Вы находитесь на странице: 1из 6

Dynamic Spectrum Allocation in Cognitive Radio Using Hidden

Markov Models: Poisson Distributed Case

Ihsan A. Akbar William H. Tranter


Mobile and Portable Radio Research Group Mobile and Portable Radio Research Group
Wireless @ Virginia Tech Wireless @ Virginia Tech
Virginia Tech Virginia Tech
iakbar@vt.edu btranter@vt.edu

Abstract These poorly utilized spectrum usage statistics give rise to


spectrum holes which are defined in [2] as bands of
Cognitive radio networks can be designed to manage frequencies assigned to a primary user, but at a particular
the radio spectrum more efficiently by utilizing the time and specific geographical location, these bands are not
spectrum holes in primary users’ licensed frequency bands. being utilized by that user. A cognitive radio network [3],
Recent studies have shown that the radio spectrum is [4] can utilize these spectrum holes for its data transmission
poorly utilized by the licensed users even in urban with minimized interference to and from the primary users.
geographical areas. This spectrum utilization can be These spectrum holes are generally utilized using Carrier
improved significantly by making it possible for secondary Sense Multiple Access (CSMA) technique, as illustrated in
users (who are not being served by the primary system) to Fig. 1. In this technique, the CR network identifies a
access spectrum holes, i.e., frequency bands not used by spectrum hole and uses it until traffic from the primary user
licensed users. In this novel work, we use Hidden Markov is detected. Once it detects primary user’s data
Models (HMMs) to model and predict the spectrum transmission, the CR jumps out of the band it was
occupancy of licensed radio bands. The proposed occupying and looks for spectrum holes in other bands of
technique can dynamically select different licensed bands
interest.
for its own use with significantly less interference from and
to the licensed users. It is found that by predicting the
duration of spectrum holes of primary users, the CR can
utilize them more efficiently by leaving the band, that it
currently occupies, before the start of traffic from the
primary user of that band. We propose a simple algorithm,
called the Markov-based Channel Prediction Algorithm
(MCPA), for dynamic spectrum allocation in cognitive
radio networks. In this work, we present the performance
of our proposed dynamic spectrum allocation algorithm
when the channel state occupancy of primary users are Figure 1. Illustration of spectrum holes in a cognitive
assumed to be Poisson distributed. radio network. Here, the spectrum allocation is
The impact of CR transmission on the licensed users is performed using the conventional CSMA based
also presented. It is shown that significant SIR technique. The arrows show the transition of secondary
improvements can be achieved using HMM based dynamic user from one frequency band to another. Note that
spectrum allocation as compared to the traditional CSMA there is a high possibility of collisions between primary
based approach. The results obtained using HMM are very and secondary users’ traffic whenever the primary user
promising and HMM can offer a new paradigm for tries to use the channel that is currently occupied by
predicting channel behavior in cognitive radio, an area the secondary user.
that has been of much research interest lately.
As seen from Fig. 1, the CSMA based spectrum
allocation would always result in collision whenever the
1. Introduction primary user, whose band is currently occupied by the CR,
starts using the same band for its data transmission. This
Radio spectrum is a precious resource that should be could significantly degrade the performance of both the CR
utilized carefully and efficiently. Recent measurements network as well as the data communication of the licensed
have found largely unoccupied frequency bands even in user. This is especially true if both networks have base
urban geographical areas [1]. Some of the bands are stations that are located in closed proximity. However,
partially occupied whereas some of them are heavily used. using our proposed Markov-based Channel Prediction

