12
1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member, IEEE, Nan Cheng, Student Member, IEEE, Ning Lu, Student Member, IEEE, Haibo Zhou, Student Member, IEEE, Jon W. Mark, Life Fellow, IEEE, Xuemin (Sherman) Shen, Fellow, IEEE Abstract—In this paper, risk-aware cooperative spectrum ac- cess schemes for cognitive radio networks (CRNs) with multiple channels are proposed, whereby multiple primary users (PUs) operating over different channels choose trustworthy secondary users (SUs) as relays to improve throughput, and in return SUs gain transmission opportunities. To study the multi-channel cooperative spectrum access, cooperation over single channel is investigated first, which involves a PU selecting the suitable SU and granting a period of access time to the selected SU as a reward, considering trustworthiness of SUs. The above procedure is modeled as a Stackelberg game, through which access time allocation and power allocation are obtained. Based on the above results, cooperation over multiple channels is studied from the perspectives of the primary network and secondary network, respectively. Two schemes are proposed accordingly: the primary network-centric matching (PCM) scheme and the secondary network-centric cluster-based (SCC) scheme. In PCM scheme, cooperating SU for each channel is determined to maximize the total utility of the primary network, which is formulated as a maximum weight matching problem. In SCC scheme, SUs first form a cluster to share the channel state information (CSI), and the best SUs are selected for cooperation with PUs over different channels to obtain the maximum aggregate access time for the secondary network. Then, SUs share the obtained resource using congestion game and quadrature signalling. Numerical results demonstrate that, with the proposed schemes, PUs can achieve higher throughput, while SUs can obtain longer average access time, compared with the random channel access approach. Index Terms – Cognitive radio, stackelberg game, congestion game, maximum weight matching. I. I NTRODUCTION With the rapid growth in wireless applications and services, the demand for the spectrum is also rising dramatically, which is increasingly difficult to meet due to the scarcity of spectrum resources. Currently, spectrum is assigned to licensed users on a long term basis to avoid interference among different wireless systems. However, it is recognized that the licensed spectrum is underutilized since licensed users typically do not fully utilize their allocated spectrum most of the time [1] [2]. On the other hand, unlicensed users are being starved for spectrum availability. To cope with such a dilemma, cognitive Manuscript received April 1, 2013; revised August 20, 2013. N. Zhang, N. Cheng, N. Lu, Jon W. Mark and X. Shen are with the De- partment of Electrical and Computer Engineering, University of Waterloo, 200 University Avenue West, Waterloo, ON N2L 3G1, Canada (e-mail:{n35zhang, n5cheng, n7lu, jwmark, sshen}@uwaterloo.ca). H. Zhou is with the Department of Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China (e-mail:[email protected]). radio has been introduced to enhance spectrum utilization by enabling unlicensed users to opportunistically utilize the spec- trum bands [3]–[6]. In cognitive radio networking, licensed users and unlicensed users are referred to as primary users (PUs) and secondary users (SUs), respectively. Traditionally, SUs need to identify idle spectrum bands (or spectrum holes) via spectrum sensing before commencing transmission [7] [8]. However, spectrum sensing is energy-consuming and may not be accurate due to channel fading or shadowing. Moreover, the SU has to terminate the ongoing transmission once it detects that the spectrum band is re-occupied by a PU, making SU’s transmissions highly dynamic [9] [10]. To deal with the aforementioned issues, cooperative spec- trum access has been proposed in cognitive radio networks (CRNs) [11]–[16], whereby SUs cooperate with PUs to im- prove latter’s transmission performance, and in return gain transmission opportunities. Therefore, both PUs and SUs can benefit from cooperation, which creates a win-win situation. With such cooperation between PUs and SUs, cognitive ra- dio network has also been referred to as cooperative CRN (CCRN). Unlike the sensing based spectrum access, where SUs are transparent to PUs, the presence of SUs can be recognized by PUs in CCRN. In [11], the PU leases a fraction of access time to SUs in exchange for cooperation to increase the transmission rate, and during the rewarding time the SUs transmit simultaneously by selecting suitable transmission power. In [12], SUs cooperate to improve the PU’s transmission rate and share the rewarding resource via a payment mechanism. A two-phase cooperation scheme is proposed in [13], whereby the PU transmits its signal to the SU in the first phase, and then the SU decodes the received signal and superimposes it with its own signal to broadcast in the second phase, using different power levels. In [16], different cooperation schemes are proposed, whereby the PU can cooperate with trustworthy SUs to enhance its security level and SUs can gain transmission opportunities. However, all the above works only consider cooperation at the transmission link, i.e., one pair of PU and SU(s), which might not be sufficient to exploit the cooperation benefits in the whole network. This is because there exist multiple links in the network, which causes competition among PUs when they choose SUs. In [17], the authors consider multiple PUs performing cooperation with multiple SUs in the network, where the transmission of PUs are divided into different frames and different pairs of PU and SU perform cooperation over different frames. However, it is still limited to a single channel. In practice, a system usually consists of multiple channels,

Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

1

Risk-aware Cooperative Spectrum Access forMulti-Channel Cognitive Radio Networks

Ning Zhang, Student Member, IEEE, Nan Cheng, Student Member, IEEE, Ning Lu, Student Member, IEEE,Haibo Zhou, Student Member, IEEE, Jon W. Mark, Life Fellow, IEEE, Xuemin (Sherman) Shen, Fellow, IEEE

Abstract—In this paper, risk-aware cooperative spectrum ac-cess schemes for cognitive radio networks (CRNs) with multiplechannels are proposed, whereby multiple primary users (PUs)operating over different channels choose trustworthy secondaryusers (SUs) as relays to improve throughput, and in returnSUs gain transmission opportunities. To study the multi-channelcooperative spectrum access, cooperation over single channel isinvestigated first, which involves a PU selecting the suitable SUand granting a period of access time to the selected SU as areward, considering trustworthiness of SUs. The above procedureis modeled as a Stackelberg game, through which access timeallocation and power allocation are obtained. Based on the aboveresults, cooperation over multiple channels is studied from theperspectives of the primary network and secondary network,respectively. Two schemes are proposed accordingly: the primarynetwork-centric matching (PCM) scheme and the secondarynetwork-centric cluster-based (SCC) scheme. In PCM scheme,cooperating SU for each channel is determined to maximize thetotal utility of the primary network, which is formulated as amaximum weight matching problem. In SCC scheme, SUs firstform a cluster to share the channel state information (CSI), andthe best SUs are selected for cooperation with PUs over differentchannels to obtain the maximum aggregate access time for thesecondary network. Then, SUs share the obtained resource usingcongestion game and quadrature signalling. Numerical resultsdemonstrate that, with the proposed schemes, PUs can achievehigher throughput, while SUs can obtain longer average accesstime, compared with the random channel access approach.

Index Terms – Cognitive radio, stackelberg game, congestiongame, maximum weight matching.

I. INTRODUCTION

With the rapid growth in wireless applications and services,the demand for the spectrum is also rising dramatically, whichis increasingly difficult to meet due to the scarcity of spectrumresources. Currently, spectrum is assigned to licensed userson a long term basis to avoid interference among differentwireless systems. However, it is recognized that the licensedspectrum is underutilized since licensed users typically do notfully utilize their allocated spectrum most of the time [1] [2].On the other hand, unlicensed users are being starved forspectrum availability. To cope with such a dilemma, cognitive

Manuscript received April 1, 2013; revised August 20, 2013.N. Zhang, N. Cheng, N. Lu, Jon W. Mark and X. Shen are with the De-

partment of Electrical and Computer Engineering, University of Waterloo, 200University Avenue West, Waterloo, ON N2L 3G1, Canada (e-mail:{n35zhang,n5cheng, n7lu, jwmark, sshen}@uwaterloo.ca).

H. Zhou is with the Department of Electrical Engineering, Shanghai JiaoTong University, Shanghai, 200240, China (e-mail:[email protected]).

radio has been introduced to enhance spectrum utilization byenabling unlicensed users to opportunistically utilize the spec-trum bands [3]–[6]. In cognitive radio networking, licensedusers and unlicensed users are referred to as primary users(PUs) and secondary users (SUs), respectively. Traditionally,SUs need to identify idle spectrum bands (or spectrum holes)via spectrum sensing before commencing transmission [7] [8].However, spectrum sensing is energy-consuming and may notbe accurate due to channel fading or shadowing. Moreover, theSU has to terminate the ongoing transmission once it detectsthat the spectrum band is re-occupied by a PU, making SU’stransmissions highly dynamic [9] [10].

