Professional Documents
Culture Documents
On the Performance of
Cognitive Underlay Multihop Networks with
Imperfect Channel State Information
Vo Nguyen Quoc Bao, Member, IEEE, Trung Q. Duong, Senior Member, IEEE,
and Chintha Tellambura, Fellow, IEEE
Abstract—This paper proposes and analyzes cognitive multi- of secondary transmit powers necessary. Since the allowable
hop decode-and-forward networks in the presence of interference interference level on primary receivers (PU-Rxs) is small,
due to channel estimation errors. To reduce interference on the secondary network coverage is limited. In order to extend it,
primary network, a simple yet effective back-off control power
method is applied for secondary multihop networks. For a given an efficient secondary transmission mechanism is required.
threshold of interference probability at the primary network, Such a mechanism is multihop relay technology, (see, e.g.,
we derive the maximum back-off control power coefficient, [3]–[10]). In [3] and [4], the outage probability (OP) of
which provides the best performance for secondary multihop a multi-hop decode-and-forward (DF) relaying system over
networks. Moreover, it is shown that the number of hops for
secondary network is upper-bounded under the fixed settings of
Rayleigh and Nakagami-m fading channels under the inter-
the primary network. For secondary multihop networks, new ference temperature constraint was respectively presented to
exact and asymptotic expressions for outage probability (OP), capture the impact of fading parameters at the interfering
bit error rate (BER) and ergodic capacity over Rayleigh fading links as well as the interference temperature constraint on
channels are derived. Based on the asymptotic OP and BEP, OP. Thanks to low complexity and easy deployment, amplify-
a pivotal conclusion is reached that the secondary multihop
network offers the same diversity order as compared with the
and-forward relaying could be a promising candidate with
network without back off. Finally, we verify the performance its outage performance exceeding that of the conventional
analysis through various numerical examples which confirm the cognitive radio direct transmission [5]. Over Nakagami-m
correctness of our analysis for many channel and system settings channels, it was shown in [6] that for the same system
and provide new insight into the design and optimization of model as in [5], the diversity order is strictly defined by
cognitive multihop networks.
the minimum fading severity between the two hops of the
Index Terms—Decode-and-forward, dual-hop cognitive relay secondary network; and the secondary network achieves the
network, spectrum sharing, multihop, imperfect channel state full diversity order regardless of the transmit power constraint.
information, Rayleigh fading, outage probability, bit error rate,
ergodic capacity. For two different types of interference power constraints at the
PU-Rx including fixed and proportional interference power
constraints, the authors in [7] studied cooperative diversity
I. I NTRODUCTION
gain of secondary networks with multiple relays. It is found
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4865
We consider a cognitive multihop network over the same Eq. (4) shows that improper regulation of the transmit powers
spectrum of a primary network with an underlay peak interfer- due to imperfect channel estimation can cause an interference
ence power constraint. As illustrated in Fig. 1, the communica- that is higher than the maximum tolerable interference level.
tion between the source (T0 ) and the destination (TK+1 ) takes In Fig. 1, primary communication is protected if all PU
place in K orthogonal timeslots via serial immediate relays received interference powers in the K hops are lower than Ip .
T1 , . . . , TK . In the k-th timeslot, the received signal at relay k Otherwise, the primary communication fails. To analyze this
is fully decoded and then re-encoded before being forwarded phenomenon, we use primary interference probability concept,
to the next node (or the destination) in the subsequent timeslot. which is defined as the probability that the interference power
All secondary and primary nodes are equipped with a single- received at the PU-Rx is higher than Ip . Note that since the
antenna. interference probability is computed after the arrival of the
We denote hk and fk , respectively, as the channel co- source data at the destination, its evaluation reflects the effect
efficients of the data link and interference link of hop k. of the entire secondary system on the primary system. In the
Throughout this paper, independent Rayleigh frequency-flat next section, we will derive the interference probability due to
fading links are assumed. As a result, the channel gains, an arbitrary number of secondary hops over Rayleigh fading
i.e., |hk |2 and |fk |2 , follow the exponential distribution with channels.
parameters λD,k and λI,k , respectively.
