Next Article in Journal
Recording Heart Rate Variability of Dairy Cows to the Cloud—Why Smartphones Provide Smart Solutions
Next Article in Special Issue
Adaptive Dynamic Programming-Based Multi-Sensor Scheduling for Collaborative Target Tracking in Energy Harvesting Wireless Sensor Networks
Previous Article in Journal
Efficient Force Control Learning System for Industrial Robots Based on Variable Impedance Control
Previous Article in Special Issue
Directional Paging for 5G Communications Based on Partitioned User ID
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Time Assignment Policy for Maximizing Throughput in Cognitive Sensor Network with Energy Harvesting

The 63rd Institute, National University of Defense Technology, Nanjing 210007, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2018, 18(8), 2540; https://doi.org/10.3390/s18082540
Submission received: 7 June 2018 / Revised: 26 July 2018 / Accepted: 26 July 2018 / Published: 3 August 2018
(This article belongs to the Special Issue Advanced Technologies on Green Radio Networks)

Abstract

:
A cognitive sensor network with energy harvesting (EH-CSN) is a promising paradigm to address the issues both in spectrum efficiency and in energy efficiency. The cognitive sensors (CSs) equipped with energy harvesting devices are assumed to operate in a harvesting-sensing-transmission mode and permitted to access the idle licensed frequency bands without causing any harmful jamming to the primary user. By identifying the time fractions of harvesting, sensing, and transmission, we can discuss some design considerations for the EH-CSN. In the meantime, considering the possibility that the primary user may reoccupy the idle channel during the CS’s data transmission duration, we formulate an optimization problem to maximize the average throughput of EH-CSN under a collision constraint and an energy constraint. After deriving the lower and upper bounds of the time fraction for energy harvesting, the uniqueness and existence of the optimal time fraction set have been proved. Finally, our theoretical analysis is also verified through numerical simulations.

1. Introduction

Spectrum-efficiency and energy-efficiency have attracted considerable attention for the future wireless communication networks. A cognitive sensor network with energy harvesting (EH-CSN) is a promising paradigm that can be used for these two purposes because of its capability to dynamically access the idle licensed frequency bands and harvest energy from ambient sources. With the successful applications of wireless sensor networks in spectrum monitoring, disaster warning, fire preventing and environmental monitoring, some problems have also exposed, such as the limitations for energy supply and spectrum resources. The sensor nodes are usually facing the extreme complex terrain environment in the above application scenes. Thus, it is hard to supply consistent current for the sensor nodes. The energy harvesting technology will become an efficient method to prolong the survivability of the sensor nodes. In addition, crowded spectrum occupying makes it hard to allocate the new spectrum resources for wireless sensor networks. Then, through combining the cognitive radio technology, wireless sensor network are permitted to access the licensed spectrum band and raise the utilization rate of the spectrum resource.
To improve the spectrum-efficiency, spectrum sensing is adopted to guarantee that the cognitive sensors (CSs) access the under-utilized channels without causing any harmful interference to the primary user (PU). To prolong the lifetime of cognitive sensor network (CSN) and overcome the energy limitation of the CSs, energy harvesting technology is used to provide sufficient energy to fuel the CSN. Moreover, energy-efficient designs [1,2,3,4,5,6,7] and energy harvesting [8,9,10,11,12] represent the two important directions for solving the energy limitation for CSs. Energy-efficient designs can be classified into four groups [13]: minimizing energy consumption, optimizing sensing parameters (e.g., the number of cooperating nodes, detection thresholds, sensing and transmission duration, transmission power), selection and application of fusion and decision rules, and energy-efficient network organization. However energy-efficient designs cannot solve the energy limitation of the CSN essentially.
Energy harvesting is an emerging technology, which can convert the ambient sources (e.g., thermal, vibration, solar, acoustic, wind, or radio frequency energy) into the electric energy to provide the sustainable power supplies for CSs, and has attracted considerable attention of many researchers. Thus, EH-CSN can provide an efficient way to address the issues both in spectrum efficiency and in energy efficiency for the future wireless networks. In general, the designers aim to optimize one or more of sensing parameters in order to maximize the metrics of system performance (e.g., energy efficiency, throughput). In order to guarantee a sufficient protection for PUs, CSs have to periodically sense the status of PUs within a time frame. In the meantime, taking the energy harvesting into consideration, the time frame can be divided into three parts: harvesting duration, sensing duration and transmission duration. Therefore, how to design the time assignment policy for EH-CSN while keeping the high throughput is an emerging problem, which needs to be studied in future wireless communications.