To deal with the aforementioned issues, cooperative spec-trum access has been proposed in cognitive radio networks(CRNs) [11]–[16], whereby SUs cooperate with PUs to im-prove latter’s transmission performance, and in return gaintransmission opportunities. Therefore, both PUs and SUs canbenefit from cooperation, which creates a win-win situation.With such cooperation between PUs and SUs, cognitive ra-dio network has also been referred to as cooperative CRN(CCRN). Unlike the sensing based spectrum access, whereSUs are transparent to PUs, the presence of SUs can berecognized by PUs in CCRN. In [11], the PU leases afraction of access time to SUs in exchange for cooperationto increase the transmission rate, and during the rewardingtime the SUs transmit simultaneously by selecting suitabletransmission power. In [12], SUs cooperate to improve thePU’s transmission rate and share the rewarding resource viaa payment mechanism. A two-phase cooperation scheme isproposed in [13], whereby the PU transmits its signal to theSU in the first phase, and then the SU decodes the receivedsignal and superimposes it with its own signal to broadcastin the second phase, using different power levels. In [16],different cooperation schemes are proposed, whereby the PUcan cooperate with trustworthy SUs to enhance its securitylevel and SUs can gain transmission opportunities.

However, all the above works only consider cooperation atthe transmission link, i.e., one pair of PU and SU(s), whichmight not be sufficient to exploit the cooperation benefits inthe whole network. This is because there exist multiple linksin the network, which causes competition among PUs whenthey choose SUs. In [17], the authors consider multiple PUsperforming cooperation with multiple SUs in the network,where the transmission of PUs are divided into different framesand different pairs of PU and SU perform cooperation overdifferent frames. However, it is still limited to a single channel.In practice, a system usually consists of multiple channels,

Page 2: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

2

allowing users to communicate simultaneously. Therefore, amore realistic scenario is that cooperation among multiple PUsand multiple SUs could be performed over different channelssimultaneously. However, the existing solutions might not beapplicable, since they are designed either for one pair of PUand SU or multiple PUs and multiple SUs over one channel.Moreover, it is often assumed that SUs are well-behavedduring cooperation. When there exist some dishonest users, oreven malicious ones, those SUs can participate in cooperation,and hence cooperation may incur risks.

In this paper, we make an effort to facilitate cooperationfor multi-channel CRNs, where PUs operating over differentchannels cooperate with SUs to improve throughput and grantrewarding access time to cooperating SUs for their own trans-mission. To study the multi-channel case, cooperation oversingle channel is studied first, which is modeled by Stackelberggame. To evaluate the risk of cooperation with certain SU,the concept of trust value is integrated into the game. Byanalyzing such a game, the cooperation parameters for a pairof PU and SU can be obtained, e.g., the access time allocationcoefficient of the PU and the optimal transmission powerof the SU. Based on the outcome of the Stackelberg game,cooperation over multiple channels in the network is studied tomaximize the total network utility from different perspectives.From the perspective of the primary network, the objectiveis to maximize the PUs’ aggregate throughput of differentchannels. From the perspective of the secondary network, theobjective is to maximize the aggregate rewarding access timeof different channels. Two schemes are proposed accordingly:the primary network-centric matching (PCM) scheme and thesecondary network-centric cluster-based (SCC) scheme. InPCM scheme, cooperating SUs over each channel are deter-mined to maximize the total utility of the primary network,which is formulated as a maximum weight matching problem.In SCC scheme, to better exploit transmission opportunities,SUs first form a cluster based on geographic locations, performcooperation with PUs to obtain the transmission opportunitiesover different channels using the approach for single channelcase, and then share them. To obtain the maximum aggregateaccess time, the best SUs for cooperation with PUs overdifferent channels are determined using maximum weightmatching. To share the obtained access channels with differentrewarding time fairly, SU follows an approach using conges-tion game and quadrature signalling. Specifically, active SUs,which participate in cooperation with PUs as relays, stay in thecurrent operating channel and employ the in-phase componentof quadrature amplitude modulation (QAM) for transmission;while inactive SUs, i.e., other SUs which are not selectedas relays, choose access channels for their own interests byfollowing Nash Equilibrium (NE) of the congestion game andemploy the quadrature component of QAM for transmission.By employing quadrature signalling, the active and inactiveSUs can access channels simultaneously without interferencewith each other [18]. With congestion game, each inactiveSU can gain certain transmission opportunities, and moreimportantly, in a fair way.

The contributions of this work can be summarized asfollows. First, we study cooperation for multi-channel CRNs;

. . .. . .

PU1

PU2

PUj

SUp

SUt

SUi

BS

Figure 1. Cooperative cognitive radio network with multiple channels

and we argue that the existing single channel results areinefficient when applying to multi-channel scenarios. Second,we integrate the trustworthiness of SUs in the cooperationto facilitate the design of risk-aware schemes. Third, coop-eration over multiple channels is studied to maximize thetotal utility of the primary network using maximum weightmatching. Finally, a cluster-based approach for SUs to exploittransmission opportunities over multiple channels is proposed,which integrates congestion game with quadrature signallingfor cluster members to access the rewarding resource.

The remainder of the paper is organized as follows. Thedetailed description of the system model is given in SectionII. Cooperation over single channel and multiple channels arestudied in Section III and Section IV, respectively. Concludingremarks are provided in Section V.

II. SYSTEM MODEL

This section presents the details of the cooperative cognitiveradio networking model under consideration, together with themain system parameters, shown in Table I.

A. MAC Layer

As shown in Fig. 1, the system consists of two components,the infrastructure-based primary network and the ad hoc sec-ondary network. The primary network with multiple channels(K channels) allows K PUs to transmit data simultaneously.Each PU communicates with the base station (BS) over onechannel in a time slot with length T , and the PU overa ceratin channel can be indicated by the channel index,e.g., PUj denotes the PU operating over channel j, wherej ∈ {1, 2, ...,K}. In the secondary network, SUs transmit datato the corresponding receivers. Motivated by the poor qualityof the primary link or large volume of data transmissionrequirement, PUs may seek for the opportunities to cooperatewith SUs to increase the throughput. For cooperation, onePU selects one SU as a relay which adopts the Amplify-and-Forward (AF) mode [19] to forward the PU’s messageto improve the throughput1. In return, the PU grants a periodof access time as a reward to the cooperating SU. Specifically,

1The analysis for Decode-and-Forward (DF) mode is similar to that of AFmode. Hence, we only focus on AF cooperative scheme in the paper.

Page 3: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

3

Table ITHE MAIN NOTATIONS.

Symbol Description

N The set of SUs in the cluster, |N | = NM The set of inactive SUs in the cluster, |M| = MK The set of channels in the network, |K| = Kαi(j) The access time allocation coefficient when the PU on channel j cooperates with SUi

U ip(j) The utility function of the PU on channel j when cooperating with SUi in Stackelberg game

U is(j) The utility function of SUi when cooperating with the PU on channel j in Stackelberg game

P ic (j) The transmission power of the PU on channel j when cooperating with SUi

hips(j) The channel gain from PUj to SUi

hpb(j) The channel gain from PUj to the base stationhisb The channel gain from SUi to the base station

his The channel gain from SUi to the corresponding secondary receiver

P is The transmission power of SUi

Tri The trust value of SUi

Ψi The duration of the rewarding access time of channel iU j

i The utility of SUi in the congestion gameni The total number of inactive SUs choosing channel i in congestion gameζ(ni) The share of channel i which each SU selecting that channel can obtainn(S) The congestion vector corresponding to strategy profile S

for a given channel, e.g., channel j, the cooperation betweenPUj and SUi is carried out in the following way. A fractionαi(j) of the time slot duration T (0 < αi(j) ≤ 1) is used forcooperative communication. Note that for αi(j), i correspondsto SUi and j corresponds to channel j or PUj . In the firstduration of αi(j)T

2 , PUj transmits data to SUi, and in thesubsequent duration of αi(j)T

2 , SUi relays the received datato BS. In the last period of (1 − αi(j))T , which is therewarding time, the cooperating SUi transmits its own datato the corresponding secondary receiver. A common controlchannel is assumed for exchanging information among PUs,SUs, and BS (e.g., CSI), and for delivering the decision of thePUs to the secondary network.

