Transcript

2676 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

Outage Probability Analysis ofCognitive Transmissions:

Impact of Spectrum Sensing OverheadYulong Zou, Student Member, IEEE, Yu-Dong Yao, Senior Member, IEEE, and Baoyu Zheng, Member, IEEE

Abstractβ€”In cognitive radio networks, a cognitive source noderequires two essential phases to complete a cognitive transmissionprocess: the phase of spectrum sensing with a certain timeduration (also referred to as spectrum sensing overhead) to detecta spectrum hole and the phase of data transmission through thedetected spectrum hole. In this paper, we focus on the outageprobability analysis of cognitive transmissions by considering thetwo phases jointly to examine the impact of spectrum sensingoverhead on system performance. A closed-form expression of anoverall outage probability that accounts for both the probabilityof no spectrum hole detected and the probability of a channeloutage is derived for cognitive transmissions over Rayleigh fadingchannels. We further conduct an asymptotic outage analysis inhigh signal-to-noise ratio regions and obtain an optimal spectrumsensing overhead solution to minimize the asymptotic outageprobability. Besides, numerical results show that a minimizedoverall outage probability can be achieved through a tradeoff indetermining the time durations for the spectrum hole detectionand data transmission phases. In this paper, we also investigatethe use of cognitive relay to improve the outage performance ofcognitive transmissions. We show that a significant improvementis achieved by the proposed cognitive relay scheme in terms ofthe overall outage probability.

Index Termsβ€”Cognitive radio, spectrum sensing, overhead,cognitive relay transmission, outage probability.

I. INTRODUCTION

THERE are increasing demands for the wireless radiospectrum with the emergency of many new wireless

communication networks (e.g., wireless local area networks,wireless sensor networks, Bluetooth and so on). Meanwhile,according to the Federal Communications Commission (FCC),large portions of the licensed wireless spectrum resources are

Manuscript received January 26, 2010; revised April 7, 2010; acceptedMay 28, 2010. The associate editor coordinating the review of this paper andapproving it for publication was J. Olivier.

Y. Zou is with the Institute of Signal Processing and Transmission,Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu210003, China, and with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected], [email protected]).

Y.-D. Yao is with the Electrical and Computer Engineering Depart-ment, Stevens Institute of Technology, Hoboken, NJ 07030, USA (e-mail:[email protected]).

B. Zheng is with the Institute of Signal Processing and Transmission, Nan-jing University of Posts and Telecommunications, Nanjing, Jiangsu 210003,China (e-mail: [email protected]).

This work was partially supported by the Postgraduate Innovation Pro-gram of Scientific Research of Jiangsu Province (Grant Nos. CX08B 080Z,CX09B 150Z) and the National Natural Science Foundation of China (GrantNo. 60972039).

Digital Object Identifier 10.1109/TWC.2010.061710.100108

under utilized [1]. In order to address this issue, cognitive radio[2] has been proposed by allowing a cognitive user to access aspectrum hole (that is a frequency band licensed to a primaryuser but not utilized by that user at a particular time and aspecific geographic location [3]), which promotes the efficientutilization of the licensed spectrum. As stated in [3], cognitiveradio is an intelligent wireless communication system, whichlearns from its surrounding environment and adapts its internalstates to statistical variations of the environment.

In cognitive radio networks, a cognitive source node typi-cally requires two essential phases to complete its transmissionto its destination: 1) a spectrum sensing phase (also known as aspectrum hole detection phase), in which the cognitive sourceattempts to detect an available spectrum hole with a certaintime duration (referred to as spectrum sensing overhead), and2) a data transmission phase, in which data is transmitted tothe destination through the detected spectrum hole. The twophases have been studied individually in terms of differentdetection [5] - [13] or different transmission [14] - [22]techniques.

In spectrum sensing, the energy detection [5], [6] and thematched filter detection [7], [8] have been proposed first andinvestigated extensively. It has been shown that the energydetection can not differentiate signal types, which could leadto more false detections triggered by some unintended inter-ference signals [5]. Although the matched filter is an optimaldetector in stationary Gaussian noise scenario, it requires priorinformation of the primary user signal, such as the pulseshape, modulation type and so on [4]. As an alternative, thecyclostationary feature detector has been presented in [9],[10], which can differentiate the modulated signal from theinterference and additive noise. The advantage of cyclosta-tionary detection comes at the expense of high computationalcomplexities since it requires an extra training process toextract significant features. Meanwhile, in order to combatfading effects, a collaborative spectrum sensing approach hasbeen proposed [11], where the detection results from multiplecognitive users are pooled together at a fusion center by usinga logic rule. Recently, in [12], [13], the authors have appliedcooperative diversity [16], [17] to the detection of the primaryuser and shown that the detection time can be reduced greatlythrough the cooperation between the cognitive users.

In the wireless transmission research, a large number ofstudies are motivated to combat the large-scale and small-scale fading. Two wireless transmission technologies, i.e., the

1536-1276/10$25.00 c⃝ 2010 IEEE

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2677

relay and the diversity techniques, have been proposed [14]- [23] in order to provide reliable systems with high data-rates. As stated in [14], the relay technique has been generallyconsidered as an effective method to improve the capacityand coverage for next-generation wireless networks. On theother hand, multiple-input and multiple-output (MIMO) [15]has been proposed as an effective diversity scheme that canincrease the channel capacity greatly by employing multipleantennas at both the transmitter and receiver. In [16] - [23],the authors have put forward the cooperative diversity toimplement virtual multiple antennas through the cooperationbetween the source and the relay nodes, which combinesthe advantages of the relay and diversity techniques. Morerecently, in [28], [29], the cooperative relay technology hasalso been explored at the medium access control (MAC) andhigher layers to improve the system throughput of cognitiveradio networks.

Notice that the spectrum hole detection and data transmis-sion phases can not be designed and optimized in isolationsince they could affect each other. For example, an availablespectrum hole would get wasted if the cognitive source has notdetected the hole within a certain time duration. This decreasesthe spectrum hole utilization efficiency. While increasing thetime duration of the hole detection phase improves the detec-tion probability of spectrum holes, it comes at the expenseof a reduction in transmission performance since less time isnow available for the data transmission. In [24], the authorshave studied a tradeoff in optimizing the performance ofthe secondary user under a targeted level of the primaryinterference protection. In [25], [26], a sensing-throughputtradeoff has been investigated for cognitive radio networks,where the research focus is on the maximization of secondarythroughput under the constraint of primary user protection.Besides, another optimal spectrum sensing framework hasbeen explored in [27], where the optimization objective is tominimize the spectrum sensing time without considering thetransmission link condition and, moreover, only an additivewhite Gaussian noise (AWGN) channel is considered for thesensing performance analysis. However, the transmission linkcondition plays an important role in optimizing the cognitivetransmission performance. For example, if a small-scaledfading term is taken into account for the transmission link, anoutage event may occur given a fixed transmit power and datatransmission rate when the transmission link is in relativelydeep fading. In this case, a longer time duration is needed forthe data transmission phase to reduce the outage probabilitysatisfying a predefined target.

The main contributions of this paper are described asfollows. First, unlike the separate analysis of the spectrumhole detection and data transmission phases [5] - [23], wejointly consider the two parts to examine the impact of thespectrum sensing overhead on the overall system performance.Second, we focus on the minimization of outage probabilityof secondary transmissions under a required probability ofdetection of primary users over Rayleigh fading channels,differing from [24] - [27] where the research is to either mini-mize the spectrum sensing time or to maximize the secondarythroughput. Third, we derive a closed-form expression ofthe overall outage probability over Rayleigh fading channels,

Fig. 1. (a) Coexistence of a primary wireless network and a cognitiveradio network; (b) the allocation of time durations: hole detection versus datatransmission.

which accounts for both the probability of no spectrum holedetected and the probability of a channel outage, for cognitivetransmissions. Finally, in order to improve the system perfor-mance, we propose a cognitive relay transmission scheme andpresent its outage probability analysis over Rayleigh fadingchannels.

The remainder of this paper is organized as follows. Sec-tion II describes the system model of cognitive transmissionthat considers both the spectrum hole detection and datatransmission phases, followed by the outage analysis in Sec-tion III, where the corresponding numerical evaluations arealso provided to show the system performance of cognitivetransmission. In Section IV, we propose a cognitive relaytransmission scheme along with its performance analysis.Numerical results are also presented in this section. Finally,we make some concluding remarks in Section V.

II. SYSTEM MODEL

Consider a cognitive radio network where a cognitive source(CS) is sending data to a cognitive destination (CD) over aspectrum hole unoccupied by a primary user (PU), as shown inFig. 1 (a). Specifically, if CS detects an idle licensed frequencychannel (that is not occupied currently by PU), it will usethis channel for its data transmission (secondary data trans-mission); otherwise, CS will continue detecting the licensedfrequency band to seek an available transmission opportunity.From Fig. 1, one can see that the whole cognitive transmissionprocess is divided into two phases: 1) hole detection of thelicensed band and 2) data transmission from CS to CD. Theallocation of time durations between the two phases is depictedin Fig. 1 (b), where the detection phase and the transmissionphase occupy 𝛼 and 1-𝛼 fractions, respectively, of one timeslot, and 𝛼 is referred to as spectrum sensing overhead thatcan be varied to optimize the system performance. Notice thatsuch a cognitive transmission protocol will be extended to acognitive relay network in Section IV.

