Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Spectrum Sensing for Cognitive Radios with Transmission Statistics: Considering Linear Frequency Sweeping

verfasst von: Sithamparanathan Kandeepan, Radoslaw Piesiewicz, Tuncer C. Aysal, Abdur Rahim Biswas, Imrich Chlamtac

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The spectrum sensing performance of Cognitive Radios (CRs) considering noisy signal measurements and the time domain transmission statistics of the Primary User (PU) is considered in this paper. When the spectrum is linearly swept in the frequency domain continuously to detect the presence of the PU the time-domain statistics of the PU plays an important role in the detection performance. This is true especially when the PU's bandwidth is much smaller than the CR's scanning frequency range. We model the transmission statistics that is the temporal characteristics of the PU as a Poisson arrival process with a random occupancy time. The spectrum sensing performance at the CR node is then theoretically analyzed based on noisy envelope detection together with the time domain spectral occupancy statistics. The miss detection and false alarm probabilities are derived from the considered spectral occupancy model and the noise model, and we present simulation results to verify our theoretical analysis. We also study the minimum required sensing time for the wideband CR to reliably detect the narrowband PU with a given confidence level considering its temporal characteristics.

1. Introduction

The Cognitive Radio (CR) concept is being under deep consideration to opportunistically utilize the electromagnetic spectrum for efficient radio transmission [14]. The CR basically acts as a secondary user of the spectrum allowing the incumbent (primary) users of the spectrum to have higher priority for spectrum utilization.The notion of efficient spectrum utilization has also attracted the radio spectrum regulatory bodies around the world [5, 6] to further investigate the technology. The secondary users therefore need to learn the environment in the presence of any primary users (PUs) and keep track of them to ensure that it does not interfere with the PU.Learning the environment and performing radio scene analysis (RSA) becomes a challenging and an essential task for the CR to successfully perform secondary communication with reduced interference to the PU. Reliably performing the RSA is quite important in order to avoid interfering with the PU's communications and also to satisfy the regulatory requirements. To perform such an RSA, the CR nodes need to sense the spectrum continuously in the time, frequency, and spatial domains. Spectrum sensing therefore, amongst many, is one of the key functionalities of a CR in order to perform (RSA) of the communication environment.

1.1. Problem Statement

In the recent years, Ultra Wideband (UWB) technology has emerged as one of the key candidates for CR based secondary user communications [7, 8]. When UWB technology is used as CRs for secondary communications, it is required to scan the entire spectrum from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq1_HTML.gif  GHz– https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq2_HTML.gif  GHz (in many cases a significant portion of it) to detect the presence of any PUs in the network. In such situations, scanning a wide range of frequencies ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq3_HTML.gif  GHz) can be a time consuming process and hence a narrow band PU, which has a bandwidth much smaller than the UWB node, can be gone undetected when the UWB-CR node is scanning a large portion of the spectrum. It is obvious to state that such miss detection depends on the PU's transmission statistics, or in other words the Spectral occupancy Statistics (SoS) as well as the spectrum sniffing hardware unit of the UWB-CR node and the corresponding time required to sense the spectrum. Such a problem is considered to be a crucial one to be solved by many researchers and engineers working in this filed, such as in the European Union funded 20 M-Euros project on EUWB [8]. The problem defined here is not specific to UWB based CR systems only, but in general it applies to any CR systems with a bandwidth much larger than the bandwidth of the potential victim services (i.e., the PUs) in the network.

1.2. Literature Review

Spectrum sensing techniques have been heavily discussed and treated in the literature and one could refer to [3, 4, 928] for further reading. The performance of different spectrum sensing techniques are measured in terms of the probability of false alarm and the probability of miss detection for noisy sensing. In our work however, in addition to noisy sensing, we also include the SoS (i.e., the temporal characteristics) of the PU and analyze the detection performance of the CR nodes for wideband sensing. In order to perform theoretical analysis some mathematical models should be followed for the temporal characteristics of the PU. The Poisson model for the arrival process is the most common model used in the research literature for theoretical derivations and performance analysis [2940], and also recommended in the International Telecommunication Union's (ITU) handbook on Teletraffic Engineering [32]. Moreover, Poisson models are also verified for several cases [3440], especially for the Internet traffic when the load is higher [34]. Therefore, we adopt such a model in our work. It should be noted that there also exist empirical models for various traffic sources [29, 30, 30, 31, 3144] and for various radio access technologies mostly derived from the Poisson arrival process.
Furthermore, the authors in [21] have used the Poisson traffic model to design an admission controller for the CR node to improve the Quality of Service (QoS) for secondary transmissions. In [22], for Poisson based PU traffic, the authors have studied by means of simulations the trade-off between sensing time and the achievable throughput by considering the probability of collision. The Poisson traffic model is also used in [23, 24] to derive a-priori probability based detection schemes for spectrum sensing and have presented some numerical results on the improvement over the traditional energy-based detection [45] and the classical Maximum Likelihood- (ML-) based detection techniques [46], respectively. A channel selection scheme for CR nodes for a multichannel multiuser environment is also proposed-based on Poisson traffic model in [25], and recently in [26, 27] we have studied the performance of shared spectrums sensing for UWB-based CR assuming the Poisson model for the PU. Furthermore, moving away from the Poisson based theoretical model, the authors in [47] have analyzed the performances of dynamic spectrum access techniques based on experimentally measured spectrum occupancy statistics.

1.3. Contribution

In this paper, we study the performance of detecting the PU based on its time domain SoS, by classifying them as light, average or heavy users of the spectrum, together with noisy sensing at the CR nodes. We mainly consider the case where the PU bandwidth is much smaller than the CR's spectrum scanning frequency range. Though the references in [2226] have considered the Poisson model for the PU channel SoS they have presented mainly some simulation results to analyze the performances of the the CR node for spectrum sensing and channel occupancy efficiency. In our work presented here, we perform some detailed theoretical analysis of the performance of PU detection, based on an envelope-based energy detector, by initially considering the transmission statistics only case and then together with the sensing noise. The theoretical anaylses are also verified by simulations. We also study the minimum required sensing time for the CR node to reliably detect the narrow band PU given its temporal characteristics.

1.4. Paper Organization

The rest of the paper is organized as follows. In Section 2, we provide the model for the CR network, and in Section 3, we derive the Poisson arrival model for the PU's transmission statistics from the fundamentals. In Section 4, we provide the signal envelope based spectrum sensing technique followed by some theoretical analysis on the detection performances for the noiseless case with a constant channel occupancy (hold) time in Section 5. In Section 6, we present a PU detection risk analysis based on the transmission statistics (Poisson process) of the PU. In Section 7, we present the detection performance considering noise, and in Section 8, we extend the analysis for a random channel occupancy (hold) time. In Section 9, we present the sensing time requirements for the CR based on the SoS of the PU, and finally we make some concluding remarks in Section 10.

