Open access

Detection and Avoidance Scheme for DS-UWB System: A Step Towards Cognitive Radio

Written By

Shaoyi Xu and Rumin Yang

Submitted: 17 October 2010 Published: 01 August 2011

DOI: 10.5772/16953

From the Edited Volume

Novel Applications of the UWB Technologies

Edited by Boris Lembrikov

Chapter metrics overview

2,199 Chapter Downloads

View Full Metrics

1. Introduction

Cognitive radio (CR) improves spectrum efficiency to satisfy increasing demands on wireless transmission by dynamic spectrum access without interfering with legacy networks. In 2004, IEEE 802.22 Working Group was formed to develop a standard for wireless regional area networks (WRANs) based on CR technology (Hu et al et al., 2007). It is expected to obtain a broadband access to data networks on the vacant TV channels while avoiding harmful interference to licensed TV broadcasting in rural areas within a typical radius of 17km to 30km (Stevenson et al., 2006).

Ultra wideband radio (UWB), a promising technology, has found a myriad of exciting applications as well as generating a great deal of controversy, for its extremely broad bandwidth transmission as well as its revolutionary way of overlaying coexistent RF systems could cause interference on them (Lansford, 2004; Parr et al., 2003). Over the years, the co-existence problem of UWB has been all along a hot topic in the academy, industry, and regulatory bodies. After years of public debates, arguments, and comments, two important solutions to the co-existence problem are made—the policy-based power emission mask (FCC, 2002) and the device-centric cognitive radio (Lansford, 2004; Walko, 2005; Haykin, 2005). So far, several cognitive UWB schemes have been proposed, among which are soft-spectrum (Zhang & Kohno, 2003) scheme and detection-and-avoidance (DAA) scheme (Kohno & Takizawa, 2006).

Reliably detecting of weak primary signals is an essential functionality for a DAA UWB system as soon as a primary user (PU) comes back into operation on the operating channels. Two types of primary users are defined in a WRAN which are TV services and wireless microphones (WMs). Compared with TV services, it is tougher to detect WM signals for the following two reasons. Firstly, wireless microphones are low power devices and occupy a narrow bandwidth. The transmission power of a WM is as low as 50mW in a 200kHz bandwidth. When the sensor is several hundred meters away from this WM signal, the received signal-to-noise ratio (SNR) may be below -20dB (Zeng & Liang, 2007). Another, they utilize arbitrary unused TV bands and are deployed for a short time such that it is difficult for CR users to obtain much information on WM signals (De & Liang, 2007; Dhillon & Brown, 2008).

This chapter will concern two questions. Firstly, how to detect the weak primary signals. Secondly, how to avoid such interference from the primary user and how to coexist with it. To address the first problem, we consider detecting multiple WM signals in a WRAN when UWB users want to use this spectrum and propose a singular value decomposition (SVD) based algorithm. To verify the better performance by using the suggested approach, simulation results by comparing to the traditional methods will be shown. For the second concern, a pulse-shaping scheme under the limit of a power spectrum density algorithm will be proposed. In a cognitive environment, the re-design of pulses should be agile enough and easily reconfigurable. Furthermore, to avoid interfering with the primary system, the transmission power o f UWB should be considered.

Advertisement

2. Detection of weak primary signals in a cognitive radio network

2.1. Basic assumptions and problem formulation

Several methods have been suggested to detect WM signals. In (Mossa & Jeoti, 2009), a cyclostationary filter is proposed to grasp the existence of WM signals and to estimate their frequency locations. Obviously, such database dependent methods can not adapt to the dynamic signal detecion. (Lei & Chin, 2008; Wu et al., 2009) proposed beacon based methods for wireless microphones but these put the onus on many already-deployed incumbent wireless microphones. (Zeng & Liang, 2009; Unnikrishnan & Shellhammer, 2007) investigate the method based on eigenvalues of received data matrix when a WM signal is present but can not solve the multiple WM signals detection in a wideband cognitive network. To the best of our knowledge, the literature of wideband spectrum sensing for multiple WM signals is very limited. Actually, it is inevitable that multiple wireless microphones appeared simultaneously. Furthermore, performing wideband spectrum sensing can improve detection efficiency and maximize the opportunistic throughput (Quan et al., 2008). (Kalke, 2005) estimated that about 25,000 licensed wireless microphones are utilized by recording studios of TV broadcasters, organizers and performers in concerts and theatres, commentators in sports events, film production crews and government agencies. To avoid interfering to each other, these WM signals must operate in different center frequencies with enough guard bandwidth. To detect multiple WM signals in a wide bandwidth, (Lim et al., 2007) suggested to use a cyclostationary filter with a filterbank to detect every sub-channel which is divided from the wide sensing spectrum in advance. If a conventional energy detector is used, the sensing process has to include two steps: coarse sensing and fine sensing. The former step determines the presence of WM signals and the latter step is required to decide which channel is occupied (IEEE 802.22 working Group for WRAN, 2006). Obviously, the system complexity and sensing periods will be greatly increased by using traditional methods to sense WM signals in a wideband spectrum.

In our work, we propose a singular value decomposition based algorithm to detect multiple WM signals in a CR network which can sense a wideband channel consisting of multiple narrowband channels. After performing SVD on the received data matrix of a wideband spectrum, the presence of WM signals is detected by comparing the singular values with a prefixed threshold and the number of WM signals can be determined at the same time. Then, the WM signals are approximated and the center frequencies of these WM signals are estimated. Consequently, guard bandwidths will be set on the two sides of the primary WM signals and CR users can still work on the other spectra within the sensing bandwith without interfering with the primary wireless microphone users. The detection threshold and probability of false alarm are derived and simulation results confirm that our method is very effective and robust to detect and estimate multiple WM signals in a wideband spectrum.

Consider a CR network with N samples utilized to perform spectrum sensing at the ith CR user. Then the received signals at this CR user have two hypotheses as

{H0:ri(n)=ui(n)H1:ri(n)=hisi(n)+ui(n)E1
.