In Fig. 1 (a), each transmission link between any twonodes is modeled as a Rayleigh fading process and,moreover, the fading channel is considered as constant

2678 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

during one time slot. The transmit power of PU and CSare 𝑃𝑝 and 𝑃𝑠, respectively. For notational convenience, let𝐻𝑝(π‘˜, 1) and 𝐻𝑝(π‘˜, 2) denote whether or not the licensedband is occupied by PU in the first and second phases,respectively, of time slot π‘˜, i.e, 𝐻𝑝(π‘˜, 1) = 𝐻𝑝(π‘˜, 2) = 𝐻0

represents the band being unoccupied by PU and,otherwise, 𝐻𝑝(π‘˜, 1) = 𝐻𝑝(π‘˜, 2) = 𝐻1. A Bernoullidistribution with parameter Pa is used to model therandom variable 𝐻𝑝(π‘˜, 1), i.e., Pr (𝐻𝑝(π‘˜, 1) = 𝐻0) = Pa

and Pr (𝐻𝑝(π‘˜, 1) = 𝐻1) = 1 βˆ’ Pa. Moreover, thetransition between 𝐻𝑝(π‘˜, 1) and 𝐻𝑝(π‘˜, 2) is modeled asa Markov chain with parameter 1 βˆ’ exp[βˆ’(1βˆ’ 𝛼)πœ†],i.e., Pr (𝐻𝑝(π‘˜, 2) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻0) =Pr (𝐻𝑝(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜, 1) = 𝐻1) = 1 βˆ’ exp[βˆ’(1βˆ’ 𝛼)πœ†]and Pr (𝐻𝑝(π‘˜, 2) = 𝐻0βˆ£π»π‘(π‘˜, 1) = 𝐻0) =Pr (𝐻𝑝(π‘˜, 2) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻1) = exp[βˆ’(1βˆ’ 𝛼)πœ†],where πœ† is the characteristic parameter. Thus, the signaldetected by CS from PU can be expressed as

𝑦𝑠(π‘˜) = β„Žπ‘π‘ (π‘˜)βˆšπ‘ƒπ‘πœƒ(π‘˜, 1) + 𝑛𝑠(π‘˜) (1)

where β„Žπ‘π‘ (π‘˜) is the fading coefficient of the channel from PUto CS at time slot π‘˜, 𝑛𝑠(π‘˜) is AWGN with zero mean and thepower spectral density 𝑁0, and πœƒ(π‘˜, 1) is defined as

πœƒ(π‘˜, 1) =

{0, 𝐻𝑝(π‘˜, 1) = 𝐻0

π‘₯𝑝(π‘˜, 1), 𝐻𝑝(π‘˜, 1) = 𝐻1

where π‘₯𝑝(π‘˜, 1) is the transmission signal of PU during the firstphase (namely hole detection phase) of time slot π‘˜. Based on(1), CS will make a decision �̂�𝑠(π‘˜) on whether the licensedband is occupied by PU. Specifically, �̂�𝑠(π‘˜) = 𝐻0 consid-ers that the band is available for secondary transmissions;�̂�𝑠(π‘˜) = 𝐻1 considers the band is unavailable. Therefore,the signal received at CD from CS can be written as

𝑦𝑑(π‘˜) = β„Žπ‘ π‘‘(π‘˜)βˆšπ‘ƒπ‘ π›½(π‘˜) + β„Žπ‘π‘‘(π‘˜)

βˆšπ‘ƒπ‘πœƒ(π‘˜, 2) + 𝑛𝑑(π‘˜) (2)

where β„Žπ‘ π‘‘(π‘˜) and β„Žπ‘π‘‘(π‘˜) are the fading coefficients of thechannel from CS to CD and that from PU to CD, respectively.In addition, 𝛽(π‘˜) and πœƒ(π‘˜, 2) are defined as follows,

𝛽(π‘˜) =

{π‘₯𝑠(π‘˜), �̂�𝑠(π‘˜) = 𝐻0

0, �̂�𝑠(π‘˜) = 𝐻1

and

πœƒ(π‘˜, 2) =

{0, 𝐻𝑝(π‘˜, 2) = 𝐻0

π‘₯𝑝(π‘˜, 2), 𝐻𝑝(π‘˜, 2) = 𝐻1

where π‘₯𝑠(π‘˜) and π‘₯𝑝(π‘˜, 2) are the transmission signals of CSat time slot π‘˜ and that of PU at the second phase of time slotπ‘˜, respectively.

III. OUTAGE ANALYSIS OF COGNITIVE TRANSMISSIONS

IN RAYLEIGH FADING CHANNELS

In this section, we start with the outage analysis of cognitivetransmissions and then conduct the numerical evaluations toshow the impact of spectrum sensing overhead.

A. Outage Probability Analysis

As is known [31], [16], [19], an outage event occurs whenthe channel capacity falls below the data rate 𝑅. Following(2), the outage probability of cognitive transmissions is givenby (3) at the top of the following page, where the coefficient1βˆ’π›Ό is due to the fact that only 1βˆ’π›Ό fraction of a time slotis utilized for the CS’s data transmission phase. Consideringconditional probabilities, (3) can be expanded as (4) at thetop of the following page, where Ξ› = [2𝑅/(1βˆ’π›Ό) βˆ’ 1]/𝛾𝑠,𝛾𝑠 = 𝑃𝑠/𝑁0 and 𝛾𝑝 = 𝑃𝑝/𝑁0. For notational convenience,let Pa = Pr(𝐻𝑝(π‘˜, 1) = 𝐻0) be the probability that there isa hole, Pf = Pr(�̂�𝑠(π‘˜) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻0) and Pd =Pr(�̂�𝑠(π‘˜) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻1) be the probability of falsealarm and the probability of detection of the primary-user-presence, respectively. Accordingly, (4) can be rewritten as (5)at the top of the following page. Note that there are severalapproaches available for the spectrum hole detection, such asenergy detector, matched filter detector and cyclostationaryfeature detector as shown in [5] - [13]. Throughout this paper,we consider the use of an energy detector for the spectrumsensing performance analysis. Accordingly, considering anenergy detection method and following (1), the output statisticof energy detector at time slot π‘˜ is given by

𝑇 (𝑦) =1

𝑁

π‘βˆ‘π‘›=1

βˆ£π‘¦π‘ (π‘˜, 𝑛)∣2 (6)

where 𝑁 = 𝛼𝑇𝑓𝑠 is the number of samples, 𝑇 and 𝑓𝑠 are thetime slot length and sample frequency, respectively. From (6),the probability of false alarm and the probability of detection,Pf(π‘˜) and Pd(π‘˜), of the primary-user-presence at time slot π‘˜are calculated as

Pf(π‘˜) = Pr(�̂�𝑠(π‘˜) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻0)

= Pr{𝑇 (𝑦) > π›Ώβˆ£π»π‘(π‘˜, 1) = 𝐻0}(7)

and

Pd(π‘˜) = Pr(�̂�𝑠(π‘˜) = 𝐻1βˆ£π»π‘(π‘˜, 1) = 𝐻1)

= Pr{𝑇 (𝑦) > π›Ώβˆ£π»π‘(π‘˜, 1) = 𝐻1}(8)

where 𝛿 is the energy detection threshold. Using the results ofAppendix A, we obtain

Pout =Pa exp[βˆ’(1βˆ’ 𝛼)πœ†](1 βˆ’ Pf)[1βˆ’ exp(βˆ’ Ξ›

𝜎2𝑠𝑑

)]

+ Pa[1βˆ’ exp(βˆ’(1βˆ’ 𝛼)πœ†)](1 βˆ’ Pf)

Γ— [1βˆ’ 𝜎2𝑠𝑑

𝜎2𝑝𝑑𝛾𝑝Λ + 𝜎2

𝑠𝑑

exp(βˆ’ Ξ›

𝜎2𝑠𝑑

)]

+ (1βˆ’ Pa)[1βˆ’ exp(βˆ’(1βˆ’ 𝛼)πœ†)](1 βˆ’ Pd)

Γ— [1βˆ’ exp(βˆ’ Ξ›

𝜎2𝑠𝑑

)]

+ (1βˆ’ Pa) exp[βˆ’(1βˆ’ 𝛼)πœ†](1 βˆ’ Pd)

Γ— [1βˆ’ 𝜎2𝑠𝑑

𝜎2𝑝𝑑𝛾𝑝Λ + 𝜎2

𝑠𝑑

exp(βˆ’ Ξ›

𝜎2𝑠𝑑

)]

+ PaPf + (1βˆ’ Pa)Pd

(9)

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2679

Pout = Pr

{(1βˆ’ 𝛼) log

(1 +

βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝑃𝑠 βˆ£π›½(π‘˜)∣2βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝑃𝑝 βˆ£πœƒ(π‘˜, 2)∣2 +𝑁0

)< 𝑅

}(3)

Pout =Pr(�̂�𝑠(π‘˜) = 𝐻0, 𝐻𝑝(π‘˜, 1) = 𝐻0, 𝐻𝑝(π‘˜, 2) = 𝐻0) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ›}+ Pr(�̂�𝑠(π‘˜) = 𝐻0, 𝐻𝑝(π‘˜, 1) = 𝐻0, 𝐻𝑝(π‘˜, 2) = 𝐻1) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Λ < Ξ›}+ Pr(�̂�𝑠(π‘˜) = 𝐻0, 𝐻𝑝(π‘˜, 1) = 𝐻1, 𝐻𝑝(π‘˜, 2) = 𝐻0) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ›}+ Pr(�̂�𝑠(π‘˜) = 𝐻0, 𝐻𝑝(π‘˜, 1) = 𝐻1, 𝐻𝑝(π‘˜, 2) = 𝐻1) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Λ < Ξ›}+ Pr(�̂�𝑠(π‘˜) = 𝐻1)

(4)

Pout =Pa exp[βˆ’(1βˆ’ 𝛼)πœ†](1 βˆ’ Pf) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ›}+ Pa[1βˆ’ exp(βˆ’(1βˆ’ 𝛼)πœ†)](1 βˆ’ Pf) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Λ < Ξ›}+ (1 βˆ’ Pa)[1 βˆ’ exp(βˆ’(1 βˆ’ 𝛼)πœ†)](1 βˆ’ Pd) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ›}+ (1 βˆ’ Pa) exp[βˆ’(1βˆ’ 𝛼)πœ†](1 βˆ’ Pd) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2𝛾𝑝Λ < Ξ›}+ PaPf + (1 βˆ’ Pa)Pd

