Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks

Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks

Raghed El-Bardan,  Engin Masazade,  Onur Ozdemir,  Yunghsiang S. Han,   and Pramod K. Varshney,  R. El-Bardan and P. K. Varshney are with the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY 13244 USA.E. Masazade is with the Department of Electrical and Electronics Engineering, Yeditepe University, Turkey.O. Ozdemir is with Boston Fusion Corp., 1 Van de Graaff Drive, Suite 107, Burlington, MA 01803 USA.Y. S. Han is with the Department of Electrical Engineering at National Taiwan University of Science and Technology, Taipei, Taiwan. He visited Syracuse University during 2012-13.Email: {raelbard, oozdemir, varshney},,

We employ Permutation Trellis Code (PTC) based multi-level Frequency Shift Keying signaling to mitigate the impact of Primary Users (PUs) on the performance of Secondary Users (SUs) in Cognitive Radio Networks (CRNs). The PUs are assumed to be dynamic in that they appear intermittently and stay active for an unknown duration. Our approach is based on the use of PTC combined with multi-level FSK modulation to make the SU transmissions robust against PU interference and noise disturbances and help an SU improve its data rate by increasing its transmission bandwidth while operating at low power and not creating destructive interference for PUs. We evaluate system performance by obtaining an approximation for the actual Bit Error Rate (BER) using properties of the Viterbi decoder and carry out a thorough performance analysis in terms of BER and throughput. The results show that the proposed coded system achieves i) robustness by ensuring that SUs have stable throughput in the presence of heavy PU interference and ii) improved resiliency of SU links to interference in the presence of multiple dynamic PUs.

Cognitive Radio Networks, Primary User Interference, Permutation Trellis Codes, FSK Systems

I Introduction

Today a large portion of the frequency spectrum assigned by the Federal Communications Commission (FCC) is used intermittently resulting in inefficient usage of the assigned frequency bands. In order to accommodate the increased demand for spectrum in wireless applications, Dynamic Spectrum Access (DSA) has been proposed as the new communication paradigm for wireless systems where the existing spectrum is utilized opportunistically [1, 2]. The radios using this technique are called Cognitive Radios (CRs). In a Cognitive Radio Network (CRN), Primary Users (PUs) are the licensed users who have the right to access their spectrum at any time. When Secondary Users (SUs) have data to transmit, they look for spectrum holes which are the frequency bands not being used by primary users and transmit their data over them [3, 4]. In order to ensure a non-degraded PU operation in the network, existing literature has considered several effective protection techniques, e.g., beamforming of SU signals and putting interference temperature limits to satisfy PU signal-to-interference plus noise constraint [5, 6]. In addition, there are scenarios in which SUs can co-exist with the PUs as long as they do not violate the quality of service requirements of the PUs [7, 8].

Orthogonal frequency division multiplexing (OFDM) has been suggested as a multi-carrier communication candidate for CR systems where the available spectrum is divided into sub-carriers each of which carries a low rate data stream [9, 10, 11, 12, 13]. A typical approach for a CR using OFDM is to sense the PU activity over the sub-carriers and then adjust its communication parameters accordingly. The goal is to protect PUs as well as intended SU receivers from possible collisions resulting from the use of the same sub-carriers. Continuous spectrum sensing and re-formation of wireless links may result in substantial performance degradation for SUs [14]. For instance, the throughput of the secondary system is affected by the time spent for channel sensing. When an SU spends more time on spectrum sensing, a smaller number of information bits will be transmitted over a smaller interval of time resulting in reduced system throughput. On the other hand, decreasing sensing duration may result in a larger probability of making incorrect decisions, thereby decreasing the throughput of both SU and PU. In this regard, the authors in [15] numerically analyze the trade-offs between throughput and sensing duration in addition to coding blocklength and buffer constraints. In [16], the authors study the problem of designing a sensing slot duration to maximize the achievable throughput for the SUs under the constraint that the PUs are sufficiently protected.

Error correction coding (ECC) has been proposed for CRNs as one possible technique to better protect SU links and prevent degradation in their performance. In [10], it is assumed that an SU transmitter vacates the band once a PU is detected. Due to the sudden appearance of a PU, rateless codes have been considered to compensate for the packet loss in SU data which is transmitted through parallel subchannels. The authors in [11] consider the design of two efficient anti-jamming coding techniques for the recovery of lost transmitted packets via parallel channels, namely rateless and piecewise coding. Similar to the spectrum model defined in [10], a system’s throughput and goodput are analyzed and a performance comparison is carried out between these two coding techniques. For an OFDM-based CRN presented in [12], SU transmitters and receivers continuously sense the spectrum, exchange information and decide on the available and unavailable portions of the frequency spectrum. Depending on frequency availability, an appropriate Reed-Solomon coding scheme is used to retrieve the bits transmitted over the unavailable portions of the frequency spectrum. The authors in [13] further explore Low-Density-Parity-Check (LDPC) codes in an OFDM scheme where a switching model is considered for dynamic and distributed spectrum allocation. They also analyze the effects of errors during PU detection on channel capacity and system performance. The switch is assumed to be open for each SU detecting a PU. When the switch is open, the channel is modeled as a binary erasure channel (BEC) and the cognitive transmitter continues to transmit its message allowing bits to be erroneous when received. Another major use of the ECC schemes is presented in [17] where the authors study the performance of cooperative relaying in cognitive radio networks using a rateless coding error-control mechanism. They assume that an SU transmitter participates in PU’s transmission as a relay instead of vacating the band in order to reduce the channel access time by a PU. Since the use of rateless codes allows an SU receiver to decode data regardless of which packets it has received as long as enough encoded packets are received, these codes are very suitable for cooperative schemes. The authors in [18] propose an end-to-end hybrid ARQ scheme in CRNs consisting of unidirectional opportunistic links to reduce the number of retransmissions with a fixed throughput offset. Their error control approach is based on coded cooperation among paths and amplify-and-forward relaying of packets within a path such that this hybrid ARQ works for CRNs even if some coded data are missing. The authors implement their scheme using convolutional codes combined with BPSK modulation.