1.1. Related Work

Some recent studies [14,15,16,17,18,19,20,21,22,23] have focused on exploiting and investigating the performance of wireless communication systems with energy harvesting. Time resources, sensing parameters and power resources have become very important issues on optimizing the system performance.
In [14], the authors formulated an optimization problem to maximize the harvested energy based on the collision constraint. They finally derived the optimal sensing time. The authors established the model that the cognitive node sensed the presence of PU and harvested radio frequency energy during the sensing time. The authors in [15] considered maximizing the achievable throughput and formulated an optimization problem as a mixed-integer nonlinear programming one. The work [15] put forward the model based on the hypothesis that the false-alarm or miss-detection would be generated by CSs when executing spectrum sensing. Based on detection threshold, the authors in [16] divided the energy harvesting system into two states: a spectrum-limited regime and an energy-limited regime. The optimal detection threshold and spectrum sensing policy are derived to maximize throughput. In [17], the authors proposed a channel selection criterion to maximize the average spectral efficiency for an energy-harvesting cognitive radio network (CRN) under energy constraint. The authors in [18] also considered an energy-harvesting CRN and designed the optimal sensing duration and the sensing threshold together to maximize the average throughput of the secondary network under energy causality constraint and collision constraint. The authors in [19] proposed a wireless EH protocol for a decode-and-forward cognitive relay network with multiple PU transceivers. In this protocol, the secondary nodes could harvest energy from the primary network while sharing the licensed spectrum of the PU. The authors in [20] considered a cluster-based collaborative spectrum sensing scheme in the energy harvesting cognitive wireless communication network. They aimed to maximize the average throughput by identifying the optimal parameter set, including the durations of energy harvesting and spectrum sensing, local detection threshold, and the number of CSs. The authors in [21] considered a centralized collaborative spectrum sensing for an energy-harvesting CRN and formulated the optimization problem to maximize the expected throughput. Based on the finite-horizon partially observable Markov decision process (POMDP), they derived the dynamic sensing access policy. The authors in [22] aimed to investigate the impact of sensing probability, access probability, and energy queue capacity on the maximum achievable throughput. They proposed a two-step opportunistic spectrum access for CRN with energy harvesting and derived the sensing probability. The authors in [23] also formulated the optimization problem to maximize the area throughput of CRN under the performance constraint of primary network. They adopted the stochastic geometry theory to analyze system performance and proposed an efficient algorithm to allocate the bandwidth and time resources for facilitating both the EH and data transmission.
However, the previous works [14,15,16,17,18,19,20,21,22,23] did not consider the case that the PU may reoccupy the idle channel during the CS’s data transmission time. According to this master of literature, only a small amount have taken the case mentioned above into account in designing the energy-efficient spectrum sensing scheme. The authors in [4] considered a framework to jointly optimize design parameters (sensing duration, transmission duration, and the number of cognitive users) that maximized the energy-efficiency. On the basis of the [4], the authors in [5] optimized transmission power and sensing time to maximize energy efficiency and proposed an iterative algorithm to reduce the complexity of solving the optimization problem. The previous works [4,5] both considered possibility of resuming PU activity during transmission period of the CSs. However, they did not use the energy harvesting to provide the energy supplies for CSs.

1.2. Contribution

The contribution of this paper is twofold. First, we introduce the Harvesting-Sensing-Transmission (HST) framework for EH-CSN. Within this framework, to guarantee high quality of service (QOS) for CSs, we consider the case that the PU may reoccupy the idle channel during the CS’s data transmission time. We jointly optimize harvesting time, sensing time and transmission time to maximize the throughput of EH-CSN under the energy causality and collision constraint. In order to reduce the analytic complexity of the proposed problem and to improve the convergence speed of the computation, the optimized problem is formulated as a function based on two time fractions, which will represent the harvesting time, sensing time and transmission time.
In addition, by exploiting the hidden constraints of the optimization problem, we derive the exact lower and upper bounds of the time fraction β . Based on the derived interval of β , we prove the uniqueness and existence of the optimal α , β . Through mathematical reformulation, we derive the theoretical expression to determine the optimal α and β . An iterative algorithm is proposed to determine the optimal design parameters for CSN.
This remainder of this paper is organized as follows: Section 2 introduces our system model. Problem formulation and solution is presented in Section 3. Simulation results are presented and discussed in Section 4. Finally, our conclusions are provided in Section 5.