(5)

where the false alarm probability Pf is constrained to thedetection probability Pd as given below

Pf =

⎧⎨⎩Pd, Pd = 𝑄(βˆ’βˆš

𝑁)

Pd βˆ’π‘„(π‘„βˆ’1(Pd) +1

𝜎2π‘π‘ πœ…

) exp(πœ‰), otherwise

(10)where πœ… = 𝛾𝑝𝑄

βˆ’1(Pd) +βˆšπ‘π›Ύπ‘, πœ‰ = π‘„βˆ’1(Pd)

𝜎2psπœ…

+ 12𝜎4

psπœ…2 , and

the number of samples 𝑁 should satisfy 𝑁 β‰₯ [π‘„βˆ’1(Pd)]2. As

can be observed from (9), the derived closed-from expressionof outage probability accounts for both the probability ofno available channel detected in the spectrum hole detectionphase and the probability of channel outage occurred in thesubsequent data transmission phase, and thus we call it overalloutage probability. Following (9) and letting 𝛾𝑠 β†’ +∞, weare able to obtain an overall outage probability floor

Pout,floor = PaPf + (1βˆ’ Pa)Pd (11)

which can also be explained as follows. Once CS detects aspectrum hole (no matter it is a correct or a false detection)in the first phase, a channel outage would not occur in thesubsequent data transmission phase due to 𝛾𝑠 β†’ +∞. Inother words, when 𝛾𝑠 β†’ +∞, the outage occurs only whenCS detects the presence of PU (i.e., no hole is detected)no matter whether PU really presents or not. Combining (9)and (10), one can see that the overall outage probability ofthe cognitive transmission is a function of {Pa,Pd,Pf , 𝑅,𝜎2𝑝𝑠, 𝜎

2𝑝𝑑, 𝜎

2𝑠𝑑, 𝛾𝑠, 𝛾𝑝, 𝛼}, where the data rate 𝑅 may often be

set by the system in accordance with the QoS requirement andthe network environment, and the spectrum sensing overhead𝛼 is a parameter that can be adapted to optimize the systemperformance. To obtain a general expression for an optimal π›Όβˆ—

as a function of the other parameters is very complicated andinfeasible. Here, we consider an asymptotic outage probabilityanalysis to decide the optimal value π›Όβˆ—. Considering the caseof Pa = 1 and πœ† = 0 and letting 𝛾𝑠 β†’ ∞, we can obtain

from (9) using the Taylor approximation as

Pout∼= (1βˆ’ Pf)

Ξ›

𝜎2𝑠𝑑

+ Pf (12)

Letting 𝛾𝑝 β†’ ∞, we can similarly apply the Taylor approxi-mation to (10) and obtain

Pf∼= Pd βˆ’ Pd(1 +

π‘„βˆ’1(Pd)

[π‘„βˆ’1(Pd) +βˆšπ‘ ]𝜎2

𝑝𝑠

β‹… 1

𝛾𝑝)

= βˆ’ Pdπ‘„βˆ’1(Pd)

[π‘„βˆ’1(Pd) +βˆšπ›Όπ‘‡π‘“π‘ ]𝜎2

𝑝𝑠

β‹… 1

𝛾𝑝

(13)

In obtaining the first equation of (13), we have ignoredthe term 1/(2𝜎4

π‘π‘ πœ…2), since it is a higher-order infinitesimal

compared to the term π‘„βˆ’1(Pd)/(𝜎2π‘π‘ πœ…) for 𝛾𝑝 β†’ ∞. Differ-

entiating (12) with respective to the spectrum sensing overhead𝛼 yields

βˆ‚Pout

βˆ‚π›Ό= (1βˆ’ Pf)

βˆ‚Ξ›

𝜎2π‘ π‘‘βˆ‚π›Ό

+ (1 βˆ’ Ξ›

𝜎2𝑠𝑑

)βˆ‚Pf

βˆ‚π›Ό

∼= βˆ‚Ξ›

𝜎2π‘ π‘‘βˆ‚π›Ό

+βˆ‚Pf

βˆ‚π›Ό

(14)

where the second equation is obtained due to the fact thatPf and Ξ› are infinitesimal when 𝛾𝑝, 𝛾𝑠 β†’ ∞. Meanwhile,βˆ‚Pf/βˆ‚π›Ό and βˆ‚Ξ›/βˆ‚π›Ό are given by

βˆ‚Pf

βˆ‚π›Ό=

Pdπ‘„βˆ’1(Pd)

βˆšπ‘‡π‘“π‘ 

2π›Ύπ‘πœŽ2𝑝𝑠

βˆšπ›Ό[π‘„βˆ’1(Pd) +

βˆšπ›Όπ‘‡π‘“π‘ ]2

(15)

andβˆ‚Ξ›

βˆ‚π›Ό=

𝑅2𝑅/(1βˆ’π›Ό) ln 2

(1βˆ’ π‘Ž)2𝛾𝑠(16)

By substituting βˆ‚Pf/βˆ‚π›Ό and βˆ‚Ξ›/βˆ‚π›Ό from (15) and (16) into(14), the optimal spectrum sensing overhead should satisfy thefollowing equation

2𝑅/(1βˆ’π›Όβˆ—)βˆšπ›Όβˆ—[βˆšπ›Όβˆ—π‘‡π‘“π‘  +π‘„βˆ’1(Pd)]

2πœ‰ + (1 βˆ’ π›Όβˆ—)2𝜁 = 0(17)

2680 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

TABLE ILIST OF THE OPTIMAL SPECTRUM SENSING OVERHEAD π›Όβˆ— UNDER THE

DIFFERENT PRIMARY AND SECONDARY TRANSMIT SIGNAL-TO-NOISERATIOS (𝛾𝑠, 𝛾𝑝).

wherein πœ‰ and 𝜁 are given by

πœ‰ = 𝜎2𝑝𝑠𝛾𝑝𝑅 ln 4; 𝜁 = 𝜎2

π‘ π‘‘π›Ύπ‘ βˆšπ‘‡π‘“π‘ Pd𝑄

βˆ’1(Pd) (18)

An optimal spectrum sensing overhead π›Όβˆ— can be easily deter-mined by using (17). In Table 1, we show the optimal sensingoverhead under different values of the primary and secondarytransmit powers (𝛾𝑠, 𝛾𝑝) with Pd = 0.99, 𝜎2

𝑝𝑠 = 𝜎2𝑠𝑑 = 1,

𝑅 = 1 bit/s/Hz, 𝑇 = 25 ms and 𝑓𝑠 = 100 kHz. As shownin the first two columns of Table 1, as the primary transmitpower 𝛾𝑝 increases, the optimal spectrum sensing overheadπ›Όβˆ— decreases, which is due to the fact that less time durationis required for the spectrum hole detection phase with anincreasing primary transmit power. From the last two columnsof Table 1, one can also see that the optimal spectrum sensingoverhead increases when the secondary transmit power 𝛾𝑠increases from 𝛾𝑠 = 30 dB to 𝛾𝑠 = 40 dB. This is becausethat as the secondary transmit power increases, less time isneeded for the data transmission phase, thus resulting in alonger time duration available for the spectrum sensing phase.

B. Numerical Results and Analysis

In this subsection, we focus on the numerical evaluations toshow the impact of spectrum sensing overhead on the overalloutage probability performance. Notice that the primary userwould be interfered by the cognitive user when CS does notdetect the presence of PU given that PU is active. Therefore,the probability of detection of the primary-user-presence Pd

shall be set to a required threshold by the cognitive systemto guarantee PU’s QoS. Throughout this paper, we will usePd = 0.99 for the numerical evaluations.

Fig. 2 depicts the probability of detection versus the prob-ability of false alarm using (10). It is shown from Fig. 2 that,under a required detection probability, as the spectrum sensingoverhead 𝛼 increases, the false alarm probability decreases,i.e., CS can detect the hole of licensed band more accurately.This result is easy to understand since increasing 𝛼 indicatesthe enhancement of the signal energy received at CS from PU,which thus leads to the detection performance improvement.

Fig. 3 plots (9) as a function of the transmit SNR atCS 𝛾𝑠 for different spectrum sensing overhead values. Thecorresponding outage probability floors for the three cases(i.e., 𝛼 = 0.1, 𝛼 = 0.2 and 𝛼 = 0.5) are plotted using (8).Also, the simulated results are provided in this figure by usinga typical link-level simulation. As shown in Fig. 3, the curves

10βˆ’3

10βˆ’2

10βˆ’1

0.4

0.5

0.6

0.7

0.8

0.9

1

The probability of false alarm (Pf)

The

pro

babi

lity

of d

etec

tion

(Pd)

Ξ±=0.5

Ξ±=0.2

Ξ±=0.1

Fig. 2. The probability of detection versus the probability of false alarmfor different values of the spectrum sensing overhead 𝛼 with 𝛾𝑝 = 10 dB,𝑇 = 20 ms, 𝑓𝑠 = 100 kHz, and 𝜎2

𝑝𝑠 = 1.

0 5 10 15 20 25 300.2

0.25

0.3

0.35

0.4

0.45

0.5

0.55

0.6

0.65

0.7

Transmit SNR at CS (Ξ³s)

Ove

rall

outa

ge p

roba

bilit

y

Ξ±=0.1 theoretical

Ξ±=0.1 simulated

Ξ±=0.2 theoretical

Ξ±=0.2 simulated

Ξ±=0.4 theoretical

Ξ±=0.4 simulated

Outage probability floors for the three given cases.