2. Cognitive Radio-System Model

The CR network model is presented in this section. We define the following parameters for the wideband sensing CR nodes and the PU in the network. For the PU, we define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq4_HTML.gif as its transmission bandwidth, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq5_HTML.gif as the time duration between transmissions (spectrum idle time) that is calculated from the end to the beginning of two successive transmissions, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq6_HTML.gif as the PU's transmission duration (spectrum hold/busy time) per transmission. For the CR node, we define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq7_HTML.gif as the total observation bandwidth to sweep, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq8_HTML.gif as the total time to linearly sweep the observation bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq9_HTML.gif . Linear sweeping is defined by having some constant rate for sweeping the frequency, or in other words the time to sweep a range of frequencies is proportional to the same range of frequencies. Figure 1 depicts the above parameters and also shows the frequency-time observation plot which explains the spectrum scanning process of the wideband sensing CR node. As depicted in the figure, the cognitive radio scans the entire spectrum linearly at a rate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq10_HTML.gif . Using such a linear frequency sweeping process, given that the PU is transmitting, the CR node can only detect the PU during its m th scan within the time slot (only) from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq11_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq12_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq13_HTML.gif is an arbitrary real constant, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq14_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq15_HTML.gif are the edge frequencies of the transmission bandwidth of the PU with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq16_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq17_HTML.gif . Below, we summarize the abovementioned parameters:
(i)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq18_HTML.gif —PU transmission bandwidth,
 
(ii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq19_HTML.gif —time duration between successive transmissions, and the time duration of transmission of the PU, respectively,
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq20_HTML.gif —edge frequencies of the PU transmission bandwidth ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq21_HTML.gif ),
 
(iv)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq22_HTML.gif —total bandwidth to be scanned by the CR node,
 
(v)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq23_HTML.gif —average time to scan the frequency band https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq24_HTML.gif by the CR node,
 
(vi)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq25_HTML.gif —start and end times of scanning the PU bandwidth by the CR node, as shown in Figure 1, during the m th iteration.
 
The presence of a PU in the network is defined by the hypotheses https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq26_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq27_HTML.gif , as described in (1). Given that the PU is detected during the m th scan, the CR decides upon https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq28_HTML.gif for the entire period of the scan before reinitializing it back to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq29_HTML.gif for the successive scan (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq30_HTML.gif th scan). The hypothetical decision https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq31_HTML.gif made by the CR node at the end of every scan for the particular PU within the frequency band of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq32_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq33_HTML.gif in the absence of noise can be mathematically defined as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ1_HTML.gif
(1)
A more generic detection model considering the PU SoS together with the sensing noise at the CR node is provided in Section 4. The PU's transmission is modeled as a Poisson arrival process. Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq34_HTML.gif follows an exponential distribution [30] with a mean time between transmission given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq35_HTML.gif . We validate the Poisson arrival model for the CR network that we consider here by referring back to Section 1: Literature Review. In other words, the CR network model considered here has a PU delivering Poissonian traffic to the network within its frequency band. Initially, we treat the transmission duration (hold time) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq36_HTML.gif of the PU as a constant to simplify the analysis and then in Section 8 we extend the analysis to a random transmission duration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq37_HTML.gif by modeling it as a random process.
Furthermore, based on the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq38_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq39_HTML.gif we can characterize the spectral occupancy levels of a PUs as light, average, or heavy users. Figure 2 depicts the spectral occupancy levels of a PU based on their traffic characteristics. In the figure, we further see that the pairs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq40_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq41_HTML.gif separate the occupancy level regions of the PUs as light, average, or heavy. Corresponding to the occupancy levels, we also characterize the risk of miss detecting the PU as High Risk, Medium Risk, and Low Risk regions, respectively. For analytical purposes, the risk regions for miss detecting the PU are defined by
(i)
high risk region (light user); for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq42_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq43_HTML.gif ,
 
(ii)
medium risk region (average user); for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq44_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq45_HTML.gif ,
 
(iii)
low risk region (heavy user); for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq46_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq47_HTML.gif .
 
In later sections, by using the detection probabilities derived from our theoretical analyses, we present numerical values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq48_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq49_HTML.gif .

3. Primary User Spectral Occupancy Statistics

To define the primary user's spectral occupancy statistics based on the Poisson arrival process we state (consider) some axioms. It is important to note that these axioms are the fundamentals in defining the Poisson arrival process in general, and based on these axioms we then analyze the spectrum sensing detection performances considering the spectral occupancy model of the PU. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq50_HTML.gif be the number of times that the PU has been present in the network (number of transmissions) up to time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq51_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq52_HTML.gif , the axioms are then defined as in [46].
Axiom 1.
At time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq53_HTML.gif the PU has got no occupancy of the spectrum at all. That is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq54_HTML.gif .
Axiom 2.
Incremental independency and stationarity of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq55_HTML.gif . That is, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq56_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq57_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq58_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq59_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq60_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq61_HTML.gif are independent. Further, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq62_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq63_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq64_HTML.gif have the same statistical distributions.
The Poisson distribution for the arrival process is then given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq65_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq66_HTML.gif is the mean arrival (spectral occupancy) rate of the PU. On the other hand, the occupancy time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq67_HTML.gif of the PU is initially considered to be a constant. Such a model essentially creates an M/D/1 arrival model considering a single CR and single PU system with a Poissonian arrival (M) and a deterministic (D) occupancy time. In later sections, we extend this to an M/M/1 arrival model by considering an exponential distribution and an M/G/1 model considering a Pareto distribution for the random occupancy time for the PU transmissions.

4. Spectrum Sensing

The spectrum sensing technique considered here is the signal envelope-based method [45] where the envelope of the signal is computed within a given range of frequencies in time and compared against a threshold value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq68_HTML.gif . We consider the envelope-based detection method over the standard energy-based detection method [45, 4850] mainly considering its simplicity in hardware implementation and computation. From the analytical framework we provide in this paper on the detection performance of the envelope-based detector, together with SoS of the PU, it is rather straight forward to derive the corresponding theoretical expressions for the energy-based detector and perform similar analyses to the ones that we present here. The Energy detectors in general including the envelope-based detector have drawbacks [10, 11, 49] for spectral occupancy detection especially when the noise power is not known, but on the other hand it is the simplest detection method when the CR node has got no knowledge about the PU transmission.
The received baseband signal of bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq69_HTML.gif in its complex envelope form received over a time period of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq70_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ3_HTML.gif
(3)
where, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq71_HTML.gif is the complex envelope of the received signal from the PU without noise, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq72_HTML.gif is the additive bandpass and band limited complex noise component associated with the sensing process. The additive noise https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq73_HTML.gif is modeled as a zero mean complex Gaussian random process with a power of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq74_HTML.gif over a bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq75_HTML.gif . Note that in (3) we only consider the signal of our interest given within the frequencies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq76_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq77_HTML.gif (corresponding to the scanning time duration of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq78_HTML.gif ). Since we consider only one PU in our model, therefore https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq79_HTML.gif corresponds to the signal received within the PU's transmission bandwidth. We also assume negligible fading associated with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq80_HTML.gif in our model or in other words the amount of fading is small considering the time period for computing the envelope (energy) of the signal, which is a valid assumption as there exist many cases with slow fading scenarios [51]. The envelope of the received signal at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq81_HTML.gif over a time of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq82_HTML.gif is used as the test statistic https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq83_HTML.gif to detect the PU (transmitting in the frequency band between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq84_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq85_HTML.gif ), where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq86_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ4_HTML.gif
(4)
Further more, we define the signal to noise ratio as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq87_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq88_HTML.gif is the power of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq89_HTML.gif over the frequency band of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq90_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq91_HTML.gif given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq92_HTML.gif denotes the complex conjugate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq93_HTML.gif . The generic detection criteria in deciding whether a PU is present or not for the m th scan, considering the sensing noise as well as the linear spectrum scanning process of the CR, is then given by,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ6_HTML.gif
(6)
Note that, as described in (6), we are only interested in the detection of a PU within the spectral range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq94_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq95_HTML.gif . The test statistic https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq96_HTML.gif follows two different distributions under the hypotheses https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq98_HTML.gif depending on whether the signal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq99_HTML.gif is present or not. From the signal model presented in (3), it is well known that [46] (since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq100_HTML.gif is complex Gaussian) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq101_HTML.gif follows a Rayleigh distribution under https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq102_HTML.gif and a Rice distribution under https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq103_HTML.gif , given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq104_HTML.gif is the time domain root mean square value of the signal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq105_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq106_HTML.gif is the zeroth order modified Bessel function of the first kind. The distributions in (7) are used to analyze the detection performance which we present in the subsequent sections.

