Randomized Masking in Cognitive Radio Networks

A decentralized network of one Primary User (PU) and several Secondary Users (SU) is studied. PU is licensed to exploit the resources, while the party of SUs intend to share the resources with PU. Each SU must guarantee to not disturb the performance of PU beyond a certain level, while maintaining a satisfactory quality of service for itself. It is proposed that each secondary transmitter adopts a Randomized Masking (RM) strategy with full average transmission power where it remains silent or transmits a symbol in its codeword independently from transmission slot to transmission slot. We consider a setup where the primary transmitter is unaware of channel coefficients, code-books of secondary users and the number of secondary users. SUs are anonymous to each other, i.e, they are unaware of each others' code-books, however, each SU is smart in the sense that it is aware of the code-book of PU, channel coefficients and the number of active SUs. Invoking the concept of ε-outage capacity, we define the (ε,ν)-admissible region as the set of masking probabilities for each SU such that the probability of outage for PU is maintained under a threshold \varepsilon in a case where PU sets its transmission rate at a fraction ν of its ε-outage capacity as if there were no SUs in the network. The masking probability of SUs is designed through maximizing the average (with respect to channel coefficients) achievable rate per SU over the (ε,ν)-admissible region. In our analysis, the primary receiver treats interference as noise, however, each secondary receiver has the option to decode and cancel the interference caused by PU, while treating the signals of other SUs as noise. In another approach, referred to as Continuous Transmission with Power Control (CTPC), each SU transmits continuously (no masking is applied), however, it adjusts its transmission power in order to yield the largest value for average achievable rate per SU. The schemes RM and CTPC are compared for different values of transmission power for each SU and PU and distance between different users. It is observed that neither of RM or CTPC always outperforms the other in various scenarios in terms of the underlying system parameters. A combination of RM and CTPC referred to as Randomized Masking with Power Control (RMPC) is also investigated where each SU controls both its probability of masking and average transmission power. It is demonstrated through simulations that RMPC can outperform both RM and CTPC.

[1]  Ying-Chang Liang,et al.  Optimal Power Allocation Strategies for Fading Cognitive Radio Channels with Primary User Outage Constraint , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[3]  Shlomo Shamai,et al.  Capacity and lattice strategies for canceling known interference , 2005, IEEE Transactions on Information Theory.

[4]  H. Vincent Poor,et al.  On unbounded path-loss models: effects of singularity on wireless network performance , 2009, IEEE Journal on Selected Areas in Communications.

[5]  Zhi-Quan Luo,et al.  Dynamic Spectrum Management: When is FDMA Sum-Rate Optimal? , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[6]  Dudley,et al.  Real Analysis and Probability: Measurability: Borel Isomorphism and Analytic Sets , 2002 .

[7]  John M. Cioffi,et al.  Iterative spectrum shaping with opportunistic multiuser detection , 2009, ISIT.

[8]  Wei Wu,et al.  Capacity of a Class of Cognitive Radio Channels: Interference Channels With Degraded Message Sets , 2007, IEEE Transactions on Information Theory.

[9]  Te Sun Han,et al.  A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.

[10]  R.T. Maheswaran,et al.  Decentralized network resource allocation as a repeated noncooperative market game , 2001, Proceedings of the 40th IEEE Conference on Decision and Control (Cat. No.01CH37228).

[11]  K. J. Ray Liu,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Sharing: A Game Theoretical Overview , 2007, IEEE Communications Magazine.

[12]  Shlomo Shamai,et al.  A cognitive network with clustered decoding , 2009, 2009 IEEE International Symposium on Information Theory.

[13]  R.A. Berry,et al.  Spectrum sharing with distributed interference compensation , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[14]  Amir Ghasemi,et al.  Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.

[15]  Roy D. Yates,et al.  Capacity of Interference Channels With Partial Transmitter Cooperation , 2007, IEEE Transactions on Information Theory.

[16]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Haitao Zheng,et al.  Distributed spectrum allocation via local bargaining , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[18]  Kamyar Moshksar,et al.  Randomized Resource Allocation in Decentralized Wireless Networks , 2011, IEEE Transactions on Information Theory.

[19]  Jinhua Jiang,et al.  Ieee Transactions on Information Theory (accepted) on the Achievable Rate Regions for Interference Channels with Degraded Message Sets , 2022 .

[20]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[21]  Wei Yu,et al.  Distributed multiuser power control for digital subscriber lines , 2002, IEEE J. Sel. Areas Commun..

[22]  K. J. Liu,et al.  Dynamic Spectrum Sharing : A Game Theoretical Overview , 2022 .

[23]  Kamyar Moshksar,et al.  Decentralized cognition via Randomized Masking , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[24]  David Tse,et al.  Spectrum Sharing Between Wireless Networks , 2008, INFOCOM.

[25]  Patrick Mitran,et al.  Achievable rates in cognitive radio channels , 2006, IEEE Transactions on Information Theory.

[26]  A. P. Hulbert Spectrum sharing through beacons , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[27]  Michael Gastpar,et al.  On Capacity Under Receive and Spatial Spectrum-Sharing Constraints , 2007, IEEE Transactions on Information Theory.

[28]  Vinod M. Prabhakaran,et al.  Writing on a dirty paper in the presence of jamming , 2014, 2014 IEEE International Symposium on Information Theory.