Beruflich Dokumente
Kultur Dokumente
R ESEA R CH
Open Access
1 Introduction
The rapid increase of wireless systems and applications
raises spectrum demand. However, not all bands of the
spectrum are fully utilized at specific times or at specific geographic locations. The Federal Communication
Commission (FCC) reported that some of these bands
(e.g., unlicensed bands at 2.4 and 5 Ghz) are overcrowded,
while others (e.g., licensed bands such as the ultra-high
frequency (UHF) band) are inefficiently used. Therefore,
technology is emerging to reduce the spectrum scarcity
issue by fully utilizing the unused portion of the spectrum.
For example, IEEE 802.22 [1] proposes reusing the television (TV) UHF band without causing any interference
to TV receivers. Another considers a cellular communication system that utilizes the wireless local area network
system (cf. [2]). Researchers often refer to this technology
as cognitive radio (CR) systems.
As the main objective of CR systems is the spectrum
efficient utilization, an accurate design for a cognitive
radio network (CRN) working under a licensed primary
*Correspondence: oaltrad@sfu.ca
1 Simon Fraser University, Burnaby, BC V5A 1S6, Canada
Full list of author information is available at the end of the article
2013 Altrad and Muhaidat; licensee Springer. This is an Open Access article distributed under the terms of the Creative
Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and
reproduction in any medium, provided the original work is properly cited.
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
to any signal type with fewer computational requirements and a simpler implementation. Although several
research papers have investigated the detection process
using energy detector over a variety of fading channels (cf. [8-13]), the expressions derived for the probability of detection and the probability of false alarms
were mainly evaluated for even degrees of freedom (e.g.,
[14, Eq. 10]). Therefore, we provide an algorithm to compute the detection probability in the case of odd degrees
of freedom based on the suboptimal energy detector.
Moreover, as spectrum sensing must detect a very low
signal-to-noise ratio (SNR), which in turn requires a high
degree of precision, the previously derived expressions
mainly depend on the number of terms in the summation to get highly accurate results. In addition, they
are numerically difficult and depend on other functions
while their implementation is also susceptible to truncation errors. Therefore, closed-form expressions for the
detection probability are derived. We summarize our
contributions as follows:
We provide a highly accurate recursive algorithm to
compute the probability of detection for odd degrees
of freedom. It should be noted that the mathematical
derivation shows the steps of the algorithm when
evaluating the detection probability in case of odd
degrees of freedom, i.e., it is an algorithm rather than
a mathematical derivation. An example of the
algorithm importance is the Marcum function in
Matlab which accepts only integer values in its third
argument. Therefore, when the number of degrees of
freedom is odd, the third argument is no longer
accepted and the Marcum function cannot be used to
evaluate the detection probability in this case.
However, our algorithm solves this problem.
We derive a closed-form expression over a Nakagamim fading channel. Here, we use closed form in the
sense that no summation and no integration are
required. The accuracy of the closed form is very
close to the previously reported expressions in which
summation and integration are used to get highly
accurate results. Our new expressions show how the
ratio of the Nakagami parameter m and the average
signal-to-noise ratio which affects the receiver
operation characteristics (ROC) curves.
We compare the derived expressions to the reported
expressions in [14,15] in which summation and
integration are used. We also compare our derived
expressions to other recently reported expressions,
e.g., [16,17], and we show that our new derived
expressions can be used with no limitations.
Moreover, the derived expressions are more accurate
than the recently reported ones with less or almost
the same computational complexity.
Page 2 of 11
We also compare our simulation results with the analytical evaluation of the derived expressions.
The rest of the paper is organized as follows. In
Section 2, the energy detector, system model, and the
derivation of the recursive algorithm are introduced.
We derive closed-form expressions for Nakagami channels in Section 3. Simulation and numerical results are
introduced in Section 4, and we conclude our paper in
Section 5.
w[ n],
H0
, n = 1, 2, N,
(1)
|x[ n]|2
(2)
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
Page 3 of 11
N2 , H0
N2 , H1 ,
Pd =P (H1 ; H1 ) = P (y > ; H1 )
H1
=
fY (y)dy,
fY (y) =
N
N2 2
1
2 2
N y
N
2 1
y
2 2
, H0
(5)
(N2)/4
y
exp
exp
1
2 2
y
(y + ) I N 1 2 , H1
2
(3)
where the noncentrality parameter =
N
i=1
(6)
2i , and i is
2u
Ir (u) =
k! (r + k + 1)
(4)
k=0
To derive the probability of false alarm using the righttail probability of the central chi-squared density function
2
Q 2 , we define as = h 2 .a Substituting t = y/ 2 and
N
further integrating the probability density function in (3)
under H0 results in:
Pfa =
/ 2
N
t
1
1
2
exp
dt
N t
N
2
22 2
= Q 2 / 2
N
/ 2 0.