Fig. 3. Overall outage probability versus the transmit SNR at CS 𝛾𝑠 fordifferent values of the spectrum sensing overhead 𝛼 with Pa = 0.8, πœ† = 0.1,Pd = 0.99, 𝑅 = 0.5 b/s/Hz, 𝛾𝑝 = 5 dB, 𝑇 = 20 ms, 𝑓𝑠 = 25 kHz,𝜎2𝑝𝑠 = 𝜎2

𝑝𝑑 = 0.5, and 𝜎2𝑠𝑑 = 1.

of the overall outage probability converge to the correspondingfloors in high 𝛾𝑠 regions. The occurrence of outage floor isdue to the fact that when the transmit SNR 𝛾𝑠 is very high,the overall outage probability is dominated by the probabilityof no spectrum hole detected that is independent from 𝛾𝑠.Moreover, the floors observed are reduced with the increaseof the overhead 𝛼, which is resulted from the improvement ofthe detection probability of spectrum holes as the overhead𝛼 increases. In addition, the simulation results match theanalytical results very well.

In Fig. 4, we show the overall outage probability versusthe spectrum sensing overhead 𝛼 for different values of thedata rate, where the performance curves plotted correspondto 𝑅 = 0.4 b/s/Hz and 𝑅 = 0.8 b/s/Hz, respectively. All thecurves plotted in Fig. 4 demonstrate that there always existsan optimal spectrum sensing overhead π›Όβˆ—, i.e., a minimized

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2681

0 0.2 0.4 0.6 0.8 10.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Spectrum sensing overhead (Ξ±)

Ove

rall

outa

ge p

roba

bilit

y

R=0.8 b/s/HzR=0.4 b/s/Hz

Fig. 4. Overall outage probability versus the spectrum sensing overhead 𝛼for different values of the data rate 𝑅 with Pa = 0.8, πœ† = 0.1, Pd = 0.99,𝛾𝑠 = 10 dB, 𝛾𝑝 = 5 dB, 𝑇 = 20 ms, 𝑓𝑠 = 25 kHz, 𝜎2

𝑝𝑠 = 𝜎2𝑝𝑑 = 0.5,

and 𝜎2𝑠𝑑 = 1.

Fig. 5. (a) Coexistence of a primary wireless network and a cognitive relaynetwork; (b) The allocation of time durations: Hole detection versus datatransmission.

outage probability can be achieved through a tradeoff indetermining the time durations for the hole detection andthe data transmission phases. It is noted that for any givenparameter set, an optimal spectrum sensing overhead π›Όβˆ— canbe determined by minimizing the overall outage probability asgiven by (9).

IV. COMBINED COGNITIVE RELAY AND COGNITIVE

TRANSMISSION

In this section, we consider a cognitive relay network asshown in Fig. 5 (a), where a cognitive relay (CR) assists CSfor the data transmission. Fig. 5 (b) illustrates the proposedcognitive relay transmission process, which is described indetail as follows. At the first phase of time slot 2π‘˜ βˆ’ 1, CSdetects the status of the licensed band. If a spectrum hole isdetected, CS transmits its signal to both CR and CD during

the second phase of the same time slot. Next, CR decodesits received signal from CS during the first phase of timeslot 2π‘˜ and, meanwhile, detects whether or not there is aspectrum hole. If the signal is decoded successfully and a holeis detected, CR will notify CS and forward its decoded signalto CD during the next phase. Otherwise, CS will determinewhether or not to repeat its signal transmission directly to CDdepending on its hole detection result at the second phase oftime slot 2π‘˜.

As shown in Fig. 6, we present a block diagram ofthe general framework for implementation of the proposedcognitive relay transmission scheme. An original bit streamare processed in FED (forward error-detecting, e.g., a cyclicredundancy check (CRC) code) and FEC (forward error-correcting, e.g., Turbo code) encoders at time slot 2π‘˜ βˆ’ 1,giving a encoded bit stream that would be transmitted to bothCR and CD when a spectrum hole is detected through thehole detection module. At the next time slot 2π‘˜, CR performsFEC decoding and FED checking on the received bits. If theFED check is successful and a spectrum hole is detected, CRwould then transmit the decoded bits to CD. Otherwise, CSwould determine whether or not to repeat the transmissionof the original bits depending on its hole detection result attime slot 2π‘˜. Finally, CD combines the two copies of receivedsignals by using maximum ratio combining (MRC) method,and gives an estimated bit stream of the original bits after aFEC decoder.

Let 𝐻𝑝(2π‘˜ βˆ’ 1) and 𝐻𝑝(2π‘˜) denote the statuses oflicensed band at time slots 2π‘˜ βˆ’ 1 and 2π‘˜, respectively.Similarly, let �̂�𝑠(2π‘˜ βˆ’ 1) and οΏ½Μ‚οΏ½π‘Ÿ(2π‘˜) be the decisionresults made by CS and CR, respectively, as to whetherthere is a spectrum hole. For simplicity, we assume herethat the primary traffic status does not change during onetime slot. Notice that following the procedures as stated inSection III, the analysis can be extended with additionalprimary traffic states to the scenario where the primary trafficstatus may change between the spectrum hole detection anddata transmission phases, for which similar performancecharacteristics can be obtained. Here, we use a Bernoullidistribution with parameter Pa to model the randomvariable 𝐻𝑝(2π‘˜ βˆ’ 1), i.e., Pr (𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻0) = Pa

and Pr (𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻1) = 1 βˆ’ Pa. Moreover,a Markov chain with a transition probabilityPt = 1 βˆ’ exp(βˆ’πœ†) is used to model the process ofprimary traffic arrival/departure in two adjacent timeslots, i.e., Pr (𝐻𝑝(2π‘˜) = 𝐻1βˆ£π»π‘(2π‘˜ βˆ’ 1) = 𝐻0) =Pr (𝐻𝑝(2π‘˜) = 𝐻0βˆ£π»π‘(2π‘˜ βˆ’ 1) = 𝐻1) = Pt

and Pr (𝐻𝑝(2π‘˜) = 𝐻0βˆ£π»π‘(2π‘˜ βˆ’ 1) = 𝐻0) =Pr (𝐻𝑝(2π‘˜) = 𝐻1βˆ£π»π‘(2π‘˜ βˆ’ 1) = 𝐻1) = 1 βˆ’ Pt. Besides,each wireless link as depicted in Fig. 5 is modeled as aRayleigh block fading channel, i.e., the channel fading isinvariant during one whole block consisting of two time slots.

A. Signal Modeling and Outage Analysis

Following [16], [19] and considering for practicability, wewould adopt half-duplex relay to model and analyze thecognitive relay transmission scheme. At time slot 2π‘˜βˆ’ 1, the

2682 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

Fig. 6. A block diagram of the general framework for implementation of the proposed cognitive relay transmission scheme.

CS signals received at CR and CD can be expressed as

π‘¦π‘Ÿ(2π‘˜ βˆ’ 1) =β„Žπ‘ π‘Ÿ(π‘˜)βˆšπ‘ƒπ‘ π›½(2π‘˜ βˆ’ 1)

+ β„Žπ‘π‘Ÿ(π‘˜)βˆšπ‘ƒπ‘πœƒ(2π‘˜ βˆ’ 1, 2) + π‘›π‘Ÿ(2π‘˜ βˆ’ 1)

(19)

and

𝑦𝑑(2π‘˜ βˆ’ 1) =β„Žπ‘ π‘‘(π‘˜)βˆšπ‘ƒπ‘ π›½(2π‘˜ βˆ’ 1)

+ β„Žπ‘π‘‘(π‘˜)βˆšπ‘ƒπ‘πœƒ(2π‘˜ βˆ’ 1, 2) + 𝑛𝑑(2π‘˜ βˆ’ 1)

(20)

where

𝛽(2π‘˜ βˆ’ 1) =

{π‘₯𝑠(π‘˜), �̂�𝑠(2π‘˜ βˆ’ 1) = 𝐻0

0, �̂�𝑠(2π‘˜ βˆ’ 1) = 𝐻1

πœƒ(2π‘˜ βˆ’ 1, 2) =

{0, 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻0

π‘₯𝑝(2π‘˜ βˆ’ 1, 2), 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻1

where π‘₯𝑝(2π‘˜βˆ’1, 2) is the transmit signal of PU at the secondphase of time slot 2π‘˜βˆ’1. As depicted in Fig. 5 (b), there existtwo data transmission cases (dependent on whether or not CRcan decode successfully and detect a spectrum hole) at timeslot 2π‘˜, which are denoted by Θ = 1 and Θ = 2, respectively.If CR succeeds in decoding its received signal and detects aspectrum hole at time slot 2π‘˜, it can be described as (21) at thetop of the following page (in an information-theoretic sense[31]). where the factor 1/2 in front of log(β‹…) is resulted froma half-duplex relay constraint [16]. Then, at the next phase oftime slot 2π‘˜, CR would forward its correctly decoded result�̂�𝑠(π‘˜) = π‘₯𝑠(π‘˜) to CD. Thus, the signal received at CD can bewritten as

𝑦𝑑(2π‘˜,Θ = 1) =β„Žπ‘Ÿπ‘‘(π‘˜)βˆšπ‘ƒπ‘ π‘₯𝑠(π‘˜)

+ β„Žπ‘π‘‘(π‘˜)βˆšπ‘ƒπ‘πœƒ(2π‘˜, 2) + 𝑛𝑑(2π‘˜)

(22)

where

πœƒ(2π‘˜, 2) =

{0, 𝐻𝑝(2π‘˜) = 𝐻0

π‘₯𝑝(2π‘˜, 2), 𝐻𝑝(2π‘˜) = 𝐻1

Note that 𝛽(2π‘˜ βˆ’ 1) must be equal to π‘₯𝑠(π‘˜) in the case ofCR succeeding in decoding the received signal; otherwise, CRwill not be able to decode successfully. By substituting thisresult into (20) and combining that with (22), CD achievesan enhanced signal version as given by (23), from which thesignal-to-interference-and-noise ratio (SINR) is calculated as

