Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01-12-2010 | Research Article

Cooperative Detection for Primary User in Cognitive Radio Networks

Authors: Jia Zhu, Yulong Zou, Baoyu Zheng

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2009

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We propose two novel cooperative detection schemes based on the AF (Amplify and Forward) and DF (Decode and Forward) protocols to achieve spatial diversity gains for cognitive radio networks, which are referred to as the AF-CDS, (AF-based Cooperative Detection Scheme) and DF-CDS (DF-based Cooperative Detection Scheme), respectively. Closed-form expressions of detection probabilities for the noncooperation scheme, AND-CDS (AND-based Cooperative Detection Scheme), AF-CDS and DF-CDS, are derived over Rayleigh fading channels. Also, we analyze the overall agility for the proposed cooperative detection schemes and show that our schemes can further reduce the detection time. In addition, we compare the DF-CDS with the AF-CDS in terms of detection probability and agility gain, depicting the advantage of DF-CDS at low SNR region and high false alarm probability region.

1. Introduction

Cognitive radio (CR), built on software-defined radio, has been proposed in [1] as a means to promote the efficient use of the precious radio spectrum resources. It is defined as an intelligent wireless communication system [2] that is aware of the surrounding environment and utilizes the methodology of understanding-by-building to learn from the environment. Spectrum detection technique (also referred to as spectrum sensing) enables CR networks to adapt to the environment by detecting spectrum holes, and the most efficient way to detect the spectrum holes is to detect the presence of primary users [3]. In reality, however, it is difficult for a cognitive radio to have a direct measurement of the channel between a primary receiver and a transmitter. Therefore, the most recent work focuses on the primary transmitter detection based on local observations of secondary users (see [47]). Generally speaking, the spectrum sensing schemes proposed in recent years can be classified as noncooperative detection and cooperative detection.
At present, three noncooperative transmitter detection methods, namely, the matched filter detection, the energy detection and the cyclostationary feature detection, have been presented for CR networks. In [4], Sahai et al. have investigated the matched filter detector that can achieve high processing gain by employing coherent reception. In [5], energy detector has been put forward as an optimal method for the occasion where the secondary users cannot gather sufficient information about the primary user signal such as the modulation type, the pulse shape and so on, but it cannot differentiate signal types, thus inclining to false detection triggered by some unintended signals. The cyclostationary feature detection, as an alternative method, has been further presented in [6, 7], which can differentiate the modulated signal from the additive noise. However, this scheme is computationally complex and requires long observation time.
As to the cooperative detection, a collaborative spectrum sensing method has been proposed by Ghasemi and Sousa in [8], where the hard decision about the presence of the primary user from each secondary user is pooled together to determine the presence of primary user by utilizing a majority logic rule without the consideration of cooperative technology that has been proven as an effective means to combat Rayleigh fading [912]. More recently, Ganesan and Li [13, 14] have applied the AF protocol to the detection of primary users, and shown that by allowing the secondary users to cooperate with each other the detection time can be reduced. However, this cooperative scheme needs a centralized controller to manage all secondary users, which is some unreasonable for a practical wireless communication system. Besides, how to detect the presence of primary users through cooperation in DF-based CR networks, where the cooperative user has the ability to decode its received signal, is an open challenge.
In this paper, we address the above mentioned issues and present https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq1_HTML.gif a more practical AF-based cooperative detection scheme without the assumption of centralized controller and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq2_HTML.gif a totally new DF-based cooperative detection scheme for the occasion where the cooperative relay has decoding ability. Our main contributions can be described as follows. Firstly, we propose two new cooperative detection schemes, namely, AF-CDS and DF-CDS, to detect the presence of primary users more quickly and accurately. Secondly, we develop the closed-form expressions of detection probability and detection time for both AF-CDS and DF-CDS over Rayleigh fading channels. Thirdly, the performance analysis for the noncooperation scheme and the AND-CDS (AND-based cooperative detection scheme) is also presented for the purpose of comparison with our schemes.
The remainder of this paper is organized as follows. Section 2 describes the system model used throughout this paper and proposes two new cooperative detection schemes (i.e., AF-CDS and DF-CDS) to improve the detection performance of cognitive radio network. In Section 3, we derive the closed-form expressions of detection probabilities and agility gains for the AF-CDS and DF-CDS as well as the traditional noncooperation scheme and AND-CDS, followed by numerical results analysis in Section 4, where we show the superiority of the proposed AF-CDS and DF-CDS schemes in terms of detection performances. Finally, we make some concluding remarks in Section 5.

