Ad Hoc Networks - Auburn University

12
On co-channel and adjacent channel interference mitigation in cognitive radio networks q Donglin Hu, Shiwen Mao Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201, USA article info Article history: Received 19 December 2011 Received in revised form 17 February 2013 Accepted 24 February 2013 Available online 15 March 2013 Keywords: Adjacent channel interference Cognitive radio networks Cross-layer optimization Distributed algorithm Dynamic spectrum access Interference mitigation Spectrum sensing abstract Cognitive radio (CR) is an emerging wireless communications paradigm of sharing spec- trum among licensed (or, primary) and unlicensed (or, CR) users. In CR networks, interfer- ence mitigation is crucial not only for primary user protection, but also for the quality of service of CR user themselves. In this paper, we consider the problem of interference mit- igation via channel assignment and power allocation for CR users. A cross-layer optimiza- tion framework for minimizing both co-channel and adjacent channel interference is developed; the latter has been shown to have considerable impact in practical systems. Cooperative spectrum sensing, opportunistic spectrum access, channel assignment, and power allocation are considered in the problem formulation. We propose a reformula- tion–linearization technique (RLT) based centralized algorithm, as well as a distributed greedy algorithm that uses local information for near-optimal solutions. Both algorithms are evaluated with simulations and are shown quite effective for mitigating both types of interference and achieving high CR network capacity. Ó 2013 Elsevier B.V. All rights reserved. 1. Introduction A cognitive radio (CR) is a frequency-agile wireless communication device that can sense the radio environ- ment and dynamically reconfigure its radio parameter and behavior to adapt to changes in the radio environment. CR represents a paradigm change in spectrum regulation and sharing. Its high potential has attracted substantial interest from industry, academia, and policy makers. Con- siderable CR research has been focused on developing effective spectrum sensing and access techniques, two core components of a CR system (e.g., see [2,3]). FCC has re- cently issued rules and guidelines for unlicensed opera- tions in the TV bands that require a combination of device geo-location and database lookup for channel ac- cess [4]. Although the basic concept of CR is intuitive, there exist numerous challenging problems to be solved to fully har- vest its potential. To support many bandwidth-intensive applications in CR networks, it is desirable to achieve high network throughput under the constraint of limited inter- ference to primary users. Due to the use of open space as transmission medium, wireless network capacity is usually constrained by interference. A CR user’s transmission will generate interference not only to the neighboring primary users, but also to other CR users sharing the same or adja- cent channels. Therefore, interference mitigation is crucial not only for primary user protection, but also for the qual- ity of service of CR user themselves. Effective interference mitigation techniques are indispensable to realize the high potential of CRs. Generally, there are two types of interference that should be considered in such multi-channel environment. The first type, co-channel interference (CCI), is due to the coexisting transmitters occupying the same band as the 1570-8705/$ - see front matter Ó 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.adhoc.2013.02.009 q This paper was presented in part at IEEE MILCOM 2011, Baltimore, MD, USA, November 7–10, 2011 [1]. Corresponding author. E-mail addresses: [email protected] (D. Hu), [email protected] (S. Mao). Ad Hoc Networks 11 (2013) 1629–1640 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc

Transcript of Ad Hoc Networks - Auburn University

Ad Hoc Networks 11 (2013) 1629–1640

Contents lists available at SciVerse ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

On co-channel and adjacent channel interference mitigationin cognitive radio networks q

1570-8705/$ - see front matter � 2013 Elsevier B.V. All rights reserved.http://dx.doi.org/10.1016/j.adhoc.2013.02.009

q This paper was presented in part at IEEE MILCOM 2011, Baltimore,MD, USA, November 7–10, 2011 [1].⇑ Corresponding author.

E-mail addresses: [email protected] (D. Hu),[email protected] (S. Mao).

Donglin Hu, Shiwen Mao ⇑Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201, USA

a r t i c l e i n f o

Article history:Received 19 December 2011Received in revised form 17 February 2013Accepted 24 February 2013Available online 15 March 2013

Keywords:Adjacent channel interferenceCognitive radio networksCross-layer optimizationDistributed algorithmDynamic spectrum accessInterference mitigationSpectrum sensing

a b s t r a c t

Cognitive radio (CR) is an emerging wireless communications paradigm of sharing spec-trum among licensed (or, primary) and unlicensed (or, CR) users. In CR networks, interfer-ence mitigation is crucial not only for primary user protection, but also for the quality ofservice of CR user themselves. In this paper, we consider the problem of interference mit-igation via channel assignment and power allocation for CR users. A cross-layer optimiza-tion framework for minimizing both co-channel and adjacent channel interference isdeveloped; the latter has been shown to have considerable impact in practical systems.Cooperative spectrum sensing, opportunistic spectrum access, channel assignment, andpower allocation are considered in the problem formulation. We propose a reformula-tion–linearization technique (RLT) based centralized algorithm, as well as a distributedgreedy algorithm that uses local information for near-optimal solutions. Both algorithmsare evaluated with simulations and are shown quite effective for mitigating both typesof interference and achieving high CR network capacity.

� 2013 Elsevier B.V. All rights reserved.

1. Introduction

A cognitive radio (CR) is a frequency-agile wirelesscommunication device that can sense the radio environ-ment and dynamically reconfigure its radio parameterand behavior to adapt to changes in the radio environment.CR represents a paradigm change in spectrum regulationand sharing. Its high potential has attracted substantialinterest from industry, academia, and policy makers. Con-siderable CR research has been focused on developingeffective spectrum sensing and access techniques, two corecomponents of a CR system (e.g., see [2,3]). FCC has re-cently issued rules and guidelines for unlicensed opera-tions in the TV bands that require a combination of

device geo-location and database lookup for channel ac-cess [4].

Although the basic concept of CR is intuitive, there existnumerous challenging problems to be solved to fully har-vest its potential. To support many bandwidth-intensiveapplications in CR networks, it is desirable to achieve highnetwork throughput under the constraint of limited inter-ference to primary users. Due to the use of open space astransmission medium, wireless network capacity is usuallyconstrained by interference. A CR user’s transmission willgenerate interference not only to the neighboring primaryusers, but also to other CR users sharing the same or adja-cent channels. Therefore, interference mitigation is crucialnot only for primary user protection, but also for the qual-ity of service of CR user themselves. Effective interferencemitigation techniques are indispensable to realize the highpotential of CRs.

Generally, there are two types of interference thatshould be considered in such multi-channel environment.The first type, co-channel interference (CCI), is due to thecoexisting transmitters occupying the same band as the

1630 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

victim receiver. A widely used approach for CCI mitigationis to assign different channels to the interfering transmit-ters near the victim receiver [5–7]. The second type is adja-cent channel interference (ACI), which is in the form ofpower leakage from adjacent channels. ACI is mainly dueto imperfect design of transmit filters and amplifiers. Theharmful impact of ACI on network throughput was demon-strated in a recent work [8]. ACI can also be mitigated byappropriate channel allocation and power control. Bothtypes of interference should be considered in the designof CR network protocols.

