Abstract
We study secondary random access in multi-input multi-output cognitive radio networks, where a slotted ALOHA-type protocol and successive interference cancellation are used. We first introduce three types of transmit beamforming performed by secondary users, where multiple antennas are used to suppress the interference at the primary base station and/or to increase the received signal power at the secondary base station. Then, we show a simple decentralized power allocation along with the equivalent single-antenna conversion. To exploit the multiuser diversity gain, an opportunistic transmission protocol is proposed, where the secondary users generating less interference are opportunistically selected, resulting in a further reduction of the interference temperature. The proposed methods are validated via computer simulations. Numerical results show that increasing the number of transmit antennas can greatly reduce the interference temperature, while increasing the number of receive antennas leads to a reduction of the total transmit power. Optimal parameter values of the opportunistic transmission protocol are examined according to three types of beamforming and different antenna configurations, in terms of maximizing the cognitive transmission capacity. All the beamforming, decentralized power allocation, and opportunistic transmission protocol are performed by the secondary users in a decentralized manner, thus resulting in an easy implementation in practice.
Introduction
As a promising technology to solve the fundamental problem of wireless spectrum scarcity, cognitive radio (CR) has been extensively investigated [1–4]. In spectrum sharing CR networks, secondary users (SUs) are allowed to transmit using the same frequency band assigned to primary users (PUs), provided that the requirement of an interference temperature constraint at the primary base station (PBS) is fulfilled [2]. The interference temperature is defined as a certain tolerable interference level at the primary receiver such as the PBS for uplink [5]. It is critical to protect the successful transmission of PUs by restricting the interference temperature caused by the secondary system [6–9].
On the one hand, since the number of user devices is likely to dramatically increase in the future, radio access networks are expected to support multiple access of massive users and achieve a higher spectrum efficiency [10–12]. Meanwhile, to avoid that the resulting overheads consume the scarce channel resource in CR networks, random access becomes an attractive option of multiple access due to the reduction of overheads for successful SU transmissions [13, 14]. On the other hand, successive interference cancellation (SIC) enables the receiver to decode multiple packets by successively subtracting the correctly decoded packets [15, 16], which helps to further improve the spectrum efficiency of random access. The principle of SIC has been first proposed in [17] and then applied to multi-input multi-output (MIMO) and code-division multiple access (CDMA) systems [18, 19].
0.1 Related Work
In MIMO CR networks, multiple antennas were exploited to improve the spectrum efficiency of the secondary system, while suppressing the interference to the primary system [20–25]. In [20], multi-antenna configuration was used to balance the interference reduction at the primary receivers and the spatial multiplexing in the secondary system. In [21], a beamforming method based on the game theory was proposed to maximize the spectrum efficiency of the secondary system. A beamforming scheme was also designed in terms of minimizing the transmit power of the secondary base station (SBS) [22]. In [23], a distributed beamforming design with limited multi-cell cooperation was proposed for CR networks. In [24], a joint design of admission control and beamforming was proposed to maximize the weighed sum rate of the secondary system with partial channel state information (CSI). In [25], joint beamforming, user scheduling, and power allocation strategies for a hierarchical cellular system were proposed to maximize the sum rate of the SUs by converting the original optimization problem into a convex semi-definite programming.
Different from the aforementioned approaches designed for centralized multiple access, for random access with an SIC-enabled receiver, decentralized power allocation (DPA) algorithms have received a great deal of attention [15, 16, 26–31]. Under the DPA algorithms, the transmit power is selected by each user independently, instead of being assigned by the BS. As originally pointed out in [26], DPA enhances the throughput of the random access system with multiple packet reception (MPR) capability. In [15], a random transmit power allocation scheme was proposed to achieve a higher throughput, assuming that the receiver is able to decode one packet from a collision. A DPA algorithm for the random access designed for the case that the SIC-enabled receiver decodes two packets from a collision was then proposed in [16], using the MPR model based on the signal-to-interference-and-noise ratio (SINR) measurement. For secondary random access without the SIC-enabled receiver in CR networks, the optimal threshold-based water-filling DPA policy was proposed in [28]. More recently, by modeling secondary random access as a multi-armed bandit problem, a fair channel-grouping scheme was proposed, while considering both the competition and the fairness between SUs [32]. In our previous studies [30, 31], we proposed DPA algorithms designed for a more general case that the SIC-enabled receiver is able to decode multiple packets for single-input single-output (SISO) random access systems.
Besides, there have been some related studies in a variaty of wireless networks [33–37]. In [33], the optimal power allocation and codeword rate design for secure relay communications were performed in Internet of Things (IoT) networks. For real-time positioning in millimeter wave D2D communications, a new threshold selection algorithm for energy detector-based ranging was proposed by employing a dynamic threshold based on an artificial neural network [34]. In [35], a new channel assignment method was proposed in wireless mesh networks. For cloud computing, a new resource allocation approach based on an imperfect information dynamic Stackelberg game using a hidden Markov model was proposed in [36]. In [37], a distributed and adaptive resource management approach was proposed in cloud-assisted CR vehicular networks. Moreover, under real and important application scenarios such as wireless clinical networks [14] and CR-based IoT networks [32], random access protocols were designed, which motivates us how to apply our proposed approaches in real applications.
0.2 Motivation and Contributions
In this paper, we study the secondary non-orthogonal random access in a MIMO CR network. Specially, we use a slotted ALOHA-type protocol and assume the SIC decoder that is able to resolve multiple received packets from one collision. For such a network, DPA is necessary since the received signal power of each transmitted packet needs to be properly distributed so that the SIC process performs better. At the same time, the interference temperature at the PBS caused by the secondary transmission also has to be controlled using the power allocation by the SUs. Moreover, the MIMO configuration can be exploited by using beamforming techniques to suppress the generated interference and/or to increase the received signal power at the SBS. In addition, the multiuser diversity gain in the network can also be exploited by opportunistically selecting SUs, thus yielding a further reduction of the total interference temperature at the PBS. In the random access system under consideration, all these methods including beamforming, DPA, and opportunistic transmission protocol (OTP) are conducted by each SU in a decentralized manner, based on its own local CSI at the transmitter (CSIT). Hence, our design paradigm is different from the well-investigated optimization methods for the centralized multiple access. To the best of our knowledge, it has not been studied in the literature to analyze the performance of secondary non-orthogonal random access in MIMO CR networks.
The primary focus in this work is on how to improve the sum rate performance of in the secondary random access system, while guaranteeing the successful reception of the primary system by confining the interference temperature at the PBS. A decentralized approach is adopted when the beamforming, DPA, and OTP are employed. It is worthy to highlight fundamental differences between our proposal and the existing approaches as follows.