1-4244-1029-0/07/$25.00 ©2007 IEEE. 196


Algorithm (MCPA) for dynamic spectrum allocation, we (i) ( X t , Yt ) are jointly stationary
can significantly reduce these collisions by performing
(ii) Pr (Yt +1 = yt +1 , X t +1 = xt +1 | Y1 = y1 , X 1 = x1 ) =
t t t t
prediction on the usage patterns of different licensed users.
We propose a novel way of utilizing the spectrum holes. Pr (Yt +1 = yt +1 , X t +1 = xt +1 | X t = xt ) .
Instead of jumping out from the frequency band after
detecting the presence of signal from the licensed user, the The processes X t and Yt are called the state and the output
CR network performs prediction on the usage behavior of of the SFSS respectively. The mathematical model that can
frequency band of interests, and then decides to remain in generate such a HMP is called a hidden Markov model
the same frequency band (that it is currently occupying) or (HMM). A HMM [6], [7] is a finite state machine in which
move to another band. If correct prediction is performed, the observation sequence is a probabilistic function of
the CR can leave the current frequency band before states.
detecting any signal from the primary user. This method A discrete time HMM having N states and M symbols
can provide significant interference avoidance to and from consists of an N × N state transition matrix P that defines
the cognitive radio network. the probability of transitioning from one state to another or
Our methodology can be explained as follows. Different itself, an N × M output symbol probability matrix B that
HMMs first train themselves using spectrum usage patterns gives the probability of generating different output symbols
of the incumbent users and once reliable models are while being in a particular state, and an N dimensional
developed, the spectrum manager decides which frequency vector called the initial state probability vector that gives
to use based on the likelihood of spectrum holes of these the probability of being in a particular state at the start of
bands. In this work, usage patterns are assigned binary bits the process. A hidden Markov model is usually denoted as
with zeros indicating no traffic and ones indicating that the ζ = {P, B, π}. Mathematically,
spectrum is being used by the incumbent user at that
P = [aij ], 1 ≤ i, j ≤ N
particular time. Hence we obtain binary vectors for each
N
frequency band and use these vectors as training sequences
for HMMs assigned for different radio bands. The HMMs
with aij = Pr( xt = s j | xt −1 = si ) , 0 ≤ aij ≤ 1 and ∑a
j =1
ij =1.

will then predict the occurrence of spectrum holes in Here s1 , s2 , ..., sN denotes N different states. We will
different bands and the cognitive engine will dynamically
simply use notations 1, 2, …, N for states when there is no
choose these available frequencies for its use.
ambiguity. If we denote M observation symbols as a set
The rest of the paper is organized as follows. First the
V = {v1 , v2 ,..., vM } , then we can write,
basic theory of hidden Markov model and a brief
discussion on its use in the prediction of time series is B = [b j (k )], 1 ≤ j ≤ N, 1 ≤ k ≤ M
discussed. Next, the Markov-based Channel Prediction with b j (k ) = Pr( yt = vk | xt = s j ) , for t = 1, 2, …; Note that
Algorithm (MCPA) is presented. Simulation results and M
conclusions are discussed later. 0 ≤ b j (k ) ≤ 1 and ∑ b (k ) = 1 .
k =1
j