In this paper, we investigate the error correction performance of Permutation Trellis Codes (PTCs) [19, 20] combined with multi-level Frequency Shift Keying modulation systems in CRNs. The proposed PTC based framework is quite general and is applicable to many systems beyond CRNs where interference is an issue. For example, the framework has been applied to power line communications [19, 20] where strong interferers are assumed to be always present as an extreme case. In this paper, we show a much wider applicability of the PTC based framework as an interference mitigation approach by applying it to CRNs where the special challenge is to guarantee reliable communication by SUs in the presence of intermittent PUs that stay active for an unknown duration without the need of detecting them. These dynamic PUs serve as the source of strong interference for SU communications. Another challenge lies in the susceptibility of SU transmissions in a CRN to intentional interference like jamming attacks. In such a case, it is extremely important to guarantee a minimum degree of operability of the network. In other words, additive white Gaussian noise (AWGN) is not the critical limitation here, but rather an unpredictable and/or intermittent interference, e.g., PU transmissions and jamming attacks. Therefore, the emphasis of the proposed PTC based framework is on robustness, rather than on data rate or bandwidth use. To the best of our knowledge, our work is the first to consider the use of PTCs in CRNs. The motivation for this proposed approach is to overcome the tremendous degrading effect of PU interference on an SU transmission and to provide a stable level of reliable information reception regardless of how severe or prolonged a dynamic PU activity is and without requiring an accurate detection of it. In our model, an SU transmits its own information using low power concurrently with PU transmissions without the need to relay PU’s traffic [17] or to vacate the band [10]. Different from [12], we assume that no information exchange or spectrum negotiation takes place between the SU transmitter-receiver pair. Our proposed scheme is different from existing work where communication sessions are carried over parallel subchannels [10, 11, 12, 13]. This is due to the fact that our scheme is based on multi-level FSK modulation with PTC using a single subchannel at a time. By using PTC, continuous channel sensing by the SU transmitter-receiver pair is no longer required, since an appropriate PTC can cope with high levels of PU interference on a given SU link. Thus, SUs no longer suffer from the huge overhead created by continuous sensing of the spectrum.

We consider a similar system model as devised in [19, 20] and carry out a thorough performance analysis in terms of BERs and throughput for dynamically varying interference. In [19, 20], the authors were interested in the design of PTCs that mitigate the impact of permanent interferences that exist in power line communications. In their work, they conducted a simulation study and presented results on the performance of different PTCs with respect to the probability of an element of the code matrix being in error in the presence of different noises on one or more channels. They also investigated the choice of distance increasing/conservative/reducing mappings for a given PTC with respect to narrowband interference that always exists on one band in the presence of background noise in terms of BER. The authors in [19, 20] provide a BER performance analysis via simulations and not analytically.

The analytical BER analysis of a PTC coded M-FSK system is imperative to determine its link quality. In other words, the BER estimate is a useful tool for cross-layer design. Given that the PU stays active once it starts transmitting, the exact bit error rate (BER) is derived using an exhaustive search [21]. Hence, the analytical evaluation of BER becomes computationally prohibitive for large codes. Rather than using an exhaustive search, in this paper, we develop an approximation of BER using the properties of the Viterbi decoder. Also, in our previous work [21], a very special case is considered where a PU stays active once it starts transmission. In this paper, we consider a more practical scenario where a 2-state Markov chain is employed to model the dynamic PU activity in terms of alternating On-Off periods. It should be noted that the work on [19] and [20] also considered an extreme case where the authors assumed that the interference was always present and did not consider dynamically varying interference. In the more general framework presented in this paper, the performance results provided, e.g., BER, are intuitive and more useful in comparison to the worst-case guaranteed performance presented in [21].

Under the same resources such as energy per bit, transmission bandwidth, and transmission time, we compare the throughput performance of the proposed communication system with a simple uncoded opportunistic M-FSK system and a convolutionally coded OFDM system using BPSK modulation. The simulation results show that the proposed system outperforms the aforementioned systems in the presence of heavy PU interference. We also compare the BER performance of the proposed communication system with an LDPC code coupled with an -FSK modulation system for static and dynamic activities of a PU. It is shown that the proposed scheme outperforms the other one. Moreover, we present results on the degree of resiliency to interference that a PTC can guarantee for the SU link in the presence of interference by multiple dynamic PUs.

To summarize, the main contributions of the paper are:

  • We consider a more practical scenario in which we represent the cognitive radio network using a dynamic PU channel occupancy model including the case of multiple PUs.

  • To mitigate interference created by these dynamic PUs, we propose the use of PTC-based multi-level FSK signaling that incurs no overhead costs as no channel sensing is required before SU transmissions.

  • Using the proposed PTC based framework, the SU transmissions achieves robustness against the dynamic PUs’ interference and noise disturbances and, at the same time, the resiliency of SU links improves.