B. Physical Layer

The channels between nodes are modeled as rayleigh block-fading channels, constant within each slot and varying overdifferent slots. The channel gains from PUj to BS, from PUj

to SUi, from SUi to BS, and from SUi to its correspondingsecondary receiver are denoted by hpb(j), hi

ps(j), hisb, and

his, respectively. Similar to [11]–[13], [20], the channel state

information (CSI) is assumed available in the system, whichcan be obtained by periodical pilots. The bandwidth for eachchannel is W . For cooperation, PUj chooses power P i

c(j)for the transmission from PUj to SUi. SUi is constrained tospend the same power P i

s for both the cooperation and its owntransmission so as to ensure that SUi spends at least the samepower for cooperation as which it is willing to spend for itsown transmission. The one-sided power spectral density of theindependent additive white Gaussian noise is N0.

C. Security Threats

If all the SUs are well-behaved, both PU and SU canbenefit from their cooperation. However, when there existsome dishonest or malicious SUs, the normal operation of

CCRN cannot be guaranteed. Specifically, the following se-curity issues arising in CCRN need to be considered.

During cooperation, the malicious SUs can alter the packetsfrom the PU or fabricate packets and then forward them tothe destination. A legitimate SU may be compromised andmisbehaves when it is selected to cooperate with the PU, e.g.,it may launch black or grey hole attack, etc. A dishonestSU may not obey the cooperation rule during cooperationto pursue more self-benefits, e.g., it may transmit its ownpackets instead of relaying the packets from the PU. Moreover,considering the mobility of SUs, the malicious or dishonestSUs may misbehave at one place and then move to otherplaces. Since there is no record of the past behaviors, theseusers can have the same opportunity to be selected to cooperatewith the PU, and then continue to harm the system. As asummary, we list the potential misbehaviors in CCRN asfollows.

1) Selfishness: the cooperating SU may choose a lowertransmission power than the expected one during cooper-ation or it just chooses not to forward the PU’s messageto save energy.

2) Maliciousness: the malicious SU may delete, modify orreplace the bits in the DF mode. In AF mode, it mayintentionally add some jamming signals to corrupt thePU’s signal.

3) Dishonesty: the dishonest SU may provide fake CSI togain transmission opportunities.

Without considering these security threats, the PU may choosean untrustworthy SU for cooperation, which may cause thefailure of cooperation and degrade the QoS of PUs.

III. COOPERATION OVER SINGLE CHANNEL

In this section, we will discuss the cooperation betweena PU and an SU over channel j. Since we focus on a singlechannel, for ease of presentation, the channel indices in relatednotations are omitted, e.g., αi(j) becomes αi, hi

ps(j) becomes

Page 4: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

4

hips, and so on. Due to the poor channel condition or the traffic

requirement, the PU may desire higher throughput which thedirect transmission cannot achieve. In this case, the PU canchoose an SU to act as a cooperating relay to increase itsthroughput, while in return grant a period of access time tothe SU. Therefore, the cooperation can be performed on a basisof mutual benefits, where the PU can increase its throughputwhile the SU can gain transmission opportunities. To evaluatethe risks of cooperation, trust value is applied and the abovecooperation procedure is modeled using Stackelberg game. Insuch a game, the utilities of both the PU and the SU arepresented and analyzed. By analyzing the game, the close-formsolutions for the players’ best strategies are derived, whichconstitute the Stackelberg equilibrium.

A. Trust Computational Model

In an unfriendly environment, the aforementioned securityissues may rise, which cannot be well mitigated by means ofcryptographic methodologies [21]. Thus, trust and reputationsystem is applied to address these issues [22]. Specifically,trust values are assigned to SUs and utilized to evaluate thebehaviors of SUs. The primary system maintains a table forrecording identities and the corresponding trust values of itsone-hop neighboring SUs. In addition, BS keeps the trustvalues of all SUs in its domain. Each time after cooperation,the behavior of the selected SU will be evaluated and the trustvalue will be updated accordingly. Then, the trust value willbe exchanged periodically between the PUs and the BS.

We use a Bayesian framework [23] [24] to evaluate the trustvalues: each entity is assumed to behave well with probabilityp, and misbehave with probability (1−p), i.e., the behavior ofthe entity follows a Bernoulli distribution. Through a series ofobservations, a posteriori probability can be derived to estimatethe future behaviors of the entity. Posteriori probabilities ofbinary events can be represented as the beta distribution. Anexpression of the probability density function (PDF) f(p̂|κ, ι)in terms of the gamma function Γ is given by:

f(p̂|κ, ι) = Γ(κ+ ι)

Γ(κ) · Γ(ι)· p̂(κ−1) · (1− p̂)(ι−1), (1)

where p̂ is the estimate of p, and κ, ι are the two parameters.The expectation of beta distribution is given by E(p̂) = κ

(κ+ι) ,which can be used to represent the trust value of the relevantentity.

In our system, a malicious or dishonest SUi behaves wellwith probability pi and misbehaves with probability 1 − pi.In order to estimate the trustworthiness of SUs, BS needsto observe the ongoing transmission and evaluate the activ-ities of SUs according to the received signals. To determinewhether the relaying SU misbehaves or not, one approach is toutilize tracing symbols, which are known at both the sourceand the destination [25] [26]. Another way is based on thecorrelation between signals received from the source and therelay [27]. In addition, the misbehavior can also be detectedbased on the success or failure of transmitted frames viaacknowledgment (ACK/NACK) [28]. Based on existing worksin the literature, it is assumed that the misbehavior of relaying

nodes can be detected. Consider a process with two possibleoutcomes (misbehavior or well-behavior), and let µ and ν bethe observed number of good behaviors and misbehaviors,respectively. Then, the PDF of observing outcomes in thefuture can be expressed as a function of past observations bysetting: κ = µ+1 and ι = ν +1. Thus, the expected value ofp̂ can be determined from observations as follows:

E(p̂) =µ+ 1

(µ+ ν + 2), (2)

which is used as the trust value Tri of SUi.When new observations of a particular SU are made, e.g.,

δ observed misbehaviors and ξ observed good behaviors, theassociated trust value can be updated using (2) by setting ν :=ν + δ and µ := µ+ ξ.

B. Stackelberg Game between PU and SU

Since the primary user and secondary user are selfish andrational, they might not have a common objective, i.e., the PUand the SU are interested in maximizing their own utilities.Thus, game theory can be applied to model the interactionsbetween the two users. Moreover, considering different prior-ities for spectrum usage of PUs and SUs, Stackelberg gameis most suitable to model the cooperation procedure. In theStackelberg game, the PU acts as the leader and the SU actsas the follower. As the leader, the PU can choose the beststrategies, aware of the effect of its decision on the strategiesof the follower (the SU); while the SU can just choose its ownstrategies given the selected parameters of the PU. The utilityfunctions for both PU and SU are respectively defined in thefollowing. By analyzing the game, the best cooperating SUand the optimal cooperation parameters can be determined.

1) Primary User: Given a fixed time duration T , increasingthe throughput is equivalent to increasing the average trans-mission rate. To this end, the PU selects the most suitable SUfrom the set Sp of its one-hop neighbors. Suppose that SUi

is chosen for cooperation, the PU decides the slot allocationparameter αi and its transmission power P i

c to maximize thepotential profit, on the basis of available instantaneous CSI.

Without cooperation, the transmission rate of the directcommunication can be given by

Rd = W log2(1 +P |hpb|2

N0). (3)

For cooperation, the transmission rate Ric through AF co-

operative communication between the PU and SUi is given asfollows:

Ric =

αiW

2log2[1 +

P ic |hpb|2

N0+ f(P i

c

∣∣hips

∣∣2 , P is

∣∣hisb

∣∣2)], (4)

where

f(P ic

∣∣hips

∣∣2 , P is

∣∣hisb

∣∣2) = 1

N0

P ic

∣∣hips

∣∣2 P is

∣∣hisb

∣∣2P ic

∣∣hips

∣∣2 + P is

∣∣hisb

∣∣2 +N0

.

The factor αi

2 accounts for the fact that αiT is used for co-operative relaying, which is further split into two phases. ThePU chooses cooperation only when the transmission rate via

Page 5: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

5

cooperation is greater than that of the direct communication.Considering the trust value Tri of each neighboring SUi, theutility function is given by

U ip = Tri ·Ri

c, (5)

which indicates the expected transmission rate the PU canachieve through cooperation with SUi. The objective of the PUis to maximize its utility function and the strategy is to choosethe most suitable SU from the set of its one-hop neighboringSUs and the cooperation parameters, i.e., the slot allocationparameters αi and the transmission power P i

c for cooperationwith the selected SUi.