Here H0 and H1 respectively mean the primary user is inactive and the licensed user is operating. hi is the channel gain between the PU and the ith secondary user. si represents the received PU signals by the ith SU and ui is AWGN with zero mean and variance σu2, respectively. The test statistic for an energy detector is given by

Ti=1Nn=1N|ri(n)|2E2
.

Under the hypothesis H0, it shows a Gaussian random distribution when N is large with mean σu2 and variance 2Nσu4. Hence, for a given probability of false alarm Pf, the threshold of an energy detector can be derived as

η=σu2(1+2Q1(Pf)N)E3

where Q(x)=(1/2π)xet2/2dt is the normal Q-function.

In (Unnikrishnan & Shellhammer), it is pointed out that most wireless microphones use analog frequency modulation (FM) and a WM signal occupies only 200kHz. Specifically, most energy of a WM signal is contained in an only 40kHz bandwidth (Notor, 2006). However, IEEE 802.22 draft requires the sensing spectrum is at least one channel (6, 7 or 8MHz), and hence the proportion which a WM signal occupies is below 3%. Based on the above analysis, s(t) can be modeled as a summation of multiple single-tone cosinoidal signals as

s(t)=k=1PAkcos(2πfkt+θk)E4

where Ak, fk and k respectively denote the amplitude, center frequency and phase of the kth WM signal and P is the number of WM signals in the sensing spectrum. k can be modeled as a uniform random variable over [0, 2). Without loss of generality, we assume si and ui are independent of each other and SNR=PWM2σu2 denotes the SNR of the primary WM signals received by the ith CR user where PWM is the total power of P WM signals.

In this chapter, we consider that there are multiple WM signals in several sensing channels and each channel is a TV channel with 6MHz bandwidth. Under this assumption, we focus the detection of multiple WM signals on a wideband spectrum.

2.2. SVD based approach to detect and estimate multiple WM signals

In this section, we will present the SVD based method to detect the presence of WM signals and to estimate the number and center frequencies of these detected WM signals.

2.2.1. Technology to detect multiple WM signals

SVD plays an important role in signal processing and statistics, particularly in the area of linear systems. For a time series r(n) with n=1,2,,N, commonly, we can construct a Hankel matrix with M = N – L + 1 rows and L columns illustrated as follows:

R=[r(1)r(2)r(L)r(2)r(3)r(L+1)r(NL+1)r(NL+2)r(N)]E5

then R is an ML matrix. Its elements can be found by substitution of r(n)

Rml=r(m+l1),m=1,2,,M

and

l=1,2,LE6
.

Using the SVD, R can be factorized as

R=UΣVHE7

where U and V are an MM and an LL unitary matrix, respectively. The columns of U and V are called left and right singular vectors, respectively. Σ=diag(λ1,λ2,,λm) is a diagonal matrix whose nonnegative entries are the square roots of the positive eigenvalues of RHR or RRH. These nonnegative entries are called the singular values of R and they are arranged in a decreasing order with the largest one in the upper left-hand corner. [ ]H denotes the complex transpose of a matrix.

When no any primary WM signal is present, the received signal r(n) includes only AWGN contribution such that its singular values are similar and close to zero. When WM signals are active whose power is higher than a threshold, there will exist several dominant singular values to represent these WM signals. As a result, the WM signals can be detected by examining the presence of dominant singular values.

It is critical to determine the number of WM signals P and we will present such method in the following part. To simplify our analysis, we assume that the power values of all WM signals received in the detected spectrum are approximately same, that is to say A1 A2 AP. Since the SNR of primary WM signals received by the secondary detectors is usually very weak, we think this assumption is feasible. Several methods can be utilized to determine if the dominant singular values are present. It is pointed out in (Teh et al, 1995) that the relationship between the number of dominant singular values K and the number of single-tone cosinoidal signals P has the form as K = 2P, therefore, threshold can be adopted which is the ratio between the first singular value and the (2X+1)th singular value. That is to say, if the following equation is true, P WM signals can be declared to be present as

Ifλ1λ2X+1γ,thenP=XE8

and the expression of will be derived in Section 2.3.

2.2.2. Technology to estimate the center frequencies of multiple WM signals

Once WM signals are detected to be active in the sensing channels, the center frequencies of these primary WM signals need to be estimated such that a guard bandwidth can be retained and CR users utilize the other spectra to improve spectrum efficiency. Next, we will present the frequency estimation technique by using SVD.

After P WM signals are detected to be active, the data matrix R in (5) is the superposition of the WM signal space and AWGN space and R can be partitioned into two subspaces as follows

R=UΣVH=[USUU][ΣS00ΣU][VSVU]H=USΣSVSH+UUΣUVUH=RS+RUE9

where

ΣS=diag(λ1,λ2,,λ2P),E10

and

ΣU=diag(λ2P+1,λ2P+2,,λm)E11

with λ1>λ2>>λ2P>>λ2P+1>λ2P+2>>λm corresponding to the singular values in the WM signal subspace and the noise subspace, respectively. 1, 2,, 2P are 2P dominant singular values which correspond to the P WM signals. RS=USΣSVSH and RU=UUΣUVUHare the WM signals subspace and the noise subspace, respectively. By rearranging RS into a time serial, we can get the estimated data vector of WM signals y=[y1,y2,,yN]Twhich includes P WM signals. Next, we will present the algorithm to estimate P center frequencies corresponding to P WM signals.

We define Y=FFT(y)=[Y1,Y2,,YN]T as the N-point Fast Fourier Transform (FFT) operation so we can use the theory of the Rife and Boorstyn (Rife & Boorstyn, 1974) as the frequency estimation of the WM signal which has the maximum power

k1_max=max1[|Y[k]|],1kNE12
f^1=k1_maxNfsE13

where |.| is the absolute value operator, max(.) operator means k1_max is the k1th sampling point where |Y[k]| obtains its maximum and fs is the sampling frequency.

By applying equation (12) and (13), the center frequency of the WM signal which has the maximum power can be acquired. Following the similar step, we can obtain the approximate center frequency for the jth WM signal as

kj_max=maxj[|Y[k]|],1kNE14

and

f^j=kj_maxNfsE15

where kj_max presents the kjth sampling point corresponding to jth peak magnitude.

