You are on page 1of 10

4864 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO.

12, DECEMBER 2013

On the Performance of
Cognitive Underlay Multihop Networks with
Imperfect Channel State Information
Vo Nguyen Quoc Bao, Member, IEEE, Trung Q. Duong, Senior Member, IEEE,
and Chintha Tellambura, Fellow, IEEE

Abstract—This paper proposes and analyzes cognitive multi- of secondary transmit powers necessary. Since the allowable
hop decode-and-forward networks in the presence of interference interference level on primary receivers (PU-Rxs) is small,
due to channel estimation errors. To reduce interference on the secondary network coverage is limited. In order to extend it,
primary network, a simple yet effective back-off control power
method is applied for secondary multihop networks. For a given an efficient secondary transmission mechanism is required.
threshold of interference probability at the primary network, Such a mechanism is multihop relay technology, (see, e.g.,
we derive the maximum back-off control power coefficient, [3]–[10]). In [3] and [4], the outage probability (OP) of
which provides the best performance for secondary multihop a multi-hop decode-and-forward (DF) relaying system over
networks. Moreover, it is shown that the number of hops for
secondary network is upper-bounded under the fixed settings of
Rayleigh and Nakagami-m fading channels under the inter-
the primary network. For secondary multihop networks, new ference temperature constraint was respectively presented to
exact and asymptotic expressions for outage probability (OP), capture the impact of fading parameters at the interfering
bit error rate (BER) and ergodic capacity over Rayleigh fading links as well as the interference temperature constraint on
channels are derived. Based on the asymptotic OP and BEP, OP. Thanks to low complexity and easy deployment, amplify-
a pivotal conclusion is reached that the secondary multihop
network offers the same diversity order as compared with the
and-forward relaying could be a promising candidate with
network without back off. Finally, we verify the performance its outage performance exceeding that of the conventional
analysis through various numerical examples which confirm the cognitive radio direct transmission [5]. Over Nakagami-m
correctness of our analysis for many channel and system settings channels, it was shown in [6] that for the same system
and provide new insight into the design and optimization of model as in [5], the diversity order is strictly defined by
cognitive multihop networks.
the minimum fading severity between the two hops of the
Index Terms—Decode-and-forward, dual-hop cognitive relay secondary network; and the secondary network achieves the
network, spectrum sharing, multihop, imperfect channel state full diversity order regardless of the transmit power constraint.
information, Rayleigh fading, outage probability, bit error rate,
ergodic capacity. For two different types of interference power constraints at the
PU-Rx including fixed and proportional interference power
constraints, the authors in [7] studied cooperative diversity
I. I NTRODUCTION
gain of secondary networks with multiple relays. It is found

T O alleviate the wireless spectrum scarcity problem cog-


nitive radio has been proposed where an unlicensed user
(also known as a cognitive user) is allowed to opportunistically
that the diversity order of the secondary relay network is lost
under a fixed interference power constraint and increasing
transmit power does not improve the outage performance. In
utilize the white space of a licensed spectrum band (called [9], the optimization problem of secondary relay positions is
a spectrum hole) for data transmissions [1]. Among existing considered.
cognitive protocols, the underlay approach is of particular To the best of our knowledge, most existing works con-
interest to both the academia and industry due to its advantage sider perfect channel state information of interference links
in providing concurrent cognitive and non-cognitive commu- between the secondary transmitters and the PU-Rx. However,
nication [2]. secondary networks may not acquire perfect channel state
In designing spectrum sharing underlay systems, one of the information (CSI) due to, for example, channel estimation
major challenges is to fulfill the two conflicting objectives: i) errors and/or the slack cooperation between SUs and the PU.
protecting the primary (licensed) user (PU) from interference Recently, the performance of cognitive radio networks under
and ii) satisfying the quality of service (QoS) requirement of imperfect CSI has been considered for single-hop and dual-
secondary (non-licensed) users (SUs). Between these objec- hop in [11] and [12], respectively.
tives, the former is of higher priority, making strict regulation Motivated by these considerations, we investigate the per-
Manuscript received March 1, 2013; revised August 21, 2013. The editor formance of cognitive multihop networks with imperfect
coordinating the review of this paper and approving it for publication was C. knowledge of interference channels. In particular, we consider
Ling.
V. N. Q. Bao is with the Posts and Telecommunications Institute of
the effect of imperfect CSI on the PU-Rx under primary
Technology, Vietnam (e-mail: baovnq@ptithcm.edu.vn). interference probability constraints. Our main contributions
T. Q. Duong is with the School of Electronics, Electrical Engineering are as follows:
and Computer Science, The Queens University of Belfast, Belfast BT3
9DT, UK. He was with Blekinge Institute of Technology, Sweden (e-mail: 1) We analyze the interference probability for primary
tduong@ieee.org). networks over similar and dissimilar Rayleigh channels.
C. Tellambura is with the University of Alberta, Edmonton AB, Canada
T6G 2V4 (e-mail: chintha@ece.ualberta.ca). The interference probability is shown to increase with
Digital Object Identifier 10.1109/TCOMM.2013.110413.130167 the number of secondary hops.
0090-6778/13$31.00 
c 2013 IEEE

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4865

if the channel fk is perfectly known at the transmitter of


PU- PU-
hop k. In practice, perfect knowledge of fk is not available
Tx Rx because of various uncertainties such as errors in the feedback
transmission and/or the outdated feedback due to the time-
varying wireless channels. This uncertain relation between fk
and its estimate f˜k can be modeled as [13]