2. System Model

Considering a EH-CSN comprised of a pair of energy harvesting enabled CS transceivers and a pair of power-supplied PU transceivers. The EH-CSN is assumed to operate in a time-slotted fashion. The CS stores the harvested energy in its energy storage device (e.g., a super capacitor). Such a device cannot charge and discharge simultaneously, and the energy storage device stops working while CS turns on spectrum sensing or data transmission. That is, the CS is assumed to operate in a “energy half-duplex mode” [24]. Moreover, compared to the harvested energy, the battery capacity is assumed to be infinite, which can avoid the energy overflow. The CS is permitted to access the licensed frequency band not occupied by the PU opportunistically. Consider π 0 to be the probability that a PU is active and π 1 be the probability that a PU is passive. π 0 + π 1 = 1 , π 0 and π 1 can be found based on the long-term measurements. According to [4,25], the durations of PUs’ states are assumed to be an exponential distribution with averages of τ 0 and τ 1 . Then, π 0 = τ 0 τ 0 τ 0 + τ 1 τ 0 + τ 1 and π 1 = τ 1 τ 1 τ 0 + τ 1 τ 0 + τ 1 .
The time-slotted duration T is assumed to be divided into three parts: harvesting duration α T , sensing duration β T and transmission duration 1 α β T , where α is the time fraction of harvesting and is defined as the ratio of harvesting duration to T, β is the time fraction of sensing and is defined as the ratio of sensing duration to T. Then, the probability that PU may resume its activity when CS transmits data can be expressed as P I = 1 e 1 α β T τ 0 . The average rate of energy harvesting and the average energy consumed rate of sensing are assumed to be e H (J/s) and e S (J/s), respectively. Moreover, the e H and e S will take some unchanged values at a specific time or in a specific area. Moreover, the battery has a storing efficiency η 0 η 1 . The energy consumption of the CS should not exceed the harvested energy within a time slot, that is η e H α T e S β T , which indicates the energy constraint.
If the sampling frequency is f s and an energy detector is adopted by CS to calculate the energy statistic over the sensing duration β T , the number of sampling points is L = β T × f s . A PU’s transmitted signal is assumed to be an independent and identically distributed ( i i d ) random process with zero mean and variance σ x 2 . The noise is also assumed to be a real-valued Gaussian variable with zero mean and variance σ n 2 . The received signal power at the CS’s transmitter is σ r 2 = h p c σ x 2 , and h p c is the channel gain from PU’s transmitter to CS’s transmitter. If the k-th sampling point of the CS is y k , then the energy statistic established by CS is S = 1 L k = 1 L y k 2 . When the sampling points are sufficient, S follows the Gauss distribution because of the central limit theorem (CLT). f x x H θ H θ ,   θ 0 , 1 is assumed to be a probability density function of S under the hypotheses H 0 and H 1 , and
f x / H 0 = e x σ n 2 4 σ n 4 / L 2 π 2 σ n 4 / L ,   0 x < , f x x H 1 H 1 = e x σ n 2 σ r 2 4 σ r 2 + σ n 2 2 4 σ r 2 + σ n 2 2 L L 2 π 2 σ r 2 + σ n 2 2 2 σ r 2 + σ n 2 2 L L ,   0 x < .
Nevertheless, formula (1) is obtained by satisfying the condition that the received signal and noise are both real valued. If they are both circularly symmetric and complex valued, the parameters of the probability density function will be changed. However they are outside the scope of our discussion.
Then, the detection probability P d and the false alarm probability P f are given by
P d = Q λ σ n 2 + σ r 2 σ n 2 + σ r 2 σ n 2 + σ r 2 β T f s β T f s 2 2 β T f s β T f s 2 2 , P f = Q λ σ n 2 σ n 2 σ n 2 β T f s β T f s 2 2 β T f s β T f s 2 2 ,
where λ is the detection threshold. From formula (2), we know that the P d and P f interact with each other. It is hard to obtain the highest detection probability while keeping the lowest false alarm probability. We usually need to design the appropriate sensing parameters for achieving the trade-off between the detection probability and false alarm probability.
In our proposed model, the battery capacity is assumed to be infinite and to be the ideal one without any energy losses. If the battery capacity is finite, we will add another constraint which avoids the energy overflow, thus making the performance analysis intractable. In addition, the proposed model assumes that the harvested energy will be consumed completely in each time slot. However, in some scenes, in order to ensure the reliability of the data transmitting, the transmitted power needs to reach a certain value. In that case, we will add another constraint that satisfies the requirement for the transmitted power. Moreover, if the sensor node is assumed to operate in a “energy full-duplex mode”, we need to redesign the assignment policy and reconsider the optimization object. Whether the above-mentioned more complicated models would affect the assignment policy of time resource and energy resource needs to be studied more in depth in a new study, and is beyond the scope of this paper.