From the above analysis it can be concluded that this estimation algorithm is easy to implement since only FFT is required. By using FFT, the efficiency of frequency estimation can be improved greatly. Another, the inaccurate knowledge of P will not affect frequency estimation. If P is under or over estimated, then fewer or more frequencies will be estimated than the true number.

Rife and Boorstyn pointed out that when SNR is high enough, the true frequency has a high probability lies in the range (Rife & Boorstyn, 1974)

f[f^(fs/2N),f^+(fs/2N)]E16
.

In summary, the SVD based detection and estimation algorithm consists of the following steps:

Step 1. Pick a number L so that k < L < N k (Tufts & Kumaresan, 1982), where N is the number of sampling points and k is the number of dominant singular values. In our work, k = 2P.

Step 2. Arrange the received signal vector r to form a Hankel data matrix R as (5). Then compute the SVD of R and obtain all singular values of R.

Step 3. Calculate the threshold = 1/2X+1 (X = 1,2,…) and compare the ratio 1/2X+1 with the predefined threshold . If 1/2X+1 , the WM signals are determined to be present and the number of WM signals can be derived by P = X. Otherwise, no WM signal is declared to be active. The derivation of will be explained in Section 2.3.

Step 4. If P WM signals are declared to be present, compute RS then arrange it into a data vector y. Apply FFT on y and consecutively find the number of the point kj_max at which the kjth peak amplitude of the FFT is approached.

Step 5. Obtain the estimated center frequency of jth WM signal by using (12 15).

2.3. Theoretical analysis and determination of threshold

In this section, we will derive the threshold and probability of false alarm Pf.

We denote RS (ML) and RU (ML) as the Hankel matrix of WM signals and an AWGN signal, respectively, such that RU ~ Np (0, ) where p is the dimension of RU and is the covariance matrix. Since the power of WM signals is usually very low, the distribution of RS +RU can be approximated as Np (0, ). According to (Zeng & Liang, 2009; Johnstone, 2001), we have the following three theorems:

Theorem 1. Assume M/L 1 and N is large enough, the largest singular value can be approximated as

λ1σu2N(N+ML)2E17
.

Theorem 2. Assume M/L 1 and N is large enough, the largest singular value follows the following distribution

λ12μMLδMLF1E18

where and are called a center constant and a scaling constant and they are defined as

μML=(M1+L)2E19

and

δML=(M1+L)(1M1+1L)13E20
.

F1 is the distribution function of Tracy-Widom distribution of order 1 which has the form as

F1(s)=exp{12sq(x)+(xs)q2(x)dx},sE21

and q solves the Painlevé II differential function (Johnstone, 2001).

Theorem 3. The distribution of rth largest singular value (r < L) has the approximate distribution as

Φ(λr+12|M,L,Σ)Φ(λ12|M,Lr,ILr)cM,LE22

where cM,L is an empirical constant.

Based on the above three theorems, as a result, Pf can be presented as

Pf=P(λ1/λ2X+1<γ)=P(λ12/λ2X+12<γ2)=P(λ2X+12/λ12>1/γ2)=P(λ2X+12>λ12/γ2)P(λ2X+12>σu2γ2N(N+ML)2)=1Φ(λ2X+12>σu2γ2N(N+ML)2|M,L,Σ)1Φ(λ12>σu2γ2N(N+ML)2|M,L2X,IL2X)+cM,L=1F1(σu2γ2N(N+ML)2μM,L2XδM,L2X)+cM,LE23

Hence, for a pre-determined Pf, the required threshold can be represented as

γ=σu(N+ML)N[δM,L2XF11(1+cM,Lpf)+μM,L2X]E24
.

2.4. Simulation results

2.4.1. Simulation parameters

Since it is difficult to derive the accurate closed form expression of and Pf, we need to resort to simulations for evaluating the performance of our approach.

We consider the spectrum of interest is three consecutive channels which means the sensing bandwidth is 18MHz. We assume that three WM signals are distributed on this 18MHz bandwidth and their SNRs are same. The signals are firstly down-converted into baseband and filtered by a baseband filter with bandwidth 18MHz. And then, these WM signals have the center frequency of 2.4MHz, 8MHz and 14.2MHz, respectively. The selected sampling frequency fs must be larger than the Nyquist frequency of the WM signal which has the highest center frequency and in our simulation fs should be larger than 28.4MHz. To find the threshold , we require the probability of false alarm is Pf = 0.1. To evaluate the performance of frequency estimation, we define the mean estimation precision for the frequency estimation as

ε=j=13|fj^fj|fj3E25
.

where fj^ and fj are the estimated jth center frequency and the jth (j 3) true center frequency, respectively. To investigate our proposal, we compare our simulation results with a conventional energy detector whose threshold has been given in (3).

It has been shown in (Tufts & Kumaresan, 1982) that when the column number L in a Hankel matrix satisfies the inequality 2P < L < N 2P, we can obtain the correct or approximately correct estimation result. However, to the best of our knowledge, it has not been seen that the optimal L theoretically, moreover, the optimal L is different in different cases. In our work, the simulation results show that satisfying 2P < L < N 2P, different L has no significant impact on the system performance and frequency estimation.

In our work, without specific explanation, the sampling frequency is selected as fs = 36MHz and we select L = N/5 as the column number in our following simulations.

2.4.2. Simulation results and analysis

Fig. 1 shows simulation results of the probability of detection (Pd) vs. SNR when the proposed SVD based method and a classical energy detector are used. To investigate the effect for different WM signals, we show simulation results for the single WM signal with a center frequency of 2.4MHz and multiple WM signals, respectively. From this figure we can conclude that the detection performance can be improved greatly by using our method, especially for the single WM signal. For example, for the target Pd of 90%, a 4dB improvement can be obtained than an conventional energy detector by using the proposed approach for a single WM signal. For the multiple WM signals, an improvement of 2dB can be attained compared with the conventional energy detector. To evaluate the performance of the detector, the receiver operating characteristic (ROC) curves are illustrated in Fig. 2 when SNR is -12dB for the single WM signal and SNR = -10dB for three primary WM signals. We plot the Pd under H1 against Pf under H0 when Pf changes from 0.001 to the desired 0.1. We can observe that the ROC curve of our algorithm is much higher than that of the energy detector for both the single WM signal and multiple WM signals which verifies the better performance of our detector.