T0 T1 TK TK 1 f˜k = ρfk + 1 − ρ2 μk , (2)

where μk is a circular symmetric complex Gaussian random


variable with mean zero and variance λI,k . Here, the terms
Fig. 1. Secondary underlay multihop transmission. μk with k = 1, . . . , K are mutually independent. In addition,
ρ denotes the channel correlation factor modeling the channel
2) We characterize the effect of imperfect CSI on the estimation quality, which is expressed by the pilot symbol
performance of secondary networks, which is given by assisted modulation (PSAM) parameters such as the rate of
the number of maximum hops and the maximum back- pilot symbol insertion and average SNR [14]. The correlation
off control powers for a given interference probability. coefficient ρ is assumed to be the same between all the
3) We show that the primary interference probability interference channel pairs. Under Rayleigh fading, the joint
achieves its minimum if and only if the back-off control probability density function (PDF) of |fk |2 and |f˜k |2 are given
powers are set the same. by [13]
4) We develop closed-form expressions for secondary OP,
− x+y
2  √ 
bit error rate (BER), and ergodic capacity and their e (1−ρ )λI,k 2ρ xy
asymptotic bounds at high and low signal-to-noise ratios f|f |2 ,|f˜ |2 (x, y) = I0 , (3)
k k
(1 − ρ2 )λI,k 2 (1 − ρ2 )λI,k
(SNRs). Moreover, we also compute the secondary

performance loss as compared to that of the perfect CSI. where I0 (x) = π1 0 ex cos θdθ denotes the zeroth-order
The remainder of this paper is organized as follows. In modified Bessel function of the first kind [15]. As a result,
Section II, the system and channel model are introduced. In the transmit power at hop k, Pk , is now
Section III, the unified framework to derive the performance Ip
measures of the primary and secondary network including Pk =  2 (4)
˜
interference probability, OP, BER and ergodic capacity is de- fk 
veloped in detail. In Section IV, numerical results are provided
to illustrate the characteristics of the primary and secondary resulting in the instantaneous SNR at hop k as
network. Finally, the paper is concluded in Section V. 2
Ip |hk |
γk =   . (5)
N0  ˜ 2
II. S YSTEM M ODEL fk 

We consider a cognitive multihop network over the same Eq. (4) shows that improper regulation of the transmit powers
spectrum of a primary network with an underlay peak interfer- due to imperfect channel estimation can cause an interference
ence power constraint. As illustrated in Fig. 1, the communica- that is higher than the maximum tolerable interference level.
tion between the source (T0 ) and the destination (TK+1 ) takes In Fig. 1, primary communication is protected if all PU
place in K orthogonal timeslots via serial immediate relays received interference powers in the K hops are lower than Ip .
T1 , . . . , TK . In the k-th timeslot, the received signal at relay k Otherwise, the primary communication fails. To analyze this
is fully decoded and then re-encoded before being forwarded phenomenon, we use primary interference probability concept,
to the next node (or the destination) in the subsequent timeslot. which is defined as the probability that the interference power
All secondary and primary nodes are equipped with a single- received at the PU-Rx is higher than Ip . Note that since the
antenna. interference probability is computed after the arrival of the
We denote hk and fk , respectively, as the channel co- source data at the destination, its evaluation reflects the effect
efficients of the data link and interference link of hop k. of the entire secondary system on the primary system. In the
Throughout this paper, independent Rayleigh frequency-flat next section, we will derive the interference probability due to
fading links are assumed. As a result, the channel gains, an arbitrary number of secondary hops over Rayleigh fading
i.e., |hk |2 and |fk |2 , follow the exponential distribution with channels.
parameters λD,k and λI,k , respectively.
To protect the PU network communication as well as to III. P ERFORMANCE A NALYSIS
enhance the secondary network performance, all SUs should
transmit with maximal allowable power Pk as long as the PU In this section, we investigate the performance of the
received interference power is below the maximum tolerable primary and the secondary multihop networks. For the primary
interference level, Ip . Therefore, the transmit power of node network, the interference probability is derived over Rayleigh
k is considered as fading channels. For the secondary network, the performance
metrics including OP, BER and ergodic capacity are derived.
Ip
Pk = 2, k = 0, 1, . . . , K (1) The secondary network behaviors at high and low SNRs are
|fk | also provided.

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4866 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013

A. Interference Probability of the Primary System 1) Identical back-off coefficients: In this case, the back-off
Utilizing the theorem of total probability, the interference coefficient of all links is identical, i.e., ε1 = · · · = εK = ε, and
probability of the primary system can be evaluated as the interference probability of the primary network is given by
K
 k−1

PI = Pr(P1 |f1 |2 > Ip ) + Pr(P2 |f2 |2 > Ip ) Pr(P1 |f1 |2 ≤ Ip ) 2 2
2 2
PI = Pr(Pk  |fk | > Ip ) Pr(P  |f | < Ip ). (10)
+ · · · + Pr(PK |fK | > Ip ) Pr(PK−1 |fK−1 | > Ip ) . . . k=1 =1
2
× Pr(P1 |f1 | ≤ Ip ) From (7), we can rewrite (10) as follows:
K
 k−1
 K  k−1
=
2
Pr(Pk |fk | > Ip )
2
Pr(P |f | ≤ Ip ). (6) 1−Φ  1+Φ
PI = , (11)
k=1 =1 2 2
k=1
2
To compute (6), we first need to derive Pr(Pk |fk | > Ip ) and ε−1
2 where Φ = √ . Similarly, it is easy to see that
Pr(Pk |fk | ≤ Ip ). Before giving continuity to our analysis, (ε+1)2 −4ρ2 ε
the following lemma is of importance in this regard. ⎛ ⎞K
Lemma 1: For two given random variables |fk |2 and  K
1+Φ 1 1 − ε
|2 , which are
|f˜k   correlated with correlation coefficient ρ , PI = 1− = 1− ⎝ +  ⎠ . (12)
2 2 2 2
|fk |2 2 (1+ε) −4ρ ε
Pr ˜ 2 > z is given by
|fk |
⎛ ⎞ It follows from (12) that in the limited cases of ρ, the
⎡ ⎤
2 interference OP of primary networks becomes
⎜ |fk | ⎟ 1 1−z ⎧
Pr ⎝  2 > z ⎠ = ⎣1 +  ⎦. (7)  K
˜ 2 ⎨
fk  (1 + z)2 − 4ρ2 z 1 − 1
2 + √ 1−ε
, ρ=0 .
PI = 2 (1+ε)2 (13)

Proof: The proof can be easily obtained by making use 1 − 21K , ρ=1
of the definition of the first order Marcum Q-function [16]
2) Non-identical back-off coefficients: While identical
along with the help of [17, Eq.(6-60)] and
 [18, Eq. (3)]. back-off coefficients simplifies our analysis, in certain envi-
|fk |2
It is noted from (7) that Pr 2 >z depends only on ronments, it may be more appropriate to consider the non-
|f˜k |
the correlation coefficient (ρ) and the threshold (z), not the identical case, i.e., ε1 = ε2 = · · · = εK . In practice, energy
average channel power of the interference link (λI,k ). Such a conditions at each secondary node can be different and the
phenomenon will significantly affect the system design, which distance between any two nodes is usually not equal, which
is presented in the next part. can cause different back-off power control coefficients among
Lemma 1 allows us to compute the interference probability the relaying links. Similar to the previous case, we have
of primary systems. In particular, letting z = 1 in (7) and K
 k−1