2) Secondary User: The SU can gain transmission opportu-nities through cooperation with the PU. In particular, the SUrelays PU’s data in the second phase and transmits its owndata in the last phase. Assuming cooperation with the PU,the selected SUi decides its transmission power, pertaining tothe given α . The target of the SU is to maximize through-put (equivalent to the transmission rate) without expendingtoo much energy. Following the cooperation agreement, SUi

spends the same power P is for both cooperative and secondary

transmissions. In particular, the transmission rate Ris for

secondary transmission between SUi and its correspondingreceiver is given by

Ris(αi) = (1− αi)W log2(1 +

P is

∣∣his

∣∣2N0

). (6)

With energy consumption P is(1− αi

2 )T , the utility function ofSUi can be represented by Ri

s(αi)T−c·P is(1− αi

2 )T , where c(0 < c < 1) is the weight of energy consumption in the overallutility. With a smaller c, the SU values throughput more thanenergy consumption, and vice versa. Over the period of T , theutility function of SUi is given by

U is(αi) = W log2(1 +

P is |hi

s|2N0

)(1− αi)− c(1− αi

2 )P is . (7)

The objective of SUi in the game is to maximize its utility bychoosing the optimal transmission power P i

s .

C. Game AnalysisAs a sequential game, the Stackelberg game can be analyzed

by the backward induction method. First, the optimal strategyof the SU (the follower) is analyzed, assuming the strategyof the PU (the leader) is fixed. Second, the PU decides theoptimal strategy, aware of the outcomes of the first step. Bydoing so, the best response functions of both the PU and theSU are derived such that the corresponding utilities can bemaximized. Then, the Stackelberg equilibrium of the proposedgame can be achieved based on the best response functions.

1) Best Response Function of the SU: Assuming that thePU uses αi for cooperation, SUi selects the optimal transmis-sion power to maximize its utility, which can be formulatedas the following optimization problem:

maxP isU is(αi) = (1−αi)W log2(1 +

P is |hi

s|2N0

)− c(1− αi

2 )P is

s.t. 0 ≤ P is ≤ Pmax,

where Pmax is the power constraint for SUi. Solving the aboveproblem, the optimal transmission power can be determined.

Definition 1: Let P ∗is (αi) be the best response function

of the secondary user if the utility of SUi can achieve themaximum value when P ∗i

s (αi) is selected, for any given αi,i,e., ∀ 0 < αi < 1, U i

s(P∗is (αi), αi) ≥ U i

s(Pis(αi), αi).

Theorem 1: The best response function of the secondaryuser P ∗i

s (αi) is given by P ∗is (αi) = min{ (1−αi)W

c(1−αi2 ) ln 2

−N0

|his|

2 , Pmax}, when the primary user selects a certain αi forcooperation.

Proof: Given the time allocation coefficient αi, the utilityfunction of SUi is given as follows:

U is(αi) = (1− αi)W log2(1 +

P is

∣∣his

∣∣2N0

)− c(1− αi

2)P i

s . (8)

From the above equation, it is easy to prove that the utilityfunction first increases and then decreases with the increase ofP is without considering the power constraint. Therefore, there

exists an optimal power such that U is can reach the maximum

value at that transmission power. Taking the first order partialderivative of the utility function with respect to P i

s yields

∂U is

∂P is

=(1− αi)W

∣∣his

∣∣2(1 +

P ish

i2s

N0)N0 ln 2

− c(1− αi

2). (9)

Setting ∂(Uis)

∂(P is)

= 0 yields the optimal transmission power,which is given by

(1− αi)W

c(1− αi

2 ) ln 2− N0

|his|

2 . (10)

Taking the power constraint into consideration, the best re-sponse function P ∗i

s (αi) will be

P ∗is (αi) = min{ (1− αi)W

c(1− αi

2 ) ln 2− N0

|his|

2 , Pmax}. (11)

This completes the proof.The first order derivative of the best response function with

respect to αi is given by −αiW(−2+a)2c ln 2)

, which is negative.Therefore, the best transmission power of SUi is a decreasingfunction of αi. It is explained by that the SU is willing tospend more transmission power during cooperation if the PUallocates more time for the SU’s transmission.

2) Best Response Function of the PU: Aware of the bestresponse function of the SU, the PU decides its own beststrategy for utility maximization. Thus, the best responsefunction can be derived by solving the following optimizationproblem:

maxαi,P ic ,i

αiW2 log2[1 +

P ic |hpb|2N0

+ f(P ic

∣∣hips

∣∣2 , P is

∣∣hisb

∣∣2)]s.t. 0 < P i

c ≤ Pmax, 0 < αi ≤ 1, SUi ⊆ Sp.

Definition 2: Let α∗, P ∗i∗c , i∗ be associated with the best

response function of the primary user if the utility of the PUcan achieve the maximum value when this strategy is selected.

Theorem 2: The best response function of the pri-mary user α∗, P ∗i∗

c , i∗ can be given by (α∗, P ∗i∗c , i∗) =

argmaxαi,P ic ,i

U ip. In particular, i∗ = argmaxU i

p(P∗ic , α∗

i ),where

P ∗ic = Pmax

Page 6: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

6

α∗i =

(15), if Wc ln 2 − N0

|his|2

< Pmax

max{2 + 2c ln 2W (Pmax+

N0

|his|2

)−2, (15)}, otherwise

(12)P ∗ic and α∗

i are the optimal transmission power and timeallocation coefficient respectively, assuming cooperation withSUi. The optimal P ∗i∗

c and α∗i correspond to the selected i∗.

Proof: Since the first order derivative of the utilityfunction with respect to P i

c is always positive, Up is amonotonically increasing function as P i

c increases. Moreover,considering the parameters P i

c and αi are independent, P ic

should be selected as the maximum power so that the util-ity can reach the maximum value. Therefore, to solve theoptimization problem, it is equivalent to optimize the utilityfunction when P i

c = Pmax and SUi selects the best responseP ∗is (αi). Since the first term in (11) monotonically decreases

with respect to αi, its maximum value is Wc ln 2 − N0

|his|

2 .

When Wc ln 2 − N0

|his|

2 < Pmax, P ∗is (αi) always takes the

value of the first term in (11). Substituting P ic = Pmax and

P ∗is (αi) =

(1−αi)W

c(1−αi2 ) ln 2

− N0

|his|

2 into the utility function of PU,the utility can be expressed by

U ip =

αiW

2log2[1 +

Pmax |hpb|2

N0+

f(Pmax

∣∣hips

∣∣2 , P ∗is (αi)

∣∣hisb

∣∣2)], (13)

which is a function of αi. The first order derivative of (13) isgiven by

∂U ip

∂αi= A · α2

i +B · αi + C, (14)

where

A =Pmax

∣∣hips

∣∣2 c+ 2W∣∣hi

sb

∣∣2 +N0c

B =− 2Pmax

∣∣hips

∣∣2 c− 4W∣∣hi

sb

∣∣2 − 2N0c = −2 ·A

C =2W∣∣hi

sb

∣∣2 .To find the optimal α∗

i such that Up can be maximized, setfirst order derivative of (13) equal to 0. Since C < A, we haveB2 − 4AC > 0. Thus, the above quadratic function has realroot(s). Considering the range of αi (0 < αi < 1), there existsone and only one root αr. The optimal α∗

i is given by

α∗i = αr = 1−

√1− C

A

= 1−

√√√√1−2W

∣∣hisb

∣∣2Pmax

∣∣hips

∣∣2 c+ 2W∣∣hi

sb

∣∣2 +N0c

(15)

When Wc ln 2 − N0

|his|

2 ≥ Pmax, there exists α0 in the rangefrom 0 to 1, such that P ∗

s (α0) = Pmax. Specifically, α0 =2+ 2

D−2 , where D = c ln 2W (Pmax +

N0

|his|

2 ). The reason is thatthe range of D is from 0 to 1 due to the assumption thatW

c ln 2 − N0

|his|

2 ≥ Pmax. For αi ≤ α0, P ∗is (αi) always takes

the value of Pmax. Hence, U ip reaches the maximum value in

that range when α0 is chosen. For α0 < αi ≤ 1, there existsone and only one root αr for the above quadratic function,which is in the range from 0 to 1. If αr < α0, then ∂Up

∂αi< 0

when α0 < αi ≤ 1. The derivative of Up with respect toαi is monotonically decreasing. Thus, the optimal α∗

i = α0.Otherwise, the optimal α∗

i = αr.Based on the above analysis, the optimal α∗

i can be givenas (12) in the theorem 2.