Figure 1.

Comparison of Pd between the proposed SVD-based method and a energy detector when PU is a single WM signal and three WM signals.

Figure 2.

Comparison of ROC curve between the SVD-based method and an energy detector when PU is a single WM signal and three WM signals.

To study the robustness of our algorithm, we first compare the Pd of our SVD based detection method under different column number L when three primary WM users operate simultaneously. Fig. 3 depicts the simulation results when L = 3N/4, N/2, N/3 and N/5, respectively. From this figure we can observe that although different L is taken, a good detection probability can be achieved with very slight difference. Then, we compare the Pd of the proposed approach under different sampling frequency fs. The used sampling frequencies are 24MHz, 30MHz, 36MHz and 48MHz, respectively. Among these frequencies, 24MHz is lower than the Nyquist frequency of the WM signal whose center frequency is 14.2MHz. From Fig. 4 we can conclude that with the changing of fs, the probability of detection shows very slight difference. Even for the fs = 24MHz which is lower than the Nyquist frequency, a good Pd can be obtained which proves that our method is robust for different sampling frequency.

Figure 3.

Pd vs. SNR with different column number L for three WM signals.

Figure 4.

Pd vs. SNR with different fs for three WM signals.

To investigate the estimation performance of the WM’s center frequency, we plot the mean estimation precision in Fig. 5 and 6 when L and fs change. From these two figures we can see that the proposed frequency estimation method is very effective. For example, for the fs of 36MHz and SNR = -10dB, the absolute error of the worst estimation is within 10kHz. Whereas, a nearly perfect frequency estimation can be obtained for fs = 36 and 48MHz when SNR = -10dB. In Fig. 5, an obvious result can be found that gets better with the increase of fs. This is feasible since it is more possible to find the jth magnitude when the sampling rate is larger. However, higher fs means a higher requirement for the system complexity. As a result, a tradeoff is needed to consider between system complexity and a satisfying . Figure 5 also proves that the estimation precision can be degraded severely if a fs lower than the Nyquist frequency is used. Fig. 6 presents the mean estimation precision when fs = 36MHz and L = 3N/4, N/2, N/3 and N/5, respectively. From Fig. 6 we can conclude that the difference of L has no significant impact on , especially when SNR is higher than -12dB.

Figure 5.

Mean estimation precision of center frequency vs. SNR with different sampling frequency fs for three WM signals.

Figure 6.

Mean estimation precision of center frequency vs. SNR with different column number L for three WM signals.

2.5. Conclusions

In this part, we proposed a SVD based approach to detect and estimate multiple WM signals in a WRAN when a UWB system wants to use this spectrum. After perforimg SVD on the received data matrix, the presence and number of these WM signals can be detected and their center frequencies can be estimated. Consequently, guard bandwidths are retained to protect these primary users and the other detected spectra are available for the CR users. Simulation results prove that our method is simple and robust and it is especially suitable for detection and estimation of WM signals in a wideband spectrum sensing.

Advertisement

3. Detection and avoidance scheme based on orthonormal expansion

As well known, UWB technology is divided into two distinctive groups. The first group, known as multi-band UWB (MB-UWB), divides the entire UWB band into many sub-bands, with each sub-band being allocated a sinusoidal carrier. The DAA scheme mentioned above originates from this multi-band way of using UWB spectrum—each time a sub-band is detected being interfered, the carrier allocated for it is turned off. The second group is known as direct sequence UWB (DS-UWB), which, unlike the first, typically adopts a single-band transmission and depends entirely on varying pulse shapes to fit given spectrum masks; therefore, it is relatively difficult to turn on/off individual sub-band. A question is thus raised: Can the spectrum of the single-band DS-UWB be soft?

To answer this question, let us first investigate the currently proposed DS-UWB pulses: Rayleigh monocycle, Cubic monocycle, Gaussian monocycle, Gaussian doublet (Benedetto et al., 2006; Benedetto et al., 2004), high-order Gaussian derivatives (Win, 2000), modified Hermite polynomials (Ghavami et al., 2001) and so forth. The finding is somewhat discouraging—all of them feature fixed spectra. Used individually, they are not soft at all. Then, can the combinations of them be soft? As addressed in (Benedetto et al., 2004), a group of Gaussian derivatives have been linearly combined to generate an aggregate pulse that yields maximum spectral capacity. Such a combination adopts random-search optimization method, in the sense that a large number of combination coefficients are randomly generated and the resulting combinations are evaluated. The combination that has minimum distance to the targeted spectrum mask is picked up as the optimal combination. This optimization method demands a huge number of iterations before finding the optimum. The converging time varies from situation to situation, so the linear combination methods are something between fixed and soft.

Moreover, cognitive UWB devices need to design and re-design the pulses on the scene of communication instead of having them preset or fixed in factories. In cognitive environment, the re-design of DS-UWB pulse must be agile enough and easily re-configurable.

To this end, we propose a soft-spectrum-based detection-and-avoidance algorithm for the single-band DS-UWB systems. The algorithm adopts a co-basis expansion method, in the sense that the well-known Hermite-Gaussian functions (HGFs) are used to constitute a common basis for both the time and frequency domains. The co-basis has twofold advantages: First, it yields the pulses directly from expanding the given soft-spectrum masks in frequency domain, so the pulses can conform to arbitrary spectrum masks. Second, the co-basis (that is, the HGFs) can be digitalized and built into matrices, such that whenever a new soft-spectrum is sensed or discovered, its expansion by the co-basis is as simple as matrix multiplications. As a result, the algorithm is really soft, low complex, always convergent, and agile enough for cognitive purpose.