SINRd(Θ = 1)

=βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 𝛾𝑠

βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜ βˆ’ 1, 2)∣2 + βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜, 2)∣2 + 2(24)

If CR fails to decode its received signal or to detect a spectrumhole at time slot 2π‘˜, such an event can be described as (25). Inthis case, CS, instead of CR, would determine whether or notto repeat the transmission of signal π‘₯𝑠(π‘˜) to CD depending onits hole detection result at time slot 2π‘˜. In the case of Θ = 2,the signal received at CD from CS during the time slot 2π‘˜ canbe written as

𝑦𝑑(2π‘˜,Θ = 2) =β„Žπ‘ π‘‘(π‘˜)βˆšπ‘ƒπ‘ π›½(2π‘˜) + β„Žπ‘π‘‘(π‘˜)

βˆšπ‘ƒπ‘πœƒ(2π‘˜, 2)

+ 𝑛𝑑(2π‘˜)(26)

where 𝛽(2π‘˜) is defined as

𝛽(2π‘˜) =

{π‘₯𝑠(π‘˜), �̂�𝑠(2π‘˜) = 𝐻0

0, �̂�𝑠(2π‘˜) = 𝐻1

Combining (20) and (26) with MRC method, CD can achievean enhanced signal version as given by

𝑦𝑑(2π‘˜,Θ = 2) = β„Žπ‘ π‘‘(π‘˜)βˆšπ‘ƒπ‘ π›½(2π‘˜ βˆ’ 1) + β„Žπ‘ π‘‘(π‘˜)

βˆšπ‘ƒπ‘ π›½(2π‘˜)

+ β„Žπ‘π‘‘(π‘˜)βˆšπ‘ƒπ‘πœƒ(2π‘˜ βˆ’ 1, 2) + β„Žπ‘π‘‘(π‘˜)

βˆšπ‘ƒπ‘πœƒ(2π‘˜, 2)

+ 𝑛𝑑(2π‘˜ βˆ’ 1) + 𝑛𝑑(2π‘˜)(27)

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2683

Θ = 1 :(1βˆ’ 𝛼)

2log

(1 +

βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 𝛾𝑠 βˆ£π›½(2π‘˜ βˆ’ 1)∣2βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜ βˆ’ 1, 2)∣2 + 1

)> 𝑅 and οΏ½Μ‚οΏ½π‘Ÿ(2π‘˜) = 𝐻0 (21)

𝑦𝑑(2π‘˜,Θ = 1) = β„Žπ‘ π‘‘(π‘˜)βˆšπ‘ƒπ‘ π‘₯𝑠(π‘˜)+β„Žπ‘Ÿπ‘‘(π‘˜)

βˆšπ‘ƒπ‘ π‘₯𝑠(π‘˜)+β„Žπ‘π‘‘(π‘˜)

βˆšπ‘ƒπ‘πœƒ(2π‘˜βˆ’1, 2)+β„Žπ‘π‘‘(π‘˜)

βˆšπ‘ƒπ‘πœƒ(2π‘˜, 2)+𝑛𝑑(2π‘˜βˆ’1)+𝑛𝑑(2π‘˜)

(23)

Θ = 2 :(1βˆ’ 𝛼)

2log

(1 +

βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 𝛾𝑠 βˆ£π›½(2π‘˜ βˆ’ 1)∣2βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜ βˆ’ 1, 2)∣2 + 1

)< 𝑅 or οΏ½Μ‚οΏ½π‘Ÿ(2π‘˜) = 𝐻1 (25)

from which the corresponding SINR can be calculated as

SINRd(Θ = 2)

=βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 βˆ£π›½(2π‘˜ βˆ’ 1)∣2 + βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 𝛾𝑠 βˆ£π›½(2π‘˜)∣2

βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜ βˆ’ 1, 2)∣2 + βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝 βˆ£πœƒ(2π‘˜, 2)∣2 + 2(28)

Now, we have formulated the signal models for the cognitiverelay transmission, based on which a detailed analysis of theoverall outage probability is presented in the following, andalso a performance comparison with the non-relay transmis-sion is conducted to illustrate the advantage of the proposedcognitive relay scheme. According to the coding theorem [31],an outage event is deemed to occur when the channel capacityfalls below the data rate 𝑅. Thus, we can calculate the overalloutage probability of the cognitive relay transmission as

Pout,relay = Pr

{1βˆ’ 𝛼

2log (1 + SINRd) < 𝑅

}

= Pr

{1βˆ’ 𝛼

2log (1 + SINRd(Θ = 1)) < 𝑅,Θ = 1

}

+ Pr

{1βˆ’ 𝛼

2log (1 + SINRd(Θ = 2)) < 𝑅,Θ = 2

}

= Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1}+ Pr {SINRd(Θ = 2) < 𝛾𝑠Δ,Θ = 2}

(29)

where Ξ” = [22𝑅/(1βˆ’π›Ό) βˆ’ 1]/𝛾𝑠. Using the results fromAppendix B, we can obtain

Pout,relay = B2(a)+B2(b)+B2(c)+B2(d)+B12(a)βˆ’B12(b)(30)

Closed-form expressions of B2(a), B2(b), B2(c), B2(d),B12(a) and B12(b) are presented in Appendix B as givenby (B.5), (B.7), (B.8), (B.9), (B.13) and (B.14), respectively.As can be seen from (30), obtaining a general expression foran optimal spectrum sensing overhead 𝛼 as a function of theother parameters is very difficult. However, an optimal 𝛼 valuecan be determined through numerical computation.

B. Numerical Results and Analysis

Fig. 7 shows the overall outage probability versus thetransmit SNR 𝛾𝑠 using (9) and (30), respectively, in whichthe simulated results are also given by employing a typicallink-level simulation approach. From Fig. 7, one can see thatin low SNR regions, the outage performance of the cognitiverelay scheme performs worse than the non-relay transmission.This is because that out of consideration for practicability,

0 5 10 15 20 25 300.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Transmit SNR at CS (Ξ³s)

Ove

rall

outa

ge p

roba

bilit

y

Nonβˆ’relay transmission (theoretical)Nonβˆ’relay transmission (simulated)Cognitive relay (theoretical)Cognitive relay (simulated)

Fig. 7. Outage performance versus the transmit SNR at CS 𝛾𝑠 of the non-relay and the cognitive relay schemes with Pa = 0.8, πœ† = 0.1, Pd,s =Pd,r = 0.99, 𝛼 = 0.2, 𝑅 = 0.5 b/s/Hz, 𝛾𝑝 = 5 dB, 𝑇 = 20 ms, 𝑓𝑠 =25 kHz, 𝜎2

𝑝𝑠 = 𝜎2π‘π‘Ÿ = 𝜎2

𝑝𝑑 = 0.2, 𝜎2𝑠𝑑 = 1, and 𝜎2

π‘ π‘Ÿ = 𝜎2π‘Ÿπ‘‘ = 1.2.

we adopt a half-duplex relay, rather than a full-duplex relay,which would degrade the system performance. However, inhigher SNR regions, the benefits achieved overtake the costsand the performance of cognitive relay transmission outper-forms the non-relay scheme. Note that in practical wirelesscommunication systems, the transmit SNR shall be requiredto meet a satisfactory QoS and thus overly low transmit SNRis not practical. Accordingly, the advantage of the cognitiverelay scheme is achieved in practical communication systems.It is worth mentioning that the overall outage probability floorof the cognitive relay scheme is reduced noticeably comparedwith the non-relay scheme, demonstrating the advantage ofthe cognitive relay scheme. Besides, one can see from Fig. 7that the simulation results match the theoretical results well.

Fig. 8 illustrates the overall outage probability for thecognitive relay transmission by plotting (30) as a functionof 𝛾𝑠 for different spectrum sensing overhead 𝛼 values. Asshown in Fig. 8, the curves approach to their respective outageprobability floors in high SNR regions and, also, the floors godown with the increase of spectrum sensing overhead 𝛼. Thisis due to the fact that at high 𝛾𝑠 values, the outage probabilityis dominantly dependent on the detection probability that canbe improved as the overhead 𝛼 increases. Besides, one cansee from Fig. 8 that in lower SNR regions, the relationship

2684 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

0 5 10 15 20 25 300.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Transmit SNR at CS (Ξ³s)

Ove

rall

outa

ge p

roba

bilit

y

Ξ± =0.1

Ξ± =0.2

Ξ± =0.5

Fig. 8. Overall outage probability versus the transmit SNR at CS 𝛾𝑠 fordifferent values of the spectrum sensing overhead 𝛼 with Pa = 0.8, πœ† =0.1, Pd,s = Pd,r = 0.99, 𝑅 = 0.5 b/s/Hz, 𝛾𝑝 = 5 dB, 𝑇 = 20 ms,𝑓𝑠 = 25 kHz, 𝜎2

𝑝𝑠 = 𝜎2π‘π‘Ÿ = 𝜎2

𝑝𝑑 = 0.2, 𝜎2𝑠𝑑 = 1, and 𝜎2

π‘ π‘Ÿ = 𝜎2π‘Ÿπ‘‘ = 0.8.

0 0.2 0.4 0.6 0.8 10.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Spectrum sensing overhead (Ξ±)

Ove

rall

outa

ge p

roba

bilit

y

R=0.8 b/s/HzR=0.4 b/s/Hz

Fig. 9. Overall outage probability versus the spectrum sensing overhead 𝛼for different values of the data rate 𝑅 with Pa = 0.8, πœ† = 0.1, Pd,s =Pd,r = 0.99, 𝛾𝑠 = 10 dB, 𝛾𝑝 = 5 dB, 𝑇 = 20 ms, 𝑓𝑠 = 25 kHz, 𝜎2

𝑝𝑠 =𝜎2π‘π‘Ÿ = 𝜎2

𝑝𝑑 = 0.5, 𝜎2𝑠𝑑 = 1.5, and 𝜎2

π‘ π‘Ÿ = 𝜎2π‘Ÿπ‘‘ = 1.

between the overall outage probability and spectrum sensingoverhead 𝛼 is not simply increasing or decreasing. In Fig.9, we further show the overall outage probability versus thespectrum sensing overhead 𝛼. As can be observed from Fig.9, the optimal values of 𝛼 corresponding to 𝑅 = 0.4 b/s/Hzand 𝑅 = 0.8 b/s/Hz are approximately equal to 0.3 and 0.15,respectively. It is pointed out that for any given parameter set,an optimal spectrum sensing overhead π›Όβˆ— can be determinedthrough numerical computation.