To protect the PU network communication as well as to III. P ERFORMANCE A NALYSIS
enhance the secondary network performance, all SUs should
transmit with maximal allowable power Pk as long as the PU In this section, we investigate the performance of the
received interference power is below the maximum tolerable primary and the secondary multihop networks. For the primary
interference level, Ip . Therefore, the transmit power of node network, the interference probability is derived over Rayleigh
k is considered as fading channels. For the secondary network, the performance
metrics including OP, BER and ergodic capacity are derived.
Ip
Pk = 2, k = 0, 1, . . . , K (1) The secondary network behaviors at high and low SNRs are
|fk | also provided.
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4866 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013
A. Interference Probability of the Primary System 1) Identical back-off coefficients: In this case, the back-off
Utilizing the theorem of total probability, the interference coefficient of all links is identical, i.e., ε1 = · · · = εK = ε, and
probability of the primary system can be evaluated as the interference probability of the primary network is given by
K
k−1
PI = Pr(P1 |f1 |2 > Ip ) + Pr(P2 |f2 |2 > Ip ) Pr(P1 |f1 |2 ≤ Ip ) 2 2
2 2
PI = Pr(Pk |fk | > Ip ) Pr(P |f | < Ip ). (10)
+ · · · + Pr(PK |fK | > Ip ) Pr(PK−1 |fK−1 | > Ip ) . . . k=1 =1
2
× Pr(P1 |f1 | ≤ Ip ) From (7), we can rewrite (10) as follows:
K
k−1
K k−1
=
2
Pr(Pk |fk | > Ip )
2
Pr(P |f | ≤ Ip ). (6) 1−Φ 1+Φ
PI = , (11)
k=1 =1 2 2
k=1
2
To compute (6), we first need to derive Pr(Pk |fk | > Ip ) and ε−1
2 where Φ = √ . Similarly, it is easy to see that
Pr(Pk |fk | ≤ Ip ). Before giving continuity to our analysis, (ε+1)2 −4ρ2 ε
the following lemma is of importance in this regard. ⎛ ⎞K
Lemma 1: For two given random variables |fk |2 and K
1+Φ 1 1 − ε
|2 , which are
|f˜k correlated with correlation coefficient ρ , PI = 1− = 1− ⎝ + ⎠ . (12)
2 2 2 2
|fk |2 2 (1+ε) −4ρ ε
Pr ˜ 2 > z is given by
|fk |
⎛ ⎞ It follows from (12) that in the limited cases of ρ, the
⎡ ⎤
2 interference OP of primary networks becomes
⎜ |fk | ⎟ 1 1−z ⎧
Pr ⎝ 2 > z ⎠ = ⎣1 + ⎦. (7) K
˜ 2 ⎨
fk (1 + z)2 − 4ρ2 z 1 − 1
2 + √ 1−ε
, ρ=0 .
