Skip to main content
Log in

Secondary Spectrum Access in Cognitive Radio Networks Using Rateless Codes over Rayleigh Fading Channels

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we propose secondary relaying schemes in cognitive spectrum leasing. In the proposed protocols, a primary transmitter uses rateless code to transmit its data to a primary receiver. In the secondary network, \(M\) secondary transmitters are ready to help the primary transmitter forward the data to a primary receiver so that they can find opportunities to transmit their data. For performance evaluation, we derive the average outage probability, the average number of encoded packets transmitted by the primary transmitter, the average number of remaining time slots for secondary network and the average capacity of the secondary network over Rayleigh fading channels. Various Monte-Carlo simulations are presented to verify the derivations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

    Article  Google Scholar 

  2. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  3. Qing, Z., & Sadler, B. M. (2007). A survey of dynamic spectrum access. IEEE Signal Processing Magazine, 24(3), 79–89.

    Article  Google Scholar 

  4. Khuong, H. V. (2013). Performance evaluation of underlay cognitive multi-hop networks over Nakagami-m fading channels. Wireless Personal Communications, 70(1), 227–238.

    Article  Google Scholar 

  5. Duy, T. T., & Kong, H. Y. (2013). Performance analysis of incremental amplify-and-forward relaying protocols with Nth best partial relay selection under Interference constraint. Wireless Personal Communications, 71(4), 2741–2757.

    Article  Google Scholar 

  6. Laneman, J. N., & Wornell, G. W. (2003). Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 49, 2415–2425.

    Article  MathSciNet  Google Scholar 

  7. Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50, 3062–3080.

    Article  MathSciNet  Google Scholar 

  8. Han, Y., & Ting, S. H. (2009). Cooperative decode-and-forward relaying for secondary spectrum access. IEEE Transactions on Wireless Communications, 8(10), 4945–4950.

    Article  Google Scholar 

  9. Chen, Z., & Zhang, X.-D. (2012). Cooperative spectrum sharing based on amplify and forward relaying in cognitive radio networks. Wireless Personal Communications, 67(3), 585–598.

    Article  Google Scholar 

  10. Mackay, D. J. C. (2005). Fountain codes. Proceedings of IEEE Communication, 152, 1062–1068.

    Article  Google Scholar 

  11. Liu, X., & Lim, T. J. (2009). Fountain codes over fading relay channels. IEEE Transactions on Wireless Communications, 8(6), 3278–3287.

    Article  Google Scholar 

  12. Molisch, A. F., Mehta, N. B., Yedidia, J. S., & Zhang, J. (2007). Performance of fountain codes in collaborative relay networks. IEEE Transactions on Wireless Communications, 6(11), 4108–4119.

    Article  Google Scholar 

  13. Nikjah, R., & Beaulieu, N. C. (2008). Achievable rates and fairness in rateless coded relaying schemes. IEEE Transactions on Wireless Communications, 7(11), 4439–4444.

    Article  Google Scholar 

  14. Qin, S., Feng, G., & Zhang, Y. (2010). Capacity bounds of cooperative communications with fountain codes. In Proceedings of IEEE WCNC, pp. 1–4.

  15. Chen, Y., Huang, H., Zhang, Z., Qiu, P., & Lau, V. (2008). Cooperative spectrum access for cognitive radio network employing rateless code. In Proceedings of IEEE ICC workshop, pp. 326–331.

  16. Wang, X., Chen, W., & Cao, Z. (2009). A rateless coding based multi-relay cooperative transmission scheme for cognitive radio networks. In Proceedings of IEEE GLOBECOM, pp.1–6.

  17. Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series, and products (6th ed.). New York: Academic Press.

    MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by 2014 Special Research Fund of Electrical Engineering at University of Ulsan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung Yun Kong.

Appendix

Appendix

Derivation of (12)

First, we set the random variable \(X\) as \(X=\sum _{j=1,j\ne i}^M {\gamma _{4ij}}\). Next, we use the moment generating function (MGF) to find the CDF of \(X\). In addition, the MGF of \(\gamma _{4ij}\) is \(\lambda _{4ij}/\left( {\lambda _{4ij}+s}\right) \). Hence, due to the independence of \(\gamma _{4ij}\), the MGF of \(X\) is given by

$$\begin{aligned} \hbox {MGF}_X \left( s \right) = \prod _{j=1,\,j\ne i}^M {\frac{\lambda _{ST_j,SR_i}}{\lambda _{ST_j,SR_i}+s}} \end{aligned}$$
(46)

Using partial fraction expansion and under the condition that the \(\gamma _{4ij}\) are different from each other, (46) can be decomposed into

$$\begin{aligned} \hbox {MGF}_X (s)=\sum _{j=1,\,j\ne i}^M {\frac{\alpha _j }{\lambda _{ST_j,SR_i}+s}} \end{aligned}$$
(47)

where \(\alpha _j =\lambda _{ST_j ,SR_i } \prod _{k=1,k\ne j}^M {\frac{\lambda _{ST_k ,SR_i } }{\lambda _{ST_k ,SR_i } -\lambda _{ST_j ,SR_i } }} \).

Applying the inverse Laplace transform for (47), we can get the PDF of \(X\) as follows:

$$\begin{aligned} f_X \left( x \right) =\sum _{j=1,j\ne i}^M {\alpha _j \exp \left( {-\lambda _{ST_j ,SR_i } x} \right) } \end{aligned}$$
(48)

Now, considering the random variable \(Y=1+X\), it is easy to obtain the PDF of \(Y\) as

$$\begin{aligned} f_Y \left( y \right) =\sum _{j=1,\,j\ne i}^M {\alpha _j \exp \left( {-\lambda _{ST_j ,SR_i } \left( {y-1} \right) } \right) } \end{aligned}$$
(49)

Since \(\gamma _{SR_i } =\gamma _{4i} /Y\), the CDF of \(\gamma _{SR_i} \) is given as

$$\begin{aligned} F_{\gamma _{SR_i}}(z)=\Pr \left[ {\gamma _{SR_i } <z} \right] =\Pr \left[ {\gamma _{4i} <Yz} \right] =\int _1^{+\infty } {f_Y (y)dy\int _0^{yz} {f_{\gamma _{4i} } \left( t \right) dt}} \end{aligned}$$
(50)

Substituting (49) into (50) and after some manipulation, we get

$$\begin{aligned} F_{\gamma _{SR_i } } \left( z \right) =1-\exp \left( {-\lambda _{ST_i ,SR_i } z} \right) \sum _{j=1,j\ne i}^M {\frac{\alpha _j }{\lambda _{ST_j ,SR_i } +\lambda _{ST_i ,SR_i } z}} \end{aligned}$$
(51)

Differentiating (51) with respect to \(z\), we obtain (12).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Duy, T.T., Kong, H.Y. Secondary Spectrum Access in Cognitive Radio Networks Using Rateless Codes over Rayleigh Fading Channels. Wireless Pers Commun 77, 963–978 (2014). https://doi.org/10.1007/s11277-013-1546-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1546-5

Keywords

Navigation