Professional Documents
Culture Documents
DOI 10.1007/s10776-011-0148-y
Received: 27 March 2009 / Accepted: 15 April 2011 / Published online: 15 May 2011
Springer Science+Business Media, LLC 2011
Abstract Recent studies and measurements have shown The output of the FLS provide the possibility of accessing
that, with the traditional spectrum access approach, the spectrum band for secondary users and the user with the
radio spectrum assigned to primary (licensed) users is greatest possibility will be assigned the available spectrum
vastly underutilized. While many spectrum methods have band.
been proposed to use spectrum effectively, the opportu-
nistic spectrum access has become the most viable Keywords Cognitive radio Fuzzy logic system
approach to achieve near-optimal spectrum utilization by Opportunistic spectrum access
allowing secondary (unlicensed) users to sense and access
available spectrum opportunistically. Opportunistic spec-
trum access approach is enabled by cognitive radios which 1 Introduction
are able to sense the unused spectrum and adapt their
operating characteristics to the real-time environment. Recent studies and measurements have shown that, with
However, a naive spectrum access for secondary users can the traditional spectrum access approach, the radio spec-
make spectrum utilization inefficient and increase inter- trum assigned to primary (licensed) users is vastly under-
ference to adjacent users. In this paper, we propose a novel utilized while the demand for access to the limited radio
approach using Fuzzy Logic System (FLS) to control the spectrum have been growing dramatically. This view is
spectrum access. Three descriptors are used: spectrum supported by actual measurements conducted by the FCC’s
utilization efficiency of the secondary user, its degree of Spectrum Policy Task Force which has determined that, in
mobility, and its distance to the primary user. The linguistic some locations or at some times of a day, about 70% of the
knowledge of spectrum access based on these three allocated spectrum may not be in use [1]. Measurements in
descriptors is obtained from a group of network experts. 27 [2] reveal that spectrum utilization is often heavy in unli-
fuzzy rules are set up based on this linguistic knowledge. censed bands while low in TV bands or medium in some
cellular bands. These observations on actual spectrum
usage have challenged approaches to the radio spectrum
management and fueled interests in the opportunistic
H.-S. T. Le spectrum access problem.
Department of Telecommunications Engineering, Posts and Opportunistic spectrum access has been enabled by
Telecommunications Institute of Technology, Hanoi, Vietnam cognitive radios (CRs). Unlike conventional radios, CRs
have the capability to sense their surroundings and actively
H. D. Ly (&)
Department of Electrical and Computer Engineering, adapt their operation mode to maximize the quality of
Texas A&M University, College Station, TX, USA service for secondary users while minimizing interference
e-mail: hungly@tamu.edu to primary users. Hence, CRs must carry out spectrum
sensing to identify white spaces or spectrum holes which
Q. Liang
Department of Electrical Engineering, The University of Texas are bands of frequencies assigned to primary users, but, at a
at Arlington, Arlington, TX, USA particular time and specific geographic location, these
123
172 Int J Wireless Inf Networks (2011) 18:171–178
bands are not being utilized by those users [3]. Some 2 Preliminaries
methods on spectrum sensing has been proposed in [4, 5],
and [14]. Once spectrum holes are identified, CRs 2.1 Cognitive Radios
opportunistically utilize these holes for communication
without causing interference to primary users. Assume Cognitive Radios have been seen as the key technology that
that a spectrum band is available for secondary users. If enables cognitive radio networks or xG networks to use
only one secondary user, in a particular location and at a spectrum efficiently by allowing secondary (cognitive) users
specific time, can sense this available spectrum, this to sense and utilize available spectrum opportunistically.
secondary user can use this band right after the primary Cognitive radios have two intrinsic characteristics [3]:
user finishes the communication session. What will hap-
• Cognitive capability: Cognitive capability implies the
pen, however, and which secondary user will be chosen to
ability of cognitive radios to sense information from
use the available band if multiple secondary users try to
their surroundings in order to figure out spectrum
access the spectrum? Of course, for the former question,
portions that are unused at a specific time or location.
since these secondary users have the same rights to access
The most suitable portion will be selected for commu-
the spectrum, they have to compete with each other in a
nication without causing interference to other users.
collaborative and fair manner. This paper will give more
• Reconfigurability: Reconfigurability enables cognitive
detail answer for these questions and propose a novel
radios to be dynamically reprogrammed according to the
approach using Fuzzy Logic System (FLS), an artificial
real environment. This means that cognitive radios can
intelligence system which is capable of making real time
change the operating frequency, modulation scheme,
decisions, to decide the suitable secondary user which
transmission power, communication protocol, etc. on the
will use the available band.
fly without any modification of hardware components.