In this paper, we consider a CR network consisting ofmultiple CR transmitter receiver pairs. The primary net-work comprises a base station sending data to primaryusers using a set of licensed channels. The CR nodes collab-oratively sense the licensed channels and exploit spectrumopportunities for data transmission. We investigate theproblem of maximizing the CR network throughput whilebounding the interference to primary users. We incorpo-rate several important components such as cooperativespectrum sensing, spectrum sensing errors, and opportu-nistic spectrum access into the cross-layer optimizationframework. In the problem formulation, we specificallyconsider mitigating CCI among CR users and ACI for bothCR and primary users, through optimized channel assign-ment and transmit power control for CR users.

The formulated problem is a Mixed Integer NonlinearProgramming (MINLP) problem, due to the use of indexvariables for channel assignment and logarithmic relation-ship between link capacity and signal to noise ratio (SNR).Such problems are NP-hard in general. We first propose areformulation–linearization technique (RLT)-based cen-tralized algorithm that computes near-optimal solutionsin polynomial time [9]. We then develop a distributedgreedy algorithm that uses only local information andcomputes near-optimal solutions. Through simulationstudies, we find the distributed greedy algorithm outper-forms both the RLT-based centralized algorithm and a heu-ristic channel assignment algorithm that exploitsmultiuser diversity with considerable gains.

The remainder of this paper is organized as follows. Wedescribe the system model and preliminaries in Section 2.We present the problem formulation and develop the central-ized and distributed algorithms in Section 3. Our simulationstudies are shown in Section 4 and related work is discussedin Section 5. Section 6 concludes the paper. Throughout thepaper, a symbol with a super-script ‘‘+’’ means a parameterrelated to the adjacent channel with a higher index; a symbolwith a super-script ‘‘�’’ means a parameter related to theadjacent channel with a lower index.

2. System model and preliminaries

2.1. Primary and CR network model

As shown in Fig. 1, we consider a primary networkwhere a base station transmits data to primary users usingM licensed channels with non-overlapping spectrum.Without loss of generality, we assume the channels haveidentical bandwidth. We assume that each primary user

is equipped with one transceiver and can communicatewith the primary base station via one of the licensed chan-nels. Let Pm be the subset of primary users that are tunedto channel m. All the Pm’s are generally assumed non-empty.

As in prior work [2,10], we assume that the primarynetwork uses a synchronous time slot structure. The occu-pancy of each channel can be modeled as a discrete-timeMarkov process. The status of channel m in time slot t isdenoted by SmðtÞ: when the channel is idle, we haveSmðtÞ ¼ 0; when the channel is busy, we have SmðtÞ ¼ 1.Let P01

m and P10m be the transition probability from state 0

to 1 and that from state 1 to 0 for channel m, respectively.The utilization of channel m with respect to primary usertransmission, denoted by gm, can be written as

gm ¼ PrfSmðtÞ ¼ 1g ¼ limT!1

1T

XT

t¼1

SmðtÞ ¼P01

m

P01m þ P10

m

: ð1Þ

Within the coverage of the primary network, there are Kpairs of cognitive radio (CR) transmitters and receivers thatexplore the spectrum opportunities in the M licensed chan-nels for data communications. Each CR node is equippedwith two transceivers: a control transceiver that operateson a dedicated control channel (which we assume is reli-able as in prior work [2,10]), and a data transceiver incorpo-rating a software defined radio (SDR) that is able to tune toany of the M licensed channels.

CR nodes access the licensed channels following thesame time slot structure as in the primary network. ForCR nodes, each time slot consists of a sensing phase anda transmission phase. In the sensing phase, a CR nodechooses one of the M channels to sense using its data trans-ceiver, and then exchanges the sensed channel informationwith other CR nodes using its control transceiver over thecontrol channel. During the transmission phase, the CRnode tunes its data transceiver to one of the M channelsto transmit or receive data based on sensing results.

2.2. Cooperative spectrum sensing

We adopt a hypothesis test to detect the availability ofeach licensed channel. The null hypothesis and the alterna-tive hypothesis are:

Hm0 : channel m isidle

Hm1 : channel m isbusy:

(ð2Þ

During the sensing phase, the CR nodes exchange theirsensing results through the control channel. For the nthsensing result on channel m, we consider both types ofsensing errors, i.e., false alarm with probability �m

n and missdetection with probability dm

n , respectively. It has beenshown that these sensing errors are inevitable and shouldbe considered in CR networking protocol design [2,5]. Wethan have

�mn ¼ PrðHm

n ¼ 1jHm0 Þ

dmn ¼ PrðHm

n ¼ 0jHm1 Þ;

(ð3Þ

where Hmn is the nth sensing result on channel m. Given N

sensing results on channel m, the conditional probability

Primary basestation

Primary receiver

CR transmitter

CR receiver

Fig. 1. The primary and CR network model.

D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640 1631

that channel m is available, denoted by PAmðH

m1 ; � � � ;H

mN Þ,

can be computed as [6]:

PAmðH

m1 ; � � � ;H

mN Þ ¼ 1þ gm

1� gm

YNn¼1

ðdmn Þ

1�Hmn ð1� dm

n ÞHm

n

ð�mn Þ

Hmn ð1� �m

n Þ1�Hm

n

" #�1

:

ð4Þ

When one or more sensing results are received at a CRnode, let the sensing result vector be ~Hm

n ¼ ½Hm1 ; � � � ;H

mn �

for the n received sensing results on channel m. The condi-tional channel availability probability can be computediteratively as follows.

PAmðH

m1 Þ ¼ 1þ gm

1� gm� ðd

m1 Þ

1�Hm1 ð1� dm

1 ÞHm

1

ð�m1 Þ

Hm1 ð1� �m

1 Þ1�Hm

1

" #�1

ð5Þ

PAmð~Hm

n Þ ¼ PAmðH

m1 ;H

m2 ; � � � ;H

mn Þ

¼ 1þ 1PA

mðHm1 ;H

m2 ; � � � ;H

mn�1Þ� 1

" #� ðd

mn Þ

1�Hmn ð1� dm

n ÞHm

n

ð�mn Þ

Hmn ð1� �m

n Þ1�Hm

n

( )�1

;

n ¼ 2; � � � ;N: ð6Þ

2.3. Opportunistic channel access

Let DmðtÞ be a decision variable indicating whetherchannel m will be accessed in time slot t. It is defined as

DmðtÞ ¼0; if channel m is considered idle1; otherwise

�for m ¼ f1;2; � � � ;Mg:

ð7Þ

Based on the spectrum sensing result PAmð~Hm

N Þ, channelm will be accessed (i.e., when DmðtÞ ¼ 0) with probabilityPD

mð~HmN Þ, and it will not be accessed (i.e., when DmðtÞ ¼ 1)

with probability 1� PDmð~Hm

N Þ. We show how to computePD

mð~HmN Þ in the following.