The conventional approaches [6–8, 20–25] designed for the multiple access channel or the point-to-point channel operate in a centralized manner, e.g., the power allocation is performed by the BS. As a result, the overheads required by the channel allocation stage consume the scarce spectrum resource in CR networks. On the contrary, in our proposal, the transmit power is randomly selected by each user in a decentralized manner, which is preferred by secondary random access in CR networks.
In regards to the existing DPA approaches for CR networks, our proposal differs from [28] in the sense that the SIC-enabled receiver is adopted in the secondary system, which brings a potential sum rate improvement.
Compared to our prior work designed for the single-antenna configuration [30, 31], the interference temperature at the PBS is further suppressed by using beamforming techniques.
The main contributions of this paper are summarized as follows.
Three types of beamforming techniques are introduced for interference suppression at the PBS and/or the signal power enhancement at the SBS. More precisely, to increase the desired signal power, the beamforming type 1 (BF-1) is designed using the singular vector decomposition (SVD) of the channel matrix from each SU to the SBS. The beamforming type 2 (BF-2) is designed using the the SVD of the channel matrix to the PBS, so that the interference is suppressed. The beamforming type 3 (BF-3) is designed in terms of maximizing the signal-to-generated-interference ratio (SGINR) [38], which can be thought as a joint design based on both channel matrices from each SU to the SBS and the PBS.
We use the DPA algorithm along with the equivalent single-antenna conversion, in the sense of maximizing the sum rate of secondary random access, under the constraint of the average interference temperature at the PBS.
An OTP is proposed to exploit the multiuser diversity gain, leading to a further reduction of the total interference temperature at the PBS. In particular, before transmitting the packet, each SU calculates its generating interference independently. Taking this value as a metric, the SU compares it to a threshold η sent by the SBS. If the resulting interference of an SU is less than η, which means that relatively smaller interference is generated, then the SU becomes a transmitter candidate and allocates a power level according to DPA. The OTP is efficiently combined with the beamforming and DPA at the transmitter side.
The average interference temperature at the PBS is analyzed and then validated via computer simulations. For three types of beamforming techniques and various antenna configurations, we examine the optimal value of η according to different quality of service (QoS) targets, while maximizing the net system performance, named cognitive transmission capacity (CTC), which is used to measure the spectrum efficiency achieved by the secondary system under the condition that the reception at the PBS is protected. In practice, both the DPA procedure and the optimal parameter decision of the OTP are made first by the SBS offline. Thereafter, the optimal parameter values of the OTP are broadcast over the network. Each SU performs the beamforming, DPA, and OTP independently, without any further control signalling from the SBS. Since our decentralized approaches require only a small amount of control signalling from the BS, they are suitable for random access scenarios where it is difficult or expensive to establish the centralized control (e.g., random access of SUs in CR-based IoT networks [32]).
Moreover, we also evaluate the performance of our proposal under a more practical standardized model, by taking into account the geometric distribution of nodes and the path loss component of wireless links. Numerical results confirm that our approaches under the practical setting lead to a similar sum rate trend to that obtained under a relatively ideal setting. In addition, it is found that the coverage of the secondary system and the distance between the PBS and SBS heavily affect the resulting interference temperature at the PBS. Optimal parameter values of the OTP are numerically found in terms of maximizing the CTC, which also depends on the geometric distribution in our practical model.
This paper is organized as follows. Section 1 shows the system model. Section 2 presents the transmit beamforming techniques, the DPA algorithm, and the OTP. Section 3 shows not only the analysis on the average interference temperature but also the computational complexity of the proposed approaches. Section 4 provides numerical results for performance validation. Section 5 concludes this paper.
Notations: denotes the field of complex numbers; (⋅)H indicates the conjugate transpose and; ‖⋅‖2 denotes the L2-norm.
1 System and Channel Models
As shown in Fig 1, our CR network consists of K SUs with Nt antennas each, one SBS with Nr antennas, and one PBS with Nr antennas. We focus on secondary random access from the SUs to the SBS. A slotted ALOHA-type protocol is adopted and full-loaded traffic in the network is assumed. Channel coefficient matrices from the k-th SU to the SBS and the PBS are denoted by and , respectively, where k ∈ {1, ⋯, K}. It is assumed that full CSI is available at the SBS but each SU has only the local CSI of its own transmit link to the PBS and/or the SBS. The CSI at the transmitter can be acquired by exploiting the channel reciprocity if time division duplex (TDD) mode is adopted.
Fig 1. The system model.
The secondary random access in our MIMO CR network, consisting of K SUs, one SBS, and one PBS.
At the transmitter side, it is assumed that the information blocks are protected from the noise and interference by strong channel codes and the bit-interleaved coded modulation (BICM) [39]. The channel coding and the modulation together constitute the base code with the data rate Ro. Let xk denote the symbol after the channel coding and modulation, where the symbol power is normalized to . Then, transmit beamforming is performed by multiplying a precoding vector (to be specified in Section 2). Let ek denote the transmit power of the k-th SU. Then, the signal of the k-th SU is given by .
The received signal at the SBS is given by
| (1) |
where each entry of is modeled as a complex Gaussian random variable following . Similarly as in [40], the SBS is able to successfully decode the k-th SU’s packet if the SINR exceeds a decoding threshold given by . Here, Δ ≥ 0 is a decoding threshold margin that indicates the performance gap incurred by a practical code design with respect to the ideal channel codes. Accordingly, it is examined whether a packet can be successfully decoded by comparing its SINR with ρ, instead of using an explicit code design. Upon the successfully decoding, the SIC process reconstructs and subtracts the signal of the decoded packet from the received signal. The SIC process is repeated until all packets are decoded except that none’s SINR exceeds the decoding threshold.
In our CR network, the SUs share the uplink frequency band with the primary system. To guarantee successful reception at the PBS, we need to control the average interference temperature at the PBS such that , where EIT > 0 is a certain constant representing the tolerable interference level at the PBS. In addition, since each SU independently selects its transmit power level under the fading environment, the actual interference temperature for a certain time slot may exceed EIT, thus causing an outage event with a probability of .
2 Proposed Methods
For secondary random access with the SIC-enabled receiver in our MIMO CR network, it is crucial to control or even further reduce the interference temperature at the PBS, while enhancing the sum rate performance of the secondary system. In this section, we introduce several methods that operate in a decentralized manner to achieve these targets.
