Skip to main content
Log in

On cognitive processes in cognitive radio networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this article we model the cognitive processes and evaluate their impact on the performance of cognitive radio networks (CRN). Operation of the cognitive radio nodes, can be characterized by two types of processes: communication processes such as packets transmission, and cognitive processes such as estimation of the network state and decision-making for dynamic resource allocation. We propose a continuous time Markov chain model of CRN that couples these processes into unified queueing framework and analyze it by means of the matrix-geometric approach. From the obtained results, we derive the performance measures of CRN such as average delay and throughput, and establish their dependencies on the underlying cognitive processes. Additionally, we design an efficient policy for accessing the vacant channels and managing the transmission-sensing trade-off, which arises when transmissions and sensing are mutually exclusive. The policy search is carried out by the stochastic optimization method of cross-entropy. The optimized policy leads to significantly enhanced performance of CRN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Zhao, Y., Mao, S., Neel, J., & Reed, J. (2009). Performance evaluation of cognitive radios: Metrics, utility functions and methodologies. Proceedings of the IEEE, 97(4), 642–659.

    Article  Google Scholar 

  2. Mitola, J., et al. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

    Article  Google Scholar 

  3. Mitola, J. (2000). Cognitive radio—an integrated agent architecture for software defined radio, Ph.D. dissertation, Royal Institute of Technology, Kista, Sweden, May 8 2000.

  4. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23, 201–220.

    Article  Google Scholar 

  5. Federal Communications Commission (2003). ET Docket No 03-222 Notice of proposed rule making and order, December 2003.

  6. Federal Communications Commission (2002). Spectrum Policy Task Force Report. ET Docket No. 02-135, November 2002.

  7. FCC (2003). Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, notice of proposed rule making and order, Docket No. 03-108, Dec 30, 2003.

  8. Mitola, I. J. (1993). Software radios: Survey, critical evaluation and future directions. IEEE Aerospace and Electronic Systems Magazine, 8, 25–36.

    Article  Google Scholar 

  9. Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50, 2127–2159.

    Article  MATH  Google Scholar 

  10. Hoang, A. T., Liang, Y. C. (2007). Adaptive scheduling of spectrum sensing periods in cognitive radio networks, In Proceedings of IEEE GlobeCommunications, Washington.

  11. Liang, Y. -C., Zeng, Y., Peh, E., Hoang, A. T. (2006). Sensing-throughput tradeoff for cognitive radio networks, In Proceedings IEEE International Conference Communications (ICC), June 2006, pp. 5330–5335.

  12. Pei, Y., Hoang, A. T., Liang, Y. -C. (2007). Sensing-throughput tradeoff in cognitive radio networks: How frequently should spectrum sensing be carried out? In Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07), Athens, Greece, September 2007.

  13. Ghasemi, A., Sousa, E. S. (2007). Optimization of spectrum sensing for opportunistic spectrum access in cognitive radio networks, In Proceedings of 4th IEEE Consumer Communications. Networking Conference (CCNC), Jan. 2007, pp. 1022–1026.

  14. Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework. IEEE Journal on Selected Areas in Communications, 25(3), 589–600.

    Article  Google Scholar 

  15. Cormio, C., & Chowdhury, K. R. (2009). A survey on MAC protocols for cognitive radio networks. Ad Hoc Networks, 7(7), 1315–1329.

    Article  Google Scholar 

  16. Maldonado, D., Le, B., Hugine, A., Rondeau, T. W., & Bostian, C. W. (2005). Cognitive radio applications to dynamic spectrum allocation: A discussion and an illustrative example. Nov: DySPAN.

    Google Scholar 

  17. Shu, T., Krunz, M. (2009). Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors. In Proceedings of the 15th Annual international Conference on Mobile Computing and Networking (Beijing, China, September 20–25, 2009). MobiCom ‘09. ACM, New York, NY, pp 37–48.

  18. Rashid, M. M., Hossain, M. J., Hossain, E., & Bhargava, V. K. (2009). Opportunistic spectrum scheduling for multiuser cognitive radio: A queueing analysis. Transaction Wireless Communication, 8(10), 5259–5269.

    Article  Google Scholar 

  19. Oklander, B., & Sidi, M. (2010). Modeling and analysis of system dynamics and state estimation in cognitive radio networks, PIMRC’10 (CogCloud Workshop). Turkey: Istanbul.

    Google Scholar 

  20. Weiss, T. A., & Jondral, F. K. (2004). Spectrum pooling: An innovative strategy for the enhancement of spectrum efficiency. IEEE Communications Magazine, 42(3), 8–14.

    Article  Google Scholar 

  21. Yucek, D. T., Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys & Tutorials, 11(1). First Quarter 2009.

  22. Zeng, Y., Liang, Y., Hoang, A. T., Zhang, R. (2010). A review on spectrum sensing for cognitive radio: Challenges and solutions. EURASIP Journal on Advances in Signal Processing Volume 2010.