5. Performance Analysis: Noiseless Sensing

The theoretical performance analysis for detecting the PU is performed in three stages. Initially, we study the detection performance considering only the SoS of the PU with a constant hold time with no sensing noise (i.e., SNR https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq107_HTML.gif ), then we extend the analysis considering the sensing noise, and then we further extend the analysis for random hold time. We also provide simulation results to support our theoretical analysis.

5.1. Theoretical Analysis

In the noiseless case, the detection performance of the CR node is characterized by the SoS of the PU, the bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq108_HTML.gif of the PU, and the total time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq109_HTML.gif for the CR node to scan the entire bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq110_HTML.gif . As mentioned previously, we assume the CR nodes linearly scan the frequency in time over the desired (wideband) spectrum.

5.1.1. Occupancy Probability

For the PU, we define the spectral occupancy probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq111_HTML.gif as the probability of initiation of at least one transmission by the PU over a time of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq112_HTML.gif seconds. Therefore; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq113_HTML.gif is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq114_HTML.gif . From (2), we find a closed form expression for the probability of occupancy as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ8_HTML.gif
(8)
From (8), we can compute the spectral occupancy probability of the PU for a single scanning period https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq115_HTML.gif by letting https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq116_HTML.gif .

5.1.2. Detection Probability

The detection probability, for detecting the PU by the CR node over a single scan duration of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq117_HTML.gif , in the noiseless case is defined by the probability of initiation of at least one transmission within the time slot of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq118_HTML.gif for the m th scanning iteration ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq119_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq120_HTML.gif are defined in Section 2). The probability of detection is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq121_HTML.gif . Using the incremental independence and stationarity property of the arrival process (Axiom 2), we can rewrite https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq122_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq123_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq124_HTML.gif , and from (2) we find a closed form expression given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ9_HTML.gif
(9)
Note that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq125_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq126_HTML.gif . Therefore, the CR detects all the transmissions from the PU in a single scanning period. At the same time, we also observe from (9) that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq127_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq128_HTML.gif .

5.1.3. Miss Detection Probability

The probability of miss detection is defined by the probability that CR deciding https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq129_HTML.gif gives https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq130_HTML.gif for a single scan. In other words, miss detection for the noiseless case occurs when there is at least one initiation of transmission occurring for some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq131_HTML.gif outside the interval https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq132_HTML.gif , but no initiations (of transmissions) during the interval, in a single scan. Therefore, for a single scan the miss detection probability is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ10_HTML.gif
(10)
for some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq133_HTML.gif and, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq134_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq135_HTML.gif . Since, the events occuring at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq136_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq137_HTML.gif in (10) are mutually disjoint, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq138_HTML.gif can be rewritten as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq139_HTML.gif . Again, using the incremental independence and stationarity property of the arrival process with (2), we find a closed form expression as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ11_HTML.gif
(11)
We further verify the analytical expressions for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq140_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq141_HTML.gif , from (9) and (11), since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq142_HTML.gif .

5.1.4. False Alarm Probability

The false alarm probability for the noiseless case is defined by the probability of detecting a transmission given that no transmissions have been initiated by the PU during a single scan. Since we do not consider noise in this case, the probability of false alarm is simply zero. Further, we could verify this by expressing the false alarm probability as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ12_HTML.gif
(12)
and since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq143_HTML.gif implies that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq144_HTML.gif , giving us https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq145_HTML.gif , the probability of false alarm for the noiseless case becomes
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ13_HTML.gif
(13)

5.2. Numerical Results

We present the simulation results in this section using Matlab to verify the theoretical analysis performed in Section 5.1 Simulations were performed using Monte-Carlo techniques to generate the random (Poisson based) PU's transmissions. In our simulations, the Poissonian arrivals are generated using the Binomial counting process by generating a binary random event with a probability of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq146_HTML.gif within a small time duration of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq147_HTML.gif , as described in [46, Sectio https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq148_HTML.gif 21.3], which converges to a Poissonian process as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq149_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq150_HTML.gif . Simulations were performed in Matlab to generate the random arrival process with a deterministic hold time. Figure 3 presents the occupancy probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq151_HTML.gif for various time durations https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq152_HTML.gif . From the figure, we observe that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq153_HTML.gif increases with the arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq154_HTML.gif , as expected, and also marginally improves with the time duration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq155_HTML.gif . The figure shows how the the spectral occupancy probability of the PU (defined over a period of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq156_HTML.gif ) increases when the scanning duration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq157_HTML.gif increases for a given arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq158_HTML.gif . This observation is quite important, especially when we study the minimum time requirement (minimum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq159_HTML.gif ) for sensing the PU, which we present in the later sections. Figure 4 depicts the miss detection probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq160_HTML.gif for various holding times https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq161_HTML.gif and arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq162_HTML.gif . From the figures, we see that the detection performance at the CR node improves when both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq163_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq164_HTML.gif increase, we further observe that the improvement in the detection performance is greater when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq165_HTML.gif increases than when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq166_HTML.gif increases, relatively. From the figure we also see a very close match between the theoretical expressions derived in the previous section and the simulated results further verifying our analysis.

6. Analysis of the Primary User Miss Detection Risk Regions

In this section, we study the risk regions associated with miss detecting the PU depending on their SoS. Continuing from Section 2 and referring back to Figure 2, here we define the risk regions based on the probability of detection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq173_HTML.gif (for the noiseless case). In other words, we define the values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq174_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq175_HTML.gif based on the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq176_HTML.gif . Let us define two values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq177_HTML.gif , given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq178_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq179_HTML.gif . We define the
(i)
High Risk Region as the range of values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq180_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq181_HTML.gif , for all values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq182_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq183_HTML.gif ,
 
(ii)
Medium Risk Region as the range of values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq184_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq185_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq186_HTML.gif ,
 
(iii)
Low Risk Region as the range of values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq187_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq188_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq189_HTML.gif .
 