3.1. The establishment of the soft-spectrum mask

The criterion for the design of DAA pulses is the ruling of the Federal Communications Commission (FCC), namely, the FCC’s power emission mask (FCC, 2002), which ranges from 3.1 to 10.6GHz with power limit Pmax=−41.3dBm/MHz. Within the allocated UWB band, other radio systems such as IEEE 802.11a or HiperLan has already been in operation. For cognitive purpose, the DS-UWB radio must be aware of the existence of such primary systems before transmission and automatically avoid the frequency bands in use by primary users.

In the design of the DAA scheme for DS-UWB radio, our emphasis is placed on the side of avoidance. In order not to digress our focus, we leave the side of detection to reference to well-established spectral estimation methods in literature, for example, the multi-taper spectral estimator that performs fast Fourier transform (FFT) and threshold inspection (Haykin, 2005; Welch, 1967). Before transmission, the DS-UWB radio senses the ambient radio environment with a detecting unit. Upon detecting an in-use sub-band, it calculates the 10dB-bandwidth of the sub-band and marks the sub-band as forbidden. In a recursive manner, DS-UWB radio sweeps the entire UWB band and records all the forbidden sub-bands. After the sensing process is over, the UWB radio establishes a soft-spectrum model that conforms not only to the FCC mask but also to the real-time radio environment. The soft-spectrum model so-established can be expressed as

Rss(f)={PmaxfIIs0fIsE26

where Pmax=−41.3dBm/MHz, I=[3.1GHz, 10.6GHz], and Is represents the union of the forbidden sub-bands.

3.2. The relationship between the soft-spectrum and the frequency response

The DS-UWB radio is by nature a spread spectrum system, whose transmitted waveforms can be characterized as follows (Ye et al., 2004),

s(t)=k=j=1Ncp(tkTbjTc)bkcpjE27

where bk is the kth data bit with duration Tb; Tc is the chip duration; Nc is the spreading factor (that is, Tb=NcTc);cjp is the jth chip of the pseudorandom code; p(t) is the pulse waveform. Through substitution of variables Eq. (27) can be simplified as:

s(t)=i=dip(tiTc)E28

where

i=kNc+j and

di=dk,j=cpjbkE29

The autocorrelation function of s(t) is given by (Proakis, 2003)

rss(τ)=1Tcl=rdd(l)rpp(τlTc)E30

where rdd(•) represents the autocorrelation function of the information sequence {di ∈{±1}}; rpp(•), the autocorrelation function of the pulse. Correspondingly, the PSD of s(t) is given by

Rss(f)=1TcRdd(f)|P(f)|2E31

which indicates that the PSD of the transmitted waveforms depends not only on the frequency response of the pulse, P(f), but also on the PSD of the information sequence, Rdd(f), and on the chip duration Tc as well. However, since the sequence {di ∈{±1}} can be viewed as an uncorrelated random process with zero mean and unitary variance (Benedetto et al., 2004; Ye et al., 2004), that is, rdd(l)=δ(l), and Rdd(f)=1, the autocorrelation function defined by Eq. (30) and the PSD defined by Eq. (31) can be further simplified respectively as follows,

rss(τ)=1Tcrpp(τ)=1Tcp(t)p*(t+τ)dtE32

and

Rss(f)=1Tc|P(f)|2E33

By substituting Eq. (26) into Eq. (33), we obtain the frequency response P(f) of the transmitted DS-UWB waveforms that conforms both to the FCC mask and to the ambient RF environment, such P(f) we refer to as soft-spectrum mask, namely

P(f)=TcRss(f)={AfIIs0fIsE34

where

A=10Pmax/10×109×Tc(V/Hz)E35

3.3. The establishment of a co-basis for both the time and frequency domain

The frequency response given by Eq. (34) is inherently an energy signal and can be uniquely expanded by orthonormal functions that span the signal base. But, an ordinary expansion does not suffice here. In the design of soft-spectrum-based DAA pulse, we need a common basis for both the time and frequency domains, that is, a co-basis. With this co-basis, the well-known orthonormal expansion method will do wonders for the design of pulses, yielding the waveform of the pulses (time domain) by expanding the soft-spectrum in the frequency domain.

Hermite-Gaussian functions (HGFs) constitute ideally such a co-basis.

The HGFs are combinations of Hermite polynomials with a Gaussian function, as written as follows (Ozaktas et al., 2000),

φl(u)=alHl(2πu)eπu2,al=21/4/2ll!E36

where Hl(•) denotes the lth order Hermite polynomial. The generation function for Eq. (36) is

φl(u)=(1)lal(2π)leπu2dldule2πu2,l=0,1,2...E37

Note that the HGFs defined by Eqs. (36) and (37) are slightly different from those defined in classical mathematical textbooks—here, they are2π -scaled, so that they turn out to be the eigenfunctions of fractional Fourier transform (Ozaktas et al., 2000). In other words, because the HGFs are 2π-scaled, they are shape-invariant to fractional Fourier transform (Ozaktas et al., 2000), that is,

Fα{φl(u)}=eiαlπ/2φl(μ)E38

where

Fa

denotes fractional Fourier transform (FRFT) operator;

e=ilαπ/2,

the corresponding eigenvalues;

α,

the order of the FRFT

.

The FRFT is a generalization of the ordinary Fourier transform with an order parameter α. The α-th order fractional Fourier transform is the α-th power of the ordinary Fourier transform operation. When α=−1, the corresponding FRFT operation is exactly the ordinary inverse Fourier transform. Under such circumstance, Eq. (38) becomes

F1{φl(u)}=ilφl(μ)E39

which indicates that the HGFs are shape-invariant to the inverse Fourier transform except for a phase shift. This nice property makes the HGFs constitute a common basis for both the frequency and time domain. To emphasize this, we introduce two normalized variables u and µ in place of the natural frequency f and time t. The relationship among them will be addressed later on.