2. Proposed Cooperative Detection Schemes

In this section, we first describe the system model used in the paper, and then propose AF-CDS and DF-CDS to improve the detection performance of CR networks.

2.1. System Model

Consider a cognitive radio network with a primary user and two secondary users as shown in Figure 1, where the wireless link between the primary user and the secondary user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq3_HTML.gif occurs shadowing fading, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq4_HTML.gif acts as a cooperative relay for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq5_HTML.gif All users in the CR network are equipped with a single antenna, and the antenna at any user can be utilized for both transmission and reception. There is independent, additive complex white Gaussian noise with zero-mean and double-sided power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq6_HTML.gif at each receiver.
Without loss of generality, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq7_HTML.gif be the primary user indicator, namely, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq8_HTML.gif implies the presence of primary user and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq9_HTML.gif implies its absence. Therefore, the signals received by secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq10_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq11_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ1_HTML.gif
(1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ2_HTML.gif
(2)
where the subscripts https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq12_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq13_HTML.gif denote the transmission from the primary user to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq14_HTML.gif and that from the primary user to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq15_HTML.gif respectively. Besides, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq16_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq17_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq18_HTML.gif are the fading coefficients of the wireless channel from the primary user to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq19_HTML.gif , from the primary user to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq20_HTML.gif , and from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq21_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq22_HTML.gif , respectively. Note that the variances of the three random variables (RVs) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq23_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq25_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq26_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq27_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq28_HTML.gif respectively. Throughout the paper, we make following assumptions: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq29_HTML.gif All wireless channels are independent from each other in space; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq30_HTML.gif The relaying protocols (i.e., the AF and the DF) employ full duplex mode, meaning that the relay can perform signal reception when transmits.

2.2. AF-Based Cooperative Detection Scheme

An important requirement of a cognitive radio network is to detect the presence of primary users as quickly as possible. Suppose that the primary user starts using the spectrum band. Then, the two secondary users need to sense the unavailability of the band as soon as possible to avoid collision with primary user. However, when the wireless link between the primary user and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq31_HTML.gif encounters shadowing fading, the signal received by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq32_HTML.gif from the primary user is so weak that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq33_HTML.gif takes a long time to detect its presence. We show that by cooperation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq34_HTML.gif the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq35_HTML.gif can be increased, thus reducing the overall detection time of the CR network.
Throughout the paper, we allow the secondary user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq36_HTML.gif to act as a cooperative relay for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq37_HTML.gif . Figure 1 describes a scenario where two secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq38_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq39_HTML.gif are engaged in detecting the presence of primary user in a particular band. The whole implementation process of AF-CDS can be separated into two consecutive phases, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq40_HTML.gif in odd time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq41_HTML.gif , both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq42_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq43_HTML.gif receive the signals transmitted from primary user; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq44_HTML.gif in even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq45_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq46_HTML.gif starts relaying its received information to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq47_HTML.gif in accordance with AF protocol, and thus, in this time slot, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq48_HTML.gif would receive two signal copies simultaneously from the primary user and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq49_HTML.gif respectively. In the time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq50_HTML.gif the signals received by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq51_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq52_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ3_HTML.gif
(3)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq53_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq54_HTML.gif are the additive complex Gaussian noise with zero mean and double-sided power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq55_HTML.gif and independent from each other. In the even slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq56_HTML.gif the cooperative user, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq57_HTML.gif relays the message from primary user to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq58_HTML.gif According to AF protocol, the received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq59_HTML.gif as defined in (3) will be multiplied by a relay gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq60_HTML.gif and then forwarded to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq61_HTML.gif without any sort of decoding. Meanwhile, in the slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq62_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq63_HTML.gif simultaneously receives the signal from primary user. Therefore, the signal received by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq64_HTML.gif in even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq65_HTML.gif can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq66_HTML.gif denotes the instantaneous fading coefficient of the wireless channel from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq67_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq68_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq69_HTML.gif denotes the zero-mean additive complex Gaussian noise with double-sided power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq70_HTML.gif Substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq71_HTML.gif from (4) into (5) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ6_HTML.gif
(6)
For the convenience of theoretical analysis, consider relay gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq72_HTML.gif to compensate the fading distortion from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq73_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq74_HTML.gif . Substituting this result into (6) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ7_HTML.gif
(7)
Now, the detection problem of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq75_HTML.gif under AF-CDS can be stated as follows: given the observation
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ8_HTML.gif
(8)
in the odd time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq76_HTML.gif and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ9_HTML.gif
(9)
in the even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq77_HTML.gif   the detector decides on
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ10_HTML.gif
(10)
This is a standard detection problem for which there are many choices of detector available such as energy detector, matched filter detector and cyclostationary feature detector in the literatures [47]. In this paper, we use the energy detector (ED) [15] to show the advantage of the proposed cooperative scheme. The reasons for choosing ED are two-fold [13]: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq78_HTML.gif We want to show the effect of user cooperation on detection of primary user in CR networks. Hence, the choice of detector is not critical; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq79_HTML.gif We model the signal as a random variable with known power, and thus ED is optimal [15]. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq80_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq81_HTML.gif be the output power of the ED of the secondary user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq82_HTML.gif in the odd time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq83_HTML.gif under hypothesis https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq84_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq85_HTML.gif , respectively. Thus, from (8), we can easily obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ11_HTML.gif
(11)
Similarly, define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq86_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq87_HTML.gif as the output power of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq88_HTML.gif 's ED in the even slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq89_HTML.gif under hypothesis https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq90_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq91_HTML.gif , respectively. Hence, from (9), we can get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ12_HTML.gif
(12)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ13_HTML.gif
(13)
We will use (11)–(13) listed above to analyze the detection probability and detection time for the proposed AF-CDS in Section 3.

