Skip to main content Accessibility help
×
Home
  • Print publication year: 2017
  • Online publication date: May 2017

8 - Joint Power and Admission Control in Cognitive Radio Networks

from Part III - Physical Layer Resource Allocation in Wireless Networks

Summary

Introduction

Due to increasing demand for wireless access services, efficient utilization of the limited frequency spectrum has become crucial. Exclusive licensing of spectrum bands to specific users or services is very inefficient from the viewpoint of spectrum utilization, and it lacks the agility needed to support new applications. Cognitive radio networks (CRNs) have thus emerged as an adaptive cohabitation paradigm for wireless communication. The primary radio networks (PRNs) can dynamically share the spectrum with the secondary users (SUs) so that the SUs achieve their minimum acceptable quality-of- service (QoS), and at the same time, all the primary users (PUs) are protected in the sense that the SUs do not violate the QoS requirements of the PUs.

The key concept in cognitive radio networks is opportunistic or dynamic spectrum access, which allows SUs to opportunistically access the band licensed to the PUs. There are two approaches for opportunistic spectrum access: spectrum overlay and spectrum underlay. In the overlay spectrum access strategy, the channels that are unused by the PUs are detected by the CRN through spectrum-sensing mechanisms and are assigned to the SUs. With overlay spectrum access, a channel-sharing method such as orthogonal frequency division multiple access (OFDMA) or time division multiple access (TDMA) is employed where spectrum holes (e.g., unused frequency or time slots) are detected and accessed in an opportunistic manner by SUs. In the underlay scenario, the available frequency spectrum is shared by all of the PUs and SUs, and since the admission of any of the SUs causes interference to all of the PUs’ receiving points, the interference caused by the SUs must be controlled through power control strategies in a way that all PUs are protected (i.e., all PUs achieve their target signal-to-interference-plus-noise ratio [SINR]). With underlay spectrum users employ channel sharing methods such as code-division multiple access (CDMA) or OFDMA in a way that the interference imposed by the SUs remains below a specified threshold and the QoS requirements of all of the PUs are supported. Therefore, with underlay spectrum access, which we focus on in this chapter, the overall spectrum can be utilized more effectively at the expense of higher complexity in controlling the QoS of SUs and the aggregate interference caused to the primary receivers.

[1] G. J., Foschini and Z., Milijanic “A simple distributed Autonomous power control algorithm and its convergence,” IEEE Transactions on Vehicular Technology, vol. 42, Nov. 1993, pp. 641–646.
[2] L., Le and E., Hossain “Resource allocation for spectrum underlay in cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. (12), Dec. 2008, pp. 5306–5315.
[3] H., Gu,N. C., Yang and B., Fong “Low-complexity centralized joint power and admission control in cognitive radio networks,” IEEE Communication Letters, vol. 13, no. (6), June 2009, pp. 420–422.
[4] M., Monemi,M., Rasti and E., Hossain, “On joint power and admission control in underlay cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 14, no. (1), 2015, pp. 265–278.
[5] M., Monemi,M., Rasti and E., Hossain “Characterizing feasible interference region for underlay cognitive radio networks,” in Proc. of IEEE International Conference on Communications (ICC), June 2015, pp. 7603–7608.
[6] M., Monemi,M., Rasti, and E., Hossain “On characterization of feasible interference regions in cognitive radio networks,” IEEE Transactions on Communications, vol. 64, no. (2), Jan. 2016, pp. 511–524.
[7] M., Rasti,M., Hasan, L. B., Le and E., Hossain “Distributed uplink power control for multicell cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 63, no. (3), 2015, pp. 628–642.
[8] I., Mitliagkas,N. D., Sidiropoulos and A., Swami “Joint power and admission control for ad-hoc and cognitive underlay networks: Convex approximation and distributed implementation,” IEEE Transactions onWireless Communications, vol. 10, no. (12), Dec. 2011, pp. 4110– 4121.
[9] M. H., Islam,Y. C., Liang and A. T., Hoang “Distributed power and admission control for cognitive radio networks using antenna arrays,” in Proc. of IEEE DySPAN'07, Apr. 2007, pp. 250–253.
[10]Y., Xing,C. N., Mathur,M. A., Haleem, R., Chandramouli and K. P., Subbalakshmi “Dynamic spectrum access with QoS and interference temperature constraints,” IEEE Transactions on Mobile Computing, vol. 6, no. (4), pp. 423–433, Apr. 2007.
[11] L., Qian,X., Li, J., Attia and Z., Gajic “Power control for cognitive radio ad hoc networks,” in Proc. IEEE LANMAN'07, June 2007.
[12] L. B., Le and E., Hossain “Resource allocation for spectrum underlay in cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. (12), Dec. 2008, pp. 423– 433.
[13] M., Monemi,M., Rasti and E., Hossain “On joint power and admission control in underlay cellular cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. PP, no. (99), Sept. 2014, p. 1.
[14] A. A., El-Sherif and A., Mohamed “Decentralized throughput maximization in cognitive radio wireless mesh networks,” IEEE Transactions on Mobile Computing, vol. 13, no. (9), Sept. 2014, pp. 1967–1980.
[15] J., Wang and C., Lu “Throughput-based rate and power control for cognitive radio networks with receive diversity and error control,” IET Communications, vol. 6, no. (17), Sept. 2012, pp. 2848–2854.
[16] J., Tadrous, A., Sultan and M., Nafie “Admission and power control for spectrum sharing cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 10, no. (6), June 2011, pp. 1945–1955.
[17] T. M., Phuong and D.-S., Kim “Efficient power control scheme for cognitive industrial sensor networks,” International Journal of Control and Automation, vol. 7, no. (3), 2014, pp. 177– 188.
[18] C. G., Yang, J. D., Li and Z., Tian “Optimal power control for cognitive radio networks under coupled interference constraints: A cooperative game-theoretic perspective,” IEEE Transactions on Vehicular Technology, vol. 59, no. (4), May 2010, pp. 1696–1706.
[19] T., Nadkar, V., Thumar, G., Tej, S., Merchant, and U., Desai, “Distributed power allocation for secondary users in a cognitive radio scenario,” IEEE Transactions on Wireless Technology, vol. 11, no. (4), Apr. 2012, pp. 1576–1586.
[20] S. U., Pillai, T., Suel, and S., Cha, “The Perron-Frobenius theorem [some of its applications],” IEEE Signal Processing Magazine, Mar. 2005, pp. 62–75.
[21] S. A., Grandhi and J., Zander “Constrained power control,” Wireless Personal Communications, vol. 1, no. (4), 1994, pp. 257–270.
[22] M., Chiang, C.W., Tan, D. P., Palomar, D. O, Neill and D., Julian “Power control by geometric programming,” IEEE Transactions on Wireless Communications, vol. 7, no. (6), Jul. 2007, pp. 2640–2651.
[23] B. R., Marks and G. P., Wright “A general inner approximation algorithm for nonconvex mathematical programs,” Operations Research, vol. 26, no. (4), Jul. 1978, pp. 681–683.