PI = 2 (1+ε)2 (13)
⎩
Proof: The proof can be easily obtained by making use 1 − 21K , ρ=1
of the definition of the first order Marcum Q-function [16]
2) Non-identical back-off coefficients: While identical
along with the help of [17, Eq.(6-60)] and
[18, Eq. (3)]. back-off coefficients simplifies our analysis, in certain envi-
|fk |2
It is noted from (7) that Pr 2 >z depends only on ronments, it may be more appropriate to consider the non-
|f˜k |
the correlation coefficient (ρ) and the threshold (z), not the identical case, i.e., ε1 = ε2 = · · · = εK . In practice, energy
average channel power of the interference link (λI,k ). Such a conditions at each secondary node can be different and the
phenomenon will significantly affect the system design, which distance between any two nodes is usually not equal, which
is presented in the next part. can cause different back-off power control coefficients among
Lemma 1 allows us to compute the interference probability the relaying links. Similar to the previous case, we have
of primary systems. In particular, letting z = 1 in (7) and K
k−1
2 2
combining the resultant with (6) gives PI = Pr(Pk |fk | > Ip ) Pr(P |f | < Ip )
⎛ ⎞ ⎛ ⎞ k=1 =1
K 2 k−1
2
⎜ |fk | ⎟ ⎜ |f | ⎟ 1 − Φ1 (1 + Φ1 )(1 − Φ2 )
PI = Pr ⎝ 2 > 1⎠ Pr ⎝ 2 < 1⎠ = + + ···
˜ ˜ 2 2
k=1 fk =1 f (1 + Φ1 ) · · · (1 + ΦK−1 )(1 − ΦK )
+
K
1 1 2K
= = 1− K. (8) 1 − Φk 1 + Φ
K k−1
2k 2 = , (14)
k=1
2 2
As a special case, we consider K = 2 in (8) leading to PI = k=1 =1
εk −1
0.75, which agrees with the result reported in [12, Eq. (7)]. where Φk = √ . After some manipulations, (14)
The expression in (8) illustrates the relationship between (εk +1)2 −4ρ2 εk
can be expressed in a mathematically tractable form as
the interference outage (PI ) and the number of hops (K)
showing that the minimum of the interference outage is 1/2 K
1 + Φk
and it increases with the number of hops. Furthermore, it PI = 1 − . (15)
is easy to show that PI → 1 when K approaches infinity. 2
k=1
As such, maintaining acceptable interference for the primary At this point, a natural question arises for a given ρ is what
network under imperfect CSI is one of the critical concerns for kind of back-off coefficients gives less interference on the
cognitive networks. To guarantee the interference probability primary network. The following theorem will answer such a
from the secondary network, back-off transmit power control question.
mechanism is a simple and efficient solution. We denote εk Theorem 1: For a given fixed ρ for all interference links,
with 0 < εk ≤ 1 as the back-off power control coefficient of the interference outage of primary networks, PI , will achieve
hop k, then the reduced transmit power at hop k can be given its minimum at
by ⎛ ⎞K
εk Ip 1 1 − ε
Pk = εk Pk = 2 . (9) PI = 1 − ⎝ + ⎠ , (16)
˜ 2 2
fk 2 (1 + ε) − 4ρ ε 2
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4867
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4868 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013
√ e−x
$ 1
%
Proof: From (28), it is straightforward to conclude that In (32), we approximate erfc( x) by √ πx
1 − 2x for large
the performance loss of secondary systems at high SNRs is x [22], the system BER is further approximated as
−10log10 ε dB. √
υj
2 M
K log
φjn 1
C. Bit error rate of secondary networks BER ≈ √ √
k=1 j=1 n=0 M log2 M 2ωn αk
In order to derive the end-to-end BER, we first derive the √ K
single-hop average BER, BERk with k = 1, . . . , K. For (b) M − 1 N0 λI,k
≈√ √ . (37)
square M -QAM, the average BER over Rayleigh fading is M log2 M k=1 εk Ip λD,k
given as [19]1
√ where (b) is based on the fact that the first term, i.e., j = 1,
∞ log υj
2 M
1 √ is dominant in the inner summation of (37).
BERk = √ √ φjn erfc ( ωk γ) fγ k (γ)dγ, Moreover, assuming independent and identically distributed
M log2 M j=1 n=0
0 (i.i.d.) fading for all links, i.e., α1 = α2 = · · · = αK = α,
(31) the end-to-end BER can be simplified to
where erfc(.) is the complementary error function [20, Eq. √
( M − 1)KN0 λI
j
(4A.6)]. Here, υj , φn , and ωn are defined respectively as BER ≈ √ √ . (38)
√ 2 M log2 M εIp λD
υj = (1 − 2−j ) M − 1, ωn = (2n+1) 3log2 M
, and φj
n =
n2
√
j−1 " j−1 # 2M−2 Lemma 3: Under the constraint of interference outage PI ,
j−1 n2 1
(−1) M 2 − √
M
+ 2 . Using the result in Ap- −10log ε dB is the performance loss in terms of BER since
10
pendix A, we have the closed-form expression of BERk as back-off technique is applied.