2.3. DF-Based Cooperative Detection Scheme

In this subsection, we present DF-CDS to achieve a better detection performance for CR networks. Consider the same scenario as AF-CDS with two secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq92_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq93_HTML.gif operating in a fixed TDMA mode for detecting the presence of primary user (see Figure 1). Here, according to DF protocol, the cooperative user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq94_HTML.gif should regenerate the primary user indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq95_HTML.gif based on its received signals, and then transmit the estimated indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq96_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq97_HTML.gif . Consequently, the detailed process of DF-CDS can be described as follows: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq98_HTML.gif in the odd time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq99_HTML.gif , both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq100_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq101_HTML.gif receive the signal from the primary user; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq102_HTML.gif in the even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq103_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq104_HTML.gif decodes its received information and forwards the decoding result to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq105_HTML.gif . Clearly, in odd time slots, the process of DF-CDS is the same as AF-CDS, implying that the output power of energy detector of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq106_HTML.gif for DF-CDS in odd time slots can also be expressed as (11). Besides, in the even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq107_HTML.gif the signal received by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq108_HTML.gif can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ14_HTML.gif
(14)
One can see that there are two possible cases for the decoding result of the primary user indicator, namely, the correct and the wrong decisions. Without loss of generality, let cases https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq109_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq110_HTML.gif denote the estimated indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq111_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq112_HTML.gif , respectively. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq113_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq114_HTML.gif be the output power of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq115_HTML.gif 's ED in even time slots for case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq116_HTML.gif under hypothesis https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq117_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq118_HTML.gif , respectively. Thus, from (14), it is easy to obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ15_HTML.gif
(15)
Similarly, define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq119_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq120_HTML.gif as the output power of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq121_HTML.gif 's ED for case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq122_HTML.gif under hypothesis https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq123_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq124_HTML.gif respectively. Thus, we can easily get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ16_HTML.gif
(16)
Now, we have described the system model and formulated the primary user detection problems for AF-CDS and DF-CDS, based on which a detailed performance analysis will be presented in the following.