2 2
combining the resultant with (6) gives PI = Pr(Pk  |fk | > Ip ) Pr(P  |f | < Ip )
⎛ ⎞ ⎛ ⎞ k=1 =1
K 2 k−1
 2
⎜ |fk | ⎟ ⎜ |f | ⎟ 1 − Φ1 (1 + Φ1 )(1 − Φ2 )
PI = Pr ⎝  2 > 1⎠ Pr ⎝  2 < 1⎠ = + + ···
˜ ˜ 2 2
k=1 fk  =1 f  (1 + Φ1 ) · · · (1 + ΦK−1 )(1 − ΦK )
+
K
 1 1 2K
= = 1− K. (8)  1 − Φk  1 + Φ 
K k−1 
2k 2 = , (14)
k=1
2 2
As a special case, we consider K = 2 in (8) leading to PI = k=1 =1
εk −1
0.75, which agrees with the result reported in [12, Eq. (7)]. where Φk = √ . After some manipulations, (14)
The expression in (8) illustrates the relationship between (εk +1)2 −4ρ2 εk
can be expressed in a mathematically tractable form as
the interference outage (PI ) and the number of hops (K)
showing that the minimum of the interference outage is 1/2 K 
 
1 + Φk
and it increases with the number of hops. Furthermore, it PI = 1 − . (15)
is easy to show that PI → 1 when K approaches infinity. 2
k=1
As such, maintaining acceptable interference for the primary At this point, a natural question arises for a given ρ is what
network under imperfect CSI is one of the critical concerns for kind of back-off coefficients gives less interference on the
cognitive networks. To guarantee the interference probability primary network. The following theorem will answer such a
from the secondary network, back-off transmit power control question.
mechanism is a simple and efficient solution. We denote εk Theorem 1: For a given fixed ρ for all interference links,
with 0 < εk ≤ 1 as the back-off power control coefficient of the interference outage of primary networks, PI , will achieve
hop k, then the reduced transmit power at hop k can be given its minimum at
by ⎛ ⎞K
εk Ip 1 1 − ε
Pk = εk Pk =  2 . (9) PI = 1 − ⎝ +  ⎠ , (16)
˜ 2 2
fk  2 (1 + ε) − 4ρ ε 2

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4867

if and only if Proof: From (12), we have


ε1 = ε2 = · · · = εK = ε. log(1 − PI )
(17) K∗ =  . (24)
Proof: Applying the inequality of arithmetic and geomet- log 1
2 + √ 1−ε
2 (1+ε)2 −4ρ2 ε
ric means, we can write
Since Kmax only takes integer values, we choose Kmax as
K     K
K
1 + Φk 1 1 + Φk the largest integer that is not greater than K to satisfy the
≤ . (18) interference constraints, which completes the proof.
2 K 2
k=1 k=1

The equality happens if and only if B. Outage probability of secondary networks


1 + Φ1 1 + ΦK The OP is defined as the probability that the end-to-end
= ··· = (19) SNR of the cognitive secondary multihop networks (γΣ ) is
2 2
less than a predetermined threshold γth . Thus, the OP is given
leading to
by
ε1 = · · · = εK = ε. (20) K

(a)  
OP = Pr (γΣ < γth ) = 1 − 1 − Fγ  k (γth ) , (25)
This completes the proof.
k=1
The setting of the back-off coefficients is an additional im-
portant issue not only to the primary network but also the where γΣ = mink=1,...,K γk with γk = εk γk and step (a)
secondary network. If these coefficients are chosen too high, follows with the assumption that all γk are independent of
the interference probability will increase. On the other hand, if each other.
they are chosen too low, reduced transmit powers result in poor In (25), Fγ  k (γ) is computed as follows:
performance of secondary networks. Hence, it is important to ∞ ∞
determine the appropriate value for the back-off coefficient. Fγ  k (γ) = F εk Ip |h (γx)f|f 2 (x, y)dxdy
N0 k|
2
k|
2
,|f˜k |
In particular, the problem is to find the maximum value of the
0 0
back-off coefficient for the given desired interference value. γ
The corresponding solution is given in the following theorem. = , (26)
γ + αk
Theorem 2: Given an interference outage (PI ), the interfer-
ε I λ
ence channel coefficient (ρ), and the number of hops (K), the where αk = kN0pλI,k
D,k
. From (26), the end-to-end closed-form
maximum back-off coefficient which offers the best secondary expression for the OP is written as
network performance is determined as K

 OP = 1 −
αk
. (27)
1 + ζ 2 − 2ζ 2 ρ2 − 2 ζ 2 − ζ 2 ρ2 − ζ 4 ρ2 + ζ 4 ρ4 γth + αk
εmax = , k=1
1 − ζ2
(21) It is worth noting that the OP of secondary networks involves
√ only finite multiplication of γthα+α
k
k
, thus can be calculated in
where ζ = 2 K 1 − PI − 1.√ closed-form. Next, we will study the asymptotic form of the
Proof: Letting ζ = 2 K 1 − PI − 1 and rephrasing (12), OP, which is useful for evaluating the system performance at
the back-off coefficient is the root of the quadratic equation high SNRs in a more intuitive and concise way. The following
as follows: theorem is to be utilized.
Theorem 4: At a high SNR regime, the OP can be readily
(1 − ζ 2 )ε2 − (2 + 2ζ 2 − 4ρ2 ζ 2 )ε + 1 − ζ 2 = 0. (22)
and accurately lower-bounded by
Let us denote Ψ(ζ) = (1−ζ 2 )ε2 −(2+2ζ 2 −4ρ2 ζ 2 )ε+1−ζ 2 . K