  • A thorough analytical performance analysis of the proposed scheme is presented in terms of BER and throughput for static and dynamic activities of multiple PUs.

The rest of the paper is organized as follows. In Section II, we provide the system model and introduce the concept of PTC. In Section III, we introduce hard-decision Viterbi decoding of the system. We also approximate the actual BER through the use of a specified finite number of paths forming the Viterbi trellis. Section V presents numerical results demonstrating the improvement in the performance of the PTC-based multi-level FSK system, validating the suggested BER approximation, supporting the effectiveness of the proposed communication scheme, as well as demonstrating the efficiency of PTC in the presence of multiple dynamic PU interference. Finally, we conclude the paper and address some future research directions in Section VI.

Ii System Model

We consider a simple cognitive radio network as shown in Fig. 1, which consists of a PU transmitter-receiver pair and an SU transmitter-receiver pair. The SU pair is assumed to be located within the transmission range of the PU.

Fig. 1: A simple cognitive radio network.

The transmission range shown in Fig. 1 is the maximum distance covered by a PU transmission such that the signal to interference plus noise ratio (SINR) at the PU receiver equals a minimum threshold value, . In this model, we assume a free space path loss model and a Line-Of-Sight (LOS) AWGN channel. The power in the transmitted signal is , so the received power is given in [22] by


where is the product of the transmit and receive antenna field gains in the LOS direction and is the signal wavelength defined as the ratio of the speed of light to the center frequency of the band in operation, . In this model, we assume omnidirectional antennas so . Both licensed and unlicensed users coexist and they can simultaneously operate over the same band. One further assumption made here is that interference, created by an SU, that deteriorates the QoS of the PU is negligible compared to the received PU power. This is due to the fact that the transmission power of PU is much larger than the transmission power of SU, i.e., . In this approach, the SINR at the PU receiver [23] given in (2) satisfies , that is,


where is the SU interference at the PU receiver and is the minimum threshold above which a PU transmission is received successfully. It is assumed that the SU transmitter knows the location of its corresponding receiver possibly by means of extra signaling. An overview of the signal processing model that combines the PTC scheme with the multi-level FSK communication system is provided in Fig. 2.

Fig. 2: Block diagram of the Coded multi-level FSK System

The information bits, , are loaded into a rate convolutional encoder in parallel, e.g., with a two-stage shift register and generator 7, 5 (octal) [19]. It is well-known that due to the incorporation of a channel coding scheme in a communication system, the overall transmission energy per bit is less than that without a coding scheme. However, due to its error correction capabilities, the purpose of convolutional encoding is to improve the performance of the system.

For each of the convolutional coded output symbols, the PTC encoder assigns a certain code matrix which is transmitted over both time and frequency. We present an example for illustration, in which the coded symbol “01” is mapped onto “213”. This permutation code matrix is to be transmitted in both time and frequency domains resulting in a ( ) binary code matrix as given below.


where . denotes the number of symbols and defines the number of frequency bands as well as the number of time steps used in transmitting the outputs of the encoder. In this paper, we define the PTC-based multi-level FSK system as the -FSK system since the PTC-based multi-level FSK modulated system leads to an x binary code matrix. According to (3), transmission takes place on , , and (first, second and third columns of ) corresponding to the time steps , , and respectively. Tables I and II present the symbol (with 1 bit and 2 bits) mappings onto the corresponding unique permutation code matrices respectively [19]. For mapping tables for larger values of , we refer the reader to [19].

Label Symbol Permutation code matrix
TABLE I: Mapping of symbols into permutation code matrices ( = 2)
Label Symbol Permutation code matrix
TABLE II: Mapping of symbols into permutation code matrices ( = 4, = 3)

For different symbols, denotes the set of transmitted code matrices such that has the following general form:


where denotes the () binary element in the -th transmitted code matrix, indicates the output of the detector for frequency at time step in the code matrix. At each time step, the element where 1 is present in the code matrix is modulated and transmitted. At a given time, only one frequency band is used for transmission. Using the -FSK scheme, the transmitted signal, assumed to be sufficiently narrowband, over -th frequency and -th time step where , is given by:


where is the transmitted signal energy per information symbol and is the symbol duration. In this model, we assume a strong LOS path between a stationary SU transmitter and a stationary receiver. Therefore, channel noise is modeled as Additive White Gaussian Noise (AWGN) with zero-mean and variance . Since path loss is a function of the operating frequency, we need to ensure that the received signal power over the different frequency channels is the same, , in order to satisfy a fixed signal-to-noise ratio, at the receiver. Therefore, we adjust each SU’s transmitting power over each frequency, , according to the free space path loss model given in (1). Therefore, the SU transmitter needs to know the location of its corresponding receiver. At the input of the SU demodulator, the received signal is given by:

where , , and is defined as the symbol energy at the receiver. and are defined as the interference energy per coded symbol and the interference power due to the PU transmitter at the SU receiver, respectively, and represents the channel noise at the receiver. It should be mentioned that a PU transmitter can modulate the transmitted signal using any scheme and is not limited to the use of FSK-modulated signals. The fact that the PU power is very high compared to that of the SU implies that the received signal is dominated by the PU signal which, in turn, shapes the behavior of the system. Without loss of generality, we assume that the PU uses an FSK-modulated signal to transmit its information similar to the SU.