2.1 Overall Procedure
As illustrated in Fig 2, an overall procedure for an arbitrary SU is explained as follows. First, the information bits are encoded and modulated into complex symbol xk as described in the previous section. Then, we employ three different types of beamforming techniques by finding a proper precoding vector wk. The precoding vector wk is designed in the sense of suppressing the generating interference to the PBS and/or enhancing the desired signal power at the PBS. Afterwards, the OTP is employed, where each SU decides whether to transmit or not by comparing its channel gain to the SBS with a certain threshold. If the k-th SU decides to transmit, then it randomly selects a power level ek based on the sets of power levels and probabilities generated by the DPA algorithm. Finally, the transmitted signal is expressed as .
Fig 2. The diagram of the overall system.
The overall procedure at the k-th SU, where Gk is the channel matrix to the PBS, Hk is the channel matrix to the SBS, wk is the precoding vector, ek is the transmit power, and E, p are the discrete power levels and the corresponding probabilities, respectively.
We employ a modular design concept, where different functions are encapsulated in independent blocks. There are pros and cons by using this design concept. The modular design can be simply implemented and is analytically tractable, compared to the joint optimization. Another advantage comes from the fact that individual function blocks could be further improved without any complex modification of the overall structure. In the following subsections, the details of each function block are described.
2.2 Beamforming
To suppress the generating interference to the PBS and/or to enhance the received signal power at the SBS through transmit beamforming, each SU needs to find a proper precoding vector . For the k-th SU, the generating interference is given by ‖Gkwk‖2 ek, where the transmit power ek is determined by using DPA (to be specified later). In our work, we assume that each SU transmits only one data stream over multiple antennas, which is sufficient to achieve the full multiplexing gain under our random access model.
2.2.1 Beamforming Type 1 (BF-1)
Suppose that only the channel matrix to the SBS is available at each transmitter (SU). Then, we are able to provide a straightforward design by obtaining the precoding vector wS,k based on the SVD of the channel matrix from the k-th SU to the SBS. The SVD of Hk is given by
| (2) |
where and are the unitary matrices, , and . The precoding vector is given by the first column of VS,k, corresponding to the largest singular value . Here, denote the (n, 1)-th element of VS,k. The transmit signal of the k-th SU is then given by . After post-processing, we have
| (3) |
where the receive shaping vector uS,k is given by the first column of US,k.
The SIC process is employed to decode multiple received packets, which are assumed to be ordered according to the received power , where is the number of SUs with positive transmit power. For instance, to decode the packet of the π(1)-th SU from the received signal
| (4) |
multiplying yπ(1) by leads to
| (5) |
which results in a simple scalar form. Here, the SINR of the target signal is given by
| (6) |
If xπ(1) is successfully decoded, then its signal is reconstructed and subtracted from yπ(1). Afterwards, we have
| (7) |
The receiver continues on decoding xπ(2) from yπ(2). This process is repeated until all packets are successfully decoded except that no packet’s SINR exceeds the decoding threshold.
2.2.2 Beamforming Type 2 (BF-2)
An alternative beamforming method is to use the precoding vector wP,k obtained from the SVD of Gk, which is given by
| (8) |
where and are the unitary matrices. Note that the CSIT to the PBS at each SU is assumed. To minimize the generating interference, the precoding vector is given by
| (9) |
where is the Nt-th column of VP,k, which follows the similar steps to those in [41].
2.2.3 Beamforming Type 3 (BF-3)
Furthermore, in order to jointly enhance the received signal power at the SBS and reduce the interference power at the PBS, each SU can perform beamforming in the sense of maximizing the SGINR. In this case, the precoding vector wJ,k is given by
| (10) |
which can be solved using the generalized eigenproblem and the Rayleigh-Ritz theorem [38]. To obtain this precoding vector, we first define the SGINR-based covariance matrix as
| (11) |
Then, the eigenvalue decomposition of Jk is given by
| (12) |
where is the unitary matrix and ΣSGINR,k is the diagonal matrix whose elements are the eigenvalues. The precoding matrix wJ,k maximizing the SGINR is given by the first column of VSGINR,k, corresponding to the largest eigenvector. Note that to perform the eigenvalue decomposition, the CSIT to both the SBS and the PBS is assumed to be available.
For the BF-2 and BF-3 cases, we employ the minimum mean-square error (MMSE)-SIC detection method [42]. Let denote the equivalent overall channel matrix after ordering, e.g., the i-th column is given by . The receiver first performs the MMSE filtering for the π(1)-th SU’s signal, which results in
| (13) |
where . If this signal is successfully decoded, then it is subtracted from the received signal and the remaining signal is given by
| (14) |
Accordingly, the first column of the overall channel matrix is removed and we have . The receiver continues on performing the MMSE-based decoding of the next SU’s signal along with and yπ(2). Note that since wk is obtained from Gk that is not known at the SBS, the SUs need to deliver this information to the SBS via the uplink channel.
2.3 Decentralized Power Allocation (DPA)
The DPA algorithm was originally introduced for the SISO Gaussian channel to maximize the sum rate of random access with the SIC-capable receiver in our previous work [30], and was later extended to the secondary random access scenario in a SISO CR network [31]. In the algorithm, during each time slot, each SU randomly selects its transmit power from a set of discrete power levels E = {E0, ⋯, EL} according to the probabilities p = [p0, ⋯, pL], where L is the number of power levels. The power levels and the corresponding probabilities are obtained for the Gaussian channel according to the given noise power N0. Note that E0 = 0 indicates the idle status and EL ≤ 1 is assumed due to the maximum transmit power constraint. The probability that the k-th SU selects El is given by pl = Pr(ek = El). Now, we describe the DPA algorithm for the MIMO case with the equivalent single-antenna conversion. The received signal of the k-th SU at the SBS is given by , which corresponds to a randomly selected power level from E, i.e., for l ∈ {1, ⋯, L}. Thus, the transmit power is given by .
In what follows, the DPA algorithm for the equivalent SISO channel is briefly described. Let Tl denote the MAC throughput provided by the l-th power level assuming that the packets of higher power levels are subtracted. Let ζi denote the probability that the SIC process successfully continues to a lower power level than the l-th power level. Then, the throughput optimization problem used to find both E and p is formulated as follows.
| (15a) |
| (15b) |
| (15c) |
| (15d) |
where Esum is the constraint of the sum transmit power. The objective function of this optimization problem in Eq (15a) is the overall throughput of the secondary system. Since this optimization problem is almost intractable due to the complicated objective function, we introduce a bottom-up per-level iterative algorithm to obtain E and p. The idea behind is to convert the overall optimization problem into simple tractable per-level sub-problems that are proved to be quasi-concave. The iterative process is used to obtain the power and the probability of the current level, based on the information of lower levels. For more details, we refer to [30].