This completes the proof.

D. Existence of the Stackelberg EquilibriumIn this section, we prove that the solutions P ∗

s in (11) andα∗ in (12) are the Stackelberg Equilibrium. For this purpose,we discuss the two cases with/without considering the powerconstraint of the SU using the following properties. The de-tailed proof for the properties can be found in Appendix. Basedon the properties, we first prove the existence of StackelbergEquilibrium when the power constraint is not considered.

Property 1. The utility function Us of the SU is concavewith respect to its own power level Ps when the time allocationcoefficient α is fixed.

For both cases, Property 1 always holds, which shows theconcavity of the utility function of the SU. Due to Property1, Us is concave with respect to Ps. Without consideringthe power constraint, setting ∂(Ui

s)∂(P i

s)= 0 yields the optimal

transmission power P ∗s , which is given in (10). With P ∗

s in(10), the SU can maximize its utility Us.

For the case without considering the power constraint, wealso have the following properties.

Property 2. For all SUs, the optimal transmission powerP ∗s in (10) decreases with the time allocation coefficient α.Property 3. The utility function of the primary user is

concave with respect to the time allocation coefficient α, giventhat the optimal transmission power P ∗

s of the SU in (10) isfixed.

Due to Property 2, there is a trade-off for the PU to select thetime allocation coefficient α. When the PU allocates less timeto the cooperating SU for transmission, the SU will choosea lower transmission power during cooperation, which resultsin a reduction in the utility of the PU. When the PU allocatesmore time for the SU, the PU will have less time for its owntransmission, which may also lead to a decrease in its utility.In other words, the PU cannot keep increasing its utility byincreasing α.

Due to Property 3, the optimal α can be obtained bysetting ∂Up

∂α = 0, since the utility function of the PU isconcave with respect to α. Therefore, the PU can always findits optimal time allocation coefficient α∗ in (15) such thatUp(α

∗) ≥ Up(α). Together with Property 1, given the timeallocation coefficient α, the SU can always find its optimaltransmission power P ∗

s in (10). Then, P ∗s in (10) and α∗ in

(15) are the Stackelberg Equilibrium.In the following, we will discuss the case with power con-

straint. Due to Property 2, P ∗s in (10) increases as α decreases.

For a given value of α, P ∗s may achieve its maximum value

Pmax. Since the scenario before P ∗s approaches Pmax is the

same as the case without power constraint, we only discussthe case when P ∗

s = Pmax. When the SU chooses Pmax, it isoptimal for the PU to choose α0, as in the analysis of α∗ inSection III-C2. Therefore, we conclude that the solutions P ∗

s

in (11) and α∗ in (12) are the Stackelberg Equilibrium.

Page 7: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

7

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

0.7

0.8

0.9

1

1.1

1.2

1.3

Normlized distance

Thr

ough

put o

f PU

(bp

s/H

z)

c=0.2c=0.5

Figure 2. Throughput of PU, averaged over fading, versus the normalizeddistance d.

E. Numerical ResultsIn this part, we present numerical results so as to provide

insight into the proposed cooperative framework. Similar to[11], by normalizing the distance between PU and BS, the SUis approximately placed at the distance d ∈ (0, 1) from thePU and 1−d from the BS. Considering a path loss model, theaverage power gains between the PU and SU, and between theSU and BS, are

∣∣hips

∣∣2 = 1dζ and

∣∣hisb

∣∣2 = 1(1−d)ζ

, respectively,where ζ = 3.5 is the path loss coefficient. Aiming at reducingthe system parameters, the maximum secondary transmissionpower Pmax is normalized to 1 and we choose Pmax/N0 =0 dB.

Fig. 2 shows the the PU’s throughput on certain channel,averaged over fading, versus the normalized distance d, for c= 0.2 and 0.5. It is seen that there exists a cooperation range inwhich the PU can cooperate with the SU to achieve a higherthroughput than that of direct transmission. Further, a smallerweight c results in a larger cooperation range.

Fig. 3 shows the impact of trust values on the SU selection.A number of SUi (i = 1, 2, 3, 4, 5) with associated trust values0.75, 0.99, 0.85, 0.9, and 0.95, are located at the normalizeddistances d = 0.3, 0.4, 0.5, 0.6, and 0.7, respectively. Withoutconsidering trust values, the PU should select SU3 sincethe PU can achieve the highest throughput via cooperationwith SU3. Considering trust values of SUs, SU2 is the bestchoice since the PU can attain highest expected throughputvia cooperation with SU2.

IV. COOPERATION OVER MULTIPLE CHANNELS

For cooperation over multiple channels, which involvesmultiple PUs and SUs, the approach aforementioned for thesingle channel cannot bring the maximum benefit to the wholenetwork because it only optimizes the interest of individualusers. Therefore, it is necessary to consider the cooperationin the whole network to exploit the cooperation benefits. Tothis end, we study the cooperation over multiple channels inthis section, from the perspectives of the primary network andsecondary network, respectively. Two schemes are proposedaccordingly: PCM scheme and SCC scheme, to better exploitthe overall cooperation benefits in the whole network.

A. Primary Network-Centric Matching SchemeFrom the perspective of the primary network, since the

cooperation can be carried out between multiple PUs and mul-

0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.80

0.25

0.5

0.75

1

1.25

1.5

Position of SUs

Exp

ecte

d th

roug

hput

(bp

s/H

z)

without trust valuewith trust value

Figure 3. The impact of trust value on SU selection.

tiple SUs simultaneously, there may exist competition amongPUs when selecting SUs. Moreover, the best SU selection forone single channel might not be optimal for the whole primarynetwork. Considering above, PCM scheme is proposed, withthe objective of maximizing the total utility of the primarynetwork, which is defined as the aggregate throughput of PUsover different channels. Note that the throughput of a ceratinchannel is obtained when the PU over that channel cooperateswith a certain SU using the Stackelberg Equilibrium strategy.

Specifically, as the central controller, the base station isconsidered to have the global information in its domain, e.g.,CSI. With the information, the base station can guide the PUsto select the suitable SUs, with the objective of maximizingthe total utility of the primary network. Consider that there areK PUs simultaneously operating over different channels andN SUs seeking for transmission opportunities. Denote by Ii,jthe indicator which indicates whether PUj cooperates withSUi or not. Then, we have

Ii,j =

{1 if PUj cooperates with SUi

0 otherwise.(16)

Selecting SUs is equivalent to determining all the indicatorsIi,j , where i ∈ {1, 2, ..., N} and j ∈ {1, 2, ...,K}. Such aproblem can be formulated as follows:

maxN∑i=1

K∑j=1

Ii,jUip(j)

s.t.∑i

Ii,j ≤ 1,∀i = 1, 2, ..., N∑j

Ii,j ≤ 1,∀j = 1, 2, ...,K

Ii,j ∈ {0, 1},∀i ∈ {1, 2, ..., N}, ∀j ∈ {1, 2, ...,K}

(17)

Note that U ip(j) is the utility of the PU on channel j when

cooperating with SUi, which is given by (5).The above problem can be transformed into the maximum

weight bipartite matching problem, which can be solved inpolynomial time [29]. Fig. 4 shows the bipartite graph, wherethe weight wi,j on each edge represents the expected transmis-sion rate, i.e., U i

p(j) in (5), if the corresponding PUj and SUi

(represented by vertices) cooperate with each other. Findingthe optimal partner is equivalent to finding the maximumweight matching in Fig. 4. To solve the maximum weightbipartite matching problem, Hungarian algorithm [30] can be

Page 8: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

8

Figure 4. Bipartite graph for PCM scheme.

used which is a well known algorithm to find the matchingsuch that the sum of the weights can be maximized. By doingso, the best matching can be found such that the aggregatethroughput of the primary network is maximized.

B. Secondary Network-Centric Cluster-Based Scheme

From the perspective of the secondary network, for a certainSU, it can only select one channel one time to performcooperation over that channel. It is possible that multipleSUs compete with each other over some channels to gainthe transmission opportunities, while no suitable SUs exist toexploit the transmission opportunities over the other channels.Therefore, for the whole secondary network, the transmissionopportunities are not efficiently utilized; for the individual SU,it is not guaranteed that the SU can gain the chance to accessthe channel since it also depends on other SUs selecting thesame channel.