Note that because 0 < ζ ≤ 1, we have Ψ(0) = 1 − ζ 2 ≥ 0 γth
OP → . (28)
and Ψ(1) = −4ζ 2 (1 + ρ2 ) < 0 leading to the fact that this εk αk
k=1
quadratic equation has at least one admissible positive real Proof: We start the proof by rewriting (25) as
root in the range of [0 1] as presented in (21).
K  −1
Having determined the maximum back-off coefficient for γth
interference outage of primary networks, let us now turn to OP = 1 − 1+ . (29)
αk
k=1
find the maximum number of secondary multihop networks  −1
meeting the desired interference constraint, which is stated in By making use of the fact that 1 + γαthk ≈ 1 − γαthk at
the following theorem.
high SNR regime and then neglecting the high order terms,
Theorem 3: For given PI , ε, and ρ, the maximum number K   !
K
of hops for secondary networks Kmax is given by i.e., 1 − γαthk ≈ 1 − γth
αk , we have (28).
⎢ ⎥ k=1 k=1
⎢ ⎥ Lemma 2: For predetermined PI , ρ and ε, the minimum
⎢ ⎥
⎢ log(1 − P ) ⎥ of outage performance loss of the secondary system in dB as
Kmax = ⎣ ⎢  I
⎥ (23)
⎦, compared to the non back-off system is
log 12 + √ 1−ε2 
2 (1+ε) −4ρ2 ε 1 + ζ 2 − 2ζ 2 ρ2 − 2 ζ 2 − ζ 2 ρ2 − ζ 4 ρ2 + ζ 4 ρ4
−10log10 .
where log(.) and x denote the natural logarithm and the 1 − ζ2
positive integer closest to x, respectively. (30)

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4868 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013

√ e−x
$ 1
%
Proof: From (28), it is straightforward to conclude that In (32), we approximate erfc( x) by √ πx
1 − 2x for large
the performance loss of secondary systems at high SNRs is x [22], the system BER is further approximated as
−10log10 ε dB. √
υj
2 M 
K log
 φjn 1
C. Bit error rate of secondary networks BER ≈ √ √
k=1 j=1 n=0 M log2 M 2ωn αk
In order to derive the end-to-end BER, we first derive the √ K
single-hop average BER, BERk with k = 1, . . . , K. For (b) M − 1  N0 λI,k
≈√ √ . (37)
square M -QAM, the average BER over Rayleigh fading is M log2 M k=1 εk Ip λD,k
given as [19]1
√ where (b) is based on the fact that the first term, i.e., j = 1,
∞ log υj
2 M
1 √ is dominant in the inner summation of (37).
BERk = √ √ φjn erfc ( ωk γ) fγ  k (γ)dγ, Moreover, assuming independent and identically distributed
M log2 M j=1 n=0
0 (i.i.d.) fading for all links, i.e., α1 = α2 = · · · = αK = α,
(31) the end-to-end BER can be simplified to
where erfc(.) is the complementary error function [20, Eq. √
( M − 1)KN0 λI
j
(4A.6)]. Here, υj , φn , and ωn are defined respectively as BER ≈ √ √ . (38)
√ 2 M log2 M εIp λD
υj = (1 − 2−j ) M − 1, ωn = (2n+1) 3log2 M
, and φj
n =
n2

j−1  " j−1 # 2M−2 Lemma 3: Under the constraint of interference outage PI ,
j−1 n2 1
(−1) M 2 − √
M
+ 2 . Using the result in Ap- −10log ε dB is the performance loss in terms of BER since
10
pendix A, we have the closed-form expression of BERk as back-off technique is applied.

2 M!
log! υj $ √ $√ %% Proof: The proof is omitted since it can be done in the
j ωn αk

K φ n 1− ω α
n k e πerfc ω α
n k same way as for OP.
 j=1 n=0
BER = √ √ .
k=1
M log2 M D. Ergodic capacity of secondary networks
(32) In this section, we will derive the ergodic capacity of
For a given set of average BER of K hops, BER1 , . . . , BERK , secondary networks under the interference outage constraint
we are now in a position to derive the end-to-end BER. of the primary network. Denoting C as the ergodic capacity
By taking into account the fact that an even number of of the secondary network, we have
wrong single-hop bit transmissions between the source and ∞
the destination will make a right bit transmission, we have 1
C= log2 (1 + γ)fγΣ (γ)dγ
[21] K
0
K
 K
 ∞ K
BER = BERu (1 − 2BERv ) (33) (c) 1 1  αk
= dγ, (39)
u=1 v=u+1 K log 2 γ+1 γ + αk
0 k=1
After several manipulations, a simplified expression for the ( )* +
end-to-end BER can be written as C1
& K
'
1  where step (c) follows after the use of integration by parts.
BER = 1− (1 − 2BERk ) . (34) Theorem 6: The ergodic capacities of secondary multihop
2
k=1 networks for an arbitrary number of hops are given as
It is worth noting that the form of (34) is new and has not & K K  K+1−k '
1 α  α 1
been reported in the literature. Compared to (33), (34) is more C= log α −
mathematically tractable. Besides, (34) reveals that the BER K log 2 α−1 α−1 k−1
k=2
will achieve its minimum if and only if BER1 = BER2 = (40)
· · · = BERK 2 .
Theorem 5: At high SNRs, the system BER is approxi- for i.i.d. channels, or
⎛ ⎞
mated as follows: K
 K

√ 1 αk ⎝ α ⎠
K
M − 1  N0 λI,k C=
K log 2 αk − 1 αk − α
log αk (41)
BER = √ √ . (35) k=1 =1,=k
M log2 M εk Ip λD,k
k=1
for independent and non-identically distributed (i.n.d.) chan-
K !
K
nels, or
Proof: By utilizing the fact that (1 − xk ) ≈ 1− xk ⎡ ⎤
k=1 k=1 N N  ri
for small xk , from (34), we have 1   Aij
C= ⎣ Ai,1 log Θi + ⎦
K
 K log 2 i=1 i=1 j=2
(j − 1)Θi j−1
BER ≈ BERk (36)
(42)
k=1
for generalized channels.
1 Although we only consider the BER performance for square M -QAM
modulation, the BER derivation can be applied to any general constellation
Proof: The proof can be found in Appendix B.
by using the same approach. The exact capacity expression in (40), (41), and (42) involve
2 The proof follows from the inequality of arithmetic and geometric means. only elementary mathematical functions and therefore avoids