3. Performance Analysis of the Proposed Schemes over Rayleigh Fading Channels

In this section, we investigate the detection probability and detection time for the proposed AF-CDS and DF-CDS in Rayleigh fading channels. For the purpose of comparison, let us consider first the noncooperative detection scheme and the existing AND-CDS (AND-based cooperative detection scheme) proposed in [8]. Given the transmitted signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq125_HTML.gif with power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq126_HTML.gif , the signal received by the user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq127_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ17_HTML.gif
(17)
Hence, according to the energy detector principles, we can easily calculate the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq128_HTML.gif under noncooperative scheme as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq129_HTML.gif is energy detection threshold that is determined by false alarm probability, which will be illustrated in the following. Note that the PDF of RV https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq130_HTML.gif can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq131_HTML.gif is a unit step function. Thus, (18) can be further calculated by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ20_HTML.gif
(20)
Furthermore, from (17), the false alarm probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq132_HTML.gif can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ21_HTML.gif
(21)
Noting that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq133_HTML.gif is zero-mean complex Gaussian noise with double-sided spectral power density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq134_HTML.gif , we can easily obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq135_HTML.gif . Thus, the false alarm probability is calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ22_HTML.gif
(22)
which results in
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ23_HTML.gif
(23)
Substituting the threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq136_HTML.gif from (23) into (20) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ24_HTML.gif
(24)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq137_HTML.gif is the transmitting signal-to-noise ratio (T-SNR). In a similar way, the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq138_HTML.gif under noncooperative scheme can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ25_HTML.gif
(25)
We now investigate the overall detection probability for the cognitive radio network scenario depicted as Figure 1, that is, the probability that the presence of primary user is detected by both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq139_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq140_HTML.gif . Since the two users independently detect the primary user in a distributed way, it can be easily shown that the overall detection probability is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ26_HTML.gif
(26)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq141_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq142_HTML.gif are defined in (24) and (25), respectively. Besides, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq143_HTML.gif be the number of slots taken by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq144_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq145_HTML.gif ) to detect the presence of primary user under the noncooperation scheme. This detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq146_HTML.gif can be modeled as a geometric random variable, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ27_HTML.gif
(27)
It can be easily shown that the overall detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq147_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ28_HTML.gif
(28)
Thus, from (28), we can calculate the average overall detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq148_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ29_HTML.gif
(29)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq149_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq150_HTML.gif Then, we focus on the detection performance analysis for the existing cooperative sensing as presented in [8], where an AND-based cooperative detection scheme (AND-CDS) is proposed in order to combat the fading environments. Similarly to the sense protocols of the AF-CDS and DF-CDS, the implementation process of the AND-CDS is also divided into two phases for the convenience of making a fair comparison with our scheme, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq151_HTML.gif in odd time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq152_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq153_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq154_HTML.gif detect independently whether or not the primary user is active; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq155_HTML.gif in subsequent even time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq156_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq157_HTML.gif forwards its detected result to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq158_HTML.gif who would then use the AND rule to fuse the detection results of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq159_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq160_HTML.gif . Clearly, it is easy to show the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq161_HTML.gif in odd time slots being given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ30_HTML.gif
(30)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq162_HTML.gif is the false alarm probability. In even time slots, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq163_HTML.gif would fuse the decision results by using AND rule, and thus, the corresponding detection probability and false alarm probability are calculated as (see [8] for details)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ31_HTML.gif
(31)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ32_HTML.gif
(32)
Combining (31) and (32) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ33_HTML.gif
(33)
Hence, for any given time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq164_HTML.gif , we can calculate the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq165_HTML.gif using AND-based cooperation scheme as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ34_HTML.gif
(34)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq166_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq167_HTML.gif are the probabilities of time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq168_HTML.gif belonging to odd and even, respectively. Generally, the probability events https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq169_HTML.gif follow an equal probability distribution, giving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq170_HTML.gif . Substituting this result into (34) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ35_HTML.gif
(35)
In addition, the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq171_HTML.gif is easily given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ36_HTML.gif
(36)
Therefore, the overall detection probability of the cognitive system using the AND-CDS can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ37_HTML.gif
(37)
where the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq172_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq173_HTML.gif are defined in (35) and (36), respectively. Besides, the detection time slots, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq174_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq175_HTML.gif , taken by the secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq176_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq177_HTML.gif using AND-CDS, respectively, can be modeled as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ38_HTML.gif
(38)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq178_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq179_HTML.gif Thus, the overall detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq180_HTML.gif of the CR network by using AND-CDS can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ39_HTML.gif
(39)
from which the corresponding average detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq181_HTML.gif can be calculated as (see Appendix A for details)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ40_HTML.gif
(40)
where the closed-form expressions of items (I), (II), (III), and (IV) can be found in Appendix A. Based on (40), we define a agility gain of the AND-CDS over the noncooperation scheme as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ41_HTML.gif
(41)
where the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq182_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq183_HTML.gif are given in (29) and (40), respectively. In the following, we focus on deriving the closed-form expressions of detection probabilities and agility gains for the AF-CDS and DF-CDS.