At the receiver side, non-coherent detection is employed using a bank of quadrature receivers so that each consists of two correlation receivers corresponding to the in-phase and quadrature components of the signal. The in-phase component of the signal received, , is given by:


where and are uniformly distributed over [0, 2], i.e., , , and denote the random phase components of the SU and the PU signals, respectively. The noise term in (II) is modeled as AWGN, i.e., . is the received symbol energy over a given signaling interval. Similarly, is the received signal’s quadrature component defined as follows:


The envelope of each quadrature receiver over frequency and time step , , is defined as the square root of the sum of the squared in-phase and quadrature components of the correlator output as


At the receiver, a hard decision decoding scheme is used where the envelope value of each of the quadrature receivers is compared to a threshold value, . The threshold value we use in this paper is the same as that used by the authors in [19], namely .

The received code matrix is of the form,


where and can be determined from,


Iii Bit Error Rate Analysis

The link quality between two SUs is determined by how much PU interference it can tolerate. We employ BER as the QoS metric to characterize successful communication for an SU. We consider the system model presented in Fig. 2 and obtain an approximation for BER. This system model is the same as the one considered in [19, 20] where the PTC encoder includes a convolutional encoder and the corresponding decoder uses Viterbi algorithm for decoding.

Here, we assume that the PTC encoder uses a rate convolutional code whose output is converted to a symbol which, in turn, is mapped onto a permutation matrix to be transmitted. It is important to point out that the exact BER analysis of the proposed system is computationally prohibitive. Hence, we approximate BER using some properties of the Viterbi decoder.

The encoder of the binary convolutional code with a given rate is viewed as a finite state machine as shown in Fig. 3.

Fig. 3: Finite State Machine of a ( = ) convolutional coded PTC system

This state diagram, corresponding to the PTC shown in Table II, results in the trellis presented in Fig. 4. In order to optimally decode the received information, we employ the Viterbi algorithm which reconstructs the maximum-likelihood path given the input information sequence. The Viterbi decoder gives as an output the path in the trellis that has the minimum overall Hamming distance with respect to the received sequence. In this regard, an error event may occur if for a transmitted path in the trellis the overall number of differences with the demodulator outputs is larger than or equal to that of a competing path.

Fig. 4: A ( = ) convolutional code trellis for our PTC-based system.

In order to compute an upper-bound on the probability of bit error, all error events have to be taken into account. It is important to note that the number of error events is proportional to the number of input bits to be transmitted. In other words, the number of competing paths and the number of error events increase as more input bits are serially loaded into the convolutional encoder. Then, the probability of bit error of a convolutional code is upper-bounded according to [24, 25] as


where is the free distance of the convolutional code, is the number of paths that differ by bits from the transmitter codeword, and is the probability that the decoded path differs by bits from the transmitted codeword. In particular, and are independent of the transmitted codeword. In fact, they can be calculated assuming that an all-zero codeword is transmitted. Knowing that all the code matrices to be sent include non-zero elements, we next prove that there is a similar upper-bound on the system given in Fig. 2.

Now, let be a codeword of the convolutional code and be the corresponding expanded codeword comprising the permutation code matrices mapped from . The length of is , where denotes the size of packet to be transmitted and the number of branches in the trellis. In order to apply (11), we need to prove that the upper-bound given in (11) is independent of the transmitted expanded codeword. Let denote the probability of bit error when is the transmitted codeword. Knowing that is a one-to-one mapping from the codeword , by the argument of (11) given in [24, 25], we have


where is the free distance of the expanded code, and and are the number of paths and the probability that the paths differ by bits from the transmitted codeword , respectively.

Proposition 1

The bound in (12) is independent of the transmitted codeword if the noise caused by the PU in a subchannel will affect all bits in this channel that are generated by one or more trellis branches.


See proof in Appendix.       

The fact that we have no information regarding the length of the transmitted bits sequence means that the calculation of the upper bound, in (11), involves an infinite sum over all possible error events. In other words, an infinite number of trellis’ paths have to be taken into consideration which will render the process of evaluating the error bound computationally prohibitive for applications such as link adaptation. Therefore, it is important to approximate BER using a suitably selected finite number of trellis’ paths.

For every convolutional code, there exists a transfer function that uniquely determines the number of paths by which a received sequence is bits different from an assumed all-zero transmitted bit sequence. For instance, the transfer function of the mapped permutation code in the proposed -FSK scheme based on Fig. 3, i.e. = 3, is given by where


Equivalently, we are saying that there is only one path, , with an input sequence and permutation code matrix sequence that has 16 bits different from the assumed all-zero transmitted bit sequence ( (231,123) + (231,132) + (231,123) = 6 + 4 + 6), 2 paths that have 20 bits difference, and so on. It is most likely that the first few error events (paths) in the trellis dominate all the remaining ones. In this manner, the approximate BER can be written as


where and denotes the number of paths involved in the BER approximation for which numerical results are presented in Section V.

In order to compute we denote by and the transmitted and received code matrices at stage in a trellis composed of stages. Then, can be expressed as,


where and are the binary elements given by (4) and (9) respectively in the -th stage of the trellis and and denote the presence and absence of PU activity over channel respectively. Here we note that and depend on channel ’s occupancy model which, in turn, is discussed in Section IV-1.

In each stage of the trellis, the absence and presence of PU need to be taken into consideration when computing the likelihoods in (15) that also depend on the code matrix to be transmitted.