For primary user protection, the probability that a CRtransmission collides with primary user transmissionsshould be smaller with a threshold prescribed by the pri-mary network, denoted by cm for channel m. The primaryuser protection condition can be written as

1� PAmð~Hm

N Þh i

PDmð~Hm

N Þ 6 cm: ð8Þ

To maximize the CR network throughput, PDmð~Hm

N Þshould be set to a probability as large as possible, as al-lowed by the maximum collision rate constraint. We havefrom (8)

PDmð~Hm

N Þ ¼mincm

1� PAmð~Hm

N Þ;1

( ): ð9Þ

Let AðtÞ :¼ fmjDmðtÞ ¼ 0g be the subset of channels thatare identified to be idle in time slot t. Then its complementset AðtÞ is the subset of channels that are believed to bebusy in time slot t (i.e., being used by primary users). Wenext investigate how to effectively assign the channels inAðtÞ to the CR transmitters and how to choose transmitpower for the CR transmitters, such that the CR networkthroughput is maximized under both interference and col-lision rate constraints.

2.4. Channel interference model

We consider Co-channel interference (CCI) among CRusers sharing the same licensed channel and Adjacent chan-nel interference (ACI) for both CR and primary users in thispaper. The CCI and ACI models are presented in thefollowing.

2.4.1. Co-channel interferenceCCI is caused by the CR user transmissions sharing the

same channel as the victim receiver. Before introducingthe interference model, we define index variables xm

k indi-cating the channel assignment for the CR links as follows:

xmk ¼

1; if channel m is used by CR linkk

0; otherwise;

�m ¼ 1; � � � ;M; k ¼ 1; � � � ;K:

ð10Þ

Let T k and Rk be the transmitter and receiver of CR linkk, respectively. The CCI at CR receiver k on channel m, de-noted by Cm

k , is

1632 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

Cmk ¼

Xi2U;i–k

GmT i ;Rk

Pmi xm

i

¼Xi2U

GmT i ;Rk

Pmi xm

i � GmT k ;T k

Pmk xm

k ; ð11Þ

where GmT i ;Rk

is the channel gain from CR transmitter i to CRreceiver k on channel m; Pm

i is the transmit power of CRtransmitter i on channel m, and U :¼ f1;2; � � � ;Kg is theset of transmitter/receiver pairs in the CR network.

2.4.2. Adjacent channel interferenceIn addition to CCI, a CR receiver may also be interfered

by transmissions on an adjacent channel, when the chan-nels are not strictly orthogonal. The interferer could beeither a CR transmitter or a primary transmitter (e.g., theprimary base station) on the adjacent channel. Such ACIis shown to be harmful with testbed experiments in a re-cent work [8].

Due to the imperfect design of band-pass filters, a por-tion of the power on the adjacent channel may leak to thechannel being used by CR users. Such leakage is also con-sidered as noise. For ease of explanation, we only considerthe ACI from a direct neighboring channel in this paper. Letbþm be the ratio of leakage power from channel (m + 1) to m,and b�m the ratio of leakage power from channel (m � 1) tom. We term these leakage power ratios ACI factor, whichdepends on the spectral properties, such as inter-channeldistance and channel width, and band-pass filter design.

For a channel m, if its adjacent channel (m + 1) is idle,then the ACI is due to the concurrent CR transmissionson channel (m + 1). We have

ACþm;k ¼ ½1� Dmþ1ðtÞ�bþmX

i2U;i–k

Gmþ1T i ;Rk

Pmþ1i xmþ1

i

¼ ½1� Dmþ1ðtÞ�bþmCmþ1k : ð12Þ

Alternatively, if the adjacent channel (m + 1) is busy,then the ACI is caused by a primary transmission on chan-nel (m + 1). We have

APþm;k ¼ Dmþ1ðtÞbþmGmþ10;Rk

Q mþ1; ð13Þ

where Gmþ10;Rk

is the channel gain from the primary transmitterto CR receiver k on channel (m + 1), and Qmþ1 is the transmitpower of the primary transmitter on channel (m + 1).

Similarly, ACI on channel m may also come from theadjacent channel on the other side, i.e., channel (m � 1).We define AC�m;k and AP�m;k as the interference due to CRtransmission and primary transmission on channel m� 1,respectively. These can be computed as

AC�m;k ¼ ½1� Dm�1ðtÞ�b�mCm�1k ð14Þ

AP�m;k ¼ Dm�1ðtÞb�mGm�10;Rk

Q m�1: ð15Þ

The total ACI on channel m from its two adjacent chan-nels can be written as

Amk ¼ ACþm;k þ APþm;k þ AC�m;k þ AP�m;k: ð16Þ

Without loss of generality, we assume AC�1;k;AP�1;k;ACþM;k

and APþM;k are all zero for channels 1 and M. This is becausethe adjacent channels 0 and (M + 1) are used by neitherprimary nor CR users.

On the other hand, primary users may also be interferedby CR users transmitting on an adjacent channel. If channelm is used by primary user j and channel (m + 1) is availablefor CR user access, the ACI received by the primary user is

BCþm;j ¼ ½1� Dmþ1ðtÞ�bþmXi2U

Gmþ1T i ;j

Pmþ1i xmþ1

i : ð17Þ

The ACI received by the primary user from CR transmis-sions on channel (m � 1) is

BC�m;j ¼ ½1� Dm�1ðtÞ�b�mXi2U

Gm�1T i ;j

Pm�1i xm�1

i : ð18Þ

Considering ACI from both sides of channel m, the totalACI at a primary receiver can be written as:

Bmj ¼ BCþm;j þ BC�m;j: ð19Þ

Again, we assume BC�1;j and BCþM;j are zero for the twoborder channels 1 and M.

3. Channel selection and power allocation

3.1. Problem statement

At each cognitive radio (CR) receiver, both types ofinterference from co-channel and adjacent channels aretreated as noise. Let tm

k be the SNR at CR receiver k on chan-nel m. Then tm

k can be written as

tmk ¼

GmT k ;Rk

Pmk xm

k

N0 þ Cmk þ Am

k

; ð20Þ

where N0 is the channel noise power. The objective is tomaximize the capacity of the CR network as approximatedby Shannon capacity. Without loss of generality, we as-sume that each channel has unit bandwidth. The objectivefunction becomes

maxPm

k ;xmk

Xk2U

Xm2AðtÞ

log2ð1þ tmk Þ: ð21Þ

Since each CR user is able to access one channel in eachtime slot, we have the following channel access constraint.Xm2AðtÞ

xmk 6 1; for all k 2 U: ð22Þ

Furthermore, each CR transmitter is limited by a peakpower constraint. That isXm2AðtÞ

Pmk xm

k 6 C; for all k 2 U: ð23Þ

As discussed, the interference from CR transmissions toprimary users should be bounded. Recall that AðtÞ is theset of busy channels and Pm is the set of primary usersusing channel m. Letting the ACI bound be X, we have

Bmj 6 X; for all m 2 AðtÞ; j 2 Pm: ð24Þ

Problem (21) with constraints (22)–(24) maximizes theCR network capacity while bounding the total interference(i.e., both common channel interference (CCI) and adjacentchannel interference (ACI)) to primary users. Note that themaximum collision rate constraint caused by CR transmis-sions (8) is satisfied by choosing the channel m access

0

Fig. 2. The polyhedral outer approximation of a logarithm functiony ¼ log2ðxÞ in x0 6 x 6 x3.