Figure 5 shows the riskregions of miss detecting the PU by depicting a three-dimensional plot of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq190_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq191_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq192_HTML.gif with respect to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq193_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq194_HTML.gif (for the noiseless case). The figure also shows the risk regions separated by two planes given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq195_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq196_HTML.gif that define the boundaries of the risk regions. The values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq197_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq198_HTML.gif can be varied depending on our traffic model (traffic sources) based on the application.
The values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq202_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq203_HTML.gif for the risk regions are basically custom defined and chosen to comply with regulatory requirements. For example, if the regulatory requirement for a minimum detection probability (to minimize interference to the PU) is given, then it could be assigned to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq204_HTML.gif . This would ensure that the low risk region (defined by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq205_HTML.gif ) does satisfy the regulatory requirements, which we explain in Example 1 later. On the other hand, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq206_HTML.gif which defines the medium and high risk regions is defined by the CR Network as a benchmark for classifying interference level as medium or high interference, respectively, (i.e., interference from the CR to the PU and vice versa).
Further, for a given set of values https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq207_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq208_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq209_HTML.gif , we can define two theoretical curves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq210_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq211_HTML.gif for the boundaries of risk regions, which are given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq212_HTML.gif (from Section 5.1). The curves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq213_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq214_HTML.gif and the corresponding risk regions are shown in Figure 6. The figure here (Figure 6) defines the risk regions more precisely than Figure 2. Note that the risk regions can be custom defined based on the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq215_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq216_HTML.gif that define the curves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq217_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq218_HTML.gif , respectively. As observed in the figure, the risk regions become independent of the hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq219_HTML.gif for small values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq220_HTML.gif . In practice, this is true since the detection performance only depends on the arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq221_HTML.gif for small values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq222_HTML.gif . The values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq223_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq224_HTML.gif defining the risk regions are then computed from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq225_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq226_HTML.gif , respectively as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ15_HTML.gif
(15)
For the parameters given in Figure 6, the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq227_HTML.gif defining the risk regions are given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq228_HTML.gif  sec (for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq229_HTML.gif confidence, i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq230_HTML.gif ) and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq231_HTML.gif  sec (for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq232_HTML.gif confidence, i.e., for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq233_HTML.gif ). The values https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq234_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq235_HTML.gif , on the other hand, can only be defined for a given value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq236_HTML.gif , letting https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq237_HTML.gif to compute https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq238_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq239_HTML.gif has no practical significance since when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq240_HTML.gif there are no transmissions from the PU. Therefore, for a given https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq241_HTML.gif , say https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq242_HTML.gif , we find the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq243_HTML.gif defining the risk regions by using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq244_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq245_HTML.gif (or by using Figure 6), as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq246_HTML.gif  sec and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq247_HTML.gif  sec.
Example 1 (WiMedia-UWB based Cognitive Radio System with Constant Scanning Time ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq251_HTML.gif )).
We now provide an example of a WiMedia based Ultra-Wideband (UWB) [7] CR system which requires a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq252_HTML.gif confidence ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq253_HTML.gif ) in detecting a PU in the network. The PU system that we consider here is the WiMax radio [52] operating at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq254_HTML.gif  GHz with a bandwidth of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq255_HTML.gif  MHz and a transmission statistics derived by the Poisson process (Note: In practice the temporal behavior of WiMax transmissions may not be Poisson arrival process, however we consider the Poisson arrival here for analytical purposes). We analyze, for the noiseless case, the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq256_HTML.gif that enables the WiMedia based CR node to detect a WiMax PU with the given confidence level ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq257_HTML.gif ). We assume that the WiMedia system has an operational bandwidth of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq258_HTML.gif  GHz (from 3 GHz–4.5 GHz) and a hardware that has a spectrum scanning time of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq259_HTML.gif  msec (assumption only). Then, by using (15), we compute the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq260_HTML.gif for small values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq261_HTML.gif , that defines whether the requirement of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq262_HTML.gif confidence for detecting the WiMax radio can be achieved or not in the noiseless case. Accordingly, we get https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq263_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq264_HTML.gif . Therefore, given a fixed value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq265_HTML.gif , the CR can detect the PU with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq266_HTML.gif confidence for the noiseless case (or for very high received SNR of the PU signal) provided that the SoS of the PU is such that the mean time between transmissions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq267_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq268_HTML.gif  sec for small values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq269_HTML.gif .

7. Performance Analysis: Noisy Sensing

The detection performance with noise is of great interest to us. In this section, we analyze the overall probability of false alarm and the overall probability of miss detection for the envelope-based PU detection given the Poisson SoS of the PU for noisy sensing.

7.1. Theoretical Analysis

First, we define the four probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq270_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq271_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq272_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq273_HTML.gif for the noiseless case as, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq274_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq275_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq276_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq277_HTML.gif . From the analysis performed in Section 5, we identify that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq278_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq279_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq280_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq281_HTML.gif . Then, the overall probability of detection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq282_HTML.gif and the probability of false alarm https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq283_HTML.gif for the noisy case are given by,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ16_HTML.gif
(16)
From (16), by using (7), we come up with two closed form expressions for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq284_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq285_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ17_HTML.gif
(17)
where, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq286_HTML.gif is the Marcum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq287_HTML.gif -Function defined by,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ18_HTML.gif
(18)
From the expressions we, observe that the probability of false alarm https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq288_HTML.gif does not depend on the transmission statistics of the PU but only depends on the sensing noise. In the following section, we perform some simulations to study the detection performances and also verify the theoretical analysis performed in this section.

7.2. Complementary Receiver Operating Characteristic Curves and Simulation Results

The Complementary Receiver Operating Characteristic Curves (C-ROCs) for the envelope-based detector is presented here considering the PU transmission statistics. The C-ROC curve is the plot between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq289_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq290_HTML.gif by varying the detection threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq291_HTML.gif . Together with the theoretical C-ROC curves, derived from the previous section, we also present some simulation results to verify our theoretical analysis. Monte-Carlo simulations were performed to generate the PU's (Poisson) transmission process and the noisy sensing process with Gaussian noise. Figure 7 shows the C-ROC curves for various SNR values for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq292_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq293_HTML.gif . As expected, we see that the C-ROC curves improve when the SNR is increased, the figure also shows the probability of miss detection ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq294_HTML.gif ) for the noiseless case as well. Figure 8 shows the C-ROC curves for different values of arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq295_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq296_HTML.gif  dB and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq297_HTML.gif . From the figure, we observe how the detection performance improves when the arrival rate (spectral occupancy rate) of the PU is increased. Moreover, we see that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq298_HTML.gif is increased further the detection performance predominantly depends on the sensing noise. Figure 9 shows the C-ROC curves for various values of spectral hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq299_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq300_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq301_HTML.gif  dB. Improvements in the detection performances are observed when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq302_HTML.gif is increased but not as much as when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq303_HTML.gif is increased as in Figure 8. Furthermore, we clearly see that the simulation results very closely match with the theoretical results on all the figures, verifying our analysis in the previous section.