(7)
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
2
/
2Q
exp N1
2
2
2
/ 2 +
Q 2 (/ 2 ) = 2Q
k=1
N
)1
( N2
exp 2
2
k=0
N= 1
(k1)!(2/ 2 )
(2k1)!
/ 2
N( )
1
k 2
N odd
(8)
N even
k!
Page 4 of 11
The second term of (12) represents the right-tail probability of a central chi-square with l = N + 2k degrees
of freedom. As a result, for N odd, l = N + 2k is also
odd. Thus, (12) can be rewritten using (8) for the odd case
which results in (13), where G 2 ( ) is given by:
l2
exp ( /2) ( /2)k
=
N( )
k!
Q 2
k=0
N2
4
1
1 t
exp
t dt
=
(t + ) I N 1
2
2
2
exp 1
+
2Q
2
/ 2
(9)
Pd = QN/2
(k 1) !
(2k 1) !
(10)
= 2Q
Qm (, ) =
1
m1
k 1
2
2
k=1
,
N1
2
2 2
x +
m
2
x e
Im1 (x)dx
exp ( /2) ( /2)k
+
k!
k=0
1 l21
j 1
2
2
exp 2 j 1 ! 2
2j 1 !
j=1
(11)
1 l1
1
!
l1 1
exp 2
2
2 2 2
+
l1
2 2 1 !
= 2Q
exp ( /2) ( /2)k
+
k!
k=0
Q 2
N( )
/ 2 =
dt
N
2 2 +k N2 + k
k=0
G 2 ( ) + g( , l)
l2
(13)
exp ( /2) ( /2)k
Q 2
N+2k
k!
second
term
(12)
l3
j 1
2
exp 12
j 1 ! 2 2
G 2 ( ) =
l2
2j 1 !
j=1
(14)
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
1 l1
1
! l1 1
exp
2 2 2
g( , l) =
2
2 l1 1 !
2
exp( /2)
=
2
((l 3)/2)
(l 2) (l 3)
(15)
g( , l) = g( , l 2)
l2
PdRay
= exp
2
1 + 2
exp
2 + 22
u2
1 k
+
k! 2
*u1
k
u2
1
k! 2 + 22
k=0
(20)
k=0
where u = N/2.
3.2 Nakagami fading
m
m1
exp
(m)
(17)
Qu
, = 1
(1)n exp
2
n0
PdNak =
(16)
and
m
2
(m)
m
=
and in the last step, we substitute
with . Different combinations of m and N/2 lead to different results for the integration defined in the last step.
In the following, the probability of detection is evaluated
over both Rayleigh and Nakagami fading channels.
Page 5 of 11
QN/2
f ( ) d
n+u
Lu1
n
2
(u + n + 1) 2
(18)
(21)
m
m1
m
exp
(m)
QN/2
d
m
2 2
m
2
x
2m1
QN/2 x, dx
=
x
exp
(m)
2
0
=
2 2
x
QN/2 x, dx
x2m1 exp
2
n
(1) exp
n0
exp ( /4)
(19)
n+u
Lu1
n
2
(u + n + 1) 2
u1
1
exp
1
(u) 2
2
(22)
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
PdNak
,
x2m1 exp 2 x2 /2 1 exp x2 /4
=
Page 6 of 11
1 u1
exp /2 1
/2
dx
(u)
2 2
2 2
2
u1
2m1
x
/2
exp x /2 dx
exp /2
x
exp x /2 exp x /4 dx
(u)
0
0
first term
second term
=
(23)
u1
/2
x2m1 exp 2 x2 /2 exp x2 /4 dx
+
(u)
0
2m1
Third
term
x2m1 exp 2 x2 /2 dx
((M + 1)/2)
=
(M+1)/2 = 1
2
2 2
(24)
xM exp ((2 /2) + 1/4)x2 dx
Qu
m
u1
m
exp /2 /2
m ,
=
m
(u)
+ 1/4
xM exp ((2 /2) + 1/4)x2 dx
(26)
PdNak
n (u + n, /2)
exp ( /2)
= 1
2
n! (u + n)
(a/2)k /k! = exp(a/2) and after simple
and using
k=0
m
m
1
u1
m
=
/2
m
(u)
+
1/4
(28)
n0
(25)
u1
/2
(u)
*
)
1 u1
m exp /2 1
/2
=1
m
(u)
+ 1/4
(27)
It is clear from (27) how changing various parameters
affect the detection process. The new derived expression
mathematical manipulation as shown in (24-26), the probability of detection over Nakagami fading channels can be
approximated as:
( /2, u)
(29)
PdNak = 1
(u)
where = [2m/ (2m + )].
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
Page 7 of 11
1
0.9
0.8
0.7
Pd
0.6
0.5
0.4
0.3
0.2
0.1
0
20
15
10
5
(dB)
10
Figure 2 Probability of detection vs SNR for BPSK signal. With fs = 10fc , Pfa = 0.01, and different even numbers of degrees of freedom; the
simulation is compared to (10) in an AWGN channel.
