3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications

Research Article

Resource Allocation for Cognitive Radios in Dynamic Spectrum Access Environment

  • @INPROCEEDINGS{10.1109/CROWNCOM.2008.4562545,
        author={Dong In Kim and Long Le and Ekram Ekram},
        title={Resource Allocation for Cognitive Radios in Dynamic Spectrum Access Environment},
        proceedings={3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2008},
        month={7},
        keywords={Terms- Cognitive radio spectrum overlay and spectrum underlay rate and power allocation quality of service (QoS) convex optimization.},
        doi={10.1109/CROWNCOM.2008.4562545}
    }
    
  • Dong In Kim
    Long Le
    Ekram Ekram
    Year: 2008
    Resource Allocation for Cognitive Radios in Dynamic Spectrum Access Environment
    CROWNCOM
    IEEE
    DOI: 10.1109/CROWNCOM.2008.4562545
Dong In Kim1, Long Le1, Ekram Ekram1
  • 1: Sch. of Inf. & Commun. Eng., Sungkyunkwan Univ. (SKKU), Sungkyunkwan

Abstract

We investigate the dynamic spectrum sharing problem among primary and secondary users in a cognitive radio network subject to QoS constraints for secondary users and interference constraints for primary users. For a scenario where only mean channel gains from secondary users to primary receiving points, which are averaged over short-term fading, are available, we derive outage probabilities for secondary users and interference constraint violation probabilities for primary users. Based on the analysis, we develop a framework to perform joint admission control and rate/power allocation for secondary users such that statistical guarantees on the violation probabilities of both the QoS and the interference constraints are achieved. Spectrum access by the secondary users can exploit the timevarying nature of the activity of the primary users, and thereby much higher throughput can be achieved compared to the case where primary users are assumed to be active at all time. Also, via extensive numerical analysis, throughput performances of primary and secondary users are investigated considering different levels of implementation complexity due to channel estimation.