  23. Nelson, R. (1991). Matrix geometric solutions in markov models: A mathematical tutorial, IBM Research Report RC 16777, 1991.

  24. Horn, R. A., Johnson, C. R. (1987). Matrix analysis, Cambridge, 1987.

  25. Rubinstein, R. Y., & Kroese, D. P. (2004). The cross entropy method. A unified approach to combinatorial optimization, Monte-Carlo simulation, and machine learning. In M. Jordan, J. Kleinberg, B. Scholkopf, F. Kelly, & I. Witten (Eds.), Information science and statistics. Heidelberg: Springer.

    Google Scholar 

  26. Mannor, S., Rubinstein, R. Y., Gat, Y. (2003). The cross-entropy method for fast policy search, In Proceedings 20th International Conference on Machine Learning (ICML-03), Washington, US, 21–24 August 2003.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Boris Oklander.

Appendices

Appendix 1: Analysis of the 3-D CTMC

We present here the analysis of the 3-D CTMC in Fig. 4.

1.1 CTMC structure

In order to make the analysis of the system easier we numerate the states of Z t lexicographically, i.e. (0, 0), (0, 1), …, (0, M), (1, 0), (1, 1), …, (M, M) and index them 1 to (M + 1)2. This new order of states turns our CTMC to two dimensional since now Z t  ∈ {1, 2, …, (M + 1)2}. Then again we order the states lexicographically, i.e. (0, 1), (0, 2), …, (0, M + 1), (1, 1), (1, 2), … and construct the generator matrix Q of this CTMC which is given by:

where B 00 = {B 00(i, j)}, B 01 = {B 01(i, j)}, B 10 = {B 10(i, j)}, B 11 = {B 11(i, j)}, A 0 = {A 0(i, j)}, A 1 = {A 1(i, j)} and A 2 = {A 2(i, j)} are (M + 1)2 × (M + 1)2 matrices. A 0 entry in Q (and in other matrices) is a matrix of all zeros of the appropriate dimension. It can be seen that in our model B 01 = A 0 = diag{λ, λ, , λ}. For each value z i,j  = (i, j) the process Z t can take, the service rate is μ i,j  = μ min{i, j}. We order the elements μ i,j in the same way as we did for Z t and obtain a vector of service rates μ. It can be seen that B 10 = A 2 = diag{μ}, while the matrices B 00 and B 11 = A 1 are more complicated:

$$ B_{00} \left( {i,j} \right) = \left\{ {\begin{array}{*{20}c} { - \left( {\lambda + \left( {M - \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor } \right)\alpha + \left\lceil {i/\left( {M + 1} \right)} \right\rceil \beta } \right)} \hfill & {\quad j = i} \hfill \\ {(M - \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor )\alpha } \hfill & {\quad j = i + M} \hfill \\ {\left\lceil {i/\left( {M + 1} \right)} \right\rceil \beta } \hfill & {\quad j = i - M} \hfill \\ \delta \hfill & {\quad j = \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor \left( {M + 2} \right) \cap i \ne j} \hfill \\ 0 \hfill & {\quad {\text{else}}} \hfill \\ \end{array} } \right. $$

and

$$ A_{1} (i,j) = \left\{ {\begin{array}{*{20}c} { - \left( {\lambda + i\mu + \left( {M - \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor } \right)\alpha + \left\lceil {i/\left( {M + 1} \right)} \right\rceil \beta } \right)} \hfill & {\quad j = i} \hfill \\ {\left( {M - \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor } \right)\alpha } \hfill & {\quad j = i + M} \hfill \\ {\left\lceil {i/\left( {M + 1} \right)} \right\rceil \beta } \hfill & {\quad j = i - M} \hfill \\ \delta \hfill & {\quad j = \left\lfloor {i/\left( {M + 1} \right)} \right\rfloor \left( {M + 2} \right) \cap i \ne j} \hfill \\ 0 \hfill & {\quad {\text{else}}} \hfill \\ \end{array} } \right. $$

1.2 Stationary probabilities

We define the stationary probabilities π i,j of the process to be at level i and state j within that level. Calculating the stationary probabilities will allow evaluating interesting quantities, mainly the average delay of SU. The calculations here follow [23] and are adopted for our model.