8. Performance Analysis: Random Hold Time

In our analysis so far we have assumed a constant hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq324_HTML.gif . In this section we extend the analysis for the detection performance with a randomly distributed hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq325_HTML.gif . We consider two random hold time models namely ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq326_HTML.gif ) the exponential distribution which is a traditional way for modeling the call hold time describing many real time applications, and ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq327_HTML.gif ) the Pareto distribution which is used to model the World Wide Web IP traffic.
The exponential model is a very traditional model used to describe the random call hold time process. It is useful in modeling voice traffic as recommended by the ITU [32]. In [28], the exponential model is also verified experimentally for aggregated HSDPA data traffic by Telefonica I + D. Based on the type of traffic, the exponential model can also be extended to obtain further traffic models such as Erlange and Phase-type models [32]. However, in our paper, we adopt the exponential model whereas the other models could simply follow similar analytical procedures. We also adopt another model for the random hold time which suits modern teletraffic such as the World Wide Web IP traffic, namely, the Pareto distributed hold time model. The Pareto model is (experimentally) proven to fit Internet traffic as described in [28, 37, 5356]. Furthermore, in practice, the analyses for the constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq328_HTML.gif with the M/D/1 model and the random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq329_HTML.gif with exponential and Pareto models are all useful depending on the type of traffic generated by the PU.
The exponentially distributed hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq330_HTML.gif is given by the density function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq331_HTML.gif , with a mean hold time of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq332_HTML.gif . The Pareto distributed hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq333_HTML.gif is given by the density function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq334_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq335_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq336_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq337_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq338_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq339_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq340_HTML.gif . The parameter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq341_HTML.gif for the Pareto model describes the peaky nature of the density function and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq342_HTML.gif describes the minimum hold time that models a typical IP packet oriented service.

8.1. Theoretical Analysis

Using the exponential and Pareto hold time models with Poisson arrival for the PU transmission we rederive the expression for the probability of detection here for random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq343_HTML.gif . The probability of false alarm https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq344_HTML.gif stays unchanged, as in (17), because https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq345_HTML.gif is independent of the transmission statistics of the PU (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq346_HTML.gif is independent of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq347_HTML.gif ). From (17), we derive the new probability of detection for the random hold time by averaging over all possible values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq348_HTML.gif . Therefore, the probability of detection is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ19_HTML.gif
(19)
(Note that for the Pareto model the integration range in the above is from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq349_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq350_HTML.gif .) By solving the integral in (19) for both exponential and Pareto models, we come up with a closed form expression for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq351_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ20_HTML.gif
(20)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq352_HTML.gif is the probability of miss detection for the random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq353_HTML.gif in the absence of the sensing noise (i.e., considering only the transmission statistics of the PU), given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ21_HTML.gif
(21)
Furthermore,the probability of detection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq354_HTML.gif for random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq355_HTML.gif in the absence of noise is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq356_HTML.gif . The curves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq357_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq358_HTML.gif defining the risk regions (Section 6) can also be redefined for the random holding time case. From Section 8.1 we have two new curves for the exponential hold time model given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ22_HTML.gif
(22)
The new curves in (22) differ mainly for low values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq359_HTML.gif but has the same limit values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq360_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq361_HTML.gif defining the risk regions, as in (15), when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq362_HTML.gif .

8.2. Numerical Results

We compare the differences in the detection performance between the constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq363_HTML.gif and the random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq364_HTML.gif cases. The random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq365_HTML.gif case obviously relates to reality more than the former. Figure 10 depicts the theoretical curves for the probability of miss detection with respect to the arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq366_HTML.gif for the noiseless case. The figure shows both the constant and the random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq367_HTML.gif cases for the exponential and the Pareto models. As we observe from the figure, the differences between the two arise for higher values of mean hold time and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq368_HTML.gif . This is due to the fact that for larger values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq369_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq370_HTML.gif , the probability of having smaller hold times is greater in the random case, and hence we observe poorer performances compared to the constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq371_HTML.gif case. Figure 11 on the other hand shows the complementary ROC curves for the random and constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq372_HTML.gif cases for noisy sensing. In Figure 10, we observed that the differences between the random and the constant https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq373_HTML.gif detection performances arise for higher values of (both) mean hold time and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq374_HTML.gif , and in Figure 11 we observe that the difference between the two arise only when the SNR is higher, provided that the mean hold time and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq375_HTML.gif are high. For lower values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq376_HTML.gif we see that the difference is negligible. Furthermore, we observe that Pareto model shows better detection performance compared to the exponential model based on the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq377_HTML.gif for the same mean hold time. Note that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq378_HTML.gif increases the, Pareto model approaches the constant hold time case because the density function gets more peakier.

9. Minimum Required Spectrum Sensing Time

The temporal behavior of the PU influences the required spectrum sensing time for the CR node to reliably detect the PU. From the theoretical analyses performed in the previous sections, we study the minimum required sensing time to reliably detect the narrow band PU by a wideband CR node with a given confidence level. We compute the minimum required time for spectrum sensing based (only) on the temporal characteristics of the PU for both constant and random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq394_HTML.gif cases. The advantages of knowing the minimum required sensing time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq395_HTML.gif here is two fold, ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq396_HTML.gif ) To reliably detect the PU with a given confidence level by not underscanning the spectrum (not scanning lower than the minimum required time) and ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq397_HTML.gif ) To save power at the CR node by not overscanning the spectrum (not scanning higher than the minimum required time), From (9) and Section 8.1, for a given confidence level of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq398_HTML.gif (i.e., probability of detection is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq399_HTML.gif ) for detecting the PU, the minimum required spectrum sensing time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq400_HTML.gif for the constant and random hold time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq401_HTML.gif cases are given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_Equ23_HTML.gif
(23)
The expressions in (23) can then be used by the CR nodes to dynamically adopt the spectrum sensing time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq402_HTML.gif , given the hardware capability to adopt its time to sense, to reliably detect the PU, and at the same time save power. The temporal characteristics of the PU that is required to compute https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq403_HTML.gif may be known a priori or be acquired by learning the environment at the CR node.
Example 2 (Minimum Sensing Time for WiMedia-UWB CR node for Detecting WiMax).
In this section we provide an example, continuing form Example 1 in Section 6, for a WiMedia-UWB based CR to detect a WiMax terminal with 90% confidence and the minimum required time to sense the spectrum. Note that, again here we assume as explained in Example 1 that the WiMax transmission has a Poisson arrival process.
Figure 12 shows the curves of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq404_HTML.gif for 90% confidence in detecting the PU for both constant and random https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq405_HTML.gif considering only the SoS of the PU (without noise). The figure shows the curves with respect to the arrival rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq406_HTML.gif for various values of mean hold times. From the results; we observe that the minimum time required to sense the spectrum increases when the arrival rate ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq407_HTML.gif ) is low and as well as when the holding time is low. In the figure, we also show the operational region (for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq408_HTML.gif ) and the inoperational region (for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq409_HTML.gif ) of the CR nodes to reliably detect the PU (in the absence of noise). We further observe from the figure that the minimum sensing time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq410_HTML.gif reduces significantly when the hold time increases. Though the results shown in Figure 12 is for the noiseless case, it holds true for relatively high values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq411_HTML.gif . Similar analytical curves also can be generated for the noisy case by following the above procedure.