√
2 M!
log! υj $ √ $√ %% Proof: The proof is omitted since it can be done in the
j ωn αk
√
K φ n 1− ω α
n k e πerfc ω α
n k same way as for OP.
j=1 n=0
BER = √ √ .
k=1
M log2 M D. Ergodic capacity of secondary networks
(32) In this section, we will derive the ergodic capacity of
For a given set of average BER of K hops, BER1 , . . . , BERK , secondary networks under the interference outage constraint
we are now in a position to derive the end-to-end BER. of the primary network. Denoting C as the ergodic capacity
By taking into account the fact that an even number of of the secondary network, we have
wrong single-hop bit transmissions between the source and ∞
the destination will make a right bit transmission, we have 1
C= log2 (1 + γ)fγΣ (γ)dγ
[21] K
0
K
K
∞ K
BER = BERu (1 − 2BERv ) (33) (c) 1 1 αk
= dγ, (39)
u=1 v=u+1 K log 2 γ+1 γ + αk
0 k=1
After several manipulations, a simplified expression for the ( )* +
end-to-end BER can be written as C1
& K
'
1 where step (c) follows after the use of integration by parts.
BER = 1− (1 − 2BERk ) . (34) Theorem 6: The ergodic capacities of secondary multihop
2
k=1 networks for an arbitrary number of hops are given as
It is worth noting that the form of (34) is new and has not & K K K+1−k '
1 α α 1
been reported in the literature. Compared to (33), (34) is more C= log α −
mathematically tractable. Besides, (34) reveals that the BER K log 2 α−1 α−1 k−1
k=2
will achieve its minimum if and only if BER1 = BER2 = (40)
· · · = BERK 2 .
Theorem 5: At high SNRs, the system BER is approxi- for i.i.d. channels, or
⎛ ⎞
mated as follows: K
K
√ 1 αk ⎝ α ⎠
K
M − 1 N0 λI,k C=
K log 2 αk − 1 αk − α
log αk (41)
BER = √ √ . (35) k=1 =1,=k
M log2 M εk Ip λD,k
k=1
for independent and non-identically distributed (i.n.d.) chan-
K !
K
nels, or
Proof: By utilizing the fact that (1 − xk ) ≈ 1− xk ⎡ ⎤
k=1 k=1 N N ri
for small xk , from (34), we have 1 Aij
C= ⎣ Ai,1 log Θi + ⎦
K
K log 2 i=1 i=1 j=2
(j − 1)Θi j−1
BER ≈ BERk (36)
(42)
k=1
for generalized channels.
1 Although we only consider the BER performance for square M -QAM
modulation, the BER derivation can be applied to any general constellation
Proof: The proof can be found in Appendix B.
by using the same approach. The exact capacity expression in (40), (41), and (42) involve
2 The proof follows from the inequality of arithmetic and geometric means. only elementary mathematical functions and therefore avoids
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4869
Interference Probability
specialized to two SNR regimes of interest, i.e., low and high
SNRs, as follows. 0.5
1 ∂ (ui −n) 10
2 4 6 8 10 12 14 16 18 20
Bi,n = [(γ + βi ) fγΣ (γ)]
ui
. K
(ui − n)! ∂γ (ui −n)
γ=−βi Fig. 3. The maximum back-off coefficient versus number of hops.
(46)
Furthermore, In is the auxiliary function, which is of the form cognitive destination are placed at coordinates (xp , xp ), (0, 0)
⎧ π and (1, 0), respectively. To take into account the effect of
√ , n=2
⎨ 2 βi pathloss, we set λA,B = d−η A,B , where η is the path loss exponent
n
In (βi ) =
⎩
π
(2 − 5), n > 2 . (47) with A ∈ {T0 , . . . , TK } and B ∈ {PU, T1 , . . . , TK−1 }.