These parameters can be estimated using the Baum-


2. Theory Welch Algorithm (BWA) [6], which is basically a derived
form of the Expectation-Maximization (EM) algorithm for
2.1 Hidden Markov Model HMMs. Due to the need for an online estimation in real
world applications, such as in this case where HMM
A hidden Markov process (HMP) [5] is a doubly parameters need to be updated constantly based on the
stochastic process in which the generation of observation spectral usage patterns of the primary users, we use a
symbols depends on the emission properties of the states. modified version of the BWA, called as the Forward-only
Therefore, a state can generate more than one observation BWA (FO-BWA) that can estimate HMM parameters on
symbol and given the observation sequence, the state the fly. Details about the FO-BWA can be found from [6].
sequence is not directly observable. For the case of binary sequences, the probability of
Mathematically, an HMP can be defined as the pair generating the observation sequence given the model ζ can
{ X t , Yt ; t ∈ N} of stochastic processes defined on the be written mathematically as,
probability space (Ω, F , P ) . Here X t and Yt denote the
Pr( y1T | ζ) = πB( y1 ) PB( y2 ) P ... PB( yT )1' (1)
hidden state sequence and the observation sequence
respectively. The finite set ( X , Y ) is said to be a stationary
Here B(yk) with k = 1, 2, …, T denotes the probability of
finite state system (SFSS) if the following conditions are generating symbol yk from different states. Because of the
met:
197
significantly long data size, we use the logarithm of dynamically. Binary sequences are obtained from the
Pr( y1 | ζ ) , usually known as the log-likelihood. We
T channel statistics of licensed users as explained earlier.
Different HMMs are then trained for each frequency band
predict the future behavior of channel by finding the joint
of interest using these binary sequences. The forward-only
probabilities Pr( y1 , 0 | ζ ) and Pr( y1 ,1 | ζ ) .
T T
BWA is used to obtain the parameters of HMMs, namely
There has been an increased interest in data the state transition matrix P, the output symbol probability
prediction/forecasting using HMMs recently. Some of the matrix B, and the initial state probability vector π. The
recent work includes stock market forecasting [8], [9], flowchart of the algorithm for the case of single primary
forecasting early conflict in southern Balkans [10] and user is shown in Fig. 2. The extension of this algorithm for
earthquakes prediction. The main reason of such a wide use the case of multiple primary users is straight forward. In
of HMM in prediction problems is because of its strong more than one primary user case, the channel usages
theoretical foundations and tractability. This is primarily statistics of all primary users are given as input to different
because of the fact that using HMM to forecast time series HMMs. The selection of a particular frequency band by
is easily explainable and has solid statistical foundation, the secondary user is performed by the help predictions
properties that are not usually available in Artificial Neural performed by the HMMs. Once a channel is selected by the
Networks (ANNs) [11], [12], which is also used frequently secondary user, the duration of its stay in that channel is
for predicting time series. determined by the channel usage predictions of the HMM
of that particular band.
We predict channel behavior by finding the joint
2.2 Markov-based Channel Prediction Algorithm probabilities Pr( y1 , 0 | ζ ) and Pr( y1 , 1 | ζ ) .
T T
If, at a
particular instant t we observe Pr( y1 , 0 | ζ ) > Pr( y1 ,1 | ζ ) ,
t t
The spectrum occupancy is modeled as binary sequence
with a symbol one denoting that the spectrum is occupied this means that the probability of a particular frequency
at that particular instant by the primary user and a symbol band being unoccupied is higher than the probability of it
zero denoting that the spectrum is unoccupied at that being occupied. We can also compare the two probabilities
instant. Here, the spectrum usage patterns are modeled as with a threshold δ such that the channel is used when
Poisson distributed with channel occupancy ratio of more Pr( y1 , 0 | ζ ) − Pr( y1 ,1 | ζ ) ≥ δ
T T
(2)
than 50% in all cases. This means that every primary user
Simulations are performed using this criterion with
utilizes the spectrum for more than 50% of the time.
different values of δ. Results of these simulations are
shown in section 3. Due to large data size, the true
likelihood of the process tends to zero and we use split-data
likelihood [13] to estimate the true value of the likelihood.
Because of extremely low numerical values of these
probabilities, we usually use the logarithm of these
Observe channel usage probabilities and find the difference of the log-likelihoods
patterns and update If to compare it with the threshold δ. In this process, the
HMM parameters Pr(y, 0 | ζ ) ≤ Pr(y, 1 | ζ ) observation sequence is segmented into blocks of equal
length and these blocks are considered mutually
Predict channel availability and independent. The overall likelihood of the observed process
unavailability using HMM is then the product of individual likelihoods. If we use the
log-likelihood, then the overall log-likelihood is the sum of
the log-likelihood values of all the segments.
Mathematically, for block size of m and for a total of n
blocks, we can write
If Pr(y, 0 | ζ) > Pr(y, 1 | ζ ) n
Transmit Pr( y1 | ζ ) =
T
∏ Pr( y
k =1
mk
1+ m ( k −1)
| ζ) (3)

The graphical illustration of the MCPA is shown in Fig.


Figure 2: Flowchart of the MCPA for a single primary 3. Note that the CR traffic leaves a particular band before
user case.
the detection of data transmission from the primary user. In
this way, we can significantly reduce the impact of CR
Let us now explain the Markov-based Channel
network on the licensed users. Simulation results have
Prediction Algorithm (MCPA) that predicts the behavior of
shown significant improvement in the SIR of licensed users
different channels and then performs spectrum allocation
198
by using this HMM based dynamic spectrum allocation. ignored in this study.
The statistics of spectrum usage by the first, second, third,
and fourth primary users are shown in Fig. 5(a), 5(b), 5(c)
and 5(d) respectively. The first plot shows the frequency of
consecutive time slots when a particular spectrum is
occupied whereas the second plot shows the frequency of
consecutive unoccupied slots.