2.4 Opportunistic Transmission Protocol (OTP)
We propose the OTP to further reduce the interference temperature at the PBS by exploiting the multiuser diversity gain, where only the SUs generating relatively less interference transmit. A metric
| (16) |
that represents the generating interference from the k-th SU to the PBS is used to divide all the SUs into two groups. The SUs with μ ≤ η belong to the candidate group in which the transmit power is allocated, where η is a given threshold. The probability that a certain SU is in the candidate group is then given by δ = Pr(μ ≤ η). The other SUs with μ > η belong to the idle group that will not transmit in the current time slot.
We need to adjust the probabilities p when the OTP is adopted. Let denote the adjusted probability for El, which can be obtained by establishing the following theorem.
Theorem 1 Suppose that the OTP is used for secondary random access in our MIMO CR network. The probabilities corresponding to the transmit power levels E are adjusted as
| (17) |
where j ∈ {1, ⋯, L}.
Proof: For δ ≥ 1 − p0, the overall idle SUs consist of the SUs in the idle group and the SUs in the candidate group with the allocated power level E0. Thus, we have . Since the adjusted probabilities of non-zero power levels are scaled at the same time, it follows that . By solving these equations, we obtain the adjusted probabilities for δ ≥ 1 − p0. For δ < 1 − p0, all the SUs in the candidate group should transmit. Thus, we have and , where σ is a scaling factor. By solving these equations, we obtain the adjusted probabilities for δ < 1 − p0, which completes the proof of this theorem.
It is possible to obtain the ratio of the candidate SUs, δ, according to the cumulative distribution function (CDF) of μ. In particular, for the BF-1 case, the precoding vector wk is a column of the unitary matrix that is independent of Gk. Thus, μ follows the χ2 distribution with Nr degrees of freedom, which is given by
| (18) |
where γ(⋅, ⋅) is the lower incomplete Gamma function and Γ(⋅) is the Gamma function. For the other two beamforming techniques BF-2 and BF-3, since the precoding vectors are not independent of Gk, the corresponding CDFs cannot be given by Eq (18), but still can be obtained by offline numerical methods. This known value of δ is then used to obtain the probabilities from Theorem 1. The value of η is broadcast over the network. Each SU checks whether it is in the candidate group by comparing its μ with η. If the k-th SU belongs to the candidate group, then it randomly selects its power level (e.g., El) from E according to the set of adjusted probabilities .
The overall procedure is illustrated in Fig 3. The SBS first obtains E and p using DPA and then finds the optimal η value offline. These parameters including E, p, and η are broadcast over the network. Each SU obtains the precoding vector, calculates the metric μ in Eq (16), and determines whether to belong to the candidate group, according to its local CSI. Each candidate SU randomly selects a power level from E, adjusts the transmit power according to the channel gain, and finally transmits its packet after the precoding. At the receiver end, the SBS receives and decodes the packets using the aforementioned MMSE-SIC detection method in Section 2.2.3.
Fig 3. The diagram of the overall communication flow.
The communication flow between the SUs and the SBS using our proposed approaches.
3 Discussion
3.1 Analysis on Interference Temperature
In this subsection, we analyze the average interference temperature at the PBS by establishing the following theorem.
Theorem 2 Suppose that the OTP is used for secondary random access in our MIMO CR network, where only the SUs with μ ≤ η belong to the candidate group. Then, the average interference temperature is expressed as
| (19) |
where μ = ‖Gk wk‖2 and f(μ) is the probability density function (PDF) of μ.
Proof: The average interference temperature caused by an arbitrary SU (e.g., the k-th SU) is given by
| (20) |
Let us denote through the DPA algorithm for the equivalent SISO channel. By taking into account the OTP, the expectation of the interference temperature is given by
| (21) |
where μ = ‖Gk wk‖2 ≥ 0. The integral is taken over μ ∈ [0, η] because only the SUs with μ ≤ η have an opportunity to transmit. Since is randomly determined by the DPA, independent of the channel status, Eq (21) can be rewritten as
| (22) |
where El and indicate the power and the corresponding probability of the l-th power level, respectively. This completes the proof of this theorem.
From this theorem, it is seen that the total average interference temperature at the PBS depends on both the expectation of the generated interference from each individual SU and the number of SUs. Moreover, the analysis can be simplified by separating the item from the integral, which is determined by the DPA. Thus, we focus on how the beamforming techniques and the OTP affect the average interference temperature.
In particular, for the BF-2 case, the precoding vector wk is independent of Hk since it is obtained from the SVD of Gk. Hence, ‖Hk wk‖2 follows the χ2 distribution with Nr degrees of freedom, which thus results in the following average interference temperature:
| (23) |
Here, can be computed by the known PDF of μ. However, for the other two beamforming techniques BF-1 and BF-3, since wk is not independent of Hk, it is not straightforward to obtain such an explicit form from Theorem 2.
For the case without the OTP, all the SUs have an equal opportunity to transmit, regardless of the channel status. Then, Eq (20) can be expressed as
| (24) |
where can be easily computed since E and p are given by the DPA. The term depends only on the channel status and can be numerically obtained by the SBS offline. Hence, it is possible for the SBS to estimate the average interference temperature by using the given DPA algorithm, beamforming techniques, and the distribution of channel gains.
3.2 Complexity of the Proposed Methods
In this subsection, we analyze the computational complexity of the proposed approaches including the beamforming, DPA, and OTP by examining the required floating operations (flops) [43]. We adopt the big O notation to capture the asymptotic performance as Nt and Nr are sufficiently large, where f(x) = O(g(x)) means that there exist constants C and c such that f(x) ≤ Cg(x) for all x > c. With respect to the beamforming techniques, the BF-1 and BF-2 cases need to perform SVD of the channel matrix (Hk or Gk) to obtain the precoding vectors, and thus the complexity is given by [43]. For the BF-3 case, since it is required to first obtain the covariance matrix Jk and then perform the eigenvalue decomposition of Jk, the overall complexity is given by [43]. Unlike the beamforming techniques, we obtain the parameter values of the DPA and OTP offline and broadcast them over the network. Note that these parameter values keep the same regardless of a given channel realization (e.g., the average SNR and the fading distribution). Thus, at the transmitter end, the complexity of the DPA and OTP arises only from computing ‖Hkwk‖2 or ‖Gkwk‖2, which is given by O(Nr Nt). The complexity of the proposed methods is summarized in Table 1.