In research literature on opportunistic spectrum access,
some work uses game theoretical analysis [6] to find Cognitive radios, in order to use spectrum opportunis-
strategies for spectrum sharing. In [7], spectrum allocation tically, experience four main procedures, i.e.,
using a graph coloring algorithm is proposed but mobility
1. Spectrum sensing: A cognitive radio monitors spec-
of the secondary users is not considered. Moreover,
trum bands and detects unused bands, i.e., spectrum
authors assumed that if two secondary users within dis-
holes which are time-varying and location-dependent.
tance of each other use the same spectrum band, they fail
Cognitive radio can use the spectrum sensing tech-
to access spectrum. With this approach, some secondary
niques such as transmitter detection, cooperative
users will lose the rights to compete for using spectrum
detection, and interference-based detection.
and monitoring secondary users conflicting in using
2. Spectrum access: Assume that multiple cognitive users
spectrum band is also a challenging issue. In our
trying to use the spectrum coexist in an area. This
approach, we use the rule-based FLS to assign the
procedure is used to prevent multiple users from
available spectrum to secondary users efficiently and
colliding in overlapping spectrum portions.
guarantee that the secondary user using assigned band
3. Communication: Once a cognitive radio is assigned a
will not interfere with the primary users. To achieve these
spectrum band for communication, it will inform its
objectives, we use three descriptors which are spectrum
receiver about the chosen band. After the receiver-
utilization efficiency of the secondary user, its degree of
transmitter handshake procedure is completed, the
mobility, and its distance to the primary user. The lin-
cognitive radio begins receiving and/or transmitting
guistic knowledge of spectrum access based on these
information.
three descriptors is obtained from a group of network
4. Spectrum mobility: A cognitive radio must move to
experts. 27 fuzzy rules are set up based on this linguistic
another spectrum hole to keep doing communication
knowledge. The output of the FLS provide the possibility
once it detects the signal from the primary user. Hence,
of each secondary user which will be assigned spectrum
spectrum mobility occurs when a cognitive radio
band and the user with the greatest possibility will be
change its operating band.
assigned the available spectrum band.
The rest of this paper is organized as follows. In Sect. 2, we There have been many open research problems to develop
briefly introduce the fuzzy logic system and cognitive radios. these procedures. In this paper, we use the fuzzy logic
Opportunistic spectrum access using the FLS which is based system, i.e., an optimization technique, to give solutions for
on experiences from a group of network experts is proposed the opportunistic spectrum access problem. The most
in Sect. 3. In Sect. 4, we discuss the simulation results. suitable secondary user having the rights to access the
Conclusions and future works are presented in Sect. 5. spectrum is chosen based on three descriptors, i.e., spectrum
123
Int J Wireless Inf Networks (2011) 18:171–178 173
123
174 Int J Wireless Inf Networks (2011) 18:171–178
1.5
P1 gðRÞ
cs ¼ 10log ð5Þ
r21
where P1 is the transmit power of the primary user and r21
is noise power measured at the secondary user. From (5), Low Moderate High
1
we can derive the distance R between the primary user and
the secondary user.
The linguistic variances used to represent the spectrum
utilization efficiency and degree of mobility are divided
into three levels: low, moderate, and high while we use 3 0.5
levels, i.e., near, moderate, and far to represent the dis-
tance. The consequence, i.e., the possibility that the sec-
ondary user is chosen to access the spectrum is divided into
five levels which are very low, low, medium, high and very
high. We use trapezoidal membership functions (MFs) to 0
0 10 20 30 40 50 60 70 80 90 100
represent near, low, far, high, very low and very high, and (a)
triangle MFs to represent moderate, low, medium and high. 1.5
MFs are shown in Fig. 2. Since we have 3 antecedents and
3 fuzzy subsets, we need set up 33 = 27 rules for this FLS.
