C.8) A2k ∂ 2 Ibound Ak Dk = exp (−Ak xk ) . − 2 √ 3/2 ∂ τk ∂ NR,k σ 2 2π N 2σn,k (N − NR,k )3/2 Smax n,k (C.9) Eq. (C.5) combined with (B.9) and (C.8) satisfies (C.2). Eq. (C.7) is still cumbersome to work with, but we can ignore a number of its components. To start, consider the terms 3/2 2Ak NSmin + NS2min xk − NSmin NSmin xk − Ak + NSmin 2 + A2k /4 + Ak NSmin xk + NS2min x2k NSmin xk − Ak + NSmin , (C.10) which include the only term of (C.7) that could be negative. By recalling constraint (A.9), we can show that (C.10) is non-negative if we also add the convex constraint √ x−2 k − (1 + 2)NSmin ≤ 0, (C.11) which is more restrictive than (B.11), so we ignore (B.11). Thus, we ignore the term (C.10) in (C.7), and we have satisfied (C.1). Finally, we show how (C.3) is satisfied. Again, by ignoring terms known to be 53 non-negative, we write ∂ 2 PmFC,k ∂ 2 PmFC,k ∂ 2 PmFC,k − 2 ∂ τk ∂ NR,k ∂ τk2 ∂ NR,k 2 ≥ A2k Dk exp (−Ak xk ) N − NR,k σn4 (C.7) 3Dk × √ exp (−Ak xk ) 4 2π (N − NR,k )5/2 (C.8) 2 A2k Ak Dk − 2 − exp (−Ak xk ) √ 3/2 3/2 2 σn,k 2π NSmax 2σn,k (N−NR,k ) (C.9) = + A2k D2k 4πσn4 (N − NR,k )3 exp (−2Ak xk ) A3k Dk 3/2 2πσn4 (N − NR,k )3/2 NSmax exp (−Ak xk ) − A4k . (C.12) 2πσn4 NS3max We re-arrange (C.12) to obtain 2A2k (N − NR,k )3 2Ak Dk (N − NR,k )3/2 exp (Ak xk ) − D2k ≤ 0. (C.13) exp (2A x ) − k k 3 3/2 NSmax N Smax Unfortunately, (C.13) is a non-convex constraint. However, we can split it and bound each component to derive convex constraints. First, we upper-bound the positive term. Since (N − NR,k ) ≤ NSmax , we can bound 2A2k (N − NR,k )3 A2k (N − NR,k )3 2 exp (2A x ) ≤ A exp (2A x ) + exp (E), (C.14) k k k k k NS3max NS3max where 2Ak xk − E ≤ 0, (C.15) is a convex constraint and E is a tunable parameter that limits the maximum value of τk . In practice, we choose E = 1. Note that this form of bound enables a larger convex region than by simply using (N − NR,k )/NSmax ≤ 1. 54 Next, we upper-bound the negative fraction in (C.13). Since Ak xk > 0, we bound − 2Ak Dk (N − NR,k )3/2 3/2 NSmax 3/2 exp (Ak xk ) ≤ − 2Ak Dk NSmin 3/2 . (C.16) NSmax Thus, we bound (C.13) with the convex bound 3/2 A2k exp (2Ak xk ) + 2Ak Dk NSmin A2k (N − NR,k )3 − D2k ≤ 0, exp (E) − 3 3/2 NSmax N (C.17) Smax and by satisfying (C.17) and (C.15), we satisfy (C.3). Thus, under these additional constraints, (3.15) is convex. 55 Appendix D Proof of Theorem 3 PR,k can be defined as PR,k = E|gk | {PR,k }, (D.1) where Ex {·} is the expected value with respect to variable x. Since |gk | is Rayleigh- distributed, |gk |2 has exponential probability distribution [28, App. A] 2 2 p(r) = 2r exp(−r2 /σg,k )/σg,k . (D.2) By performing the transformation of variables 2 , λ = |gk | 2NR,k /σz,k we can write ∞ PR,k = 0 λ w exp(−λ 2 w/2)Q(λ )d λ , (D.3) (D.4) 2 /(N σ 2 ). We apply the Craig representation of the Q-function where w = σz,k R,k g,k (as in [18]), π 2 Q(x) = 0 exp(−x2 /sin2 θ )d θ , (D.5) and a variable substitution to obtain PR,k = w π π 2 0 dθ . w + 1/ sin2 θ 56 (D.6) We know that 1 ≤ 1/ sin2 θ ≤ ∞ and we can expect w to be small, likely less than 1, due to NR,k . Therefore, we can approximate w in the integral of (D.6) as 0 and upper-bound PR,k by PR,k ≤ w π π 2 0 sin2 θ d θ . Eq. (D.7) is easily solved to give the upper bound in(3.24). 57 (D.7) Appendix E Proof of Theorem 4 The (−1)i−M term with the binomial coefficient in (4.1) is 1 for i = M and the sign changes as i increases. For M ≥ K − 1, the proof of (4.5) is trivial and no constraints are required. For M < K − 1, if we can show how the combinations of products of M + 2b − 1 terms (i.e., those with negative magnitude) cancel out the combinations of products of M + 2b terms (i.e., those with positive magnitude), for b ∈ {1, 2, . . . , show when M + 2b − 2 2b − 1 K−M 2 }, then (4.5) is an upper bound. Thus, from (4.1) we must M+2b−1 ∑ SK,M+2b−1, j ∈SK,M+2b−1 ≥ ∏ Pf FC,k k=1 M + 2b − 1 2b The left-hand side of (E.1) includes K M+2b−1 M+2b ∑ ∏ Pf FC,k . (E.1) SK,M+2b, j ∈SK,M+2b k=1 combinations of products of M + 2b − 1 probability terms, while the right-hand side includes K M+2b combinations of products of M + 2b terms. It is straightforward to show that K K K − M − 2b + 1 = , M + 2b M + 2b − 1 M + 2b so the right-hand side will have K−M−2b+1 M+2b 58 (E.2) more products than the left-hand side. Comparing the coefficients, it is straightforward to show that M + 2b − 1 M + 2b − 2 M + 2b − 1 , = 2b 2b 2b − 1 (E.3) so, by combining (E.2) and (E.3), we claim that the righthand side is effectively K−M−2b+1 M+2b · M+2b−1 times greater than the lefthand side, but