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4869

the need of numerical integration. As a result, it can be applied 0.9


to many network and channel settings. More importantly, the
0.8
result can be applied to the case of generalized channels
covering the i.i.d. and i.n.d. as special cases. To provide 0.7

more insights on the network behaviours, theorem 6 can be


0.6

Interference Probability
specialized to two SNR regimes of interest, i.e., low and high
SNRs, as follows. 0.5

Theorem 7: At high SNRs, the ergodic capacities over i.i.d. 0.4


and i.n.d. channels are tightly approximated as (43).
0.3
Proof: By neglecting small terms in (40) and (41), we
obtain (43), which concludes the proof. 0.2
K increasing
From Theorem 7, we have two important remarks: i) The 0.1
secondary network suffers a minimum Shannon capacity loss ε = 0.5

of −log2 max /K to protect the primary networks due to 0


0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
ρ
the imperfect CSI of interference links and ii) the Shannon
capacity loss at high SNRs, given by Fig. 2. Interference Probability versus channel coefficient.
!K 1
Δ log α − k=3 k−1 10
0

ΔC = C(K) − C(K + 1) = , (44)


K(K + 1) log 2 PI = 10
−1
−1
10
diminishes as the number of hops increases. We end this
section by presenting the following theorem, which describes −2
P = 10−2
I
10
the approximation form of the ergodic capacity of secondary
max
multihop networks at low regime of SNR. ε P = 10
−3
−3 I
Theorem 8: At low SNRs, the system capacity is well- 10

approximated as (45), where {β1 , . . . , βM } is a set of distinct P = 10−4


!
M
10
−4 I

elements of {α1 , . . . , αK }, ui = K and


i=1
, - −5

1 ∂ (ui −n)  10
2 4 6 8 10 12 14 16 18 20
Bi,n = [(γ + βi ) fγΣ (γ)] 
ui
. K
(ui − n)! ∂γ (ui −n)
γ=−βi Fig. 3. The maximum back-off coefficient versus number of hops.
(46)
Furthermore, In is the auxiliary function, which is of the form cognitive destination are placed at coordinates (xp , xp ), (0, 0)
⎧ π and (1, 0), respectively. To take into account the effect of
√ , n=2
⎨ 2 βi pathloss, we set λA,B = d−η A,B , where η is the path loss exponent
n
In (βi ) =

π
(2 − 5), n > 2 . (47) with A ∈ {T0 , . . . , TK } and B ∈ {PU, T1 , . . . , TK−1 }.
3
n−
(n−1)!βk 2 2n−1 =3 Fig. 2 illustrates the effect of the number of hops on the
interference probability. As can be clearly seen, the increase
Proof: Please refer to Appendix C.
of K will increase the interference probability of the primary
Theorem 8 indicates that the system Shannon capacity at
networks but with diminishing returns. Fig. 2 also shows that
low SNRs increases according to the number of hops with
the interference probability is a decreasing function of the
respective gain C(K+1)
C(K)
2K−1
= 2(K+1) . It is straightforward to
correlation ratio, which means that the interference probability
show that the gain becomes one since the number of hops
should decrease as the channel estimation quality increases.
approaches infinity.
Note that PI is more sensitive to the value of ρ that is close to
Finally, note that our derived approach for the system per-
1 since we observe a higher dynamic range in the interference
formance metrics (including OP, BER, and ergodic capacity)
probability performance for such values.
is highly precise at high and low SNRs. Additionally, the
In Fig. 3, the maximum back-off power control coefficient
closed-form expressions contain only elementary functions,
is plotted as a function of the number of hops. Clearly, lower
and thus its evaluation is instantaneous regardless of network
target PI results in smaller εmax and this ratio seems to slowly
and channel settings.
diminish as K increases. The interesting conclusion that one
can draw from this figure is that while back-off technique
IV. N UMERICAL R ESULTS guarantees the minimum interference on primary network
In this section, representative numerical examples are pro- in terms of PI , this gain comes at the expense of certain
vided to highlight the effect of imperfect CSI of interference secondary performance loss on secondary network since the
links on the performance of the primary network and the transmit power is reduced by εmax .
secondary cognitive multihop network. The network topology Fig. 4 is a plot of the maximum number of hops, namely
is based on the assumption that the secondary network is Kmax , as computed from (23), versus the back-off power
placed on a straight line connecting the secondary source control coefficient in the constraint of different levels of inter-
and the secondary destination. Each cognitive relay node is ference probability. As expected, higher primary interference
equidistant from each other, i.e., dTk ,Tk+1 = 1/K for all k. We probability allows a higher number of hops for secondary
further assume that the PU-Rx, the cognitive source and the networks. In addition, since Kmax is established for a given

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4870 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013

⎧ / 0

⎪ 1
!K
1

⎨ K log 2 log α − k−1 , i.i.d. channels
C→  k=2  . (43)

⎪ !
K K


1
K (−1)K−1 α
αk −α log2 αk , i.n.d. channels
k=1 =1,=k

⎧  

⎪ !
K
K−1
K √
π αk


1
(−1) α
2 , i.n.d. channels

⎪ K αk −α

⎨ k=1 =1,=k

K+1
C≈ √ (2−5) , (45)


π α =3
, i.i.d. channels

⎪ K! 2K

⎪ !
M ! ui

⎩ 1
Bi,n In (βi ), generalized channels
K
i=1 n=2

0
30 10 Exact
P =0.5
I Approximation
PI=0.3
25
Simulation
P =0.1
I
−1
P =0.05
I
10
20
ε = εmax
max

15
K

−2

Bit Error Rate


10
10 K=1

−3
5 10
ε=1
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
−4
ε 10 K=3
Fig. 4. The maximum number of hops for secondary networks versus back-
off coefficient. 4−QAM

0 0 10 20 30 40 50
10 Average SNR [dB]
ε=ε
max Fig. 6. BER of secondary network for 4-QAM modulation versus average
SNR.
−1
10
14
Outage Probability