0.4 0.4

0.3 0.3
Figure 3: Illustration of dynamic spectrum allocation

Probability

Probability
using the MCPA. The arrows show the transition of 0.2 0.2
secondary user from one frequency band to another.
0.1 0.1
Note that using channel usage prediction, the
secondary user can avoid collisions with the data 0 0
0 5 10 15 20 0 5 10 15 20
transmission of primary users. Consecutively occupied Consecutively unoccupied

0.4 0.4
The case of multiple primary users is just an extension
of single user case. Different log-likelihood values are 0.3 0.3

Probability

Probability
calculated and the channel that gives the highest probability
0.2 0.2
of being unoccupied among all channels is selected for data
transmission. 0.1 0.1

0 0
0 5 10 15 20 0 5 10 15 20
Consecutively occupied Consecutively unoccupied
3. Simulation Results
0.4 0.4
Simulation results with four licensed users (here called
interferers) and one unlicensed user are presented. Each 0.3 0.3
Probability

Probability
interferer has a unique Poisson distributed spectrum usage 0.2 0.2
pattern having the occupancy probability of not less that
50%. In this work, we study the effectiveness of the MCPA 0.1 0.1

when channel spectral usage patterns are Poisson 0 0


0 5 10 15 20 0 5 10 15 20
distributed. Consecutively occupied Consecutively unoccupied

0.4 0.4

0.3 0.3
Probability

Probability

0.2 0.2

0.1 0.1

0 0
0 5 10 15 20 0 5 10 15 20
Consecutively occupied Consecutively unoccupied

Figure 5: Spectrum usage patterns of (a) - first licensed


users, (b) - second licensed user, (c) - third licensed
user and (d) - fourth licensed user.

Figure 4: Simulation scenario with four licensed users


and one cognitive radio transceiver labeled as ‘TX’ and We present a comparison with the conventional CSMA
‘RX’. The primary users are labeled using upper case based spectrum allocation technique and our proposed
alphabets. method of HMM based dynamic spectrum allocation. In
CSMA based spectrum allocation scheme that we adopt,
Fig. 4 shows the graphical representation of the the CR uses the channel when it observes no activity by the
simulation setup. The slot duration of both primary user primary user and quits it whenever it senses that the
and CR network is assumed to be same here. Also, the primary user has started sending data through that channel
system is assumed to be interference limited and noise is
199
(note that this may be very difficult to perform in practice). -1
10
So we expect some degradation in terms of the SIR of the 93.64 89.82

primary user because of the interference from the CR 54.03

network that can not be completely avoided using the


CSMA based approach. However, these possible collisions -2
10
24.57

can be avoided almost completely by using the MCPA


approach as the CR leaves the channel before the start of

BER
data transmission by the primary user. We perform a study -3
to observe the impact on the licensed users by using these 10
15.34
two techniques. We vary the power of the CR signal while
keeping the powers of licensed signals constant and
calculate the SIR at the receiver of the primary users. The -4
10
CDFs of the SIRs in both cases (CSMA and MCPA) are
plotted in Fig. 6. We can see an improvement of 0 1 2 3 4 5 6 7 8 9
threshold δ -3
x 10
approximately 20dB by using HMM based dynamic
Figure 7: Performance of the MCPA with four primary
spectrum allocation.
users. Throughput is also shown with the
Table 1 shows the BERs for different values of δ and corresponding values of the threshold.
their corresponding throughputs. As we can see that the
increase in δ gives better performance in terms of BER. At
(a)
the same time, the throughput decrease because of tougher
constraints that the radio has to fulfill in order to transmit 35

its data. Fig. 7 is the BER plot for the different values of δ 30

used in the simulation. Figure 8 shows the percentage of Percentage of channel usage by the CR 25