Table 1. The computational complexity of the proposed approaches.
| Method | Computational complexity | |
|---|---|---|
| Beamforming | BF-1 | |
| BF-2 | ||
| BF-3 | ||
| DPA | O(NrNt) | |
| OTP | O(NrNt) |
4 Numerical Results
We evaluate the performance of the proposed methods via intensive computer simulations. The simulation environments are described as follows. We adopt a slotted ALOHA-type random access protocol in the MIMO CR network with K = 100 full-loaded SUs contending for transmission to the SBS, without using the carrier sensing or the backoff mechanism. The transmit power levels E and the corresponding probabilities p are obtained according to the DPA algorithm in [31], where the noise power density, N0, is assumed to be 10−2.
4.1 Sum Rate and Energy Efficiency
Fig 4 shows the sum rate performance of our secondary system versus δ for both the MIMO (Nt = 2, Nr = 4) and SISO configurations using the proposed methods, where δ is the ratio of the candidate SUs. Compared to the SISO case, employing one of three beamforming techniques provides superior sum rate performance for all ranges of δ. For each beamforming type, it is observed that the sum rate first increases with δ when δ is smaller than a certain value and then gets saturated. This is because the OTP controls the number of candidate SUs. To be specific, for small δ, there are not a sufficient number of candidate SUs for transmission. Thus, as δ increases, more SUs tend to be in the candidate group and the sum rate increases accordingly. For large δ, there are a sufficient number of candidate SUs. In this case, the sum rate performance is independent of δ and depends only on the DPA itself.
Fig 4. The sum rate performance.
The sum rate versus the ratio of candidate SUs, δ, for three types of beamforming techniques (Nt = 2, Nr = 4) and the SISO case.
We now turn to evaluating the performance of energy efficiency defined as the ratio of the sum rate over the total transmit power consumed by all the SUs, since energy efficiency is an important performance metric in green communications [44, 45]. As illustrated in Fig 5, when Nt = 2 and Nr = 4, it is obvious that all three types of beamforming techniques outperform the SISO case for all range of δ, showing great improvements on the energy efficiency. As we scrutinize each type of the beamforming techniques, it is found that the BF-2 (the beamforming technique that minimizes the generated interference at the PBS) is less energy efficient, compared to the BF-1 (the beamforming technique that minimizes the required transmit power at the SU) and the BF-3 (the beamforming technique that maximizes the resulting SGINR). This is because the BF-2 design focuses only on the suppression of interference to the primary system, with no consideration of reducing the transmit power at the SUs.
Fig 5. The energy efficiency performance.
The energy efficiency versus the ratio of candidate SUs, δ, for three types of beamforming techniques (Nt = 2, Nr = 4) and the SISO case.
4.2 Interference Temperature Suppression
In this subsection, we measure the interference temperature suppression at the PBS, which is crucial to protect the successful reception of the primary system. The interference temperature here is given by , similarly as in [22, 25]. Fig 6 shows the average interference temperature at the PBS versus δ, where the antenna configuration is given by Nt = 4 and Nr = 16. It is observed that the BF-3 achieves the best performance among the three beamforming techniques in terms of interference temperature suppression, which thus validates the effectiveness of the SGINR-based beamforming. By maximizing the SGINR at each SU, we can not only enhance the desired signal power at the SBS but also reduce the interference at the PBS. It is also seen that performance of the BF-2 is quite comparable to that of the BF-3, while the BF-2 needs less complexity and a smaller amount of CSI. Moreover, for each beamforming technique, we find that as δ increases, a higher interference temperature at the PBS is generated since more SUs belong to the candidate group. As δ tends to 1, each simulation curve approaches the analytical result, corresponding to the case with no OTP (δ = 1) in Eq (24), which thus validates our analysis on the interference temperature in Section 3.1.
Fig 6. The interference temperature for three types of beamforming techniques.
The average interference temperature versus the ratio of candidate SUs, δ, for three types of beamforming techniques (Nt = 4, Nr = 16). The analytical results with no OTP (δ = 1) in Eq (23) are also plotted for validation.
Now, we evaluate the interference temperature performance for various antenna configurations, where we focus on the BF-2 due to a good balance between the sum rate and interference suppression performance. We first vary the number of transmit antennas, while fixing the number of receive antennas, Nr (Fig 7), and then vice versa (Fig 8). As illustrated in Fig 7, when Nr = 16, the interference temperature can be significantly reduced by increasing Nt, due to the fact that beamforming with more transmit antennas can suppress the interference at the PBS more effectively. In addition, it is observed that the numerical results are consistent with the analytical ones in Theorem 2 (Eq (23) for the BF-2 case). Fig 8 shows that when Nt = 2, increasing Nr results in less total transmit power. This is because by deploying more receive antennas at the SBS, the SUs can transmit with lower power since more receive diversity gain can be obtained.
Fig 7. The interference temperature suppression.
The average interference temperature versus the ratio of candidate SUs, δ, for various antenna configurations, where the BF-2 is employed. Both the numerical and analytical results are plotted.
Fig 8. The transmit power performance.
The total transmit power versus the ratio of candidate SUs, δ, for various antenna configurations, where the BF-2 is employed.
4.3 Cognitive Transmission Capacity (CTC)
It is necessary to characterize a fundamental trade-off between the sum rate of the secondary system and the interference temperature at the PBS. To elaborate on this trade-off, we define a new performance metric, termed the CTC, which can also be used to find the optimal δ⋆ in terms of maximizing the net system throughput. The definition of CTC is based on the spectrum-sharing transmission capacity that was used to measure the area spectrum efficiency [46]. Specifically, the CTC in this work is given by Rsum ⋅ (1 − Pout), where Rsum and Pout are the sum rate of the secondary system and the outage probability that the interference temperature at the PBS exceeds the constraint EIT, respectively. This metric can be interpreted as how much sum rate can be achieved by the secondary system without hindering the successful reception of the primary system.
As illustrated in Fig 9, for all three types of beamforming techniques, the CTC first tends to increase with δ, but starts to decrease when δ exceeds a certain value. Primary reasons of this phenomenon can be explained as follows. For small δ, since Pout is quite low, Rsum plays a more important role. Thus, the CTC increases with δ in this region. For sufficiently large δ, the increasing rate of Rsum becomes slow and Pout becomes dominant. As a result, the CTC begins to decrease with δ. Based on the observation that the resulting CTC curves are concave over δ, the optimal δ⋆ maximizing the CTC can be numerically found for each beamforming technique.
Fig 9. The CTC performance.
The CTC versus the ratio of candidate SUs, δ, for three types of beamforming techniques (Nt = 4, Nr = 16).
Table 2 shows the values of δ⋆ in terms of maximizing the CTC for the three types of beamforming techniques and various antenna configurations, which are obtained by numerical search. From this table, it is found that the optimal δ⋆ increases with Nt. This is because using more transmit antennas enables to suppress the generating interference more effectively (as also shown in Fig 7), thus resulting in a lower outage probability. In consequence, more SUs can belong to the candidate group, leading to a superior CTC performance.