To exploit the transmission opportunities efficiently, SCCscheme is proposed with the objective of maximizing thetotal utility of the secondary network, which is defined as theaggregate rewarding access time of different channels. Notethat the rewarding access time of a given channel is obtainedwhen the SU cooperates with the PU over that channel usingthe Stackelberg Equilibrium strategy. Since the secondarynetwork is ad hoc network, to maximize the total networkutility and the average access time per user, SUs form acluster and perform cooperation with PUs to gain transmissionopportunities, and then share the obtained resource fairly.

Specifically, SUs first form a cluster N with the size ofN based on the geographic locations, and contribute to sharethe information, e.g., CSI. Then, the best SUs can be selectedfor each channel to cooperate with PUs in order to obtainthe maximum aggregate rewarding access time of differentchannels. To this end, a similar matching approach as in theprevious section can be applied. The differences are as follows:i) the weights are the rewarding times, e.g., the correspondingweight is (1−αi(j))T , if SUi chooses to cooperate with PUj ;and ii) the objective is to maximize the aggregate rewardingtime by finding the best matching. After that, the selected SUscooperate with the corresponding PUs to obtain the rewardingaccess time. Finally, SUs in the cluster share the obtainedrewarding time fairly. To do this, SUs can be classified into

two groups: active SUs (the selected SUs for performingcooperation with PUs as relays) and inactive SUs (with the sizeof M ). Since active SUs devote the transmission power duringcooperation, they should have a larger share of the rewardingtime. To this end, two groups of users first share the resourceusing quadrature signaling, i.e., the active SUs stay in thecurrent operating channel and use the in-phase component ofQAM, while the inactive SUs select one channel to access andemploy the quadrature component. By leveraging quadraturesignaling, active and inactive SUs can transmit simultaneouslywithout interference with each other [20]. Then, inactive SUshave to decide which channel to access to maximize their ownutilities, i.e., the shares of rewarding time for accessing thechannels. The decision process is modeled as a congestiongame and the share that each inactive SU can obtain isdetermined by the Nash Equilibrium (NE) of the congestiongame. By doing so, each SU can be guaranteed to gain certainaccess time. Moreover, the average access time obtained usingthe cluster based approach is longer than that using the randomchannel access approach, as shown in the numerical results.

Each inactive SU selects one channel to access amongmultiple channels with different rewarding time, to max-imize its own utility. The decision process is modeledas a congestion game, which is defined by the tuple{M,K, (

∑i)i∈M, (U i

j)i∈M,j∈K}, where M = {1, 2, ...,M}denotes the set of inactive SUs, K = {1, 2, ...,K} denotesthe set of channels,

∑i represents the strategy space of SUi,

and U ji is the utility function of SUi for selecting channel j.

The utility function is a function of the total number of SUschoosing the same channel, which is a decreasing function dueto competition or congestion. In other words, more SUs selectthe same channel, less share each SU can obtain. SUs aim tomaximize its utility by deciding which channel to access andthe utility function of SUi can be given by

U ji = Ψjζ(nj), (18)

where Ψj is the duration of the rewarding time on channelj, ζ(nj) is the share of the rewarding time on channel jwhich SUi obtains, and nj is the total number of inactiveSUs choosing the channel j. Therefore, U i

j represents theaccess time that SUi obtains. For simplicity, the inactive SUsselecting the same channel share the rewarding time equallyusing TDMA, and then ζ(ni) = 1/ni.

In the above congestion game, each SU chooses a singlechannel to access for maximizing its utility. If each one haschosen a strategy and no SU can increase its utility by chang-ing strategy while the strategies of others keep unchanged, thecurrent set of strategies constitutes an NE.

Definition 3: A strategy profile S∗ = (s∗1, s∗2, . . . , s

∗M ) is an

NE if and only if

Ui(s∗i , s

∗−i) ≥ Ui(s

′i, s

∗−i), ∀i ∈ M, s′i ∈ Si, (19)

where si and s−i are the strategies selected by SUi and all ofits opponents, respectively. NE means no one can increase itsutility unilaterally.

It is known that the congestion game always exists pure NE.The condition for NE in the congestion game can be given as

Page 9: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

9

Algorithm 11: // Initialization: Form the cluster based on geographic

locations2: // Procedure 1: Best SUs Selection3: for each SUi ∈ N do4: for PUj on channel j, j ∈ K do5: Calculate access time allocation αi,j using (12)6: Calculate rewarding periods Ψi,j = 1− αi,j .7: end for8: end for9: Run Hungarian algorithm to find the best SUs for coop-

eration10: // Procedure 2: Rewarding Access Time Sharing11: Set congestion vector n(S) = (n1, ..., nK) = (0, 0, ..., 0).12: Order the rewarding periods on each channel

[Ψ1,Ψ2, . . . ,ΨK ] decreasingly according to the length.13: for each SUi ⊆ N do14: if SUi is active SU then15: SUi stays in the current operating channel.16: SUi employs the in-phase component for transmis-

sion.17: else18: for each Ψj , where j ⊆ K do19: Calculate Ψjζ(nj + 1).20: end for21: SUi selects the channel with maximum Ψjζ(nj+1).22: SUi employs the quadrature component for transmis-

sion.23: nj = nj + 1.24: end if25: end for26: return

follows:

ni = ⌈ΨiM −

∑j ̸=i,j∈K Ψj∑

j∈K Ψj⌉+ n′, (20)

where n′ ∈ {0, 1, 2, . . . , ⌈ΨiM+Ψi(K−1)∑k∈K Ψk

⌉ −

⌈ΨiM−∑

k ̸=i,k∈K Ψk∑k∈K Ψk

⌉ − 1}. The detailed proof can befound in [31]. Any strategy profile which satisfies the abovecondition in (20) will constitute an NE. However, there existmultiple NEs in our congestion game. In order for the SUsto select an NE strategy, the procedure 2 in algorithm 1 canbe used for SUs to determine which channel to access.

The whole procedure of SCC scheme is presented in Al-gorithm 1, which consists of two main parts: the best SUsselection and rewarding access time sharing.

C. Numerical Results

Similar to the work in [32], we set up the simulationscenario as follows: The base station is located at the origin(0, 0) and PUs are randomly located between (0, dp,min)and (0, dp,max); while SUs are randomly located between(0, ds,min) and (0, ds,max). The number of PUs is set to 5.The distances between nodes are normalized by dp,max and

6 7 8 9 10 11 12 13 14 155.2

5.3

5.4

5.5

5.6

5.7

5.8

5.9

Number of SUs

Thr

ough

put o

f prim

ary

netw

ork

(bps

/Hz)

PCM schemeRandom access

Figure 5. Throughput of the primary network averaged over fading versusnumber of SUs

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.94.4

4.6

4.8

5

5.2

5.4

5.6

5.8

6

6.2

Position of the cluster

Thr

ough

put o

f prim

ary

netw

ork

(bps

/Hz)

PCM scheme

Random access

Figure 6. Throughput of the primary network, averaged over fading, versusthe position of the cluster

the previous path loss model is utilized to calculate averagepower gains.

Fig. 5 shows the throughput of the primary network, aver-aged over fading, versus the number of SUs where dp,min =15, dp,max = 20, ds,min = 5, and ds,max = 10, respectively.It can be seen that the proposed scheme outperforms therandom channel access approach whereby each SU randomlyselects one channel to seek transmission opportunities throughcooperation. The result of random access approach is obtainedby Monte Carlo simulation consisting of 1000 trials.

Fig. 6 shows the throughput of the primary network, aver-aged over fading, with respect to the position of the cluster.We fix the range of the SUs’ locations (i.e., ds,max − ds,min)and change ds,min. The position is estimated by the relativedistance from ds,min to dp,min normalized by dp,max. It canbe seen that the throughput first increases and then drops whenthe cluster moves closely to PUs. The reason is that when thecluster is too close to PUs, the channels between SUs and thebase station become poor; and when the cluster is too far awayfrom PUs, the channels between SUs and PUs are poor. As aresult, the cooperation gain is limited.

Fig. 7 shows the impact of the number of inactive SUs (M )on the NE of the congestion game. Define channel selectionindicator of channel i as the number of inactive SUs choosingchannel i divided by the total number of inactive SUs, i.e.,ni/M , which reflects the popularity of the channel. When Mis small, some channel(s) may not be chosen by any SU. Forexample, there is no inactive SU choosing channel 1 whenM = 8. When M becomes higher, all channels are selectedby at least one SU and the selection indicator of each channelalso changes to satisfy the NE condition.