3. Problem Formulation and Solution

An important metric for the system performance of a CSN is average throughput. According to the [26], we know that CS’s achievable throughput consists of two parts: C 0 and C 1 , where C 0 is the volume of data transmitted during the transmission duration when the PU is absent and C 1 is the volume of data transmitted during the transmission duration when the PU is present. C 1 is not considered since CS would be collided with PU, which results in the high data error rate at CS’s receiver. The C 1 is very small compared to the C 0 . In this paper, we will only take C 0 into account rationally. If no false alarm is generated at CS’s transmitter over sensing duration β T , C 0 can be given by
C 0 = 1 α β T T log 2 1 + γ c s ,
where γ c s denotes the ratio of the received power to the noise power at the CS’s receiver. The energy left for data transmission can be expressed as η e H α T e S β T . Then, the γ c s can be expressed as
γ c s = h c s η e H α T e S β T σ n 2 1 α β T ,
where h c s is the channel gain from CS’s transmitter to CS’s receiver. It must be noted that the propagation issues will affect the optimal energy harvesting time, sensing time and transmission time. However, no matter what value the propagation issue is set to, the method to analyze the optimization objective keeps the same. For simple analyticity, the propagation issue h c s gets the value 1. If the probability of false alarm and the possibility that the PU may reoccupy the idle channel during the CS’s data transmission are taken into account for investigating the achievable throughput. The average achievable throughput R of the CS in each time-slot is given by
R = C 0 1 P f π 0 1 P I .
From formula (5), one can see that α and β are the only two parameters which affect the system performance of EH-CSN in our proposed scheme. The harvesting duration, sensing duration, and transmission duration are completely controlled by α and β . Finally, the goal of this paper is to design α and β together with an eye toward maximizing the achievable throughput under the collision constraint and energy constraint. Then, we formulate the optimization problem as follows:
max α , β C 0 1 P f π 0 1 P I , s . t . P d P ¯ t h , η e H α T > e S β T , α + β < 1 , α > 0 ,   β > 0 ,
where P ¯ t h is the target detection probability, which represents the collision constraint. Choosing the P d = P ¯ t h , the detection threshold can be expressed as λ = σ r 2 + σ n 2 1 + Q 1 P ¯ t h β T f s β T f s 2 2 . From the section “Optimality conditions” in [27], the Karush–Kuhn–Tucker (KKT) optimality conditions and complementary slackness are adopted in this optimization problem. It is not necessary for us to discuss the convexity of formula (6) with respect to α and β . Using Lagrange multipliers, we can transform the constrained optimization problem into an unconstrained optimization problem as follows:
ψ α , β = C 0 1 P f π 0 1 P I + μ 1 e S β T η e H α T + μ 2 α + β 1 μ 3 α μ 4 β ,
where μ 1 ,   μ 2 ,   μ 3 ,   μ 4 are non-negative Lagrange multipliers.
Differentiating ψ α , β with respect to α and β respectively, we can derive that
d ψ α , β d α = C α , β F β θ α , β π 0 F β θ α , β ln 2 σ n 2 1 α β + η e H α e S β η e H η e H β e S β π 0 + α + β 1 C α , β F β θ α , β π 0 T τ 0 μ 1 η e H T + μ 2 μ 3
d ψ α , β d β = C α , β F β π 0 θ α , β + e S η e H α e S α F β π 0 θ α , β ln 2 σ n 2 1 α β + η e H α e S β + exp A β + B 2 2 × α + β 1 C α , β A π 0 2 π × 2 β θ α , β + α + β 1 C α , β F β π 0 θ α , β T τ 0 + μ 1 e S T + μ 2 μ 4 ,
where
γ = σ r 2 σ n 2 ,   A = γ T f s T f s 2 2 ,   B = Q 1 P ¯ t h 1 + γ , C α , β = log 2 1 + η e H α e S β σ n 2 1 α β , F β = 1 P f = 1 Q A β + B , θ α , β = 1 P I = e 1 α β T τ 0 ,
and the complementary slackness conditions are given by
μ 1 e S β T η e H α T = 0 , μ 2 α + β 1 = 0 , μ 3 α = 0 ,   μ 4 β = 0 , μ 1 0 ,   μ 2 0 ,   μ 3 0 ,   μ 4 0 .
In EH-CSN, e S β T η e H α T = 0 denotes that the harvested energy is completely consumed by spectrum sensing, it will not leave any energy for data transmission. α + β 1 = 0 shows that the duration of data transmission is zero. α = 0 shows that the duration of energy harvesting is zero, and β = 0 shows that the duration of spectrum sensing is zero. If any of the above-mentioned four situations occur, EH-CSN will not work properly. Thus, in our optimization problem, the optimal Lagrange multipliers μ 1 ,   μ 2 ,   μ 3 ,   μ 4 always need to get zero.
Theorem 1.
There exists an unique optimal set α , β that maximizes the achievable throughput, where β β 1 , β 2 and β 1 ,   β 2 meet the conditions ρ β 1 = 1 and ξ β 2 = 0 , respectively. In the meantime, β meets the following equation:
ln 1 η e H σ n 2 + η e H η e H β e S β σ n 2 τ 0 T 1 ρ β = 1 ρ β × η e H η e H β e S β σ n 2 η e H τ 0 T 1 ρ β + η e H η e H β e S β .
The optimal α = 1 β τ 0 T 1 ρ β , where
ρ β = η e H η e H β e S β F β η e H + e S × 1 2 π × exp A β + B 2 2 × A 2 β ξ β = ρ β T τ 0 1 + e S η e H β + T τ 0 1 .
Proof. 
See Appendix A. ☐
Then, we propose Algorithm 1 to determine the optimal α , β that maximizes the achievable throughput. Bisection is firstly used to numerically find the lower bound β 1 , the upper bound β 2 and the optimal β , and it is denoted as b i s f x ,   g x ,   x 1 ,   x 2 , where f x and g x are the functions that we want to determine the root of f x = g x , while x 1 ,   x 2 are the lower and upper bounds to which the root belongs.
The algorithm firstly reduces the interval which the sensing fraction β belongs to. This step provides an advantage of speeding up the searching rate. In addition, the derived lower and upper bounds for β guarantee the unique root of the equation ς β = υ β . The proposed algorithm is designed based on the existence and uniqueness of the optimal sensing fraction β , which has been proved in Appendix A. The relationship between α and β is expressed as α = 1 β τ 0 T 1 ρ β , which is demonstrated in Figure 1.
Based on the assumption that the durations of PU’s states are assumed to be an exponential distribution, we derive the optimal time assignment policy and propose the efficient algorithm to determine the optimal design parameters for CSN. However, we need to know that the durations of PUs’ states may not always follow the exponential distribution and do not have the memoryless property in many actual application scenes. When PU busy periods are correlated, for example, it follows log-normal distribution, then the probability that PU may resume its activity when CS transmits data can be expressed as another complicated formula. As result, it is necessary for us to adopt another method to solve the optimization problem in that case. In the meantime, we may hardly determine the exact lower and upper bounds of the time fraction. Moreover, it may be hard to prove the uniqueness and existence of the optimal time set. Compared to our proposed algorithm, the approaches to solve the optimization problem when PU busy periods are correlated may be completely different. Thus, our proposed model is suitable for the PU’s state with exponential distribution. If we encounter other distribution, we need to exploit specific method to solve those problems.
Algorithm 1 Finding the optimal set α , β
1:
Input f s , T , γ , e H , e S , τ 0 , P ¯ t h , σ n 2
2:
Compute β 1 = b i s ρ β , 1 , 0 , η e H e H + e S
3:
Compute β 2 = b i s ξ β , 0 , 0 , η e H η e H + e S
4:
Compute β = b i s ς β , υ β , β 1 , β 2
5:
Compute α = 1 β τ 0 T 1 ρ β
6:
Return α , β