Then, we design questions, which will be used in our
survey, according to rules as follows: Low, Near Moderate High, Far
123
Int J Wireless Inf Networks (2011) 18:171–178 175
Table 1 Questions for opportunistic spectrum access problem in Table 2 cavg Corresponding to each rule
cognitive radio networks
Rule # cavg
Rule # Antecedent 1 Antecedent 2 Antecedent 3 Consequence
1 17.222
1 Low Low Near Very low 2 23.611
2 Low Low Moderate Low 3 43.333
3 Low Low Far Low 4 23.611
4 Low Moderate Near Very low 5 30
5 Low Moderate Moderate Low 6 43.333
6 Low Moderate Far Medium 7 10.833
7 Low High Near Very low 8 23.611
8 Low High Moderate Low 9 36.667
9 Low High Far Medium 10 30.278
10 Moderate Low Near Very low 11 56.667
11 Moderate Low Moderate Medium 12 76.389
12 Moderate Low Far High 13 23.889
13 Moderate Moderate Near Very low 14 43.333
14 Moderate Moderate Moderate Medium 15 63.33
15 Moderate Moderate Far High 16 17.22
16 Moderate High Near Very low 17 30.278
17 Moderate High Moderate Low 18 56.667
18 Moderate High Far High 19 50
19 High Low Near Low 20 70
20 High Low Moderate High 21 89.167
21 High Low Far Very high 22 36.667
22 High Moderate Near Low 23 63.333
23 High Moderate Moderate High 24 82.778
24 High Moderate Far Very high 25 30.287
25 High High Near Very low 26 56.667
26 High High Moderate High 27 63.333
27 High High Far High
123
176 Int J Wireless Inf Networks (2011) 18:171–178
30
Spectrum usage efficiency (%) 88.7104 97.9340 24.2160 92.4424
25
20
15
10 100
10
8 100 90
6 80
4 60
x2 40 80
2 20 x1
0 0
70
(a)
60
50
90 40
80
30
70
y(x ,x2,9)
20
60
1
10
50
40 0
0 10 20 30 40 50 60 70 80 90
30
10
8
Fig. 4 An opportunistic spectrum access scenario in a specific space
100
6 80 and a particular time: SU1, SU2, SU3, and SU4 are denoted using
60
x2 4
40 H; 5; ; and }; respectively. The primary user is denoted using h
2 x1
20
0 0
(b)
Fig. 3 The opportunistic spectrum access decision surface for the Guard Symbols Unique Word Payload Guard Symbols
cognitive user with a fixed distance to the primary user: a when the (3 symbols) (40 symbols) (500 symbols) (3 symbols)
distance to the primary user x3 = 1, b when the distance to the
primary user x3 = 9 Fig. 5 Burst structure
123
Int J Wireless Inf Networks (2011) 18:171–178 177
123
178 Int J Wireless Inf Networks (2011) 18:171–178
11. Marimin, et al., Linguistic labels for expressing fuzzy preference Qilian Liang is a Professor at
relations in fuzzy group decisio making, IEEE Trans. on Systems, the Department of Electrical
Man, and Cybernetics—Part B: Cybernetics, Vol. 28, No. 2, Engineering, University of
pp. 205–218, 1998. Texas at Arlington. He received
12. Q. Liang, Clusterhead election in mobile ad hoc networks, IEEE the B.S. degree from Wuhan
Proc.on Personal, Indoor and Mobile Radio Communications, University in 1993, M.S. degree
Vol. 2, pp. 1623–1628, 2003. from Beijing University of Posts
13. A.J. Viterbi and A.M. Virterbi, Nonlinear estimation of PSK- and Telecommunications in
modulated carrier phase with application to burst digital trans- 1996, and Ph.D degree from
mission, IEEE Trans. on Information Theory, Vol. 29, No. 4, University of Southern Califor-
pp. 543–551, 1983. nia (USC) in May 2000, all in
14. Ian F. Akyildiz, et al., NeXt generation/dynamic spectrum Electrical Engineering. Prior to
access/cognitive radio wireless networks: A survey, Computer joining the faculty of the Uni-
Networks Journal (Elsevier), Vol. 50, pp. 2127–2159, 2006. versity of Texas at Arlington in
August 2002, he was a Member
of Technical Staff in Hughes Network Systems Inc at San Diego,
California. His research interests include compressive sensing, radar
Author Biographies sensor networks, wireless sensor networks, wireless communications,
communication system and communication theory, signal processing
Hong-Sam T. Le received her for communications, fuzzy logic systems and applications, etc.
B.S. degree in Electronics and Dr. Liang has published more than 170 journal and conference papers,
Telecommunications Engineer- 7 book chapters, and has 6 U.S. patents pending. He received 2002
ing from Posts and Telecommu- IEEE Transactions on Fuzzy Systems Outstanding Paper Award, 2003
nications Institute of Technology, U.S. Office of Naval Research (ONR) Young Investigator Award,
Hanoi, Vietnam in 2003 and her 2005 UTA College of Engineering Outstanding Young Faculty
M.S. degree in Electrical Engi- Award, and 2007, 2009, 2010 U.S. Air Force Summer Faculty
neering from the University of Fellowship Program Award.
Texas at Arlington in 2007. Her
research interests are in the
areas of wireless communica-
tion and signal processing.
123