International Conference on Cognitive Radio Oriented Wireless Networks

Cognitive Radio Oriented Wireless Networks pp 308-320

Sensing-Throughput Tradeoff for Cognitive Radio Systems with Unknown Received Power

  • Ankit Kaushik
  • Shree Krishna Sharma
  • Symeon Chatzinotas
  • Björn Ottersten
  • Friedrich Jondral
Conference paper

DOI: 10.1007/978-3-319-24540-9_25

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 156)
Cite this paper as:
Kaushik A., Sharma S.K., Chatzinotas S., Ottersten B., Jondral F. (2015) Sensing-Throughput Tradeoff for Cognitive Radio Systems with Unknown Received Power. In: Weichold M., Hamdi M., Shakir M., Abdallah M., Karagiannidis G., Ismail M. (eds) Cognitive Radio Oriented Wireless Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 156. Springer, Cham

Abstract

Understanding the performance of the cognitive radio systems is of great interest. Different paradigms have been extensively analyzed in the literature to perform secondary access to the licensed spectrum. Of these, Interweave System (IS) has been widely investigated for performance analysis. According to IS, sensing is employed at the Secondary Transmitter (ST) that protects the Primary Receiver (PR) from the interference induced. Thus, in order to control the interference at the PR, it is required to sustain a certain level of probability of detection. In this regard, the ST requires the knowledge of the received power. However, in practice, this knowledge is not available at the ST. Thereby performing analysis considering the prior knowledge of the received power is too idealistic, thus, do not depict the actual performance of the IS. Motivated by this fact, an estimation model that includes received power estimation is proposed. Considering a sensing-throughput tradeoff, we apply this model to characterize the performance of the IS. Most importantly, the proposed model captures the estimation error to determine the distortion in the system performance. Based on analysis, it is illustrated that the ideal model overestimates the performance of the IS. Finally, it is shown that with an appropriate choice of the estimation time, the severity in distortion can be effectively regulated.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Institute for Computer Science, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Ankit Kaushik
    • 1
  • Shree Krishna Sharma
    • 2
  • Symeon Chatzinotas
    • 2
  • Björn Ottersten
    • 2
  • Friedrich Jondral
    • 1
  1. 1.Communications Engineering LabKarlsruhe Institute of Technology (KIT)KarlsruheGermany
  2. 2.SnT - Securityandtrust.lu, University of LuxembourgWalferdangeLuxembourg

Personalised recommendations