4. Simulations

The above theoretical analysis is verified and shown through numerical simulations in this section. The simulation parameters are summarized in Table 1, where the γ is just the signal-to-noise radio. Taking the solar energy as an example, the harvesting efficiency of solar energy is usually assumed to be 0.5 J/s, which is usually greater than the noise variance. The EH-CSN can obtain the maximum throughput when the time fraction set is α = 0.1205 ,   β = 0.2389 calculated from Algorithm 1. In order to demonstrate the accuracy of the optimal α and β derived from the Algorithm 1 in Section 3, we consider that α , β both vary in the range 0 , 1 . In order to avoid the overflow in computation, we must add some constraints to formula (5) for calculating the achievable throughput, that is
R = 0 , η e H α T e S β T 0 , o r 1 α β 0 , C 0 1 P f π 0 1 P I , e l s e .
Figure 2 plots the normalized achievable throughput against α and β . The exhaustive search method is used to search the maximum point of the normalized throughput. Then, we can get the optimal simulation solution (0.12,0.238) for α , β , which perfectly matches with the theoretical solution (0.1205,0.2389) derived from the proposed Algorithm 1. Thus, the proposed algorithm is efficient to determine the optimal time assignment policy.
Next, in order to provide a better understanding on how the γ affects the system performance, we take the achievable throughput, the optimal α and β as a function of γ . Figure 3 plots the optimal α , β and the corresponding achievable throughput against γ respectively. Figure 4 plots the lower bound β 1 , the upper bound β 2 and the optimal β versus γ . One can see that the β increases firstly and decreases subsequently as γ increases. In the meantime, the α changes a little as γ increases. This is because when the γ is lower than a certain value, the CS needs more sensing duration to improve the detection probability, which satisfies the target detection performance. When the γ continues to increase above a certain value, the CS needs less sensing duration to determine the status of PU while keeping the high detection performance. Then, it will leave more time for CS to transmit data, which would lead to the increasing of achievable throughput. However, the γ continues to increase, the residual time 1 α β × T will not vary very much, which makes CS obtain the stable throughput.
Finally, the impact of varying γ on the false alarm probability for different P ¯ t h , at the corresponding optimal α , β is demonstrated in Figure 5. In this paper, the false alarm probability target is not taken as an additional constraint to the optimization problem (6). If the false alarm probability constraint is set to 0.1, which is shown with the red line. It is easily shown that the derived optimal operating point α , β cannot meet the false alarm probability target if the γ is less than a certain threshold value—for example, when P ¯ t h = 0.9 , γ = 9 dB just meets the false alarm probability target 0.1 and the corresponding optimal operating point is α = 0.107 ,   β = 0.164 . If γ < 9 dB, the false alarm probability target cannot be satisfied at any points.