V. CONCLUSION

Cognitive radio has been proposed as an effective meansto promote the utilization of valuable wireless spectrum re-sources. In this paper, we have presented a comprehensiveanalysis for the cognitive transmission, where a cognitive

source first detects the available spectrum holes through spec-trum sensing and then transmits its data over the detectedholes. A closed-form expression of the overall outage proba-bility for cognitive transmissions has been obtained to showthe impact of spectrum sensing overhead. Numerical resultshave shown that minimum overall outage probability can beachieved through a tradeoff between the hole detection andthe data transmission phases.

Furthermore, we have proposed a cognitive relay transmis-sion scheme, in which a cognitive relay is used to assist a cog-nitive source for the data transmission in an adaptive manner.In particular, cognitive relay forwards its decoded result onlywhen it can decode the received signal successfully and candetect a spectrum hole; otherwise, the cognitive source, insteadof the cognitive relay, would determine whether or not torepeat the signal transmission depending on its hole detectionresult. Also, a closed-form expression of the overall outageprobability has been derived for the proposed cognitive relayscheme. Numerical evaluations have been conducted to showthe advantage of the cognitive relay transmission scheme.

APPENDIX ADERIVATION OF (9)

Considering the central limit theorem (CLT), for a largenumber 𝑁 , random variable 𝑇 (𝑦) given 𝐻𝑝(π‘˜, 1) = 𝐻0

follows a Gaussian distribution with mean 𝑁0 and variance𝑁2

0 /𝑁 (see the proposition 1 in [25] for proof). Therefore,the false alarm probability Pf(π‘˜) at time slot π‘˜ is obtainedfrom (7) as

Pf(π‘˜) ∼=∫ +∞

𝛿

βˆšπ‘βˆš

2πœ‹π‘0

exp[βˆ’π‘(π‘₯βˆ’π‘0)2

2𝑁20

]𝑑π‘₯

= 𝑄

((𝛿

𝑁0βˆ’ 1)

βˆšπ‘

) (A.1)

where 𝑄(β‹…) is defined as

𝑄(π‘₯) =1√2πœ‹

∫ +∞

π‘₯

exp(βˆ’π‘¦2

2)𝑑𝑦 (A.2)

Without loss of generality, we consider that the primary signalfollows a complex symmetric Gaussian distribution, whicha typical OFDM (orthogonal frequency-division multiplex)modulated signal [32]. Note that we can similarly extend to theother modulation types, such as the BPSK, QPSK or 16QAMmodulated primary signal. According to the proposition 2 in[25], for a large number 𝑁 , random variable 𝑇 (𝑦) given𝐻𝑝(π‘˜, 1) = 𝐻1 follows a Gaussian distribution with mean(βˆ£β„Žπ‘π‘ (π‘˜)∣2𝛾𝑝 + 1)𝑁0 and variance (βˆ£β„Žπ‘π‘ (π‘˜)∣2𝛾𝑝 + 1)2𝑁2

0 /𝑁 ,where β„Žπ‘π‘ (π‘˜) is a fading coefficient of the channel from PUto CS at time slot π‘˜. Hence, the detection probability Pd(π‘˜)at time slot π‘˜ is calculated from (8) as

Pd(π‘˜) = 𝑄

(π›Ώβˆšπ‘

𝑁0(βˆ£β„Žπ‘π‘ (π‘˜)∣2𝛾𝑝 + 1)βˆ’βˆšπ‘

)(A.3)

Given a target detection probability Pd and fading coefficientβ„Žπ‘π‘ (π‘˜), the instantaneous false alarm probability Pf(π‘˜) iscalculated from (A.1) and (A.3) as

Pf(π‘˜) = 𝑄(πœ…βˆ£β„Žπ‘π‘ (π‘˜)∣2 +π‘„βˆ’1(Pd)

)(A.4)

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2685

where πœ… = π›Ύπ‘π‘„βˆ’1(Pd) +

βˆšπ‘π›Ύπ‘ and π‘„βˆ’1(β‹…) is an inverse

𝑄(β‹…) function. Notice that RV 𝑋 = βˆ£β„Žπ‘π‘ (π‘˜)∣2 follows anexponential distribution with parameter 1/𝜎2

𝑝𝑠. Therefore, theaverage false alarm probability Pf can be calculated as

Pf =

∫ ∞

0

𝑄(πœ…π‘₯+π‘„βˆ’1(Pd)

) 1

𝜎2𝑝𝑠

exp(βˆ’ π‘₯

𝜎2𝑝𝑠

)𝑑π‘₯

=

∫∫Ξ

1

𝜎2𝑝𝑠

exp(βˆ’ π‘₯

𝜎2𝑝𝑠

)1√2πœ‹

exp(βˆ’π‘¦2

2)𝑑π‘₯𝑑𝑦

(A.5)

where Ξ ={(π‘₯, 𝑦)∣0 < π‘₯ < ∞, πœ…π‘₯+π‘„βˆ’1(Pd) < 𝑦 < ∞}.

Integrating (A.5) first with respect to π‘₯, then with respect to𝑦, we obtain

Pf =

⎧⎨⎩

Pd + [1βˆ’π‘„(π‘„βˆ’1(Pd) +1

𝜎2π‘π‘ πœ…

)] exp(πœ‰), 𝑄(βˆ’βˆšπ‘) < Pd ≀ 1

Pd, Pd = 𝑄(βˆ’βˆšπ‘)

Pd βˆ’π‘„(π‘„βˆ’1(Pd) +1

𝜎2π‘π‘ πœ…

) exp(πœ‰), 0 ≀ Pd < 𝑄(βˆ’βˆšπ‘)

(A.6)

where πœ‰ = π‘„βˆ’1(Pd)𝜎2psπœ…

+ 12𝜎4

psπœ…2 . From detection theory, for any

reasonable detector, Pf is always smaller than or equal to Pd,or else it is worse than tossing a coin. Therefore, the numberof samples 𝑁 should satisfy

𝑁 β‰₯ [π‘„βˆ’1(Pd)]2 (A.7)

which is due to the fact that from central limit theorem, thenumber of samples should be sufficiently large so that the out-put statistic 𝑇 (𝑦) of the energy detector can be approximatedto a Gaussian distribution. Combining (A.6) and (A.7) yields

Pf =

⎧⎨⎩Pd, Pd = 𝑄(βˆ’βˆš

𝑁)

Pd βˆ’π‘„(π‘„βˆ’1(Pd) +1

𝜎2π‘π‘ πœ…

) exp(πœ‰), otherwise

(A.8)Note that RVs βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 and βˆ£β„Žπ‘π‘‘(π‘˜)∣2 follow the exponentialdistribution with parameters 1/𝜎2

𝑠𝑑 and 1/𝜎2𝑝𝑑, respectively,

and are independent of each other. Thus, the probabilityintegrals given in (5) can be calculated as

Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ›

}= 1βˆ’ exp(βˆ’ Ξ›

𝜎2𝑠𝑑

) (A.9)

and

Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Λ < Ξ›

}=

∫∫Ω

1

𝜎2𝑠𝑑

exp(βˆ’ π‘₯

𝜎2𝑠𝑑

)1

𝜎2𝑝𝑑

exp(βˆ’ 𝑦

𝜎2𝑝𝑑

)𝑑π‘₯𝑑𝑦(A.10)

where Ξ© = {(π‘₯, 𝑦)∣π‘₯βˆ’ 𝑦𝛾𝑝Λ < Ξ›}. Eq. (A.10) can be derivedas

Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Λ < Ξ›

}= 1βˆ’ 𝜎2

𝑠𝑑

𝜎2𝑝𝑑𝛾𝑝Λ + 𝜎2

𝑠𝑑

exp(βˆ’ Ξ›

𝜎2𝑠𝑑

)(A.11)

Substituting (A.9) and (A.11) into (5) yields (9).