Advertisement

3.4 The dimension of the co-basis

Before proceeding, we need to determine the dimension of the co-basis, M, or equivalently, the number of HGFs involved in the expansion. Mathematically, the orthonormal expansion is least-mean-square approximation to the signal being expanded (Proakis, 2003), as stated as follows,

Q=[P(f)l=0M1clφl(f)]2df=P2(f)dfl=0M1cl2E40

where the square error Q manifests itself as in-band and out-of-band ripples in the expansion of the signal. In the case that the magnitude of the ripples is specified, Q can be computed according to the specifications and then M is obtained by solving Eq. (40). In other cases that the ripples are not of major concern, as in the current DAA case, M can be determined by rule of thumbs. For example, it has been verified by computer simulations that a medium M between 30 and 100 is sufficient for performing DAA functionalities that avoid two to four sub-bands.

Advertisement

3.5 The representation of the soft-spectrum mask by the co-basis

After determining the number of HGFs participating in the expansion, we need next to normalize the natural frequency argument of the soft-spectrum mask as given by Eq. (34). The purpose of such normalization is to let the support of the soft-spectrum mask match the support of the co-basis. The support of the co-basis is not compact, but its energy is mostly (say 90%) concentrated on a finite interval (Ozaktas et al., 2000) [uH,uH], where

uH=(M+0.5)πE41

where means rounding up to the nearest integer. uH is closely related to the dimension of the co-basis and is used to determine a scaling factor τ,

τ=uHfH=(M+0.5)/π/fHE42

which has the dimension of time and helps to normalize the frequency and time arguments as follows:

u=τfE43
μ=t/τE44

With the frequency and time thus-normalized, the soft-spectrum mask can be expanded by the co-basis as

P(u)=l=0M1clφl(u)uHuuHE45

where cl denotes the lth-order expansion coefficient given by

cl=φl(u)P(u)du=Auτ×Iφl(u)duAuτ×Isφl(u)duE46

where τ×I=[3.1τ, 10.6τ], representing the τ-scaled UWB band, and τ×Isrepresents the τ-scaled union of the forbidden sub-bands. Put in matrix form, Eq. (46) means

C=AuHN(HUTHST)E47

where C={cl, 0≤l≤M−1} represents a column vector; N is an integer denoting the number of sample points required for numerically calculating the integration, and by rule of thumb, is chosen as N=2048 for general DAA functionalities; U and S are two N-sampled and unitary-valued row vectors representing the entire UWB band and the forbidden sub-bands respectively; the superscript T denotes the transpose operation; H is an M by N matrix with its lth row denoting the (l-1)th-order HGFs, which are N-point-sampled on the interval [-uH, uH].

The waveform of the transmission pulse with normalized time argument is then obtained by applying FRFT to both sides of Eq. (45), namely,

p(μ)=F1{P(u)}=l=0M1ilclφl(μ)E48

Finally, the waveform of the transmission pulse p(t) is obtained by de-normalizing the argument µ, that is, by substituting t/τ for μ in Eq. (48), namely

p(t)=p(μ)|μ=t/τ=l=0M1ilclφl(t/τ)E49
Advertisement

3.6. Implementation of the pulse by Software Defined Radio technique

The pulse given by Eq. (49) involves linear combinations of M τ-scaled HGFs, which are continuous functions. The analogue generation of the pulse is very difficult, whereas the digital generation is much easier. Through modern SDR technique (Reed, 2002), the analogue p(t) can be sampled into a discrete time sequence as

p[n]:=p(t)|t=nT0=l=0M1ilclφl(nT0/τ)E50

where := means sampling. The period of T0 is determined as follows,

T012fHE51

In the case of Nyquist sampling, the equality can be used, namely T0=1/(2fH); thus, Eq. (50) becomes

p[n]=l=0M1ilclφl(n2uH)E52

where n is defined on the interval equating to 2uH times the support of the co-basis, namely,

2uH2n2uH2E53

Let K=4u2HThe length of the resulting sequence {p[n], -K/2≤n≤K/2} is then K or (K+1) depending on K being even or odd. Let us take it as K for easy discussion. Putting Eq. (52) in matrix form and denoting C={cl, 0≤l≤M−1} where C is given by Eq. (47), we obtain

P=AuHN(US)HTEΦE54

where P={p[n], −K/2≤n≤K/2} represents the pulse; E is an M by M diagonal matrix with the diagonal elements {ell} equating to the unitary complex values {{il1,l=1,2,...M}} ; H, U and S have been defined previously; Ф is an M by K matrix with the l-th row representing the (l-1)th-order scaled-and-discrete HGFsΦl(n/2uH).

We comment that the resultant P from Eq. (54) is a complex-valued sequence: Its real part is even, known as the inphase part; its imaginary part is odd, known as the quadrature part. In other words, P is a complex baseband signal, and consequently its generation needs two signal branches (one for the inphase and the other for the quadrature) (Reed, 2002).

Advertisement

3.7. Detection and avoidance scheme

In essence, the pulse P given by Eq. (54) is a sum of two quantities, each involving a series of matrix multiplications. The matrices H, E, and Φ are known a priori, keeping unchanged throughout the DAA operation. The row vector U represents the entire UWB band, keeping also unchanged. Therefore, the minuend in Eq. (54) is a constant sequence, which only needs to be computed once and then stored in the read-only memory (ROM), whereas the row vector S represents the sub-bands in use by primary users, and it may keep changing under a cognitive environment. Therefore, the subtrahend in Eq. (54) requires to be updated corresponding to the changing radio environment. Obviously, matrix multiplication is a dominant operation. To reduce computation burden, the product HTEΦ is pre-computed and stored in ROM, so P only needs to be updated by computing the product of the row vector S (1 by N) with a matrix HTEΦ (N by K). Accordingly, the DAA scheme can be devised as follows:

DAA scheme (as illustrated in Fig. 7)

Initialization:

Input A, uH, N, H, E, Ф, and U.

Compute product P=AuHNUHTEΦ and store it in ROM.

Compute and store in ROM the intermediate matrixI=AuHNHTEΦ.

Detecting:

Sense the ambient channel and take samples during some quiet period.

Perform FFT computation and multi-taper spectral estimation (Haykin, 2005; Welch, 1967).