5. Conclusions

In order to design an optimal time assignment policy for EH-CSN, we formulated the optimization problem to maximize the achievable throughput under the collision constraint and the energy constraint. We derived the lower and upper bounds of the time fraction of energy harvesting in the process of solving the optimization problem. Analytical and simulation results showed that there existed a unique time fraction set to maximize the achievable throughput. An efficient algorithm was proposed to find the optimal set of time fractions. Finally, our theoretical analysis is also verified through numerical simulations.

Author Contributions

H.W. and Y.C. conceived and designed the framework and experiments; H.W. performed the experiments and wrote the paper.

Funding

This research was funded in part by the National Natural Science Foundation of China under 614713925 and in part by the Jiangsu Provincial Natural Science Foundation of China under Grant BK20161125 and in part by the Defense Science Foundations of China under Grant 3502007.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 1

Substituting μ 1 = 0 ,   μ 2 = 0 ,   μ 3 = 0 ,   μ 4 = 0 into d ψ α , β d α = 0 and d ψ α , β d β = 0 , we compute d ψ α , β d α d ψ α , β d β = 0 and derive the following expression:
F β η e H + e S ln 2 σ n 2 1 α β + η e H α e S β = A × C α , β 2 π × 2 β e A β + B 2 2 .
From d ψ α , β d α = 0 , we can easily get the following equation:
C α , β = 1 ln 2 × η e H η e H β e S β σ n 2 1 α β + η e H α e S β 1 + α + β 1 T τ 0 .
Substituting formula (A2) into formula (A1), it is derived that
η e H η e H β e S β F β η e H + e S × 1 2 π × exp A β + B 2 2 × A 2 β = 1 T τ 0 1 α β .
Then, the left-hand side of the above equation can be denoted as
ρ β = η e H η e H β e S β F β η e H + e S × 1 2 π × exp A β + B 2 2 × A 2 β .
Substituting formula (A4) into formula (A3), we can get the expression of α as follows:
α = 1 τ 0 T 1 ρ β β
According to the constraint conditions from the formula (6), that is η e H α T > e S β T and α + β < 1 , it is derived that
0 < β < η e H e S + η e H , 1 β > α > e S η e H β .
From formula (A3), due to T τ 0 1 α β > 0 , we can derive ρ β < 1 . Substituting formula (A5) into η e H α T > e S β T , it is derived that
ρ β T τ 0 1 + e S η e H β + T τ 0 1 > 0 .
Let
ξ β = ρ β T τ 0 1 + e S η e H β + T τ 0 1 .
Then, ξ β > 0 . Obviously, ρ β and ξ β both decrease with β , which is in the range 0 < β < η e H e S + η e H . β 1 and β 2 are assumed to satisfy the ρ β β = β 1 1 = 0 and ξ β β = β 2 = 0 , respectively. From (A8), we can get ξ β ρ β 1 = T τ 0 T τ 0 1 + e S η e H β , the right term T τ 0 T τ 0 1 + e S η e H β is always greater than zero for 0 < β < η e H e S + η e H . Thus, we can get ξ β ρ β 1 . It can be concluded that 0 < β 1 β β 2 < η e H η e H + e S .
According to the denotation of C α , β in formula (10) and formula (A2), it is derived that
log 2 1 + η e H α e S β σ n 2 1 α β = 1 ln 2 × η e H η e H β e S β σ n 2 1 α β + η e H α e S β 1 1 α β T τ 0 .
Substituting formula (A5) into formula(A9), we can derive that
ln 1 η e H σ n 2 + η e H η e H β e S β σ n 2 τ 0 T 1 ρ β = 1 ρ β × η e H η e H β e S β σ n 2 η e H τ 0 T 1 ρ β + η e H η e H β e S β .