1 It is easy to see that the three-point tangential approximation is theminimum requirement (i.e., L P 2) to bound a logarithm curve with theresulting polygon. Usually, a larger L provides a tighter polygon and thusachieves a smaller gap between the upper and lower bounds. However, alarger L will introduce more linear constraints (see Eq. (29)) for eachlogarithm term and increases the computational complexity. So there isactually a tradeoff here. In our prior work [9], we show that this approachcan be incorporated into the branch-and-bound algorithm to iterativelytighten the approximation, but at a higher computational complexity. Inour numerical studies, and also according to our previous experience withthis technique, L = 3 is sufficient for good results.

D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640 1633

probability PDmð~Hm

N Þ as in (9). Based on spectrum sensing re-sults, we need to determine channel access (as given by thexm

k ’s) as well transmit powers (as given by the Pmk ’s) for CR

users. This is an MINLP problem, which is NP-hard in gen-eral and cannot be solved exactly in polynomial time. Forthis problem, we first describe below how to derive upperand lower bounds with a centralized algorithm, and thenpresent a distributed algorithm that decomposes Problem(21) into a channel assignment subproblem and a powerallocations subproblem in the next section.

3.2. Centralized Algorithm and Performance Bounds

In this section, we first obtain an upper bound by relax-ing the problem with RLT [9]. The lower bound is thencomputed with a sequential fixing (SF) algorithm [11,12].To obtain a linear relaxation of the MINLP problem, wefirst allow the binary variables xm

k to take real values in[0,1]. Second, the product term Pm

k xmk is replaced by a

substitution variable /mk ¼ Pm

k xmk . Since 0 6 Pm

k 6 C and0 6 xm

k 6 1, we derive the following RLT bound-factor prod-uct constraints.

ðPmk � 0Þðxm

k � 0ÞP 0

ðPmk � 0Þð1� xm

k ÞP 0

ðC� Pmk Þðxm

k � 0ÞP 0

ðC� Pmk Þð1� xm

k ÞP 0

8>>>>>><>>>>>>:

ð25Þ

Rearranging the terms, we have

/mk P 0

Pmk � /m

k P 0

Cxmk � /m

k P 0

Pmk þ Cxm

k � /mk 6 C:

8>>>>>><>>>>>>:

ð26Þ

Finally, the logarithm term log2ð1þ tmk Þ in the objective

function can be decomposed into the difference betweentwo logarithm terms, denoted by ym

k and zmk , respectively,

as follows.

log2ð1þ tmk Þ ¼ log2ðN0 þ Cm

k þ Amk þ Gm

T k ;RkPm

k xmk Þ

� log2ðN0 þ Cmk þ Am

k Þ¼ ym

k � zmk ; ð27Þ

where ymk :¼ log2ðN0 þ Cm

k þ Amk þ Gm

T k ;RkPm

k xmk Þ and

zmk :¼ log2ðN0 þ Cm

k þ Amk Þ. For a general logarithm term

log2ðxÞ, we can linearize it over some tightly bounded re-gions with a polyhedral outer approximation. For example,if x is bounded by x0 6 x 6 xL, we can determine L evenlyspaced points as

xl ¼ x0 þlLðxL � x0Þ; gfor l ¼ 0;1; ; L: ð28Þ

Then the logarithmic function y ¼ log2ðxÞ can be substi-tuted with the following linear constraints.

y P log2ðxLÞ�log2ðx0ÞxL�x0

ðx� x0Þ þ log2ðx0Þ

y 6 1lnð2Þxl

ðx� xlÞ þ log2ðxlÞ; for l ¼ 0; � � � ; L:

8<: ð29Þ

In this paper, we use a four-point (i.e., L = 3) tangentialapproximation.1 The upper and lower bound of ym

k and zmk

can be obtained by letting /mk be 0 and C, respectively. The

five linear constraints given in (29) that form the polyhedralouter approximation are plotted in Fig. 2.

With the above three-step relaxations, we thus obtaina linear programming (LP) relaxation for Problem (21).Solving the LP relaxation with an LP solver, we can ob-tain a possibly infeasible solution due to the relaxations,which can serve as an upper bound for the originalproblem.

We next present a sequential fixing (SF) Algorithm inAlgorithm 1 for deriving a feasible near-optimal solution.In Steps 3–9, the variable xm0

k0 that is closest to 0 or 1 ischosen and rounded to the nearest binary integer. Oncexm0

k0 is fixed to 1, all the other variables xmk0 with the same

subscript k0 are fixed to 0, due to constraint (22). Thenthe problem can be reformulated with a reduced size,and solved again iteratively, until all the binary variablesxm

k ’s are fixed. In Step 16, the transmit powers Pmk ’s are

derived when the channel assignment is determined.Note that here we still need to formulate and solve anLP relaxation with respect to the logarithmic terms, sinceeven when the binary variables are fixed, the problem isstill non-convex. Finally, in Step 17, we substitute thenear-optimal feasible solution into the original objectivefunction (21) to obtain a lower bound for the globaloptimum.

1634 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

Generally, solving such an LP relaxation may producean infeasible solution to the original problem due to therelaxations; a local search algorithm is then needed to finda feasible solution in the neighborhood. However, localsearch is not necessary in our problem. First, the SF algo-rithm determines binary values for all the xm

k ’s, such thatconstraint (10) is satisfied. Second, from the RLT bound-factor product constraints (26), we have that /m

k ¼ Pmk

when xmk ¼ 1; and /m

k ¼ 0 when xmk ¼ 0. Once all the xm

k ’sare set to binary values, by replacing /m

k with Pmk or 0, the

linear inequality constraints now only contain the Pmk ’s. Fi-

nally, although we use the polyhedral outer approximationfor the logarithmic terms, these terms are all in the objec-tive function (21). It is easy to show that the feasible solu-tions of the relaxed LP problem is a subset of the feasiblesolution of the original problem, since the constraints ofthe original problem is a subset of those of the relaxed LPproblem. Therefore, a feasible problem to the LP relaxationis also feasible to the original problem. We only need tosubstitute the feasible solution into the original objectivefunction (21) to obtain the corresponding objective value,which is a lower bound for the original problem.

In our simulations, we find the upper bound quite loose,but the lower bound is reasonably tight. The average-casetime complexity of the simplex method, a popular LP solv-ing algorithm, is Oðn log nÞ for a problem with size n [13].Thus the computational complexity of one iteration in SFis OðMK logðMKÞÞ. Since the number of iterations in SF isMK in the worst case, the overall average-case computa-tional complexity of SF is OðM2K2 logðMKÞÞ.

