3594

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 11, NOVEMBER 2011

A Simple Distributed Power Control Algorithm for Cognitive Radio Networks Yong Xiao, Guoan Bi, Senior Member, IEEE, and Dusit Niyato, Member, IEEE

Abstractβ€”This paper studies the power control problem for spectrum sharing based cognitive radio (CR) networks with multiple secondary source-to-destination (SD) pairs. A simple distributed algorithm is proposed for the secondary users (SUs) to iteratively adjust their transmit powers to improve the performance of the network. The proposed algorithm does not require each SU (or PU) to negotiate with other SUs (or PUs) during the communication. It is proved that the proposed algorithm can obtain a time average performance as good as that achieved when the Nash equilibrium (NE) is chosen in hindsight. More specifically, the average performance of CR networks ( ( will )) converge to an πœ–-Nash equilibrium at a rate of π‘‡πœ– = 𝑂 exp 1πœ– . A sub-optimal algorithm is also introduced to further improve ( ) 𝑇 the convergence rate to log πœ–π‘‡β€² β€² = 𝑂 πœ–1β€² . Numerical results are πœ– presented to show the performance of the proposed algorithms under different settings. Index Termsβ€”Cognitive radio, power allocation, subgradient methods.

I. I NTRODUCTION

C

OGNITIVE radio (CR) is one of the main technologies to solve the spectrum under-utilization problem in future generations of wireless systems. In CR networks, the unlicensed users, called secondary users (SU), can access the spectrum which is unoccupied or ineffectively used by the licensed users, called primary users (PU). In this paper, we focus on spatial spectrum sharing (SSS) based CR networks (spectrum underlay approach) [1] in which SUs and PUs can transmit signals at the same time over the same spectrum. In this system, maximizing the performance of SUs while simultaneously maintaining the interference powers of PUs under the acceptable levels, called the interference temperature limit [1], is still a challenging task. In [2], it was observed that if SUs employ the power control methods, i.e., to decrease (or increase) their transmit powers when the conditions of SU-to-PU channels are β€œgood" (or β€œbad"), the spectrum utilization efficiency and system performance can be greatly improved. However, most of the previously reported work neglects the interference among SUs or PUs and assumes each SU can have the global information, i.e., the states of other SUs and the gains of all channels in the network. This requires each SU to handle complex computation and unrealistic channel estimation, which may Manuscript received November 17, 2010; revised March 8, 2011; accepted June 17, 2011. The associate editor coordinating the review of this letter and approving it for publication was D. I. Kim. Y. Xiao and G. Bi are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore (e-mail: [email protected], [email protected]). D. Niyato is with the School of Computer Engineering, Nanyang Technological University, Singapore (e-mail: [email protected]). Digital Object Identifier 10.1109/TWC.2011.090611.102049

be impossible for many practical systems. More specifically, the optimal power control methods reported in [2] [3] for the case of one secondary source-to-destination (SD) pair sharing the spectrum with one PU were derived by assuming the transmitters to know the instantaneous channel gains of both SU-to-SU and SU-to-PU channels. The results were extended to CR networks with multiple SD pairs [4] and multi-hop relaying SUs [5] based on the similar assumptions. Motivated by these limitations, a game theoretic framework is established in this paper to solve the power control problem of distributed CR networks with multiple secondary SD pairs and PUs. A simple distributed algorithm is proposed to achieve the following advantages: 1) the operations of each SU are simple and fully distributed, i.e., both SUs and PUs do not know the global information, and there is no central controller to manage the network. In addition, each PU in our setting broadcasts the same information to all SUs and each SU cannot communicate with others or obtain specific instructions from PUs, 2) the computational complexity of each SU is low and does not depend on the number of SUs, 3) the proposed algorithm can be directly applied to other resource control problems, e.g., spectrum allocation, time scheduling, etc. It is proved that, the CR network with this simple algorithm can achieve a time average performance as good as that achieved when the Nash equilibrium (NE) is chosen in hindsight. More specifically, we show that by using the proposed algorithm the average performance ( (of))each SU converges to an πœ–-NE at a rate of π‘‡πœ– = 𝑂 exp 1πœ– . This is a surprising result because finding the NE for multi-user networks is generally a challenging task even when the number of users is small [6, Chapter 2], and most of the previously reported NE-approaching algorithms only focus on the instantaneous performance and require more stringent conditions than ours. To further improve the convergence rate, a sub-optimal algorithm is also proposed to (approach a neighborhood of the ) NE at a rate of logπ‘‡πœ–π‘‡β€² β€² = 𝑂 πœ–1β€² . We discuss some potential πœ– extensions of our work and present numerical results to verify the performance of our algorithms for different applications. The rest of this paper is organized as follows. The network model and problem formation are discussed in section II. The proposed algorithm and its convergence result are presented in Sections III. Applications and numerical results are given in Section IV and the paper is concluded in Section V. II. N ETWORK M ODEL AND G AME F ORMULATION Consider a CR network in which 𝐾 secondary SD pairs, labeled as 𝑆1 to 𝐷1 , 𝑆2 to 𝐷2 , ..., 𝑆𝐾 to 𝐷𝐾 , simultaneously transmit signals in the same spectrum as that for 𝑀 PUs, labeled as 𝑃1 , 𝑃2 , ..., 𝑃𝑀 , as shown in Figure

c 2011 IEEE 1536-1276/11$25.00 ⃝

XIAO et al.: A SIMPLE DISTRIBUTED POWER CONTROL ALGORITHM FOR COGNITIVE RADIO NETWORKS

Fig. 1.

Network model for CR networks with multiple SD pairs.

1. Let the channel gain between 𝑆𝑖 and 𝐷𝑗 be β„Žπ‘†π‘– ,𝐷𝑗 for 𝑖, 𝑗 ∈ {1, 2, ..., 𝐾}, and that between 𝑆𝑖 and π‘ƒπ‘˜ be β„Žπ‘†π‘– ,π‘ƒπ‘˜ for 𝑖 ∈ {1, 2, ..., 𝐾}, π‘˜ ∈ {1, 2, ..., 𝑀 }. In a practical system, π‘ƒπ‘˜ for π‘˜ ∈ {1, 2, ..., 𝑀 } can only maintain a certain level of QoS if its received interference power is lower than the interference temperature limit, denoted by π‘žπ‘˜ . Let the transmit power of 𝑆𝑖 be 𝑀𝑖 . We can define the power constraints for SUs as follows: 𝑯 𝑃 π‘ˆ π’˜β€  ≀ 𝒒† , where † denotes the transpose of [𝑀1 , 𝑀2 , . . . , 𝑀𝐾 ], 𝒒 = [π‘ž1 , π‘ž2 , . . . , π‘žπ‘€ ], is given by ⎑ β„Žπ‘†1 ,𝑃1 β„Žπ‘†2 ,𝑃1 β‹… β‹… β‹… ⎒ β„Žπ‘†1 ,𝑃2 β„Žπ‘†2 ,𝑃2 β‹… β‹… β‹… ⎒ 𝑯𝑃 π‘ˆ = ⎒ .. .. .. ⎣ . . . β„Žπ‘†1 ,𝑃𝑀

β„Žπ‘†2 ,𝑃𝑀

(1) a matrix, π’˜ = and 𝑯 𝑃 π‘ˆ ∈ ℝ𝑀×𝐾 β„Žπ‘†πΎ ,𝑃1 β„Žπ‘†πΎ ,𝑃2 .. .