Through some mathematical processing, Equation (A10) can be expressed as
1 ρ β × ln 1 η e H σ n 2 + η e H η e H β e S β σ n 2 τ 0 T 1 ρ β = 1 + σ n 2 η e H τ 0 T 1 ρ β η e H η e H β e S β .
Let
ς β = 1 ρ β ln 1 η e H σ n 2 + η e H η e H β e S β σ n 2 τ 0 T 1 ρ β , υ 1 β = 1 ρ β η e H η e H β e S β , υ β = 1 + σ n 2 η e H τ 0 T υ 1 β .
Then, we can rewrite Equation (A11) as follows:
ς β = υ β .
Thus, the optimal β must satisfy the equation ς β = υ β . Then, the proof of the existence and uniqueness for the optimal β will be shown in the subsequent parts.
Because ρ β decreases with β , it is easily derived that ς β and υ 1 β increase with β for β 1 β β 2 . Due to lim β β 1 ς β = 0 ,   lim β β 2 ς β = + , lim β β 1 υ β = 1 ,   lim β β 2 υ β = 1 + σ n 2 η e H η e H , there at least exists one point which makes ς β = υ β over the range β 1 β β 2 . Therefore, the existence of the optimal β has been proved. Then, we will show the uniqueness for the optimal β .
Three cases should be considered when we analyze the relationship between ς β and υ β versus β .
(1) If σ n 2 < η e H . In this case, υ β is decreasing in β and ς β is increasing in β . Thus, ς β intersects υ β once, which is shown in Figure A1.
(2) If σ n 2 = η e H . In this case, υ β is a constant value which equals 1. Thus, ς β intersects υ β once, which is shown in Figure A1.
(3) If σ n 2 > η e H . In this case, υ β is also increasing in β . Let β 4 > β 3 , u β = ln 1 + η e H η e H β e S β σ n 2 τ 0 T 1 ρ β η e H σ n 2 , and ϖ β = ς β υ β ; then, ς β = 1 ρ β u β . Computing the ϖ β 2 ϖ β 1 , we can derive that
ϖ β 4 ϖ β 3 = 1 ρ β 4 u β 4 1 ρ β 3 u β 3 σ n 2 η e H τ 0 T υ 1 β 4 υ 1 β 3 > 1 u β 4 1 ρ β 4 1 ρ β 3 σ n 2 η e H τ 0 T 1 ρ β 4 η e H η e H β 4 e S β 4 1 ρ β 3 η e H η e H β 3 e S β 3 > σ n 2 τ 0 T 1 ρ β 4 η e H η e H β 4 e S β 4 ρ β 3 ρ β 4 ρ β 3 ρ β 4 τ 0 T σ n 2 η e H 1 ρ β 4 η e H η e H β 4 e S β 4 + τ 0 T σ n 2 η e H 1 ρ β 3 η e H η e H β 3 e S β 3 > σ n 2 τ 0 T 1 ρ β 4 ρ β 3 ρ β 4 η e H η e H β 4 e S β 4 τ 0 T σ n 2 η e H 1 ρ β 4 η e H η e H β 4 e S β 4 + τ 0 T σ n 2 η e H 1 ρ β 3 η e H η e H β 3 e S β 3 > τ 0 T 1 ρ β 3 σ n 2 ρ β 3 ρ β 4 η e H η e H β 3 e S β 3 > 0 .
Thus, ϖ β increases with β , and lim β β 1 ϖ β = 1 , lim β β 2 ϖ β = + , and there must exist only one β that makes ϖ β = 0 . Thus, ς β intersects υ β once, which is shown in Figure A1.
Based on the above analysis, it can be concluded that there exist unique β over the range β 1 β β 2 . The existence and uniqueness of β has been proved. Once the e H and σ n 2 are given, the relationship between ς β and υ β will be determined. From ς β = υ β , the bisection method can be adopted to acquire the optimal β . After getting the optimal β , the optimal α can be expressed as α = 1 β τ 0 T 1 ρ β . According to the noise distribution characteristics of CSN and the developmental level of energy harvesting, σ n 2 < η e H is almost available for the communication systems generally.
Figure A1. Illustration of ς β and υ β versus β over the range β 1 β β 2 .
Figure A1. Illustration of ς β and υ β versus β over the range β 1 β β 2 .
Sensors 18 02540 g0a1