It is also worth noting that the centralized scheme ismainly used as a benchmark for comparison purpose. InSection 4, we compare the centralized scheme with theproposed distributed algorithm (see Section 3.3) to vali-date the performance of the latter. We assume a dedicatedcontrol channel and all the channel information are cor-

rectly delivered when executing the centralized algorithm.In a real deployment, the control channel may introduceerrors and the performance of the centralized algorithmmay be worse.

3.3. Distributed algorithm

3.3.1. Distributed algorithmAlthough the SF algorithm in Algorithm 1 can compute a

near-optimal solution in polynomial time, it is a centralizedalgorithm that needs to know all the channel gains. In thissection, we present a distributed greedy algorithm for solvingProblem (21). With this algorithm, each CR transmitter esti-mates channel gains from itself to primary users and all otherCR receivers, and each CR receiver estimates channel gainsfrom the primary base station and all other CR transmitters.

The distributed algorithm consists of two tiers: (i) theupper tier is a channel assignment algorithm, which decideswhich channel to access for a CR transmitter, and (ii) thelow tier is a power allocation algorithm, which decides howmuch power can be allocated to transmit on each availablechannel. In the channel assignment algorithm, we assumethat the transmit powers have already been allocated to eachavailable channel; the power allocation, denoted by an M � Kvector ~P, can be obtained from the power allocation algo-rithm. Define the capacity of CR link k if it uses channel m as

Umk ¼ log2ð1þ tm

k Þ: ð30Þ

Then in each loop, the channel with the lowest Umk ð~PÞ is re-

moved from the available channel set AkðtÞ and the corre-sponding xm

k is set to 0, until only one available channel is left.The complete channel assignment algorithm is pre-

sented in Algorithm 2. With the algorithm, initially we as-sume CR transmitter k uses all the channels in AðtÞ in Step1. Then in Steps 2–6, we iteratively remove the channelswith the minimum capacity gain, until only one channelis left. Finally, the transmit power is determined for thechosen channel in Step 7. The loop (i.e., Steps 2–6) in thechannel allocation algorithm is executed at most M timesin the worst case, where M is the number of channels.

In the power allocation algorithm, the main idea is to

iteratively allocate a small amount of power D to the CRlink that can achieve the largest increase in (21). The algo-rithm is presented in Algorithm 3. Let ~Dm

k be a vector whoseðk� 1Þ �M þm½ �th element is D and all other elements are

0, indicating that power D is allocated to CR link k on

Fig. 3. An example of the distributed algorithm operation with two CRusers.

D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640 1635

channel m. Obviously, if CR link k is allocated with theadditional power D, the throughput of this CR link will in-crease; if another CR link k0 – k is allocated with the addi-tional power D, the throughput of CR link k will decrease.The increase and decrease of the throughput of the CR linkare defined as:

� Emk : the throughput increase for CR link k on channel m if

it gets the additional power D� Cm

k0 ;k: the throughput decrease for CR link k if another CRlink k0 – k on channel m wins the additional power allo-cation D.

In Steps 3–8, we calculate Emk , but set it to 0 if either (23)

or(24) is not satisfied. In Steps 11–12, the net throughputgains of all the possible power allocations are evaluated andthe combination with the largest profit is selected. Weassume the control information (i.e., Em

k and Cmk0 ;k) are broad-

cast over orthogonal sub-channels, which means all CR usersare able to broadcast the information simultaneously. In Steps13–15, the CR link with the largest positive profit wins theadditional power allocation D, if its profit is positive. Other-wise, the power allocation algorithm is terminated with solu-tion ~P, because no further power allocation can improve thetotal throughput. The loop (i.e., Steps 3–16) in the power allo-cation algorithm is executed at most C=D times in the worstcase (recall that C is the peak power constraint). Since theoverall distributed algorithm is a greedy algorithm, it willstop within a finite number of steps.

3.3.2. A simple example

To better explain the distributed algorithm, consider a

simple example with two CR users 1 and 2. As shown inFig. 3, for each channel m, CR transmitter 1 calculates Em

1

and Cm2;1 and CR transmitter 2 calculates Em

2 and Cm1;2. The

two nodes then broadcast the values to each other. Oncea node receives the throughput decrease (i.e., C) from theother node, it calculates its gain F as shown in the figure.The power unit D is allocated to the node with the largerFm

k in this iteration. This power allocation algorithm is ter-minated if both Fm

k from the two nodes are non-positive.Once the power allocation algorithm is terminated, thechannel with the lowest Um

k ð~PÞ is removed from the avail-able channel set AkðtÞ, until only one available channel isleft, as given in Algorithm 2.

With the distributed algorithm, the computationalcomplexity is quite low since each node just makes somesimple update of the three variables in each iteration, asshown in Algorithm 3.

4. Performance evaluation

4.1. Simulation methodology

As can be seen in the problem statement, the problemaddressed in this paper is a Mixed Integer Nonlinear Pro-gramming (MINLP) problem, which is NP-hard. For sucha complex problem, the main contribution of this paperis to develop algorithms that can provide highly competi-tive solutions. Since generally an efficient analysis isnot feasible for this problem, we validate the performanceof the proposed algorithms by comparisons with upperand lower bounds and alternative approaches withsimulations.

For the results reported in this section, there are M = 6licensed channels (unless otherwise specified) with identi-cal transition probabilities P01

m ¼ 0:4 and P10m ¼ 0:3 for all m.

The maximum collision probability with primary users iscm ¼ 0:2 for all m. The transmit power of primary base sta-tion is 30 dBm and the maximum acceptable interferencefor the primary users is X ¼ 10 dBm. There are K = 6 trans-mitter and receiver pairs in the CR network. The power ofCR transmitter is limited to Cm ¼ 27 dBm for all m. Thefalse alarm probability is �m

n ¼ 0:3 and the miss detectionprobability is dm

n ¼ 0:3 for all m and n, unless otherwise

1636 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

specified. Rayleigh block fading channels are used in thesimulations.

We consider four types of results:

� The upper bound obtained by solving the RLT relaxationas presented in Section 3.2.� The centralized sequential fixing (SF) algorithm solution

given in Algorithm 1 (a lower bound).� The distributed greedy algorithm given in Algorithms 2

and 3.� A simple centralized heuristic algorithm, where each CR

transmitter chooses the best available channel to accessto exploit diversity gain. When the channels areassigned and all the xm

k ’s are fixed, it then solves thesimplified problem (21) with MATLAB OptimizationToolbox to find a near-optimal power allocation.

We run each simulation for 10 times, each with a differ-ent random seed and each runs for a sufficiently long per-iod of time until stable results are obtained. That is, eachpoint in the curves is the average of 10 simulations. Thisapproach allows us to compute the confidence intervalsfor the simulation results. The computed 95% confidenceintervals are plotted as error bars in the figures, whichare all quite small in all the figures. Such small confidenceintervals make the simulation results credible.

