Interference-Based Pricing for Opportunistic Multicarrier Cognitive Radio Systems
Cognitive radio systems allow opportunistic secondary users (SUs) to access portions of the spectrum that are unused by the network's licensed primary users (PUs), provided that the induced interference does not compromise the PUs' performance guarantees. To account for interference constr...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on wireless communications 2015-12, Vol.14 (12), p.6536-6549 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Cognitive radio systems allow opportunistic secondary users (SUs) to access portions of the spectrum that are unused by the network's licensed primary users (PUs), provided that the induced interference does not compromise the PUs' performance guarantees. To account for interference constraints of this type, we consider flexible spectrum access pricing schemes that charge SUs based on the interference that they cause to the system's PUs, and we examine how SUs can react to maximize their achievable transmission rate in this setting. We show that the resulting noncooperative game admits a unique Nash equilibrium under very mild assumptions on the pricing mechanism employed by the network operator and under both static and ergodic (fast-fading) channel conditions. In addition, we derive a dynamic power allocation policy that converges to equilibrium within a few iterations (even for large numbers of users) and that relies only on local-and possibly imperfect-signal-to-interference-and-noise ratio measurements; importantly, the proposed algorithm retains its convergence properties even in the ergodic channel regime, despite its inherent stochasticity. Our theoretical analysis is complemented by extensive numerical simulations that illustrate the performance, robustness, and scalability properties of the proposed pricing scheme under realistic network conditions. |
---|---|
ISSN: | 1536-1276 1558-2248 |
DOI: | 10.1109/TWC.2015.2456063 |