3.1. Detection Performance of AF-CDS

Obviously, from (11), we can show that the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq184_HTML.gif in odd time slots is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ42_HTML.gif
(42)
In addition, from (9), we can calculate the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq185_HTML.gif in even slots as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ43_HTML.gif
(43)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq186_HTML.gif is given in (13) and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq187_HTML.gif is determined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ44_HTML.gif
(44)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq188_HTML.gif is given in (12). Thus, substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq189_HTML.gif from (13) into (43) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ45_HTML.gif
(45)
Note that RVs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq190_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq191_HTML.gif follow the exponential distribution with parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq192_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq193_HTML.gif , respectively, and independent from each other. Consequently, the joint PDF of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq194_HTML.gif can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ46_HTML.gif
(46)
combining (45) and (46) yields (see Appendix B for details)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ47_HTML.gif
(47)
Besides, from (44), the corresponding false alarm probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq195_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ48_HTML.gif
(48)
from which we can obtain (see Appendix C for details)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ49_HTML.gif
(49)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq196_HTML.gif is Lambert's W function. Substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq197_HTML.gif from (49) into (47) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ50_HTML.gif
(50)
Similarly to (35), we can calculate the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq198_HTML.gif under AF-CDS as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ51_HTML.gif
(51)
Meanwhile, the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq199_HTML.gif under AF-CDS can be easily given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ52_HTML.gif
(52)
Hence, we can obtain the overall detection probability for the AF-CDS as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ53_HTML.gif
(53)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq200_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq201_HTML.gif are defined in (51) and (52), respectively. Also, the detection time slots, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq202_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq203_HTML.gif taken by the secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq204_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq205_HTML.gif , respectively, can be modeled as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ54_HTML.gif
(54)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq206_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq207_HTML.gif . Similarly, the overall detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq208_HTML.gif of the CR network under AF-CDS can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ55_HTML.gif
(55)
from which the corresponding average detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq209_HTML.gif can be calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ56_HTML.gif
(56)
where the closed-form expressions of the summations of infinite series can be obtained in a similar way as shown in (40). We can use (56) as a performance evaluation to show the advantage of the proposed AF-CDS. In addition, the computational complexity of (56) is moderate since the corresponding closed-form expressions involve simple arithmetic operations only. Define the agility gain of the AF-CDS over the noncooperation scheme as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ57_HTML.gif
(57)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq210_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq211_HTML.gif are given in (29) and (56), respectively.

3.2. Detection Performance of DF-CDS

As has been said in Section 2.3, in odd time slots, the implementation process of DF-CDS is the same as AF-CDS, and thus the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq212_HTML.gif in odd time slots can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ58_HTML.gif
(58)
Without loss of generality, let case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq213_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq214_HTML.gif denote the estimated indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq215_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq216_HTML.gif respectively.
Case 1 ([ https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq217_HTML.gif = 0]).
This case corresponds to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq218_HTML.gif implying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ59_HTML.gif
(59)
Hence, the probability of occurrence of case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq219_HTML.gif can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ60_HTML.gif
(60)
Also, it can be shown that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ61_HTML.gif
(61)
Substituting the threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq220_HTML.gif from (61) into (60) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ62_HTML.gif
(62)
From (15), we can easily calculate the corresponding detection probability as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ63_HTML.gif
(63)
Performing the probability integration in (63) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ64_HTML.gif
(64)
Case 2 ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq221_HTML.gif ).
This case corresponds to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq222_HTML.gif , meaning
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ65_HTML.gif
(65)
from which we can obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ66_HTML.gif
(66)
Therefore, from (16), it can be shown that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ67_HTML.gif
(67)
Hence, by using (62), (64), (66) and (67), the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq223_HTML.gif in even time slots can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ68_HTML.gif
(68)
According to (58) and (68), the probability of detection of primary user by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq224_HTML.gif under DF-CDS is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ69_HTML.gif
(69)
Besides, the detection probability of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq225_HTML.gif under DF-CDS can be easily given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ70_HTML.gif
(70)
Thus, we can obtain the overall detection probability of the CR network under DF-CDS as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ71_HTML.gif
(71)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq226_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq227_HTML.gif are given in (69) and (70), respectively. Also, we can model the detection time slots https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq228_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq229_HTML.gif (taken by the secondary users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq230_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq231_HTML.gif under DF-CDS, resp.) as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ72_HTML.gif
(72)
In a similar way, we can obtain the average overall detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq232_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ73_HTML.gif
(73)
Similarly, the closed-form expressions of the summations of infinite series can be obtained as (40). Also, we will utilize (73) to show the merits of the proposed DF-CDS. Define the agility gain of the DF-CDS over the noncooperation scheme as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ74_HTML.gif
(74)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq233_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq234_HTML.gif are given in (29) and (73), respectively.