Exact
K=1 12 Approximation
10
−2 Simulation
10 K=1
Capacity

−3
8
10 K=3
ε=1
Exact 6
− log εmax
Approximation
Simulation
10
−4 4
0 10 20 30 40 50
Average SNR [dB] K=3
2
Fig. 5. Outage probability of secondary network versus average SNR.
0
0 10 20 30 40 50
PI , only secondary networks with the number of hops equal Average SNR [dB]

to or smaller than Kmax is valid. For example, only direct Fig. 7. Ergodic capacity of secondary network versus average SNR.
transmission is acceptable for secondary networks regardless
of secondary channel settings if PI and ε are chosen at 0.1 the back-off technique has no effect on the system diversity
and 0.35, respectively. except for the system coding gain.
In Figs. 5 and 6, we plot the OP and BER of secondary Figure 7 shows the ergodic capacity and its approximation
networks versus average SNRs. Here we also plot the cor- at high SNRs, as given in (43), as a function of average SNRs.
responding no back-off case as a benchmark to evaluate the Two cases of network topologies, i.e., K = 1 and K = 3, are
performance loss. Both figures confirm that a lower OP is considered. It can be observed that for average SNRs higher
achieved by increasing the number of hops in secondary than 20 dB, the performance loss gap becomes almost steady.
networks. For high average SNRs, the approximations (28) and We further observe that the secondary network with K = 3
(35) match the simulation results, confirming the correctness has worse capacity than with K = 1. This is expected due to
of the analysis approach. Another interesting observation is the orthogonal channels used in secondary networks.
that a log εmax performance loss between the two systems is Figure 8 shows the tightness of proposed approximation for
found; however, the slope of all curves are the same, that is, the system ergodic capacity at low SNRs, e.g., ranging from

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4871

1 It is straightforward to show after using the l’Hospital rule


Exact
Approximation
that Θ1 = 0 resulting in
0.8
Simulation
∞ √
ωk γe−ωk γ
Capacity

0.6
K = {2,3,4} Θ= dγ. (A.4)
π γ + αk
0.4 0

0.2 Making a change of integration variables in (A.4), i.e., u = γ
and with the help of [24, Eq. (3.32.3) and Eq. (7.1.11)], we
0 have
−20 −15 −10 −5 0 5 10 15
Average SNR [dB]
∞
Fig. 8. Ergodic capacity of secondary network versus average SNR. u2 −ωp u2
Θ=2 2
e du
u +b
-20 dB to 15 dB. The asymptotic bounds are quite tight in this 0
⎡ ⎤
case. An important result here is that the capacity at low SNRs ∞ ∞
2 b 2
increases linearly with K, unlike the high SNR behavior. This = 2 ⎣ e−ωp u du − e−ωp u du⎦
effect has also been reported in [23] and it can be explained u2 + b
0
by using the fact that increasing number of hops in linear √ √0 √
= 1 − ωn αk eωn αk πerfc ( ωn αk ) . (A.5)
networks at low SNRs corresponds to increasing effective
SNRs. Finally, along with its simplicity, i.e., requiring only
elementary functions, the approximation is found to provide a A PPENDIX B
tight fit for most values of K. P ROOF OF T HEOREM 6
To obtain C, we first need to derive C1 in (39). De-
V. C ONCLUSIONS noting {Θ1 , . . . , ΘN } as the distinct elements of the set
This paper has studied the performance of the primary {1, α1 , . . . , αK }, after performing partial fraction expansions,
and secondary multihop networks in the presence of imper- we rewrite C1 as
fect channel knowledge of the primary-secondary links. To ri 
N 


protect the primary communication, we proposed to apply Aij
C1 = j+1 dγ, (B.1)
the back-off technique so that the interference probability i=1 j=1 0 (γ + Θi )
at the primary network is guaranteed. To quantify the loss
due to imperfect CSI, three performance metrics of secondary where the partial-fraction coefficient, Aij , is computed as
multihop networks including OP, BER and ergodic capacity , (ri −j) -
1 ∂ 
[(γ + Θi ) Ci ] 
ri
are derived over Rayleigh fading channels. High-and-low SNR Aij = . (B.2)
analysis has also been derived to give insights into the system (ri − j)! ∂γ (r i −j)
γ=−Θi
behaviors. The derived closed-form analytical expression is Note that the closed-form expression for the inner integral
validated by simulations showing an excellent match between does not exist when j = 1. By separating the summation in
the numerical and simulation results. (B.1) into two summations and making use of the fact that
!
N
ACKNOWLEDGMENT Ai1 = 0, the closed-form expression of C1 is given as
j=1
This research is funded by Vietnam National Foundation for follows:
Science and Technology Development (NAFOSTED) under N
 ri
N 

grant number 102.04-2012.20. Aij
C1 = Ai,1 log Θi + . (B.3)
i=1 i=1 j=2
(j − 1)Θi j−1
A PPENDIX A
Finally, substituting (B.3) into (39), we obtain the closed-form
P ROOF OF E Q . (32)
expression of the ergodic capacity of secondary networks.
This appendix is to solve the following integral, i.e., For the i.i.d. case, i.e., α1 = · · · = αN = α = 1, C1 is
∞ rewritten as

Θ = erfc ( ωk γ) fγk (γ)dγ, (A.1) ∞  K
1 α
0 C1 = dγ
γ +1 γ+α
where f (γ) is obtained from (26) as
γk 0
/ 0  K ∞  
d γ αk α 1 1
fγk (γ) = = (A.2) = − dγ
dγ γ + αk 2. α−1 γ+1 γ+α
(γ + αk ) 0
Using integration by parts, we have K
 ∞
αK 1
$√ % ∞ ∞ √ −ωk γ − dγ
γerfc ωk γ 
K+1−k k
ωk γe (α − 1)
k=2 (γ + α)
Θ=  + dγ . (A.3) 0
γ + αp  π γ + αk  K K 
 K+1−k
γ=0 0 α α 1
( )* + ( )* + = log α − . (B.4)
Θ1 α−1 α−1 k−1
Θ2 k=2

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4872 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013

Since α1 = · · · = αN = 1, (B.4) is further reduced to as (see [15, Eq. (6.1.9)]),