3
n−
(n−1)!βk 2 2n−1 =3 Fig. 2 illustrates the effect of the number of hops on the
interference probability. As can be clearly seen, the increase
Proof: Please refer to Appendix C.
of K will increase the interference probability of the primary
Theorem 8 indicates that the system Shannon capacity at
networks but with diminishing returns. Fig. 2 also shows that
low SNRs increases according to the number of hops with
the interference probability is a decreasing function of the
respective gain C(K+1)
C(K)
2K−1
= 2(K+1) . It is straightforward to
correlation ratio, which means that the interference probability
show that the gain becomes one since the number of hops
should decrease as the channel estimation quality increases.
approaches infinity.
Note that PI is more sensitive to the value of ρ that is close to
Finally, note that our derived approach for the system per-
1 since we observe a higher dynamic range in the interference
formance metrics (including OP, BER, and ergodic capacity)
probability performance for such values.
is highly precise at high and low SNRs. Additionally, the
In Fig. 3, the maximum back-off power control coefficient
closed-form expressions contain only elementary functions,
is plotted as a function of the number of hops. Clearly, lower
and thus its evaluation is instantaneous regardless of network
target PI results in smaller εmax and this ratio seems to slowly
and channel settings.
diminish as K increases. The interesting conclusion that one
can draw from this figure is that while back-off technique
IV. N UMERICAL R ESULTS guarantees the minimum interference on primary network
In this section, representative numerical examples are pro- in terms of PI , this gain comes at the expense of certain
vided to highlight the effect of imperfect CSI of interference secondary performance loss on secondary network since the
links on the performance of the primary network and the transmit power is reduced by εmax .
secondary cognitive multihop network. The network topology Fig. 4 is a plot of the maximum number of hops, namely
is based on the assumption that the secondary network is Kmax , as computed from (23), versus the back-off power
placed on a straight line connecting the secondary source control coefficient in the constraint of different levels of inter-
and the secondary destination. Each cognitive relay node is ference probability. As expected, higher primary interference
equidistant from each other, i.e., dTk ,Tk+1 = 1/K for all k. We probability allows a higher number of hops for secondary
further assume that the PU-Rx, the cognitive source and the networks. In addition, since Kmax is established for a given
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4870 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013
⎧ / 0
⎪
⎪ 1
!K
1
⎪
⎨ K log 2 log α − k−1 , i.i.d. channels
C→ k=2 . (43)
⎪
⎪ !
K K
⎪
⎩
1
K (−1)K−1 α
αk −α log2 αk , i.n.d. channels
k=1 =1,=k
⎧
⎪
⎪ !
K
K−1
K √
π αk
⎪
⎪
1
(−1) α
2 , i.n.d. channels
⎪
⎪ K αk −α
⎪
⎨ k=1 =1,=k
K+1
C≈ √ (2−5) , (45)
⎪
⎪
π α =3
, i.i.d. channels
⎪
⎪ K! 2K
⎪
⎪ !
M ! ui
⎪
⎩ 1
Bi,n In (βi ), generalized channels
K
i=1 n=2
0
30 10 Exact
P =0.5
I Approximation
PI=0.3
25
Simulation
P =0.1
I
−1
P =0.05
I
10
20
ε = εmax
max
15
K
−2
−3
5 10
ε=1
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
−4
ε 10 K=3
Fig. 4. The maximum number of hops for secondary networks versus back-
off coefficient. 4−QAM
0 0 10 20 30 40 50
10 Average SNR [dB]
ε=ε
max Fig. 6. BER of secondary network for 4-QAM modulation versus average
SNR.
−1
10
14
Outage Probability
Exact
K=1 12 Approximation
10
−2 Simulation
10 K=1
Capacity
−3
8
10 K=3
ε=1
Exact 6
− log εmax
Approximation
Simulation
10
−4 4
0 10 20 30 40 50
Average SNR [dB] K=3
2
Fig. 5. Outage probability of secondary network versus average SNR.