4. Numerical Results and Analysis

Figure 2 shows the plots of (26), (37), (53) and (71) as a function of T-SNR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq235_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq236_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq237_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq238_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq239_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq240_HTML.gif . From Figure 2, one can see that, the detection probabilities of the cooperative detection schemes (i.e., AND-CDS, AF-CDS and DF-CDS) are always larger than the noncooperation scheme across the whole range of T-SNR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq241_HTML.gif As observed from Figure 2, the proposed AF-CDS and DF-CDS outperform the traditional AND-CDS in terms of detection probability, showing the superiority of our schemes. Besides, it is shown from Figure 2 that the detection probability of DF-CDS is superior to the AF-CDS at low SNR region, but inferior to AF-CDS when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq242_HTML.gif .
In Figure 3, we plot (26), (37), (53) and (71) as a function of false alarm probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq249_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq250_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq251_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq252_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq253_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq254_HTML.gif . It is seen from Figure 3 that the detection probability performances of the three cooperative schemes are much better than the noncooperation scheme. Also, Figure 3 shows that the detection performances of our schemes (i.e., AF-CDS and DF-CDS) are superior to the known AND-CDS scheme. In addition, one can see from Figure 3 that DF-CDS can achieve more performance gains than AF-CDS when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq255_HTML.gif . Therefore, DF-CDS outperforms AF-CDS at low SNR region or high false alarm probability region.
Figure 4 illustrates the agility gain versus T-SNR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq261_HTML.gif of the AND-CDS, AF-CDS and DF-CDS with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq262_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq263_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq264_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq265_HTML.gif , where the three curves are the plots of (41), (57) and (74), respectively. From the figure, we find that at this scenario, both the AF-CDS and the DF-CDS can achieve more agility gains than the AND-CDS across the whole T-SNR range, implying the advantages of the proposed schemes over the existing AND-CDS. For completeness sake, in Figure 5, we also plot the agility gains of the AND-CDS, AF-CDS and DF-CDS as a function of the false alarm probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq266_HTML.gif As can be seen from Figure 5, the agility gains of the three cooperation schemes are larger than zero, showing the effectiveness of applying cooperation technology to spectrum sensing. In addition, from Figure 5, one can see that the proposed AF-CDS and DF-CDS outperform the known AND-CDS in terms of agility gain, which further confirms the merits of our schemes.

5. Conclusion

In this paper, we have presented two novel cooperative detection schemes (i.e., AF-CDS and DF-CDS) to improve the detection performance of cognitive radios. We have developed closed-form expressions of detection probability and agility gain for both AF-CDS and DF-CDS over Rayleigh fading channels. For the purpose of comparison, we have also analyzed the detection performances for the noncooperation and the AND-based cooperation schemes. Through conducting numerical experiments, it has been shown that both AF-CDS and DF-CDS are superior to the noncooperation and the AND-base cooperation schemes in terms of the detection probability and the agility gain. Furthermore, we have shown that DF-CDS outperforms AF-CDS at low SNR region or high false alarm probability region.