Let π i  ≡ (π i,1, π i,2, …, π i,M² ) and π ≡ (π 0, π 1, π 2, …). The stationary distribution is the unique set of π i  ≥ 0, i ≥ 0, that solves

$$ \left\{ {\begin{array}{*{20}c} {\pi Q = \underset{\raise0.3em\hbox{$\smash{\scriptscriptstyle-}$}}{0} } \\ {\pi \underset{\raise0.3em\hbox{$\smash{\scriptscriptstyle-}$}}{e} \,\, = \,\,1} \\ \end{array} } \right. $$
(10)

where e (0) denotes an appropriately dimensioned column (row) vector of 1’s (0’s). From the first equation in (10) we may write down for the repeating portion of the process (j ≥ 1):

$$ \pi_{j - 1} A_{0} + \pi_{j} A_{1} + \pi_{j + 1} A_{2} = \underset{\raise0.3em\hbox{$\smash{\scriptscriptstyle-}$}}{0} \quad (j \ge 1) $$
(11)

For this type of CTMC characterized by a boundary conditions in the first column of Q followed by a repetitive portion of columns containing matrices A 0, A 1 and A 2, there exist some constant matrix R such that

$$ \pi_{j} = \pi_{j - 1} R,\quad \quad (j \ge 1) $$
(12)

and that the values of π j , j ≥ 1, have a matrix geometric form:

$$ \pi_{j} = \pi_{0} R^{j} ,\quad (j \ge 1) $$
(13)

substituting (13) into (11) yields

$$ A_{0} + RA_{1} + R^{2} A_{2} = 0 $$
(14)

This quadratic equation in R is typically solved numerically. There is more than one R that solves (14). When the CTMC is ergodic, there is an unique stationary distribution π that satisfies (10). Analogous to the scalar case where the utilization factor should be less than unity, in our case all eigenvalues of R must be less then unity for the normalization constraint in (10) to hold [24].

After solving for R, in order to determine the stationary probabilities, we continue with the boundary conditions:

$$ \pi_{0} B_{00} + \pi_{1} A_{2} = \pi_{0} (B_{00} + RA_{2} ) = 0 $$
(15)

Equation (15) alone is not enough to solve for π 0 since it is not of full rank and we must use the normalization constraint in (10):

$$ \pi e\,\, = \,\,\left( {\sum\limits_{j = 0}^{\infty } {\pi_{j} } } \right)e = \pi_{0} (I - R)^{ - 1} e = 1 $$
(16)

Combining (15) and (16) we have

$$ \pi_{0} \left[ {\left( {I - R} \right)^{ - 1} \underset{\raise0.3em\hbox{$\smash{\scriptscriptstyle-}$}}{e} ,\,\left( {B_{00} + RA_{2} } \right)^{*} } \right] = \left[ {1,\underset{\raise0.3em\hbox{$\smash{\scriptscriptstyle-}$}}{0} } \right] $$
(17)

where \( \left( {B_{00} + RA_{2} } \right)^{*} \) is the result from removal of the first column from the matrix (B 00 + RA 2), and [1,0] is a row vector consisting of a 1 followed by (M + 1)² − 1 zeros. Equation (17) is solved by appropriate numerical methods.

Appendix 2: Cross-entropy algorithm for CRN policy optimization

In this appendix we present the CE algorithm for CRN policy optimization.

Input:

  • function W(P; Ω)

  • system parameters Ω = {α, β, M, λ, μ}

  • probability density families {p C (·; σ C )} and {p θ (·; σ θ )},

  • initial parameters σ C,0 and σ θ,0

  • parameters N, J, T, d, ε

  • t ← 0

Repeat

  • 1: Generate samples C (j) (j = 1, 2, …, J) from p C (·; σ C,t-1)

  • 2: Generate samples θ (j) (k = 1, 2, …, J) from p θ (·; σ θ,t-1)

  • 3: Compose policy samples P (j) = (C (j),θ (j)) (j = 1, 2, …, J)

  • 4: Calculate W (j) = W(P (j); Ω) for each sample (j = 1, 2, …, J)

  • 5: Keep N (N < J) best samples graded by their W (j) value and discard the other samples

  • 6: V t  = min j (W (j)) (minimize over the saved N best samples)

  • 7: Using the N best samples update the parameters

    • 7.1: \( \sigma_{C,t} \leftarrow \arg \mathop {\hbox{max} }\limits_{{\sigma_{C} }} \sum\limits_{n = 1}^{N} {\ln \left( {p_{{\sigma_{C} }} \left( {C^{(n)} ;\sigma_{C} } \right)} \right)} \)

    • 7.2: \( \sigma_{\theta ,t} \leftarrow \arg \mathop {\hbox{max} }\limits_{{\sigma_{\theta } }} \sum\limits_{n = 1}^{N} {\ln \left( {p_{{\sigma_{\theta } }} \left( {\theta^{(n)} ;\sigma_{\theta } } \right)} \right)} \)

  • 8: t ← t + 1

Until (t > T or |V t  − V t-τ |<ε, τ = 1, 2, …, d)

Output:

P * = (C *, θ *)—best sample, W * = W(P *; Ω)—best value

Rights and permissions

Reprints and permissions

About this article

Cite this article

Oklander, B., Sidi, M. On cognitive processes in cognitive radio networks. Wireless Netw 20, 319–330 (2014). https://doi.org/10.1007/s11276-013-0555-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0555-3

Keywords