10. Conclusion

In this paper, we presented some detailed theoretical analysis on the performance of detecting a narrow band PU by a wideband CR terminal. The performance analyses were based on noisy sensing at the CR node as well as on the temporal characteristics of the PU. Closed form expressions were presented for the probabilities of detection, miss detection, and false alarm at the CR node, and were also verified using simulations. Further, we classify different risk regions for miss detecting the PU based on the temporal characteristics of the PU transmission, and consequently derive the minimum required spectrum sensing time to reliably detect the PU with a given confidence level. The analyses and the results were presented for both constant and random spectrum holding time, as well as random spectrum idle time considering the Poisson arrival process. Further research is to be conducted for optimizing the detection threshold for envelope- (energy-) based detection depending on the temporal characteristics of the PU together with the sensing noise. From the analytical framework that is provided in this paper, application (traffic) specific temporal (empirical) model for PU transmissions can also be used to perform similar analysis.

Acknowledgments

The research work was partly funded through the EU-FP7 Grant FP7-ICT-215669 under the EUWB Integrated Project. The authors would like to thank Professor Stephen Hanly from the University of Melbourne for his valuable comments.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Mitola J III, Maguire GQ Jr.: Cognitive radio: making software radios more personal. IEEE Personal Communications 1999, 6(4):13-18. 10.1109/98.788210CrossRef Mitola J III, Maguire GQ Jr.: Cognitive radio: making software radios more personal. IEEE Personal Communications 1999, 6(4):13-18. 10.1109/98.788210CrossRef
2.
Zurück zum Zitat Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220.CrossRef Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220.CrossRef
3.
Zurück zum Zitat Arslan H (Ed): Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems. Springer, Dordrecht, The Netherlands; 2007. Arslan H (Ed): Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems. Springer, Dordrecht, The Netherlands; 2007.
4.
Zurück zum Zitat Hossain E, Bhargava V (Eds): Cognitive Wireless Communication Networks. Springer, New York, NY, USA; 2007. Hossain E, Bhargava V (Eds): Cognitive Wireless Communication Networks. Springer, New York, NY, USA; 2007.
5.
Zurück zum Zitat Federal Communications Commission, Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies, NPRM and Order ET Docket no. 03-322, December 2003 Federal Communications Commission, Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies, NPRM and Order ET Docket no. 03-322, December 2003
6.
Zurück zum Zitat The Commission of the European Communities, Commission Decision 2007/131/EC on allowing the use of the radio spectrum for equipment using ultra-wideband technology in a harmonised manner in the Community Official Journal of the European Union, February 2007 The Commission of the European Communities, Commission Decision 2007/131/EC on allowing the use of the radio spectrum for equipment using ultra-wideband technology in a harmonised manner in the Community Official Journal of the European Union, February 2007
7.
Zurück zum Zitat Heidari G: WiMedia UWB: Technology of Choice for Wireless USB and Bluetooth. John Wiley & Sons, New York, NY, USA; 2006. Heidari G: WiMedia UWB: Technology of Choice for Wireless USB and Bluetooth. John Wiley & Sons, New York, NY, USA; 2006.
9.
Zurück zum Zitat Kandeepan S, et al.: D2.1.1:Spectrum Sensing and Monitoring. EUWB Integrated Project, European Commissiona Funded Project May 2009., (EC: FP7-ICT-215669): http://www.euwb.eu/ Kandeepan S, et al.: D2.1.1:Spectrum Sensing and Monitoring. EUWB Integrated Project, European Commissiona Funded Project May 2009., (EC: FP7-ICT-215669): http://​www.​euwb.​eu/​
10.
Zurück zum Zitat Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, November 2004, Pacific Grove, Calif, USA 1: 772-776. Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, November 2004, Pacific Grove, Calif, USA 1: 772-776.
11.
Zurück zum Zitat Sahai A, Hoven N, Tandra R: Some fundamental limits on cognitive radio. Proceedings of the 42nd Allerton Conference on Communication, Control and Computing, September 2004, Monticello, Minn, USA Sahai A, Hoven N, Tandra R: Some fundamental limits on cognitive radio. Proceedings of the 42nd Allerton Conference on Communication, Control and Computing, September 2004, Monticello, Minn, USA
12.
Zurück zum Zitat Cabric DB: Cognitive Radios: System Design Perspective, Ph.D. thesis. University of California, Berkeley, Calif, USA; 2007. Cabric DB: Cognitive Radios: System Design Perspective, Ph.D. thesis. University of California, Berkeley, Calif, USA; 2007.
13.
Zurück zum Zitat Wang P, Xiao L, Zhou S, Wang J: Optimization of detection time for channel efficiency in cognitive radio systems. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '07), March 2007, Kowloon, Hong Kong 111-115. Wang P, Xiao L, Zhou S, Wang J: Optimization of detection time for channel efficiency in cognitive radio systems. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '07), March 2007, Kowloon, Hong Kong 111-115.
14.
Zurück zum Zitat Amir G, Elvino SS: Opportunistic spectrum access in fading channels through collaborative sensing. Journal on Communications 2007, 2(2):71-82. Amir G, Elvino SS: Opportunistic spectrum access in fading channels through collaborative sensing. Journal on Communications 2007, 2(2):71-82.
15.
Zurück zum Zitat Quan Z, Cui S, Sayed AH, Poor HV: Wideband spectrum sensing in cognitive radio networks. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 901-906. Quan Z, Cui S, Sayed AH, Poor HV: Wideband spectrum sensing in cognitive radio networks. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 901-906.
16.
Zurück zum Zitat Lee W-Y, Akyildiz IF: Optimal spectrum sensing framework for cognitive radio networks. IEEE Transactions on Wireless Communications 2008, 7(10):3845-3857.CrossRef Lee W-Y, Akyildiz IF: Optimal spectrum sensing framework for cognitive radio networks. IEEE Transactions on Wireless Communications 2008, 7(10):3845-3857.CrossRef
17.
Zurück zum Zitat Cabric D, Tkachenko A, Brodersen RW: Experimental study of spectrum sensing based on energy detection and network cooperation. Proceedings of the 1st International ACM Workshop on Technology and Policy for Accessing Spectrum, 2006, Boston, Mass, USA Cabric D, Tkachenko A, Brodersen RW: Experimental study of spectrum sensing based on energy detection and network cooperation. Proceedings of the 1st International ACM Workshop on Technology and Policy for Accessing Spectrum, 2006, Boston, Mass, USA
18.
Zurück zum Zitat Aysal TC, Kandeepan S, Piesiewicz R: Cooperative spectrum sensing over imperfect channels. Proceedings of IEEE Globecom Workshops (GLOBECOM '08), November-December 2008, New Orleans, La, USA Aysal TC, Kandeepan S, Piesiewicz R: Cooperative spectrum sensing over imperfect channels. Proceedings of IEEE Globecom Workshops (GLOBECOM '08), November-December 2008, New Orleans, La, USA
19.