Appendices

A. Calculation of (40)

From (39), we can calculate the corresponding average detection time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq279_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ75_HTML.gif
(A1)
Since RVs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq280_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq281_HTML.gif are independent from each other, (A.1) can be further expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ76_HTML.gif
(A2)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ77_HTML.gif
(A3)
Combining (A.2) and (A.3) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ78_HTML.gif
(A4)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ79_HTML.gif
(A5)
Similarly, we can obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ80_HTML.gif
(A6)

B. Proof of Equation (47)

Combining (45) and (46) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ81_HTML.gif
(B1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq282_HTML.gif . From (B.1), it is easy to obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ82_HTML.gif
(B2)
Performing the integration in (B.2) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ83_HTML.gif
(B3)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq283_HTML.gif we can get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ84_HTML.gif
(B4)
Else if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq284_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq285_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ85_HTML.gif
(B5)
which can be further simplified to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ86_HTML.gif
(B6)
Thus, substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq286_HTML.gif into (B.4) and (B.6) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ87_HTML.gif
(B7)
and this is (47).

C. Proof of Equation (49)

Rewrite (48) as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ88_HTML.gif
(C1)
Note that both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq287_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq288_HTML.gif are complex white Gaussian noise with zero mean and double-sided power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq289_HTML.gif Without loss of generality, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq290_HTML.gif denote the complex Gaussian noise, which can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ89_HTML.gif
(C2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq291_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq292_HTML.gif . Obviously, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq293_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq294_HTML.gif follow the standard normal distribution, giving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq295_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq296_HTML.gif is the chi-square distribution with 2 degrees of freedom. From (C.2), we can find https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq297_HTML.gif , implying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq298_HTML.gif Consequently, it is easily shown that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq299_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq300_HTML.gif are distributed as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq301_HTML.gif . Noting that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq302_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq303_HTML.gif are independent from each other, we obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq304_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq305_HTML.gif , and thus its PDF (probability density function), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq306_HTML.gif , can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ90_HTML.gif
(C3)
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq307_HTML.gif , resulting in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq308_HTML.gif Hence, the CDF (cumulative distribution function) of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq309_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq310_HTML.gif is calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ91_HTML.gif
(C4)
Combining (C.3) and (C.4) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ92_HTML.gif
(C5)
Performing the integration in (C.5) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ93_HTML.gif
(C6)
From (C.1), we can obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ94_HTML.gif
(C7)
Combining (C.6) and (C.7) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ95_HTML.gif
(C8)
Here, we have utilized the positive property of the energy detection threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq311_HTML.gif to obtain (C.8). Besides, (C.8) can be equivalently written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ96_HTML.gif
(C9)
By using the Lambert's W function that is used to solve the equation
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ97_HTML.gif
(C10)
for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq312_HTML.gif as a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq313_HTML.gif the parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_IEq314_HTML.gif can be given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F617320/MediaObjects/13638_2009_Article_1706_Equ98_HTML.gif
(C11)
and this is (49).