⎀ βŽ₯ βŽ₯ βŽ₯. ⎦

(2)

β‹… β‹… β‹… β„Žπ‘†πΎ ,𝑃𝑀

Based on the above notations, the received signal to noise ratio (SNR) of 𝐷𝑖 can be written as 𝑆𝑁 𝑅𝑖 =

βˆ‘

β„Žπ‘†π‘– ,𝐷𝑖 𝑀𝑖 . β„Žπ‘†π‘— ,𝐷𝑖 𝑀𝑗 + πœŽπ‘–

(3)

π‘—βˆˆ{1,2,...,𝐾} π‘—βˆ•=𝑖

where if PUs keep sending signals during the SUs’ communication, πœŽπ‘– should contain both the transmit signals of PUs and the additive noise received by 𝑆𝑖 . However, if PUs are absent when SUs transmit, i.e., as in the time sharing spectrum (TSS) based CR networks [7], πœŽπ‘– should only contain the additive noise of 𝑆𝑖 . In this paper, the game theoretic method is used to investigate the power control problem for CR networks. In our game, players are SUs who share the spectrum with PUs. We define the revenue of the 𝑖th SD pair, denoted by π‘Ÿπ‘– , to be the benefit obtained by 𝑆𝑖 and 𝐷𝑖 from using the PUs’ spectrum. The price paid by 𝑆𝑖 , denoted by 𝑐𝑖 , is defined as the price charged by PUs for using the licensed spectrum. We also define the payoff of the 𝑖th SD pair, denoted by πœ‹π‘– , to be the difference between the revenue and price, i.e., πœ‹π‘– = π‘Ÿπ‘– βˆ’ 𝑐𝑖 . In this paper, we assume the revenue and payoff of 𝑆𝑖 to be the function of 𝑆𝑁 𝑅𝑖 defined in (3). Let us consider a finitely repeated game model [8] in which each SU plays the game repeatedly. By using subscript [𝑑] to denote the parameters and operations in the 𝑑th time slot, the main objective of the 𝑖th SD pair is to maximize its

3595

βˆ‘ time average payoff 𝑇1 𝑇𝑑=1 πœ‹π‘– (π’˜ [𝑑] ) over 𝑇 time slots of transmission without causing the adverse effects on other SD pairs. This is different from most of the previously reported work in repeated game where each player only cares about the payoff of the last iteration, i.e., payoff in the 𝑇 th time slot. Our setting has more practical meaning for CR networks because most mobile devices can tolerate a few periods of β€œbad" performance if the average payoff is good. It is assumed that each player cares the performance of the future as same as that of the present and hence the time discount factor [8, Definition 6.1.2] is 1. The result with other choice of the time discount factor can be similarly obtained. The main objective is to find a balance point of the entire network, called Nash Equilibrium (NE), in which each SD pair cannot further improve its payoff by choosing a different transmit power, given the transmit powers of other SUs. The formal definition of the NE is given as follows. Definition 1. [8, Definition 3.3.4] A strategy profile π‘€π‘–βˆ— is at a Nash equilibrium (NE) if, for every player 𝑖 and every strategy βˆ— ) 𝑀𝑖 , π‘€π‘–βˆ— is at least as good as the strategy profile (𝑀𝑖 , π‘€βˆ’π‘– in which the player 𝑖 chooses 𝑀𝑖 while other players choose βˆ— π‘€βˆ’π‘– , i.e., for every player 𝑖, βˆ— βˆ— πœ‹π‘– (π‘€π‘–βˆ— , π‘€βˆ’π‘– ) β‰₯ πœ‹π‘– (𝑀𝑖 , π‘€βˆ’π‘– ),

(4)

where subscript βˆ’π‘– means all the players except player 𝑖. We also define a strategy profile to be πœ–-Nash equilibrium (πœ–-NE), if this strategy profile is within the distance of πœ– to the payoff achieved by a NE, i.e., the following condition needs to be satisfied, ( ) ( ) βˆ— βˆ— βˆ’ πœ‹π‘– 𝑀𝑖 , π‘€βˆ’π‘– ≀ πœ– for πœ– > 0. (5) πœ‹π‘– π‘€π‘–βˆ— , π‘€βˆ’π‘– Finding the NE of the multi-user network is difficult and intractable [6, Chapter 2]. In this paper, we try to develop an algorithm that, during 𝑇 time slots of repeated power control games, can achieve the average performance nearly as good as the system with the NE decision being chosen in hindsight, i.e., we have 𝑇 2 ( ) 1 βˆ‘ min 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜βˆ— ) 2 = 0 𝑇 β†’βˆž 𝑇 π‘™βˆˆ{1,...,𝑑} 𝑑=1 [ ] where 𝝅(π’˜ [𝑙] ) = πœ‹1 (π’˜[𝑙] ), πœ‹2 (π’˜ [𝑙] ), ..., πœ‹πΎ (π’˜[𝑙] ) .

lim

(6)

III. M AIN R ESULTS Algorithm 1 is illustrated below. 1) Initialization: Let the transmit signal of 𝑆𝑖 be π‘₯𝑖 . Consider the transmission of the 𝑖th SD pair. During the first two time slots, i.e., 𝑑 ∈ {1, 2}, a) 𝑆𝑖 first sends signals π‘₯𝑖[1] and π‘₯𝑖[2] with powers 𝑀𝑖[1] and 𝑀𝑖[2] , respectively, b) After receiving the signal sent by 𝑆𝑖 , 𝐷𝑖 , observed its received SNR, feedbacks the revenue functions π‘Ÿπ‘–[1] and π‘Ÿπ‘–[2] in the first and second time slots, respectively. Each PU π‘ƒπ‘˜ also sends the prices π‘π‘˜[1] and π‘π‘˜[2] to 𝑆𝑖 during the first two time slots. 2) Iteration: For 𝑑 = 3 : 𝑇 , a) In βˆ‘πΎtime slot 𝑑, π‘ƒπ‘˜ monitors its interference power 𝑖=1 β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖[𝑑] . If the interference powers of all

3596

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 11, NOVEMBER 2011

PUs satisfy (1), π‘ƒπ‘˜ only sends price 𝑐𝑖[𝑑] to 𝑆𝑖 , and then 𝑆𝑖 updates its transmit power as follows, )+ ( (7) 𝑀𝑖[𝑑] = 𝑀𝑖[π‘‘βˆ’1] βˆ’ 𝛿𝑖[π‘‘βˆ’1] 𝑔𝑖[𝑑] , where (β‹…)+ = max{0, β‹…}, 𝑔𝑖[𝑑] is a subgradient [9] of πœ‹π‘–[𝑑] which is a function that satisfies the relation ( ) ( ) β‰₯ πœ‹π‘–[π‘‘βˆ’1] π’˜[π‘‘βˆ’1] πœ‹π‘–[𝑑] π’˜[𝑑] ( ) +𝑔𝑖[𝑑] π’˜[𝑑] βˆ’ π’˜ 𝑖[π‘‘βˆ’1] , (8) and 𝛿𝑖[π‘‘βˆ’1] is the step size of the 𝑑th iteration, defined 𝑒𝑖 as 𝛿𝑖[π‘‘βˆ’1] = π‘‘βˆ’1 where 𝑒𝑖 is the step size coefficient which is a constant controlling the iteration speed, b) However, if the interference powers of some PUs exceed the interference temperature limit, each of these PUs should transmit more information to help SUs to adjust the transmit powers during the subsequent iterations. More specifically, βˆ‘ assuming π‘ƒπ‘˜ observes 𝐾 high interference power, i.e., 𝑖=1 β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖[𝑑] > π‘žπ‘˜ , the operations of π‘ƒπ‘˜ , except for sending the price to SUs, are described as follows, i) π‘ƒπ‘˜ broadcasts a high-interference-message to inform all SUs that its interference power exceeds the limit. 𝑆𝑖 can decode this message and exploit it to obtain β„Žπ‘†π‘– ,π‘ƒπ‘˜ , ii) Because we assume each PU monitors its interference power in each iteration, π‘ƒπ‘˜ can calculate the interference power exceeding value πΌπ‘˜[𝑑] =

𝐾 βˆ‘

β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖[𝑑] βˆ’ π‘žπ‘˜ ,

(9)

𝑖=1

and the change of interference power in time slot 𝑑 π½π‘˜[𝑑] =

𝐾 βˆ‘

β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖[𝑑] βˆ’

𝑖=1

𝐾 βˆ‘

β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖[π‘‘βˆ’1] , (10)

𝑖=1

iii) By assuming the channel gains to be known by the receivers (i.e., assume a training code is involved in the transmit signals of SUs), π‘ƒπ‘˜ can exploit its received signal to calculate a constant βˆ‘πΎ Ξ¦π‘˜[𝑑] = 𝑖=1 β„Ž2𝑆𝑖 ,π‘ƒπ‘˜ . Each PU π‘ƒπ‘˜ broadcasts the constants πΌπ‘˜[𝑑] , π½π‘˜[𝑑] and Ξ¦π‘˜[𝑑] to all SUs, iv) 𝑆𝑖 , knowing β„Žπ‘†π‘– ,π‘ƒπ‘˜ (obtained in Step b-i)), updates its transmit power by 𝑀𝑖[𝑑]

=

[

𝑀𝑖[π‘‘βˆ’1] βˆ’ 𝛿𝑖[π‘‘βˆ’1] 𝑔𝑖[𝑑] (11) ( )]+ βˆ’1 βˆ’β„Žπ‘†π‘– ,π‘ƒπ‘˜ Ξ¦π‘˜[π‘‘βˆ’1] πΌπ‘˜[π‘‘βˆ’1] βˆ’ π½π‘˜[π‘‘βˆ’1] .

If more than one PU detects higher-than-tolerate interference power, they should sequentially repeat the operations from Steps b-i) to b-iv) until the transmit powers of all SUs satisfy (1). 3) Termination: The above process continues until the obtained payoff is close to the optimal value within an acceptable range, i.e., βˆ₯πœ‹π‘–[𝑑] (π’˜ [𝑑] ) βˆ’ πœ‹π‘–[𝑑] (π’˜βˆ— )βˆ₯22 ≀ πœ–, or the number of time slots reaches 𝑇 , i.e., 𝑑 = 𝑇 . The main idea of Algorithm 1 is that if the transmit powers of SUs satisfy (1), each SU maximizes its payoff by using

the subgradient method, as shown in Step 2-a). If any PUs detect the higher-than-tolerable interference levels, they will broadcast several constants, i.e., π‘ƒπ‘˜ broadcasts Ξ¦π‘˜ , πΌπ‘˜ and π½π‘˜ defined in Step 2) to all SUs, and SUs use these constants to project their transmit powers into the convex hull defined in (1). Note that simply projecting the transmit powers of all SUs to (1) requires each PU to know the information of all other PUs, which does not meet the requirements that PUs cannot communicate with each other. Hence, in Algorithm 1, if more than one PU detect higher-than-tolerable interference power, each of them informs SUs to project their powers to the corresponding linear equation in the convex hull defined in (1) one by one. This setting will not result in much adverse effects on the convergence performance of Algorithm 1 because we always assume 𝑇 ≫ 𝐾. Also if the transmit powers of SUs increase gradually, only a few PUs will first detect high-thantolerable interference powers in each time slot. In other words, the number of iterations used on the projection operation is negligible as the total number of iterations becomes large. Note that our algorithm is different from that proposed in [10] in which each SU needs to communicate with its nearby SUs to make decisions based on the β€œconsensus" among them. In our algorithm, each PU (or SU) cannot communicate with its nearby PUs (or SUs), and hence can be directly applied into many practical systems, i.e., the cellular based mobile network. Theorem 1. If the following assumptions A1) The iteration step sizes are bounded, i.e., βˆ₯𝑔𝑖[𝑑] βˆ₯22 ≀ 𝑔𝑖+ , where 𝑔𝑖+ is a constant, A2) The difference of power values between two iterations is bounded, i.e., βˆ₯𝑀𝑖[𝑑] βˆ’ 𝑀𝑖[𝑠] βˆ₯22 ≀ 𝑀𝑖+ for 𝑑 βˆ•= 𝑠 and 𝑑, 𝑠 ∈ {1, ..., 𝑇 }, where 𝑀𝑖+ is a constant, A3) The payoff for the 𝑖th SD pair is a continuous function of 𝑀𝑖 , are satisfied, then Algorithm 1 has the following properties P1) It converges to a stationary point if 𝑇 is large enough, P2) If all SD pairs use Algorithm 1, the time average payoff of 𝑆𝑖 converges to an πœ–-NE at a rate of ( ( )) 𝑂 exp 1πœ– 1 , i.e., 2 π‘‡πœ– 1 βˆ‘ ) ( 𝝅 π’˜[𝑑] βˆ’ 𝝅 (π’˜βˆ— ) ≀ πœ–. (12) π‘‡πœ– 𝑑=1

2

Proof: See Appendix A. Note that the convergence performance of Algorithm 1 is closely related to the combination of two important parameters: the initial value 𝑀𝑖[1] of transmit powers and the iteration step size 𝑒𝑖 . If 𝑀𝑖[1] and 𝑒𝑖 satisfies βˆ£π‘€π‘–[1] βˆ’ π‘€π‘–βˆ— ∣ β‰ˆ 𝑒𝑖 , Algorithm 1 could approach to the neighborhood of a NE within a few iterations. However, if 𝑀𝑖[1] and 𝑒𝑖 are improperly chosen, the convergence rate of Algorithm 1 will be very slow. This slow convergence rate is due to the fact that we require 𝑀𝑖 to reach π‘€π‘–βˆ— exactly without assuming any information about the systems or channel gains to be known by SUs. The slow 1 In this paper, we follows Bachmann-Landau notations: 𝑓 = 𝑂(𝑔) if (𝑛) < +∞. lim 𝑓𝑔(𝑛)

π‘›β†’βˆž

XIAO et al.: A SIMPLE DISTRIBUTED POWER CONTROL ALGORITHM FOR COGNITIVE RADIO NETWORKS

𝑀𝑖+ 𝐿

and 𝑀𝑖[𝑑] is calculated by using either (7) (if the power constraint in (1) is satisfied) or (11) (if (1) is not satisfied) in Algorithm 1. The NE is a balance point where each player achieves locally optimal solution and hence has no incentive to deviate from this point. In other words, we can always find a neighborhood, denoted as 𝝌 = [πœ’1 , πœ’2 , ..., πœ’πΎ ], for the NE that all the elements in this neighborhood cannot achieve βˆ— )β‰₯ higher performance than that of the NE, i.e., πœ‹π‘– (π‘€π‘–βˆ— , π‘€βˆ’π‘– βˆ— πœ‹π‘– (π’˜ Β± Ξ”π’˜) where Ξ”π’˜ = [Δ𝑀1 , Δ𝑀2 , ..., Δ𝑀𝐾 , ] and 0 < Δ𝑀𝑖 < πœ’π‘– for 𝑖 ∈ {1, 2, ..., 𝐾}. It is easy to observe that if π’˜ [𝑑] βˆ’ π’˜[𝑑+1] > 𝝌, Algorithm 2 may not converge to a NE. Let us summarize our observations and present the main result for Algorithm 2 as follows. 𝛿ˆ 𝑔+

Theorem 2. If 𝑀𝑖 ∈ 𝒲𝑖 , πœ’π‘– ≫ 𝑖2 𝑖 βˆ€ 𝑖 ∈ {1, 2, ..., 𝐾} and Assumptions A1)-A3) 1 ]are satisfied, Algorithm 2 [ Λ† + Λ†in +Theorem + 𝛿ˆ𝐾 𝑔𝐾 𝛿1 𝑔1 𝛿2 𝑔2 neighborhood of a NE, approaches a 2 , 2 , ..., 2 ) ( ) 2 ( πœ–β€² 1 π‘‡βˆ‘ 𝛿ˆ𝑖 𝑔𝑖+ 𝛿ˆ𝑖 𝑔𝑖+ βˆ— βˆ— βˆ’π… π’˜ Β± 2 ≀ i.e., 𝑇 β€² 𝝅 𝑀𝑖[𝑑] , π‘€βˆ’π‘–[𝑑] Β± 2 πœ– 𝑑=1 2 (1) 𝛿ˆ𝑖 𝑔𝑖+ π‘‡πœ–β€² β€² β€² πœ– , at a rate of log 𝑇 β€² = 𝑂 πœ–β€² , where πœ– = βˆ£πœ– βˆ’ 2 ∣ and πœ– 𝑀+ 𝛿ˆ𝑖 = 𝑖 . 𝐿

Proof: See Appendix B. IV. A PPLICATIONS AND N UMERICAL R ESULTS In this section, the proposed algorithm is applied to the network utility maximization problem to evaluate its performance. We assume that each SU has an objective to maximize its achievable rate and define the utility function of 𝑆𝑖 as π‘Ÿπ‘– (𝑀𝑖 ) = 𝛾𝑖 log (1 + 𝑆𝑁 𝑅𝑖 ) where 𝑆𝑁 𝑅𝑖 is defined in (3) and 𝛾𝑖 is a constant. Since Algorithm 2 can be regarded as a special case of Algorithm 1, we only present the numerical results for Algorithm 1. Consider a special case where SUs are far from each other β„Ž 𝑀 𝑖 𝑖 . Assume PUs do not charge any and 𝑆𝑁 𝑅𝑖 β‰ˆ 𝑆𝑖 ,𝐷 πœŽπ‘– prices for SUs if the transmit powers of SUs satisfy (1). It

0.6

t=1

Average Revenue: (1/T) Ξ£ T r[t]

convergence performance of Algorithm 1 can be improved by assuming more information to be observed by SUs. For example, if we assume that 𝑆𝑖 knows the payoff functions, or both the revenue and pricing functions, the optimization problem can be converted into the Lagrangian dual problem [11] which will be discussed in the next section. Another way to improve the convergence rate of Algorithm 1 is to decrease the required accuracy of the results. In practical digital systems, mobile devices cannot adjust their parameters with an infinite accuracy, i.e., the value of 𝑀𝑖 can only be chosen from a finite discrete set. In the rest of this section, we consider a simple case in which the transmit power of each SU is linearly quantized into 𝐿 levels and 𝑀𝑖 can only be chosen from this finite set, i.e., 𝑀𝑖 ∈ 𝒲𝑖 where 𝑀 + 2𝑀 + 𝒲𝑖 = {0, 𝐿𝑖 , 𝐿𝑖 , ..., 𝑀𝑖+ }. Let us describe Algorithm 2 as follows. Algorithm 2: Each SU adjusts its transmit power by using the exact same procedures as Algorithm 1. The only difference is that, in the 𝑑th iteration, the transmit power of 𝑆𝑖 is 𝑀𝑖[𝑑] = Λ† Λ† 𝑙𝛿ˆ𝑖 if 𝑙𝛿ˆ𝑖 βˆ’ 𝛿2𝑖 < 𝑀𝑖[𝑑] < 𝑙𝛿ˆ𝑖 + 𝛿2𝑖 where 𝑙 ∈ {1, 2, ..., 𝐿}, 𝛿ˆ𝑖 =

3597

0.5

0.4 u=2 u=4 u=6 Dual Method Optimal Value

0.3

0.2

0.1

0

0

20

40

60

80 Iteration

100

120

140

Fig. 2. Comparison of different algorithms, where 𝑀 = 1, 𝐾 = 10, π‘žπ‘˜ = 2, for 𝑖 ∈ {1, 2, ..., 𝐾}, π‘˜ ∈ {1, 2, ..., 𝑀 }.

is observed that in this case the payoff function πœ‹π‘– (π’˜) of 𝑆𝑖 has the following features: 1) it is continuous in π’˜, 2) it is concave in 𝑀𝑖 , 3) it has a continuous first derivative with respect to 𝑀𝑖 , and 4) there exists π‘Ÿ = {π‘Ÿ1 , π‘Ÿ2 , ..., π‘ŸπΎ } > 0 such βˆ‘πΎ that 𝑖=1 π‘Ÿπ‘– πœ‹π‘– (π’˜) is diagonally strictly concave. Following the same methods as in [12], we can claim that for this CR network the NE is unique and corresponds to the global utility maximization point [11]. In other words, if all SUs use Algorithm 1 to adjust their transmit powers, the average payoff of the network will converge to the global utility maximization 𝑇 ( ) βˆ‘ βˆ‘πΎ 1 πœ‹[𝑑] π’˜ [𝑑] for πœ‹[𝑑] = 𝐾 point, defined as max 𝑇1 𝑖=1 πœ‹π‘–[𝑑] π’˜

𝑑=1

under the power constraint defined in (1). To demonstrate the convergence performance of Algorithm 1, the results of the Lagrangian dual methods discussed in [11] are also provided. In this method, 𝑆𝑖 iteratively chooses the optimal Lagrangian coefficients to maximize its payoff (see [11] for the detailed description of the dual method). In Figure 2, we compare the convergence rates of Algorithm 1 and the dual method. It is observed that the dual method generally converges to the optimal value at a faster rate than Algorithm 1. However, each SU in the dual method needs to know the payoff functions of all SUs and has to search for the optimal power to minimize the objective function in each iteration, which incurs much more computational complexity and communication overhead than those of our proposed algorithm. In addition, Figure 2 shows that if the step size is chosen optimally, the convergence rate of Algorithm 1 could outperform that of the dual methods. Let us consider a more general case as follows. Define the revenue of 𝑆𝑖 as π‘Ÿπ‘– = 𝛼𝑖 log (1 + 𝑆𝑁 𝑅𝑖 ) where 𝑆𝑁 𝑅𝑖 is given in (3) and 𝛼𝑖 is a constant. The pricing function charged 𝑀 βˆ‘ by all PUs from 𝑆𝑖 is given by 𝑐𝑖 = 𝛽𝑖 β„Žπ‘†π‘– ,π‘ƒπ‘˜ 𝑀𝑖 where π‘˜=1

𝛽𝑖 is a constant. Note that this problem is not convex and is generally impossible to efficiently find the global optimal solution [13]. In this case, Algorithm 1 may not converge to the global utility maximization point, but still can converge to a NE. The convergence results of Algorithm 1 with different parameters in this case are presented in Figures 3 and 4. As

3598

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 11, NOVEMBER 2011

0.14

1

0.12

0.9

w decided by the PUs (w = h

0.1

Average Payoff: (1/T) Ξ£T Ο€[t]

u=1.5 u=2 u=2.5 u=3

0.08 0.06

i[1] S ,P i

\q )

k

k

0.8

t=1

Average Payoff: (1/T) Ξ£T Ο€

t=1 [t]

i[1]

Power Control with Algorithm 1 (400 iterations) Power Control with Algorithm 1 (300 iterations) Power Control with Algorithm 1 (200 iterations) Power Control with Algorithm 1 (100 iterations)

0.04 0.02 0

0.7 0.6 0.5 0.4 0.3

βˆ’0.02 βˆ’0.04

50

100 150 Number of Iterations

200

250

0.2

1

1.5

2

2.5

3 3.5 Distance dS ,D i

Fig. 3. Convergence rate of Algorithm 1 with different step sizes, where 𝑀𝑖[1] is the least squares solution of 𝑯 𝑃 π‘ˆ π’˜ † = 𝒒 † , 𝛼𝑖 = 10, 𝛽𝑖 = 0.1, 𝑀 = 5, 𝐾 = 10, π‘žπ‘˜ = 5, for 𝑖 ∈ {1, 2, ..., 𝐾}, π‘˜ ∈ {1, 2, ..., 𝑀 }.

4

4.5

5

i

Fig. 5. Payoffs of power control achieved by Algorithm 1 and fixed transmit power (𝑀𝑖[1] = β„Žπ‘†π‘– ,π‘ƒπ‘˜ βˆ–π‘žπ‘˜ ) under different 𝑑𝑆𝑖 ,𝐷𝑖 , where 𝛼𝑖 = 10, 𝛽𝑖 = 0.1, 𝑀 = 5, 𝐾 = 10, π‘žπ‘˜ = 2, 𝑒𝑖 = βˆ₯𝑔 1 βˆ₯2 , for 𝑖 ∈ {1, 2, ..., 𝐾}, π‘˜ ∈ {1, 2, ..., 𝑀 }.

𝑖[𝑑] 2

βˆ’0.14 βˆ’0.16

Average Payoff: (1/T) Ξ£T Ο€

t=1 [t]

βˆ’0.18

wi[1] = 0.75*hik\q

βˆ’0.2

wi[1] = hik\q wi[1] = 1.5* hik\q

βˆ’0.22

wi[1] = 2* hik\q

βˆ’0.24 βˆ’0.26 βˆ’0.28 βˆ’0.3 βˆ’0.32 βˆ’0.34

0

100

200 300 Number of Iterations

400

500

Fig. 4. Convergence rate of Algorithm 1 with different initial values, where 𝑀𝑖[1] = β„Žπ‘†π‘– ,π‘ƒπ‘˜ βˆ–π‘žπ‘˜ means 𝑀𝑖[1] is the least squares solution of 𝑯 𝑃 π‘ˆ π’˜β€  = 𝒒, 𝛼𝑖 = 10, 𝛽𝑖 = 0.1, 𝑀 = 5, 𝐾 = 10, π‘žπ‘˜ = 5, 𝑒𝑖 = βˆ₯𝑔 1 βˆ₯2 , for 𝑖 ∈ {1, 2, ..., 𝐾}, π‘˜ ∈ {1, 2, ..., 𝑀 }.

𝑖[𝑑] 2

observed in Section III, the convergence rate of Algorithm 1 depends on the initial transmit powers of SUs and the iteration step size. It is observed that if 𝑀𝑑[1] has a distance of 𝑒𝑖 from a NE, only a few number of iterations are required to approach the performance of this NE. However, if the initial transmit powers are not properly chosen, the adjustment of Algorithm 1 on the transmit powers of SUs may require a large number of iterations. Similarly, an optimal value of 𝑒𝑖 should be close to the distance between 𝑀𝑖[1] and π‘€π‘–βˆ— . However, if no information about initial transmit power and the optimal power are known, on one hand, a large step size may lead to high fluctuations during the first few iterations and, on the other hand, a small step size will cause slow convergence rate. The above observation shows the importance of choosing proper combinations of initial powers and step sizes. In a practical system, SUs can first send the training code to let PUs to decide proper initial values of SUs’ transmit powers. Also, the step size of each iteration, chosen by each SD pair, can

be adjusted if more information can be observed or more feedback messages can be received during the communication, i.e., the dual methods. Finding the distributed algorithms to allow iterative improvement of the step size in Algorithm 1 will be our future work. Let us consider the numerical results of CR networks with Algorithm 1. Denote the distance between two users 𝑝 and π‘ž as 𝑑𝑝,π‘ž for 𝑝, π‘ž ∈ [𝑆1 , 𝑆2 , ..., 𝑆𝐾 ] βˆͺ [𝐷1 , 𝐷2 , ..., 𝐷𝐾 ] βˆͺ [𝑃1 , 𝑃2 , ..., 𝑃𝑀 ] and consider the following channel models, πœ‚ ˜ 𝑖𝑗 /π‘‘πœ‚ ˜ ˜ β„Žπ‘–π‘— = β„Ž 𝑆𝑖 ,𝐷𝑗 and β„Žπ‘–π‘˜ = β„Žπ‘–π‘˜ /𝑑𝑆𝑖 ,π‘ƒπ‘˜ , where β„Žπ‘–π‘— and ˜ β„Žπ‘–π‘˜ are average channel fading coefficients unrelated to the distance of the transmission and πœ‚ is the channel attenuation exponent. Assume that SUs are located on a regular planar network, i.e., 𝑑𝑆𝑖 ,π‘ƒπ‘˜ = 𝑑𝑆𝑗 ,𝑃𝑙 , 𝑑𝑆𝑖 ,𝐷𝑖 = 𝑑𝑆𝑗 ,𝐷𝑗 , √ 2 𝑑𝑆𝑖 ,𝑆𝑗 + 𝑑2𝑆𝑗 ,𝐷𝑗 and 𝑑𝑆𝑖 ,𝑆𝑖+1 = 𝑑𝐷𝑗 ,𝐷𝑗+1 , for 𝑑𝑆𝑖 ,𝐷𝑗 = 𝑖, 𝑗 ∈ {1, 2, ..., 𝐾} and π‘˜, 𝑙 ∈ {1, 2, ..., 𝑀 }. In Figure 5, the average payoff of the network obtained by using Algorithm 1 with different 𝑑𝑆𝑖 ,𝐷𝑖 is shown and compared with that of the fixed transmit power method. It is observed that the proposed algorithm greatly improves the performance of CR networks. More importantly, even with a small number of iterations, Algorithm 1 can achieve a significant payoff improvement.

V. C ONCLUSION In this paper, the power control problem for SSS based CR networks with multiple secondary SD pairs and PUs has been investigated. A simple distributed algorithm has been proposed to iteratively improve the performance of CR networks. It has been proved that the proposed converges to an πœ–)) ( ( algorithm NE at a speed of π‘‡πœ– = 𝑂 exp 1πœ– . A sub-optimal algorithm has been also proposed to converge ( ) to a neighborhood of a NE at a rate of logπ‘‡πœ–π‘‡β€² β€² = 𝑂 πœ–1β€² . Numerical results have πœ– been presented to show the convergence rates under different settings.

XIAO et al.: A SIMPLE DISTRIBUTED POWER CONTROL ALGORITHM FOR COGNITIVE RADIO NETWORKS

{ π’˜[𝑑+1] =

π’˜[𝑑] βˆ’ 𝛿[𝑑] π’ˆ [𝑑] ,

( )βˆ’1 ( ) 𝑯 𝑃 𝑄 π’˜[𝑑] βˆ’ 𝑯 𝑃 𝑄 𝜹 [𝑑] π’ˆ [𝑑] βˆ’ 𝒒 , π’˜[𝑑] βˆ’ 𝛿[𝑑] π’ˆ [𝑑] βˆ’ 𝑯 †𝑃 𝑄 𝑯 𝑃 𝑄 𝑯 †𝑃 𝑄

A PPENDIX A P ROOF OF T HEOREM 1

1 𝑇

𝑑=1

=

(𝑏)

≀

(π‘Ž)

βˆ₯π’˜[𝑑+1] βˆ’ π’˜βˆ— βˆ₯22 =

1 𝑇

𝑇 βˆ‘

βˆ₯π’˜[𝑑] βˆ’ π’˜ βˆ— βˆ’ 𝜹 [𝑑] π’ˆ [𝑑] βˆ₯22

𝑑=1

𝑇 ( ) 1 βˆ‘[ βˆ₯π’˜[𝑑] βˆ’ π’˜βˆ— βˆ₯22 βˆ’ 2𝜹 [𝑑] π’ˆ [𝑑] π’˜[𝑑] βˆ’ π’˜ βˆ— 𝑇 𝑑=1 ] +𝜹 2[𝑑] βˆ₯π’ˆ [𝑑] βˆ₯22 𝑇 ) ( ( ) 1 βˆ‘[ βˆ₯π’˜[𝑑] βˆ’ π’˜ βˆ— βˆ₯22 βˆ’ 2𝜹 [𝑑] 𝝅 π’˜ [𝑑] βˆ’ 𝝅 (π’˜βˆ— ) 𝑇 𝑑=1 ] +𝜹 2[𝑑] βˆ₯π’ˆ [𝑑] βˆ₯22 , (14)

where (π‘Ž) and (𝑏) are obtained by using (7) and (8) in Algorithm 1, respectively. Equation (14) can be rewritten recursively as follows: 𝑇 1 βˆ‘ π’˜ [𝑑+1] βˆ’ π’˜βˆ— 2 ≀ π’˜[1] βˆ’ π’˜ βˆ— 2 2 2 𝑇 𝑑=1

βˆ’

𝑇 𝑑 ( ( ) ) 2 βˆ‘βˆ‘ 𝜹 [𝑙] 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜ βˆ— ) 𝑇 𝑑=1 𝑙=1

𝑇 𝑑 1 βˆ‘βˆ‘ 2 2 + 𝜹 [𝑙] π’ˆ [𝑙] . 𝑇 𝑑=1 2

if 𝑯 𝑃 π‘ˆ π’˜[𝑑] ≀ 𝒒 𝑗 ,

(13)

otherwise,

as follows:

From Definition 1, it is observed that for a NE, a neighborhood can always be found in which all the elements in this neighborhood have lower payoff than the NE. By assuming all payoff functions of SUs to be continuous, the neighborhood of the NE can be regarded as a quasiconcave hull, i.e., for 𝝌 = [πœ’1 , πœ’2 , ..., πœ’πΎ ] neighborhood of a NE, we have πœ‹π‘– (π’˜βˆ— Β± Ξ”π’˜) < πœ‹π‘– (π’˜) where π’˜ ∈ [π’˜βˆ— βˆ’ Ξ”π’˜, π’˜βˆ— + Ξ”π’˜] and Δ𝑀𝑖 ≀ πœ’π‘– . Since Algorithm 1 uses a decreasing step size for iteration, it will finally fall into a small neighborhood of the NE. Therefore, if Algorithm 1 is proved to converge to a stationary point in which all elements in a neighborhood of that point has lower payoffs, we can claim that this point is the NE and Algorithm 1 converges. Defining π’ˆ [𝑑] = [𝑔1[𝑑] , 𝑔2[𝑑] , ..., 𝑔𝐾[𝑑] ]† , we can re-write (11) in Algorithm 1 to the vector form in (13) at the top of next page. In this figure, 𝑯 𝑃 𝑄 is a sub-matrix of 𝑯 𝑃 π‘ˆ which only contains the channel gains connected with one PU observing high interference noises in its rows, and 𝜹 [𝑑] = diag[𝛿1[𝑑] , 𝛿2[𝑑] , ..., 𝛿𝐾[𝑑] ]. Let us first consider the case that the transmit powers of the SUs always satisfy (1). Denoting a NE achieving power βˆ— † ] , control schemes for all the SUs as π’˜ βˆ— = [𝑀1βˆ— , 𝑀2βˆ— , ..., 𝑀𝐾 we have 𝑇 βˆ‘

3599

(15)

𝑙=1

βˆ‘π‘‡ Note that we have 𝑇1 𝑑=1 βˆ₯π’˜[𝑑+1] βˆ’ π’˜βˆ— βˆ₯22 β‰₯ 0, and the second term in the right-hand-side of (15) can be expressed

𝑇 𝑑 ( ( ) ) 2 βˆ‘βˆ‘ 𝜹 [𝑙] 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜βˆ— ) (16) 𝑇 𝑑=1 𝑙=1 ( 𝑑 ) 𝑇 ] [ ( ) 2 βˆ‘ βˆ‘ β‰₯ 𝜹 [𝑙] min 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜βˆ— ) 𝑇 𝑑=1 π‘™βˆˆ[1,𝑑] 𝑙=1 ( ) 𝑇 𝑇 𝑑 (𝑐) [ ( ) ] 2 βˆ‘βˆ‘ 1βˆ‘ β‰₯ 𝜹 [𝑙] min 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜ βˆ— ) 𝑇 𝑑=1 𝑇 𝑑=1 π‘™βˆˆ[1,𝑑] 𝑙=1

where (𝑐) comes from that fact that βˆ‘π‘‡ βˆ‘π‘‘ 1 1 𝑑=1 𝑙=1 𝑙 . 𝑇 Substituting (16) into (15), we have 𝑇 [ ( ) ] 1 βˆ‘ min 𝝅 π’˜ [𝑑] βˆ’ 𝝅 (π’˜βˆ— ) 𝑇 𝑑=1 π‘™βˆˆ[1,𝑑]

≀

π’˜[1] βˆ’ π’˜ βˆ— 2 + 2 2 𝑇

1 𝑇

𝑇 βˆ‘

𝑇 βˆ‘ 𝑑 βˆ‘

𝑑=1 𝑙=1 𝑑 βˆ‘

𝑑=1 𝑙=1

βˆ‘π‘‘

1 𝑙=1 𝑙

2 𝜹 2[𝑙] π’ˆ [𝑙] 2

.