Zurück zum Zitat Aysal TC, Kandeepan S, Piesiewicz R: Cooperative spectrum sensing with noisy hard decision transmissions. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009, Dresden, Germany Aysal TC, Kandeepan S, Piesiewicz R: Cooperative spectrum sensing with noisy hard decision transmissions. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009, Dresden, Germany
20.
Zurück zum Zitat Wylie-Green MP: Dynamic spectrum sensing by multiband OFDM radio for interference mitigation. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005, Baltimore, Md, USA 619-625. Wylie-Green MP: Dynamic spectrum sensing by multiband OFDM radio for interference mitigation. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005, Baltimore, Md, USA 619-625.
21.
Zurück zum Zitat Rashid MM, Hossain MdJ, Hossain E, Bhargava VK: Opportunistic spectrum access in cognitive radio networks: a queueing analytic model and admission controller design. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), November 2007, Washington, DC, USA 4647-4652. Rashid MM, Hossain MdJ, Hossain E, Bhargava VK: Opportunistic spectrum access in cognitive radio networks: a queueing analytic model and admission controller design. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), November 2007, Washington, DC, USA 4647-4652.
22.
Zurück zum Zitat Pei Y, Hoang AT, Liang Y-C: Sensing-throughput tradeoff in cognitive radio networks: how frequently should spectrum sensing be carried out? Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece Pei Y, Hoang AT, Liang Y-C: Sensing-throughput tradeoff in cognitive radio networks: how frequently should spectrum sensing be carried out? Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece
23.
Zurück zum Zitat Ma J, Li Y: A probability-based spectrum sensing scheme for cognitive radio. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3416-3420. Ma J, Li Y: A probability-based spectrum sensing scheme for cognitive radio. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3416-3420.
24.
Zurück zum Zitat Tang S, Mark BL: An adaptive spectrum detection mechanism for cognitive radio networks in dynamic traffic environments. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3009-3013. Tang S, Mark BL: An adaptive spectrum detection mechanism for cognitive radio networks in dynamic traffic environments. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3009-3013.
25.
Zurück zum Zitat Zhou X, Li Y, Kwon YH, Soong ACK: Detection timing and channel selection for periodic spectrum sensing in cognitive radio. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 2988-2992. Zhou X, Li Y, Kwon YH, Soong ACK: Detection timing and channel selection for periodic spectrum sensing in cognitive radio. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 2988-2992.
26.
Zurück zum Zitat Kandeepan S, Rahim AB, Aysal TC, Piesiewicz R: Time divisional and time-frequency divisional cooperative spectrum sensing. Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM '09), June 2009, Hannover, Germany Kandeepan S, Rahim AB, Aysal TC, Piesiewicz R: Time divisional and time-frequency divisional cooperative spectrum sensing. Proceedings of the 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM '09), June 2009, Hannover, Germany
27.
Zurück zum Zitat Kandeepan S, Giorgetti A, Chiani M: Time-divisional cooperative periodic spectrum sensing for cognitive radio networks. Proceedings of IEEE International Conference on Communications (ICC '10), May 2010, Cape Town, South Africa Kandeepan S, Giorgetti A, Chiani M: Time-divisional cooperative periodic spectrum sensing for cognitive radio networks. Proceedings of IEEE International Conference on Communications (ICC '10), May 2010, Cape Town, South Africa
28.
Zurück zum Zitat Kandeepan S, Sierra A, Campos J, Chlamtac I: Periodic sensing in cognitive radios for detecting UMTS/HSDPA based on experimental spectral occupancy statistics. Proceedings of IEEE Wireless Communications & Networking Conference (WCNC '10), April 2010, Sydney, Australia Kandeepan S, Sierra A, Campos J, Chlamtac I: Periodic sensing in cognitive radios for detecting UMTS/HSDPA based on experimental spectral occupancy statistics. Proceedings of IEEE Wireless Communications & Networking Conference (WCNC '10), April 2010, Sydney, Australia
29.
Zurück zum Zitat Jabbari B: Teletraffic aspects of evolving and next-generation wireless communication networks. IEEE Personal Communications 1996, 3(6):4-9. 10.1109/98.556473CrossRef Jabbari B: Teletraffic aspects of evolving and next-generation wireless communication networks. IEEE Personal Communications 1996, 3(6):4-9. 10.1109/98.556473CrossRef
30.
Zurück zum Zitat Janevski T: Traffic Analysis and Design of Wireless IP Networks. Artech House, Boston, Mass, USA; 2003. Janevski T: Traffic Analysis and Design of Wireless IP Networks. Artech House, Boston, Mass, USA; 2003.
31.
Zurück zum Zitat Allen AO: Probability Statistics, and Queuing Theory with Computer Science Applications. Academic Press; 1990.MATH Allen AO: Probability Statistics, and Queuing Theory with Computer Science Applications. Academic Press; 1990.MATH
33.
Zurück zum Zitat Park C, Shen H, Hernndez-Campos F, Marron JS, Veitch D: Capturing the elusive poissonity in web traffic. Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06), September 2006, Monterey, Calif, USA 189-196.CrossRef Park C, Shen H, Hernndez-Campos F, Marron JS, Veitch D: Capturing the elusive poissonity in web traffic. Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '06), September 2006, Monterey, Calif, USA 189-196.CrossRef
34.
Zurück zum Zitat Cao J, Cleveland WS, Lin D, Sun DX: Internet traffic tends toward poisson and independent as the load increases. In Nonlinear Estimation and Classification, Lecture Notes in Statistics. Volume 171. Edited by: Denison DD, Hansen MH, Holmes CC, Mallick B, Yu B. Springer, New York, NY, USA; 2003. Cao J, Cleveland WS, Lin D, Sun DX: Internet traffic tends toward poisson and independent as the load increases. In Nonlinear Estimation and Classification, Lecture Notes in Statistics. Volume 171. Edited by: Denison DD, Hansen MH, Holmes CC, Mallick B, Yu B. Springer, New York, NY, USA; 2003.
35.
Zurück zum Zitat Salvador P, Pacheco A, Valadas R: Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs. Computer Networks 2004, 44(3):335-352. 10.1016/j.comnet.2003.10.004CrossRefMATH Salvador P, Pacheco A, Valadas R: Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs. Computer Networks 2004, 44(3):335-352. 10.1016/j.comnet.2003.10.004CrossRefMATH
37.
Zurück zum Zitat Zukerman M, Neame TD, Addie RG: Internet traffic modeling and future technology implications. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies, March-April 2003, San Francisco, Calif, USA 1: 587-596. Zukerman M, Neame TD, Addie RG: Internet traffic modeling and future technology implications. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies, March-April 2003, San Francisco, Calif, USA 1: 587-596.
38.
Zurück zum Zitat Karagiannis T, Molle M, Faloutsos M, Broido A: A nonstationary poisson view of internet traffic. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, March 2004, Hong Kong 3: 1558-1569. Karagiannis T, Molle M, Faloutsos M, Broido A: A nonstationary poisson view of internet traffic. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, March 2004, Hong Kong 3: 1558-1569.