Table 2. Lookup table of δ⋆.
| Antenna configuration | BF-1 | BF-2 | BF-3 |
|---|---|---|---|
| Nt = 2, Nr = 16 | 0.40 | 0.45 | 0.45 |
| Nt = 3, Nr = 16 | 0.45 | 0.50 | 0.60 |
| Nt = 4, Nr = 16 | 0.55 | 0.65 | 0.70 |
| Nt = 5, Nr = 16 | 0.55 | 0.75 | 0.70 |
| Nt = 6, Nr = 16 | 0.60 | 0.70 | 0.80 |
Table 3 shows the optimal η⋆ (the threshold to control δ in the OTP) for the three types of beamforming techniques and various antenna configurations. In practice, the SBS obtains the optimal η⋆ by evaluating the CTC performance offline, and then broadcasts it over the network. In addition to the CTC metric, it is also possible to adjust η to achieve other QoS targets (e.g., using smaller η to greatly reduce the interference temperature at the PBS, at the cost of a relatively low sum rate in the secondary system).
Table 3. Lookup table of η⋆.
| Antenna configuration | BF-1 | BF-2 | BF-3 |
|---|---|---|---|
| Nt = 2, Nr = 16 | 14.67 | 11.00 | 12.46 |
| Nt = 3, Nr = 16 | 15.15 | 8.76 | 11.86 |
| Nt = 4, Nr = 16 | 16.18 | 7.58 | 11.29 |
| Nt = 5, Nr = 16 | 16.17 | 6.49 | 10.31 |
| Nt = 6, Nr = 16 | 16.69 | 5.01 | 10.33 |
4.4 Performance Evaluation Under a Standardized Model
In this subsection, we examine the system performance under a more realistic simulation environment, by taking into account both the random geometric distribution of the SUs and the path loss component of wireless links. According to practical wireless LAN applications, we adopt the following suitable propagation model for the IEEE 802.11n and 802.11ac standards [47]:
| (25) |
where d [m] is the distance between one transmitter-receiver pair; dBP [m] is the breakpoint; PL(d) is the path loss in dB scale; and f [Hz] is the frequency. As illustrated in Fig 10, on the coexistence with the primary system, we assume that the SUs are uniformly distributed in a two-dimension disc with a radius of DR [m] and the SBS is located at the center, by referring to the simulation model in [48]. The PBS is located DSP [m] away from the SBS.
Fig 10. The system model assuming the practical setting.
The SUs are uniformly distributed in the coverage of SBS with radius of DR. The PBS is placed DSP away from the SBS.
The values of simulation parameters are summarized in Table 4.
Table 4. The simulation environment.
| Parameter | Value |
|---|---|
| Breakpoint (dBP) for path loss | 10m |
| Path loss exponent | 2 for d ≤ dBP; 3.5 for d > dBP |
| Frequency band (f) | 2.4GHz |
| Radius of SBS coverage (DR) | DR ∈ {10, ⋯, 200}m |
| PBS to SBS distance (DSP) | DSP ∈ {10, ⋯, 200}m |
| Number of SUs (K) | 100 |
| Decoding threshold (ρ) | 0.0627 |
| Antenna configuration | Nt = 2, Nr = 4 |
| Beamforming type | BF-2 |
Fig 11 shows the interference temperature versus DR for DSP = 50m and δ ∈ {0.1, 0.3, 0.5, 0.7, 0.9}. From the figure, the following observations are found:
Fig 11. The interference temperature versus DR.
For DSP = 50m, the interference temperature versus DR for various δ ∈ {0.1, 0.3, 0.5, 0.7, 0.9} is plotted.
The interference temperature is monotonically increasing with δ for given DR, which is consistent with our analytical and numerical results based on the simulation environment with no path loss in Figs 7 and 8.
For large δ (especially for δ = 0.9), the interference temperature first increases with DR and then gets reduced. In this case, most of the SUs belong to the candidate group. If DR < DSP, i.e., the PBS is located outside the SBS coverage, then all the generated interference is diminished by the path loss. If DR ≥ DSP, i.e., the PBS is located inside the SBS coverage, then there may exist candidate SUs near the PBS and far away from the SBS, causing strong interference to the PBS. As DR is very large, the resulting interference temperature tends to rather decrease due to more dispersed locations of SUs. More specifically, this comes from the fact that some SUs are far away from the PBS and the path loss greatly reduces the interference if these SUs transmit.
The distance between the PBS and SBS heavily affects the interference temperature suppression of the primary system due to the path loss component, which is verified through the following numerical results. Fig 12 shows the interference temperature versus DSP for DR = 90m (refer to [48]) and various δ ∈ {0.1, 0.3, 0.5, 0.7, 0.9}. From the figure, the following observations are found:
Fig 12. The interference temperature versus DSP.
For DR = 90m, the interference temperature versus DSP for various δ ∈ {0.1, 0.3, 0.5, 0.7, 0.9} is plotted.
The interference temperature is monotonically increasing with δ for given DSP.
For small δ (e.g, δ ≤ 0.5), the interference temperature tends to increase with DSP for all ranges of DSP.
For large δ (especially for δ = 0.9), the interference temperature first increases with DSP and then gets reduced. If the PBS is within the coverage of the SBS, then some SUs nearby the PBS will cause serious interference to the PBS. If the PBS is out of the coverage of the SBS, then the interference temperature decreases with DSP since the impact on path loss becomes dominant.
Based on the aforementioned observations, it is found that the OTP plays a crucial role on the interference temperature suppression if the PBS is within the coverage of the SBS, but is less important if the PBS is far away from the SBS. Thus, the distance between the PBS and SBS is important in determining δ.
From Figs 11 and 12, it is seen that proper values of δ are required to better control the interference temperature for different conditions on DR and DSP. Recall that to find proper values of δ, we need to consider both the interference temperature at the PBS and the sum rate of the secondary system. Hence, performance on the CTC is also evaluated for our practical setting. Fig 13 illustrates the CTC versus δ for DR = 90m and DSP ∈ {50, 100, 150, 200}m. From the figure, the following observations are found:
Fig 13. The CTC versus δ under the standardized model.
For DR = 90m, the CTC versus δ for various DSP ∈ {50, 100, 150, 200}m is plotted.
Since the CTC curves tends to be quasi-concave, it is possible to find the optimal values of δ (denoted by δ*) that maximize the CTC.