$ % √Γ(n) = (n − 1)! (see [15, Eq.
∞ (6.1.6)]), and Γ 12 = π (see [15, Eq. (6.1.8)]), a more
1 1 1 simplified expression of (C.5) is produced after considerable
C1 = K+1 d
γ = 2 . (B.5)
K log 2 (γ + 1) K log 2 manipulations as (47) [15, Eq. (6.1.12)].
0
For the i.i.d. case, from (C.1) and (C.2), we have
For the i.n.d. case, i.e., α1 = · · · = αN = 1, we have (B.6). ∞ √ √ K+1
K γ π α =3 (2 − 5)
C=α K+1 d
γ = . (C.9)
A PPENDIX C (γ + α) K! 2K
0
P ROOF OF T HEOREM 8
√ For i.n.d. case, using the same approach, we have
At low SNRs, we can approximate log2 (1 + γ) ≈ γ ⎛ ⎞
resulting in the system capacity being given by ∞ K K
1 √  K−1 ⎝
 α  ⎠ αk
∞ C= γ (−1) dγ
1 √ K αk −α (α+αk )2
k=1 =1, = k
C≈ γfγΣ (γ)dγ, (C.1) 0
( )* +
K
0 fγΣ (γ)
⎛ ⎞
K K ∞ √
where fγΣ (γ) denotes the PDF of γΣ , which is derived from 1   α ⎠ γ
(27) as follows: = (−1)K−1 ⎝ αk 2 dγ
& ' K αk − α (α+αk )
k=1 =1,=k 0
K

d αk ( )* +
fγΣ (γ) = 1− . (C.2) I2
dγ γ + αk ⎛ ⎞
k=1 K K √
1  K−1 ⎝
 α  ⎠ π αk
Applying again partial fraction technique, (C.2) can be rewrit- = (−1) . (C.10)
ten as follows: K αk −α 2
k=1 =1,=k
K
 K M 
 ui
m=1 αm B i,n
fγΣ (γ) = = n. R EFERENCES
K (γ + βk )
k=1 (γ + αk ) =1 (γ + α ) i=1 n=2 [1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios
(C.3) more personal,” IEEE Personal Commun. Mag., vol. 6, no. 4, pp. 13–18,
Apr. 1999.
Substituting (C.3) into (C.1) yields [2] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum
gridlock with cognitive radios: an information theoretic perspective,”
M ui ∞ √
1  γ Proc. IEEE, vol. 97, no. 5, pp. 894–914, May 2009.
C= B i,n n dγ. (C.4) [3] V. N. Q. Bao and T. Q. Duong, “Outage analysis of cognitive multihop
K i=1 n=2 (γ + βi ) networks under interference constraints,” IEICE Trans. Commun., vol.
0 E95-B, no. 03, pp. 1019–1022, Mar. 2012.
( )* + [4] C. Zhong, T. Ratnarajah, and K.-K. Wong, “Outage analysis of decode-
In (βi ) and-forward cognitive dual-hop systems with the interference constraint
in Nakagami-m fading channels,” IEEE Trans. Veh. Technol., vol. 60,
In (C.4), In (βi ) is computed as no. 6, pp. 2875–2879, Jun. 2011.
∞ √ [5] T. Q. Duong, V. N. Q. Bao, and H.-J. Zepernick, “Exact outage
γ probability of cognitive AF relaying with underlay spectrum sharing,”
In (βi ) = n dγ, n ≥ 2. (C.5) Electron. Lett., vol. 47, no. 17, pp. 1001–1002, Aug. 2011.
(γ + βi ) [6] T. Q. Duong, D. B. da Costa, M. Elkashlan, and V. N. Q. Bao, “Cognitive
0
amplify-and-forward relay networks over Nakagami-m fading,” IEEE
When n is an integer, rewriting (C.5) and then using [24, Eq. Trans. Veh. Technol., vol. 61, no. 5, pp. 2368–2374, May 2012.
[7] H. Jun-pyo, H. Bi, B. Tae Won, and C. Wan, “On the cooperative diver-
(3.194.4)], we immediately get sity gain in underlay cognitive radio systems,” IEEE Trans. Commun.,
∞ √   vol. 60, no. 1, pp. 209–219, Jan. 2012.
1 γ 3
−n 3 3 [8] W. Xu, J. Zhang, P. Zhang, and C. Tellambura, “Outage probability
In (βi ) = n n dγ = βi
2 B ,n− , of decode-and-forward cognitive relay in presence of primary user’s
βi (1 + βγi ) 2 2 interference,” IEEE Commun. Lett., vol. 16, no. 8, pp. 1252–1255, Aug.
0
2012.
(C.6) [9] V. N. Q. Bao, T. T. Thanh, N. T. Duc, and V. D. Thanh, “Spectrum
sharing-based multihop decode-and-forward relay networks under inter-
1
where B(x, y) = tx−1 (1 − t)y−1 dt is the beta function (or ference constraints: performance analysis and relay position optimiza-
tion,” J. Commun. Netw., vol. 15, no. 3, pp. 266–275, Jun. 2013.
0 [10] G. Amarasuriya, C. Tellambura, and M. Ardakani, “Asymptotically-
the Euler integral of the first kind) [24, Eq. (8.380.1)]. With exact performance bounds of AF multi-hop relaying over Nakagami
the help of the identity [24, Eq. (8.384.1)], i.e., fading,” IEEE Trans. Commun., vol. 59, no. 4, pp. 962–967, Apr. 2011.
  $ % $ % [11] H. A. Suraweera, P. J. Smith, and M. Shafi, “Capacity limits and perfor-
3 3 Γ 32 Γ n − 32 mance analysis of cognitive radio with imperfect channel knowledge,”
B ,n− = , (C.7) IEEE Trans. Veh. Technol., vol. 59, pp. 1811–1822, May 2010.
2 2 Γ(n) [12] J. Chen, J. Si, Z. Li, and H. Huang, “On the performance of spectrum
(C.6) is re-expressed as sharing cognitive relay networks with imperfect CSI,” IEEE Commun.
$3% $ 3
% Lett., vol. 16, no. 7, pp. 1002–1005, Jul. 2012.
2 Γ n− 2
3 Γ [13] M. Schwartz, W. Bennett, and S. Stein, Communication Systems and
In = βi 2 −n , (C.8) Techniques. Wiley-IEEE Press, 1995.
Γ(n) [14] X. Tang, M. Alouini, and A. Goldsmith, “Effect of channel estimation
error on M -QAM BER performance in Rayleigh fading,” IEEE Trans.
∞ Commun., vol. 47, no. 12, pp. 1856–1864, Dec. 1999.
where Γ(x) = e−t tz−1 dt denotes the Gamma function [24, [15] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Func-
0 $ % √ tions with Formulas, Graphs, and Mathematical Tables, 10th ed. U.S.
Eq. (8.310.1)]. Furthermore, from the facts that Γ 32 = 2π Government Printing Office, 1972.