Page 10: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

10

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

channel index

chan

nel s

elec

tion

indi

cato

r

M=8M=16

Figure 7. Impact of the number of inactive SUs on Nash Equilibrium

6 8 10 12 14 16 18 200.05

0.1

0.15

0.2

0.25

0.3

Number of SUs

Ave

rage

rew

ardi

ng ti

me

per

SU

SCC schemeRandom access

Figure 8. Average access time per SU averaged over fading for SCC schemeand random channel access

Fig. 8 shows the average access time per user, averaged overfading, versus the size of the cluster. We compare the proposedscheme with the random channel access approach. It can beseen that each SU can obtain longer access time using theproposed scheme, compared with the random channel accessapproach.

Fig. 9 shows the fairness among SUs, averaged over fading.Similar to [33], the fairness is defined as (

∑i Ui)

2

N∑

i U2i

, whereUi is the access time obtained by SUi. It can be seen thatthe fairness of the proposed scheme outperforms the randomaccess approach. This is because each SU can obtain a certainshare of access time using SCC scheme, while only a few SUscan exclusively access the channel using the random channelaccess approach.

Fig. 10 shows the average access time per SU, averagedover fading, when using PCM scheme and SCC scheme,respectively. It reveals that the average access time using SCCscheme is greater than that using PCM scheme. The reason isthat PCM scheme is based on the perspective of the primarynetwork to maximize PUs’ utility while SCC scheme aims tomaximize SUs’ utility.

V. CONCLUSIONS

In this paper, we have proposed risk-aware cooperativespectrum access schemes for multi-channel CRNs. We havestudied cooperation on a single channel by Stackelberg game.Based on the results of the single channel scenario, we haveproposed two schemes for the cooperation on multiple chan-nels scenario, i.e., PCM scheme and SCC scheme, from theperspective of primary and secondary network, respectively.In PCM scheme, to maximize the total utility of the primary

6 8 10 12 14 16 18 200.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Number of SUs

Fai

rnes

s am

ong

SU

s

SCC schemeRandom access

Figure 9. Fairness among SUs versus the number of SUs

6 7 8 9 10 11 12 13 14 150

0.05

0.1

0.15

0.2

0.25

0.3

0.35

Number of SUs

Ave

rage

rew

ardi

ng ti

me

per

SU

SCC schemePCM scheme

Figure 10. Average access time per SU averaged over fading for PCMscheme and SCC scheme

network, cooperating SU on each channel is determined usingmaximum weight matching. In SCC scheme, SUs form acluster to maximize the total utility of the secondary networkand share the obtained resources based on congestion gameand quadrature signaling. Numerical results have demonstratedthat, with the proposed schemes, the PUs can achieve higherthroughput, while the SUs can obtain longer average accesstime, compared with the random channel access approach.

For future work, we will design a misbehavior detectionmechanism dedicated to CCRN. In addition, we will exploitthe channel statistic information to make the proposed schememore efficient. The effect of imperfect CSI on cooperation willbe studied as well.

VI. ACKNOWLEDGEMENT

This work has been supported by The Natural Sciencesand Engineering Research Council (NSERC) of Canada underGrant No. RGPIN7779.

APPENDIX

A. Proof of Property 1

Taking the first order partial derivative of the utility functionwith respect to Ps yields

∂Us

∂Ps=

(1− α)W |hs|2

(1 +Psh2

s

N0)N0 ln 2

− c(1− α

2). (21)

Then, we have

∂U2s

∂P 2s

= − (1− α)W |hs|4

(1 +Psh2

s

N0)2N2

0 ln 2. (22)

Page 11: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

11

From the above equation, we can see that ∂U2s

∂P 2s< 0. Therefore,

the utility function U is of SUi is concave in its own power level

P is when the time allocation is fixed.

B. Proof of Property 2

For a given SU, the optimal transmission power is given by

P ∗s (α) =

(1− α)W

c(1− α2 ) ln 2

− N0

|hs|2. (23)

Taking the first derivative of P ∗s with respect to α, we have

∂P ∗s

∂α=

−αW

(−2 + α)2c ln 2

. (24)

The denominator is always positive, while the numerator isnegative. Then, ∂P∗

s

∂α < 0. Therefore, the optimal transmissionpower P ∗

s decreases with α.

C. Proof of Property 3

Since P ∗s is continuous with α, the utility function Up

of the PU is also continuous with α. Substituting P ∗s (α) =

(1−α)Wc(1−α

2 ) ln 2 − N0

|hs|2into Up, the utility can be given by (13),

which is a function of α. Taking first order derivative of (13)withe respect to α yields (14). Then, taking second orderderivative of (13) with respect to α yields

∂2Up

∂α2= 2 ·Aα+B. (25)

Since A > 0, B = −2A, and 0 < α < 1, we have ∂2Up

∂α2 < 0.Therefore, the utility function of the primary user is concavein the time allocation coefficient α.

REFERENCES

[1] FCC, “Spectrum policy task force,” ET Docket, vol. 02, p. 135, Nov.2002.

[2] S. Haykin, “Cognitive radio: brain-empowered wireless communica-tions,” IEEE Journal on Selected Areas in Communications, vol. 23,no. 2, pp. 201–220, 2005.

[3] I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty, “Next genera-tion/dynamic spectrum access/cognitive radio wireless networks: a sur-vey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.

[4] S. Gunawardena and W. Zhuang, “Service response time of elastic datatraffic in cognitive radio networks,” IEEE Journal on Selected Areas inCommunications, vol. 31, no. 3, pp. 559–570, 2013.

[5] N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Co-operative cognitive radio networking for opportunistic channel access,”in Proceedings of IEEE GLOBECOM, 2013.

[6] Y. Liu, L. X. Cai, and X. Shen, “Spectrum-aware opportunistic routingin multi-hop cognitive radio networks,” IEEE Journal on Selected Areasin Communications, vol. 30, no. 10, pp. 1958–1968, 2012.

[7] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithmsfor cognitive radio applications,” IEEE Communications Surveys &Tutorials, vol. 11, no. 1, pp. 116–130, 2009.

[8] H. T. Cheng and W. Zhuang, “Simple channel sensing order in cognitiveradio networks,” IEEE Journal on Selected Areas in Communications,vol. 29, no. 4, pp. 676–688, 2011.

[9] A. Ghasemi and E. Sousa, “Spectrum sensing in cognitive radio net-works: requirements, challenges and design trade-offs,” IEEE Commu-nications Magazine, vol. 46, no. 4, pp. 32–39, 2008.

[10] D. Cabric, S. Mishra, and R. Brodersen, “Implementation issues inspectrum sensing for cognitive radios,” in Proceedings of the 38th.Asilomar Conference on Signals, Systems, and Computers, 2004.

[11] O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, andR. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc net-works,” IEEE Journal on Selected Areas in Communications, vol. 26,no. 1, pp. 203–213, 2008.

[12] J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperativecognitiveradio networks,” in Proceedings of the tenth ACM internationalsymposium on Mobile ad hoc networking and computing, 2009.

[13] Y. Han, A. Pandharipande, and S. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Transactionson Wireless Communications, vol. 8, no. 10, pp. 4945–4950, 2009.

[14] S. Hua, H. Liu, M. Wu, and S. Panwar, “Exploiting mimo antennasin cooperative cognitive radio networks,” in Proceedings of IEEEINFOCOM, 2011.

[15] Y. Han, S. Ting, and A. Pandharipande, “Cooperative spectrum sharingprotocol with secondary user selection,” IEEE Transactions on WirelessCommunications, vol. 9, no. 9, pp. 2914–2923, 2010.

[16] N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Cooperativespectrum access towards secure information transfer for crns,” IEEEJournal on Selected Areas in Communications, to appear.

[17] Y. Yi, J. Zhang, Q. Zhang, T. Jiang, and J. Zhang, “Cooperativecommunication-aware spectrum leasing in cognitive radio networks,”in Proceedings of IEEE Symposium on New Frontiers in DynamicSpectrum, 2010.

[18] V. Mahinthan, J. W. Mark, and X. Shen, “A cooperative diversityscheme based on quadrature signaling,” IEEE Transactions on WirelessCommunications, vol. 6, no. 1, pp. 41–45, 2007.

[19] J. Laneman, D. Tse, and G. Wornell, “Cooperative diversity in wirelessnetworks: Efficient protocols and outage behavior,” IEEE Transactionson Information Theory, vol. 50, no. 12, pp. 3062–3080, 2004.

[20] B. Cao, L. Cai, H. Liang, J. W. Mark, Q. Zhang, V. H. Poor, andW. Zhuang, “Cooperative cognitive radio networking using quadraturesignaling,” in Proceedings of IEEE INFOCOM, 2012.