Iii-a Computation of likelihoods in the absence of PU

Suppose there is no PU transmission over frequency band at time step . If the SU is active, i.e. transmitting a bit ‘1’, then the demodulator in-phase component and the demodulator quadrature component . The fact that and are statistically independent random variables with non-zero means, then implies . Accordingly, can be computed as


where is the cumulative distribution function of evaluated at , is the Marcum’s Q-function defined as [26],


and is the zeroth order modified Bessel function. , in this case, is nothing but the complement of (16) and is given by


If the SU is not transmitting any information on subchannel at time step , then, and , and we have . Then, and can be computed as,




Iii-B Computation of likelihoods in the presence of PU

In the presence of PU activity and an active SU, i.e., the SU is transmitting a ‘1’, the signal received at the input of the demodulator has two significant terms besides noise. One corresponds to the actual signal energy of the transmitted symbol and the other is created by the PU activity. It is assumed that the SU transmitting power is sufficiently small so that QoS of the PU session is maintained. Therefore, the SU signal is negligible as compared to that of the PU. In this case, and . Thus, . and , in this scenario, are calculated according to,




If the SU does not transmit on subchannel at time step , the output of the demodulator has the noisy signal received from the PU. In that case, and similar to the analysis approach followed earlier, and . Consequently, . So, the following probabilities and are the same as and , respectively.

Once the probabilities presented above are evaluated, we can calculate for each stage of the stages in the trellis and, eventually, approximate the BER of the proposed scheme as given in (14).

Iv Throughput Analysis

So far, we have computed the BER approximately and evaluated the performance of the -FSK system in the presence of PU interference. We have also proposed the adoption of the PTC-based multi-level FSK in the transmission strategy of SU in order to provide resilience to spontaneous narrowband PU interference. In other words, heavy redundancy introduced by the PTC ensures successful communication sessions of the SUs in the presence of PU interference. In order to further explore the performance of the proposed -FSK communication system and validate its effectiveness, we perform a throughput analysis based on the approximate BER provided in Section III. Accordingly, an SU, adopting the proposed -FSK communication scheme, is expected to provide a level of reliable information reception which is better than what the SU could achieve otherwise under heavy PU interference.

Iv-1 Licensed Channel Dynamic Occupancy Model

Different from [21] where the licensed channel was assumed to be always occupied by the PU, we model the channel available for PU active transmissions and its occupancy as a 2-state Markov chain as shown in Fig. 5.

Fig. 5: Two-state Markov chain model for PU activity over licensed spectrum

In this model, the channel has two alternative states denoted by On (Busy) and Off (Idle). This assumption is practical in the sense that the licensed spectrum occupancy will experience alternating On-Off periods rather than the assumption of the channel being always occupied (PU being always present once it starts transmission during an SU transmission). The periods during which the licensed spectrum’s state is idle or busy, also known as holding times, are geometrically distributed with known independent parameters and as shown in Fig. 5. An On state represents the state in which the licensed band is occupied by a PU resulting in degraded BER performance for SU transmissions, while an Off (idle) state represents the state in which the primary band is idle. Accordingly, the steady state probabilities of the primary channel’s state being Off or On are given respectively as




Iv-2 Throughput Analysis

In order to examine the effectiveness of the proposed -FSK approach, we conduct a throughput analysis that monitors the average throughput of the SU communication session in the presence of PU activity modeled as a 2-state Markov chain. Knowing that the SU transmitter has no information regarding the presence or absence of the PU, we determine the unlicensed throughput for SU communications as a function of the probability of a licensed channel being occupied by a PU. Such analysis illustrates the efficiency of the proposed scheme in ensuring a stable throughput regardless of any PU activity over the licensed spectrum. Accordingly, we present the approximate expected throughput () of the -FSK communication scheme based on the approximate BER given as


where is the approximate packet error rate (PER), is the approximate BER computed with paths knowing the presence of dynamic PU interference as described in (14) and (15), and is the rate at which information packets are sent. Throughput, in our model, is defined as the number of correctly received packets per unit time. For simplicity, we do not consider header and overhead bits when computing the link throughput.

V Numerical Results and Discussion

V-a Approximate BER with Single Permanent PU Interference

For the coded -FSK communication system shown in Fig. 2, the following values of the physical parameters are assumed. The transmit power of the SU is varied between and the noise power density is selected as . These values are chosen in such a way so as to not create destructive interference to the PU. We further assume that the lowest frequency band in the available frequency spectrum, , is selected as 56 MHz, and the bandwidth spacing between any two subchannels is selected as 6 MHz. The PU is assumed to be operating at and has a total transmitting power of MW. The parameters’ values used in the simulation are chosen in accordance with the IEEE 802.22 standard [27]. The distances between the PU transmitter and SU receiver and that between the SU transmitter-receiver pair are selected as 10 m, in order to analyze the quality of the SU link under a high interference scenario.

In Fig. 6, we fix and compare the simulated BER with its approximations using different number of paths used in the approximation, i.e., . It is clear from the figure that approximates BER well for . In Fig. 7, we fix dB and compare absolute error of the BER approximation for different values of . It is again clear that , i.e., using only paths of the convolutional code’s trellis, provides good BER approximation for different sizes of PTC. This is due to the fact that the first few error events with a few errors in the trellis dominate all the remaining transitions. This result confirms what we have mentioned earlier regarding the domination of a small number of paths in the trellis over all the remaining paths that may evolve due to incoming bits. The approximate BER we provide in the section could be used as a QoS metric in an adaptive scenario where certain parameters of the system such as could be adapted in an online manner using this approximation.