APPENDIX BCALCULATION OF (17)

The term Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1} given in (29)can be rewritten as (B.1) at the top of the following page.By using conditional probabilities, (B.1) can be calculated as

(B.2), where Pf,s and Pd,s are, respectively, the probability offalse alarm and the probability of detection of the primary-user-presence by CS and, moreover, Pf,r and Pd,r are thecorresponding probabilities of primary user detection by CR.Similar to (A.9), it is easy to show

Pf,s =

⎧⎨⎩Pd,s, Pd,s = 𝑄(βˆ’βˆš

𝑁)

Pd,s βˆ’π‘„(π‘„βˆ’1(Pd,s) +1

𝜎2π‘π‘ πœ…π‘ 

) exp(πœ‰π‘ ), otherwise

(B.3)and

Pf,r =

⎧⎨⎩Pd,r, Pd,r = 𝑄(βˆ’βˆš

𝑁)

Pd,r βˆ’π‘„(π‘„βˆ’1(Pd,r) +1

𝜎2π‘π‘ πœ…π‘Ÿ

) exp(πœ‰π‘Ÿ), otherwise

(B.4)where πœ…π‘  = 𝛾𝑝𝑄

βˆ’1(Pd,s) +βˆšπ‘π›Ύπ‘, πœ‰π‘  =

π‘„βˆ’1(Pd,s)𝜎2π‘π‘ πœ…π‘ 

+

12𝜎4

π‘π‘ πœ…2𝑠, πœ…π‘Ÿ = 𝛾𝑝𝑄

βˆ’1(Pd,r) +βˆšπ‘π›Ύπ‘ πœ‰π‘Ÿ =

π‘„βˆ’1(Pd,r)𝜎2π‘π‘Ÿπœ…π‘Ÿ

+1

2𝜎4π‘π‘Ÿπœ…

2π‘Ÿ, and the number of samples satisfies 𝑁 β‰₯

max{[Qβˆ’1(Pd,s)]2, [Qβˆ’1(Pd,r)]

2}. Clearly, the first term,B2(a), as given in (B.2) is given by

B2(a) = Pa(1βˆ’Pt)(1 βˆ’ Pf,s)(1βˆ’Pf,r)exp(βˆ’ Ξ”

𝜎2π‘ π‘Ÿ

)πœ› (B.5)

where parameter πœ› is given by

πœ› =

⎧⎨⎩

1βˆ’ (1 +2Ξ”

𝜎2𝑠𝑑

) exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

), 𝜎2𝑠𝑑 = 𝜎2

π‘Ÿπ‘‘

1βˆ’ 𝜎2𝑠𝑑

𝜎2𝑠𝑑 βˆ’ 𝜎2

π‘Ÿπ‘‘

exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

βˆ’ 𝜎2π‘Ÿπ‘‘

𝜎2π‘Ÿπ‘‘ βˆ’ 𝜎2

𝑠𝑑

exp(βˆ’ 2Ξ”

𝜎2π‘Ÿπ‘‘

), otherwise

(B.6)

Also, the second term, B2(b), in (B.2) is calculated as

B2(b) =Pt(1βˆ’ Pd,r)

(1βˆ’ Pt)(1 βˆ’ Pf,r)B2(a)

+ PaPt(1βˆ’ Pf,s)(1 βˆ’ Pd,r)exp(βˆ’ Ξ”

𝜎2π‘ π‘Ÿ

)πœ—

(B.7)

where B2(a) is given in (B.5) and the parameter πœ— is givenby

πœ— =

⎧⎨⎩

K

H𝑠𝑑

(K

H𝑠𝑑+

2Ξ”

𝜎2𝑠𝑑

)exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

), 𝜎2𝑠𝑑 = 𝜎2

π‘Ÿπ‘‘

𝜎2𝑠𝑑K

(𝜎2𝑠𝑑 βˆ’ 𝜎2

π‘Ÿπ‘‘)H𝑠𝑑exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

+𝜎2π‘Ÿπ‘‘K

(𝜎2π‘Ÿπ‘‘ βˆ’ 𝜎2

𝑠𝑑)Hπ‘Ÿπ‘‘exp(βˆ’ 2Ξ”

𝜎2π‘Ÿπ‘‘

), otherwise

where Ξ” = [22𝑅/(1βˆ’π›Ό)βˆ’1]/𝛾𝑠, K = 𝜎2𝑝𝑑𝛾𝑝Δ, H𝑠𝑑 = K+𝜎2

𝑠𝑑

and Hπ‘Ÿπ‘‘ = K+ 𝜎2π‘Ÿπ‘‘. Similarly, the third term, B2(c), in (B.2)

is calculated as

B2(c) =(1βˆ’ Pa)(1βˆ’ Pd,s)(1βˆ’ Pf,r)𝜎

2π‘ π‘Ÿ

Pa(1βˆ’ Pf,s)(1βˆ’ Pd,r)(𝜎2π‘ π‘Ÿ + 𝜎2

π‘π‘Ÿπ›Ύπ‘Ξ”)Γ— B2(b)

(B.8)where B2(b) is given in (B.7). Besides, the fourth term, B2(d),as given in (B.2) is calculated as

B2(d) = (1βˆ’ Pa)(1βˆ’ Pt)(1βˆ’ Pd,s)(1βˆ’ Pd,r)

Γ— Pr{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ > Ξ”

} β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹…B9(I)Γ— Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 βˆ’ 2 βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”} β‹… β‹… β‹…B9(II)

(B.9)

2686 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1}= Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1, 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻0, 𝐻𝑝(2π‘˜) = 𝐻0}+ Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1, 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻0, 𝐻𝑝(2π‘˜) = 𝐻1}+ Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1, 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻1, 𝐻𝑝(2π‘˜) = 𝐻0}+ Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1, 𝐻𝑝(2π‘˜ βˆ’ 1) = 𝐻1, 𝐻𝑝(2π‘˜) = 𝐻1}

(B.1)

Pr {SINRd(Θ = 1) < 𝛾𝑠Δ,Θ = 1}= Pa(1βˆ’ Pt)(1βˆ’ Pf,s)(1 βˆ’ Pf,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 < 2Ξ”, βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ PaPt(1 βˆ’ Pf,s)(1βˆ’ Pd,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”, βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ (1βˆ’ Pa)Pt(1βˆ’ Pd,s)(1βˆ’ Pf,r) Pr

{ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”,

βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ > Ξ”

}

+ (1βˆ’ Pa)(1 βˆ’ Pt)(1 βˆ’ Pd,s)(1 βˆ’ Pd,r) Pr

{ βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 + βˆ£β„Žπ‘Ÿπ‘‘(π‘˜)∣2 βˆ’ 2 βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”,

βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ > Ξ”

}(B.2)

where B9(I) is calculated as

B9(I) =𝜎2π‘ π‘Ÿ

𝜎2π‘π‘Ÿπ›Ύπ‘Ξ”+ 𝜎2

π‘ π‘Ÿ

exp(βˆ’ Ξ”

𝜎2π‘ π‘Ÿ

) (B.10)

Furthermore, B9(II) can be derived as

B9(II) = πœ› + πœ— (B.11)

where the parameter πœ› is given by (B.6) and πœ— is

πœ— =

⎧⎨⎩

K̃

H̃𝑠𝑑

(K̃

H̃𝑠𝑑

+2Ξ”

𝜎2𝑠𝑑

)exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

), 𝜎2𝑠𝑑 = 𝜎2

π‘Ÿπ‘‘

𝜎2𝑠𝑑KΜƒ

(𝜎2𝑠𝑑 βˆ’ 𝜎2

π‘Ÿπ‘‘)H̃𝑠𝑑

exp(βˆ’ 2Ξ”

𝜎2𝑠𝑑

)

+𝜎2π‘Ÿπ‘‘KΜƒ

(𝜎2π‘Ÿπ‘‘ βˆ’ 𝜎2

𝑠𝑑)HΜƒπ‘Ÿπ‘‘

exp(βˆ’ 2Ξ”

𝜎2π‘Ÿπ‘‘

), otherwise

where KΜƒ = 2𝜎2𝑝𝑑𝛾𝑝Δ, H̃𝑠𝑑 = KΜƒ + 𝜎2

𝑠𝑑 and HΜƒπ‘Ÿπ‘‘ = KΜƒ + 𝜎2π‘Ÿπ‘‘.

According to the definition of the case Θ = 2 as given in (25),we have

Pr {SINRd(Θ = 2) < 𝛾𝑠Δ,Θ = 2}= Pr {SINRd(Θ = 2) < 𝛾𝑠Δ} β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹… β‹…B12(a)βˆ’ Pr {SINRd(Θ = 2) < 𝛾𝑠Δ,Θ = 1} β‹… β‹… β‹…B12(b)

(B.12)

Using conditional probabilities, the terms B12(a) andB12(b) can be calculated as (B.13) and (B.14), re-spectively, at the top of the following page. and Notethat we can easily obtain the closed-form expressionsof all the probability integrals as given in (B.13) and(B.14). We have now derived the closed-form expres-sions for the terms Pr {SINRd(Θ = 1) <𝛾𝑠Δ,Θ = 1} andPr {SINRd(Θ = 2) <𝛾𝑠Δ,Θ = 2} as given in (B.2) and(B.12), respectively.

ACKNOWLEDGMENT

The authors are grateful to the anonymous reviewers fortheir valuable comments and constructive suggestions thathave indeed helped improve this paper significantly.

REFERENCES

[1] Federal Communications Commission (FCC), ET Docket No 03-322Notice of Proposed Rule Making and Order, Dec. 2003.

[2] J. Mitola and G. Q. Maguire, β€œCognitive radio: making software radiosmore personal,” IEEE Personal Commun., vol. 6, pp. 13-18, 1999.

[3] S. Haykin, β€œCognitive radio: brain-empowered wireless communica-tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, 2005.

[4] F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, β€œNeXt gen-eration/dynamic spectrum access/cognitive radio wireless networks: asurvey,” Computer Networks, vol. 50, pp. 2127-2159, 2006.

[5] H. Urkowitz, β€œEnergy detection of unknown deterministic signals,” Proc.IEEE, vol. 55, no. 4, pp. 523-531, 1967.

[6] V. I. Kostylev, β€œEnergy detection of a signal with random amptitude,”in Proc. IEEE International Conference on Communications, vol. 3, pp.1606-1610, 2002.

[7] A. Sahai, N. Hoven, and R. Tandra, β€œSome fundamental limits incognitive radio,” in Proc. Allerton Conf. on Commun., Control andComputing, 2004.

[8] S. M. Kay, Fundamentals of Statistical Signal Processing: DetectionTheory. Upper Saddle River, NJ: Prentice Hall, 1998.

[9] A. Fehske, J. D. Gaeddert, and J. H. Reed, β€œA new approach to signalclassification using spectral correlation and neural networks,” in Proc.IEEE DySPAN, pp. 144-150, Nov. 2005.

[10] P. D. Sutton, K. E. Nolan, and L. E. Doyle, β€œCyclostationary signaturesin practical cognitive radio applications,” IEEE J. Sel. Areas Commun.,vol. 26, no. 1, pp. 13-24, 2008.