Acknowledgments

This work was partially supported by the Postgraduate Innovation Programs of Scientific Research of Jiangsu Province (no. CX09B_150Z, CX08B_080Z), the Key Project of Nature Science Funding of Jiangsu Province (no. BK2007729), the National High Technology Research Development Plan (no. 2009AA01Z241), and the Major Development Program of Jiangsu Educational Committee (no. 06KJA51001).
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Mitola J III: Software radios: survey, critical evaluation and future directions. IEEE Aerospace and Electronic Systems Magazine 1993, 8(4):25-36. 10.1109/62.210638CrossRef Mitola J III: Software radios: survey, critical evaluation and future directions. IEEE Aerospace and Electronic Systems Magazine 1993, 8(4):25-36. 10.1109/62.210638CrossRef
2.
go back to reference Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220.CrossRef Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220.CrossRef
3.
go back to reference Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S: NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 2006, 50(13):2127-2159. 10.1016/j.comnet.2006.05.001MATHCrossRef Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S: NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 2006, 50(13):2127-2159. 10.1016/j.comnet.2006.05.001MATHCrossRef
4.
go back to reference Sahai A, Hoven N, Tandra R: Some fundamental limits in cognitive radio. Proceedings of the Allerton Conference on Communication, Control, and Computing, October 2004, Monticello, Ill, USA Sahai A, Hoven N, Tandra R: Some fundamental limits in cognitive radio. Proceedings of the Allerton Conference on Communication, Control, and Computing, October 2004, Monticello, Ill, USA
5.
go back to reference Kostylev VI: Energy detection of a signal with random amplitude. Proceedings of the IEEE International Conference on Communications (ICC 2002), 28 April–2 May 2002 3: 1606-1610. Kostylev VI: Energy detection of a signal with random amplitude. Proceedings of the IEEE International Conference on Communications (ICC 2002), 28 April–2 May 2002 3: 1606-1610.
6.
go back to reference Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, November 2004 1: 772-776. Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, November 2004 1: 772-776.
7.
go back to reference Fehske A, Gaeddert J, Reed JH: A new approach to signal classification using spectral correlation and neural networks. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 144-150. Fehske A, Gaeddert J, Reed JH: A new approach to signal classification using spectral correlation and neural networks. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 144-150.
8.
go back to reference Ghasemi A, Sousa ES: Collaborative spectrum sensing for opportunistic access in fading environments. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 131-136. Ghasemi A, Sousa ES: Collaborative spectrum sensing for opportunistic access in fading environments. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 131-136.
9.
go back to reference Laneman JN, Wornell GW: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory 2003, 49(10):2415-2425. 10.1109/TIT.2003.817829MATHMathSciNetCrossRef Laneman JN, Wornell GW: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory 2003, 49(10):2415-2425. 10.1109/TIT.2003.817829MATHMathSciNetCrossRef
10.
go back to reference Zou Y, Zheng B, Zhu J: Outage analysis of opportunistic cooperation over Rayleigh fading channels. IEEE Transactions on Wireless Communications 2009, 8(6):3077-3085.CrossRef Zou Y, Zheng B, Zhu J: Outage analysis of opportunistic cooperation over Rayleigh fading channels. IEEE Transactions on Wireless Communications 2009, 8(6):3077-3085.CrossRef
11.
go back to reference Zou Y, Zheng B, Zhu X: A new cooperative diversity scheme for next generation wireless network. Proceedings of the 5th IEEE Consumer Communications and Networking Conference (CCNC '08), January 2008, Las Vegas, Nev, USA 938-942. Zou Y, Zheng B, Zhu X: A new cooperative diversity scheme for next generation wireless network. Proceedings of the 5th IEEE Consumer Communications and Networking Conference (CCNC '08), January 2008, Las Vegas, Nev, USA 938-942.
12.
go back to reference Zou Y, Zheng B, Zhu W-P: An opportunistic cooperation scheme and its BER analysis. IEEE Transactions on Wireless Communications 2009, 8(9):4492-4497.CrossRef Zou Y, Zheng B, Zhu W-P: An opportunistic cooperation scheme and its BER analysis. IEEE Transactions on Wireless Communications 2009, 8(9):4492-4497.CrossRef
13.
go back to reference Ganesan G, Li YG: Cooperative spectrum sensing in cognitive radio—part I: two user networks. IEEE Transactions on Wireless Communications 2007, 6(6):2204-2213.CrossRef Ganesan G, Li YG: Cooperative spectrum sensing in cognitive radio—part I: two user networks. IEEE Transactions on Wireless Communications 2007, 6(6):2204-2213.CrossRef
14.
go back to reference Ganesan G, Li YG: Cooperative spectrum sensing in cognitive radio—part II: multiuser networks. IEEE Transactions on Wireless Communications 2007, 6(6):2214-2222.CrossRef Ganesan G, Li YG: Cooperative spectrum sensing in cognitive radio—part II: multiuser networks. IEEE Transactions on Wireless Communications 2007, 6(6):2214-2222.CrossRef
15.
go back to reference Poor HV: An Introduction to Signal Detection and Estimation. Springer, Berlin, Germany; 1994.MATHCrossRef Poor HV: An Introduction to Signal Detection and Estimation. Springer, Berlin, Germany; 1994.MATHCrossRef
Metadata
Title
Cooperative Detection for Primary User in Cognitive Radio Networks
Authors
Jia Zhu
Yulong Zou
Baoyu Zheng
Publication date
01-12-2010
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2009/617320

Other articles of this Issue 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Go to the issue

Premium Partner