4.2. Simulation results and discussions

We first examine the impact of the number of channelsM on the overall throughput of the CR network. In Fig. 4,we increase M from 4 to 8, and plot the total throughputof the CR network. As expected, the more licensed chan-nels, the more spectrum opportunities are available forthe CR users. Thus the CR network throughput increaseswith M. The curves of both SF and the heuristic algorithmhave lower slop than that of the distributed greedy algo-rithm. It implies that the greedy algorithm is more efficientin exploiting the addition spectrum opportunities for CRtransmissions, since it achieves large throughput gain foran additional licensed channel. We find the upper boundquite loose, while the lower bound is reasonably tight.

4 4.5 5 5.5 6 6.5 7 7.5 80

10

20

30

40

50

Number of Licensed Channels (M)

Thro

ughp

ut (M

bps)

Upper boundProposed schemeHeuristic schemeLower bound

Fig. 4. CR network throughput versus the number of licensed channels.

Therefore we omit the upper bound in the followingfigures.

In Fig. 5, we investigate the impact of primary userchannel utilization g on the CR network throughput. Thethroughput curves achieved by the algorithms are plottedwhen g is increased from 0.3 to 0.7. Clearly, a smaller g al-lows more spectrum opportunities for CR transmissions.When the primary users get more busy, the spectrumopportunities for CR users decreases and the throughputof all the three algorithms decreases. It can be seen fromthe figure that all the three curves decrease as g gets larger.The CR network throughput of the distributed greedy algo-rithm is better than that of the simple heuristic algorithmand that of the centralized SF algorithm. In particular,when g = 0.3, the distributed greedy algorithm achieves anormalized throughput gain of 27.84% over the simpleheuristic algorithm, and a normalized throughput gain of117.62% over SF. When g = 0.7, the distributed algroithmachieves normalized throughput gains of 19.98% and73.67% over the simple heuristic and SF, respectively.

Next we examine the impact of spectrum sensing errorson the CR network throughput. Since such sensing errorsare generally unavoidable [2], it would be desirable forthe CR network protocols to be robust to such errors. InFig. 6, we test five pairs of {�,d} values as follows:{0.2,0.48}, {0.24,0.38}, {0.3,0.3}, {0.38,0.24}, and{0.48,0.2}. The CR network throughputs achieved by thealgorithms are plotted in the figure. It is interesting tosee that the throughput performance gets worse whenthe probability of one of the two sensing errors gets large.We can trade-off between false alarm and miss detectionprobabilities to find the optimal operating point for spec-trum sensing. Again, the throughput performance of thegreedy algorithm is superior to that of the heuristic algo-rithm and doubles that of the SF algorithm.

We then investigate the impact of the ACI factor b onthe CR network throughput. The simulation results are pre-sented in Fig. 7, where b is increased from 0 to 0.5. As ex-pected, the CR network throughput is degraded by thepresence of ACI. The severer the ACI, the lower the CR net-work throughput. When b is increased from 0 to 0.5, thethroughput degradations are 4.0647 Mbps, 3.8068 Mbps,

0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.72

4

6

8

10

12

14

16

18

20

Channel Utilization (η)

Thro

ughp

ut (M

bps)

Proposed schemeHeuristic schemeLower bound

Fig. 5. CR network throughput versus primary user channel utilization.

0.2 0.25 0.3 0.35 0.4 0.45 0.50

5

10

15

20

Probability of False Alarm (ε)

Thro

ughp

ut (M

bps)

Proposed schemeHeuristic schemeLower bound

Fig. 6. CR network throughput versus spectrum sensing errorprobabilities.

0 0.1 0.2 0.3 0.4 0.50

2

4

6

8

10

12

14

16

18

20

Adjacent Channel Interference Factor (β)

Thro

ughp

ut (M

bps)

Proposed schemeHeuristic schemeLower bound

Fig. 7. CR network throughput versus the ACI factor.

D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640 1637

and 3.3793 Mbps for the distributed algorithm, the simpleheuristic, and SF, respectively. The distributed greedy algo-rithm outperforms both the simple heuristic algorithm andSF with considerable gaps for the entire range of bconsidered.

We also measure both types of interference in the sim-ulations and exam the impact of the ACI factor b on chan-nel interference. In Fig. 8, we increase b from 0 to 0.5 withstep 0.1 and plot the measured average interference in theplots. The total average interference for each licensedchannel is shown in Fig. 8a, which consists of both ACIand CCI. It can be seen that the total interference increasesas b gets larger, since there is more power leakage fromadjacent channels. The ACI and CCI components are plottedin Fig. 8b and c, respectively. It can be seen that ACI almostlinearly increases with b. When b = 0, ACI is zero for all thethree schemes since there is no power leakage from neigh-boring channels. When b = 0.5, the ACI of the proposed dis-tributed scheme is about 92.32% of that of the simpleheuristic and 58.93% of that of SF. The proposed distributedalgorithm curve has the lowest slop among the threeschemes, indicating more effective control of ACI as b in-creases. The fractions of ACI in the total average interfer-ence are plotted in Fig. 8d for the three schemes. The

fraction increases as b gets larger, from 0% to about 22%.Clearly ACI should be considered in the resource allocationand protocol design of CR networks; the proposed ap-proach of jointly considering CCI and ACI is well justified.

Finally, we validate our proposed spectrum sensing andaccess scheme. We set the maximum allowable collisionprobability c to be 0.2 and increase channel utilization gfrom 0.3 to 0.7 in steps of 0.1. In Fig. 9, the measured col-lision rates with primary uses are plotted, along with thec = 0.2 curve. It can be seen that the measured collisionrate is always kept below c, showing that the proposedspectrum sensing and access scheme is quite effective withregard to primary user protection.

The trace of maximum profit, i.e., F , achieved by thedistributed algorithm from one of the simulations is plot-ted in Fig. 10. It can be seen that the distributed powerallocation algorithm converges within about 167 steps,while in each step each node only updates and broadcastsseveral local variables (i.e., E; C, and F ). The computationalcomplexity and the total amount of control data exchangedover the control channel are both quite low.

5. Related work

Cognitive radio (CR) has been recognized as a promisingtechnology for efficient spectrum sharing [2,3]. There isconsiderable CR research on spectrum sensing and dy-namic spectrum access [5,10,14,15]. The approach of peri-odically sensing a selected subset of channels has beenadopted in the design of CR MAC protocols [5,10,15]. Sev-eral papers consider sensing errors in the design of spec-trum access schemes [5,16,17]. The design ofopportunistic channel access scheme was considered in[15,16]. Power allocation for CR users was one of the activeresearch topics in CR networking. In a recent work [18],Zhao and Kwak investigated the power allocation problemfor a single secondary user, while considering the mutualinterference between primary users and secondary users.

Co-channel and adjacent channel interference (CCI andACI) are the two major factors limiting wireless networkcapacity. The impact of CCI on network performance iswell-known and comprehensively investigated in [19]. Re-cently, the impact of ACI has attracted considerable inter-est in the wireless community. In [20,8], the need wasdemonstrated for careful channel selection to mitigateACI in IEEE 802.11 based systems. The impact of both CCIand ACI on network throughput and performance wasevaluated in [21–23]. The interference models have beendeveloped to analyze the channel interference in a few pa-pers. In [24], the problem of statistical-physical modelingof CCI was investigated to analyze the outage probabilitiesin wireless networks and to design interference-awaretransceivers. ACI was described by a simple quantificationmodel that was verified by testbed experiments in [8]. In[25], a model for the aggregate ACI in TV white spacewas developed to demonstrate that the weighted sum ofthe total ACI power should be kept below certain thresholdas well as ACI in each adjacent channel.