Fig. 6: BER approximations for PTC with = 3.
Fig. 7: for different PTC ( = 2, 3, and 4) and SNR = 7 dB.

In Table III, we present results on the performance of exhaustive search111Using this technique, decisions on the transmitted code matrices are made by the permutation trellis decoder which decides in favor of the transmitted code matrix, i.e., among possible code matrices, which has the minimum Hamming distance with respect to the received one. In order to determine all the decisions for every possible code matrix, a brute force method is used to compare each possible received code matrix to every code matrix. This method needs roughly comparisons [21]. compared to the proposed approximation approach in this paper in terms of the time needed to compute BER for different PTC.

PTC Exhaustive Search Approach Approximate Approach
TABLE III: A comparison of the time needed to compute BER between exhaustive search [21] and approximation approach for different PTC ( = 2,3, and 4)

As shown in Table III, it takes much shorter time to compute the BER approximately as compared to its exact calculation.

V-B Throughput Analysis of -Fsk

For comparison purposes, we first consider a competing scenario where an SU does not employ any coding technique in its spectrum interweaved transmission strategy which, in turn, is assumed to be based on -FSK modulated signals. In this scenario, an SU makes use of the CR channel sensing feature in order to determine if there is an active PU in the network or not. Depending on the channel sensing measurements of the licensed spectrum, a decision is made on whether the SU should vacate the band or not. In the case where the SU detects a white space, it adapts the transmission parameters to utilize the full spectrum available and achieve the maximum throughput. On the other hand, when a PU is detected an SU vacates the band and adjusts its transmission parameters accordingly by employing a modified FSK modulation scheme supporting the transmission of symbols where .

Fig. 8: Throughput Comparison of -FSK and uncoded opportunistic -FSK as well as convolutionally coded BPSK schemes for SNR = 4 dB, packet size = 256 bits, and = 100 packets/sec.

In order to gain more insight regarding the throughput performance comparison of the PTC-based multi-level FSK with the uncoded-opportunistic (adaptive) -FSK system, we assume that packet transmissions take place over an observation window of length seconds divided into time slots. For each time slot, the steady state probability of a channel being occupied by an active PU, given in (24), is evaluated. Knowing each interval’s time and the time required for transmitting a single packet, the incorrectly received packets can be determined. As a result, the unlicensed network’s throughput is computed and analyzed. We further assume that the available spectrum consists of four frequency bands. With the use of the PTC-based multi-level FSK approach, an SU does not need to sense the channel or adapt its wireless links. In the uncoded opportunistic system, an SU senses the licensed frequency band at the beginning of a time slot. Assuming zero-cost perfect detection of a licensed user’s activity, an SU decides on which -FSK modulated signals are to be transmitted. In the case where an SU detects a spectrum hole, it utilizes the full available spectrum (4 bands) using a 4-FSK modulation scheme. When a PU is detected, an SU vacates the licensed band and utilizes the remaining spectrum (2 frequency bands out of the 4 bands assumed to comprise the spectrum) using BFSK modulated signals. Different from [28], the licensed channel can change its state at any instant in a time slot. In Fig. 8, we present the average throughput of -FSK and that of an uncoded opportunistic -FSK system as a function of for where the packet size bits, = 100 packets/sec, and SNR is 4 dB. Fig. 8 illustrates that the average throughput in -FSK is constant regardless of values while the average throughput of the uncoded opportunistic -FSK decreases as increases and it matches the theoretical approximation given in (25). As shown, there exists a probability such that for the -FSK approach outperforms the uncoded opportunistic scheme in terms of throughput performance besides BER. Thus, the use of the proposed -FSK communication scheme for values of less than is not beneficial because higher throughput values are obtained using the uncoded opportunistic scheme. In other words, the -FSK system is effective for situations where the PU activity is relatively high. In practice, the throughput evaluated for the uncoded -FSK system is expected to be lower than what is shown in Fig. 8 due to channel sensing intervals. It should be noted that the proposed -FSK communication scheme does not need the channel sensing mechanism that might not be available for some applications.

Along these lines, we compare the average throughput of the proposed -FSK scheme to a rate- convolutionally coded BPSK modulated OFDM system. We assume that the latter transmits a BPSK modulated signal in parallel over the available frequency bands in a given time window similar to what is considered in the previous comparison setting. For fair comparison, neither scheme carries out sensing, i.e., they transmit at all times. It is worth noting that the throughput performance of this BPSK OFDM system is investigated assuming the same transmission bandwidth, power, and time frame as with the -FSK system. As shown in Fig. 8, the average throughput of the convolutionally coded BPSK system also decreases as increases. Similar to the previous throughput comparison, there exists a probability such that for the -FSK system outperforms the convolutionally coded BPSK scheme in terms of average SU’s throughput. Therefore, the use of the proposed -FSK communication scheme for values of less than is not beneficial because higher throughput values would be obtained using the other coded scheme.

V-C SU Link’s Resiliency in the Presence of Multiple PUs

In this section, we further carry out our performance analysis and examine the resiliency of the network (SU’s link) to interference provided by the proposed PTC based framework in the presence of multiple PUs when i) PUs always transmit and ii) PUs are dynamic and their activities vary dynamically. It is worth noting here that the PUs are located away from the SU receiver in order to analyze the quality of the SU link under a high interference scenario.