0
0 10 20 30 40 50
PI , only secondary networks with the number of hops equal Average SNR [dB]
to or smaller than Kmax is valid. For example, only direct Fig. 7. Ergodic capacity of secondary network versus average SNR.
transmission is acceptable for secondary networks regardless
of secondary channel settings if PI and ε are chosen at 0.1 the back-off technique has no effect on the system diversity
and 0.35, respectively. except for the system coding gain.
In Figs. 5 and 6, we plot the OP and BER of secondary Figure 7 shows the ergodic capacity and its approximation
networks versus average SNRs. Here we also plot the cor- at high SNRs, as given in (43), as a function of average SNRs.
responding no back-off case as a benchmark to evaluate the Two cases of network topologies, i.e., K = 1 and K = 3, are
performance loss. Both figures confirm that a lower OP is considered. It can be observed that for average SNRs higher
achieved by increasing the number of hops in secondary than 20 dB, the performance loss gap becomes almost steady.
networks. For high average SNRs, the approximations (28) and We further observe that the secondary network with K = 3
(35) match the simulation results, confirming the correctness has worse capacity than with K = 1. This is expected due to
of the analysis approach. Another interesting observation is the orthogonal channels used in secondary networks.
that a log εmax performance loss between the two systems is Figure 8 shows the tightness of proposed approximation for
found; however, the slope of all curves are the same, that is, the system ergodic capacity at low SNRs, e.g., ranging from
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4871
0.6
K = {2,3,4} Θ= dγ. (A.4)
π γ + αk
0.4 0
√
0.2 Making a change of integration variables in (A.4), i.e., u = γ
and with the help of [24, Eq. (3.32.3) and Eq. (7.1.11)], we
0 have
−20 −15 −10 −5 0 5 10 15
Average SNR [dB]
∞
Fig. 8. Ergodic capacity of secondary network versus average SNR. u2 −ωp u2
Θ=2 2
e du
u +b
-20 dB to 15 dB. The asymptotic bounds are quite tight in this 0
⎡ ⎤
case. An important result here is that the capacity at low SNRs ∞ ∞
2 b 2
increases linearly with K, unlike the high SNR behavior. This = 2 ⎣ e−ωp u du − e−ωp u du⎦
effect has also been reported in [23] and it can be explained u2 + b
0
by using the fact that increasing number of hops in linear √ √0 √
= 1 − ωn αk eωn αk πerfc ( ωn αk ) . (A.5)
networks at low SNRs corresponds to increasing effective
SNRs. Finally, along with its simplicity, i.e., requiring only
elementary functions, the approximation is found to provide a A PPENDIX B
tight fit for most values of K. P ROOF OF T HEOREM 6
To obtain C, we first need to derive C1 in (39). De-
V. C ONCLUSIONS noting {Θ1 , . . . , ΘN } as the distinct elements of the set
This paper has studied the performance of the primary {1, α1 , . . . , αK }, after performing partial fraction expansions,
and secondary multihop networks in the presence of imper- we rewrite C1 as
fect channel knowledge of the primary-secondary links. To ri
N
∞
protect the primary communication, we proposed to apply Aij
C1 = j+1 dγ, (B.1)
the back-off technique so that the interference probability i=1 j=1 0 (γ + Θi )
at the primary network is guaranteed. To quantify the loss
due to imperfect CSI, three performance metrics of secondary where the partial-fraction coefficient, Aij , is computed as
multihop networks including OP, BER and ergodic capacity , (ri −j) -
1 ∂
[(γ + Θi ) Ci ]
ri
are derived over Rayleigh fading channels. High-and-low SNR Aij = . (B.2)
analysis has also been derived to give insights into the system (ri − j)! ∂γ (r i −j)
γ=−Θi
behaviors. The derived closed-form analytical expression is Note that the closed-form expression for the inner integral
validated by simulations showing an excellent match between does not exist when j = 1. By separating the summation in
the numerical and simulation results. (B.1) into two summations and making use of the fact that
!
N
ACKNOWLEDGMENT Ai1 = 0, the closed-form expression of C1 is given as
j=1
This research is funded by Vietnam National Foundation for follows:
Science and Technology Development (NAFOSTED) under N
ri
N
grant number 102.04-2012.20. Aij
C1 = Ai,1 log Θi + . (B.3)
i=1 i=1 j=2
(j − 1)Θi j−1
A PPENDIX A
Finally, substituting (B.3) into (39), we obtain the closed-form
P ROOF OF E Q . (32)
expression of the ergodic capacity of secondary networks.
This appendix is to solve the following integral, i.e., For the i.i.d. case, i.e., α1 = · · · = αN = α = 1, C1 is
∞ rewritten as
√
Θ = erfc ( ωk γ) fγk (γ)dγ, (A.1) ∞ K
1 α
0 C1 = dγ
γ +1 γ+α
where f (γ) is obtained from (26) as
γk 0
/ 0 K ∞
d γ αk α 1 1
fγk (γ) = = (A.2) = − dγ
dγ γ + αk 2. α−1 γ+1 γ+α
(γ + αk ) 0
Using integration by parts, we have K
∞
αK 1
$√ % ∞ ∞ √ −ωk γ − dγ
γerfc ωk γ
K+1−k k
ωk γe (α − 1)
k=2 (γ + α)
Θ= + dγ . (A.3) 0
γ + αp π γ + αk K K
K+1−k
γ=0 0 α α 1
( )* + ( )* + = log α − . (B.4)
Θ1 α−1 α−1 k−1
Θ2 k=2
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
4872 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER 2013
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.
BAO et al.: ON THE PERFORMANCE OF COGNITIVE UNDERLAY MULTIHOP NETWORKS WITH IMPERFECT CHANNEL STATE INFORMATION 4873
∞ K
1 αk
C1 =
γ+1 γ + αk
0 k=1
⎡ ⎛ ⎞ ⎤
∞ K
K K
αk 1 K−1 αk α 1
= ⎣ − (−1) ⎝ ⎠ ⎦dγ
αk − 1 γ + 1 αk − 1 αk − α γ + αk
0 k=1 k=1 =1, = k
⎛ ⎞
K K
K−1 αk ⎝ α ⎠ log αk .
= (−1) (B.6)
αk − 1 αk − α
k=1 =1,=k
[16] A. H. Nuttall, “Some integrals involving the Qm function,” IEEE Trans. Trung Q. Duong (S’05, M’12, SM’13) received his
Inf. Theory, vol. 21, no. 1, pp. 95–96, Jan. 1975. Ph.D. degree in Telecommunications Systems from
[17] A. Papoulis and S. U. Pillai, Probability, Random Variables, and Blekinge Institute of Technology (BTH), Sweden
Stochastic Processes, 4th ed. McGraw-Hill, 2002. in 2012, and then continued working at BTH as a
[18] M. K. Simon and M. S. Alouini, “Some new results for integrals project manager. Since 2013, he has joined Queen’s
involving the generalized Marcum Q function and their application to University Belfast, UK as a Lecturer (Assistant
performance evaluation over fading channels,” IEEE Trans. Wireless Professor). He held a visiting position at Polytechnic
Commun., vol. 2, no. 4, pp. 611–615, 2003. Institute of New York University and Singapore
[19] K. Cho and D. Yoon, “On the general BER expression of one- and two- University of Technology and Design in 2009 and
dimensional amplitude modulations,” IEEE Trans. Commun., vol. 50, 2011, respectively. His current research interests
no. 7, pp. 1074–1080, Jul. 2002. include cooperative communications, cognitive radio
[20] M. K. Simon and M.-S. Alouini, Digital Communication over Fading networks, physical layer security, massive MIMO, cross-layer design, mm-
Channels, 2nd ed., ser. Wiley Series in Telecommunications and Signal waves communications, localization for radios and networks. Dr. Duong
Processing. John Wiley & Sons, 2005. has been a TPC chair for many international conferences and workshops
[21] K. Dhaka, R. K. Mallik, and R. Schober, “Performance analysis of including the most recently IEEE GLOBECOM13 Workshop on Trusted
decode-and-forward multi-hop communication: a difference equation Communications with Physical Layer Security. He currently serves as an
approach,” IEEE Trans. Commun., vol. 60, no. 2, pp. 339–345, Feb. Editor for the IEEE C OMMUNICATIONS L ETTERS , Wiley Transactions on
2012. Emerging Telecommunications Technologies and the Lead Guest Editor of