A commonly used approach to reduce CCI is to assigndifferent channels to neighboring transmitters [6,7]. In

0 0.1 0.2 0.3 0.4 0.5

0.8

1

1.2

1.4

1.6

1.8

2

2.2

2.4

2.6

Adjacent Channel Interference Factor (β)

Adjacent Channel Interference Factor (β) Adjacent Channel Interference Factor (β)

Adjacent Channel Interference Factor (β)

Aver

age

Cha

nnel

Inte

rfere

nce

(μW

) Lower boundProposed schemeHeuristic scheme

0 0.1 0.2 0.3 0.4 0.50

0.1

0.2

0.3

0.4

0.5

Aver

age

Adja

cent

Cha

nnel

Inte

rfere

nce

(μW

)

Lower boundProposed schemeHeuristic scheme

0 0.1 0.2 0.3 0.4 0.50.8

1

1.2

1.4

1.6

1.8

2

Aver

age

Co−

chan

nel I

nter

fere

nce

(μW

)

Lower boundProposed schemeHeuristic scheme

0 0.1 0.2 0.3 0.4 0.50

0.05

0.1

0.15

0.2

0.25

Porti

on o

f AC

I in

Tota

l Int

erfe

renc

e Lower boundProposed schemeHeuristic scheme

Fig. 8. Composition of the total interference measured in the simulations as a function of ACI factor b.

0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.70.15

0.16

0.17

0.18

0.19

0.2

0.21

Channel Utilization (η)

Col

lisio

n Pr

obab

ility

Maximum allowableSimulated

Fig. 9. Collision probability to primary users measured in the simulation.

0 50 100 1500

0.5

1

1.5

2

2.5

3

Iteration

Max

imum

PR

OFI

T

Power Allocation Algorithm

Fig. 10. Convergence of the maximum profit achieved by the distributedalgorithm.

1638 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

[26,27], frequency domain iterative multi-user detectorswere adopted for CCI cancelation. A low-cost CCI avoidanceMAC scheme was presented in [28]. In [29], ACI was min-

imized by optimizing reception of television receivers. In[30], Gidony and Kalet addressed the ACI mitigation prob-lem by exploiting antenna diversity.

D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640 1639

In this paper, we consider the challenging problem ofchannel assignment and power allocation in CR networksunder the presence of both CCI and ACI, aiming to maxi-mize the overall CR network capacity without imposing se-verely harmful impact on the primary users. We proposean RLT-based centralized SF algorithm and a distributedgreedy algorithm for near-optimal channel assignmentand power allocations. The proposed algorithms are shownto perform well in achieving the design goals.

6. Conclusion

In this paper, we investigated the problem of co-chan-nel interference (CCI) and adjacent channel interference(ACI) mitigation via channel assignment and power alloca-tion in cognitive radio (CR) networks. The objective was tomaximize the total CR network throughput while keepingboth collision rate and interference with primary users be-low tolerance thresholds. We proposed a reformulation–linearization technique (RLT)-based centralized sequentialfixing (SF) algorithm that computes near-optimal solu-tions, and a distributed greedy algorithm that only uses lo-cal channel gain information. The proposed algorithms areevaluated with simulations. The distributed greedy algo-rithm is shown to outperform both the centralized SF algo-rithm and a centralized heuristic algorithm withconsiderable gains. In this paper we assumed reliable con-trol channels for the CR users to exchange control informa-tion. The design of such a control channel and its impact onthe CR network capacity are interesting problems to beinvestigated in the future work.

Acknowledgments

This work is supported in part by the US National Sci-ence Foundation (NSF) under Grants CNS-0953513 andCNS-1247955, and through the NSF I/UCRC BroadbandWireless Access and Application Center (BWAC) Site at Au-burn University.

References

[1] D. Hu, S. Mao, Co-channel and adjacent channel interferencemitigation in cognitive radio networks, in: Proc. IEEE MILCOM’11,Baltimore, MD, November 2011, pp. 1–6.

[2] Q. Zhao, B.M. Sadler, A survey of dynamic spectrum access, IEEESignal Process. Mag. 24 (3) (2007) 79–89. May.

[3] Y. Zhao, S. Mao, J.O. Neel, J.H. Reed, Performance evaluation ofcognitive radios: metrics, utility functions, and methodology, Proc.IEEE 97 (4) (2009) 642–659. April.

[4] FCC, In the matter of unlicensed operation in the TV broadcastbands: additional spectrum for unlicensed devices below 900 MHzand in the 3 GHz band, September 2010, Second MemorandumOpinion and Order. <http://transition.fcc.gov/DailyReleases/DailyBusiness/2010/db0923/FCC-10-174A1.pdf>.

[5] D. Hu, S. Mao, Design and analysis of a sensing error-aware macprotocol for cognitive radio networks, in: Proc. IEEE GLOBECOM’09,Honolulu, HI, December 2009, pp. 1–6.

[6] D. Hu, S. Mao, Resource allocation for medium grain scalable videosover femtocell cognitive radio networks, in: Proc. IEEE ICDCS’11,Minneapolis, MN, June 2011, pp. 258–267.

[7] H.-C. Lee, D.-C. Oh, Y.-H. Lee, Mitigation of inter-femtocellinterference with adaptive fractional frequency reuse, in: Proc.IEEE ICC’10, Cape Town, South, Africa, May 2010, pp. 1–5.

[8] V. Angelakis, S. Papadakis, V.A. Siris, A. Traganitis, Adjacent channelinterference in 802.11a is harmful: Testbed validation of a simplequantification model, IEEE Commun. Mag. 49 (3) (2011) 160–166.March.

[9] S. Kompella, S. Mao, Y.T. Hou, H.D. Sherali, On path selection and rateallocation for video in wireless mesh networks, IEEE/ACM Trans.Netw. 17 (1) (2009) 212–224. February.

[10] H. Su, X. Zhang, Cross-layer based opportunistic mac protocols forqos provisionings over cognitive radio wireless networks, IEEE J. Sel.Areas Commun. 26 (1) (2008) 118–129. January.

[11] Y.T. Hou, Y. Shi, H.D. Sherali, Spectrum sharing for multi-hopnetworking with cognitive radios, IEEE J. Sel. Areas Commun. 26(1) (2008) 146–155. January.

[12] D. Hu, S. Mao, Y.T. Hou, J.H. Reed, Scalable video multicast incognitive radio networks, IEEE J. Sel. Areas Commun. 28 (3) (2010)334–344. April.