39.
Zurück zum Zitat Krunz MM, Makowski AM:Modeling video traffic using M/G/ input processes: a compromise between Markovian and LRD models. IEEE Journal on Selected Areas in Communications 1998, 16(5):733-748. 10.1109/49.700909CrossRef Krunz MM, Makowski AM:Modeling video traffic using M/G/ https://static-content.springer.com/image/art%3A10.1155%2F2010%2F123674/MediaObjects/13638_2009_Article_1794_IEq415_HTML.gif input processes: a compromise between Markovian and LRD models. IEEE Journal on Selected Areas in Communications 1998, 16(5):733-748. 10.1109/49.700909CrossRef
40.
Zurück zum Zitat Neame TD, Zukerman M, Addie RG: Modeling broadband traffic streams. Proceedings of the IEEE Global Telecommunication Conference (GLOBECOM '99), December 1999, Rio de Janeiro, Brazil 1: Neame TD, Zukerman M, Addie RG: Modeling broadband traffic streams. Proceedings of the IEEE Global Telecommunication Conference (GLOBECOM '99), December 1999, Rio de Janeiro, Brazil 1:
41.
Zurück zum Zitat Fang Y, Chlamtac I, Lin Y-B: Modeling PCS networks under general call holding time and cell residence time distributions. IEEE/ACM Transactions on Networking 1997, 5(6):893-906. 10.1109/90.650148CrossRef Fang Y, Chlamtac I, Lin Y-B: Modeling PCS networks under general call holding time and cell residence time distributions. IEEE/ACM Transactions on Networking 1997, 5(6):893-906. 10.1109/90.650148CrossRef
42.
Zurück zum Zitat Mah BA: Empirical model of HTTP network traffic. Proceedings of the 16th IEEE Annual Conference on Computer Communications (INFOCOM '97), April 1997, Kobe, Japan 2: 592-600. Mah BA: Empirical model of HTTP network traffic. Proceedings of the 16th IEEE Annual Conference on Computer Communications (INFOCOM '97), April 1997, Kobe, Japan 2: 592-600.
43.
Zurück zum Zitat Bolotin VA: Modeling call holding time distributions for CCS network design and performance analysis. IEEE Journal on Selected Areas in Communications 1994, 12(3):433-438. 10.1109/49.285304CrossRef Bolotin VA: Modeling call holding time distributions for CCS network design and performance analysis. IEEE Journal on Selected Areas in Communications 1994, 12(3):433-438. 10.1109/49.285304CrossRef
44.
Zurück zum Zitat Barcelo F, Bueno S: Idle and inter-arrival time statistics in public access mobile radio (PAMR) systems. Proceedings of the IEEE Global Telecommunications Conference, November 1997, Phoenix, Ariz, USA 1: 126-130.CrossRef Barcelo F, Bueno S: Idle and inter-arrival time statistics in public access mobile radio (PAMR) systems. Proceedings of the IEEE Global Telecommunications Conference, November 1997, Phoenix, Ariz, USA 1: 126-130.CrossRef
45.
Zurück zum Zitat Urkowitz H: Energy detection of unknown deterministic signals. Proceedings of the IEEE 1967, 55(4):523-531.CrossRef Urkowitz H: Energy detection of unknown deterministic signals. Proceedings of the IEEE 1967, 55(4):523-531.CrossRef
46.
Zurück zum Zitat Kay S: Intuitive Probability and Random Processes Using Matlab. Springer, New York, NY, USA; 2006.CrossRef Kay S: Intuitive Probability and Random Processes Using Matlab. Springer, New York, NY, USA; 2006.CrossRef
47.
Zurück zum Zitat Wellens M, de Baynast A, Mähönen P: Performance of dynamic spectrum access based on spectrum occupancy statistics. IET Communications 2008, 2(6):772-782. 10.1049/iet-com:20070480CrossRef Wellens M, de Baynast A, Mähönen P: Performance of dynamic spectrum access based on spectrum occupancy statistics. IET Communications 2008, 2(6):772-782. 10.1049/iet-com:20070480CrossRef
48.
Zurück zum Zitat Kailath T, Vincent Poor H: Detection of stochastic processes. IEEE Transactions on Information Theory 1998, 44(6):2230-2259. 10.1109/18.720538CrossRefMathSciNetMATH Kailath T, Vincent Poor H: Detection of stochastic processes. IEEE Transactions on Information Theory 1998, 44(6):2230-2259. 10.1109/18.720538CrossRefMathSciNetMATH
49.
Zurück zum Zitat Tandra R, Sahai A: Fundamental limits on detection in low SNR under noise uncertainty. Proceedings of International Conference on Wireless Networks, Communications and Mobile Computing, June 2005, Maui, Hawaii, USA 1: 464-469. Tandra R, Sahai A: Fundamental limits on detection in low SNR under noise uncertainty. Proceedings of International Conference on Wireless Networks, Communications and Mobile Computing, June 2005, Maui, Hawaii, USA 1: 464-469.
50.
Zurück zum Zitat Digham FF, Alouini M-S, Simon MK: On the energy detection of unknown signals over fading channels. IEEE Transactions on Communications 2007, 55(1):21-24.CrossRef Digham FF, Alouini M-S, Simon MK: On the energy detection of unknown signals over fading channels. IEEE Transactions on Communications 2007, 55(1):21-24.CrossRef
51.
Zurück zum Zitat Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2002.MATH Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2002.MATH
52.
Zurück zum Zitat Andrews JG, Ghsoh A, Muhamed R: Fundamentals of WiMAX: Understanding Braodband Wireless Networking. Prentice Hall, Upper Saddle River, NJ, USA; 2007. Andrews JG, Ghsoh A, Muhamed R: Fundamentals of WiMAX: Understanding Braodband Wireless Networking. Prentice Hall, Upper Saddle River, NJ, USA; 2007.
53.
Zurück zum Zitat Crovella ME, Bestavros A: Self-similarity in world wide web traffic evidence and possible causes. Performance Evaluation Review 1996, 24(1):160-169. 10.1145/233008.233038CrossRef Crovella ME, Bestavros A: Self-similarity in world wide web traffic evidence and possible causes. Performance Evaluation Review 1996, 24(1):160-169. 10.1145/233008.233038CrossRef
54.
Zurück zum Zitat Park K, Kim G, Crovella M: On the relationship between file sizes, transport protocols, and self-similar network traffic. Proceedings of the International Conference on Network Protocols, October-November 1996, Columbus, Ohio, USA 171-180. Park K, Kim G, Crovella M: On the relationship between file sizes, transport protocols, and self-similar network traffic. Proceedings of the International Conference on Network Protocols, October-November 1996, Columbus, Ohio, USA 171-180.
55.
Zurück zum Zitat Willinger W, Taqqu MS, Sherman R, Wilson DV: Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 1997, 5(1):71-86. 10.1109/90.554723CrossRef Willinger W, Taqqu MS, Sherman R, Wilson DV: Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 1997, 5(1):71-86. 10.1109/90.554723CrossRef
56.
Zurück zum Zitat Addie RG, Neame TD, Zukerman M: Modeling superposition of many sources generating self similar traffic. Proceedings of IEEE International Conference on Communications (ICC '99), June 1999, Vancouver, Canada 1: 387-391. Addie RG, Neame TD, Zukerman M: Modeling superposition of many sources generating self similar traffic. Proceedings of IEEE International Conference on Communications (ICC '99), June 1999, Vancouver, Canada 1: 387-391.
Metadaten
Titel
Spectrum Sensing for Cognitive Radios with Transmission Statistics: Considering Linear Frequency Sweeping
verfasst von
Sithamparanathan Kandeepan
Radoslaw Piesiewicz
Tuncer C. Aysal
Abdur Rahim Biswas
Imrich Chlamtac
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/123674

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe