Algorithms For 5G Physical Layer
Algorithms For 5G Physical Layer
Original Citation:
Pawan Dhakal (2017). Algorithms for 5G physical layer. PhD thesis
Availability:
This version is available at : http://porto.polito.it/2670627/ since: May 2017
Published version:
DOI:10.6092/polito/porto/2670627
Terms of use:
This article is made available under terms and conditions applicable to Open Access Policy Arti-
cle ("Creative Commons: Attribution 3.0") , as described at http://porto.polito.it/terms_and_
conditions.html
Porto, the institutional repository of the Politecnico di Torino, is provided by the University Library
and the IT-Services. The aim is to enable open access to all the world. Please share with us how
this access benefits you. Your story matters.
By
Pawan Dhakal
******
Supervisor(s):
Prof. Roberto Garello, Supervisor
Politecnico di Torino
2017
Declaration
I hereby declare that, the contents and organization of this dissertation constitute my
own original work and does not compromise in any way the rights of third parties,
including those relating to the security of personal data.
Pawan Dhakal
2017
There is a great activity in the research community towards the investigations of the
various aspects of 5G at different protocol layers and parts of the network. Among
all, physical layer design plays a very important role to satisfy high demands in
terms of data rates, latency, reliability and number of connected devices for 5G
deployment. This thesis addresses the latest developments in the physical layer
algorithms regarding the channel coding, signal detection, frame synchronization
and multiple access technique in the light of 5G use cases. These developments are
governed by the requirements of the different use case scenarios that are envisioned
to be the driving force in 5G.
All chapters from chapter 2 to 5 are developed around the need of physical layer
algorithms dedicated to 5G use cases. In brief, this thesis focuses on design, analysis,
simulation and the advancement of physical layer aspects such as 1. Reliability based
decoding of short length Linear Block Codes (LBCs) with very good properties in
terms of minimum hamming distance for very small latency requiring applications. In
this context, we enlarge the grid of possible candidates by considering, in particular,
short length LBCs (especially extended BCH codes) with soft-decision decoding;
2. Efficient synchronization of preamble/postamble in a short bursty frame using
modified Massey correlator; 3. Detection of Primary User activity using semi-
blind spectrum sensing algorithms and analysis of such algorithms under practical
imperfections; 4. Design of optimal spreading matrix for a Low Density Spreading
(LDS) technique in the context of non-orthogonal multiple access. In such spreading
matrix, small number of elements in a spreading sequences are non zero allowing
each user to spread its data over small number of chips (tones), thus simplifying the
decoding procedure using Message Passing Algorithm (MPA).
Publicationss
Some of the contents of this thesis have previously appeared or will appear in the
following publications:
Book Chapter
Journal
1. [22] M. Baldi and M. Bertinelli and F. Chiaraluce and P. Dhakal and R. Garello
and N. Maturo and E. Paolini, “A Study on State-of-the-Art Space Mission
Telecommand Receivers”, In IEEE Aerospace and Electronic Systems Maga-
zine, 2017. In Press.
Conference Proceedings
1. [48] Pawan Dhakal, Roberto Garello, Shree Krishna Sharma, Symeon Chatzino-
tas and Bjorn Ottersten, “On the Error Performance Bound of Ordered Statis-
vii
tics Decoding of Linear Block Codes”, IEEE Intl. Conf. on Commun. 2016,
Jun 2016, http://dx.doi.org/10.1109/ICC.2016.7510798.
4. [147] Daniel Riviello, Pawan Dhakal, Roberto Garello, “On the Use of Eigen-
vectors in Multi-Antenna Spectrum Sensing with Noise Variance Estimation”,
2nd Intel. Conf. in Signal Processing and Integrated Networks, Feb. 2015,
http://dx.doi.org/10.1109/SPIN.2015.7095339.
5. [45] Pawan Dhakal, Daniel Riviello, Roberto Garello, “SNR Wall Analysis
of Multi-Sensor Energy Detection with Noise Variance Estimation”, 11th
IEEE Intl. Symp. on Wireless Commun. Systems (ISWCS), Aug. 2014,
http://dx.doi.org/10.1109/ISWCS.2014.6933440.
6. [46] Pawan Dhakal, Roberto Garello, Federico Penna and Daniel Riviello,
“Impact of Noise Estimation on Energy Detection and Eigenvalue Based Spec-
trum Sensing Algorithms”, IEEE Intl. Conf. on Commun. 2014, Jun 2014,
http://dx.doi.org/10.1109/ICC.2014.6883512.
7. [47] Pawan Dhakal, Daniel Riviello, Roberto Garello and Federico Penna,
“Hybrid Approach Analysis of Energy Detection and Eigenvalue Based Spec-
trum Sensing Algorithms with Noise Power Estimation”, COCORA 2014,
The Fourth Intl. Conf. on Advances in Cognitive Radio, Feb. 2014, http:
//www.thinkmind.org/download.php?articleid=cocora_2014_1_40_80029.
Contents
Acronyms xviii
1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Structure and Contribution of This Thesis . . . . . . . . . . . . . . 11
3 Frame Synchronization 32
Contents ix
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.1.1 Machine to Machine Communication . . . . . . . . . . . . 32
3.2 Introduction to Frame Synchronization Problem . . . . . . . . . . . 34
3.3 System Model and Problem discussion . . . . . . . . . . . . . . . . 35
3.4 Likelihood Ratio Test . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.4.1 Equivalency of Massey Formulation and Chiani/Martini for-
mulation of LRT . . . . . . . . . . . . . . . . . . . . . . . 38
3.5 Hard and Soft Correlation . . . . . . . . . . . . . . . . . . . . . . . 39
3.6 The Massey Correlation Detector . . . . . . . . . . . . . . . . . . . 40
3.7 Analytical computation of the detector performances under H1 . . . 41
3.7.1 Miss-Detection Probability . . . . . . . . . . . . . . . . . 45
3.8 Analytical computation of the detector performances under H0 . . . 45
3.8.1 False-Alarm Probability . . . . . . . . . . . . . . . . . . . 50
3.8.2 False-alarm lower bound . . . . . . . . . . . . . . . . . . . 50
3.9 ROC curves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.10 The Extended Massey correlation detector . . . . . . . . . . . . . . 54
3.10.1 Analytical computation of the Extended Massey detector
pdf under H1 . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.10.2 Analytical computation of the Extended Massey detector
pdf under H0 . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.10.3 Extended Massey detector performances . . . . . . . . . . . 59
3.11 Comparison against LRT, soft and hard correlation . . . . . . . . . 60
3.11.1 Miss-detection vs. SNR performances . . . . . . . . . . . . 63
3.12 Some Aspects for Practical Implementation . . . . . . . . . . . . . 65
References 189
List of Figures
for single antenna vs. multi antenna environment for different SNR
assuming perfect knowledge of noise variance. Parameters: K =
5, 10, 15 and 20, P’D = 0.9, P’Fa = 0.1 . . . . . . . . . . . . . . . 129
4.25 Variation of sample complexity N as the SNR approaches SNR wall
for ED, Parameters: K = 5, P’D = 0.9, P’Fa = 0.1 [use x = 10 log10 β
in Equation (4.174)] . . . . . . . . . . . . . . . . . . . . . . . . . 131
4.26 Probability distribution of normalized noise variance estimate V .
Parameters: S = 2, K = 2, M = 10 . . . . . . . . . . . . . . . . . . 132
4.27 Variation of noise uncertainty level with number of slots S used for
noise variance estimation. . . . . . . . . . . . . . . . . . . . . . . . 134
4.28 Variation of SNR wall level with number of auxiliary slots S used
for noise variance estimation . . . . . . . . . . . . . . . . . . . . . 135
4.29 Variation of sample complexity N as the SNR approaches SNR
wall for varying number of auxiliary slots used for noise variance
estimation in HED1 . . . . . . . . . . . . . . . . . . . . . . . . . . 136
4.30 Primary user traffic scenario and sensing slot classification . . . . . 139
4.31 Pdfs of the ED decision statistic: Parameters: N = 50, K = 4, M f =
150, Mb = 150 and SNR = −6 dB . . . . . . . . . . . . . . . . . . 145
xvi List of Figures
Acronyms / Abbreviations
BP Belief Propagation
CP Cyclic Prefix
ED Energy Detection
EU European Union
GF Galois Field
ML Maximum Likelihood
NP Neyman Pearson
RS Reed Solomon
SW Synchronization Word
xxii Acronyms
UE User Equipment
Introduction
1.1 Motivation
Wireless communication networks are perhaps one of the most important element
in the global Information and Communication Technologies (ICT) strategy, under-
pinning many other industries. It is one of the fastest growing and most dynamic
sectors in the world. The phenomenal success of wireless mobile communications
is mirrored by a rapid pace of technology innovation. From first generation (1G)
analog FM cellular systems in 1981 to fourth generations (4G) Long Term Evolu-
tion - Advanced in 2011, the wireless mobile network has transformed from a pure
telephony system to a network that can transport rich multimedia contents [27, 62].
Long Term Evolution (LTE) and its extension have now been deployed around the
globe to deliver high quality, low latency video and multimedia applications for
wireless devices. Table 1.1 illustrates the main features of the 3rd Generation Part-
nership Project (3GPP) standards now in the market, highlighting the trend towards
widespread use of spectrum, higher bandwidth, higher spreading efficiency and lower
latency.
In 4G systems, an advanced radio interface is used with orthogonal frequency-
division multiplexing (OFDM), Multiple-Input Multiple-Output (MIMO), and link
adaptation technologies. 4G wireless networks can support data rates of up to 1 Gb/s
for low mobility, such as nomadic/local wireless access, and up to 100 Mb/s for high
mobility, such as mobile access. However, it is widely agreed that similar to previous
technologies, the current technologies also follow a similar technology maturity
2 Introduction
where only incremental improvements and small amounts of new spectrum can be
expected; where a mere evolution of the status quo cannot achieve the extreme higher
aggregate data rates and much lower latency required by next generation technology.
The development of wireless technologies has greatly improved people’s ability
to communicate and live in both business operations and social functions. Essential
services such as e-banking, e-learning, and e-health will continue to proliferate
and become more mobile. On-demand information and entertainment (e.g., in the
form of augmented reality) will progressively be delivered over mobile and wireless
communication systems. More and more people crave faster internet access on the
move, trendier mobile phones, and, in general, instant communication with others or
access to information. Every year, the demand in mobile broadband communications
is increasing dramatically as more and more users subscribe to mobile broadband
packages. In addition, smart phones, super-phones, tablets and laptops with powerful
multimedia capabilities and applications are becoming increasingly popular and
are creating new demands on mobile broadband. The possible evolution of Mobile
Broad-band (MBB) from IMT-2000 and IMT-Advanced towards 2020 and beyond is
as shown in Figure 1.1 [66], based on the assumption that the traffic requirements
would be increased by a thousand times over the next decade.
New data services and applications, for example pervasive 3D multimedia, are
making the experience of using mobile broadband better and more exciting. Further-
more, it is generally predicted that today’s dominating scenarios of human-centric
communication will, in the future, be complemented by a tremendous increase in
the numbers of communicating machines. This so-called Internet of Things will
make our everyday life more efficient, comfortable, and safe. These trends, shown in
Figure 1.2, are expected to maintain their momentum over the next decade and will
be complemented by the arrival of billions of machine devices and related machine-
1.1 Motivation 3
Thanks largely to the annual visual network index (VNI) reports released by
Cisco, we have quantitative evidence that the wireless data explosion is real and will
continue. Driven largely by smartphones, tablets, and video streaming, the most
recent (Feb. 2016) VNI report [39] shows, just in a decade, the amount of mobile
4 Introduction
data has increased by well over a factor of 4000-fold and almost 400-million fold
over the past 15 years. Mobile networks carried fewer than 10 gigabytes per month
in 2000, and less than 1 petabyte per month in 2005. In 2015, it was 3.7 exabytes per
month. Similarly, although 4G connections represented only 14 percent of mobile
connections in 2015, they already account for 47% of the mobile data traffic and for
the first time in 2015, 4G traffic exceeded 3G traffic. This deluge of data has been
driven chiefly by video thus far, but new unforeseen applications can reasonably be
expected to materialize by 2020. In addition to the sheer volume of data, the number
of devices and the data rates will continue to grow exponentially. Smart-phones
accounted for most of that growth. Global mobile devices and connections in 2015
grew to 7.9 billion, up from 7.3 billion in 2014.
Further, machine-type applications are becoming important in addition to the
human centric communications that have been dominating the cellular scene so far.
In fact, the number of communicating machine was some point forecasted to be
trending towards the number 50 billion by 2020. The expected uptake of machine-
type and human-type wireless communications in many economic sectors and vertical
industries will lead to a large and wide diversity of communication characteristics
imposing different requirements on mobile and wireless communication systems,
e.g., in terms of cost, complexity, energy dissipation, data rate, mobility, latency, and
reliability. On the other hand, 4G networks have just about reached the theoretical
limit on the data rate with current technologies and therefore are not sufficient to
accommodate the above challenges.
All the above issues are putting more pressure on cellular service providers, who
are facing continuously increasing demand for higher data rates, larger network
capacity, higher spectral efficiency, higher energy efficiency, and higher mobility
required by new wireless applications. In this sense, we need ground breaking
wireless technologies to solve the above problems caused by trillions of wireless
devices.
Foreseeing all these future requirements to meet, the International Mobile
Telecommunication (IMT) - 2020 was established in 2013, which is dedicated
to investigate beyond 4G (B4G) or 5G wireless techniques. The aim is to connect
the entire world, and achieve seamless and ubiquitous communications between
anybody (people to people), anything (people to machine, machine to machine),
wherever they are (anywhere), whenever they need (anytime), by whatever electronic
1.1 Motivation 5
Machine type communications, will be more and more important in the future.
This will include communications for electronics and home appliances, communica-
tions for transports, communications for medical equipments and many more. A lot
of dense communications will probably be carried out by our currently existing wire-
less access technologies but some of these use cases will have so high requirements
that they will require new wireless access technologies.
Ultra reliable communications may be needed, for example, for critical infras-
tructure, or for industrial processes. And once again this may very well require
new radio access technologies. Car-to-car or car-to roadside communication will
be introduced for traffic safety and traffic control. There may be completely new
ways to communicate for example, communicating directly between devices. It is
all those together, the revolution of currently existing RAT and new complementary
RAT that is referred to as 5G.
The following spider diagram shown in Figure 1.3 is the best way to illustrate
a wide range and expansion of the 5G requirements in comparison to prior cellular
generations such as LTE-Advanced. Some of these applications can be supported
by today’s mobile broadband networks and their future evolution. However, some
other applications will impose additional and very diverse requirements on mobile
and wireless communication systems that the next generation (Fifth Generation 5G)
will have to support:
5G research has been quite active in the past years. Thus, several funded projects
and standardization bodies like Mobile and Wireless Communications Enablers
for Twenty-twenty Information Society -II (METIS - II) [1], 5th Generation Non-
Orthogonal Waveforms for Asynchronous Signalling (5GNOW) [4], 4G Americas
1.1 Motivation 7
are the increase in size of content and the number of applications requiring
high data rates. Factors include increase in camera resolution, the rise in
screen resolution with the recent introduction of 4K (8K is already expected
beyond 2020). Streaming services (audio & video), interactive video and
mobile Internet connectivity will continue to be used more broadly as more
devices connect to the Internet. Many of these applications require always-on
connectivity to push real time information and notifications to the users.
Cloud storage and applications are rapidly increasing for mobile communi-
cation platforms. This is applicable for both work and entertainment. Cloud
storage is one particular use case driving the growth of uplink data rates. In the
past, content was mostly downloaded. 5G will also be used for remote work in
the cloud which, when done with tactile interfaces, requires much lower end-
to-end latencies in order to maintain a good user experience. Entertainment,
for example cloud gaming and video streaming, is another key driver for the
increasing need for mobile broadband capacity.
With 5G, users will experience broadband access in crowded areas like con-
certs, sporting events and festivals, alleviating issues with capacity, interference
and reliability. 5G customers will also enjoy 4K movies downloaded in just
seconds without a WiFi connection. While live TV broadcasts and sporting
events will become immersive viewing experiences, as if you were at the
event in real-life. For customers, 5G will also maximize their experience in
both indoor and outdoor connectivity and offer high QoS broadband even in
challenging network conditions.
4. Critical control of remote devices: The high reliability and low latency of
5G unlocks the ability to control critical services and infrastructure. This
creates new opportunities for public safety, government, city management
and utility companies. 5G will be a key enabler of the future digital world.
It will bring about new service capabilities for industrial stakeholders thanks
to the unprecedented on-demand performance and real-time reactivity. For
example, energy and water utilities will be capable of connecting to millions
of networked devices, taking real-time, intelligent and autonomous decisions.
5G introduces the ability to remotely control devices and heavy machinery,
thus unlocking the potential for improved medical services and surgeries that
are otherwise unavailable to rural communities. 5G would also allow for heavy
machinery to be controlled from a distance, making hazardous situations safer
for humans.
Wireless and mobile communications are becoming increasingly important
for industrial application. Wires are expensive to install and maintain and the
possibility of replacing cables with reconfigurable wireless links is a tempting
opportunity for many industries. However, achieving this requires that the
wireless connection works with a similar delay, reliability and capacity as
cables and that its management is simplified. Low delays and very low error
probabilities are new requirements that need to be addressed with 5G.
The health sector has many applications that can benefit from mobile com-
munications. Communications systems enable tele-medicine, which provides
clinical health care at a distance. It helps eliminate distance barriers and can
improve access to medical services that would often not be consistently avail-
able in distant rural communities. It is also used to save lives in critical care
and emergency situations.
The vision of the 5G system, key design principles and use cases lead to require-
ments that the future mobile broadband system will need to meet. Considering all
these aspects, the work presented in this thesis addresses in particular the physical
layer problems for the use cases defined above. A more detailed description of these
problems and their contexts of application is provided next.
1.2 Structure and Contribution of This Thesis 11
The thesis is organized as follows: all chapters from Chapter 2 to 5 are developed
around the need of physical layer algorithms dedicated to above described 5G use
cases. In particular:
• Chapter 2 considers the aspect of channel coding algorithms for the ultra-low
latency use cases of 5G. In order to achieve low latency for critical control of
remote devices use case of 5G system, channel coding and modulation plays
an important role in the 5G physical layer. In this work, we enlarge the grid of
possible candidates by considering, in particular, short length LBCs (especially
eBCH codes) with soft-decision decoding. Specifically, results include:
2.1 Introduction
which multiple different services can be built on using the solutions selected from
the 5G toolbox.
M2M communication will make up a large part of the new types of services
and use cases that 5G systems will address. From a communication technology
perspective, M2M can be divided into two main categories: mMTC is about con-
nectivity for large numbers of low-cost and low-energy devices in the context of the
Internet of things; mission-critical MTC is envisioned to enable real-time control
and automation of dynamic processes in various fields, such as industrial process
automation and manufacturing, energy distribution, intelligent transport systems,
traffic safety, infrastructure protection, remote surgery and requires communication
with very high reliability and availability, as well as very low end-to-end latency
going down to millisecond level. In short, the requirements of mission-critical MTC
have to be fulfilled in three dimensions: latency, reliability and availability.
a. Latency refers to the time delay between data being generated – e.g., at a
sensor – and the same data being correctly received – e.g., by the actuator.
The most stringent requirement on the end-to-end latency may be 1 ms, as
explained for example in ITU - Telecommunication Standards Sector (ITU-T)
Technology Watch Report on the Tactile Internet [5].
c. System availability has to ensure that critical applications are not in outage
when they are needed. To equate availability of wireless and wired solutions,
an availability of 99.999% can be sought.
has a much greater complexity than channel encoder. This is the reason why the
channel decoder is typically the main concern when designing a channel code. More
specifically, the decoding complexity plays a dominant role in defining decoding
delays. Among the most attractive options emerged till now, some of the potential
options are discussed hereby.
Low complexity decoding of LBCs has long been investigated by many coding
theorists: a detailed bibliography of the contributions in this area can be found
in [155]. Some examples of decoding algorithms are 1) Exhaustive Decoding:
Possible only for very short length codes, 2) Algebraic Decoding: Exploiting the
property of algebraic designed block codes, 3) Viterbi decoding [41, 173]: Although
all the LBCs possess the trellis structure which is the backbone of Viterbi decoding,
the number of states (min{2k , 2n−k }) becomes too large to practically implement for
long length codes and 4) Iterative decoding: Iterative decoding of powerful classical
codes such as BCH, and RS codes are quite sub-optimal with respect to ideal
Maximum-Likelihood Decoding (MLD), due to their structures. As a consequence,
sub-optimal (near optimal) soft decision decoding based on the ordered statistic of
the received noisy codeword has been proposed [54, 99, 32, 76, 81] proving to be
efficient with considerable complexity for short length LBCs.
Since Fossorier and Lin, in their original contribution [76] presented a novel OSD
scheme for soft decision decoding of LBCs based on ordered statistics of the received
noisy samples (although an algorithm belonging to this set was first proposed by
Dorsch [54] and also used by [99] and [32]), OSD is widely being studied in the
literature [76, 81, 79, 77, 14]. Over the years, various new methods [175, 75, 165,
106, 176, 97, 101] based on reliability information and many modifications [77, 14]
on original OSD have been proposed in the literature to minimize the performance-
complexity trade-offs. In addition to wide spread application of ordered Statistic
in decoding of LBCs, the contributions in [74, 172, 168, 185] show its use also in
decoding of LDPC and convolution codes. In all these optimum and sub-optimum
decoding algorithms, a reliability measure of the received symbols has been used to
reduce the search space and find the most likely codewords.
The original concept of OSD [76] is basically implemented in two stages, a)
determining the Most Reliable Independent (MRI) bits from the Most Reliable Basis
(MRB) of the code and b) Order−I reprocessing on MRI using most likely Test
Error Patterns (TEPs). Out of these two stages, order−I reprocessing is designed to
improve the hard decision decoded codeword progressively until either practically
optimum or a desired error performance is achieved. The approach of ML resource
test based on the cost function calculated from the soft valued samples of the
permuted received sequence is introduced as a stopping criterion after each stage
20 Ordered Statistics Decoding of Linear Block Codes
Given an LBC C(n, k), with a systematic generator matrix G, at the transmitter side, a
k−bit information vector, v = (v1 , v2 , . . . , vk ), vi ∈ GF(2) = {0, 1} is mapped into a
codeword c = v · G = (c1 , c2 , . . . , cn ) where GF(2) stands for Galois field of order-2.
Under Binary Phase Shift Keying (BPSK), the codeword is mapped into a real-
valued vector as
r = (r1 , r2 , . . . , rn ) ri ∈ R, (2.2)
where ri = si + wi , wi is a white Gaussian noise sample with mean zero and variance
σ 2.
Given r, we want to perform a soft-decision decoding. As already stated in
section 2.3, for small-medium block codes (with k upto some hundreds of bits),
an effective solution is provided by OSD algorithms, like the Most Reliable Basis
(MRB) algorithm [76]. This algorithm starts by reordering the received vector
in the descending order of the absolute values. In this way, the first symbols are
characterized with a high reliability, i.e., a large probability of being correct.
Given r, by reordering its components in decreasing magnitude λi = |ri |, we
obtain a vector,
r∗ = (r1∗ , r2∗ , . . . , rn∗ ) ri∗ ∈ R, (2.3)
The generator matrix G is also permuted using the same permutation rule ρ1 , to
give a new permuted generating matrix
G∗ = ρ1 (G). (2.4)
Due to reordering, with high probability, v′ contains a few errors because its bits
have high reliability. One of the objectives of this paper is to provide computationally
efficient expression for calculating the number of errors contained in v′ .
Exploiting the reliability property, OSD algorithm considers a set of patterns,
with Hamming weight of the TEP wH (p), 0 ≤ wH (p) ≤ I, where I is called the order
of the algorithm. Each pattern is added to the candidate information vector given
2.5 Proposed New Statistic of Ordered Vector Components 23
∀p ∈ S : v′ → v∗ = v′ + p → c∗ = v∗ · G′ . (2.9)
When all patterns are considered, the codeword c∗ in (2.9) at minimum Euclidean
distance from the permuted received vector r′ can be chosen as the received codeword.
Obviously, if we set I = K and we test all the corresponding 2k patterns, we can
surely find the ML codeword, but the algorithm becomes equivalent to an exhaustive
decoding, which is impossible for non-trivial codes [76]. Then, a key issue for these
algorithms is the choice of the order I and the set S to optimize the complexity-
performance trade-off. It has been shown that, for small/medium size codes (e.g.,
n ≤ 150, code rate k/n > 0.5), an order I ≈ dmin /4 is able to provide nearly-optimal
decoding performance, i.e, very close to that of ideal MLD [76].
An approximation of the closed form expression for the upper-bound on the
error performance of the order−I reprocessing has been first derived in [76] which
requires the computation of an (I + 1)-dimensional integral for any reprocessing
order-I. Later, a relatively simple (requiring 2−dimensional integral evaluation) and
relatively accurate (without any assumption) upper bound on the error performance of
OSD for each stage reprocessing is derived in [79] based on the statistics introduced
in [9]. In the following sections, we present a new statistics on the error properties of
the permuted binary received vector y′ which can be applied to evaluate a simplified
expression of the OSD error performance bound.
Given an LBC C(n, k), without loss of generality, let us consider an all-zero transmit-
ted codeword, c = (0, . . . , 0, . . . , 0), which after BPSK mapping, corresponds to the
transmitted vector, s = (−1, . . . , −1, . . . , −1). At the output of the AWGN channel,
we observe the received vector r = (r1 , . . . , ri , . . . , rn ), with:
ri = −1 + wi , (2.10)
24 Ordered Statistics Decoding of Linear Block Codes
where wi is a Gaussian random variable with zero mean and variance σ 2 . All wi
noise components are statistically independent.
Each component ri in (2.10) has a pdf given by,
1 (x+1)2
−
fr (x) = √ e 2σ 2 . (2.11)
2πσ 2
Now, let us focus on the reordered vector r′ . A first study to estimate the behavior
of the components of r′ was done in [76], where the pdf of the reordered noise
samples conditioned upon the transmitted symbol has been presented.
Given the vector r observed by transmitting the all-zero codeword over an AWGN
channel with BPSK modulation and the ordered vector r′ obtained by ordering r
in decreasing magnitude, we can obtain the pdf of the components of r′ , and the
pdf of the magnitude of the components of r′ by using arguments from ordered
statistics [78] as follows. The pdf of the i-th component ri′ of r′ is given by,
n!
∀x : fri′ (x) = (1 − Fλ (|x|))i−1
(i − 1)!(n − i)!
· (Fλ (|x|))n−i fr (x). (2.14)
2.5 Proposed New Statistic of Ordered Vector Components 25
In the similar manner, using the pdf of λi , the pdf of the magnitude of i-th
component λi′ = |ri′ | of r′ is given by,
n!
∀x : fλi′ (x) = (1 − Fλ (x))i−1
(i − 1)!(n − i)!
· (Fλ (x))n−i fλ (x). (2.15)
Z +∞
l
pEL (EL = j) = p(x) j (1 − p(x))l− j fλl+1
′ (x)dx, (2.16)
0 j
where,
x+1
Q σ
p(x) = x+1
−x+1
, (2.17)
1+Q σ −Q σ
j
FEL (EL = j) = ∑ pEL (EL = i). (2.18)
i=0
26 Ordered Statistics Decoding of Linear Block Codes
pdf of ri
−4 −3 −2 −1−x 0 +x 1 2 3 4
ri
Proof. Fix a value x, and suppose the magnitude of the (l + 1)-th component of the
reordered vector r′ is λl+1′ = x. Then, the vector r contains exactly l components
with |ri | ≥ x. As can be observed in Fig. 2.1 (the shaded region corresponds to
|ri | ≥ x), for each of these components, the probability of having an error is,
Since we are working with the components of r we can use their implicit sta-
tistically independent property, which instead does not hold if we try to work with
the components of r′ . As a result, the probability of having j errors among these k
components is given by,
′ l
P(EL = j|{λl+1 = x, L = l}) = p(x) j (1 − p(x))l− j . (2.20)
j
′
The above result is obtained under the condition λl+1 = x. By integrating over
′ (x), we obtain the final pmf of EL as in (2.16) while its cdf
all x values by using fλl+1
at some value EL = j is obtained as in (2.18) simply by summing the normalized
pmf of EL for all EL : 0 ≤ EL ≤ j.
2.6 OSD Error Performance 27
In this section, a different look at the error performance of order−I OSD is presented
based on the distribution of E detailed in Section 2.5. Let PeOSD−I denote the code
error performance of the order−I OSD and Pe (I) denote the probability that the
correct codeword is not among the candidate codewords supported by the order−I
OSD. The upper bound on the order−I OSD performance can be written as an
inequality as
For the purpose of comparison and performance evaluation, we adopt the same
scenario of BPSK transmissions over an AWGN channel as described in Section 2.4
and Section 2.5. In order to accommodate the code rates of different LBCs, we
adopt the ratio of the energy per bit to noise power spectral density ratio Eb /N0 with
Eb /N0 = NE0s · nk , where Es is the signal energy and N0 is the noise power spectral
density.
2.7 Numerical Results 29
100
Theoretical curves
Simulated (n = 64, k = 42)
−1
10 Simulated (n = 128, k = 99)
Simulated (n = 128, k = 64)
10−2
pdf of EL
10−3
10−4
10−5
10−6
0 2 4 6 8 10
E
2.7.1 Pmf of EL
Figs. 2.2 plots the pmf of random variable EL for different combinations of n and
k. For each (n, k) combinations, the simulation results are plotted and compared
with the theoretical result obtained from (2.16). We observe a perfect matching for
all permissible values of EL which justifies the validity of the expression presented
in (2.16).
It is worthwhile to mention that the evaluation of (2.21) involves the prior evaluation
of the MLD code error rate for the code under consideration. Thus, for our simulation
purpose, we use the simplest upper bound, i.e., the union bound [112],
n
√ !
d
PeML (c) ≤ ∑ Ad Q . (2.26)
min
d=dH
σ
100
Optimum ML
Eq. (25)
10−1 I = 0
I = 1
I = 2
10−3
10−4
10−5
10−6
1 2 3 4 5 6 7
Eb /N0
Fig. 2.3 Code Error Rate of OSD with order−I reprocessing for (64,42,8) Reed Muller code
100
MLD Union Bound
Eq. (25)
I = 0
−1
10 I = 1
I = 2
Code Error Rate
10−2
10−3
10−4
10−5
2 3 4 5 6 7
Eb /N0
Fig. 2.4 Code Error Rate of OSD with order−I reprocessing for (128,99,10) extended BCH
code
Figs. 2.3 to 2.5 depict the error performances of the (64, 42, 8) Reed Muller code,
the (128, 99, 10) eBCH code and the (128, 64, 22) eBCH code, respectively. Each
plot includes the simulation results and the corresponding upper bounds computed
from (2.21). We observe that for all values of reprocessing order-I, the theoretical
upper bounds are tight. The bounds are as tight as those derived in [76] and [79].
However, while the error performance bound of order−I reprocessing OSD based
on [76] requires the computation of (I + 1)−dimensional integral and [79] requires
the computation of a two-dimensional integral, the new upper bounds require the
computation of a single dimensional integral for any reprocessing order-I.
2.7 Numerical Results 31
100
MLD Union Bound
Eq. (25)
I = 0
−1
10 I = 1
I = 2
Code Error Rate
I = 3
−2
10
10−3
10−4
10−5
1 2 3 4 5 6 7
Eb /N0
Fig. 2.5 Code Error Rate of OSD with order−I reprocessing for (128,64,22) extended BCH
code
Chapter 3
Frame Synchronization1
3.1 Introduction
M2M communication, a promising technology for smart city concept, enables ubiqui-
tous connectivity between one or more autonomous devices without or with minimal
human interaction. The most important requirements for M2M communication in
5G systems currently being studied are 1) Maximum allowable end-to-end latency,
including jitters/re-transmits less than 1ms. 2) Reliability, for example packet loss
rate 10-9 [65, 69, 116]. Similarly, mission critical communications, which can help
first responders work safer, smarter and faster in disasters and day-to-day incidents,
have similar requirements as well. Among these two requirements for M2M, virtually
zero latency, i.e., radio latency lower than 1ms, is very critical for
• ensuring fast procedure response time in the system (e.g. fast wake up and
dormancy, fast scheduling, fast link configuration)
• whole new range of use cases like remote control of machines and objects in
the cloud or tactile internet etc.
In addition, for real time M2M applications in the area of intelligent transport
system, remote monitoring and health will also be requiring very low latency and are
become the main focus of many mobile and it operators and vendors as a new revenue
opportunity. M2M traffic is bursty, since M2M applicatioin have not been developed
with network load shaping in mind. For instance, M2M devices have a much larger
ratio of uplink to downlink traffic volume, their traffic typically exhibits different
diurnal patterns, they are more likely to generate synchronized traffic resulting in
bursty aggregate traffic volumes, and are less mobile compared to smartphones.
Thus, burstiness is the result of synchronization effect resulting from several M2M
devices simultaneously reporting data [108]. In such application scenario where the
data transmission is bursty, a known synchronization/preamble sequence are often
periodically or aperiodically embedded in the data in order to aid in
2. resource scheduling,
3. packet synchronization,
3. DVB Terrestrial (DVB-T) standard [95]: In this application we look for the
synchronization word inside a sliding window. A N = 8-bit synchronization
pattern is used by DVB-T standard for digital television broadcasting.
4. IEEE 802.15.4 standard [8]: Physical layer frame starts with a physical syn-
chronization header (5 bytes) followed by a physical payload upto 127 bytes
such that the physical synchronization header is used to alert the receiver that
a potentially receivable signal is present.
H1 : r = (r1 , · · · , ri , · · · , rN )
ri = ci + ni with fixed ci ∈ {−1, +1}. (3.1)
36 Frame Synchronization
H0 : r = (r1 , · · · , ri , · · · , rN )
ri = di + ni with i.i.d. di ∈ {−1, +1}. (3.2)
In both cases, ni are samples of a Gaussian random variable with zero mean and
variance σ 2 .
The binary pattern recognition problem is quite popular in many scenarios.
For communication systems a typical example is frame synchronization: SWs are
commonly used to determine the boundaries of a transmitted frame. The observed
window where we look for the SW can be fixed or moving [23]-[82]. For example,
For the problem presented in Section 3.3, two alternative, equivalent formulations
of the optimal LRT solution were derived, respectively by Massey in [122] and by
Chiani/Martini in [37].
38 Frame Synchronization
N N r
i
ΓLRT1 = ∑ ri ci − σ 2 ∑ log cosh . (3.3)
i=1 i=1 σ2
N
2ri ci
ΓLRT2 = ∑ log 1 + exp − 2 . (3.4)
i=1 σ
Starting from the final expression of Massey formulation in (3.3), raising both sides
of the equation by an exponent, we get,
rc
∏Ni=1 exp( σ 2 )
i i
exp(ΓLRT1 /σ 2 ) = (3.5)
ri
∏N
i=1 cosh σ 2
Now, we can take a reciprocal of the components on both sides of the (3.5), and
using the expansion of hyperbolic cosine function as,
h i
ri ri
∏N
i=1 exp σ2
+ exp − σ2
exp(−ΓLRT1 /σ 2 ) = rc (3.6)
∏N
i=1 exp( σ 2 )
i i
N
2 2ri ci
exp(−ΓLRT1 /σ ) = ∏ 1 + exp − 2 (3.7)
i=1 σ
Finally, (3.8) proved that the LLR expression in (3.4) is a scaled version of the
LLR expression presented by Massey in (3.3).
where:
if ri ≥ 0 → yi = +1
if ri < 0 → yi = −1.
Given the binary vector y, it is easy to show that the optimal test for detecting c is
the hard correlation detector:
N
ΓH = ∑ yi ci , (3.9)
i=1
which is equivalent to compute the Hamming distance between the two binary
vectors, i.e., the number of different symbols.
Given the hard correlation expression (3.9), we can extend it to the real-value
domain. The expression of the soft correlation detector is given by:
N
ΓS = ∑ ri ci . (3.10)
i=1
soft correlation tests are often used in practice. Unfortunately, as shown in the next
sections, they are highly sub-optimal with respect to LRT.
J.L. Massey derived the expression of the Massey correlation detector in [122]
starting from the optimal LRT given by (3.3) and using this approximation, which
holds at high SNR:
r exp + σri2 + exp − σri2 1 |ri |
i
cosh = ≃ exp . (3.11)
σ2 2 2 σ2
N N
ΓLRT1 ≃ ∑ ri ci − ∑ |ri | . (3.12)
i=1 i=1
By noting that:
if sgn(ri ) = ci →|ri | = ri ci
if sgn(ri ) ̸= ci →|ri | = −ri ci ,
Definition 1. The Massey Correlation Detector [122]. Given the binary antipodal
pattern c = (c1 , · · · , ci , · · · , cN ) and the observed real vector r = (r1 , · · · , ri , · · · , rN ),
the Massey correlation detector computes the statistical test:
ΓM = ∑ ri ci , (3.13)
i:
sgn(ri )̸=sgn(ci )
By looking at (3.13) we immediately note that if all ri symbols have the same sign
of the pattern symbols then ΓM = 0. Otherwise, if at least one component has a
different sign, we have ΓM < 0, with a real value depending on the ri components.
This means that ΓM has a mixed pdf with:
In the following we will express the detector performance as a function of SNR, i.e.,
SNR = NE0s = 2σ1 2 dB.
The following theorem computes this pdf under H1 .
Theorem 2. The pdf under H1 of the Massey correlation detector is a mixed pdf,
with:
− A discrete component for x = 0 given by
with r
1 1
p = erfc .
2 2σ 2
− A continuous component for negative values given by
N
N c
∀x < 0 fΓM (x|H1 ) = ∑ p (1 − p)N−c F −1 [F ( fy (x))c ] , (3.15)
c=1 c
42 Frame Synchronization
1 1 (x−1)2
−
fy (x) = √ e 2σ 2 for x < 0 (3.16)
p 2πσ 2
fy (x) = 0 for x ≥ 0.
ΓM = ∑ ri ci = ∑ ri . (3.17)
i: i:
sgn(ri )̸=sgn(ci ) ri <0
From this expression we can compute the discrete component of the pdf in the origin:
which is result (3.14). To compute the continuous component of the pdf for x < 0,
we introduce the random variable:
c
α (c) = ∑ yi (3.20)
i=1
yi = 1 + ni with yi < 0.
3.7 Analytical computation of the detector performances under H1 43
The pdf of these random variables is depicted in Figure 3.3 and is given by (3.16).
Note that the pdf of yi is written starting from the Gaussian pdf of ri , but taking into
account the condition yi < 0. For this reason, the original pdf is divided by p, which
is exactly the factor p = P(ri < 0).
3.5
f y (x)
f g (x)
3
2.5
2
f y (x)
1.5
0.5
0
-8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8
x
Fig. 3.3 Pdf of random variable y for SNR = 0 dB. The red dotted curve fg (x) is the original
Gaussian random variable centered in ci = +1.
To derive the pdf of α(c), we can compute the convolution of the c pdfs fy (x).
As an alternative, we can exploit the characteristic function approach by computing
the Fourier transform:
Φy ( f ) = F ( fy (x))
and applying:
fα(c) (x) = F −1 [Φy ( f )c ] . (3.21)
From (3.19) and (3.21) we can finally compute the pdf continuous component, which
is result (3.15):
∀x < 0
N N
N c
fΓM (x|H1 ) = ∑ P(C = c) fα(c) (x) = ∑ p (1 − p)N−c F −1 [F ( fy (x))c ] .
c=1 c=1 c
Theorem 2 allows to compute the Massey detector pdf for any pattern length
value N and any SNR value ES /N0 = 1/(2σ 2 ). As an example, the pdfs (both
discrete/continuous components) under H1 at SNR = 0 dB are shown in Figure 3.4
44 Frame Synchronization
for N = 8 and in Figure 3.5 for N = 64. In the same figures we also verify the perfect
agreement with the simulated pdf curves, obtained by generating a sufficiently large
number of events H1 and H0 , applying the Massey detector, and collecting the test
results. MASSEY DETECTOR - pdf
N = 8 bits, Es /N0 = 0 dB
1
f ! (x|H1 ), x<0, a
0.9 M
f ! (x|H1 ), x=0, a
M
0.8
f ! (x|H1 ), x<0, s
M
f (x|H ), x=0, a
f ! (x)
! 0
0.5 M
M
f ! (x|H0 ), x<0, s
M
0.4 f ! (x|H0 ), x=0, s
M
0.3
0.2
0.1
0
-12 -10 -8 -6 -4 -2 0
x
Fig. 3.4 Massey correlation detector: pdfs under H1 and H0 for N = 8 at SNR = 0 dB.
Analytical (a) vs. simulated (s) curves.
0.25 M
M
f ! (x|H0 ), x<0, s
M
0.2 f ! (x|H0 ), x=0, s
M
0.15
0.1
0.05
0
-60 -50 -40 -30 -20 -10 0
x
Fig. 3.5 Massey correlation detector: pdfs under H1 and H0 for N = 64 for SNR = 0 dB.
Analytical (a) vs. simulated (s) curves.
3.8 Analytical computation of the detector performances under H0 45
Given the pdf, we can compute the miss-detection probability. We are under H1 , the
SW is present, but the test is erroneously below the threshold and the SW is declared
absent. The following Corollary of Theorem 2 holds.
Proof. The first line is the definition of miss-detection probability, with fΓM |H1 (x)
given by (3.15). For t = 0 the integral covers the entire continuous component, then
we obtain the complement to one of the discrete component in the origin (3.14). For
any positive t > 0 the integral covers the entire pdf, then we obtain 1.
In this section, we show how to analytically compute the test performances under
H0 . Also in this case, ΓM has a mixed pdf with a discrete component for ΓM = 0
(when all received ri have the same sign of the pattern symbols) and a continuous
component for ΓM < 0 (when at least one ri has a different sign). The following
theorem computes this pdf under H0 .
Theorem 3. The pdf under H0 of the Massey correlation detector is a mixed pdf,
with:
46 Frame Synchronization
10 -1
10 -2
10 -3
10 -4
P fa ,P md
10 -5
10 -6
10 -7
P fa a
10 -8 P fa s
P md a
-9
10 P s
md
-10
10
-12 -10 -8 -6 -4 -2 0
t
Fig. 3.6 Massey correlation detector: miss-detection and false-alarm performances, for N = 8
bits and SNR = 0 dB. Analytical (a) and simulated (s) curves.
10 -1
10 -2
10 -3
10 -4
P fa ,P md
10 -5
10 -6
10 -7
P fa a
10 -8 P fa s
P md a
10 -9 P md s
10 -10
-60 -50 -40 -30 -20 -10 0
t
Fig. 3.7 Massey correlation detector: miss-detection and false-alarm performances, for
N = 64 bits and SNR = 0 dB. Analytical (a) and simulated (s) curves.
1
P(ΓM = 0|H0 ) = . (3.23)
2N
3.8 Analytical computation of the detector performances under H0 47
where y is a random variable with pdf given by (3.16), and z is a random variable
with pdf given by:
1 1 (x+1)2
−
fz (x) = √ e 2σ 2 for x < 0 (3.25)
1 − p 2πσ 2
fz (x) = 0 for x ≥ 0.
ΓM = ∑ ri ci = ∑ ri = ∑ ri + ∑ ri . (3.26)
i: i:ri <0 i:ri <0 i:ri <0
sgn(ri )̸=sgn(ci ) di =+1 di =−1
We have:
+ 1 N
P(N = i) = N . (3.27)
2 i
We note that:
which is result (3.23). Even if this procedure is useful for the remaining part of the
proof, we note here that it is possible to compute this value in a simpler way. Let us
consider the output of a binary symmetric channel when the input vector is random.
The output vector is a random vector, too, and 1/2N is exactly the probability that all
its symbols are positive.
To compute the continuous component of the pdf, when at least one symbol ri is
negative, i.e., [(c ̸= 0) OR(c′ ̸= 0)], let us consider:
c c′
′ ′
γ(c, c ) = α(c) + β (c ) = ∑ yi + ∑ zi . (3.28)
i=0 i=0
The first term α(c) corresponds to the negative symbols ri < 0 with di = +1. It can
be studied as in the previous section and its pdf is given by (3.21).
The second term β (c′ ) is obtained as the sum of c′ independent random variables
zi corresponding to negative symbols ri with di = −1:
zi = −1 + ni with zi < 0.
The pdf of each of them is depicted in Figure 3.8 and is given by (3.25).
3.8 Analytical computation of the detector performances under H0 49
6
f z (x)
f g (x)
5
f z (x)
3
0
-8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8
x
Fig. 3.8 Pdf of random variable z for SNR = 0 dB. The red dotted curve fg (x) is the original
Gaussian random variable centered in di = −1.
The pdf of γ(c, c′ ) can be computed by using the characteristic function approach:
h i
−1 c′
fγ(c,c′ ) (x) = F F ( fy (x)) F ( fz (x)) .
c
Finally, we can group together all these results to get the pdf continuous component:
N i N−i
∀x < 0 fΓM |H0 (x) = ∑ P(N + = i) ∑∑ P(C = c,C′ = c′ |N + = i) fγ(c,c′ ) (x) =
i=0 c=0 c′ =0
(c̸=0) OR(c′ ̸=0)
N i N−i
i−c N − i
1 N i c ′ ′ ′
=∑ N ∑∑ p (1 − p) ′
(1 − p)c pN−i−c F −1 [F ( fy (x))c F ( fz (x))c ],
i=0 2 i c=0 c′ =0 c c
(c̸=0) OR(c′ ̸=0)
Theorem 3 allows to compute the detector pdf for any pattern length value N and
any SNR value. As an example the pdfs (discrete and continuous components) under
H0 at SNR = 0 dB are shown in Figure 3.4 for N = 8 and in Figure 3.5 for N = 64,
where we have also plotted the simulated curves.
50 Frame Synchronization
Given the pdf, we can compute the false-alarm probability. We are under H0 , the
SW is absent, but the test is erroneously above the threshold and the SW is declared
present. The following Corollary of Theorem 3 holds.
Corollary 2. The False-Alarm probability of the Massey detector is given by:
Z 0−
1
ift < 0 : Pf a = P (ΓM ≥ t|H0 ) = fΓM |H0 (x)dx +
t 2N
1
ift = 0 : Pf a = P (ΓM ≥ 0|H0 ) = (3.29)
2N
ift > 0 : Pf a = P (ΓM ≥ t|H0 ) = 0
Proof. The false-alarm probability is obtained by integrating the detector pdf given
by Theorem 3, which has a continuous component for negative values and a discrete
component in the origin equal to 1/2N . When t = 0, Pf a is equal to the discrete
component. For positive thresholds it goes to zero.
This means that it is useless to set a positive threshold, because the pattern is never
detected. As a consequence, it is impossible to achieve a value Pf a < 1/2N : the false-
alarm rate is always lower bounded by the term due to the pdf discrete component
under H0 :
(LB) 1
Pf a ≥ Pf a = N . (3.30)
2
This is an important issue for practical applications, because the term 1/2N is
not negligible for small N. As an example, the lower bound values for some SW
3.9 ROC curves 51
lengths N are reported in Table 3.1, which shows that the bound is quite high for
small lengths (e.g., N ≤ 16).
Table 3.1 Massey correlation detector: false-alarm lower bound values for different lengths
N.
(LB)
N Pf a
8 3.90 ·10−3
16 1.53 ·10−5
32 2.33 ·10−10
64 5.42 ·10−20
Indeed, the lower bound impact is clearly visible in Figure 3.6 for N = 8, while
it is negligible in Figure 3.7 for N = 64. This limitation for small values of N can be
a problem for some applications which require very low false-alarm rates. This issue
will be further discussed in Section 3.10, where we present a solution to eliminate it.
10 -1
10 -2
10 -3
P md
10 -4
10 -5 E s /N0 = -4 dB
E s /N0 = -2 dB
-6 E s /N0 = 0 dB
10
E s /N0 = 2 dB
E s /N0 = 4 dB
10 -7
E s /N0 = 6 dB
10 -8
10 -4 10 -3 10 -2 10 -1 10 0
P fa
Fig. 3.9 Massey correlation detector: ROC curves for N=8 bits and different SNR values.
10 -4
P md
10 -5
10 -6
10 -7
10 -8
10 -9
10 -10
10 -10 10 -9 10 -8 10 -7 10 -6 10 -5 10 -4 10 -3 10 -2 10 -1 10 0
P fa
Fig. 3.10 Massey correlation detector: ROC curves for N=64 bits and different SNR values.
3.9 ROC curves 53
10 -1
10 -2
10 -3
10 -4
P md
10 -5
10 -6
10 -7
10 -8 N=8
N=16
N=32
10 -9
N=64
10 -10
10 -10 10 -9 10 -8 10 -7 10 -6 10 -5 10 -4 10 -3 10 -2 10 -1 10 0
P fa
Fig. 3.11 Massey correlation detector: ROC curves for SNR = 0 dB and different pattern
lengths.
54 Frame Synchronization
As explained in Section 3.8.2, for the Massey detector we have a false-alarm lower
(LB)
bound Pf a = 1/2N . For applications requiring low false-alarm rates, this limitation
may be a problem. As an example, a target Pf a = 10−6 (which is a realistic values for
some applications, e.g. [73]) cannot be achieved by N < 32. Unfortunately, in some
cases the use of a synchronization word with N ≥ 32 can be a problem, because
the introduced overhead may be too large, especially for small data frames. In this
section we introduce a new solution, which allows to overcome this limitation.
The lower bound is due to the pdf discrete component in zero, which is induced
by the Massey detector definition. If we have sgn(ri ) = sgn(ci ) for any received
symbol (an event with probability 1/2N ), the test result is equal to zero. As a
consequence, there is no way to further reduce the false-alarm probability from the
lower bound: for positive thresholds we have Pf a = 0, but Pmd = 1; so the pattern
cannot be revealed and the detector is useless.
We now propose an enhanced definition of the Massey detector, that we call the
Extended Massey correlation detector, which is based on the following idea. If at
least one received symbol ri has a sign different from the corresponding ci symbol,
the Massey correlation is applied. If all the signs agree, the soft correlation (which
takes into account all the marker symbols) is applied.
Definition 2. The Extended Massey Correlation Detector. Given the binary an-
tipodal pattern c = (c1 , · · · , ci , · · · , cN ) and the observed real vector
r = (r1 , · · · , ri , · · · , rN ) (3.31)
For negative thresholds, the test is identical to the Massey detector. As we will
show afterwards:
3.10 The Extended Massey correlation detector 55
• Since we can use positive thresholds, too, the lower bound limitation is elimi-
nated.
• For positive thresholds the Extended test is better than or equal to the soft
correlation.
• Overall, it is nearly optimal for both positive and negative thresholds, very
close to the LRT.
To analyze this new test, we start from the analytical computation of its pdfs. We
note that:
Then, for negative threshold values, the pdfs are equal to the continuous component
of the Massey detector pdf computed in Section 3.7 (H1 ) and Section 3.8 (H0 ). For
zero and positive threshold values we present two theorems to compute them.
Under H1 , the following theorem provides the pdf of the new test.
Theorem 4. The pdf under H1 of the Extended Massey correlation detector is given
by:
− For negative values:
1 1 (x−1)2
−
fs (x) = √ e 2σ 2 for x ≥ 0 (3.35)
1 − p 2πσ 2
fs (x) = 0 for x < 0.
56 Frame Synchronization
Proof. We suppose, without loss of generality, that all ci = +1. For positive thresh-
olds we have:
N N
∀x ≥ 0 ΓE = ∑ ri ci = ∑ ri (iff all ri ≥ 0). (3.36)
i=1 i=1
si = 1 + ni with si ≥ 0.
The pdf of each of them is given by (3.35). (Note that this pdf is similar to the pdf of
the random variable y depicted in Figure 3.3, only reflected on the positive axis.)
To derive the pdf of δ (N) we can apply the characteristic function approach:
Proof. For negative thresholds, the pdf is equal to the Massey continuous pdf. For
t = 0, we obtain the integral of the Massey continuous component, which is the
complement to one of its discrete component, i.e., 1 − (1 − p)N as in Corollary 1.
For positive thresholds we sum to this term the integral of the Extended Massey pdf,
which is distributed on the entire positive axis. For t going to infinity, the probability
goes to one.
The following theorem provides the pdf of the new test under H0 .
Theorem 5. The pdf under H0 of the Extended Massey detector is given by:
− For negative values:
where s is a random variable with pdf given by (3.35) and t is a random variable
with pdf:
1 1 (x+1)2
−
ft (x) = √ e 2σ 2 for x ≥ 0 (3.42)
p 2πσ 2
ft (x) = 0 for x < 0.
58 Frame Synchronization
Proof. We suppose without loss of generality that all ci = +1. For positive thresholds
we have:
N N
∀x ≥ 0 ΓE = ∑ ri ci = ∑ ri (iff all ri ≥ 0). (3.43)
i=1 i=1
Under H0 we have ri = di + ni , where di are random symbols. All the ri are positive.
Let us denote by:
We note that:
1 N
P(D = d) = N (1 − p)d pN−d , (3.44)
2 d
where the first two terms are the probability that an N−bit random vector contains d
symbols equal to +1 and the last two are the probability that all the symbols of the
corresponding observed vector are positive. Let us consider:
d d′
′ ′
ζ (d, d ) = δ (d) + ε(d ) = ∑ si + ∑ ti . (3.45)
i=0 i=0
The first term δ (d) corresponds to the components with ri ≥ 0 and di = +1. It is the
sum of d random variables si with pdf (3.35) introduced for studying H1 . The pdf of
δ (d) is then given by:
h i
fδ (d) (x) = F −1 F ( fs (x))d . (3.46)
ti = −1 + ni with ti ≥ 0.
The pdf of each of them is given by (3.42). (Note that this pdf is similar to the pdf of
the random variable z depicted in Figure 3.8, only reflected on the positive axis.)
The pdf of ε(d ′ ) can be computed by using the characteristic function approach:
h ′
i
fε(d ′ ) (x) = F −1 F ( ft (x))d .
3.10 The Extended Massey correlation detector 59
Finally, we can group together all these results to get the pdf of the Extended detector
under H0 for x ≥ 0:
N
fΓE |H0 (x) = ∑ P(D = d) fζ (d,N−d)(x)
d=0
N
1 N
=∑ N (1 − p)d pN−d F −1 [F ( fs (x))d F ( ft (x))N−d ],
d=0 2 d
Proof. For negative thresholds we have the same false-alarm rate of the Massey
detector. For t = 0, the integral covers all the non-negative values then it is equal to
1/2N (for the Massey detector this probability is concentrated in the origin, while for
the Extended detector it is distributed on the entire non-negative axis). For positive
thresholds the integral is applied only to the positive portion of the Extended detector
pdf.
For negative thresholds, the Extended Massey detector has the same performances of
the Massey detector, but it overcomes the lower bound limitation on the Pf a because
the threshold can assume positive values, too. As an example, the Extended detector
performances in terms of Pf a and Pmd vs. thresholds are reported in Figure 3.12 for
60 Frame Synchronization
SNR = 6 dB and N = 8 bits. For comparison, in the same figure we have also plotted
the performances of the Massey detector and the soft correlation (3.10). By looking
at these results we observe that:
• For the Extended Massey detector, the lower bound limitation no longer
applies: for positive thresholds the Pf a becomes smaller than the lower bound
(LB)
Pf a = 1/2N = 3.90 · 10−3 where the Massey detector curve stops.
In this section we compare the performances of the Massey detector and the Extended
Massey detector against the optimal LRT, the soft correlation and the hard correlation.
As an example, the ROC curves of these detectors for SNR = 0 dB are compared in
Figure 3.13 for N = 8 bits and in Figure 3.14 for N = 64 bits. By looking at Figure
3.13 we can observe that:
(LB)
• As expected, the Massey detector curve stops at the lower bound Pf a =
1/2N = 3.90·10−3 (where also the hard correlation curve stops). The Extended
Massey detector does not suffer this limitation.
3.11 Comparison against LRT, soft and hard correlation 61
10 -1
10 -2
P fa ,P md
10 -3 P Extended Massey
fa
P md Extended Massey
P fa Massey
10 -4 P md Massey
P fa Soft
P Soft
md
-5
10
-15 -10 -5 0 5 10 15
t
Fig. 3.12 Extended Massey correlation detector: Pf a and Pmd vs. threshold, for N = 8 bits
and SNR = 6 dB.
• Even if the SNR is quite low, the Extended Massey detector ROC is essentially
coincident with the optimal LRT ROC curve and much better than the soft and
hard correlation curves.
These results are confirmed by Figure 3.14 for N = 64 bits. For this length, there
(LB)
is no need to use the Extended Massey detector, because the lower bound Pf a ≥
5.42 · 10−20 is negligible. Also in this case, the Massey detector performances are
very close to the optimal LRT ones and much better than the soft and hard correlation
curves.
62 Frame Synchronization
COMPARISON - ROC
N = 8 bits, ES /N0 = 0 dB
10 0
10 -1
P md
10 -2
10 -3 Hard
Soft
Massey
LRT
Extended
10 -4
10 -4 10 -3 10 -2 10 -1 10 0
P fa
Fig. 3.13 ROC curves for N = 8 bits and SNR = 0 dB: comparison between Extended
Massey detector, Massey detector, LRT, Soft correlation, Hard correlation.
COMPARISON - ROC
N = 64 bits, ES /N0 = 0 dB
10 0
Hard
10 -1 Soft
Massey
10 -2 LRT
10 -3
10 -4
P md
10 -5
10 -6
10 -7
10 -8
10 -9
10 -10
10 -10 10 -9 10 -8 10 -7 10 -6 10 -5 10 -4 10 -3 10 -2 10 -1 10 0
P fa
Fig. 3.14 ROC curves for N = 64 bits and SNR = 0 dB: comparison between Massey detector,
LRT, Soft correlation, Hard correlation.
3.11 Comparison against LRT, soft and hard correlation 63
To better quantify the differences between the detectors, we now consider the miss-
detection vs. SNR performances at fixed false-alarm rate. Fixed a target value for Pf a ,
by using Corollary 2 for the Massey detector or Corollary 4 for the Extended Massey
detector we can compute the minimum value of the threshold t which guarantees to
achieve it. Given t, by using Corollary 1 for the Massey detector or Corollary 3 for
the Extended Massey detector, we can compute the corresponding value of the Pmd .
In this way, we can plot the miss-detection probability as a function of the SNR, for
the chosen target false-alarm probability value.
These curves are very useful for practical applications, where the systems are
typically designed for achieving a given value Pf a (the so-called CFAR (Constant
False-Alarm Rate) property): these results show which are the corresponding Pmd
values obtained for different SNR values. Moreover, fixed the target Pf a and the
target Pmd they provide the SNR value necessary to achieve them.
As an example, Figure 3.15 and Figure 3.16 show the results for N = 8 and
N = 64, with different target false-alarm rates. In Figure 3.15, since N = 8 is a small
value, we have considered the Extended Massey detector. We can observe that it is
very close to the optimal LRT, with a penalty limited to a small fraction of dB even
when the SNR is low, which disappears at higher SNR values. The gains achieved
by the Extended Massey detectors with respect to hard and soft correlation are large.
If we fix target Pmd = Pf a = 10−2 the gain is 3 dB from hard and more than 6 dB
from soft (that in this scenario is worse than hard correlation, which is not surprising
because the soft correlation is not derived as an optimal test). The gains are larger
for lower miss-detection probabilities.
In Figure 3.16, since N = 64 is a large value and the lower bound is negligible,
we have considered the Massey detector. It shows a limited penalty from the optimal
LRT, even when the SNR is low. At target Pmd = Pf a = 10−6 the Massey detector
gains 2.5 dB with respect to the hard correlator and 3 dB from the soft. Higher gains
are achieved at lower miss-detection probabilities.
64 Frame Synchronization
10 -2
10 -3
10 -4
-4 -2 0 2 4 6 8 10 12 14
E s /N0 [dB]
Fig. 3.15 Extended Massey detector: Pmd vs. SNR, for N = 8 bits and Pf a = 10−2 .
10 -3
10 -4
P md
10 -5
10 -6
10 -7
10 -8
10 -9
10 -10
-5 -4 -3 -2 -1 0 1 2 3 4
E s /N0 [dB]
Fig. 3.16 Massey detector: Pmd vs. SNR, for N = 64 bits and Pf a = 10−6 .
3.12 Some Aspects for Practical Implementation 65
The presented results show that the Extended Massey and the Massey detector:
• are nearly optimal tests at both low and high SNR values, with penalty in the
order of a fraction of dB from the optimal LRT.
• are much better than the popular hard and soft correlation tests.
The choice between the two Massey detectors depends on the target false alarm
rate. If it is below the lower bound 1/2N we use the Extended Massey detector,
otherwise we use the Massey detector. As a consequence, the Extended Massey
detector looks more appropriate for small N (e.g., for N ≤ 16) and the Massey
detector for large N.
The complexity of the two Massey detectors is very low. Obviously it is slightly
higher than the complexity of the hard correlation which works on bits, but it
is essentially identical to soft correlation complexity and much lower than LRT
complexity, which may be a serious issue for high bit rate applications.
Moreover, if we look at the false-alarm and miss-detection vs. threshold curves
of the Massey detectors shown in Figures 3.6, 3.7, and 3.12, we can see that they
have a favorable behavior for threshold setting, because the curves slope is not too
pronounced. Having fixed the target error rate to be achieved, the threshold can be
easily obtained by inverting the analytical curves.
Chapter 4
4.1 Introduction
3G and 4G technologies have mainly focused on the mobile broadband use case,
providing enhanced system capacity and offering higher data rates. This focus will
clearly continue in the future 5G era where they will provide mobile telephony and
mobile broadband with wide area coverage. Moreover, they will be extended by lot
of new applications and lot of new use cases and new scenarios. Some of them can be
the evolution of existing technologies but some of them will need new technologies.
In addition, the upcoming ‘5G wireless networks’ is sought to offer wireless access
to anyone and anything. Thus, in the future, wireless access will go beyond humans
and expand to serve any entity and device that may benefit from being connected.
Thus, 5G networks will undoubtedly explore unlimited possibilities until an official
standard by telecommunications standardisation bodies such as ITU-R, IMT and the
3GPP.
Machine type communications will be more and more important in the future.
This will include communications for electronics and home appliances, communi-
cations for transports, communications for medical equipments, internet of things
and many more. A lot of dense communications will be probably carried by existing
wireless access technologies but some of these use cases will have so high require-
ments that they will require new wireless access technologies. For example, ultra
1 Part of the work described in this chapter has been previously published in [49, 44, 146, 147, 45–
47]
4.1 Introduction 67
Scientific & Medical (ISM) band in 2.4 GHz, available which could be the possible
solution for accommodating new services, but there are already multiple wireless
technologies in these bands such as 802.11 WLAN, Cordless Phones, Bluetooth,
Wireless Personal Area Network (WPAN), HIPERLAN etc. Some other examples of
unlicensed frequency bands include UNII-1 and UNII-2 bands where systems such
as IEEE802.11a WLAN and IEEE802.11n WLAN operate. This rapid expansion
in the field of Wireless Communications has led to a common belief that the day
is not too far when the increasing demands of the spectrum access will lead to the
spectrum scarcity.
Frequency spectrum is a scarce resource in the field of wireless communication.
Thus, its utilization efficiency should be made as efficient as possible. In contrast,
several measurements carried out to verify the spectrum utilization in different
countries have shown significant under-utilization of the allocated frequency bands.
Noticeably, the Digital Television (DTV) band is an example of inefficient spectrum
use, since depending on the geographical location, only certain channels are always
occupied both in the temporal and spatial domains. Concerning the same, FCC
Spectral Policy Task Force reported that typical radio channel occupancy is less than
70 Cognitive Radio: Spectrum Sensing
15% while the peak occupancy is close to 85% in US [70]. Similar measurements
carried out in various countries show that most of the radio frequency spectrum
is inefficiently utilized with spectrum utilization mostly in the range of 5% to
50% [96, 166]. These thought-provoking statistics in synergy provide the drive for
main challenges facing the spectral world. Experts around the world are interested
in tackling how we can manage future spectrum more effectively to serve for 5G use
cases. A number of technologies and techniques have been identified as enablers for
the 5G wireless networks and among them is Cognitive Radio technology. Many
studies are suggesting that 5G could exploit Cognitive Radio approaches to increase
band availability, especially for very small cells.
Cognitive Radio was first officially proposed by Joseph Mitolla II at the Royal Insti-
tute of Technology [123, 124] but the idea of using learning and sensing machines
to improve radio spectrum was envisioned several decades earlier. Now, Cognitive
Radio is seen as an emerging solution to the problem of spectrum scarcity. It has
an implicit mechanism of spectrum sensing intelligence and decision making that
enables opportunistic access to the under-utilized frequency slots of licensed or
unlicensed frequency bands which is also evident from the definitions of Cognitive
Radio adopted by FCC: [40]
There are some more definitions of Cognitive Radio which are similar in theme.
Cognitive Radio defined by Haykin [87] is:
without causing any interference. It is required that the unlicensed secondary users
should not cause harmful interference to the licensed primary users. Therefore, SU
have to make sure that the licensed spectrum bands are not utilized by the PU before
they access these bands, which makes spectrum sensing one of the key technologies
for the implementation of CR.
• Signal classification;
Wireless
Parameter Analog TV Digital TV
Microphone
Probability of
0.9 0.9 0.9
Detection
Probability of
0.1 0.1 0.1
false alarm
Channel Detection
≤ 2s ≤ 2s ≤ 2s
Time
Incumbent Detection
-94dBm -116dBm -107dBm
Threshold
SNR 1dB -21dB -12dB
interference. Thus, the goal is to design detection algorithm that meet the given
sensing constraint at very low SNR.
Spectrum sensing is the most challenging task which should be taken with prime
importance for the Dynamic spectrum Access (DSA) and autonomous exploitation of
locally unused spectrum, to provide new paths for spectrum access. It is the enabling
unit of SU for the accurate identification and exploitation of the PU spectrum.
Moreover, the detection performance of the spectrum sensing device quantifies the
interference level caused to the PU transmission in the spectrum band.
Several spectrum sensing methods have been considered for Cognitive Radio
applications including Energy Detection (ED) [164], Match Filtering [29], Feature
Detection Algorithms [33], proposed for individual SU and their cooperative counter-
part for multiple SU sensing. A survey of different spectrum sensing methodologies
for Cognitive Radio [18, 16] shows that a remarkable spectrum sensing performance
can be attained with feature detection (e.g., Cyclic Prefix (CP) based detector and
Pilot Based Detector) that exploit some known characteristic of PU signals at the
expense of long observation time. Even more, Matched Filtering is assumed to
perform best with high processing gain at the constraint of knowledge of PU signal
properties [141]. ED is considered to be the simplest detector which does not make
any assumption on the PU signal statistics. Feature detection lies in the middle of
these two extremes and only makes certain assumptions on the statistical properties
of the PU signal while designing the PU signal. Even though Match filtering and
feature detection algorithms are known to outperform ED algorithm, the requirement
74 Cognitive Radio: Spectrum Sensing
The spectrum awareness problem for a CR system is different from the legacy
wireless communication ststems, for these reseasons: (i) no prior knowledge of
the PU signal structure, channel and noise variance is available (ii) the information
on spectrum occupancy, SNR, etc. must be acquired at the shortest possible time,
(iii) primary SNR may be very low due to fading and multi-path phenomenon, and
(iv) noise/interference power may vary in time giving rise to noise/interference
power uncertainty. Thus, despite the significant volume of available literature on
spectrum sensing under ideal scenarios, investigation under practical constraints and
imperfections are still lacking [154].
In this direction, the main focus of this chapter is to provide a comprehensive
analysis of the popular Semi-blind’ spectrum techniques (ED and EBD) under two
of the most important practical imperfections.
1. Noise uncertainty
2. Uncertainty on PU traffic
4.2 Semi-blind SS techniques under noise uncertainty 75
In real world scenario, the information about the PU signal is generally not available
and, even if available, Match Filtering and Feature Detection algorithms needs
sensing receivers for all types of signals. Thus, for CR application the most popular
sensing algorithms are semi-blind spectrum sensing techniques which requires the
knowledge of noise floor. Performance of these algorithms over AWGN and different
fading channels has been studied in many works including [164, 180, 50, 51, 105,
162, 161]. These works assumed a perfect knowledge of the noise power at the
receiver, which allows for a perfect threshold design. However, in real systems
the detector does not have a prior knowledge of the noise level. In recent years,
variation and unpredictability of the precise noise level at the sensing device have
been identified as a critical issue, which is also known as noise uncertainty.
Noise is an unwanted random process which may arise from several sources in
the external environment as well as from every components of a receiver chain. In
real world scenarios, noise distribution is not known to infinite precision and the
noise is neither perfectly Gaussian, perfectly white, nor perfectly stationary [159].
Therefore, the noise variance in practice has to be estimated by using a proper noise
calibration method. The noise calibration can be done either during the sensing
process or by carrying out on-site Out of Bands (OoB) measurements. Another
option for noise calibration is to use inband measurements at the frequencies where
the pilot is absent so that the noise statistics can be calibrated at the pilot frequencies
[158].
The noise estimation can be perfect in the ideal case, however, in practice, accu-
rate estimation of the noise variance is not possible, thus limiting the performance
of the semi blind sensing techniques like E and EBD, at low SNRs. For ED, the
noise variance uncertainty may lead to SNR wall phenomenon due to which it is
not possible to achieve the robust detection performance beyond a certain SNR
value even by increasing the sensing duration [158]. In this work, we present two
alternative for the estimation of the noise variance:
Thus, in this section we introduce the idea of auxiliary noise variance estimation
for noise uncertainty. Later Hybrid approach of ED and EBD are presented and the
impact assessment of noise power estimation is then analysed.
For CR application, the most popular sensing algorithm is the simple ED that
compares the energy of the received signal with the noise variance σv2 . ED requires
the knowledge of σv2 value. Performance of ED in AWGN and different fading
channels has been studied in many works including [164, 50, 51, 105]. These works
assumed a perfect knowledge of the noise power at the receiver, which allows for
perfect threshold design. In that case ED can work with arbitrarily small value of
false alarm probability PFa and Miss-detection Probability PMd , by using sufficiently
large observation time, even in low SNR environment [159].
With the scope of reducing the impact of noise uncertainty on the signal detection
performance of ED, several researches have been proposed including [158, 159, 118,
119]. Hybrid Spectrum Sensing Algorithms based on the combination of ED and
Feature Detection techniques have been proposed for the reduction of the effect of
noise variance uncertainty [125]. Similar Hybrid Spectrum Sensing approach was
discussed in [19] utilizing the positive points of ED and Covariance Absolute Value
detection methods while Sequeira et al. [152] used Akaike Information Criteria (AIC),
Minimum Description Length (MDL) and Rank Order Filtering (ROF) methods for
noise power estimation in presence of signal for energy based sensing. In [159] the
fundamental bounds of signal detection in presence of noise uncertainty are analyzed.
This study showed that there are some SNR thresholds under noise uncertainty
known as SNR Wall, that prevents achieving the desired performance even if the
detection interval is made infinitely large. It concludes that the robustness of any
detector can be quantified in terms of the SNR Wall giving the threshold below which
weak signals cannot be detected reliably no matter how many samples are taken.
In [119] authors performed the asymptotic analysis of the Estimated Noise Power
4.2 Semi-blind SS techniques under noise uncertainty 77
(ENP) to derive the condition of SNR Wall phenomenon for ED. They suggested
that the SNR Wall can be avoided if the variance of the noise power estimator can
be reduced while the observation time increases. Yonghong Zeng [182] proposed
a uniform noise power distribution model for the noise uncertainty study of ED
in low SNR regime. Similarly, [109] proposed a discrete-continuous model of the
noise power uncertainty for the performance analysis of the ED in presence of noise
uncertainty. Performance of ED using Bartlett’s estimate is studied in [85].
Indeed, in recent years various new algorithms able to outperform ED have been
applied to CR, mostly based on Random Matrix Theory (RMT) and information
theoretic criteria. Two thorough reviews have been presented in [183] and [180].
Different diversity enhancing techniques such as multiple antenna, cooperative and
oversampling techniques have been introduced in the literature to enhance the spec-
trum sensing efficiency in the wireless fading channels [143, 162, 181, 117, 169].
Most of these methods use the properties of the eigenvalues of the received signal’s
co-variance matrix and use results from advanced RMT. In particular, sensing tech-
niques based on the eigenvalues of the received signals co-variance matrix recently
emerges as a promising solution, as they also do not require a prior assumption on
the signal to be detected, and typically outperform the popular ED method when
multiple sensors are available. The various EBD algorithms can be divided in two
classes:
A. Those that require the prior knowledge of the noise variance σv2 (called“semi-
blind” in [180]). This class includes channel independent tests [183], and
Roy’s Largest Root Test (RLRT) [148] which shows the best performance in
this class (see Sub-Section 4.2). [This class also includes classical ED]
B. Those that do not require knowledge of σv2 (called “blind” in [180]). This
class includes the Eigenvalue Ratio Detection (ERD) [179], channel and noise-
independent tests [183], information theoretic criteria detectors like the AIC
and the MDL [169], and the Generalized Root Test (GLRT) [26], which shows
the best performance in this class.
78 Cognitive Radio: Spectrum Sensing
Methods belonging to the first class provide better performance when the noise
variance is known exactly, whereas blind methods are more robust to uncertain or
varying noise level. Recently, few research works have studied the impact of noise
variance uncertainty and their effect in semi-blind EBD including [129, 139, 104].
In [129] author showed the importance of the accurate noise estimation for the EBD
algorithms performance.
• Single, unknown, primary signal. Its samples are modelled as Gaussian and
independent.
The problem is formulated as a simple binary test between the mutually exclusive
hypotheses:
This model is mostly used in detection theory because it allows a clear analytical
approach and represents a benchmark for the case of non-parametric analysis of a
single unknown primary signal. In particular relating to CR applications, where
it is very popular and it was adopted by many relevant papers (including work by
Debbah [26], and many others). The reason is that, despite of its simplicity, it is well
matched to many practical situations:
1. Single primary user. In many CR scenarios, the primary signal of interest for
a secondary opportunistic CR network is unique. This is the case, for example,
in reuse of TV signal bands [3] or the coexistence between a Wi-Fi access
point and a Wireless Sensor Network (WSN) or Bluetooth in the 2.4 GHz band,
two typical CR applications that can already be realized in practice. Moreover,
when multiple sources are present, the performance essentially depends on the
component with the highest received power.
4.2 Semi-blind SS techniques under noise uncertainty 79
4. Channel and noise. The flat fading channel assumption is rather realistic when
the sampling window time is relatively short and the system mobility is limited,
which is the typical scenario for current CR applications. Finally, the Gaussian
model for the noise is appropriate in general. (Impulsive noise is usually of
secondary importance for CR wireless applications.)
The detector builds its test statistic from K sensors (receivers, nodes or antennas)
and N time samples for each of them. Let,
be the K × 1 received vector at time n, where the element yk (n) is the discrete
baseband complex (I/Q) sample at receiver k and time n. Under H0 , the received
vector contains only noise and consists of K independent complex Gaussian noise
80 Cognitive Radio: Spectrum Sensing
where,
• s(n) is the transmitted signal sample at time n, modeled as Gaussian with zero
mean and variance σs2 : s(n) ∼ NC (0, σs2 )
where, ∥.∥2 denotes the Frobenius norm and E[.] is the mean operator. The received
samples are stored by the detector in the K × N received matrix
Let us introduce the 1 × N signal matrix S ≜ [s(1) · · · s(n) · · · s(N)] and the K × N
noise matrix V ≜ [v(1) · · · v(n) · · · v(N)]. All the signals samples of S and the noise
samples of V are assumed statistically independent. The detector must distinguish
between
1
R≜ YY H , (4.6)
N
4.2 Semi-blind SS techniques under noise uncertainty 81
In order to compare the performances for different threshold values ROC curves can
be used. The ROC curve is obtained by plotting the probability of correct detection
versus the probability of false alram. ROC curves allow us to explore the relationship
between the sensitivity (Probability of detection) and specificity (Probability of false
alarm) of a sensing method for a variety of different threshold, thus allowing the
determination of an optimal threshold.
The usual criterion for comparing two tests is to fix the false alarm rate PFa and look
for the test achieving the higher PD . The Neyman-Pearson (NP) lemma [130] is
known to provide the Uniformly Most Powerful (UMP) test, achieving the maximum
possible PD for any given value of PFa . The NP criterion is applicable only when
both H0 and H1 are simple hypotheses. In our setting this is the case when both the
82 Cognitive Radio: Spectrum Sensing
noise level σv2 and the channel vector h are a prior known. The NP test is given by
the following likelihood ratio:
The NP test provides the best possible performance, but requires exact knowledge of
both h and σv2 . For most practical applications, the knowledge of h is questionable.
The noise variance is somewhat easier to know: since we only consider thermal
noise, if the temperature is constant some applications may possess an accurate
estimation of it.
From N noise samples in one detection interval (one slot), one MLE noise estimate
is generated. To make the estimate more accurate, S such estimates are averaged
after getting new estimate of the noise variance forming a Moving Average System
(MAS) as shown in Figure 4.3. Thus, the final expression for the noise variance
estimation is given by,
1 S K M
σ̂v2 (S) = ∑ ∑ ∑ |vk (m)|2 . (4.9)
KSM s=1 k=1 m=1
Basically, there are two approaches of noise variance estimation depending on the
availability of the noise signal samples. Based on the noise variance estimation ap-
proach, two types of hybrid techniques of ED/RLRT are proposed in this dissertation,
namely,
Fig. 4.4 Hybrid approach-1: Noise variance estimated from S auxiliary noise only slots.
A Offline Estimation
In this approach, noise variance is estimated explicitly assuming pure noise
samples are available. As can be seen from the block diagram shown in
Figure 4.4, noise variance is estimated from explicitly available noise only
samples taking N samples at a time. Accurate estimate of the noise variance is
obtained by averaging S variances from S noise-only slots using the MAS. The
average noise variance estimate is then used in detecting the received primary
signals using ED/RLRT detectors. After each detection interval, the average
noise variance estimate is updated using one new noise variance estimate and
the process is repeated. For ED and RLRT algorithm using this approach of
noise estimation, Hybrid Energy Detection (HED1) and Hybrid Roy’s Largest
Root Test (HRLRT1) is named respectively.
B Online Estimation
In this approach, noise variance is estimated implicitly from S auxiliary re-
4.2 Semi-blind SS techniques under noise uncertainty 85
Fig. 4.5 Hybrid approach-2: Noise variance estimated in S auxiliary slots from received
signal samples declared only noise samples by ED/RLRT
ceived signal slots which are declared only noise samples by the same algo-
rithm. As can be seen from the block diagram shown in Figure 4.5, noise
variance is calculated from signal samples implicitly declared as noise only
samples by ED/RLRT taking M samples at a time. Accurate estimate of the
noise variance is obtained by averaging S variances using a Moving Average
taking S slots into consideration. The average noise variance estimate is then
used in detecting the received primary signals using ED/RLRT detectors in
the next detection interval. Thus, after the encounter of the noise only slots,
the system updates the noise variance estimate and the process is repeated.
For ED and RLRT algorithms using this approach of noise estimation, Hybrid
Energy Detection-2 (HED2) and Hybrid Roy’s Largest Root Test-2 (HRLRT2)
are named respectively.
Objective of every spectrum sensing scheme is to find out the detection statistic
which can be used in the decision making by properly comparing against a threshold
86 Cognitive Radio: Spectrum Sensing
value. ED is a spectrum sensing techniques that evaluates the signal energy over
a certain time interval and compare it with the threshold to decide whether the
spectrum is in use or not. The presence of noise in the signal may affect the decision
of energy detector thus causing false alarm or even miss detection.
Using the information of the received signal matrix Y to develop a test statistic TED ,
which is the measure of the average energy of the received signal over a sensing
interval N, the detector compares TED against a predefined threshold t. If TED < t
then it decides in favour of Null Hypothesis H0 otherwise in favor of Alternate
Hypothesis H1 . The average energy of the received signal vector Y normalized by
the noise variance σv2 can be represented as,
K N
1
TED = ∑ ∑ |yk (n)|2.
KNσv2 k=1
(4.10)
n=1
K N
1
TED |H0 = ∑ ∑ |vk (n)|2
KNσv2 k=1
(4.11)
n=1
2
1 K N vRk (n) vCk (n)
= ∑ ∑ √σv + j √σv (4.12)
2KN k=1 n=1 2 2
K N 2
1 R
= β + jβ C (4.13)
∑ ∑
2KN k=1 n=1
1 K N 2
= ∑ ∑ βR + βC2,
2KN k=1
(4.14)
n=1
where vRk (n) and vCk (n) are real and imaginary part of the noise signal vk (n)
√ √
respectively. βR = 2vRk (n)/σv and βC = 2vCk (n)/σv . As vk (n) is a zero
mean and σv2 variance complex valued Gaussian Random Variable, βR and βC
are Standard Normal Random Variables with mean zero and unity variance.
The numerator of TED in (4.14) is sum of square of 2KN Standard Normal
Random Variable with mean zero and variance 1, thus, the decision statistic
TED |H0 follows the Chi Square Distribution with 2KN degrees of freedom
4.2 Semi-blind SS techniques under noise uncertainty 87
1 2
TED |H0 = χ . (4.15)
2KN 2KN
K N
1
TED |H1 = ∑ ∑ |hk sk (n) + vk (n)|2
KNσv2 k=1
(4.16)
n=1
2
K 2
σtk N
hk sk (n) + vk (n)
=∑ 2 ∑
σtk
(4.17)
k=1 KNσ v n=1 √
2
K σt2k N
= ∑ 2KNσv2 ∑ |α|2, (4.18)
k=1 n=1
where α = hk skσ(n)+v /
√ k (n) . As hk is assumed to be constant for the sensing interval
2
tk
and both the signal and noise are Complex Valued Gaussian Signals with
variances σv2 and σs2 respectively and both are independent signals, hk sk (n) +
vk (n) is also Complex Valued Gaussian Signal with mean zero and variance
σt2k . It is clear that α is also a Complex Valued Standard Normal Random
Variable with mean zero and unity variance. So the sum ∑N 2
n=1 |α| in (4.18)
follows the Chi Square Distribution with 2N degrees of freedom. And we
have:
K
|hk |2 σs2 + σv2
2
TED |H1 = ∑ 2
χ2N (4.19)
k=1 2KNσ v
K K
|htk |2 σs2
2 1 2
=∑ 2
χ2N + ∑ χ2N (4.20)
k=1 2KNσv k=1 2KN
2
Kρ χ2N χ2
TED |H1 = + 2KN . (4.21)
2KN 2KN
According to the Central Limit Theorem, when N is sufficiently large, the Chi
Squared Distributed Random Variable in (4.21) converges to a Gaussian Distribution.
88 Cognitive Radio: Spectrum Sensing
Chi-square pdf
0.25
N=3
PDF of Chi Squared Distributed Random Variable
N=5
N = 10
0.2 N = 15
N = 20
Normal(20,40)
0.15
0.1
5 · 10−2
0
0 5 10 15 20 25 30 35 40
y
Fig. 4.6 χN2 distribution with 5, 10, and 20 degrees of freedom. A normal distribution is
superimposed to illustrate a good approximation to χN2 by NR (20, 40) for N large
Figure 4.6 shows the pdf plot of the Chi Squared Distribution for 3, 5, 10, and 20
degrees of freedom superimposing NC (10, 20) to illustrate a good approximation of
χN2 by a Gaussian NC (N/2, 2N) ∼= NR (N, 2N) for large N. It is clear fron Figure 4.6
that Chi Square Distribution Variable with Degrees of Freedom 20 (N = 20) shows
a similarity with the Normal Distribution with mean and variance 20 and 40 (N and
2N).
To get an insight of accuracy of the approximation, simulation of Gaussian
approximation of Chi Square Distribution for different values of N is carried out.
Figure 4.7 shows the pdf of Chi Square Random Variable and its Gaussian Approxi-
mation counterpart for N taking values 5, 10, 20 and 40. Also Figure 4.8 shows the
plot of the Mean Square Error (MSE) of the approximation considering Probability
Density Functions of distribution functions as a comparison criteria for varying N.
The approximation shows perfect matching for N greater than 40 and it is clear
that the MSE is nearly zero, i.e. the Gaussian approximation is very accurate for
N > 40, which indicated that a degree of freedom greater than 40 is sufficient for
4.2 Semi-blind SS techniques under noise uncertainty 89
For N = 5 For N = 10
0.2 0.1
Chi−Square pdf Chi−Square pdf
Density Function
Density Function
Gaussian pdf 0.08 Gaussian pdf
0.15
0.06
0.1
0.04
0.05
0.02
0 0
0 20 40 60 80 0 20 40 60 80
x x
For N = 20 For N = 40
0.08 0.06
Chi−Square pdf Chi−Square pdf
Density Function
Density Function
0.06 Gaussian pdf Gaussian pdf
0.04
0.04
0.02
0.02
0 0
0 20 40 60 80 0 20 40 60 80
x x
Fig. 4.7 Comparison of Chi Square Distribution with Gaussian approximation for different N
H0 , .
1
(
NR 1, KN
TED = 2 +2ρ+1 (4.22)
NR (ρ + 1), Kρ KN H1
90 Cognitive Radio: Spectrum Sensing
·10−4
6
4
Mean square error
0
0 10 20 30 40 50 60 70 80 90 100
Degree of Freedom
Fig. 4.8 MSE of the approximation considering Probability Density Function approximation
A numerical study shows that ED ROC curves based on chi-squared distributions may
be accurately represented by binomial ROC curves. This allows the detector accuracy
and the ROC shape to be expressed simply in terms of distribution parameters [86].
For any description model, it would be useful to have a concise description of the
ROC curves that is meaningful in terms of underlying signal and noise distributions.
Such a description would facilitate the comparison between model and experiments,
and help in studying the effect of changing model parameter.
Hypothesis test is a procedure which divides the space of observations into
2 regions, Rejection Region (R) and Acceptance Region (A). The two important
characteristics of a test are called significance and power, referring to errors of type I
and II in hypothesis testing which relates to Probability of false alarm and probability
of detection respectively. The probabilities of false alarm PFa and probability of
4.2 Semi-blind SS techniques under noise uncertainty 91
Based on the statistics of TED shown in (4.22), PFa can be evaluated as,
Z ∞
PFa = TED |H0 dt (4.25)
t
t−µ
1
= 1 − φ (t) ≡ 1 − 1 + er f √ (4.26)
2 2σ 2
t−µ
1
= 1 − er f √ (4.27)
2 2σ 2
t−µ
1
= er f c √ (4.28)
2 2σ 2
t−µ
PFa = Q √ , (4.29)
2σ 2
where φ (t) is the cdf of Normal Distribution, er f () is the error function, er f c()
is the complementary error function and Q() is the complementary cdf of Normal
Random Variable. Now putting the value of mean and variance for H0 from (4.22),
We have h √ i
PFa = Q (t − 1) KN . (4.30)
Simulation Result
1
ED Theory (K = 1)
ED Numerical (K = 1)
ED Theory (K = 2)
0.8 ED Numerical (K = 2)
ED Theory (K = 5)
Detection probability PD
ED Numerical (K = 5)
0.6
0.4
0.2
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
False alarm Probability PF a
Fig. 4.9 ROC plot of ED for Normal Approximation of the Decision Statistics for N = 100,
and SNR = −10dB for varying number of sensors K
for SNR = −10 dB, N = 100, and number of sensors K = 1 (Single Sensor), 5 and
10 are compared with the numerical simulation for the same parameters. The plots
overlap with each other and model proves to be very accurate. With the increase in
number of sensors from 1 to 10, the performance of ED is greatly enhanced. The
graph converges to PD = 1 with steep slope for K = 10 if compared to the case
of K = 1 which shows that co-operative(“soft combining”) spectrum sensing can
greatly enhance the performance.
SNR performance of ED for a given PFa is illustrated in Figure 4.10. The
accuracy of the the closed-form expression derived in (4.30) and (4.31) is confirmed
by the results presented in Figure 4.10, where the theoretical formula is compared
against simulated detection performance for different SNR values. The considered
parameters are (K = 5, 10, 15, N = 50), at a false alarm rate of 5%. As shown in the
figure, the theoretical expressions are quite accurate even for a small number K of
sensors.
Figure 4.11 shows the variation of Probability of Detection vs. SNR performance
for different uncertainty in noise variance described as as the ratio between estimated
4.2 Semi-blind SS techniques under noise uncertainty 93
0.8
Numerical (K = 5)
0.7 Theoretical (K = 5)
Numerical (K = 10)
Theoretical (K = 10)
0.6 Numerical (K = 15)
Probability of Miss PM
Theoretical (K = 15)
0.5
0.4
0.3
0.2
0.1
0
−13 −12 −11 −10 −9 −8 −7 −6 −5 −4
SNR in dB
Fig. 4.10 Probability of Miss vs. SNR for varying number of sensors. Parameters: N =
50, PFa = 0.05 and K = 5, 10 and 15
noise variance and true variance level. Even though the increase in number of sensors
from 1 to 5 increases the performance of ED significantly, there is still a big gap
between known and unknown noise variance curves. This result makes it clear that,
the knowledge of exact noise variance is the crucial part for ED.
From the results of previous section, it is evident that the knowledge of the noise
power (noise variance for zero mean Gaussian Noise) is imperative for achieving the
optimum ED performance. Unfortunately, the variation and the unpredictability of
noise power is unavoidable. Thus, the knowledge of the noise power is one of the
critical limitations of ED for its operation in low SNR. The only option is to estimate
the noise power. This chapter deals with the study of detection performance of the
94 Cognitive Radio: Spectrum Sensing
0.8
Probability of Detection PD
0.6
−10 −8 −6 −4 −2 0 2 4
SNR in dB
Fig. 4.11 Probability of Detection vs. SNR for varying amount of noise uncertainty measured
2
as β = σ̂σv2 , and x = 10 log10 (β ), Parameters: N = 40, PFa = 0.1 and K = 1, 5 and S
v
In this chapter, a concept of noise variance estimation from noise only samples
is proposed so as to fulfill the gap of unavailability of the noise variance. In this
technique called HED1, noise variance is estimated on S auxiliary noise only slots,
under the hypothesis that noise variance is constant over the adjacent slots.
Consider a sampling window of length M before and adjacent to the detection
window which is containing noise only samples for sure. Then the estimated noise
variance from these noise-only samples using a Maximum Likelihood noise power
2 For single sensor performance evaluation, set the number of sensors K to 1.
4.2 Semi-blind SS techniques under noise uncertainty 95
1 K M
σ̂v2 = ∑ ∑ |vk (m)|2. (4.32)
KM k=1 m=1
If the noise variance is constant, the estimation can be averaged over S successive
noise-only slots. And (4.32) becomes:
1 S K M
σ̂v2 (S) = ∑ ∑ ∑ |vk (m)|2 . (4.33)
KSM s=1 k=1 m=1
Now, the ED Test Statistic in (4.10) can be modified to HED1 test statistic
using (4.33) as,
K N
1
THED1 = 2 ∑ ∑ |yk (n)|2 . (4.34)
KN σ̂v (S) k=1 n=1
Here, THED1 denotes the detection statistics for the HED1 scheme and the statistical
distribution of THED1 depends upon the particular estimation technique considered.
Moreover, (4.34) can be considered as the parametric likelihood ratio test when
the signal to be detected is assumed to be Gaussian with zero mean and variance σs2 .
Proposition 1. The false alarm probability PFa of HED1 for number of sensors K,
number of samples N, number of auxiliary slots S and threshold t is given by,
t−1
PFa = Q q . (4.35)
MS+Nt2
KMNS
K N
1
THED1 |H0 = 2 ∑ ∑ |vk (n)|2 (4.37)
KN σ̂v k=1 n=1
2
K
R
N vk (n) vCk (n)
∑k=1 ∑n=1 √σv + j √σv
2KMS 2 2
= (4.38)
2
2KN
S M vk (m)
√
∑s=1 ∑m=1 σ / 2
v
∑K N
k=1 ∑n=1 |β1 |
2
2KMS
= , (4.39)
2KN ∑Ss=1 ∑K ∑N
k=1 n=1 |β 2 |2
where vRk (n) and vCk (n) are real and imaginary part of the noise signal vk (n)
√ √
respectively, β1 = 2vk (n)/σv and β2 = 2vk (m)/σv .
As vk (n) is a zero mean and σv2 variance complex valued Gaussian Random
variable, β1 and β2 are Standard Normal Random Variables with zero mean
and unity variance. Both numerator and denominator of THED1 in (4.39) are
the sum of square 2KMS and 2KN Standard Normal Random variables with
zero mean and variance 1. Thus, the numerator and the denominator of the
decision statistic THED1 |H0 follows the Chi Square Distribution with 2KMS
and 2KN degrees of freedom respectively, scaled by the factor 2KMS
2KN .
2
2KMS χ2KN
THED1 |H0 = 2
(4.40)
2KN χ2KMS
hk sk (n)+v √
where α = √ k (n) and β2 = 2vk (m)/σv .
σtk / 2
The channel coefficient hk is assumed to be constant for the sensing interval
and both signal and noise are independent Complex Valued Gaussian variable
with variances σv2 and σs2 respectively. Then, hk sk (n) + vk (n) is a Complex
Valued Gaussian variable with zero mean and variance σt2k . It is clear that α
and β2 are also Complex Valued Standard Normal Random Variables with
zero mean and unity variance. So the sum ∑N 2 S K M
n=1 |α| and ∑s=1 ∑k=1 ∑m=1 |β |
2
For large values of N and M, the Chi Squared Random Variables in (4.40) and (4.46)
can be replaced by their normal approximates with χN2 ∼ NR (N, 2N). Thus, decision
98 Cognitive Radio: Spectrum Sensing
statistics TED |H0 and TED |H1 in (4.40) and (4.46) can be re-written as,
KMS NR (2KN, 4KN)
THED1 |H0 = (4.47)
KN NR (2KMS, 4KMS)
Kρ 2 +2ρ+1
NR ρ + 1, KN
THED1 |H1 = 1
. (4.48)
NR 1, KMS
Now, the ratio of two normal random variables in (4.47) and (4.48) can be trans-
formed to a single normal random variables as shown below under the assumption
that the denominator is always positive [121].
NR 1, 1 + t2 H0 ,
THED1 = KN KMS 2 2
. (4.49)
NR (ρ + 1), t + Kρ +2ρ+1 H 1
KMS KN
A numerical study shows that ED ROC curves based on chi-squared distributions may
be accurately represented by binomial ROC curves. This allows the detector accuracy
and the ROC shape to be expressed simply in terms of distribution parameters [86].
For any description model, it would be useful to have a concise description of the
ROC curves that is meaningful in terms of underlying signal and noise distributions.
Such a description would facilitate the comparison between model and experiments,
and help in studying the assessment of effect of changing model parameter.
Hypothesis test is a procedure which divides the space of observations into
2 regions, Rejection Region (R) and Acceptance Region (A). The two important
characteristics of a test are called significance and power, referring to errors of type I
and II in hypothesis testing which relates to probability of false alarm and probability
of detection respectively. The probabilities of false alarm PFa and probability of
detection PD for a given decision statistic referring to HED1 test is given by:
Based on the statistics of THED1 shown in (4.49), PFa can be evaluated as,
Z ∞
PFa = TED |H0 dt (4.52)
t
t−µ
1
= 1 − φ (t) ≡ 1 − 1 + er f √ (4.53)
2 2σ 2
t−µ
1
= 1 − er f √ (4.54)
2 2σ 2
t−µ
1
= er f c √ (4.55)
2 2σ 2
t−µ
PFa = Q √ , (4.56)
2σ 2
where φ (t) is the cdf of Normal Distribution, er f (.) is the error function er f c() is
the complementary error function and Q(.) is the complementary cdf of Normal
Random Variable.
Now putting the value of mean and variance for H0 from (4.49), we have:
t−1
PFa = Q q . (4.57)
MS+Nt2
KMNS
Simulation Result
This Sub-Section shows the comparison between simulated ROC curves and analyti-
cal curves based on (4.35) and (4.36). The accuracy of the closed-form expression
derived in Proposition 1 is confirmed by the results presented in Figure 4.12, where
the theoretical formulas (4.35) & (4.36) are compared against simulated perfor-
mance over S auxiliary noise only slots (S ranges from 1 to 10). It can be realized
from Figure 4.12 that the analytical and the numerical curves are perfectly matched
100 Cognitive Radio: Spectrum Sensing
0.8
0.6
PD
Fig. 4.12 ROC of Multi Sensor HED1, Parameters: N = 100, M = 100, K = 5, S = 1, 2, 5, 10,
and SNR = −10 dB
0.8
HED1 Numerical (S = 2)
0.7 HED1 Theoretical (S = 2)
HED1 Numerical (S = 8)
HED1 Theoretical (S = 8)
0.6 ED (Known Variance)
Probabiliry of Miss PM
0.5
0.4
0.3
0.2
0.1
0
−12 −11 −10 −9 −8 −7 −6 −5 −4
SNR in dB
and this validates the analytical expressions. Also, it can be noted that the increase
in number of slots for noise variance estimation correspondingly increases the per-
formance of HED1 and approaches closer to the optimal one (ED with known noise
variance). Under the considered scenario with M = N = 100 which is the number
of noise samples in each slot, just S = 10 ( i.e., 1000 samples) provides very near
convergence to ideal performance.
Fixed the probability of false alarm PFa = 0.05, the simulated and analytical
performance of HED1 in terms of probability of miss-detection is plotted against
different values of SNR in Figure 4.13. The considered parameters are (K = 5,
N = 50, M = 50). As shown in the figure, the theoretical expressions is quite accurate
even for a small number K of sensors. The figure clearly shows the performance
gap between ED (known variance) and HED1 with estimated noise variance from S
auxiliary noise only slots.
information from the previous slots declared as H0 by the algorithm. Now, the noise
variance estimated from S previous slots which are declared H0 is used in current
detection interval to get the decision about the presence or absence of the primary
signal. The derivation of the analytical expression of performance parameters PD
and PFa in a multi-sensor environment for HED2 is now presented using different
probability distribution models.
The information on the received signal matrix Y is used to develop a test statistic
THED2 , which measures the average energy of the received signal over a sensing in-
terval N and compares it against an estimated noise variance. The detector compares
THED2 against a predefined threshold t. If THED2 < t then it decides in favor of Null
Hypothesis H0 otherwise in favor of Alternate Hypothesis H1 . The average energy
of the received signal vector Y normalized by the estimated noise variance σ̂v2 can
be represented as,
K N
1
THED2 = ∑ ∑ |yk (n)|2.
KN σ̂v2 k=1
(4.59)
n=1
where, SS = SPS 1 − PDED is the number of primary signal slots missed by ED and
If a slot is slot are declared noise only by ED, there is a chance with probability
(1 − PDED ) that ED decides in favor of H0 even if it was H1 . If the estimated variance
is the mean of S successive noise variances calculated from the noise only slots
decided by ED, then out of S noise only slots decided by ED, PS (1 − PDED )S noise
variance estimates are calculated from H1 slots. Thus, the average noise variance can
now be written as the mean of the noise variance estimated from H0 slots declared
H0 by ED and the H1 slots declared H0 by ED. Finally, (4.61) can be modified and
rewritten as,
" #
Ss K M SN K M
2
∑ ∑ ∑ |hk s(m) + v(m)| +∑ ∑ ∑ |vk (m)|2
s=1 k=1 m=1 s=1 k=1 m=1
σ̂v2 (S) = . (4.62)
KMS
Proposition 3. The false alarm probability PFa of HED2 for number of sensors K,
number of samples N, number of auxiliary slots S for noise estimation using (4.62)
and threshold t is given by,
S
t−
S + ρSS
PFa = Q s
. (4.63)
2 2 2
t N(SS Kρ + ρSS + S) + MS
KMN(S + ρSS )2
K N
1
THED2 |H0 = 2 ∑ ∑ |vk (n)|2 (4.65)
KN σ̂v k=1 n=1
!
1 K N |vk (n)|2
1
= ∑ ∑ σv2 (4.66)
σ̂v2 /σv2 KN k=1 n=1
B
= , (4.67)
A
where,
A = σ̂v2 /σv2 and,
1 K N |vk (n)|2
B= ∑ ∑ σv2 .
KN k=1 n=1
A can be simplified using the expression of σ̂v2 in (4.62) as,
σ̂v2
A= 2 (4.68)
σv
Ss K M SN K M
∑∑ ∑ |hk s(m) + v(m)|2 + ∑ ∑ ∑ |vk (m)|2
s=1 k=1 m=1 s=1 k=1 m=1
= . (4.69)
MKSσv2
" ! #
1 SS K σt2k 2 2
A= ∑ ∑ 2 χ2M + χ2KMSN
, (4.70)
2MKS s=1 k=1 σv
1 K N |vk (n)|2
B= ∑ ∑ σv2 (4.78)
KN k=1 n=1
1 K N 2
= ∑ ∑ β1 , (4.79)
2KN k=1 n=1
where β1 = σvk/(n
√ is a Standard Normal Random Variable with zero mean and
2
v
unitary variance.
Now, the sum in (4.79) is the sum of square of KN Complex Standard Normal
Random variables, thus the sum follows a Chi Square Distribution of 2KN
degrees of freedom, i.e.
1 2
B= χ . (4.80)
2KN 2KN
Again, using an Normal Approximation to a Chi Square Random variable, (4.80)
can be written in the form
1
B = NR 1, . (4.81)
KN
Finally, using (4.77) and (4.81) in (4.66), the expression of THED2 |H0 can be
written as the ratio of two Normal Random variables as,
1
NR 1, KN
THED2 |H0 = . (4.82)
S+ρSS SS Kρ 2 +ρSS +S
NR S , KMS2
hk sk (n)+v
√ k (n) .
where α = σtk / 2
As hk is assumed to be constant for the sensing interval and both the signal and
noise are independent Complex Valued Gaussian samples with variances σv2
and σs2 respectively, hk sk (n) + vk (n) is also Complex Valued Gaussian samples
with zero mean and variance σt2k . It is clear that α is a Complex Standard
Normal Random Variable with zero mean and unitary variance. So the sum
∑N 2
n=1 |α| in (4.88) follows the Chi Square Distribution with 2N and 2SKM
4.2 Semi-blind SS techniques under noise uncertainty 107
K
|hk |2 σs2 + σv2
2
C= ∑ 2
χ2N (4.89)
k=1 2KNσ v
K 2 2 2
|htk | σs
2 1 2
=∑ 2
χ 2N + ∑ χ2N (4.90)
k=1 2KNσv k=1 2KN
1 2 2
= Kρ χ2N + χ2KN . (4.91)
2KN
Simplifying (4.91) to a Normal Distributed Random Variable, we obtain
Kρ 2 + 2ρ + 1
C = NR ρ + 1, . (4.92)
KN
Using expression of A from (4.77) and C from (4.92) in (4.85), THED2 |H1 can
be written as the ratio of two Normal Random Variables as,
Kρ 2 + 2ρ + 1
NR ρ + 1,
KN
THED2 |H1 = (4.93)
S + ρSS SS Kρ 2 + ρSS + S
.
NR ,
S KMS2
This shows that, for both H0 and H1 , the decision statistic is the ratio of two
normal random variables which can be simplified to single Normal Random
108 Cognitive Radio: Spectrum Sensing
Variable as,
2 N(S Kρ 2 + ρS + S) + MS2
S t S S
NR , H0 ,
S + ρSS 2 KMN(S + ρSS )2
THED2 = .
S(ρ + 1) t N(SS Kρ 2 + ρSS + S) + MS2 (Kρ 2 + 2ρ + 1)
, H1
NR
S + ρSS KMN(S + ρSS )2
(4.95)
Based on the statistics of THED2 given by (4.95), probability of false alarm can be
written in terms of Q-function as,
S
t−
S + ρS S
PFa = Q s
2
. (4.96)
2 2
t N(SS Kρ + ρSS + S) + MS
KMN(S + ρSS )2
Simulation Result
This Sub-Section shows the comparison between HED2 simulated curves and an-
alytical ROC curves based on (4.63) and (4.64). Figure 4.14 shows perfect match
between theoretical and numerical curves validating the considered model. Fig-
ure 4.15 illustrates the comparison of ED, HED1 and HED2 performance in varying
SNR. Performance of HED1 and HED2 varies typically around 0 dB SNR but no
big difference can be noted in extreme higher or lower SNR values. Since, there is
a chance of mis-interpretation of noise plus primary signal as only noise signal in
case of HED2, performance of HED2 is slightly lower than HED1 near 0 dB SNR.
With the increase in the number of slots used for the estimation of the noise variance,
4.2 Semi-blind SS techniques under noise uncertainty 109
1
HED2 Theory (S = 5)
HED2 Numerical (S = 5)
HED2 Theory (S = 50)
0.8 HED2 Simulated (S = 50)
Probability of Miss PM
0.6
0.4
0.2
0
−10 −8 −6 −4 −2 0 2 4 6 8 10
SNR in dB
Fig. 4.14 Comparison of simulated and analytical detection performance curves of HED2
method for N = 10, M = 10, K = 5, S = 5 and 50
the probability of miss of HED1 and HED2 is decreases and goes near to that of
ED-known variance.
110 Cognitive Radio: Spectrum Sensing
1
ED
HED2 (S = 2)
HED1 (S = 2)
0.8
HED2 (S = 5)
Mis-Detection Probability PM
HED1 (S = 5)
HED2 (S = 10)
0.6 HED1 (S = 10)
0.4
0.2
0
−10 −8 −6 −4 −2 0 2 4 6 8 10
SNR in dB
Fig. 4.15 Comparison of performance curves of HED2, ED and HED1 for N = 10, M = 10,
K = 5, S = 2, 5 and 10
4.2.10 RLRT
Using the information on the received signal matrix Y and assuming a perfect
knowledge of noise variance σv2 and the channel parameter h, a test statistic T is
developed. The detector compares T against a predefined threshold t. If T < t it
decides in favor of Null Hypothesis H0 otherwise in favor of Alternate Hypothesis
H1 . In context of perfect knowledge of noise and channel parameters, the most
accurate and uniformly most powerful test of the above hypothesis is the Neyman-
Pearson Test (NP Test) [131]. Using NP test, the expression of the test statistic can
be written as
p (Y; h, σs2 , σv2 )
TNP = 1 . (4.98)
p0 (Y; σv2 )
4.2 Semi-blind SS techniques under noise uncertainty 111
Using (4.98) probability of false alarm PFa and probability of detection PD for a
given decision statistic are given by,
λ1
TRLRT = . (4.101)
σv2
TRLRT |H0 − µ
Prob < t → FTW 2 (t), (4.102)
ξ
where FTW 2 (t) is the Cumulative Distribution Function of the Tracy Widom Dis-
tribution of order 2 with suitably chosen centering and scaling parameters given
by:
" 1 #2
K 2
µ= +1 (4.103)
N
" 1 # " 1 #1/3
−2
K 2 K
ξ = N −2/3 +1 +1 . (4.104)
N N
112 Cognitive Radio: Spectrum Sensing
λ1
∼ NR (µ1 , σ12 ), (4.108)
σv2
where,
K −1
µ1 = (1 + Kρ) 1 + (4.109)
NKρ
K −1
2 1 2
σ1 = (Kρ + 1) 1 − . (4.110)
N NK 2 ρ 2
Thus, using the above normal approximation in (4.100), the probability of detec-
tion of RLRT can be written as
t − µ1
PD = Q . (4.112)
σ1
4.2 Semi-blind SS techniques under noise uncertainty 113
0.8
Probability of Detection (PD )
0.6
RLRT Numerical (K = 8)
0.4 RLRT Analytical (K = 8)
RLRT Numerical (K = 10)
RLRT Analytical (K = 10)
ED Numerical (K = 8)
0.2
ED Analytical (K =8)
ED Numerical (K = 10)
ED Analytical (K = 10)
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability of False Alarm (PF a )
Fig. 4.16 Comparison of simulated and analytical ROC performance curves of RLRT method
for N = 50, K = 8 and 10, SNR = −10 dB
0.9
Probability of Detection PD
0.8
0.7
0.6
0.5
RLRT (K = 5)
RLRT (K = 7)
0.4
ED (K = 5)
ED (K = 7)
0.3
−12 −11.5 −11 −10.5 −10 −9.5 −9 −8.5 −8 −7.5 −7 −6.5 −6
SNR in dB
Fig. 4.17 PD vs. SNR performance of RLRT. Parameters: N = 100, K = 5, 7, PFa = 0.05
114 Cognitive Radio: Spectrum Sensing
0.8
Probability of Detection (PD )
0.6
0.4
Fig. 4.18 Effect of Noise Variance fluctuation on ED and RLRT. Parameters: N = 100, K =
4, var(σ̂v2 ) = 0.0032(−25dB) given nominal variance σv2 = 1
Simulation Result
The ROC performance of RLRT is shown in Figure 4.16 along with its comparison
with ED for the same simulation parameters. The accuracy of the closed-form
expression derived in (4.107) and (4.112) is confirmed by the results presented in
Figure 4.16, which shows a perfect match between analytical and ùàsimulated curves.
The considered parameters are (K = 8, N = 50) at −10dB SNR. As shown in the
figure, the theoretical expressions is quite accurate even for small number of sensors
K. The figure also shows the performance gap between ED and RLRT.
For given probability of false alarm PFa = 0.05, the performance of RLRT in
terms of probability of miss-detection is plotted against different values of SNR in
Figure 4.17. The considered parameters are (K = 5, 7 and N = 50). A comparison
between ED and RLRT can also be realized from Figure 4.17. It can be noted that
the detection performance of RLRT is far more better than that of ED for same
simulation parameters.
4.2 Semi-blind SS techniques under noise uncertainty 115
HRLRT1 addresses the problem of a priori knowledge of the noise power in RLRT.
HRLRT1 is a hybrid approach of RLRT similar to HED1 in which estimated noise
variance is used instead of nominal noise variance so as to normalize the received
signal in order to detect the primary signal.
HRLRT1 explores the concept of noise variance estimation from noise only samples
so as to fulfill the gap of unavailability of the noise variance. Assuming the noise
variance is constant over the adjacent slots, independent noise estimation in auxiliary
“noise only” slots is performed.
Consider a sampling window of M samples before and adjacent to the detection
window which is containing only noise samples for sure. The estimated noise
variance from the noise only samples using a Maximum Likelihood noise power
estimation can be written as,
1 K M
σ̂v2 = ∑ ∑ |vk (m)|2. (4.113)
KM k=1 m=1
If the noise variance is constant over each slots, the estimation can be averaged over
S successive noise-only slots. Thus, above (4.113) can be modified by averaging
over S successive noise-only slots as,
1 S K M
σ̂v2 = ∑ ∑ ∑ |vk (m)|2 . (4.114)
KSM s=1 k=1 m=1
116 Cognitive Radio: Spectrum Sensing
Now, the HRLRT1 Test Statistic can be derived from (4.101) by replacing the exact
noise variance with the estimated noise variance using (4.114), i.e.,
λ1
THRLRT 1 = . (4.115)
σ̂v2
Equation (4.115) can be considered as the parametric likelihood ratio test when
the signal to be detected is assumed to be Gaussian with zero mean and variance σs2 .
Proposition 4. Consider the HRLRT1 test working with K sensors, N samples, SNR
value ρ and threshold t. Asymptotically in N and K, the false alarm and detection
probability of HRLRT1 are given by,
For the ease of simplification, consider the test statistic of the HRLRT1 as shown
below,
λ1 |H0 1
THRLRT 1 |H0 = 2
× 2 2. (4.119)
σv σ̂v /σv
1) False alarm probability: Under Null hypothesis H0 where Y = V, the sample
covariance matrix R follows a Wishart Distribution of degree N. From (4.115)
and (4.119) it is clear that the false alarm rate depends upon the distribution of the
largest eigenvalue λ1 of the sample covariance matrix R.
4.2 Semi-blind SS techniques under noise uncertainty 117
λ |H
Now, for sufficiently large N and K, 1σ 2 0 follows a Tracy Widom Distribution of
v
order 2 [98] with suitably chosen centering and scaling parameters as shown below:
" 1 #2
K 2
µ= +1 (4.120)
N
" 1 # " 1 #1/3
−2
K 2 K
ξ = N −2/3 +1 +1 . (4.121)
N N
Let us denote the Probability Density Function of the Tracy Widom Distribution of
order 2 as,
z−µ z−µ
1
pdf FTW 2 = fTW 2 . (4.122)
ξ ξ ξ
Similarly, for sufficiently large value of D = 2KSM, σ̂v2 /σv2 follows a Normal
distribution NR 1, D2 with Probability Density Function,
r
D(x − 1)2
1 D
f1,2/D (x) = exp − . (4.123)
2 π 4
Thus, using above distribution, the test statistic THRLRT 1 |H0 in (4.119) can be re-
written as, λ |
1 H0
−µ
σv2
FTW 2 ξ
Since the two random variables in (4.124) are statistically independent, the probabil-
ity density functions of the detection statistic THRLRT 1 |H0 can be written as,
r
tx − µ
1 D D
Z ∞
2
f0 (t) = |x|fTW 2 exp − (x − 1) dx. (4.125)
2ξ π −∞ ξ 4
Now, using the result in (4.125), the probability of false alarm can be written as,
1
ρCric = √ , (4.127)
KN
which in fact suggests that when SNR is lower than the critical value, the limiting
λ |
distribution of 1σ H2 1 is the same as that of the largest noise eigenvalue, thus, nullifying
v
the statistical power of a largest eigenvalue test.
λ1 |H1
For ρ > ρCric the distribution of σv2
was found to be asymptotically Gaus-
sian [107, 21] as shown below,
λ1 |H1
∼ NR (µ1 , σ12 ), (4.128)
σv2
where,
K −1
µ1 = (1 + Kρ) 1 + (4.129)
NKρ
K −1
2 1 2
σ1 = (Kρ + 1) 1 − . (4.130)
N NK 2 ρ 2
NR (µ1 , σ12 )
THRLRT 1 |H1 = . (4.131)
NR 1, D2
The above ratio of normal distributed random variable can be approximated with a
single Normal Random Variable as,
2t2
2
THRLRT 1 |H1 = NR µ1 , + σ1 . (4.132)
D
4.2 Semi-blind SS techniques under noise uncertainty 119
0.8
Probability of Detection PD
0.6
0.4
HRLRT1 Numerical (S = 2)
0.2
HRLRT1 Theory (S = 2)
HRLRT1 Numerical (S = 8)
HRLRT1 Theory (S = 8)
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability of False Alarm PF a
Fig. 4.19 Comparison of simulated and analytical performance curves of HRLRT1 method
for N = 80, K = 4 and S = 2 8, SNR = −10 dB
Simulation Result
0.8
Probability of Detection PD
0.6
ED
0.4 HED1 (S = 2)
HED1 (S = 5)
HED1 (S = 10)
RLRT
0.2
HRLRT1 (S = 10)
HRLRT1 (S = 5)
HRLRT1 (S = 2)
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability of False Alarm PF a
Fig. 4.20 ROC performance of RLRT and ED methods compared with their hybrid counter-
parts. Parameters: N = 80, K = 4 and S = 2, 5, 10, SNR = −10 dB
and the value is then used within the two tests for all the other slots. The curves
approach the ideal ED and RLRT curves by increasing the number of auxiliary slots
S, but the rate of convergence of HED1 is slower.
It is evident that the knowledge of the noise power is imperative for achieving RLRT
the optimum performance. Unfortunately, the variation and the unpredictability
of precise noise power is a critical issue for using RLRT in sensing signals with
low SNR. In Sub-Section 4.2.11, we discussed the detection performance of RLRT
with estimated noise variance, where noise variance was estimated from the noise
only slots. In reality, within the same channel, there is a serious problem in finding
noise only samples so as to estimate the variance of the noise samples. As an
alternative, HRLRT2 does not resort on the existence of auxiliary noise only slots,
4.2 Semi-blind SS techniques under noise uncertainty 121
0.8
Probability of Detection PD
0.6
0.4
HRLRT1 (S = 2)
HRLRT1 (S = 15)
RLRT
0.2
HED1 (S = 15)
HED1 (S = 2)
ED
0
−16 −15 −14 −13 −12 −11 −10 −9 −8 −7 −6 −5 −4
SNR in dB
Fig. 4.21 Comparison of HRLRT1 and HED1 performance curves. Parameters: N = 80, K =
4 and S = 2 and 15, SNR = −10 dB
but estimated the noise variance information from the previous slots declared as H0
by the algorithm. Now, for the RLRT scheme using noise variance estimated from
S preceding slots which are declared H0 by same algorithm, which we call Hybrid
RLRT-2 (HRLRT2) model, we derive the analytical expression of performance
parameters PD and PFa in a multi-sensor environment.
Using the information on the received signal matrix Y to develop a test statistic
THRLRT 2 which is a modification of the RLRT test statistic considering noise variance
is estimated in S slots declared H0 by RLRT in the first stage. The detector compares
THRLRT 2 against a predefined threshold t. If THRLRT 2 < t then it decides in favor of
Null Hypothesis H0 otherwise in favor of Alternate Hypothesis H1 . The ratio of
largest eigenvalue of the covariance matrix R and the estimated noise variance is
given by,
λ1
THRLRT 2 = 2 . (4.135)
σ̂v
122 Cognitive Radio: Spectrum Sensing
Proof. Consider a sampling window of length M before and adjacent to the detection
window which contains slota declared H0 by first stage RLRT. But instead are H1
slots for them the estimated noise variance from the noise only samples using a
Maximum Likelihood Noise Power Estimate can be written as,
" #
K M
1
σ̂v2 = ∑ ∑ |hk s(m) + v(m)|2 . (4.137)
KM k=1 m=1
If the noise variance is constant, the estimation can be averaged over S successive
noise-only slots. Noting that since slots are declared noise only slot by RLRT, there
is a chance with probability (1 − PDRLRT ) that RLRT decides in favor of H0 even
if the received signal is the sum of noise and the primary signal. If the estimated
variance is the mean of S successive noise variances calculated from the noise only
slots decided by ED, then out of S noise variance estimates from S noise only slots
decided by RLRT, PS (1 − PDRLRT )S noise variance estimates are calculated from H1
slots containing noise and the primary signal. Thus, the estimated noise variance
can be written as the mean of the noise variance estimated from noise signal slots
declared H0 by RLRT given H0 and the noise signal slots declared H0 by RLRT
given H1 . Finally, (4.137) could be modified and rewritten as,
" #
Ss K M SN K M
∑ ∑ ∑ |hk s(m) + v(m)|2 + ∑ ∑ ∑ |vk (m)|2
s=1 k=1 m=1 s=1 k=1 m=1
σ̂v2 (S) = . (4.138)
KMS
4.2 Semi-blind SS techniques under noise uncertainty 123
Proposition 6. Consider the HRLRT2 test working with K sensors, N samples, SNR
value ρ, number of auxiliary slots S for noise estimation using (4.138) and threshold
t. Asymptotically in N and K, the false alarm and detection probability of HRLRT2
are respectively given by,
tx − µ
1 1
Z ∞
2
f0 (t) = √ |x|fTW 2 exp − 2 (x − µ1 ) dx. (4.141)
ξ σ12 2π −∞ ξ 2σ1
z−µ z−µ
1
pdf FTW 2 = fTW 2 . (4.145)
ξ ξ ξ
For sufficiently large value of 2KSS M, σ̂v2 /σv2 follows a Normal distribution given
by(See (4.77)),
NR µ1 , σ12 ,
(4.146)
where,
S + SS
µ1 = (4.147)
S
S + 2ρSS + ρ 2 KSS
σ12 = . (4.148)
KMS2
Thus, following above distributions, the test statistic THRLRT 2 |H0 in (4.135) can
be re-written as, λ |
FTW 2 ξ1 1σ 2 0 − µ
H
v
THRLRT 2 |H0 = . (4.149)
NR µ1 , σ12
Since the two random variables in (4.149) are statistically independent, the probabil-
ity density functions of the detection statistic THRLRT 2 |H0 can be written as,
tx − µ
1 1
Z ∞
2
f0 (t) = √ |x|fTW 2 exp − 2 (x − µ1 ) dx. (4.150)
ξ σ12 2π −∞ ξ 2σ1
1
ρCric = √ , (4.152)
KN
4.2 Semi-blind SS techniques under noise uncertainty 125
This suggests that when SNR is lower than the critical value, the limiting distribution
λ |
of 1σ H2 1 is the same as that of the largest noise eigenvalue, thus nullifying the
v
λ1 |H1
statistical power of a largest eigenvalue test. For ρ > ρCric the distribution of σv2
was found to be asymptotically Gaussian [107, 21] with,
λ1 |H0
∼ NR (µx , σx2 ), (4.153)
σv2
where,
K −1
µx = (1 + Kρ) 1 + (4.154)
NKρ
K −1
2 1 2
σx = (Kρ + 1) 1 − . (4.155)
N NK 2 ρ 2
NR (µx , σx2 )
THRLRT 2 |H1 = . (4.156)
NR µ1 , σ12
The above ratio of normal distributed random variable can be approximated with a
single Normal Random Variable as,
µx t2 σ12 + σx2
THRLRT 2 |H1 = NR , . (4.157)
µ1 µ12
Thus, using the above normal approximation, the probability of detection of HRLRT2
can be written as
2
t − µx /µ1
PHRLRT
D = Q
r
. (4.158)
t2 σ12 +σx2
µ12
Simulation Result
Figure 4.22 shows the comparison of simulated and analytical performance curves
of HRLRT2 algorithm. Analytical evaluation of HRLRT2 ROC curves is carried
out in two phases. In first phase, the pdf in (4.150) is evaluated numerically. In
second phase, for a given probability of false alarm, corresponding threshold is
126 Cognitive Radio: Spectrum Sensing
0.8
Probability of Detection PD
0.6
0.4
HRLRT2 Theoretical (S = 2)
0.2
HRLRT2 Theoretical (S = 8)
HRLRT2 Numerical (S = 2)
HRLRT2 Numerical (S = 8)
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability of False Alarm PD
Fig. 4.22 Comparison of simulated and analytical performance curves of HRLRT2 method.
Parameters: N = 80, K = 4 and S = 2 and 8, SNR = −10 dB
evaluated. Finally, the probability of detection is calculated for each threshold value
using (4.158). The simulated ROC curves of HRLRT2 are superimposed to the
analytically generated ROC to measure the accuracy of the closed form expression
presented by Proposition 6.
Convergence of the Hybrid approach of RLRT detection to ideal RLRT (with
known variance) is illustrated in Figure 4.23. With the increase in number of auxiliary
slots used for noise variance estimation, the performance of HRLRT1 and HRLRT2
converge to the ideal RLRT performance.
4.2 Semi-blind SS techniques under noise uncertainty 127
Probability of Detection Pd
0.8
0.6
HRLRT2 (S = 2)
0.4 HRLRT2 (S = 15)
HRLRT1 (S = 15)
HRLRT1 (S = 2)
RLRT (Known variance)
0.2
−12 −11 −10 −9 −8 −7 −6 −5 −4
SNR in dB
Fig. 4.23 Probability of detection vs. SNR for RLRT, HRLRT1 and HRLRT2, Parameters:
N = 80, K = 4 and S = 2 and 15, SNR = −10 to −4 dB
For CR application the most popular sensing algorithm is the simpler ED that
compares the energy of the received signal against the noise variance σv2 as discussed
before. ED requires the perfect knowledge of the noise power at the receiver [164,
50, 51, 105], however, in real systems the detector does not have a prior knowledge
of the noise level. It is known from [159] that there is a certain SNR threshold in
case of noise uncertainty known as SNR wall, which prevents ED from achieving
the desired performance even if the detection interval tends to infinity.
In this work, starting from the contributions of [159, 118], we extend the con-
dition of SNR Wall [159] to multi-sensor hybrid ED with auxiliary noise variance
estimation (offline method) described in Sub-Section 4.2.6. For auxiliary noise vari-
ance estimation of White Gaussian Noise samples, the distribution of the estimated
variance is studied and linked to the uncertainty bound referred to [159]. The SNR
Wall expression is derived for multisensor ED and proved to be independent of the
number of sensors. It is concluded that the noise uncertainty can be reduced by
increasing the number of samples used for noise variance estimation, but the number
of samples/slots used for noise estimation exponentially increases as the SNR Wall
condition becomes more stringent.
128 Cognitive Radio: Spectrum Sensing
H0 , .
1
(
NR 1, KN
TED = 2 +2ρ+1 (4.161)
NR (ρ + 1), Kρ KN H1
107
K=1
K=5
106 K=10
K=15
Number of samples N
K20
105
104
103
102
101
−30 −28 −26 −24 −22 −20 −18 −16 −14 −12 −10
SNR in dB
Fig. 4.24 Comparison of sample complexity N to achieve given PD′ and PFa
′ for single antenna
vs. multi antenna environment for different SNR assuming perfect knowledge of noise
variance. Parameters: K = 5, 10, 15 and 20, P’D = 0.9, P’Fa = 0.1
the noise variance, received signal can be detected for any SNR maintaining the
detection interval accordingly.
Now, let us consider the case in which the noise variance ish not precisely
i known
1 2
but its deviation is known to be bounded in the interval [159] β σv , β σv2 , i.e.,
1 2
σ̂v2 ∈ 2
σ , β σv , (4.165)
β v
where σv2 is the nominal (true) noise power and β > 1 is the parameter that quantifies
the level of uncertainty. It is evident that the knowledge of the noise variance is
imperative for the optimum performance of ED. In practice it is not possible to know
130 Cognitive Radio: Spectrum Sensing
the exact value of the noise variance, so the only option is to estimate it from the
noise samples. The performance of ED with auxiliary noise variance estimation
known as Hybrid ED (HED1) using Maximum Likelihood Estimation (MLE) was
studied in previous sections. If we denote the estimate of the noise variance with σ̂v2
and consider the ED detection statistic as,
1 K N
T̃ED = ∑ ∑ |yk (n)|2,
KN k=1
(4.166)
n=1
the Gaussian approximation of the detection statistic in (4.166) can be written as,
4
NR σ̂v2 , σ̂v
KN H0 ,
T̃ED = 2 4 2 2 4
(4.167)
NR ∥h∥σ 2 + σ̂ 2 , K∥h∥ σs +2∥h∥σs σ̂v +σ̂v H1 ,
s v KN
√
(t − σ̂v2 ) KN
PFa = Q (4.168)
σ̂v2
" √ #
(t − σ̂v2 − ∥h∥σs2 ) KN
PD = Q p . (4.169)
K∥h∥2 σs4 + 2∥h∥σs2 σ̂v2 + σ̂v4
Now, the worst case scenario of PD and PFa , represented by the notations P’D
and P’Fa , can be analyzed as,
√
(t − σ̂v2 ) KN
P’Fa = hmax iQ (4.170)
σ̂v2 ∈ β1 σv2 ,β σv2 σ̂v2
t
√
σv2
−β N
P’Fa = Q (4.171)
β
√ !
(t − σ̂v2 − ∥h∥σs2 ) KN
P’D = h min iQ p (4.172)
K∥h∥2 σs4 + 2∥h∥σs2 σ̂v2 + σ̂v4
σ̂v2 ∈ β1 σv2 ,β σv2
√
t
σv2
− ρ β1 KN
P’D = Q q . (4.173)
2 1 1
Kρ + 2ρ β + β 2
4.2 Semi-blind SS techniques under noise uncertainty 131
10
K = 1 and x = 0.1
K = 10 and x = 0.1
K = 1 and x = 0.01
8 K = 10 and x = 0.01
6
log10 N
0
−24 −22 −20 −18 −16 −14 −12 −10 −8 −6 −4 −2 0
SNR in dB
Fig. 4.25 Variation of sample complexity N as the SNR approaches SNR wall for ED,
Parameters: K = 5, P’D = 0.9, P’Fa = 0.1 [use x = 10 log10 β in Equation (4.174)]
Equation (4.174) gives the expression of the number of samples in a sensing slot
for given SNR condition to achieve the required performance in terms of PFa and PD ,
which is also an extension of the result in [159] for a multi-sensor ED. The number
of samples N goes to infinity as SNR approaches β − β1 . This condition is known as
SNR Wall condition, which means that under this SNR wall value we cannot achieve
the required performance in a given level of noise uncertainty even if the sample
number is made sufficiently large. Thus, SNR Wall is given by the expression as
shown below,
ED 1
SNRwall = β − . (4.175)
β
SNR wall makes clear that the Energy Detector cannot robustly detect the signal
if the signal power is less than the uncertainty of the noise power, i.e.,
1
σs2 < β− σv2 . (4.176)
β
132 Cognitive Radio: Spectrum Sensing
·10−2
6
Emperical pdf of V
Analytical pdf of V
5 p-value
Probability 4
0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
V
Our study shows that there is no difference in the SNR wall expression by using
a multi antenna or a single antenna in ED. Figure 4.25 illustrates the SNR wall
condition for single/multi antenna case and the variation of the sample complexity
N, as SNR approaches SNR wall for different levels of noise uncertainty.
Let us suppose that noise variance is estimated in S auxiliary slots with M noise only
samples in each slot. Then the ML noise variance estimate using SKM noise-only
samples obtained from K receivers with S slots each can be written as,
1 S K M
σ̂v2 (S) = ∑ ∑ ∑ |vk (m)|2. (4.177)
KSM s=1 k=1 m=1
If we focus on noise variance distribution under the same scenario, let us consider a
random variable V (normalized
2 noise variance estimate), which associates a unique
σ̂v
numerical value from σ 2 for each noise variance estimation, where σ̂v2 corresponds
v
to (4.177).
4.2 Semi-blind SS techniques under noise uncertainty 133
σ̂v2
V= (4.178)
σ2
v 2
S K M
1 vk (m)
= ∑ ∑ ∑ σ /2 .
p (4.179)
2KMS s=1
k=1 m=1 v
It can be noted that the expression in (4.179) is the sum of squared standard
normal noise samples, thus it has a Chi-Square Distribution with 2KMS degrees of
freedom. Then we have
2
χ2KMS
V= , (4.180)
2KMS
2
where χ2KMS represents a Chi-Squared random variable with 2KMS degrees of
freedom.
Figure 4.26 shows the pdf of the random variable V according to (4.180) com-
pared to its empirical pd f . Now, the uncertainty bound β can easily related with V
using (4.165) and (4.180) as,
β = max (V ) (4.181)
F −1 (1 − α, 2KMS)
= Chi , (4.182)
2MKS
−1
where FChi () is the Inverse Cumulative Distribution Function of a Chi Square Dis-
tributed Random Variable and α is the significance level of a Chi Square Distribution.
As we know, a Chi Square Distributed Random variable can take any values in the
range (−∞, +∞), which leads (4.182) to infinity. In (4.182), (1 − α) is the signif-
icance level, which gives an insight of percentage coverage of all possible values
smaller than the value given by the inverse cdf. Thus,
−1
FChi (1 − α, 2KMS)
β= . (4.183)
2MKS
Finally, β can be expressed in terms of the total number of noise samples (i.e.
KMS) considered for variance estimation as shown in (4.183) and can be easily
134 Cognitive Radio: Spectrum Sensing
1.4
α = 0.001
α = 0.001
1.2 α = 0.0001
0.8
0.6
0.4
0.2
0
0 10 20 30 40 50 60 70 80 90 100
Number of slot S used for noise variance estimation
Fig. 4.27 Variation of noise uncertainty level with number of slots S used for noise variance
estimation.
evaluated. For example, for α = 0.01, β is found to be 1.4 as shown in Figure 4.26.
It is clear from (4.183) that the level of noise uncertainty decreases with the increase
of the number of samples and the number of slots averaging the estimation of the
noise variance.
Simulation Result
The variation of the noise uncertainty bound β with number of slots S used in noise
variance estimation for different significance level, is presented in Figure 4.27. The
plot seems to have a steep slope (∼ - 0.08dB/slot) for small values of S, but for larger
number of estimation slots S (S > 30) the slope starts to flatten suggesting large
changes in S are required for small gain in noise uncertainty bound. Figure 4.28
illustrates the variation of SNR wall as a function of the number of slots used for
noise variance estimation. Curves are plotted for different significance parameter α.
As expected, the level of SNR Wall decreases with the increase in the number of slots
used in noise estimation but curve saturates for low values of SNR Wall (< −12dB).
As a matter of fact, for given parameters (M = 100, K = 5 and α = 0.01), the number
of slots required to overcome the SNR Wall condition for SNR ≤ to −12dB is S > 80.
Similarly, Figure 4.29 plots the SNR wall condition and the sample complexity
as a function of the number of auxiliary slots S. It shows that the minimum attainable
SNR wall value of −12 dB obtained for S = 100 and α = 10−5 . Moreover, for
4.2 Semi-blind SS techniques under noise uncertainty 135
−2
α = 0.01
α = 0.001
−4 α = 0.0001
−6
SNR wall (in dB)
−8
−10
−12
−14
0 10 20 30 40 50 60 70 80 90 100
Number of slots S used for noise variance estimation
Fig. 4.28 Variation of SNR wall level with number of auxiliary slots S used for noise variance
estimation
asymptotic number of slots S (then asymptotic of total number of samples KMS), the
noise uncertainty x (in dB) decreases to zero with σ̂v2 = σv2 resulting no SNR wall,
proving the finding of [119].
136 Cognitive Radio: Spectrum Sensing
9
S=1
S = 10
8
1
−15 −10 −5 0
SNR in dB
Fig. 4.29 Variation of sample complexity N as the SNR approaches SNR wall for varying
number of auxiliary slots used for noise variance estimation in HED1
the burst interval is comparable to or smaller than the spectrum sensing interval.
The traffic model used is limited to constant length bursts of the PU data, whose
length is smaller than the SU sensing duration. However, the burst length of the
PU may be varying with time following some stochastic models [137, 84]. A more
general scenario, in which the PUs traffic transition is completely random, may
affect the spectrum sensing performance. The analysis of the spectrum sensing
performance has been presented in [170, 140, 174, 160] by modeling the PU traffic
as an independent and identically distributed two state Markov’s model. Using
this primary traffic model, authors in [170, 174, 160] analyzed the effect of PU
traffic on the sensing performance and the sensing-throughput trade-off considering
ED as a sensing technique under the half duplex scenario. Moreover, the effect of
multiple PUs traffic on the sensing-throughput trade-off of the secondary system has
been studied in [140]. Although all the aforementioned contributions recognized
the fact that the PU traffic might affect the sensing performance including sensing-
throughput trade-off, none of them considered the realistic scenario of multi-antenna
spectrum sensing in a complex signal sample domain and the sensing performance
of other spectrum sensing techniques including Eigenvalue Based Detection (EBD)
techniques under unknown primary user traffic.
In this section we study the effect of PU traffic on the performance of multi-
antenna spectrum sensing especially ED and RLRT under the complex domain of PU
signal, noise and channel. In contrast to commonly used continuous time Markov
model in the existing literature, a novel technique of modeling PU traffic is proposed
which is only based on discrete time distribution of PU free and busy periods.
The proposed model is more realistic and simple compared to the continuous time
Markov model proposed in the previous literature [170, 140, 174, 160]. Moreover,
an analytical performance evaluation of the decision statistic in terms of ROC under
the considered scenario is carried out.
Mathematical Framework
form of a K × N matrix Y. When the primary transmissions are not based on some
synchronous schemes or the sensing unit at the SU does not have any information
about the primary traffic pattern, the received vector at the sensing unit may consist
in part by the samples from one PU state and the remaining part by alternate PU state.
To simplify the scenario, we begin with the following classification of the sensing
slots based on the PU traffic status, which is also illustrated in Fig. 4.30.
1. Steady State (SS) sensing slot: In such type of sensing slot, all the received
samples in one sensing slot are obtained from the same PU state.
2. Transient State (TS) sensing slot: In such type of sensing slot, a part of the
received samples within the sensing slot are obtained from one PU state and
the remaining from the another PU state.
This hypothesis formulation implies that the decision is based on the PU status at the
end of the sensing interval. Thus, in a TS sensing slot, a transition from the PU busy
state to the PU free state is considered H0 , while a transition from the PU free state
to the PU busy state is considered H1 . In the considered scenario, in an SS sensing
interval, the generic received signal matrix under each hypothesis can be written as,
(
V [K,N] (H0 ),
Y SS = , (4.184)
S[K,N] (H1 ),
where V [K,N] ≜ [v(1) · · · v(n) · · · v(N)] is the K × N noise matrix ,S[K,N] = h[K,1] s[1,N] +
V[K,N] is the K × N received noisy signal matrix when PU signal is present, h[K,1] =
[h1 · · · hK ]T is the channel vector and s[1,N] ≜ [s(1) · · · s(n) · · · s(N)] is a 1 × N PU
signal vector. In the TS sensing interval, the generic received signal matrix under
each hypothesis can be written as,
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 139
Fig. 4.30 Primary user traffic scenario and sensing slot classification
(
[S[K,N−D0 ] |V[K,D0 ] ] (H0 ),
Y TS = . (4.185)
[V[K,N−D1 ] |S[K,D1 ] ] (H1 ),
where D0 represents the number of pure noise samples in TS sensing slot under
H0 , D1 represents the number of noise plus PU signal samples in TS sensing slot
under H1 , S[K,N−D0 ] = h[K,1] s[1,N−D0 ] +V[K,N−D0 ] is the (K ×N −D0 ) received noisy
signal matrix when PU signal is present only for (N − D0 ) sample periods. Similarly,
S[K,D1 ] = h[K,1] s[1,D1 ] + V[K,D1 ] is the K × D1 received noisy signal matrix when
PU signal is present only for D1 sample periods. In each of them, the unknown
primary transmitted signal s(n) at time instant n is modelled as independent and
identically distributed (IID) complex Gaussian with zero mean and variance σs2 :
s(n) ∼ NC (0, σs2 ). The noise sample vk (n) at the kth antenna of the SU at the
time instant n is also modelled as complex Gaussian with mean zero and variance
σv2 : vk (n) ∼ NC (0, σv2 ). The channel coefficient hk of the kth antenna is assumed to
be constant and memory-less during the sensing interval. The average SNR at the
σ 2 ∥h∥2
receiver is defined as, ρ = sKσ 2 , where ||.|| denotes the Euclidean norm.
v
" #
pn00 pn01
Pn =
pn10 pn11
" #
1 β + α(1 − α − β )n α − α(1 − α − β )n
= , (4.186)
α +β β − β (1 − α − β )n α + β (1 − α − β )n
" # " #
p00 p01 1−α α
P= = . (4.187)
p10 p11 β 1−β
(4.185) in reference, it is clear that to find the distribution of the decision statistic
under different hypotheses, the prior deduction of the probability of occurrence of
SS sensing slot, TS sensing slot, probability mass function (pmf ) of D0 and the pmf
of D1 are inevitable.
The following Lemmas compute the pmf s of D0 and D1 based on the two state
PU traffic model described above.
Lemma 1. Given the N number of samples in a sensing slot, the probability transition
matrix P as in (4.187) with comparable mean parameters M f and Mb ,
1
PD0 (d0 )|H0 = . (4.188)
N −1
1
PD1 (d1 )|H1 = . (4.189)
N −1
0 −1
P(T S, D0 , H0 ) = pb · pN−D
11 p10 pD
00 .
0
(4.190)
by the sum of the transition probabilities for all range of D0 and we obtain
N−d0 −1
pb · p11 p10 pd000
PD0 (d0 )|H0 = N−1 N−a−1
(4.191)
∑a=1 pb · p11 p10 pa00
(1 − β )N−d0 −1 (1 − α)d0
= N−1
. (4.192)
∑a=1 (1 − β )N−a−1 (1 − α)a
When the mean parameters M f and Mb are close (4.192) can be approximated to:
(1 − α)N−d0 −1 (1 − α)d0
PD0 (d0 )|H0 = (4.193)
∑N−1
a=1 (1 − α)
N−a−1 (1 − α)a
1
= . (4.194)
N −1
This proves the first claim. By using the same line of reasoning, the proof of the
second claim is straightforward.
Lemma 2. Given the number of samples in a sensing slotN and the probability
transition matrix P as in (4.187),
1
PSS |H0 = . (4.195)
1 + α ∑N
d0 =1 (1 − β )
N−d0 −1 (1 − α)d0 −N
1
PSS |H1 = . (4.196)
1+β ∑N
d1 =1 (1 − α)
N−d1 −1 (1 − β )d1 −N
Proof. First of all, the probability of having no PU state transition under H0 is given
by:
P(SS, H0 ) = p f · pN
00 . (4.197)
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 143
Similarly, the probability of having a PU state transition from Busy State to Free
State is given by,
! !
PU is in PU transits from Busy to Free
P(T S, H0 ) = P ·P . (4.198)
Busy State State during sensing interval
Essentially, the PU state transition may occur at any time during the sensing
duration,
N−1
0 −1
P(T S, H0 ) = pb · ∑ pN−d
11 p10 pd000 . (4.199)
d0
Thus, by using (4.187) and (4.199), the probability of having a SS sensing slot
belonging to H0 is given by,
P(SS, H0 )
PSS |H0 = (4.200)
P(SS, H0 ) + P(T S, H0 )
p f · pN
00
= N−1 N−d0 −1
. (4.201)
p f · pN
00 + pb · ∑d0 p11 p10 pd000
Corollary 5. When the mean parameters M f and Mb are comparable, the probabili-
ties in (4.195) and (4.196) reduce to simple expressions given by,
1
PSS |H0 = (4.202)
1 + (N − 1)α
1
PSS |H1 = . (4.203)
1 + (N − 1)β
In Figure 4.31, the pdf of the decision statistic under ideal PU-SU sensing slot
synchronization is compared with the pdf of the decision statistic under unknown
PU traffic considering both hypotheses. In addition, the accuracy of the derived
144 Cognitive Radio: Spectrum Sensing
ED computes the average energy of the received signal matrix Y normalized by the
noise variance σv2 and compares it against a predefined threshold TED :
1 K N
TED = ∑ ∑ |yk (n)|2.
σv2 k=1
(4.204)
n=1
N−1
fTED |H0 (x) = pSS |H0 fG (x, KN, 1) + pT S |H0 ∑ PD (d0 ) [ fG (x, 2Kd0 , 1) + fG (x, N − d0 , Kρ)
0
d0 =1
+ fG (x, K(N − d0 ), 1) + fN (x, 0, 2ρK(N − d0 ))] , (4.205)
fTED |H1 (x) = pSS |H1 ( fG (x, N, Kρ) + fG (x, KN, 1) + fN (x, 0, 2ρKN))
N−1
+ pT S |H1 ∑ PD (d1 ) [ fG (x, d1 , Kρ) + fG (x, Kd1 , 1)
1
d1 =1
+ fN (x, 0, 2ρKd1 ) + fG (x, K(N − d1 ), 1)] . (4.206)
Proof. As noted from Sub-Section 4.3, the term within the summation in (4.204)
is different for the SS sensing slot and TS sensing slot. Under the null hypothesis
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 145
·10−4
3
H0
H1
2
pdf
0
0 200 400 600
TED
(a) Known PU Traffic (synchronized PU-SU
sensing slots)
·10−4
Numerical
H0 (Theoretical)
2 H1 (Theoretical)
pdf
0
0 200 400 600
TED
(b) Unknown PU Traffic
Fig. 4.31 Pdfs of the ED decision statistic: Parameters: N = 50, K = 4, M f = 150, Mb = 150
and SNR = −6 dB
146 Cognitive Radio: Spectrum Sensing
"
K vk (n) 2 pT S |H0 K D0 vk (n) 2
N
pSS |H0
TED |H0 =
2 ∑ ∑ √ + 2 ∑ ∑ σ /√2
k=1 n=1 σv / 2 k=1 n=1 v
K N
2 #
hk s(n) + vk (n)
+∑ ∑ σ /√2 . (4.207)
k=1 n=N−D0 +1 v
N−1
pSS |H0 2 pT S |H0 2
TED |H0 = χ2KN + ∑ PD (d0 )
0 χ2Kd0
2 2 d0 =1
i
2
+ Kρ χ2(N−d0)
+ χ 2
2K(N−d0 ) + N (0, 2ρ(N − d0 )K) , (4.208)
where χA2 represents a Chi-squared random variable with A degrees of freedom. and
N (µ, σ 2 ) represents the Normal random variable with mean µ and variance σ 2 .
In fact, the product of a Chi-squared RV with a constant is a Gamma RV, thus,
with this replacement we obtain,
N−1
TED |H0 = pSS |H0 G (KN, 1) + pT S |H0 ∑ PD (d0 ) [G (Kd0 , 1)
0
d0 =1
+ G (N − d0 , Kρ) + G (K(N − d0 ), 1) + N (0, 2ρ(N − d0 )K)] . (4.209)
Finally, we replace the random variables in (4.212) with their respective pdfs to
obtain (4.206).
In essence, the pdfs in (4.205) and (4.206) consist of the sum of independent
random variables. From a statistical point of view, the pdf of the sum of two
independent pdfs can be realized as the convolution of these pdfs [92]. Thus, the
sum of pdfs can be computed using convolution as an alternative, we can exploit
the characteristic function approach by computing Fourier transform. In conclusion,
(4.205) and (4.206) can be easily evaluated by using standard Fast Fourier Transform
(FFT) techniques.
A. Probability of False Alarm: Given the pdf of the decision statistic in (4.205),
we can compute the false alarm probability. Under H0 , the PU is in free state at
148 Cognitive Radio: Spectrum Sensing
the end of the sensing interval, but the decision statistic is erroneously above the
threshold τ and the PU signal is declared present. For false alarm PFa , the following
Corollary of Theorem 6 holds.
Z +∞
PFa = P(TED |H0 ≥ τ) ≡ fTED |H0 (x)dx. (4.213)
τ
Corollary 7. The detection probability of the ED test under unknown PU traffic and
the complex signal space scenario is given by:
Z +∞
PD = P(TED |H1 ≥ τ) ≡ fTED |H1 (x)dx. (4.214)
τ
Simulation Results
0.8
Mf , Mb ↑
0.6
PD
0.4 Classical ED
Mf = Mb = 550
0.2 Mf = Mb = 250
Mf = Mb = 100
Mf = Mb = 75
0
0 0.2 0.4 0.6 0.8 1
PF
Fig. 4.32 ROC performance for the considered scenario. Parameters: N = 100, K = 4 and
SNR = −6 dB
100
10−1
PM d
10−2
10−3
Unknown PU traffic (SNR = −5 dB)
Unknown PU traffic (SNR = −3 dB)
Known PU traffic (SNR = −5 dB)
Known PU traffic (SNR = −3 dB)
−4
10
2 3 4 5 6 7 8 9 10
K
Fig. 4.33 Probability of missed detection vs. the number of Antennas, Parameters: N = 25,
M f = 62, Mb = 62 and PF = 0.1
λ1
TRLRT ≜ . (4.215)
σv2
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 151
K −1 K −1
Ns 2 Ns
µ1 (Ns ) = Kρ + 1 1+ , σ1 (Ns ) = 2 (Kρ + 1) 1 − (4.216)
N Ns Kρ N Ns K 2 ρ 2
√ 2 √ 1 1/3
−2/3
µN,K = 1 + c , σN,K = N 1+ c 1+ √ . (4.217)
c
Then, the pdfs of RLRT decision statistic under H0 and H1 are given by (4.218) and
(4.219) respectively:
N−1
x − µN,K
fTRLRT |H0 (x) = PSS |H0 fTW 2 + PT S |H0 ∑ PD (d0 ) fD (x, N − d0 ),
0 (4.218)
σN,K d0 =1
N−1
fTRLRT |H1 (x) = PSS |H1 fD (x, N) + PT S |H1 ∑ PD (d1 ) fD (x, d1 ).
1 (4.219)
d1 =1
where,
(
K−1
fN (µ1 (d), σ12 (d)) if, d > K2ρ 2
,
fD (x, d) = . (4.220)
fTW 2 (µN,K , σN,K ) otherwise.
In (4.220), fN (µ1 (d), σ12 (d)) denotea a Gaussian pdf with mean µ1 (Ns ) and vari-
ance σ12 (Ns ) provided in (4.216) at Ns = d. Next, fTW 2 (µN,K , σN,K ) is the pdf of
Tracy-Widom distribution of order 2 with parameters µN,K and σN,K provided in
(4.217).
Proof. As noted from Sub-Section 4.3, the nature of the received signal matrix is
different for the SS sensing slot and TS sensing slot. Under null hypothesis H0 ,
152 Cognitive Radio: Spectrum Sensing
Since sensing slots are independent from each other, we treat each covariance matrix
in (4.221) independently. Given an SS sensing slot under null hypothesis, all the
received samples yk (n) are homogeneous in nature comprising the i.i.d. Gaussian
noise samples with mean zero and variance σv2 . Thus, the sample covariance matrix
RSS |H0 follows a Wishart distribution whose largest eigenvalue normalized by noise
variance can be expressed by a Tracy-Widom distribution of second order [46, 20].
where,
1
RS (N − D0 ) ≜ S SH , (4.224)
N − D0 [K,N−D0 ] [K,N−D0 ]
1
RN (D0 ) ≜ V VH , (4.225)
D0 [K,D0 ] [K,D0 ]
are the partial covariance matrices built respectively from signal-plus-noise and
only-noise samples. RS (N − D0 ) is a standard spiked population covariance matrix
of rank-1 and RN (D0 ) is Wishart matrix. The largest eigenvalue of RN (D0 ) is negli-
gible compared to the largest eigenvalue of RS (N − D0 ) given a signal identifiability
condition is met [138]. It is known that the fluctuation of the largest eigenvalue of
a rank-1 spiked population matrix normalized by the noise variance are asymptoti-
cally Gaussian [46, 139] if the signal identifiability condition is met, otherwise its
distribution is again a Tracy-Widom of order 2.
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 153
λ1T S |H0
= fD (x, (N − D0 )) (4.226)
σv2
Using the results from (4.222) and (4.226), the RLRT decision statistic under null
hypothesis can be written as:
λ1 |H0
TRLRT |H0 = (4.227)
σv2
λ1SS |H0 λ1T S |H0
= pSS |H0 + pT S |H (4.228)
σv2 0
σv2
t − µN,K
= pSS |H0 fTW + pT S |H0 fD (x, N − D0 ). (4.229)
σN,K
Since RSS |H1 is a standard spiked population covariance matrix of rank-1, the
distribution of the largest eigenvalue normalized by the noise variance in a SS
sensing slot under H1 can be approximated as [46, 139],
λ1SS |H1
= fD (x, N). (4.231)
σv2
λ1T S |H1
= fD (x, D1 ). (4.232)
σv2
154 Cognitive Radio: Spectrum Sensing
Using (4.231) and (4.232), the distribution of the RLRT decision statistic under
alternate hypothesis can be written as,
λ1 |H1
TRLRT |H1 = (4.233)
σv2
λ1SS |H1 λ1T S |H1
= pSS |H1 + pT S |H (4.234)
σv2 1
σv2
= pSS |H1 fD (x, N) + pT S |H1 fD (x, D1 ). (4.235)
A. Probability of False Alarm: Given the pdf of the decision statistic in (4.218),
we can now compute the false alarm probability. Under H0 , the PU is in free state
at the end of the sensing interval, but the decision statistic is erroneously above the
threshold τ and the PU signal is declared present. For the probability of false-alarm
PFa , the following Corollary of Theorem 7 holds.
Corollary 8. The false-alarm probability of the RLRT test under unknown PU traffic
and complex signal space scenario is given by:
Z +∞
PFa = P(TRLRT |H0 ≥ τ) ≡ fTRLRT |H0 (x)dx. (4.236)
τ
Corollary 9. The detection probability of the RLRT test under unknown PU traffic
and the complex signal space scenario is given by:
Z +∞
PD = P(TRLRT |H1 ≥ τ) ≡ fTRLRT |H1 (x)dx. (4.237)
τ
4.3 Semi-blind sensing techniques under unknown Primary User Traffic 155
Simulation Results
In this Sub-Section, the effect of PU traffic on the RLRT detection method is analyzed
based on the the traffic model developed in Sub-Section 4.3.1. The length of the free
and busy periods of the PU traffic are measured in terms of the discrete number of
samples where each of them has Geometric distribution with mean parameters M f
and Mb , respectively. Under multiple antenna sensing scenario, the average SNR at
σ 2 ∥h∥2
the receiver is defined as, ρ = sKσ 2 , where ||.|| denotes the Euclidean norm. The
v
analytical expressions derived are validated via numerical simulations.
In Fig. 4.34, the sensing performance of RLRT under unknown PU traffic is
compared with the ideal RLRT performance. It can be well understood that the con-
ventional model with perfect synchronization of the PU-SU sensing slots performs
better than the one with unknown PU traffic. The perfect match of the theoretical
and Monte-Carlo numerical curves validates the derived analytical expressions of
PFa and PD . The ROC performance of RLRT in the considered PU traffic model for
different PU traffic parameters is presented in Figure 4.34a. The sensing performance
degrades significantly when the mean lengths of busy and free periods are compa-
rable with the length of the sensing interval or in a few multiples of it. However,
an improvement in the sensing performance can be seen if the length of the mean
parameters M f and Mb is increased. In Figure 4.34b we present the missed detection
probability (PMd ) as a function of SNR. From this figure, we can see that, for a given
PU traffic parameters, increasing the SNR improves the sensing performance for
certain lower range of SNR. However, in contrast to RLRT sensing performance
under known PU traffic , the RLRT sensing performance under unknown PU traffic
levels to some point (1 > PMd >> 0) above certain SNR. This is due to the effect of
the PU signal-plus-noise and only-noise samples mixing in the TS sensing slot.
In Fig. 4.35, the RLRT sensing performance is plotted as a function of sensing
parameters N and K. The variation of the sensing performance of RLRT detector
for different number of receiving antennas (K) is plotted in Figure 4.35a. It can
be observed that, unlike the rapid increase in sensing performance (decrease in
missed-detection probability) with the increasing number of receiving antennas under
synchronized PU-SU sensing slot scenario, the RLRT sensing performance under
unknown PU traffic is almost constant even if we increase the number of antennas.
During a TS sensing slot, from each receiving antenna the received signal samples are
the mixture of pure noise samples and samples with both noise and PU signal. Thus,
156 Cognitive Radio: Spectrum Sensing
1
Mb , Mf ↑
0.8
Known PU Traffic
Numerical
0.6
PD
Unknown PU Traffic
Theoretical
0.4 Mf = Mb = 800
Mf = Mb = 300
Mf = Mb = 100
0.2
0
0 0.2 0.4 0.6 0.8 1
PF
10−1
Known PU Traffic
PM d
10−2 N = 50
N = 100
Unknown PU Traffic
10−3 Theoretical
N = 200
N = 600
N = 1000
10−4
−10 −5 0 5 10
SNR (dB)
even if we use multiple antennas, the nature of the received signal doesn’t change
much. This is the reason why the sensing performance improvement is suppressed
by the unknown PU traffic (more specifically, the TS sensing performance) when
the length of the free and busy periods of PU traffic are quite small (a few multiples
of the length of the sensing window). Furthermore, we present in Figure 4.35b, the
numerical simulation of detection probability (PD ) as a function of sensing window
(N). Note that, unlike RLRT detection probability under known PU traffic which
monotonically increases indefinitely until ‘PD = 1’ with increasing length of sensing
window, the detection probability of RLRT under unknown PU traffic do not have a
monotonic property as a function of the sensing window length.
158 Cognitive Radio: Spectrum Sensing
100
10−1
Known PU Traffic
PM d
−2 SNR = −8 dB
10
SNR = −10 dB
Unknown PU Traffic
10−3 Theoretical
SNR = −12 dB
SNR = −8 dB
SNR = −4 dB
10−4
4 6 8 10 12
K
0.8
PD
0.6
0.4
Fig. 4.35 RLRT under unknown PU traffic sensing performance comparison for different
sensing parameters (N and K).
Chapter 5
5.1 Introduction
5G wireless networks are expected to support very diverse services - from very low
latency to very high delay tolerant, and from very small to very large packets in
different applications. An important 5G requirement is will be to support massive
connectivity with a large number of devices such as smart phones, tablets and
machines. The current LTE [43] system is not able to efficiently support massive
connectivity, especially in uplink. While fundamental research for 5G is now well
under way [1, 10], the question what actually makes a 5G system and what are the
drivers is still open and part of intensive discussions.
A new flexible and adaptable interface is proposed to meet the complex and
diverse application requirements of air interface technology. New air interface con-
sists of building blocks and configuration mechanisms such as adaptive waveforms,
adaptive protocols, adaptive frame structures, adaptive coding and modulation fam-
ily, and adaptive multiple access schemes. With these blocks and mechanisms, the
air interface will be able to accommodate the future wide variety of user services,
spectrum bands and traffic levels. The quest of improving the spectral efficiency has
160 Low Density Spreading (LDS) Multiplexing for NOMA
been regarded as the most important but yet challenging task in the design of future
wireless communication system due to the fact that the rapid growth of multimedia
services, such as interactive game and television applications, cannot be coped with
the scarce radio frequency (RF) spectrum resources. As a result, multiple access
schemes will play a critical role in providing the increasing demand in services for
future terminals and applications.
Multiple access (MA) technique is a major building block of cellular systems.
Through the MA technique, the users can simultaneously access the physical medium
and share the finite resources of the system, such as spectrum, time and power. Due to
the rapid growth in data demand in mobile communications, there has been extensive
research to improve the efficiency of cellular systems. A significant part of this effort
focuses on developing and optimizing the MA techniques. As a result, many MA
techniques have been proposed systematically over the years, and some of these MA
techniques are already been adopted in the cellular system standards such as Time
Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA),
Orthogonal Frequency Division Multiple Access (OFDMA) and Code Division
Multiple Access (CDMA). There are many factors that determine the efficiency of
MA techniques, including spectral efficiency, low complexity implementation as
well low envelope fluctuations.
OFDM and OFDMA are the modulation technique and the multiple access strat-
egy adopted in LTE fourth genereation (4G) cellular network standards, respectively
[83]. OFDM and OFDMA succeeded CDMA, employed in third generation (3G)
networks for several reasons, such as the ease of implementation of both transmitter
and receiver thanks to the use of FFT and inverse FFT (IFFT) blocks; the ability to
counteract multipath distortion, the orthogonality of subcarriers which eliminates
intercell interference; the possibility of adapting the transmitted power and the mod-
ulation cardinality; and the ease of integration with multi-antenna hardware, both at
the transmitter and receiver. Nonetheless, despite such a pool of positive properties,
OFDM/ OFDMA are not exempt of defects, and their adoption in the forthcoming
generation of wireless networks is not taken for granted. Indeed, the spectral effi-
ciency of OFDM is limited by the need of a CP and by its large sidelobes (which
require some null guard tones at the spectrum edges). OFDM signals may exhibit
large peak-to-average-power ratio values [136] and the impossibility of having strict
frequency synchronization among subcarriers makes OFDM and OFDMA not really
orthogonal techniques. In particular, synchronization is a key issue in the uplink of a
5.1 Introduction 161
cellular network wherein different mobile terminals transmit separately [127], and,
also, in the downlink when base station coordination is used [93, 68]. For instance,
with regard to the spectral efficiency loss of side lobes and the CP, in an LTE system
operating at 10 MHz bandwidth, only 9 MHz of the band is used. In addition, the
loss of the CP is around 7%, so the accumulated loss totals at 16%. These drawbacks,
which invalidate many of the above-mentioned OFDM/OFDMA advantages, form
the basis of an open and intense debate on what the modulation format and multiple
access strategy should be in next-generation cellular networks.
The limitations of OFDM-based waveforms were identified as research topics
for future 5G waveforms. One aspect is the requirement for much shorter latency
to enable new services and applications like autonomous driving, that demands an
ultra-low latency and a highly resilient communication link. Another approach is
to make the cyclic prefix optional and work with shorter symbol durations. All this
has led to several candidate waveforms, such as Generalized frequency division
multiplexing (GFDM), Filter bank multi-carrier (FBMC), Universal filtered multi-
carrier (UFMC), Filtered OFDM (f-OFDM), etc [142]. The performance of these
waveform candidates is currently being analyzed and evaluated. At the same time
new multiple access schemes are also being researched, including Sparse Code
Multiple Access (SCMA) [134], Non-Orthogonal Multiple Access (NOMA) [150]
and Resource Spread Multiple Access (RSMA) [142].
However, it has not been decided yet which of these waveform candidates or
multiple access schemes will be utilized in a future 5G system. It is up to the
standardization committees to evaluate different proposal to the IMT-2020 group
within the ITU.
Moreover, 3GPP has already started the first study items for the choice of the
new Radio Access Technology (RAT) for next generation 5G mobile networks.
Currently, there is a lot of interest in Non-Orthogonal Multiple Access (NOMA)
schemes, which allow to distribute resources among users without a strict orthog-
onal division. For non-orthogonal MA techniques, all the users share the entire
signal dimension, and there is a Multiple Access Interference (MAI). Thus, for
non-orthogonal transmission, more complicated receivers are required to deal with
the MAI comparing to orthogonal transmission. NOMA is more practical in the
uplink scenario because the base station can afford the Multi-user Detection (MUD)
complexity. On the other hand, for downlink, orthogonal MA is more suitable due
162 Low Density Spreading (LDS) Multiplexing for NOMA
Low Density Spreading is one of the promising multiplexing scheme for NOMA
techniques proposed for 5G multiple access [171, 11, 12]. In LDS-Multiplexing, low
density spreading codes are used for transmission, where each user spreads its data
on a small set of sub-carriers. Due to the low density structure, every data symbol
will be spread over a small subset of sub-carriers (effective processing gain) and also
every sub-carrier will only be used by small subset of data symbols that could belong
to different users. There is no exclusivity in the sub-carriers allocation and more than
one user can share each sub-carrier. Therefore, each user transmission on a given
sub-carrier will only be interfered by a small number of other user’s transmission.
The LDS structure can be captured by a low density graph thus similar to application
of LDS for CDMA system, thus the detection of LDS symbols could be based on
the MPA presented in [90]. The LDS system can be understood as a system which
5.2 Multiplexing with Low Density Spreading 163
• Higher Signal to Interference plus Noise Ratio (SINR) can be achieved at each
sub-carrier, which results in reliable detection process.
• Each user will experience interference from different users at different sub-
carriers, which results in interference diversity by avoiding strong interferers
to destroy the signal of a user on all the sub-carriers.
Spreading sequences of the low-density type (containing many zeros) were con-
ceptually introduced in [38] for the purpose of allowing low-complexity multiuser
detection, while for the multicarrier system they were introduced in [90]. These
sequences, when designed in accordance with appropriate rules [126], allow appli-
cation of a belief propagation algorithm at the receiver. This was shown to yield
promising performance for overloaded systems - systems with more spreading se-
quences than chips for BPSK modulated data. Later, the concept of LDS-OFDM was
introduced as an uplink multi-carrier multiple access scheme and a close-to-optimum
MUD receiver performance was analyzed using EXIT charts [91]. The Performance
comparison with other existing multiple access techniques like OFDMA and SC-
FDMA were investigated together with their suitability for next generation cellular
system in [144, 13].
The focus of above literature was on the conceptual multiuser receiver structure
rather than on the particular choice of the set of spreading sequences. Bypassing de-
tails of spreading sequence synthesis, low-density sequences were found by trial and
error. Moreover, user-specific pseudo-random phases were applied in the evaluation
of the receiver structure [90].
In this chapter we address the design of the user’s spreading sequences. We
refer to them as signatures sets assuming they have the low-density structure of [90].
164 Low Density Spreading (LDS) Multiplexing for NOMA
+ + + +
s1 ··· ··· sK
s = (s1 , · · · , sk , · · · , sK ) sk ∈ C. (5.2)
N
si = ∑ xnαnk xk ∈ C , (5.3)
n=1
where αnk is a linear combination coefficient. This equation can be written by using
vector representation as,
s = xA. (5.4)
where the N × K matrix A known as Spreading Matrix, contains the linear com-
bination coefficients as its columns, known as spreading sequence, i.e., A =
[a1 · · · ak · · · aK ] and ak = [α1k · · · αnk · · · αNk ]T . The spreading sequences are assigned
uniquely to each user and are completely shared among the transmitter/receiver.
In LDS multiplexing, a small number of elements of a spreading sequences are
non zero allowing each user to spread its data over small number of tones. The
relationship between the LDS matrix A and the user spreading can be better explained
using following elements:
The set of positions of 1’s in the nth row denotes the set of output tones over
which user n spread its data, while the set of positions of 1’s in the kth column
represents the set of users that can contribute with their data at the kth tone.
Note that the 1′ s components of the binary matrix B represents the non zero
components of the matrix A and the non zero components of matrix A can
take any complex values.
166 Low Density Spreading (LDS) Multiplexing for NOMA
• Row Weight and Column Weight: Let us define the cardinality of the set of
tones over which any user spreads its data as wr , known as row weight, and the
cardinality of the set of users that can contribute their data at any tone as wc ,
known as column weight. If the parameters wr and wc are constant for all users
and tones respectively, then the resulting Spreading Matrix is known as regular
spreading matrix. In the following, we discuss the problem of constructing
optimum performing Spreading Matrix A. For simplicity, focus on a regular
Spreading Matrix for the rest of the discussion.
Kwc
Eb = Ebi ⇒ wr × Ebi . (5.8)
N
wc
2N−wc ∑2i=1 |sik |2
EO (k) = . (5.9)
2N
Since there are K output symbols and N inputs, the output average energy per bit
can be written as
1 K
Eb = ∑ EO(k). (5.10)
N k=1
Since wc is constant for all the output symbols sk , the average output energy per
symbol is constant, thus:
168 Low Density Spreading (LDS) Multiplexing for NOMA
wc
K2N−wc 2
Eb = ∑ |sik |2.
N2N i=1
(5.11)
wc
It can easily be found that the sum ∑2i=1 |sik |2 is equal to wc × Ebi × 2wc .
This leads to a simplified expression of the Average Output energy per bit as in
(5.8).
2
dmin
|max | = 4. (5.12) Fig. 5.3 Euclidean
Eb distance relation-
ship
Proof. In a considered LDS system with parameters (N, K, wc , wr ),
the least possible Hamming distance among two different binary
input sequence is 1. Since each input is connected to wr number
of output tones for a regular LDS spreading system (See Figure 5.3), the difference in
√
one bit corresponds to an Euclidean distance of at most 2 × Ebi in each connected
output tones. Thus, the maximum squared Euclidean distance we can achieve is,
2
dmin |max = wr × 4Ebi . (5.13)
Thus, the upper bound on the normalized minimum Euclidean distance expressed
in (5.12) can be easily obtained using (5.13) and (5.8).
5.5 Spreading Matrix Design 169
The performance of the LDS system directly depends on the Euclidean distance
profile of the considered spreading matrix A for the given LDS system parameters. In
essence, the BER performance depends mostly on the minimum Euclidean distance
provided by the spreading matrix and partly on the multiplicity of other distances
(distance distribution).
The design of a spreading matrix A with parameters (N, K, wc , wr ) involves the
separate design of three different components, which are:
• Binary Matrix
• Non-zero elements
Binary matrix serves as a way to relate the input symbol sets with output tones. The
LDS binary matrix B must be designed to meet the system parameters, i.e., N, K, wr
and wc . Like for LDPC matrices, a factor graph can be associated to a binary matrix
B by constructing the edges connecting factor (i.e. column) nodes and variable (i.e.
row) nodes. In a factor graph a loop (or cycle) is a closed path with no repeated
nodes, and must therefore be of even length. There is at most one edge between
any two nodes, and so the shortest length a loop can have is 4, the next largest is 6,
and so on. We refer to such loops as 4-loops, 6-loops, etc., and in general a loop of
length n is an n−loop. The girth of a graph is the length of the shortest loop. The
main problem with a loop is that the value of an incorrect bit is propagated back to
itself, effectively reinforcing itself and resisting the efforts of the algorithm to correct
it. Thus, an important consideration in designing a binary matrix is to avoid small
loops. In this work, we introduce a novel design concept for the construction of a
binary matrix, which completely avoids 4-loops.
Given a binary matrix B, it is very simple to check the presence of 4-loops by
using the column correlation factor w f defined in Section 5.3. As we know that the
column position of a binary matrix corresponds to a factor node in a factor graph, this
170 Low Density Spreading (LDS) Multiplexing for NOMA
means that the correlation in the non-zero position of a two column pair represents
the edge of a factor graph. Thus, considering any two columns of a binary matrix,
a column correlation factor greater than one confirms the presence of 4-loops in
the binary matrix. It is important to note that it may not be possible to construct
the binary matrix B for all the matrix size and overloading factor with a column
correlation factor w f = 1. The following relation, which is derived based on the
t-design [115] concept, helps us to check the possibility of constructing the binary
matrix with w f = 1 for given LDS system parameters.
j k
For an LDS system with system parameters (N, K, wr , wc ), if wK−1r −1
× wKr ≥ N,
there exists at least one binary matrix design which has a column correlation factor
w f = 1. Design guidelines are provided for every overloading factor in next sections.
The concept behind Low Density Spreading is to uniquely distribute the spreading
codes which contains less number of non-zero elements allowing each user to spread
its data over a small number of chips (tones, carriers, channels). In order to uniquely
decode the linearly combined output symbols, the one-to-one mapping relationship
between input and output is a must. This necessitates a careful design of non-zero
symbols of a spreading matrix. In addition, the choice of non-zero symbols should
not change the overall magnitude of the input symbols while spreading. Thus, it is
obvious that the non-zero symbols must be chosen from the unit circle of a complex
2-dimensional space which can be written in a complex exponential form as,
We distribute these symbols in the position of 1’s of each column in the binary
matrix. Let us consider the set of unique elements which are to be distributed as
signature constellation set. One of the easiest way to ensure a one to one relationship
between input and output of a LDS system is to ensure one-to-one relationship
among the inputs corresponding to single channel outputs [167].
As presented before, the objective of this work is to find a design rule for the
construction of a complete spreading matrix which ensures the achievement of upper
bound on the minimum normalized Euclidean distance. In the following we present
5.5 Spreading Matrix Design 171
a theorem that proves that for wc > 2, there is no such unitary magnitude signature
constellation for a single channel output that gives a one to one mapping matching
the upper bound on the minimum normalized Euclidean distance.
Proof. Let (x1 , · · · , xwc ) and (y1 , · · · , ywc ) be two input sets that correspond to non-
zero positions of the considered column of a binary matrix. Single channel outputs
corresponding to these input sets can be written as,
O1 = v1 x1 + v2 x2 (5.18)
O2 = v1 y1 + v2 y2 . (5.19)
Now, the squared Euclidean distance among these outputs can be written as,
x1 x2 y1 y2 A B
-1 -1 -1 -1 0 0
-1 +1 -1 +1 -2Ebi -2Ebi
+1 -1 +1 -1 2Ebi 2Ebi
+1 +1 +1 +1 0 0
Substituting the values of v1 and v2 with their exponential form as in (5.14), we have,
For BPSK modulated input symbols with bit energy of Ebi , Table 5.1 shows
the different values of A and B for different combinations of x1 , x2 and y1 , y2 . As
explained above, the squared Euclidean distance should be greater or equal to 4Ebi 2
Now, we define different cases based on the combination of these input sequences.
Case 1: x1 = x2 and y1 = y2 ( corresponds to the first and the last rows of the above
table)
When the inputs are same then, A and B becomes zero, thus (O1 − O2 ) = 0
which is a obvious result.
Case 2: If one of the input is equal and the other is different, x1 = x2 and y1 = −y2 OR
x1 = −x2 and y1 = y2
A = 0 and B = ±2Ebi OR A = ±2Ebi and B = 0, thus the inequality turns to
2 2
4Ebi = 4Ebi , (5.24)
Case 3: When both the inputs are different, x1 = −x2 and y1 = −y2 OR x1 = −x2 and
y1 = y2 , i.e., A = ±2Ebi and B = ±2Ebi thus the inequality turns to
2 2 2
4Ebi + 4Ebi + 2(±2Ebi )(±2Ebi ) cos(θ1 − θ2 ) ≥ 4Ebi . (5.25)
2 2 2
8Ebi + 8Ebi cos(θ1 − θ2 ) ≥ 4Ebi (5.26)
cos(θ1 − θ2 ) ≥ −0.5. (5.27)
2 2 2
8Ebi − 8Ebi cos(θ1 − θ2 ) ≥ 4Ebi (5.28)
− cos(θ1 − θ2 ) ≥ −0.5 (5.29)
cos(θ1 − θ2 ) ≤ 0.5. (5.30)
Thus, if (θ1 − θ2 ) falls in the above range, then the squared Euclidean distance among
two different outputs is always greater or equal to 4Ebi 2 . This proves the first claim.