Fig. 9: Approximate BER performance of different PTCs with respect to PUs that are always ON and transmitting.
Fig. 10: Approximate BER versus Simulated BER for a PTC with and .
Fig. 11: Approximate BER performance of a PTC ( = 4) with respect to dynamically varying PUs activities and PUs that are always ON.
Fig. 12: A BER comparison between the proposed PTC scheme with and a rate (,) LDPC encoding with a -FSK modulation system with respect to static ( = 1) and dynamic ( = 0.75) activities of a PU.

V-C1 Static Channel Occupancy

First, we consider multiple PUs that are always active in the network during SU communication. In Fig. 9, we plot the approximate BER performance of the SU link for different PTCs in the presence of multiple PUs. The results obtained in the presence of multiple PUs that are always ON are similar to those presented in [19, 20]. These results show that the use of larger PTC (higher value of ) adds more robustness to SU communications, i.e., BER decreases as the value of increases. It is also shown in these results that the approximate BER performance of an SU link degrades as the number of PUs joining the network increases. Of course, this is achieved at the expense of larger overhead when larger values of are used.

V-C2 Dynamic Channel Occupancy

The case of static PUs that always transmit is more of a pessimistic scenario as presented above. In this paper, we extend the work in [19, 20] and consider a more practical scenario to model the intermittent dynamic activities of PUs in the network. Using a 2-state Markov chain to model channels’ occupancy by PUs, we provide a more accurate characterization of system performance and verify the approximate BER in the presence of a dynamically transmitting PU with simulated BER for a given PTC and known parameters of the channel occupancy model. In Fig. 10, we present the approximate BER performance of the proposed framework as a function of for different PTC schemes, i.e., , and . Both analytical and simulation results are presented which match each other quite well.

In addition, in Fig. 11, we further examine the approximate BER performance of SU communications for a given PTC, i.e., , in the presence of one, two, and three PUs that i) are static in nature and always transmit and ii) dynamic in nature. The results obtained in Fig. 11 clearly show that there exists a gap between the performance of the systems in both cases. Our analysis based on a more practical occupancy model is able to predict SU communication performance more accurately and which is better than the pessimistic case of PUs being always ON. For example, the approximate BER value in the presence of one dynamic PU is lower than when a PU is always transmitting. This is intuitive because only a fraction of the transmitted information packets are affected by interference from the dynamic PU when it is transmitting compared to the static PU case where all the transmitted information packets experience permanent interference. In fact, this is also observed for the case of 2 and 3 PUs being active in the network.

Moreover, we compare the BER performance of the proposed communication system when with another system that is based on a rate (,) LDPC encoding given in Matlab toolbox with a -FSK modulation system. Fig. 12 illustrates how the proposed communication system outperforms the aforementioned system for both static and dynamic activities of a PU.

Vi Conclusion

In this paper, we employed a PTC based framework to mitigate the impact of PUs modeled using a practical dynamic channel occupancy model in CRNs. We, further, computed the SU link’s BER approximately which was shown to be quite accurate. This approximation allows one to use BER as a QoS metric to determine the link quality of an SU link for applications such as link adaptation. Furthermore, in order to assess the effectiveness of the proposed PTC based multi-level FSK communication scheme, we compared the performance to that of an uncoded opportunistic -FSK system, a coded -FSK system, and a coded BPSK modulated system deploying parallel transmissions. Based on the comparisons described in Section V, we showed that the proposed scheme outperforms the latter two under relatively heavy PU interference. We also presented results that exhibit the resiliency of an SU link to interference for PTCs in the presence of multiple dynamic PUs activities.

In this work, we evaluated the performance of PTC codes for a single SU link. Optimal code assignments in a multiple SU scenario will be considered as a future research direction. We also plan to consider 1) more realistic channel models that account for shadowing and fading effects; and 2) more effective decoding techniques, e.g., soft-decision decoding. Based on the promising results we have obtained in a CRN, we intend to generalize the proposed scheme to tackle wireless networks subject to jamming attacks and malicious nodes’ activities.

Proof of Proposition 1

Let be the transmitted codeword and be an arbitrary received vector. Assume that is another possible codeword. If there exists a received vector such that and , then the upper-bound given in (12) is the same no matter what the transmitted codeword is ( or ). Let be a portion of generated from the corresponding th output branch of the convolutional code and be that of for the same bit positions. Since the number of non-zero elements in and is , we can assume that they occupy the following bit indices in and in , respectively. Let be the corresponding received vector of . Note that here is in the form of an arbitrary received code matrix for each output branch of the convolutional code and is mapped to a permutation trellis code matrix. Then, can be constructed from as provided below.
Define a one-to-one mapping from indices to itself as

It is easy to see that the above mapping rule switches to and vice versa. We can write and . At the same time, the mapping rule also switches with for when applied to . Then, the combination of mappings in with respect to , results in


for the one-to-one mapping conserves the Hamming distance of the convolutional code. In the case where noise for each received bit is independent, we have

and since noise of the received bits in a subchannel occupied by the PU is not independent, is not always equal to . However, if we assume that the noise caused by the PU in a subchannel will affect all bits in this channel that are generated by one or more trellis branches, then

We can reason this from the fact that bit-switching by on does not move any bit out of the row it is located in.


This material is based on research sponsored in part by CASE: The Center for Advanced Systems and Engineering, an NYSTAR center for advanced technology at Syracuse University. Part of Han’s work is supported by National Science Council, Taiwan, R.O.C., under grants NSC 101-2221-E-011 -069 -MY3 and NSC 99-2221-E-011 -158 -MY3.