[22] C. Tellambura and A. Annamalai, “Efficient computation of erfc(x) for the special issue on “Secure Physical Layer Communications” of the IET
large arguments,” IEEE Trans. Commun., vol. 48, no. 4, pp. 529–532, Communications, Guest Editor of the special issue on “Green Media: The
Apr. 2000. Future of Wireless Multimedia Networks” of the IEEE Wireless Commu-
[23] M. Sikora, J. N. Laneman, M. Haenggi, D. J. Costello, and T. E. Fuja, nications Magazine, Guest Editor of the special issue on “Cooperative
“Bandwidth- and power-efficient routing in linear wireless networks,” Cognitive Networks” of the Eurasip Journal on Wireless Communications
IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2624–2633, Jun. 2006. and Networking, Guest Editor of special issue on “Security Challenges and
[24] I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of Issues in Cognitive Radio Networks” of the Eurasip Journal on Advances in
Integrals, Series and Products, 7th ed. Elsevier, 2007. Signal Processing. He is awarded the Best Paper Award at the IEEE Vehicular
Technology Conference (VTC-Spring) in 2013 and the Exemplary Reviewer
Certificate of the IEEE Communications Letters in 2012.
Vo Nguyen Quoc Bao (M’10) received the B.E.
and M.Eng. degree in electrical engineering from Ho Chintha Tellambura (F’11) received the B.Sc. de-
Chi Minh City University of Technology (HCMUT), gree (with first-class honor) from the University of
Vietnam, in 2002 and 2005, respectively, and Ph.D. Moratuwa, Sri Lanka, in 1986, the M.Sc. degree in
degree in electrical engineering from University of Electronics from the University of London, U.K.,
Ulsan, South Korea, in 2009. In 2002, he joined in 1988, and the Ph.D. degree in Electrical Engi-
the Department of Electrical Engineering, Posts and neering from the University of Victoria, Canada,
Telecommunications Institute of Technology (PTIT), in 1993. He was a Postdoctoral Research Fellow
as a lecturer. Since February 2010, he has been with the University of Victoria (1993-1994) and the
with the Department of Telecommunications, PTIT, University of Bradford (1995-1996). He was with
where he is currently an Assistant Professor. His ma- Monash University, Australia, from 1997 to 2002.
jor research interests are modulation and coding techniques, MIMO systems, Presently, he is a Professor with the Department
combining techniques, cooperative communications, and cognitive radio. Dr. of Electrical and Computer Engineering, University of Alberta, Canada. His
Bao is a member of Korea Information and Communications Society (KICS), research interests focus on communication theory dealing with the wireless
The Institute of Electronics, Information and Communication Engineers physical layer. Prof. Tellambura was an Associate Editor for the IEEE
(IEICE) and The Institute of Electrical and Electronics Engineers (IEEE). T RANSACTIONS ON C OMMUNICATIONS and the Area Editor for Wireless
He is also a Guest Editor of EURASIP Journal on Wireless Communications Communications Systems and Theory in the IEEE T RANSACTIONS ON
and Networking, special issue on “Cooperative Cognitive Networks” and IET W IRELESS C OMMUNICATIONS. He was Chair of the Communication Theory
Communications, special issue on “Secure Physical Layer Communications.” Symposium in Globecom’05 held in St. Louis, MO
Authorized licensed use limited to: International Institute of Information Technology Bangalore. Downloaded on August 07,2022 at 06:52:16 UTC from IEEE Xplore. Restrictions apply.