with an additional 2b probability for every combination. We wish to guarantee that the “extra” probability is small enough to satisfy (E.1). As a related aside, consider the problem K ∏ pi maximize (E.4) i K ∑ pi = T, subject to i where we assume that 0 ≤ pi ≤ 1, ∀i. Problem (E.4) has a quasiconcave objective function [22] and the optimal solution is p1 = p2 = ... = pK = T /K. The result of this aside is that a constraint on the mean value of a set of probability terms is an upper bound on the product of those probability terms. Thus, from (E.2) and (E.3), we satisfy (E.1) if 2bM + 4b2 ∑Kk=1 Pf FC,k ≤ , K K(M − 1) − M 2 + 2M − 1 + 2b(K − 2M + 2) − 4b2 (E.5) which is an increasing function of b. Thus, the constraint is tighest when b = 1, which gives (4.7) to prove (4.5). The proof of (4.6) is analogous to that of (4.5) and results in constraint (4.8). 59
- Library Home /
- Search Collections /
- Open Collections /
- Browse Collections /
- UBC Theses and Dissertations /
- Convex sensing-reporting optimization for cooperative...
Open Collections
UBC Theses and Dissertations
Featured Collection
UBC Theses and Dissertations
Convex sensing-reporting optimization for cooperative spectrum sensing Noel, Adam Josiah Gerald 2011
pdf
Page Metadata
Item Metadata
Title | Convex sensing-reporting optimization for cooperative spectrum sensing |
Creator |
Noel, Adam Josiah Gerald |
Publisher | University of British Columbia |
Date Issued | 2011 |
Description | In this thesis, we consider the cooperative spectrum sensing problem in cognitive radio with energy detection. Secondary users with non-identical, independent sensing channels make 1-bit sensing decisions and report their decisions to the secondary base station over orthogonal noisy fading channels. The base station has knowledge of the reporting channel coefficients and acts as a fusion center by combining the decisions with an M-out-of-K rule. We allow the secondary users to trade sensing time slots for additional reporting time slots to increase the signal-to-noise ratios of the reporting channels. We derive the corresponding false alarm and missed detection probabilities, which are functions of the secondary sensor decision thresholds and the durations for sensing and reporting. Furthermore, we bound these probabilities and impose a practical convex region to enable the application of convex optimization for minimization of the false alarm probability for a target missed detection probability. We consider the two cases where the instantaneous and the average reporting channels are known for optimization. Allowing secondary users to trade sensing time slots for additional reporting time slots is shown to significantly improve sensing performance in both cases, even with poor sensing channels and a small number of secondary users. |
Genre |
Thesis/Dissertation |
Type |
Text |
Language | eng |
Date Available | 2011-08-22 |
Provider | Vancouver : University of British Columbia Library |
Rights | Attribution-NonCommercial-NoDerivatives 4.0 International |
DOI | 10.14288/1.0072125 |
URI | http://hdl.handle.net/2429/36838 |
Degree |
Master of Applied Science - MASc |
Program |
Electrical and Computer Engineering |
Affiliation |
Applied Science, Faculty of Electrical and Computer Engineering, Department of |
Degree Grantor | University of British Columbia |
GraduationDate | 2011-11 |
Campus |
UBCV |
Scholarly Level | Graduate |
Rights URI | http://creativecommons.org/licenses/by-nc-nd/4.0/ |
AggregatedSourceRepository | DSpace |
Download
- Media
- 24-ubc_2011_fall_noel_adam.pdf [ 484.24kB ]
- Metadata
- JSON: 24-1.0072125.json
- JSON-LD: 24-1.0072125-ld.json
- RDF/XML (Pretty): 24-1.0072125-rdf.xml
- RDF/JSON: 24-1.0072125-rdf.json
- Turtle: 24-1.0072125-turtle.txt
- N-Triples: 24-1.0072125-rdf-ntriples.txt
- Original Record: 24-1.0072125-source.json
- Full Text
- 24-1.0072125-fulltext.txt
- Citation
- 24-1.0072125.ris
Full Text
Cite
Citation Scheme:
Usage Statistics
Share
Embed
Customize your widget with the following options, then copy and paste the code below into the HTML
of your page to embed this item in your website.
<div id="ubcOpenCollectionsWidgetDisplay">
<script id="ubcOpenCollectionsWidget"
src="{[{embed.src}]}"
data-item="{[{embed.item}]}"
data-collection="{[{embed.collection}]}"
data-metadata="{[{embed.showMetadata}]}"
data-width="{[{embed.width}]}"
async >
</script>
</div>
Our image viewer uses the IIIF 2.0 standard.
To load this item in other compatible viewers, use this url:
http://iiif.library.ubc.ca/presentation/dsp.24.1-0072125/manifest