Next, we consider wc = 3.
O1 = v1 x1 + v2 x2 + v3 x3 (5.33)
O2 = v1 y1 + v2 y2 + v3 y3 . (5.34)
174 Low Density Spreading (LDS) Multiplexing for NOMA
(O1 −O2 )2 = A2 +B2 +C2 +2AB cos(θ1 −θ2 )+2BC cos(θ2 −θ3 )+2AC cos(θ3 −θ1 ).
(5.37)
Our objective is to obtain the angle parameters relationship in order to obtain the
maximum possible normalized euclidean distance. The inequality to satisfy can be
written as
(O1 − O2 )2 ≥ 4Ebi
2
. (5.38)
We consider the values of A, B and C based on the above table. Based on the input
situation here we define three cases:
Case 1: When all the inputs are equal giving A = B = C = 0, then (O1 − O2 )2 = 0
which is obvious.
Case 2: When one of them is different and two of them are equal, i.e., A = ±2Ebi and
B = C = 0 OR B = ±2Ebi and A = C = 0 OR C = ±2Ebi B = A = 0, In each
case,
(O1 − O2 )2 = 4Ebi
2
, (5.39)
Case 3: When two of them are different and one is equal, i.e., A = B = ±2Ebi and
C = 0 OR A = C = ±2Ebi and B = 0 OR B = C = ±2Ebi A = 0, In each case,
(O1 − O2 )2 = 8Ebi
2
+ 2(±2Ebi )(±2Ebi ) cos(θ1 − θ2 ), (5.40)
(O1 − O2 )2 = 8Ebi
2
+ 2(±2Ebi )(±2Ebi ) cos(θ1 − θ3 ), (5.41)
(O1 − O2 )2 = 8Ebi
2
+ 2(±2Ebi )(±2Ebi ) cos(θ2 − θ3 ). (5.42)
5.5 Spreading Matrix Design 175
We know that the complex angle at the exponent is symmetric over a multiples
of 2π. Thus, to simplify the above range in (5.43), (5.44) and (5.45), let us
consider,
π π
θ1 − θ2 = and θ2 − θ3 = + ε. (5.46)
3 3
It can easily be shown that the only values of ε that satisfies above inequalities
are ε = 0, −π. It means that the values of θ1 − θ2 , θ2 − θ3 and θ3 − θ1 are
fixed and are given Table 5.2,
Sub-Case 1: One is positive and two are negative, i.e., A = −2Ebi , B = −2Ebi and
C = +2Ebi OR A = −2Ebi , B = +2Ebi and C = −2Ebi OR A = +2Ebi ,
B = −2Ebi and C = −2Ebi .
Sub-Case 2: One is negative and two are positive, i.e., A = +2Ebi , B = +2Ebi and
C = −2Ebi OR A = +2Ebi , B = −2Ebi and C = +2Ebi OR A = −2Ebi ,
B = +2Ebi and C = +2Ebi
176 Low Density Spreading (LDS) Multiplexing for NOMA
Sets θ1 − θ2 θ2 − θ3 θ3 − θ1
−π −π 2π
Set1 3 3 3
−π 2π −π
Set2 3 3 3
2π −π −π
Set3 3 3 3
π π −2π
Set4 3 3 3
π −2π π
Set5 3 3 3
−2π π π
Set6 3 3 3
−4π 2π 2π
Set7 3 3 3
2π −4π 2π
Set8 3 3 3
2π 2π −4π
Set9 3 3 3
−2π −2π 4π
Set10 3 3 3
−2π 4π −2π
Set11 3 3 3
4π −2π −2π
Set12 3 3 3
(O1 − O2 )2 = 12Ebi
2 2
+ 8Ebi 2
cos(θ1 − θ2 ) − 8Ebi cos(θ2 − θ3 )
2
− 8Ebi cos(θ3 − θ1 ) (5.49)
(O1 − O2 )2 = 12Ebi
2 2
− 8Ebi 2
cos(θ1 − θ2 ) − 8Ebi cos(θ2 − θ3 )
2
+ 8Ebi cos(θ3 − θ1 ) (5.50)
2 2 2 2
(O1 − O2 ) = 12Ebi − 8Ebi cos(θ1 − θ2 ) + 8Ebi cos(θ2 − θ3 )
2
− 8Ebi cos(θ3 − θ1 ) respectively. (5.51)
(O1 − O2 )2 θ2 − θ3 θ3 − θ1 θ1 − θ2
2
= 4 − 32 sin sin cos OR
Ebi 2 2 2
(5.52)
θ2 − θ3 θ3 − θ1 θ1 − θ2
= 4 − 32 sin cos sin OR
2 2 2
(5.53)
θ2 − θ3 θ3 − θ1 θ1 − θ2
= 4 − 32 cos sin sin
2 2 2
(5.54)
5.5 Spreading Matrix Design 177
θ2 − θ3 θ3 − θ1 θ1 − θ2
sin sin cos ≤0 (5.55)
2 2 2
θ2 − θ3 θ3 − θ1 θ1 − θ2
sin cos sin ≤0 (5.56)
2 2 2
θ2 − θ3 θ3 − θ1 θ1 − θ2
cos sin sin ≤ 0. (5.57)
2 2 2
We can check easily if the above explained sets satisfy these inequalities
in Table 5.3,
Sub-case 3: All values are positive OR all are negative
(S1 − S2 )2 θ2 − θ3 θ3 − θ1 θ1 − θ2
2
= 4 + 32 cos cos cos .
Ebi 2 2 2
(5.58)
θ2 − θ3 θ3 − θ1 θ1 − θ2
cos cos cos ≥ 0. (5.59)
2 2 2
178 Low Density Spreading (LDS) Multiplexing for NOMA
Table 5.4 Set of difference angles satisfying inequalities presented in (5.55), (5.56), (5.57)
and (5.59)
Again checking the inequality for the above explained sets in Table 5.3,
we get,
None of the sets satisfy all the inequalities thus proving that there is no such set
of angles that can achieve the upper bound on the normalized Euclidean distance.
It is clearly evident that an optimal signature constellation doesn’t exist for a single
channel output this means that a smart distribution rule should be designed in order
to obtain an optimal overall Euclidean distance for a given spreading matrix. This
distribution rule depends both on the arrangement of the binary matrix and the
signature constellation points, thus in next section we present in detail the unique
distribution rule for each considered spreading matrices type in next section.
5.6 Optimal Design 179
In the previous section, we have shown that a unitary signature constellation doesn’t
exist for a single channel output. In this section we show that by carefully selecting
the signature constellation distribution rule, we can still achieve the upper bound on
normalized minimum Euclidean distance for the signature constellation set having
one of the angle separation among the list of sets presented in Table 5.4. Next, we
provide a complete guide to the design of spreading matrix for an LDS system to
achieve the overloading capacity of 150%.
To design a spreading matrix to achieve the upper bound on the normalized
minimum Euclidean distance, we start from the signature constellation. This gives
some hint for the design of binary matrix and a signature constellation distribution
rule.
We have wc = 3, for which we have already proved in previous section that an
optimal signature constellation doesn’t exist for single channel output. However, it
can be observed from Table 5.4 that there are some sets for which the number of
output overlapping is limited to a pair. Thus, in the following design, we choose a
signature constellation whose angle separations fall under one of the sets provided in
the Table 5.4. In the following we consider a signature constellation,
such that
π π π
θ1 − θ2 = − , θ2 − θ3 = and θ3 − θ1 = − . (5.61)
3 3 3
For these angle parameters, next we discuss the nature of the single channel
output and the input conditions which lead to non-optimal Euclidean distances.
With these angle parameters, the squared Euclidean distance among single
channel outputs from two different inputs can be written as
(O1 −O2 )2 = A2 +B2 +C2 +2AB cos(θ1 −θ2 )+2BC cos(θ2 −θ3 )+2AB cos(θ3 −θ1 ).
(5.62)
By replacing the values of the angle separation parameters from (5.62) using (5.62),
we obtain
180 Low Density Spreading (LDS) Multiplexing for NOMA
We know that when all the inputs are different, the magnitude of A, B and C are
equal. Thus, when the last three products in (5.63) provide a negative contribution to
the sum, then (O1 − O2)2 may end up with zero. This happens when,
Thus, for the above angle parameters, the single channel output is not one to one
since for the input conditions given by (5.64), the squared Euclidean distance is zero.
Next, we look forward to design a binary matrix which gives a one-to-one
I/O mapping for the above set of signature constellation. By looking at the input
conditions that gives a squared euclidean distance zero, we can rewrite the conditions
as:
positions are linked to other two columns at one position each. For example,
1 1 0 ···
0 0 1 · · ·
0
1 1 · · ·
A = 1
0 0 · · ·
(5.65)
· · ·
1 0 1
0
1 0 · · ·
.. .. .. ...
. . .
v1 v2 0 ···
0 0 v3 · · ·
0 v3 v2
· · ·
A = v3 0 0
· · · (5.66)
· · ·
v2 0 v1
0 v 0
1 · · ·
.. .. .. ..
. . . .
Next we check when these Euclidean distances of each column are zero.
• For second column, from first column it is fixed that B is positive corresponding
to I1 and v2 . Thus, an Euclidean distance from second column is zero when
A and C corresponding to input positions I3 and I6 respectively are with A =
negative and C = negative.
• For third columns the input positions corresponding to I3 and I5 are already
negative. Thus, if we replace these positions in the third column of the binary
matrix with v1 and v2 , when they are of the same sign they will never give a
zero Euclidean distance.
182 Low Density Spreading (LDS) Multiplexing for NOMA
I1 v1 (+) v2 (+) 0 ···
I2 0 0 v3 · · ·
I3
0 v3 (−) v2 · · ·
I v (+)
A= 3 3 0 0 · · · (5.67)
· · ·
I4 v2 (−) 0 v1
I
5 0 v1 (−) 0 · · ·
.. .. .. ..
I. . . . .
It is also important to note that when all A, B and C have non-zero magnitude and
the single channel squared Euclidean distance is non-zero, it is always greater than
2.
or equal to 8Ebi
In this section, we present the simulation result for the LDS spreading system. We
consider the 150%-load signature matrices A6,4 and A9,6 which were designed based
on the criterion presented Section 5.6. Each of these matrices provide a normalized
minimum Euclidean distance of 2 with the smallest loop girth of 6. We choose the
signature constellation with a guidelines presented as in Section 5.5, i.e.,
5.7.1 A6,4
v3 v2 0 0
0 0 v2 v1
0 v3 v1 0
A=
(5.70)
v2 0 0 v3
v1 0 v3 0
0 v1 0 v2
Figure 5.4 shows the bit error probability of a BPSK modulated LDS spreading
system with an overloading factor of 150%. An iterative decoding performance is
compared with union bound performance and exhaustive decoding. In addition, we
find out the normalized minimum Euclidean distance for the considered spreading
matrix A6,4 designed based on the procedure presented in Section 5.5. We find that
the normalized minimum Euclidean distance to be 2 which is equal to the upper
bound on the normalized euclidean distance that can be calculated using Proposition
8. The obtained result was very significant in achieving the best possible bit error
rate for the overloading factor of 150%. Since the matrix are scalable by changing N
and K keeping the ratio constant, by using the design principle presented in section
5.5, we can obtain a spreading matrix of any arbitrary size with minimum density
of non-zero symbols with overloading factor 1.5 without changing the minimum
Euclidean distance. Another example of the matrix is presented next.
184 Low Density Spreading (LDS) Multiplexing for NOMA
100
10-1
10-2
10-3
10-4
10-5
10-6
0 1 2 3 4 5 6 7 8 9 10
5.7.2 A9,6
v1 v2 0 0 0 0
0 0 v1 v3 0 0
0 0 0 0 v1 v2
v2 0 0 v1 0 0
A=
0 0 v2 0 v3 0
(5.72)
0 v1 0 0 0 v3
0 0 v3 0 0 v2
v3 0 0 0 v2 0
0 v3 0 v2 0 0
In Figure 5.5 we present the bit error probability of a BPSK modulated LDS
spreading system with an overloading factor of 150% with these parameters. Iterative
decoding performance is compared with an union bound performance and exhaustive
decoding. In addition, we find out the normalized minimum Euclidean distance for
the considered spreading matrix A9,6 designed based on the procedure presented
in Section 5.5. We find that the normalized minimum Euclidean distance to be
2 which is equal to the upper bound on the normalized Euclidean distance that
can be calculated using Proposition 8. The obtained result is very significant in
achieving the best possible bit error rate for the overloading factor of 150%. Since
the matrices are scalable by changing N and K keeping the ratio constant, by using
the design principle presented in section 5.5, we can obtain a spreading matrix of any
arbitrary size with minimum density of non-zero symbols with overloading factor 1.5
without changing the minimum Euclidean distance. Another example of the matrix
is presented next.
186 Low Density Spreading (LDS) Multiplexing for NOMA
100
10-1
10-2
10-3
10-4
10-5
10-6
0 1 2 3 4 5 6 7 8 9 10
both at low and high SNR values. In comparison to optimal Likelihood Ratio test
they have very limited penalty (small fraction of dB), but much less complexity.
When compared to the classical soft and hard correlation tests, the Massey detectors
achieve significant gains of several dBs. All the results have suggested that the
Extended Massey detector (for small pattern length N) and the Massey detector
(for large N) can be considered the best solution for many demanding applications
requiring less complex and short binary pattern identification, like high bit rate, low
latency and high reliability frame synchronization.
In section 4, examples of semi-blind signal detection algorithms under practical
imperfections have been considered having in mind their possible application to
Cognitive Radio - like spectrum sharingapproach for 5G. Both theoretical and
numerical results have been presented, showing that a substantial performance
loss (in terms of detection and false alarm probabilities) can be experienced under
practical imperfections like noise uncertainty and unknown primary user traffic. By
adopting approaches based on ML estimation of noise variances, the performance
reduction under noise uncertainty can be improved. Also, specific expressions of
signal detection performance have been derived for the considered scenarios, taking
into account unknown noise variance and unknown primary user traffic.
In section 5, motivated by the the demand of efficient non-orthogonal multiplex-
ing system for 5G networks, a structured approach to design low-density signatures
providing 150% overloading for non-orthogonal LDS multiplexing system over the
AWGN channel has been presented. Moreover, we have also provided a theoretical
proof on the upper bound on the minimum Euclidean distance for the LDS multi-
plexing system with regular spreading matrix. On one hand, our sequences are of
low density type a property which highly simplifies receiver operation. On the other
hand, their minimum Euclidean distance properties ensure good performance on
AWGN channel. Instead of relying on trial-and-error searches and on pseudo random
design steps, we provided a a theoretical, structured approach towards the design of
optimal spreading sequences. We have focused on their performance in the AWGN
channel which is a good model for downlink multiple access systems operating in a
flat, slowly fading radio environment. We evaluate the performance of our sequence
constructions and we showed that they have beneficial properties in terms of their
distance spectrum.
References
[1] Fp7 european project 317669 metis (mobile and wireless communications
enablers for the twenty-twenty information society) 2012. URL https://www.
metis2020.com.
[2] Etsi tr 101 557 v1.1.1 (2012-02). URL http://www.etsi.org/deliver/etsi_tr/
101500_101599/101557/01.01.01_60/tr_101557v010101p.pdf.
[3] Ieee standard for information technology- local and metropolitan area
networks- specific requirements- part 22: Cognitive wireless ran medium
access control (mac) and physical layer (phy) specifications: Policies and
procedures for operation in the tv bands. Ieee std 802.22-2011, July 2011.
[4] Fp7 european project 318555 5g now (5th generation nonorthogonal wave-
forms for asynchronous signalling), 2012. URL http://www.5gnow.eu.
[5] The tactile internet itu-t technology watch report august 2014. Techni-
cal report, August 2014. URL https://www.itu.int/dms_pub/itu-t/oth/23/01/
T23010000230001PDFE.pdf.
[6] Ieee 802.19 wireless coexistence working group (wg). Technical report, July,
2013. URL http://ieee802.org/19/.
[7] Ieee 802.16 working group on broadband wireless access standards. Technical
report, July, 2013. URL http://ieee802.org/16/.
[8] J. Adams. An introduction to ieee std 802.15.4. In IEEE Aerospace Confer-
ence, 2006.
[9] D. Agrawal and A. Vardy. Generalized minimum distance decoding in
euclidean-space: Performance analysis. IEEE Trans. Inform. Theory, 46:
60–83, January 2000.
[10] G. Wunderet al. 5gnow: Challenging the lte design paradigms of orthogonality
and synchronicity. In Mobile and Wireless Communication Systems for 2020
and beyond, Workshop at 77th IEEE Vehicular Technology Spring Conference,
June 2013.
[11] M. Al-Imari, M. A. Imran, and R. Tafazolli. Low density spreading for next
generation multicarrier cellular systems. In International Conference on
Future Communication Networks (ICFCN, 2012.
190 References
[108] M. Laner, P. Svoboda, N. Nikaein, and M. Rupp. Traffic models for machine
type communications. In Proc. Wireless Commun. Syst. (ISWCS’13), pages
1–5, August 2013.
[109] Wei Lin and Qinyu Zhang. A design of energy detector in cognitive radio
under noise uncertainty. In 11th IEEE Singapore International Conference on
Communication Systems, 2008. ICCS 2008., November 2008. doi: 10.1109/
ICCS.2008.4737174.
[110] G. L. Lui and H. H. Tan. Frame synchronization for Gaussian channels. IEEE
Trans. Commun, COM-35(8):818–829, August 1987.
[111] ITU-R M. Imt vision - framework and overall objectives of the future devel-
opment of imt for 2020 and beyond. Itu working document 5d/temp/224-e,
July 2013.
[112] X. Ma, J. Liu, and B. Bai. New techniques for upper-bounding the ml decoding
performance of binary linear codes. IEEE Trans. Commun, 61(3):842–851,
2013.
[113] S. L. MacDonald and D. C. Popescu. Impact of primary user activity on the
performance of energy-based spectrum sensing in cognitive radio systems.
December 2013.
[114] D. J. MacKay. Good error-correcting codes based on very sparse matrices.
IEEE Trans. Inform. Theory, 45(2):399–431, March 1999.
[115] F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes:
Part 2. Elsevier, 1977.
[116] G. C. Madueno, C. Stefanovic, and P. Popovski. Reliable reporting for
massive m2m communications with periodic resource pooling. IEEE Wireless
Communications Letters, 3(4):429–432, August 2014.
[117] A. Mahram and M. C. Amirani. The complexity as a criterion for blind
spectrum sensing in cognitive radio. Developments in E-systems Engineering
(DeSE), 444:6–8, December 2011. doi: 10.1109/DeSE.2011.62.
[118] A. Mariani, A. Giorgetti, and M. Chiani. Effects of noise power estimation
on energy detection for cognitive radio applications. IEEE Transactions on
Communications,, 59:3410–3420, December 2011. doi: 10.1109/TCOMM.
2011.102011.100708.
[119] A. Mariani, A. Giorgetti, and M. Chiani. Snr wall for energy detec-
tion with noise power estimation. In IEEE International Conference on
Communications (ICC), 2011, volume 1, pages 5–9, June 2011. doi:
10.1109/icc.2011.5963367.
198 References
[134] H. Nikopour and H. Baligh. Sparse code multiple access. In 2013 IEEE
24th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC, 2013.
[135] Nokia. 2020: Beyond 4g radio evolution for the gigabit experience. White
paper, 2011. URL http://www.nokiasiemensnetworks.com.
[136] H. Ochiai and H. Imai. On the distribution of the peak-to-average power ratio
in ofdm signals. IEEE Trans. on Commun., 49(2):282–289, February 2001.
[137] R. Palit, K. Naik, and A. Singh. Anatomy of wifi access traffic of smart-
phones and implications for energy saving techniques. International Journal
of Energy, Information and Communication, 3(1):1–16, February 2012.
[138] F. Penna and R. Garello. Detection of discontinuous signals for cognitive
radio applications. IET Communications, 5(10):1453–1461, January 2011.
[139] F. Penna, R. Garello, and M. A. Spirito. Probability of missed detection
in eigenvalue ratio spectrum sensing. In IEEE conference on Wireless and
Mobile Computing, Networking and Communications, 2009., October 2009.
doi: 10.1109/WiMob.2009.29.
[140] H. Pradhan, A. S. Kalamkar, and A. Banerjee. Sensing-throughput tradeoff in
cognitive radio with random arrivals and departures of multiple primary users.
IEEE Communications Letters, 19(3):415–418, March 2015.
[141] J. G. Proakis. Digital Communications. McGraw-Hill, 4th edition, 2001.
[142] Qualcomm. 5g waveforms and multiple access techniques. Tech-
nical report. URL https://www.qualcomm.com/media/documents/files/
5g-research-on-waveform-and-multiple-access-techniques.pdf.
[143] D. Ramirez, G. Vazquez-Vilar, R. Lopez-Valcarce, J. Via, and I. Santamaria.
Multiantenna detection under noise uncertainty and primary user’s spatial
structure. May 2011. doi: 10.1109/ICASSP.2011.5946275.
[144] R. Razavi, M. AL-Imari, M. A. Imran, R. Hoshyar, and D. Chen. On receiver
design for uplink low density signature ofdm (lds-ofdm). in IEEE Transactions
on Communications, 60(11):3499–3508, November 2012.
[145] L. S. Reed and G. Solomon. Polynomial codes over certain finite fields. SIAM
J. Appli. Math, 8:300–304, 1960.
[146] D. Riviello, P. Dhakal, and R. Garello. Performance analysis of multi-antenna
hybrid energy detectors and optimization with noise variance estimation. In
International Conference on Advances in Cognitive Radio (COCORA), April
2015.
[147] D. Riviello, P. Dhakal, and R. Garello. On the use of eigen vectors in multi-
antenna spectrum sensing with noise variance estimation. In International
Conference in Signal Processing and Integrated Networks, Feb. 2015.
200 References
[148] S. N. Roy. On a heuristic method of test construction and its use in multivariate
analysis. The Annals of Mathematical Statistics, 24:220–238, 1953.
[149] S. N. Roy. On a heuristic method of test construction and its use in multivariate
analysis. Ann. Math Stat., pages 220–238, 1953.
[150] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi.
Non-orthogonal multiple access (noma) for cellular future radio access. In
IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, 2013.
[151] R. A. Scholtz. Frame synchronization techniques. IEEE Trans. Commun,
COM-28:1204–1213, August 1980.
[152] S. Sequeira, R. R. Mahajan, and P. Spasojevic. On the noise power estimation
in the presence of the signal for energy-based sensing. In 35th IEEE Sarnoff
Symposium (SARNOFF), 2012, May 2012. doi: 10.1109/SARNOF.2012.
6222753.
[153] C. E. Shannon. A mathematical theory of communication. Bell Sys. Tech., 27:
379–423, October 1948.
[154] S. K. Sharma, T. E. Bogale, S. Chatzinotas, B. Ottersten, L. B. Le, and
X. Wang. Cognitive radio techniques under practical imperfections: A survey.
IEEE Commun. Surveys Tutorials, 2015.
[155] B. Sklar and F. J. Harris. The abcs of linear block codes. IEEE Signal Process.
Mag, 21:14–35, July 2004.
[156] DySPAN standards committe. Technical report. URL http://grouper.ieee.org/
groups/dyspan/.
[157] J. J. Stiffler. Theory of synchronous communications. Prentice-Hall, Engle-
wood Cliffs, NJ, 1971.
[158] R. Tandra and A. Sahai. Noise calibration, delay coherence and snr walls
for signal detection. In 3rd IEEE Symposium on New Frontiers in Dynamic
Spectrum Access Networks, 2008. DySPAN 2008., volume 1, pages 14–17,
October 2008. doi: 10.1109/DYSPAN.2008.42.
[159] R. Tandra and A. Sahai. Snr walls for signal detection. IEEE Journal of
Selected Topics in Signal Processing,, 2:4–17, February 2008. doi: 10.1109/
JSTSP.2007.914879.
[160] L. Tang, Y. Chen, E. L. Hines, and M. S. Alouini. Effect of primary user
traffic on sensing-throughput tradeoff for cognitive radios. IEEE Transactions
on Wireless Communications, pages 1063–1068, Apr 2011.
[161] D. J. Torrieri. Principles of Secure Communication Systems. Artech House,
Boston, US, 1992.
References 201