time CR uses the four licensed bands for its data 20

transmission.
15

10
0
Empirical CDF
10
5

-1 0
10 1 2 3 4
Channels

-2
(b)
10
30
Probability

-3
10 25
Percentage of channel usage by the CR

20
-4
10
15
CSMA
-5
10 MCPA
10

-6 5
10
-10 0 10 20 30 40 50 60
SIR (dB) 0
1 2 3 4

Figure 6: Comparisons of the primary user’s SIR using Channels

CSMA-based and MCPA-based schemes. Figure 8: Percentage of time the cognitive radio uses
four licensed radio bands using (a) – CSMA-based
scheme and (b) – MCPA-based scheme.
Table 1. Performance of the MCPA in terms of bit error
rate and throughput.

Threshold No. of bits BER Throughput 4. Conclusion


δ transmitted %
~0 45578 0.0300 93.64 In this work, we present a novel technique of dynamic
0.0030 43905 0.0260 89.82 spectrum allocation in cognitive radio using HMMs. The
0.0050 26412 0.0220 54.03 spectrum usage statistics are assumed to be Poisson
0.0065 7173 0.00076 24.57 distributed. The HMMs, used to train and later predict the
0.0070 5034 0.00002 15.34 occurrence and duration of spectrum holes, can

200
significantly improve the performance of cognitive radio by
performing accurate predictions about the channel usage
behavior of licensed users. We see that by properly tuning
HMM parameters we can obtain the performance
comparable to BPSK (in terms of BER) with just AWGN
noise present in the system even though the CR is using
frequency bands that are used by the primary users more
than 50% of the time. This obviously comes with the cost
of lowering the throughput as we put more strict condition
on the use of licensed channel by increasing the threshold.

5. References
[1] Federal Communications Commission, “Spectrum Policy Tack
Force,” Rep. ET Docket no. 02-135, Nov. 2002.
[2] S. Haykin, “Cognitive Radio: Brain-Empowered
Wireless Communications”, IEEE Journal on
Selected Areas in Communications, vol. 23, pp. 201-220,
Feb. 2005.
[3] J. Mitola, Cognitive radio: An integrated agent architecture
for software defined radio, Doctor of Technology, Royal Inst.
Technol. (KTH), Stockholm, Sweden, 2000.
[4] I. F. Akyildiz, W. Y. Lee, M. C. Vuran and S. Mohanty,
“NeXt generation/dynamic spectrum access/cognitive radio
wireless networks: A survey,” Computer Networks 50, pp. 2127-
2159, 2006.
[5] Y. Ephraim, and N. Merhav, “Hidden Markov Processes,”
IEEE Transactions on Information Theory, vol. 48, no. 6, July
2002.
[6] W. Turin, Digital Transmission Systems: Performance
Analysis and Modeling, McGraw-Hill, 1998.
[7] L. R. Rabiner, and B. H. Juang, “An introduction to Hidden
Markov Models,” IEEE ASSP Magazine, Jan. 1986.
[10] M. R. Hassan, and B. Nath, “Stock Market Forecasting
Using Hidden Markov Model: A New Approach,” Proceedings
of the 2005 5th International Conference on Intelligent Systems
Design and Applications, ISDA’05, 2005.
[11] M. Bicego, E. Grosso, and E. Otranto, “Recognising and .
Forecasting Increases and Decreases in Financial Markets via
Hidden Markov Models.”
[12] P. A. Schrodt, “Forecasting Conflict in the Balkans
using Hidden Markov Models,” paper presented at the
American Political Science Association meetings Washington,
DC.
[13] A. L. Blum, and R. L. Rivest, “Training a 3-node Neural
Networks is NP- complete,” Neural Networks, vol. 5, pp. 117-
127, 1992.
[14] J. S. Judd, “Neural Network design and Complexity of
Learning,” MIT Press, USA, 1990.
[15] T. Ryden, “Consistent and Asymptotically Normal
Parameter Estimates for Hidden Markov Models,” The Annals of
Statistics, vol. 22, no. 4, pp. 1884-1895, Dec. 1994.

201

Вам также может понравиться