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4873

∞ K
1  αk
C1 =
γ+1 γ + αk
0 k=1
⎡ ⎛ ⎞ ⎤
∞   K

K K

αk 1 K−1 αk α  1
= ⎣ − (−1) ⎝ ⎠ ⎦dγ
αk − 1 γ + 1 αk − 1 αk − α γ + αk
0 k=1 k=1 =1, = k
⎛ ⎞
K K

K−1 αk ⎝ α ⎠ log αk .
= (−1) (B.6)
αk − 1 αk − α
k=1 =1,=k

[16] A. H. Nuttall, “Some integrals involving the Qm function,” IEEE Trans. Trung Q. Duong (S’05, M’12, SM’13) received his
Inf. Theory, vol. 21, no. 1, pp. 95–96, Jan. 1975. Ph.D. degree in Telecommunications Systems from
[17] A. Papoulis and S. U. Pillai, Probability, Random Variables, and Blekinge Institute of Technology (BTH), Sweden
Stochastic Processes, 4th ed. McGraw-Hill, 2002. in 2012, and then continued working at BTH as a
[18] M. K. Simon and M. S. Alouini, “Some new results for integrals project manager. Since 2013, he has joined Queen’s
involving the generalized Marcum Q function and their application to University Belfast, UK as a Lecturer (Assistant
performance evaluation over fading channels,” IEEE Trans. Wireless Professor). He held a visiting position at Polytechnic
Commun., vol. 2, no. 4, pp. 611–615, 2003. Institute of New York University and Singapore
[19] K. Cho and D. Yoon, “On the general BER expression of one- and two- University of Technology and Design in 2009 and
dimensional amplitude modulations,” IEEE Trans. Commun., vol. 50, 2011, respectively. His current research interests
no. 7, pp. 1074–1080, Jul. 2002. include cooperative communications, cognitive radio
[20] M. K. Simon and M.-S. Alouini, Digital Communication over Fading networks, physical layer security, massive MIMO, cross-layer design, mm-
Channels, 2nd ed., ser. Wiley Series in Telecommunications and Signal waves communications, localization for radios and networks. Dr. Duong
Processing. John Wiley & Sons, 2005. has been a TPC chair for many international conferences and workshops
[21] K. Dhaka, R. K. Mallik, and R. Schober, “Performance analysis of including the most recently IEEE GLOBECOM13 Workshop on Trusted
decode-and-forward multi-hop communication: a difference equation Communications with Physical Layer Security. He currently serves as an
approach,” IEEE Trans. Commun., vol. 60, no. 2, pp. 339–345, Feb. Editor for the IEEE C OMMUNICATIONS L ETTERS , Wiley Transactions on
2012. Emerging Telecommunications Technologies and the Lead Guest Editor of
[22] C. Tellambura and A. Annamalai, “Efficient computation of erfc(x) for the special issue on “Secure Physical Layer Communications” of the IET
large arguments,” IEEE Trans. Commun., vol. 48, no. 4, pp. 529–532, Communications, Guest Editor of the special issue on “Green Media: The
Apr. 2000. Future of Wireless Multimedia Networks” of the IEEE Wireless Commu-
[23] M. Sikora, J. N. Laneman, M. Haenggi, D. J. Costello, and T. E. Fuja, nications Magazine, Guest Editor of the special issue on “Cooperative
“Bandwidth- and power-efficient routing in linear wireless networks,” Cognitive Networks” of the Eurasip Journal on Wireless Communications
IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2624–2633, Jun. 2006. and Networking, Guest Editor of special issue on “Security Challenges and
[24] I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of Issues in Cognitive Radio Networks” of the Eurasip Journal on Advances in
Integrals, Series and Products, 7th ed. Elsevier, 2007. Signal Processing. He is awarded the Best Paper Award at the IEEE Vehicular
Technology Conference (VTC-Spring) in 2013 and the Exemplary Reviewer
Certificate of the IEEE Communications Letters in 2012.
Vo Nguyen Quoc Bao (M’10) received the B.E.
and M.Eng. degree in electrical engineering from Ho Chintha Tellambura (F’11) received the B.Sc. de-
Chi Minh City University of Technology (HCMUT), gree (with first-class honor) from the University of
Vietnam, in 2002 and 2005, respectively, and Ph.D. Moratuwa, Sri Lanka, in 1986, the M.Sc. degree in
degree in electrical engineering from University of Electronics from the University of London, U.K.,
Ulsan, South Korea, in 2009. In 2002, he joined in 1988, and the Ph.D. degree in Electrical Engi-
the Department of Electrical Engineering, Posts and neering from the University of Victoria, Canada,
Telecommunications Institute of Technology (PTIT), in 1993. He was a Postdoctoral Research Fellow
as a lecturer. Since February 2010, he has been with the University of Victoria (1993-1994) and the
with the Department of Telecommunications, PTIT, University of Bradford (1995-1996). He was with
where he is currently an Assistant Professor. His ma- Monash University, Australia, from 1997 to 2002.
jor research interests are modulation and coding techniques, MIMO systems, Presently, he is a Professor with the Department
combining techniques, cooperative communications, and cognitive radio. Dr. of Electrical and Computer Engineering, University of Alberta, Canada. His
Bao is a member of Korea Information and Communications Society (KICS), research interests focus on communication theory dealing with the wireless
The Institute of Electronics, Information and Communication Engineers physical layer. Prof. Tellambura was an Associate Editor for the IEEE
(IEICE) and The Institute of Electrical and Electronics Engineers (IEEE). T RANSACTIONS ON C OMMUNICATIONS and the Area Editor for Wireless
He is also a Guest Editor of EURASIP Journal on Wireless Communications Communications Systems and Theory in the IEEE T RANSACTIONS ON
and Networking, special issue on “Cooperative Cognitive Networks” and IET W IRELESS C OMMUNICATIONS. He was Chair of the Communication Theory
Communications, special issue on “Secure Physical Layer Communications.” Symposium in Globecom’05 held in St. Louis, MO

Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.

You might also like