The optimal values of δ for various DSP are different from those found under the system model with no path loss component. This is because the distribution of fading coefficients depends heavily on the path loss. Thus, we need to numerically select δ* according to given DSP and DR in addition to other parameters.
It is observed that the optimal δ* tends to increase with DSP. That is, more SUs may have an opportunity to transmit as the PBS is farther away from the SBS, since the interference is weakened by the path loss. When DSP is sufficiently large (e.g., DSP ≥ 150m), by virtue of the significant signal attenuation, almost all SUs are likely to belong to the candidate group to maximize the sum rate of the secondary system.
5 Concluding Remarks
For secondary random access in the MIMO CR network, we have proposed the OTP to opportunistically reduce the interference temperature at the PBS, by exploiting the multiuser diversity gain and efficiently combining three types of beamforming techniques and the modified DPA. The sum rate of the SUs and the interference temperature reduction at the PBS were evaluated through computer simulations. In particular, the average interference temperature was analytically shown and then was validated using simulations. It turned out that the beamforming designed in terms of maximizing the SGINR (the BF-3) achieves the best performance on both measurements. By using the CTC metric, we provided a novel framework for finding the optimal values of the OTP parameter that can be applied to practical MIMO CR networks operating in a decentralized fashion. In addition, the system performance was extensively examined under the realistic standardized model.
Acknowledgments
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054577) and by the Ministry of Science, ICT & Future Planning (MSIP) (2015R1A2A1A15054248).
Data Availability
All relevant data are within the paper.
Funding Statement
This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054577): http://www.nrf.re.kr, and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (MSIP) (2015R1A2A1A15054248): http://www.nrf.re.kr. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
References
- 1. Mitola J, Maguire GQ. Cognitive radio: Making software radios more personal. IEEE Pers Commun. 1999;6(4):13–18. 10.1109/98.788210 [DOI] [Google Scholar]
- 2. Haykin S. Cognitive radio: Brain-empowered wireless communications. IEEE J Sel Areas Commun. 2005;23(2):201–220. 10.1109/JSAC.2004.839380 [DOI] [Google Scholar]
- 3. Goldsmith A, Jafar SA, Maric I, Srinivasa S. Breaking spectrum gridlock with cognitive radios: An information theoretic perspective. Proc IEEE. 2009;97(5):894–914. 10.1109/JPROC.2009.2015717 [DOI] [Google Scholar]
- 4. Zhai L, Wang H, Gao C. A spectrum access based on quality of service (QoS) in cognitive radio networks. PLOS ONE. 2016;11(5):e0155074 10.1371/journal.pone.0155074 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5. Federal Communications Commission. Spectrum Policy Task Force. FCC; November 2002. ET Docket no. 02-135. [Google Scholar]
- 6. Ghasemi A, Sousa ES. Fundamental limits of spectrum-sharing in fading environments. IEEE Trans Wireless Commun. 2007;6(2):649–658. 10.1109/TWC.2007.05447 [DOI] [Google Scholar]
- 7. Zhang R, Cui S, Liang YC. On ergodic sum capacity of fading cognitive multiple-access and broadcast channels. IEEE Trans Inf Theory. 2009;55(11):5161–5178. 10.1109/TIT.2009.2030449 [DOI] [Google Scholar]
- 8. Kang X, Liang YC, Garg HK. Fading cognitive multiple access channels: Outage capacity regions and optimal power allocation. IEEE Trans Wireless Commun. 2010;9(7):2382–2391. 10.1109/TWC.2010.07.091743 [DOI] [Google Scholar]
- 9. Al-Gumaei YA, Noordin KA, Reza AW, Dimyati K. A novel utility function for energy-efficient power control game in cognitive radio networks. PLOS ONE. 2015;10(8):e0135137 10.1371/journal.pone.0135137 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 10. Boccardi F, Heath RW Jr, Lozano A, Marzetta TL, Popovski P. Five disruptive technology directions for 5G. IEEE Commun Mag. 2014;52(2):74–80. 10.1109/MCOM.2014.6736746 [DOI] [Google Scholar]
- 11. Song H, Rawat DB, Jeschke S, Brecher C. Cyber-Physical Systems: Foundations, Principles and Applications. Burlington, MA, USA: Morgan Kaufmann; 2016. [Google Scholar]
- 12. Sheng G, Wang Y, Lv Z, Song H. Multiple-antenna systems and multiuser communications: Fundamentals and an overview of software-based modeling techniques Computers & Electrical Engineering. 2016; [Google Scholar]
- 13.He H, Du Q, Song H, Li W, Wang Y, Ren P. Traffic-aware ACB scheme for massive access in machine-to-machine networks. In: Proc. of IEEE Int. Conf. Commun. (ICC). London, UK: IEEE; 2015. p. 617–622.