β‰₯

(17)

𝜹 [𝑙]

Substituting the step size function 𝜹 [𝑙] = 𝒖𝑙 for 𝒖 = [𝑒 equation and using the result βˆ‘] ∞into1 the above βˆ‘1𝑑, 𝑒2 ,1..., 𝑒𝐾 πœ‹ < = , and the properties of Harmonic 𝑙=1 𝑙2 βˆ‘ 𝑙=1 𝑙2 6 𝑑 1 βˆ’1 1 βˆ’2 1 number: βˆ’ 12 𝑑 + 𝑂(π‘‘βˆ’4 ) β‰ˆ 𝑙=1 𝑙 = log 𝑑 + 2 𝑑 1 βˆ’1 1 βˆ’2 Λ™ the following results can be obtained: log 𝑑+ 2 𝑑 βˆ’ 12 𝑑 + πœ…, 𝑇 ] [ ( ) 1 βˆ‘ min 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜βˆ— ) 𝑇 𝑑=1 π‘™βˆˆ[1,𝑑] + βˆ‘π‘‡ πœ‹ (𝑑) π’˜ + + π’˜π‘‡ 𝑑=1 6 ≀ 2 βˆ‘π‘‡ βˆ’1 + πœ…) Λ™ 𝑑=1 (log 𝑑 + 0.5𝑑 𝑇 πœ… Β¨ β‰ˆ 2 βˆ‘π‘‡ log 𝑇 +0.5𝑇 βˆ’1 +πœ…Λ™ log 𝑑 + + 2πœ…Λ™ 𝑑=1 𝑇 𝑇

(18)

where (𝑑) is obtained from Assumptions A1) and A2) in Theorem 1, and βˆ‘ πœ… Β¨ is a constant defined as πœ… Β¨ = π’˜+ + 𝑇 +πœ‹ 2 and hence π’ˆ 6 . Because 𝑑=1 log 𝑑 = Θ(𝑇 log 𝑇 ) βˆ‘π‘‡ log 𝑇 +0.5𝑇 βˆ’1 1 β†’ lim𝑇 β†’βˆž 𝑇 𝑑=1 log 𝑑 β†’ ∞ and lim𝑇 β†’βˆž 𝑇 0, it can be claimed that Algorithm 1 converges to a stationary point. Assume that for 𝑇 β‰₯ π‘‡πœ– and π‘‡πœ– is a very large number, we try to achieve the accuracy of 𝑇 [ ( ) ] βˆ‘ 1 min 𝝅 π’˜[𝑙] βˆ’ 𝝅 (π’˜βˆ— ) = πœ–. From (18) and con𝑇 𝑑=1 π‘™βˆˆ[1,𝑑]

cavity of logarithm function, the following results can be 2 Again, we follow Bachmann-Landau notations: 𝑓 = Θ(𝑔) if 𝑓 = 𝑂(𝑔) and 𝑔 = 𝑂(𝑔)

3600

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 11, NOVEMBER 2011

obtained, πœ… Β¨ πœ–

π‘‡πœ– log π‘‡πœ– + 0.5π‘‡πœ–βˆ’1 1 βˆ‘ log 𝑑 + + 2πœ…Λ™ β‰₯ lim π‘‡πœ– β†’βˆž π‘‡πœ– π‘‡πœ– 𝑑=1 ( ) ( ) π‘‡πœ– π‘‡πœ– + 1 1 βˆ‘ = lim log 𝑑 = log 𝑇 β†’βˆž π‘‡πœ– 𝑑=1 2 ( ( )) 1 β‡’ π‘‡πœ– = 𝑂 exp . πœ–

Therefore, we can claim that by using Algorithm 1, the average payoff )) networks converges to πœ–-NE at a speed ( of ( SU of π‘‡πœ– = 𝑂 exp 1πœ– . Consider the case that at least one PU observes the higherthan-tolerable interference power. By multiplying (13) with 𝑯 𝑃 𝑄 , it can be easily shown that 𝑯 𝑃 𝑄 π’˜β€ [𝑑+1] always converges to 𝒒 † . Substituting 𝑯 𝑃 𝑄 π’˜β€ [𝑑+1] = 𝒒 † into (13), (13) ˜ [𝑑+1] π’ˆ [𝑑+1] , can be rewritten as π’˜[𝑑+2] = π’˜ [𝑑+1] βˆ’ 𝜹 [𝑑+1] π’ˆ ( )βˆ’1 ˜ [𝑑+1] = 𝑰 + 𝑯 †𝑃 𝑄 𝑯 𝑃 𝑄 𝑯 †𝑃 𝑄 𝑯 𝑃 𝑄 and 𝑰 is where π’ˆ the identity matrix. If we denote π’ˆ [𝑑] = π’ˆΛœ [𝑑] π’ˆ [𝑑] and assume βˆ₯˜ π’ˆ [𝑑] π’ˆ [𝑑] βˆ₯22 ≀ π’ˆ + , the same method as the previous case can be used to obtain the similar convergence rate.

A PPENDIX B P ROOF OF T HEOREM 2 Following the same steps as in Appendix A, let us consider the case in which each SU can only choose from 𝐿 quantized power levels, i.e., 𝑀𝑖 ∈ 𝒲𝑖 . In this case, if the initial point is not appropriately chosen, Algorithm 2 will be unstable for the first few iterations, i.e., fluctuating between different neighborhood of NEs. However, when the number of iterations is large, the transmit powers of SUs will approach to the neighborhood of a NE. Therefore, for a large number of iterations, Algorithm 2 can be regarded as Algorithm 1 with + a constant step size 𝜹 [𝑙] = πœΉΛ† where πœΉΛ† = π’˜πΏ is a constant. Let us substitute this step size in (17), the following results can be obtained,

𝑇 [ ( ) ] 1 βˆ‘ min πœ‹ π’˜[𝑙] βˆ’ πœ‹ (π’˜βˆ— ) 𝑇 𝑑=1 π‘™βˆˆ[1,𝑑]

≀

βˆ‘π‘‘ 2 𝑇 1 βˆ‘ π’˜+ + (πœΉΛ† π’ˆ + /𝑑) 𝑙=1 𝑙 Λ† βˆ‘π‘‘ 𝑙 𝑇 𝑑=1 (2𝜹/𝑑) 𝑙=1

2 𝑇 1 βˆ‘ π’˜+ + πœΉΛ† π’ˆ + (𝑑 + 1) = . 𝑇 𝑑=1 2πœΉΛ† (𝑑 + 1)

(19)

By using the same method as in Appendix A, we can claim that if the step size is fixed, the number of iterations for ( ) Λ† + 𝑇′ Algorithm 2 is given by logπœ–π‘‡ β€² = 𝑂 πœ–1β€² where πœ–β€² = πœ– βˆ’ πœΉπ’ˆ2 πœ– + and πœΉΛ† = π’˜ . 𝐿