[13] M.S. Bazaraa, J.J. Jarvis, H.D. Sherali, Linear Programming andNetwork Flows, 4th ed., John Wiley & Sons, Inc., New York, NY, 2010.

[14] A. Motamedi, A. Bahai, MAC protocol design for spectrum-agilewireless networks: Stochastic control approach, in: Proc. IEEEDySPAN’07, Dublin, Ireland, April 2007, pp. 448–451.

[15] Q. Zhao, S. Geirhofer, L. Tong, B.M. Sadler, Opportunistic spectrumaccess via periodic channel sensing, IEEE Trans. Signal Process. 56 (2)(2008) 785–796. February.

[16] Y. Chen, Q. Zhao, A. Swami, Joint design and separation principle foropportunistic spectrum access in the presence of sensing errors, IEEETrans. Inf. Theory 54 (5) (2008) 2053–2071. May.

[17] R. Urgaonkar, M.J. Neely, Opportunistic scheduling with reliabilityguarantees in cognitive radio networks, IEEE Trans. Mobile Comput.8 (6) (2009) 766–777. June.

[18] C. Zhao, K. Kwak, Power/bit loading in OFDM-based cognitivenetworks with comprehensive interference considerations: Thesingle-SU case, IEEE Trans. Veh. Technol. 59 (4) (2010) 1910–1922.May.

[19] L. Yang, M.-S. Alouini, Performance comparison of different selectioncombining algorithms in presence of co-channel interference, IEEETrans. Veh. Technol. 55 (2) (2006) 559–571. March.

[20] J. Nachtigall, A. Zubow, J.-P. Redlich, The impact of adjacentchannel interference in multi-radio systems using IEEE 802.11,in: Proc. IWCMC’08, Crete Island, Greece, August 2008, pp.874–881.

[21] M.G. Sanchez, M.A. Acuna, I. Cuinas, R.M. Rodriguez-Osorio, L. deHaro, A. Garcia-Pino, Cochannel and adjacent channel interference inactual terrestrial TV scenarios - part I: Field measurements, IEEETrans. Broadcast. 48 (2) (2002) 111–115. June.

[22] Z.A. Shamsan, L.F. Abdulrazak, T.A. Rahman, Co-channel and adjacentchannel interference evaluation for IMT-Advanced coexistence withexisting fixed systems, in: Proc. IEEE International RF and MicrowaveConference 2008, Kuala Lumpur, Malaysia, December 2008, pp. 65–69.

[23] C.-S. Sum, R. Funada, J. Wang, T. Baykas, M.A. Rahman, H. Harada,Error performance and throughput evaluation of a multi-Gbpsmillimeter-wave WPAN system in the presence of adjacent and co-channel interference, IEEE J. Sel. Areas Commun. 27 (8) (2009) 1433–1442. October.

[24] K. Gulati, B. Evans, J. Andrews, K. Tinsley, Statistics of co-channelinterference in a field of Poisson and Poisson-Poisson clusteredinterferers, IEEE Trans. Signal Process. 58 (12) (2010) 6207–6222.December.

[25] E. Obregon, L. Shi, J. Ferrer, J. Zander, A model for aggregate adjacentchannel interference in TV white space, in: Proc. IEEE VTC-Spring2011, Budapest, Hungary, May 2011, pp. 1–5.

[26] A.M.A. Ahmed, I. Marsland, Co-channel interference cancellation inmultihop relay networks, in: Proc. IEEE ICC’08 Workshops, Beijing,P.R. China, May 2008, pp. 62–67.

[27] A.M.A. Ahmed, I. Marsland, Co-channel interference cancellation inwireless cellular networks, in: Proc. IEEE VTC-Spring 2008, MarinaBay, Singapore, May 2008, pp. 698–702.

[28] G. Miao, Y. Li, N. Himayat, S. Talwar, Co-channel interferenceavoidance MAC in wireless cellular networks, IEEE Trans. Commun.57 (11) (2009) 3405–3897. November.

[29] O. Bendov, C.B. Patel, Television receiver optimization in thepresence of adjacent channel interference, IEEE Trans. Broadcast.51 (1) (2005) 38–42. March.

[30] D. Gidony, I. Kalet, Adjacent channel interference cancellation forMSK-type signals using antenna diversity in Rayleigh fadingenvironment, IEEE Trans. Commun. 52 (2) (2004) 317–325.February.

1640 D. Hu, S. Mao / Ad Hoc Networks 11 (2013) 1629–1640

Donglin Hu received the M.S. degree fromTsinghua University, Beijing, China, in 2007and the B.S. degree from Nanjing University ofPosts and Telecommunications, Nanjing,China in 2004, respectively, all in electricalengineering. He received the M.S. degree inProbability and Statistics from Auburn Uni-versity, Auburn, AL, in 2011, and the Ph.D.degree in Electrical and Computer Engineer-ing from Auburn University in 2012. Currentlyhe is a postdoctoral research fellow in theDepartment of Electrical and Computer Engi-neering at Auburn University. His research

interests include cognitive radio networks, femtocell networks, networkmodeling, cross-layer design, performance analysis, and algorithm opti-

mization for wireless networks and multimedia communications.

Shiwen Mao received Ph.D. in electrical andcomputer engineering from Polytechnic Uni-versity, Brooklyn, NY (now Polytechnic Insti-tute of New York University) in 2004. He wasa research staff member with IBM ChinaResearch Lab from 1997 to 1998. He was aPostdoctoral Research Fellow/Research Sci-entist in the Bradley Department of Electricaland Computer Engineering at Virginia Tech,Blacksburg, VA, USA from 2003 to 2006. Cur-rently, he is the McWane Associate Professorin the Department of Electrical and ComputerEngineering, Auburn University, Auburn, AL.

His research interests include cross-layer optimization of wirelessnetworks and multimedia communications, with current focus on cog-nitive radios, femtocell networks, 60 GHz mmWave networks, and smartgrid. He is on the Editorial Board of IEEE Transactions on Wireless Com-munications, IEEE Communications Surveys and Tutorials, Elsevier AdHoc Networks Journal, Wiley International Journal of CommunicationSystems, and ICST Transactions on Mobile Communications and Appli-cations. He serves as the Director of E-Letter of IEEE CommunicationsSociety’s Multimedia Communications Technical Committee (MMTC), for2012–2014.

He is a coauthor of TCP/IP Essentials: A Lab-Based Approach (Cam-bridge University Press, 2004). He was awarded the McWane EndowedProfessorship in the Samuel Ginn College of Engineering for the Depart-ment of Electrical and Computer Engineering, Auburn University inAugust 2012. He received the US National Science Foundation FacultyEarly Career Development Award (CAREER) in 2010. He is a co-recipientof The 2004 IEEE Communications Society Leonard G. Abraham Prize inthe Field of Communications Systems and The Best Paper Runner-upAward at The Fifth International Conference on Heterogeneous Net-working for Quality, Reliability, Security and Robustness (QShine) in2008. He also received Auburn Alumni Council Research Awards forExcellence–Junior Award in 2011 and two Auburn Author Awards in2011. He holds one US patent.