- 14. Du Q, Zhao W, Li W, Zhang X, Sun B, Song H, et al. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks. Journal of medical systems. 2016;40(7):1–8. 10.1007/s10916-016-0506-5 [DOI] [PubMed] [Google Scholar]
- 15. LaMaire RO, Krishna A, Zorzi M. On the randomization of transmitter power levels to increase throughput in multiple access radio systems. Wireless Netw. 1998;4(3):263–277. 10.1023/A:1019164308540 [DOI] [Google Scholar]
- 16. Xu C, Ping L, Wang P, Chan S, Lin X. Decentralized power control for random access with successive interference cancellation. IEEE J Sel Areas Commun. 2013;31(11):2387–2396. 10.1109/JSAC.2013.131113 [DOI] [Google Scholar]
- 17. Cover TM. Broadcast channels. IEEE Trans Inf Theory. 1972;18(1):2–14. 10.1109/TIT.1972.1054727 [DOI] [Google Scholar]
- 18. Foschini GJ. Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas. Bell labs technical journal. 1996;1(2):41–59. 10.1002/bltj.2015 [DOI] [Google Scholar]
- 19. Verdu S. Multiuser detection. New York, NY, USA: Cambridge Univ. Press; 1998. [Google Scholar]
- 20. Zhang R, Liang YC. Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks. IEEE J Sel Topics Sig Process. 2008;2(1):88–102. 10.1109/JSTSP.2007.914894 [DOI] [Google Scholar]
- 21. Wang J, Scutari G, Palomar DP. Robust MIMO cognitive radio via game theory. IEEE Trans Sig Process. 2011;59(3):1183–1201. 10.1109/TSP.2010.2092773 [DOI] [Google Scholar]
- 22. Du H, Ratnarajah T, Pesavento M, Papadias CB. Joint transceiver beamforming in MIMO cognitive radio network via second-order cone programming. IEEE Trans Sig Process. 2012;60(2):781–792. 10.1109/TSP.2011.2174790 [DOI] [Google Scholar]
- 23. Kim YJ, Song MG, Cho YS, Im GH. Decentralized beamformer design with limited multi-cell cooperation for interference channel of cognitive radio networks. IEEE Trans Wireless Commun. 2013;12(8):4142–4152. 10.1109/TWC.2013.071913.121996 [DOI] [Google Scholar]
- 24. Dong Q, Li J. Joint admission control and beamforming design for the interference cognitive radio network with partial channel state information case. IET Communications. 2015;9(10):1306–1314. 10.1049/iet-com.2014.0859 [DOI] [Google Scholar]
- 25. Ku ML, Wang LC, Liu YL. Joint antenna beamforming, multiuser scheduling, and power allocation for hierarchical cellular systems. IEEE J Sel Areas Commun. 2015;33(5):896–909. 10.1109/JSAC.2014.2361083 [DOI] [Google Scholar]
- 26. Metzner J. On improving utilization in ALOHA networks. IEEE Trans Commun. 1976;24(4):447–448. 10.1109/TCOM.1976.1093317 [DOI] [Google Scholar]
- 27. Leung YW. Mean power consumption of artificial power capture in wireless networks. IEEE Trans Comm. 1997;45(8):957–964. 10.1109/26.618300 [DOI] [Google Scholar]
- 28. Nekouei E, Inaltekin H, Dey S. Power control and asymptotic throughput analysis for the distributed cognitive uplink. IEEE Trans Commun. 2014;62(1):41–58. 10.1109/TCOMM.2013.112413.130510 [DOI] [Google Scholar]
- 29. Zhang Z, Xu C, Ping L. Coded random access with distributed power control and multiple-packet reception. IEEE Wireless Commun Lett. 2015;4(2):117–120. 10.1109/LWC.2014.2381663 [DOI] [Google Scholar]
- 30. Lin H, Ishibashi K, Shin WY, Fujii T. A simple random access scheme With multilevel power allocation. IEEE Commun Lett. 2015;19(12):2118–2121. 10.1109/LCOMM.2015.2489650 [DOI] [Google Scholar]
- 31.Lin H, Ishibashi K, Shin WY, Fujii T. Decentralized power allocation for secondary random access in cognitive radio networks with successive interference cancellation. In: Proc. of IEEE Int. Conf. Commun. (ICC). Kuala Lumpur, Malaysia; 2016.
- 32. Zhu J, Song Y, Jiang D, Song H. Multi-Armed Bandit Channel Access Scheme With Cognitive Radio Technology in Wireless Sensor Networks for the Internet of Things. IEEE Access. 2016;4:4609–4617. 10.1109/ACCESS.2016.2600633 [DOI] [Google Scholar]
- 33. Xu Q, Ren P, Song H, Du Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access. 2016;4:2840–2853. 10.1109/ACCESS.2016.2575863 [DOI] [Google Scholar]
- 34. Cui X, Gulliver A, Song H, Li J. Real-time Positioning based on Millimeter Wave Device to Device Communications. IEEE Access. 2016;4:5520–5530. 10.1109/ACCESS.2016.2604360 [DOI] [Google Scholar]
- 35. Shojafar M, Abolfazli S, Mostafaei H, Singhal M. Improving channel assignment in multi-radio wireless mesh networks with learning automata. Wireless Pers Commun. 2015;82(1):61–80. 10.1007/s11277-014-2194-0 [DOI] [Google Scholar]
- 36. Wei W, Fan X, Song H, Fan X, Yang J. Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing. IEEE Transactions on Services Computing. 2016; p. 1–1. [Google Scholar]
- 37. Cordeschi N, Amendola D, Shojafar M, Baccarelli E. Distributed and adaptive resource management in cloud-assisted cognitive radio vehicular networks with hard reliability guarantees. Vehicular Communications. 2015;2(1):1–12. 10.1016/j.vehcom.2014.08.004 [DOI] [Google Scholar]
- 38. Lee BO, Je HW, Shin OS, Lee KB. A novel uplink MIMO transmission scheme in a multicell environment. IEEE Trans Wireless Commun. 2009;8(10):4981–4987. 10.1109/TWC.2009.081690 [DOI] [Google Scholar]
- 39. Caire G, Taricco G, Biglieri E. Bit-interleaved coded modulation. IEEE Trans Inf Theory. 1998;44(3):927–946. 10.1109/18.669123 [DOI] [Google Scholar]
- 40.Shapiro J, Barron R, Wornell G. Practical layered rateless codes for the Gaussian channel: power allocation and implementation. In: Proc. IEEE Workshop Sig. Process. Advances Wireless Commun. (SPAWC). Helsinki, Finland; 2007.
- 41. Yang HJ, Shin WY, Jung BC, Paulraj A. Opportunistic interference alignment for MIMO interfering multiple-access channels. IEEE Trans Wireless Commun. 2013;12(5):2180–2192. 10.1109/TWC.2013.032113.120673 [DOI] [Google Scholar]
- 42. Tse D, Viswanath P. Fundamentals of wireless communication. New York, NY, USA: Cambridge University Press; 2005. [Google Scholar]
- 43. Hunger R. Floating point operations in matrix-vector calculus. Munich, Germany: Munich University of Technology, Inst. for Circuit Theory and Signal Processing; 2005. [Google Scholar]
- 44. Li GY, Xu Z, Xiong C, Yang C, Zhang S, Chen Y, et al. Energy-efficient wireless communications: tutorial, survey, and open issues. IEEE Wireless Commun. 2011;18(6):28–35. 10.1109/MWC.2011.6108331 [DOI] [Google Scholar]
- 45.Shin WY, Yi H, Tarokh V. Energy-efficient base-station topologies for green cellular networks. In: Proc. IEEE Consumer Commun. Netw. Conf (CCNC). Las Vegas, NV; 2013. p. 91–96.
- 46. Lee J, Andrews JG, Hong D. Spectrum-sharing transmission capacity. IEEE Trans Wireless Commun. 2011;10(9):3053–3063. 10.1109/TWC.2011.070511.101941 [DOI] [Google Scholar]
- 47. Perahia E, Stacey R. Next Generation Wireless LANs: 802.11 n and 802.11 ac. New York, NY, USA: Cambridge university press; 2013. [Google Scholar]
- 48. Zhang R, Wang M, Cai LX, Zheng Z, Shen X, Xie LL. LTE-unlicensed: the future of spectrum aggregation for cellular networks. IEEE Wireless Commun. 2015;22(3):150–159. 10.1109/MWC.2015.7143339 [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
All relevant data are within the paper.