Inspect the power emission level and make decision according to a prescribed soft spectrum policy.

If a subband is in use by a primary user(s), mark it as forbidden.

Repeat detecting until the entire UWB band is swept.

Avoiding:

Build row vector S according to the following criteria:

Let the amplitude of the forbidden sub-bands be equal to one.

Let the amplitude of the other sub-bands be equal to zero.

Insert smoothing curves at transitions from one to zero to prevent Gibbs phenomenon.

Compute the instantly changing partP,=S×I.

Update

P=PP,E55
.

Output the updated sequence P.

Stop.

Figure 7.

Flowchart of the DAA Scheme

Advertisement

3.8. Computer simulations

3.8.1. Examples

As examples, we investigate the following two scenarios:

1. No sub-band is in use by primary users; the entire DS-UWB band is accessable.

2. Two sub-bands are in use by primary users: one at central frequency f1=4.5 GHz and the other at f2=7.5GHz. The bandwidth are both 500 MHz.

The parameters involved are listed in Table 1.

Table 1.

Basic Parameters involved

For the first scenario, the PSD of the resulting pulse is illustrated in Fig. 8. As expected, the pulse occupies the entire regulated DS-UWB band. Raised-cosine curves have been inserted to smooth the transitional edges of the spectrum vector U and S, so the out-of-band ripples are ideally suppressed.

Figure 8.

PSD of the DAA Pulse Using the Entire UWB Band

Figure 9.

PSD of the DAA pulse avoiding two sub-bands on which primary users are operating

Fig. 9 illustrates the PSD of the resulting pulse for the second scenario. As expected, the DAA pulse forms two 15dB deep valleys around the two sub-bands in use by the assumed two primary users, effectively avoid interfering the primary users.

Figure 10.

Waveforms of the DAA Pulse Avoiding Two Sub-bands

The pulse waveforms for the second scenario (for simplicity, the waveforms of the first, which is similar to the second, is left out) is shown in Fig. 10. As seen, the pulse consists of two parts: The real part (on the top) is even, and the imaginary (on the bottom) is odd.

The autocorrelation function, as given by Eq. (32), of the DAA pulse is illustrated in Fig. 11, in which the narrow main-peak suggests that the DAA pulse is sensitive to time jitter, possibly more sensitive than an ordinary pulse, this is the price to pay for DAA.

Figure 11.

Autocorrelation Function of the DAA Pulses Avoiding Two sub-bands.

In multi-user or multi-access situations, the DAA pulse works in a similar manner as in a general DS-UWB spread-spectrum scheme. So the performance for multi-user or multi-access under DAA operation is guaranteed by the performance of the pseudorandom or pseudo-noise (PN) sequence assigned for differentiating multi-users. Therefore, the cross-correlation properties of the DAA pulses are out of concern here.

3.8.2. Complexity

The suggested DAA algorithm involves mainly matrix multiplications, for which the dominating operation is complex multiplication. Three factors dictate the total number of multiplications: first, N--the number of sampling points for performing numerical integration; second, M-- the dimension of the co-basis; finally, K--the length of the resulting sequence representing the transmission pulse.

The unchanging part P requires roughly K(MN+M+N) complex-value multiplications and thus consumes most of the computer time. Given N=2048, M=48, and the resultant K=64, the complex-value multiplications totals 6,425,600 in the simulations. However, the P only needs to be calculated once, so it does not represent the real computational complexity. On the other hand, the changing part P´ requires to be updated frequently, but its computational time is reduced to NK because the intermediate matrix (I=AuHNHTEΦ) has already existed; therefore, the real computational complexity is O(NK), totaling roughly 131,072, roughly equivalent to 0.1 second if the digital signal processor embedded in the UWB radio operates at one million instructions per second. The amount of time does not vary regardless of the central frequencies and bandwidths of the sub-bands in use by primary users—as opposed to the changeable computational time in the linear combination method addressed in (Benedetto et al., 2004). Therefore, the DAA algorithm has predictable and managable processing delay, and is robust in real-time communications.

Advertisement

3.9. Conclusion

Detection and avoidance, as a cognitive radio scheme, has been proven effective for multi-band UWB group. The basic idea underlying the DAA is turning off individual carrier-tone on the interfered sub-band. However, coming to direct-sequence UWB, a competing technology group with the multi-band UWB, this idea of turning off tones ceases to be true because shutting off any sub-band would mean to re-design the pulses all over again. In a cognitive environment, the re-design should be agile enough and easily reconfigurable. To this end, we devise a DS-UWB-oriented DAA scheme by emphasizing the side of avoidance (that is, the re-design of the pulse) while de-emphasizing the side of detection by referencing the well-established spectral estimation methods in existing literatures. We propose a domain-less co-basis expansion method in the sense that Hermite-Gaussian functions are used to constitute a common basis (co-basis) for the time and frequency domains. One advantage of the co-basis is that the transmission pulses are directly obtained from the expansion of given soft-spectrum masks, so the resulting pulses fit into arbitrary spectrum masks. Another advantage is that the co-basis functions (that is, the HGFs) are discretized, built as matrices, and stored in ROM, such that whenever a soft spectrum is sensed or discovered, the DAA-enabled pulse is generated by merely matrix multiplying. The amount of computational time is thus trivial, and the re-design of the pulse can respond quickly to a rapidly-changing soft spectrum. The algorithm can be implemented through software defined radio (SDR) techniques. Computer simulation verifies that the DAA algorithm is low complex, easily configurable, robust, and agile enough to avoid the intended subbands.