[11] A. Ghasemi and E. S. Sousa, β€œCollaborative spectrum sensing foropportunistic access in fading environment,” in Proc. IEEE DYSPAN,pp. 131-136, 2005.

[12] G. Ganesan and Y. G. Li, β€œCooperative spectrum sensing in cognitiveradioβ€”part I: two user networks,” IEEE Trans. Wireless Commun., vol.6, no. 6, pp. 2204-2213, 2007.

[13] J. Zhu, Y. Zou, and B. Zheng, β€œCooperative detection for primaryuser in cognitive radio networks,” EURASIP J. Wireless Commun. andNetworking, 2009, doi:10.1155/2009/617320.

[14] R. W. Pabst and B. H. Shultz, et al., β€œRelay-based deployment conceptsfor wireless and mobile broadband radio,” IEEE Commun. Mag., vol.42, no. 9, pp. 80-89, Sep. 2004.

[15] A. J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bolcskei, β€œAn overviewof MIMO communicationsβ€”a key to gigabit wireless,” Proc. IEEE, vol.92, no. 2, pp. 198-218, Feb. 2004.

[16] J. N. Laneman and G. W. Wornell, β€œDistributed space-time-codedprotocols for exploiting cooperative diversity in wireless networks,”IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2415-2425, Oct. 2003.

[17] A. Sendonaris, E. Erkip, and B. Aazhang, β€œUser cooperation diversityβ€”part I: system description,” IEEE Trans. Commun., vol. 51, no. 11, pp.1927-1938, 2003.

[18] A. Nosratinia and T. E. Hunter, β€œCooperative communication in wirelessnetworks,” IEEE Commun. Mag., vol. 42, no.10, pp. 74-80, 2004.

ZOU et al.: OUTAGE PROBABILITY ANALYSIS OF COGNITIVE TRANSMISSIONS: IMPACT OF SPECTRUM SENSING OVERHEAD 2687

B12(a) =Pa(1βˆ’ Pt)(1 βˆ’ Pf,s)2 Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ”

}+ (1 βˆ’ Pa)(1 βˆ’ Pt)(1 βˆ’ Pd,s)

2 Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < Ξ”

}+ Pt(1βˆ’ Pf,s)(1 βˆ’ Pd,s) Pr

{2 βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}+ 2Pa(1βˆ’ Pt)(1 βˆ’ Pf,s)Pf,sPr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < 2Ξ”

}+ 2(1βˆ’ Pa)(1βˆ’ Pt)(1 βˆ’ Pd,s)Pd,sPr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ 2 βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}+ Pt(Pd,s + Pf,sβˆ’2Pf,sPd,s) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}+ Pa(1βˆ’ Pt)P

2f,s + PtPd,sPf,s + (1βˆ’ Pa)(1βˆ’ Pt)P

2d,s

(B.13)

B12(b) =Pa(1 βˆ’ Pt)(1 βˆ’ Pf,s)2(1βˆ’ Pf,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < Ξ”

}Pr{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ PaPt(1 βˆ’ Pf,s)(1βˆ’ Pd,s)(1βˆ’ Pd,r) Pr

{2 βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ (1βˆ’ Pa)Pt(1βˆ’ Pf,s)(1 βˆ’ Pd,s)(1 βˆ’ Pf,r) Pr

{2 βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ > Ξ”

}+ (1βˆ’ Pa)(1 βˆ’ Pt)(1 βˆ’ Pd,s)

2(1βˆ’ Pd,r) Pr{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ>Ξ”

}+ Pa(1βˆ’ Pt)(1βˆ’ Pf,s)Pf,s(1 βˆ’ Pf,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 < 2Ξ”

}Pr{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ PaPt(1 βˆ’ Pf,s)Pd,s(1βˆ’ Pd,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 > Ξ”

}+ (1βˆ’ Pa)Pt(1βˆ’ Pd,s)Pf,s(1βˆ’ Pf,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ > Ξ”

}+ (1βˆ’ Pa)(1 βˆ’ Pt)(1 βˆ’ Pd,s)Pd,s(1βˆ’ Pd,r) Pr

{βˆ£β„Žπ‘ π‘‘(π‘˜)∣2 βˆ’ 2 βˆ£β„Žπ‘π‘‘(π‘˜)∣2 𝛾𝑝Δ < 2Ξ”

}Γ— Pr

{βˆ£β„Žπ‘ π‘Ÿ(π‘˜)∣2 βˆ’ βˆ£β„Žπ‘π‘Ÿ(π‘˜)∣2 𝛾𝑝Δ>Ξ”

}

(B.14)

[19] T. E. Hunter, S. Sanayei, and A. Nosratinia. β€œOutage analysis of codedcooperation,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 375-391, 2006.

[20] A. Bletsas, A. Khisti, et al., β€œA simple cooperative diversity methodbased on network path selection,” IEEE J. Sel. Areas Commun., vol. 24,no. 3, pp. 659-672, 2006.

[21] Y. Zou, B. Zheng, and J. Zhu, β€œOutage analysis of opportunistic cooper-ation over Rayleigh fading channels,” IEEE Trans. Wireless Commun.,vol. 8, no. 6, pp. 3077-3385, June 2009.

[22] Y. Zou, B. Zheng, and W. P. Zhu, β€œAn opportunistic cooperation andits BER analysis,” IEEE Trans. Wireless Commun., vol. 8, no. 9, pp.4492-4497, Sep. 2009.

[23] Y. Zou, J. Zhu, B. Zheng, and Y.-D. Yao, β€œAn adaptive cooperationdiversity scheme with best-relay selection in cognitive radio networks,”accepted to appear in IEEE Trans. Signal Process., 2010.

[24] A. Ghasemi and E. S. Sousa, β€œOptimization of spectrum sensing foropportunistic spectrum access in cognitive radio networks,” in Proc.Consumer Communications and Networking Conf. (CCNC 2007), Jan.2007, pp. 1022-1026.

[25] Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, β€œSensing-throughputtradeoff for cognitive radio networks,” IEEE Trans. Wireless Commun.,vol. 7, no. 4, pp. 1326-1337, Apr. 2008.

[26] Y. Pei, A. T. Hoang, and Y.-C. Liang, β€œSensing-throughput tradeoff incognitive radio networks: how frequently should spectrum sensing be

carried out?” in Proc. IEEE Int. Symp. Personal, Indoor and MobileRadio Commun. (PIMRC 2007), Sep. 2007, pp. 1-5.

[27] W.-Y. Lee and I. F. Akyildiz, β€œOptimal spectrum sensing framework forcognitive radio networks,” IEEE Trans. Wireless Commun., vol. 7, no.10, pp. 3845-3857, Oct. 2008.

[28] C.-H. Huang, Y.-C. Lai, and K.-C. Chen, β€œNetwork capacity of cognitiveradio relay network,” Physical Commun., vol. 1, no. 2, June 2008.

[29] J. Jia, J. Zhang, and Q. Zhang, β€œCooperative relay for cognitive radionetworks,” in Proc. IEEE INFOCOM 2009, pp. 2304-2312.

[30] H. V. Poor, An Introduction to Signal Detection and Estimation.Springer-Verlag, 1994.

[31] C. E. Shannon, β€œA mathmatical theroy of communication,” Bell SystemTechn. J., vol. 27, pp. 379-423, 1948.

[32] S. Masoud, G.-A. Mohammad, and H. K. Babak, β€œOn the peak-to-average power of OFDM signals based on oversampling,” IEEE Trans.Commun., vol. 51, no. 1, pp. 72-78, Jan. 2003.

2688 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010

Yulong Zou received his B.Eng. degree (with thehighest honor) in Information Engineering fromNanjing University of Posts and Telecommunica-tions (NUPT), Nanjing China, in 2006. He is cur-rently working toward his Ph.D. degrees, respec-tively, at the Institute of Signal Processing andTransmission of NUPT, Nanjing China, and theElectrical and Computer Engineering Departmentof Stevens Institute of Technology (SIT), NJ USA.His research interests span the broad area of scal-able wireless communication and networking, with

emphasis on cooperative relay technology. Recently, he focuses on theinvestigation of cooperative relay techniques in cognitive radio networks.

Yu-Dong Yao (S’88-M’88-SM’94) has been withStevens Institute of Technology, Hoboken, New Jer-sey, since 2000 and is currently a professor anddepartment director of electrical and computer en-gineering. He is also a director of Stevens’ Wire-less Information Systems Engineering Laboratory(WISELAB). Previously, from 1989 and 1990, hewas at Carleton University, Ottawa, Canada, as aResearch Associate working on mobile radio com-munications. From 1990 to 1994, he was with SparAerospace Ltd., Montreal, Canada, where he was

involved in research on satellite communications. From 1994 to 2000, he waswith Qualcomm Inc., San Diego, CA, where he participated in research anddevelopment in wireless code-division multiple-access (CDMA) systems.

He holds one Chinese patent and twelve U.S. patents. His researchinterests include wireless communications and networks, spread spectrumand CDMA, antenna arrays and beamforming, cognitive and software definedradio (CSDR), and digital signal processing for wireless systems. Dr. Yao wasan Associate Editor of IEEE Communications Letters and IEEE Transactionson Vehicular Technology, and an Editor for IEEE Transactions on WirelessCommunications. He received the B.Eng. and M.Eng. degrees from NanjingUniversity of Posts and Telecommunications, Nanjing, China, in 1982 and1985, respectively, and the Ph.D. degree from Southeast University, Nanjing,China, in 1988, all in electrical engineering.

Baoyu Zheng received B.S. and M.S. degreesfrom the Department of Circuit and Signal System,NUPT, in 1969 and 1981, respectively. Since then,he has been engaged in teaching and researching atSignal and Information Processing. He is a full pro-fessor and doctoral advisor at NUPT. His researchinterests span the broad area of the intelligent signalprocessing, wireless network and signal processingfor modern communication, and the quantum signalprocessing.


Recommended