  • [1] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.
  • [2] Q. Zhao and A. Swami, “A decision-theoretic framework for opportunistic spectrum access,” IEEE Trans. Wireless Comm., vol. 14, no. 4, pp. 14–20, Aug. 2007.
  • [3] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas in Comm., vol. 23, no. 2, pp. 201–220, Feb. 2005.
  • [4] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Personal Comm., vol. 6, no. 4, pp. 13–18, Aug. 1999.
  • [5] Y.-S. Kwon, H.-S. Kim, J.-H. Yoo, and J.-H. Chung, “A non-interfering cognitive radio system for spectrum sharing,” in Proc. Int. Symp. on Comm. and Information Technology, Sep. 2009, pp. 664–665.
  • [6] Y. Wu and Z. Yang, “Spectrum sharing under interference temperature and SINR constraints,” in Proc. Int. Conf. on Wireless Comm., Networking and Mobile Computing, Oct. 2008, pp. 1–4.
  • [7] Federal Communications Commission, “Establishment of interference temperature metric to quantify and manage interference and to expand available unlicensed operation in certain fixed mobile and satellite frequency bands,” Et Docket 03-289, Notice of Inquiry and Proposed Rulemaking, 2003.
  • [8] T. C. Clancy, “Formalizing the interference temperature model,” Wiley J. on Wireless Comm. and Mobile Computing, vol. 7, no. 9, pp. 1077–1086, Nov. 2007.
  • [9] H. Mahmoud, T. Yucek, and H. Arslan, “OFDM for cognitive radio: merits and challenges,” IEEE Trans. Wireless Comm., vol. 16, no. 2, pp. 6–15, Apr. 2009.
  • [10] F. Shayegh and M. R. Soleymani, “Rateless codes for cognitive radio in a virtual unlicensed spectrum,” in Proc. IEEE Sarnoff Symp., May 2011, pp. 1–5.
  • [11] G. Yue and X. Wang, “Anti-jamming coding techniques with application to cognitive radio,” IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5996–6007, Dec. 2009.
  • [12] J. Ko and C. Kim, “Communication method between spectrum heterogeneous secondary users in OFDM-based cognitive radio,” Electronics Letters, vol. 47, no. 14, pp. 827–829, Jul. 2011.
  • [13] C. Nicola, H. Mercier, and V. K. Bhargava, “Error-correcting codes for dynamic spectrum allocation in cognitive radio systems,” in Proc. Int. Symp. on Signals, Syst. and Electron., Aug. 2007, pp. 247–250.
  • [14] S. Wang, Y. Wang, J. P. Coon, and A. Doufexi, “Energy-efficient spectrum sensing and access for cognitive radio networks,” IEEE Trans. Veh. Technol., vol. 61, no. 2, pp. 906–912, Feb. 2012.
  • [15] G. Ozcan and M. C. Gursoy, “Throughput of cognitive radio systems with finite blocklength codes,” in Proc. IEEE Annual Conf. on Inf. Sciences and Systems (CISS), Mar. 2012, pp. 1–6.
  • [16] Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, “Sensing-throughput tradeoff for cognitive radio networks,” IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1326–1337, Apr. 2008.
  • [17] B. Shahrasbi and N. Rahnavard, “Rateless-coding-based cooperative cognitive radio networks: Design and analysis,” in Proc. Annual IEEE on Comm. Society Conf. on Sensor, Mesh and Ad Hoc Comm. and Networking (SECON), June 2011, pp. 224–232.
  • [18] W.-C. Ao and K.-C. Chen, “End-to-end HARQ in cognitive radio networks,” in Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Apr. 2010, pp. 1–6.
  • [19] H. C. Ferreira, A. J. H. Vinck, T. G. Swart, and I. De Beer, “Permutation trellis codes,” IEEE Trans. Communications, vol. 53, no. 11, pp. 1782–1789, Nov. 2005.
  • [20] T. G. Swart, I. De Beer, H. C. Ferreira, and A. J. H. Vinck, “Simulation results for permutation trellis codes using M-ary FSK,” in Proc. Int. Symp. on Power Line Comm. and its Applications, Apr. 2005, pp. 317–321.
  • [21] R. El Bardan, E. Masazade, O. Ozdemir, and P. K. Varshney, “Performance of permutation trellis codes in cognitive radio networks,” in Proc. IEEE Sarnoff Symp., May 2012, pp. 1–6.
  • [22] A. Goldsmith, Wireless Communications.   New York, NY, USA: Cambridge University Press, 2005.
  • [23] M. Elalem, L. Zhao, and Z. Liao, “Interference mitigation using power control in cognitive radio networks,” in Proc. IEEE Vehicular Tech. Conf., May 2010.
  • [24] J. G. Proakis, Digital Communications.   McGraw -Hill, 2000.
  • [25] S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications.   Prentice-Hall, 1983.
  • [26] M. K. Simon, Probability Distributions Involving Gaussian Random Variables: A Handbook for Engineers, Scientists and Mathematicians.   Springer-Verlag New York, 2006.
  • [27] C. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. J. Shellhammer, and W. Caldwell, “IEEE 802.22: The first cognitive radio wireless regional area network standard,” IEEE Comm. Mag., vol. 47, no. 1, pp. 130–138, Jan. 2009.
  • [28] Q. Zhao, B. Krishnamachari, and K. Liu, “On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance,” IEEE Trans. Wireless Comm., vol. 7, no. 12, pp. 5431–5440, Dec. 2008.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description