References

  1. 1. ParrB.et al.2003A novel Ultra-Wideband Pulse Design Algorithm,” IEEE Communications letters, 75May
  2. 2. DeP.LiangY.C. (2007) Blind Sensing Algorithms for Cognitive Radio, Proceedings of 2007 IEEE Radio and Wireless Symposium, pp. 201-204, Long Beach, USA, January 9-11
  3. 3. DhillonR.S. BrownT.X. (2008) Models for Analyzing Cognitive Radio Interference to Wireless Microphones in TV Bands, IEEE DySPAN 2008, pp. 1- 10, Chicago, USA, October 14-17
  4. 4. FCC.2002Revision of Part 15 of the Commission’s Rules Regarding Ultra-wideband Transmission Systems: First Report and Order,” Technical Report FCC 02-48,
  5. 5. HaldunM. O.et al.2000The Fractional Fourier Transform with Applications in Optics and Signal Processing, John Wiley & Sons, LTD, Chichester, New York.
  6. 6. HonggangZ.RyujiK.2003Soft-Spectrum Adaptation in UWB Impulse Radio,” the 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Proceeding.
  7. 7. HuW.et al.2007Dynamic Frequency Hopping Communities for Efficient IEEE 802.22 Operation. IEEE Communications Magazine, 455May ), 80870163-6804
  8. 8. IEEE P802 22.2006working Group for WRAN, Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands, IEEE 802WDv0.4.7 Draft Standard for WRAN Part 22,
  9. 9. JeffreyH. R.2002Software Radio: A modern Approach to Radio Engineering, Prentice Hall PTR,
  10. 10. LansfordJ.2004UWB Coexistence and Cognitive Radio,” Ultra Wideband Systems, Joint with Conference on Ultra wideband Systems and Technologies
  11. 11. ProakisJ. G.2003Digital Communications, Fourth Edition, McGraw-Hill Companies
  12. 12. WalkoJ.2005Cognitive Radio,” IEE Review, Http://www.iee.org,May
  13. 13. JohnstoneI. M.2001On the distribution of the largest eigenvalue in principle components analysis, The Annals of Statistics, 292295327
  14. 14. KalkeJ.2005TV Band Low Power Devices the need for Coexistence with IEEE 802.22, IEEE Plenary Tutorial, 110Vancouver, Canada, November 14-18,
  15. 15. LeiZ. D.ChinF. A.2008Reliable and Power Efficient Beacon Structure for Cognitive Radio Systems, IEEE Transactions on Broadcasting, 542June ), 1821870018-9316
  16. 16. LimS.KimS.ParkC.SongM.2007The detection and classification of the Wireless Microphone signal in the IEEE 802.22 WRAN system, Asia-Pacific Microwave Conference, 14Bangkok, Thailand, December 11-14,
  17. 17. Di BenedettoM.G. et al.2006UWB Communication Systems: A Comprehensive Overview, Hindawi Publishing Corporation
  18. 18. Di BenedettoM.G. et al. 2004Understanding Ultra Wide Band Radio Fundamentals, Prentice Hall PTR.
  19. 19. MoeZ. W.2000Ultra-Wide Bandwidth Time-Hopping Spread-Spectrum Impulse Radio for Wireless Multiple-Access Communications,” IEEE Transaction on Communications, 484April
  20. 20. GhavamiM.et al.2001Hermite Function Based Orthogonal Pulses for Ultra Wideband Communications,” Proc. IEEE Wireless Personal Multimedia Conference (WPMC’01), Aalborg, Denmark, September.
  21. 21. MossaA. M.JeotiV.2009Cognitive Radio: Cyclostationarity-Based Classification Approach for Analog TV and Wireless Microphone Signals, IEEE Innovative Technologies in Intelligent Systems and Industrial Applications, 107111Kuala Lumpur, Malaysia, July 25-26,
  22. 22. NotorJ.2006The Evolution of Spectrum Sharing in the IEEE 802.22 WRAN Standards Process, http://www.eecs.berkeley.edu/~dtse/3r_notor.ppt,Feb.
  23. 23. WelchP. D.1967The Use of Fast Fourier Transform for the Estimation of Power Spectra: A Method base on Time-Averaging over Short, Modified Periodograms,” IEEE Trans. Audio Electroacoustics, AU-157073
  24. 24. QuanZ.CuiS. G.HoorH.SayedA.2008Collaborative wideband sensing for cognitive radios, IEEE Signal Processing Magazine, 256November ), 60731053-5888
  25. 25. KohnoR.TakizawaK.2006Detection and Avoidance Based on Soft-Spectrum Adaptation of UWB Interference to Existing Radio Systems,” IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications.
  26. 26. RifeD. C.BoorstynR. R.1974Single Tone Parameter Estimation from Discrete-Time Observations, IEEE Trans. Inform. Theory, IT-20September), 5915981089-7771
  27. 27. HaykinS.2005Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, 232Feb.
  28. 28. StevensonC. R.et al.2006Functional Requirements for the 802.22 WRAN Standard r47, (January)
  29. 29. TehK. C.TengC. C.KotA. C.LiK. H.1995Jammer Suppression in Spread Spectrum, IEEE Conf. on Information Engineering, 220224
  30. 30. TuftsD.KumaresanR.1982Singular Value Decomposition and Improved Frequency Estimation Using Linear Prediction, IEEE Trans. on Acoustics, Speech, and Signal Processing, 304August), 671675
  31. 31. UnnikrishnanJ.ShellhammerS.2007Simulation of Eigenvalue based sensing of wireless mics, IEEE 802.2207r0, (July )
  32. 32. WuY. C.WangH. G.ZhangP.2009Protection of Wireless Microphones in IEEE 802.22 Cognitive Radio Networks, IEEE International Conference on Communications Workshops, 15Dresden, Germany, June 14-18,
  33. 33. ZengY. H.LiangY. C.2007Covariance Based Signal Detections for Cognitive Radio, Proceedings of 2nd IEEE DySPAN, 202207Dublin, Ireland, April 17-20,
  34. 34. ZengY. H.LiangY. C.2009Eigenvalue-Based Spectrum Sensing Algorithms for Cognitive Radio, IEEE Transactions on Communications, 576June ), 178417930090-6778
  35. 35. ZhenzhenY.MadhukumarA. S.ChinF.2004Power Spectral Density and In-Band Interference Power of UWB Signals at Narrowband Systems,” IEEE International Conference on Communications, 635613565June.

Written By

Shaoyi Xu and Rumin Yang

Submitted: 17 October 2010 Published: 01 August 2011