6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications

Research Article

On cognitive channels with an oblivion constraint

Download529 downloads
  • @INPROCEEDINGS{10.4108/icst.crowncom.2011.245872,
        author={Daniela Tuninetti and Natasha Devroye and Yasaman Keshtkarjahromi },
        title={On cognitive channels with an oblivion constraint},
        proceedings={6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2012},
        month={5},
        keywords={cognitive network broadcast strategy},
        doi={10.4108/icst.crowncom.2011.245872}
    }
    
  • Daniela Tuninetti
    Natasha Devroye
    Yasaman Keshtkarjahromi
    Year: 2012
    On cognitive channels with an oblivion constraint
    CROWNCOM
    IEEE
    DOI: 10.4108/icst.crowncom.2011.245872
Daniela Tuninetti1, Natasha Devroye1,*, Yasaman Keshtkarjahromi 1
  • 1: University of Illinois at Chicago
*Contact email: devroye@uic.edu

Abstract

We consider a Gaussian point-to-point secondary link which co-exists with a Gaussian point-to-point primary link, and is permitted to transmit within the primary user's interference margin. Under this assumption, we are interested in quantifying the secondary user rate gains when the secondary users have knowledge of the primary link's codebook. As first proposed by Popovski et al., this codebook knowledge may be exploited to opportunistically either fully cancel the primary user interference at the secondary receiver, or otherwise treat it as noise. In this work, we propose an achievable rate region in which the primary user transmits according to an information theoretic broadcast strategy, but otherwise remains oblivious to the secondary user operation. The secondary receiver exploits the primary codebooks, together with its broadcast strategy to decode a portion of the primary message, thereby opportunistically partially canceling the primary user interference seen at the secondary receiver and thus straddles the two extremes between fully decoding and treating the interference as noise as presented by Popovski et al. Interestingly, it is shown that this broadcast strategy does not outperform Popovski et al.'s simple ``all or nothing'' strategy. The inclusion of an average power constraint on the secondary link furthermore allows us to develop a new, tighter outer bound for this channel, which is numerically evaluated and compared to the inner bounds.