R EFERENCES [1] S. Haykin, β€œCognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, pp. 201–220, 2005. [2] G. Amir and S. S. Elvino, β€œFundamental limits of spectrum-sharing in fading environments,” IEEE Trans. Wireless Commun., vol. 6, no. 2, pp. 649–658, 2007. [3] M. Gastpar, β€œOn capacity under receive and spatial spectrum-sharing constraints,” IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 471–487, 2007. [4] Z. Lan, Y.-C. Liang, and X. Yan, β€œJoint beamforming and power allocation for multiple access channels in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 26, pp. 38–51, 2008. [5] Y. Xiao, G. Bi, and D. Niyato, β€œGame theoretic analysis for spectrum sharing with multi-hop relaying,” IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1527–1537, May 2011. [6] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory. Cambridge University Press, 2007. [7] Q. Zhao and B. Sadler, β€œA survey of dynamic spectrum access,” IEEE Signal Process. Mag., vol. 24, no. 3, pp. 79–89, 2007. [8] Y. Shoham and K. Leyton-Brown, Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, 2008. [9] S. P. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004. [10] I. Lobel and A. Ozdaglar, β€œDistributed subgradient methods for convex optimization over random networks,” IEEE Trans. Automatic Control, vol. 56, no. 6, pp. 1291–1306, June 2011. [11] Y. Wei and R. Lui, β€œDual methods for nonconvex spectrum optimization of multicarrier systems,” IEEE Trans. Commun., vol. 54, pp. 1310–1322, 2006. [12] D. Mosk-Aoyama, β€œConvergence to and quality of equilibria in distributed systems,” Ph.D. dissertation, 2008. [13] G. Scutari and D. P. Palomar, β€œMIMO cognitive radio: a game theoretical approach," IEEE Trans. Signal Process., vol. 58, no. 2, pp. 761–780, 2010.

A Simple Distributed Power Control Algorithm for ...

the following advantages: 1) the operations of each SU are simple and ... It is proved that, the CR network with this simple algorithm ...... Wireless Commun., vol.

320KB Sizes 10 Downloads 323 Views

Recommend Documents

A Game theoretic Power Control algorithm with Pricing ...
Distance d; Mr -Transmitting antenna; ... mean path gain at a reference distance d = 1 km, s is a log- .... his Masters degree in Communication system.

A Fast Distributed Approximation Algorithm for ...
ists graphs where no distributed MST algorithm can do better than Ω(n) time. ... ¡(G, w) is the Γ’Β€ΒœMST-radiusҀ of the graph [7] (is a function of the graph topology asΒ ...

A distributed algorithm for minimum weight spanning trees ... - GitHub
displayed will be uniform (all nodes run the exact same code) and will require up to .... fragment it belongs to and in state Found at all other times. The algorithm.

A Fast Distributed Approximation Algorithm for ...
We present a fast distributed approximation algorithm for the MST problem. We will first briefly describe the .... One of our motivations for this work is to investigate whether fast distributed algo- rithms that construct .... and ID(u) < ID(v). At

A New Scheduling Algorithm for Distributed Streaming ...
Department of Computer Science and Technology, Tsinghua University, Beijing 100084 China. 1 This paper is ... Tel: +86 10 62782530; fax:+86 10 62771138; Email: [email protected]. Abstract ... In patching algorithm, users receive at.

A Distributed Clustering Algorithm for Voronoi Cell-based Large ...
followed by simple introduction to the network initialization. phase in Section II. Then, from a mathematic view of point,. derive stochastic geometry to form the algorithm for. minimizing the energy cost in the network in section III. Section IV sho

A Distributed Hardware Algorithm for Scheduling ...
This algorithm provides a deadlock-free scheduling over a large class of architectures ..... structure to dispatch tasks to the cores, e.g. one program running on aΒ ...

A Simple Distributed Identification Protocol for Triplestores - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, ... OAuth is associate degree open customary for authorization.

A Simple Distributed Identification Protocol for ... - IJRIT
Email-id: [email protected]. Abstract. OAuth is an open standard for authorization. OAuth provides a method for clients to access server resources onΒ ...

A Simple Distributed Identification Protocol for Triplestores - IJRIT
social network graph victimisation existing techniques. .... III. Distributed Identification Mechanism for Triplestores. This part we discuss the idea of using theΒ ...

A Simple Distributed Identification Protocol for Triplestores - IJRIT
applications access to user online private data to their server resources without sharing their credentials, using user-agent redirections. In this paper defines a simple ... the employment and unleash of specific information, like money or medical d

A Simple Algorithm for Clustering Mixtures of Discrete ...
mixture? This document is licensed under the Creative Commons License by ... on spectral clustering for continuous distributions have focused on high- ... This has resulted in rather ad-hoc methods for cleaning up mixture of discreteΒ ...

A simple algorithm for decoding Reed-Solomon codes ...
relation to the Welch-Berlekamp [2] and Euclidean algorithms [3], [4] is given. II. DEFINITIONS AND NOTATIONS. Let us define the (n, k, d) Reed-Solomon (RS) code over GF(q) with length n = q Γ’ΒˆΒ’ 1, number of information symbols k, designed distance d

Experiments in learning distributed control for a ... - Semantic Scholar
Aug 28, 2006 - Institute for Aerospace Studies, University of Toronto, 4925 Dufferin .... This may be done by way of a set of basis behaviours ..... We call the modified .... ings of IEEE International Conference on Evolutionary Computation,.

A Cultural Algorithm for POMDPs from Stochastic Inventory Control
CURL pseudo-code. CURL(S,P,pc,pm,α,λ,pl):. ( create population of size P evaluate population using S samples initialise the Q(s, a) while not(termination ...

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - eters are refined and the management horizon advances. The RHC .... energy transport model was used to drive the RHC algorithm qk | k.

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - managing soil irrigation with reclaimed water. The largest current .... To explain RHC, we .... information x(k) and the first control u*(k) is then used to calculate the state x(k Γ‘ΒŽ 1) ...... Technical Report NCSU-IE Technical Report

A Distributed Cooperative Power Allocation Method for Campus ...
in power system operation and control. Therefore, building- to-grid integration has recently attracted significant attention. in the smart grid research [3]Ҁ“[10].

A Distributed Cooperative Power Allocation Method for Campus ...
A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf. A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf.

Polynomial-time Optimal Distributed Algorithm for ...
Reassignment of nodes in a wireless LAN amongst access points using cell breathing ... monitor quantities, surveillance etc.) [8]. Authors in [9] have proposedΒ ...

A Distributed Algorithm to Achieve Transparent ... - CNSR@VT
Manuscript received July 9, 2015; revised January 18, 2016; accepted. May 27, 2016. ..... solve the problem of sorting and ranking n processors in a distributedΒ ...

A Distributed Algorithm to Achieve Transparent ... - CNSR@VT
that each active node's degree-of-freedoms (DoFs) allocated for ..... Accounting of DoF resource: In Table II, zi,j(t) represents ...... from the University of Florida.

Design of a Distributed Localization Algorithm to ...
GPS to jamming) by providing a cheap, low-power alternative that can exploit existing, readily ... In the robotic domain, angular sensors (e.g., monocularΒ ...

Polynomial-time Optimal Distributed Algorithm for ...
a reallocation problem is independent of the network size. Remark 2: The ... We now begin the proof of convergence of the proposed algorithm. Proof: Let gi. =.