1
0.9
0.8
0.7
Pd
0.6
0.5
0.4
0.3
0.2
0.1
0
20
15
10
5
(dB)
10
Figure 3 Probability of detection vs SNR for BPSK signal. With fs = 10fc , Pfa = 0.01, and different odd with N = 31, even with N = 32
number of degrees of freedom. In the odd case, the simulation is compared to the recursive formula (13,16) in AWGC, and in the even case, the
simulation is compared to (10) in AWGC and to ([14], Eq. 14).
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
In this subsection, we compare the new derived expressions with the previously reported expressions for high
and low values of and m = 1, 2, 3.
4.2.1 Low value of
Page 8 of 11
([16], Eq. 13), and ([17], Eq. 13). It can be seen that at
a very low false alarm probability, the results of the new
derived expressions in (27) and (29) and all expressions
in the previously mentioned references are a good match.
As the probability of false alarm increases, however, a discrepancy arises between ([16], Eq. 13) and ([17], Eq. 13)
when compared to the new expressions and/or the work
of [14,15]. Moreover, as previously shown in Figure 4, at
low , increasing m did not enhance the probability of
misdetection. This behavior can be seen from (27) and
(29) which also concurs with the work of ([14], Eq. 20)
and ([15], Eq. 12). However, the result of ([16], Eq. 13) has
some discrepancies when the false alarm probability or
the value of m increases. Moreover, the result of ([17], Eq.
13) is not consistent with increasing m. For example, the
result at the value of m = 3 is worse than the result at the
value of m = 1, 2 as can be seen in Figure 5. We note also
that the probability of misdetection approaches zero at the
point of (1 Pfa ) for the expressions reported by [16,17].
4.2.2 High value of
Figure 4 Comparison between the derived expressions, (27) and (29), and numerical integration of (18) for different values of and m.
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
Page 9 of 11
md
10
10
10
10
Pfa
10
Figure 5 Comparison of the new derived expressions. Comparison of the new derived expressions (27) and (29), with the work of ([14], Eq. 20),
([15], Eq. 12), ([16], Eq. 13), and ([17], Eq. 13) with = 2 dB, u = 5, and different values of m.
10
10
10
Pmd
10
10
10
10
12
10
10
fa
10
Figure 6 Simulation results for all expressions when evaluated at a high value of . Comparison of the new derived expressions, (27) and
(29), with the work of ([14], Eq. 20), ([15], Eq. 12), ([16], Eq. 13), and ([17], Eq. 13) with = 20 dB, u = 5, and m = 2, 3.
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
Page 10 of 11
x 10
14
ComputationTime (s)
12
Equation (27)
Eqaution (29)
Equation (13) of [16]
Equation (20) of [14]
Equation (12) of [15]
Equation (13) of [17]
10
2
0
10
Index
12
14
16
18
20
(n) . Using
have a computational complexity of O nM
this notation, the derived expressions of (27) and (29)
have
complexity
* of O(M(n)). Since
*
)
) a2 computational
5 Conclusions
Spectrum sensing using energy detectors under different fading channels was investigated. We derived tight
closed-form expressions for the probability of detection in
Nakagami channels. The closed-form expressions can easily be used for Rayleigh fading channels by setting m = 1.
The results of the closed-form formula as compared with
other expressions based on summation and integration
terms are very close. Furthermore, the derived expression
of (27) can be used for all ; however, there is a minor
limitation of using (29) specifically at high values of .
Moreover, the derived expressions have a lower computational complexity compared to other expressions with
only a very small loss of accuracy. In addition, we introduced an accurate recursive algorithm to compute the
Endnotes
a
In AWGN channels, there is no fading, i.e., h2 = 1.
b
Different modulation schemes could be used in the
simulation since the derived expression is independent of
the modulation used.
c
For comparison purposes, we have used a value of
n = 1 in the expression of [17], Eq. 13), where n
represents the number of nodes cooperating in the
sensing process according to [17] notations.
d
Equation (29) comes from another way of calculating
the probability of detection over Nakagami fading
channels in order to compare with results from the state
of the art, which seemed rather optimistic for low false
alarm probability, and that for high SNR cases, one of the
anonymous reviewers comment.
e
The conducted simulations show that the computed
time will only be scaled by a constant factor and that the
calculated computation time will not be affected if we do
or do not clear the processor cache of any background
application processes.
f
The number of terms used to calculate the
summation of [15], Eq. 12) was 20.
Competing interests
The authors declare that they have no competing interests.
Author details
1 Simon Fraser University, Burnaby, BC V5A 1S6, Canada. 2 Khalifa University,
Abu Dhabi 127788, UAE. 3 Centre for Communication Systems Research
(CCSR), University of Surrey, Surrey, GU2 7XH, Guildford, UK.
Altrad and Muhaidat EURASIP Journal on Wireless Communications and Networking 2013, 2013:159
http://jwcn.eurasipjournals.com/content/2013/1/159
Page 11 of 11