Experimental Study of an Underlay Cognitive Radio System: Model Validation and Demonstration

  • Hanna Becker
  • Ankit Kaushik
  • Shree Krishna Sharma
  • Symeon Chatzinotas
  • Friedrich Jondral
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 172)

Abstract

Cognitive radio is one of the potential contenders that address the problem of spectrum scarcity by making efficient use of the currently allocated spectrum below 6 GHz. A secondary access to the licensed spectrum is only possible, if the cognitive radio systems restrict the interference to the primary systems. However, the performance analysis of such a cognitive radio system is a challenging task. Currently, performance evaluation of underlay systems is limited to theoretical analysis. Most of the existing theoretical investigations make certain assumptions in order to sustain analytical tractability, which could be unrealistic from the deployment perspective. Motivated by this fact, in this work, we validate the performance of an underlay system by means of laboratory measurements, and consequently propose a hardware demonstrator of such a system. Moreover, we present a graphical user interface to provide insights to the working of the proposed demonstrator and highlight the main issues faced during this experimental study. (This work was partially supported by the National Research Fund, Luxembourg under the CORE projects “SeMIGod” and “SATSENT”.)

Keywords

Cognitive radio Underlay system Power control Dynamic access Empirical validation Demonstrator 

References

  1. 1.
    Goldsmith, A., Jafar, S., Maric, I., Srinivasa, S.: Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 97(5), 894–914 (2009)CrossRefGoogle Scholar
  2. 2.
    Ghasemi, A., Sousa, E.: Fundamental limits of spectrum-sharing in fading environments. IEEE Trans. Wirel. Commun. 6(2), 649–658 (2007)CrossRefGoogle Scholar
  3. 3.
    Kang, X., Liang, Y.C., Nallanathan, A., Garg, H., Zhang, R.: Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity. ieee trans. wirel. commun. 8(2), 940–950 (2009)CrossRefGoogle Scholar
  4. 4.
    Musavian, L., Aissa, S.: Fundamental capacity limits of cognitive radio in fading environments with imperfect channel information. IEEE Trans. Commun. 57(11), 3472–3480 (2009)CrossRefGoogle Scholar
  5. 5.
    Sharma, S., Bogale, T., Chatzinotas, S., Ottersten, B., Le, L., Wang, X.: Cognitive radio techniques under practical imperfections: a survey. IEEE Commun. Surv. Tutorials 17(4), 1858–1884 (2015)CrossRefGoogle Scholar
  6. 6.
    Nguyen, T., Nguyen, T., Nguyen, H., Dang, K.: Hardware implementation of reception diversity techniques for spectrum sensing efficiency enhancement in cognitive radio network. In: 2013 Third World Congress on Information and Communication Technologies (WICT), pp. 69–73 December 2013Google Scholar
  7. 7.
    Anas, N., Mohamad, H., Tahir, M.: Cognitive radio test bed experimentation using USRP and Matlab/Simulink. In: 2012 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 229–232, December 2012Google Scholar
  8. 8.
    Combes, R., Proutiere, A.: Dynamic rate and channel selection in cognitive radio systems. IEEE J. Sel. Areas Commun. 33(5), 910–921 (2015)CrossRefGoogle Scholar
  9. 9.
    Kaushik, A., Sharma, S., Chatzinotas, S., Ottersten, B., Jondral, F.: Estimation-throughput tradeoff for underlay cognitive radio systems. In: 2015 IEEE International Conference on Communications (ICC), pp. 7701–7706, June 2015Google Scholar
  10. 10.
    Kaushik, A., Raza, M., Jondral, F.: On the deployment of cognitive relay as underlay systems. In: 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), pp. 329–334 (2014)Google Scholar
  11. 11.
    Charalambous, C., Menemenlis, N.: Stochastic models for short-term multipath fading channels: chi-square and Ornstein-Uhlenbeck processes. In: Proceedings of the 38th IEEE Conference on Decision and Control, vol. 5, pp. 4959–4964 (1999)Google Scholar
  12. 12.
    Jeffrey, A., Zwillinger, D.: Table of Integrals, Series, and Products. Elsevier Science, Boston (2000)Google Scholar
  13. 13.
    Ettus Research, 2 December 2015. http://www.ettus.com/
  14. 14.
    Sedykh, I.: laptop-icon_500x500, 2 December 2015; Copyright information: Creative Commons Attribution 2.0 Generic (CC BY 2.0) (2013). https://www.flickr.com/photos/shmectorcom/8616375606

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  • Hanna Becker
    • 1
  • Ankit Kaushik
    • 1
  • Shree Krishna Sharma
    • 2
  • Symeon Chatzinotas
    • 2
  • Friedrich Jondral
    • 1
  1. 1.Communications Engineering LabKarlsruhe Institute of Technology (KIT)KarlsruheGermany
  2. 2.SnT - Securityandtrust.lu, University of LuxembourgLuxembourg CityLuxembourg

Personalised recommendations