[21] A. Boukerche and Y. Ren, “A trust-based security system for ubiquitousand pervasive computing environments,” Computer Communications,vol. 31, no. 18, pp. 4343–4351, 2008.

[22] H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, “A survey oftrust and reputation management systems in wireless communications,”Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010.

[23] S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based frame-work for high integrity sensor networks,” ACM Transactions on SensorNetworks (TOSN), vol. 4, no. 3, pp. 1–37, 2008.

[24] A. Jøsang and R. Ismail, “The beta reputation system,” in Proceedingsof the 15th Bled Electronic Commerce Conference. Citeseer, 2002.

[25] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wirelesscommunications,” IEEE Transactions on Information Forensics andSecurity, vol. 2, no. 2, pp. 198–212, 2007.

[26] T. Khalaf and S. Kim, “Error probability in multi-source, multi-relaynetworks under falsified data injection attacks,” in in Proceedings ofIEEE MILCOM, 2008.

[27] S. Dehnie, H. Senear, and N. Memon, “Detecting malicious behavior incooperative diversity,” in 41st IEEE Annual Conference on InformationSciences and Systems, 2007.

[28] S. Dehnie and N. Memon, “Detection of misbehavior in cooperativediversity,” in Proceedings of IEEE MILCOM, 2008.

[29] Y. Liu and M. Tao, “Optimal channel and relay assignment in ofdm-based multi-relay multi-pair two-way communication networks,” IEEETransactions on Communications, vol. 60, no. 2, pp. 317–321, 2012.

[30] D. B. West et al., Introduction to graph theory. Prentice hall EnglewoodCliffs, 2001, vol. 2.

[31] N. Cheng, N. Zhang, N. Lu, X. Shen, and J. W. Mark, “Opportunisticspectrum access for cr-vanets: A game theoretic approach,” IEEETransactions on Vehicular Technology, to appear.

[32] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wirelessphysical layer security via cooperating relays,” IEEE Transactions onSignal Processing, vol. 58, no. 3, pp. 1875–1888, 2010.

[33] R. Jain, D.-M. Chiu, and W. R. Hawe, A quantitative measure of fairnessand discrimination for resource allocation in shared computer system.Eastern Research Laboratory, Digital Equipment Corporation, 1984.

Page 12: Risk-aware Cooperative Spectrum Access for Multi-Channel ...€¦ · 1 Risk-aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks Ning Zhang, Student Member,

12

Ning Zhang (S’12) received the B.Sc. degree fromBeijing Jiaotong University and the M.Sc. degreefrom Beijing University of Posts and Telecommuni-cations, Beijing, China, in 2007 and 2010, respec-tively. He is currently working toward the Ph.D.degree with the Department of Electrical and Com-puter Engineering, University of Waterloo, Waterloo,ON, Canada. His current research interests includecooperative networking, cognitive radio networks,physical layer security, and vehicular networks.

Nan Cheng (S’13) is currently a Ph.D. candidatein the department of Electrical and Computer En-gineering, the University of Waterloo, Waterloo,ON, Canada. He received his B.S. degree and M.S.degree from Tongji University, China, in 2009 and2012, respectively. Since 2012, he has been a re-search assistant in the Broadband CommunicationResearch group in ECE Department, the Universityof Waterloo. His research interests include vehicularcommunication networks, cognitive radio networks,and resource allocation in smart grid.

Ning Lu (S’12) received the B.Sc. and M.Sc. de-grees from Tongji University, Shanghai, China, in2007 and 2010, respectively. He is currently workingtoward the Ph.D. degree with the Department ofElectrical and Computer Engineering, University ofWaterloo, Waterloo, ON, Canada. His current re-search interests include capacity and delay analysis,media access control, and routing protocol designfor vehicular networks. Mr. Lu served as a Tech-nical Program Committee Member for IEEE 2012International Symposium on Personal, Indoor, and

Mobile Radio Communications.

Haibo Zhou (S’11) received the M.Sc. degree inInformation and Communication Engineering fromUniversity of Electronic Science and Technology ofChina, Chengdu, China, in 2007. He is currentlypursuing his Ph.D degree in Shanghai Jiao Tong Uni-versity, China. His current research interests includeresource management and performance analysis incognitive radio networks and vehicular networks.

Jon W. Mark (M’62-SM’80-F’88-LF’03) receivedthe Ph.D. degree in electrical engineering from Mc-Master University in 1970. In September 1970 hejoined the Department of Electrical and ComputerEngineering, University of Waterloo, Waterloo, On-tario, where he is currently a Distinguished ProfessorEmeritus. He served as the Department Chairmanduring the period July 1984-June 1990. In 1996 heestablished the Center for Wireless Communications(CWC) at the University of Waterloo and is currentlyserving as its founding Director. Dr. Mark had been

on sabbatical leave at the following places: IBM Thomas J. Watson ResearchCenter, Yorktown Heights, NY, as a Visiting Research Scientist (1976-77);AT&T Bell Laboratories, Murray Hill, NJ, as a Resident Consultant (1982-83): Laboratoire MASI, UniversitPierre et Marie Curie, Paris France, asan Invited Professor (1990-91); and Department of Electrical Engineering,National University of Singapore, as a Visiting Professor (1994-95). He haspreviously worked in the areas of adaptive equalization, image and videocoding, spread spectrum communications, computer communication networks,ATM switch design and traffic management. His current research interests arein broadband wireless communications, resource and mobility management,and cross domain interworking.

Dr. Mark is a Life Fellow of IEEE and a Fellow of the Canadian Academyof Engineering. He is the recipient of the 2000 Canadian Award for Telecom-munications Research and the 2000 Award of Merit of the Education Founda-tion of the Federation of Chinese Canadian Professionals. He was an editor ofIEEE TRANSACTIONS ON COMMUNICATIONS (1983-1990), a memberof the Inter-Society Steering Committee of the IEEE/ACMTRANSACTIONSON NETWORKING (1992-2003), a member of the IEEE CommunicationsSociety Awards Committee (1995-1998), an editor of Wireless Networks(1993-2004), and an associate editor of Telecommunication Systems (1994-2004).

Xuemin (Sherman) Shen (IEEE M’97-SM’02-F’09) received the B.Sc.(1982) degree from DalianMaritime University (China) and the M.Sc. (1987)and Ph.D. degrees (1990) from Rutgers University,New Jersey (USA), all in electrical engineering.He is a Professor and University Research Chair,Department of Electrical and Computer Engineering,University of Waterloo, Canada. He was the Asso-ciate Chair for Graduate Studies from 2004 to 2008.Dr. Shen’s research focuses on resource managementin interconnected wireless/wired networks, wireless

network security, social networks, smart grid, and vehicular ad hoc and sensornetworks. He is a co-author/editor of six books, and has published morethan 600 papers and book chapters in wireless communications and networks,control and filtering. Dr. Shen served as the Technical Program CommitteeChair/Co-Chair for IEEE Infocom’14, IEEE VTC’10 Fall, the Symposia Chairfor IEEE ICC’10, the Tutorial Chair for IEEE VTC’11 Spring and IEEEICC’08, the Technical Program Committee Chair for IEEE Globecom’07,the General Co-Chair for Chinacom’07 and QShine’06, the Chair for IEEECommunications Society Technical Committee on Wireless Communications,and P2P Communications and Networking. He also serves/served as theEditor-in-Chief for IEEE Network, Peer-to-Peer Networking and Application,and IET Communications; a Founding Area Editor for IEEE Transactionson Wireless Communications; an Associate Editor for IEEE Transactionson Vehicular Technology, Computer Networks, and ACM/Wireless Networks,etc.; and the Guest Editor for IEEE JSAC, IEEE Wireless Communications,IEEE Communications Magazine, and ACM Mobile Networks and Appli-cations, etc. Dr. Shen received the Excellent Graduate Supervision Awardin 2006, and the Outstanding Performance Award in 2004, 2007 and 2010from the University of Waterloo, the Premier’s Research Excellence Award(PREA) in 2003 from the Province of Ontario, Canada, and the DistinguishedPerformance Award in 2002 and 2007 from the Faculty of Engineering,University of Waterloo. Dr. Shen is a registered Professional Engineer ofOntario, Canada, an IEEE Fellow, an Engineering Institute of Canada Fellow,a Canadian Academy of Engineering Fellow, and a Distinguished Lecturer ofIEEE Vehicular Technology Society and Communications Society.