References

  1. Zhang, C.S.; Du, H.Y.; Ge, J.H. Energy-Efficient Power Allocation in Energy Harvesting Two-Way AF Relay Systems. IEEE Access 2017, 5, 3640–3645. [Google Scholar] [CrossRef]
  2. Wu, Q.Q.; Tao, M.X.; Ng, D.W.K.; Chen, W.; Schober, R. Energy-Efficient Resource Allocation for Wireless Powered Communication Networks. IEEE Trans. Wirel. Commun. 2016, 3, 2312–2327. [Google Scholar] [CrossRef]
  3. Hu, H.; Zhang, H.; Liang, Y.C. On the Spectrum- and Energy-Efficiency Tradeoff in Cognitive Radio Networks. IEEE Trans. Commun. 2016, 64, 490–501. [Google Scholar] [CrossRef]
  4. Awin, F.A.; Raheem, E.A.; Ahmadi, M. Designing an Optimal Energy Efficient Cluster-Based Spectrum Sensing for Cognitive Radio Networks. IEEE Commun. Lett. 2016, 20, 1884–1887. [Google Scholar] [CrossRef]
  5. Awin, F.; Raheem, E.A.; Ahmadi, M. Joint Optimal Transmission Power and Sensing Time for Energy Efficient Spectrum Sensing in Cognitive Radio System. IEEE Sens. J. 2017, 2, 369–376. [Google Scholar] [CrossRef]
  6. Ozcan, G.; Gursoy, M.C.; Tran, N.; Tang, J. Energy-Efficient Power Allocation in Cognitive Radio Systems With Imperfect Spectrum Sensing. IEEE J. Sel. Areas Commun. 2016, 34, 3466–3481. [Google Scholar] [CrossRef]
  7. Wu, H.; Yao, F.Q.; Chen, Y.; Liu, Y.X.; Liang, T. Cluster-Based Energy Efficient Collaborative Spectrum Sensing for Cognitive Sensor Network. IEEE Commun. Lett. 2017, 21, 2722–2725. [Google Scholar] [CrossRef]
  8. Ku, M.L.; Li, W.; Chen, Y.; Liu, K.J.R. Advances in Energy harvesting communications: Past, Present, and Future Challenges. IEEE Commun. Surv. Tutor. 2016, 18, 1384–1412. [Google Scholar] [CrossRef]
  9. Huang, X.; Yu, R.; Kang, J. Software Defined Energy Harvesting Networking for 5G Green Communications. IEEE Wirel. Commun. 2017, 24, 38–45. [Google Scholar] [CrossRef]
  10. Li, K.H.; Teh, K.C. Optimal Spectrum Access and Energy Supply for Cognitive Radio Systems with Opportunistic RF Energy Harvesting. IEEE Trans. Veh. Technol. 2017, 66, 7114–7122. [Google Scholar]
  11. Kapoor, S.; Pillai, S.R.B. Distributed Scheduling Schemes in Energy Harvesting Multiple Access. IEEE Wirel. Commun. Lett. 2017, 6, 54–57. [Google Scholar] [CrossRef]
  12. Zhang, D.Y.; Chen, Z.G.; Ren, J.; Zhang, N.; Awad, M.K.; Zhou, H.B.; Shen, X.M. Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network. IEEE Trans. Veh. Technol. 2017, 66, 831–843. [Google Scholar] [CrossRef] [Green Version]
  13. Cichon, K.; Kliks, A.; Bogucka, H. Energy-Efficient Cooperative Spectrum Sensing: A Survey. IEEE Commun. Surv. Tutor. 2016, 3, 1861–1886. [Google Scholar] [CrossRef]
  14. Bhowmick, A.; Roy, S.D.; Kundu, S. Throughput of a Cognitive Radio Network With Energy-Harvesting Based on Primary User Signal. IEEE Wirel. Commun. Lett. 2016, 5, 136–139. [Google Scholar] [CrossRef]
  15. Wei, Q.Z.; Song, Q.Z.; Yin, S.X. Optimal Spectrum Sensing in Energy Harvesting Cognitive Radio Systems. China Commun. 2014, 11, 83–90. [Google Scholar]
  16. Park, S.; Hong, D. Optimal Spectrum Access for Energy Harvesting Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2013, 12, 6166–6179. [Google Scholar] [CrossRef]
  17. Jeya, P.J.; Kalamkar, S.S.; Banerjee, A. Energy Harvesting Cognitive Radio With Channel-Aware Sensing Strategy. IEEE Commun. Lett. 2014, 18, 1171–1174. [Google Scholar] [Green Version]
  18. Chung, W.; Park, S.; Lim, S.; Hong, D. Spectrum Sensing Optimization for Energy-Harvesting Cognitive Radio Systems. IEEE Trans. Wirel. Commun. 2014, 13, 2601–2613. [Google Scholar]
  19. Liu, Y.W.; Mousavifar, S.A.; Deng, Y.S.; Leung, C.; Elkashlan, M. Wireless Energy Harvesting in a Cognitive Relay Network. IEEE Trans. Wirel. Commun. 2016, 15, 2498–2508. [Google Scholar] [CrossRef]
  20. Yao, F.Q.; Wu, H.; Chen, Y.; Liu, Y.X.; Liang, T. Cluster-Based Collaborative Spectrum Sensing for Energy Harvesting Cognitive Wireless Communication Network. IEEE Access 2017, 5, 9266–9276. [Google Scholar] [CrossRef]
  21. Li, K.H.; Teh, K.C. Dynamic Cooperative Sensing Access Policy for Energy—Harvesting Cognitive Radio Systems. IEEE Trans. Veh. Technol. 2016, 65, 10137–10141. [Google Scholar]
  22. Bae, Y.H.; Baek, J.W. Achievable Throughput Analysis of Opportunistic Spectrum Access in Cognitive Radio Networks With Energy Harvesting. IEEE Trans. Commun. 2016, 64, 1399–1410. [Google Scholar] [CrossRef]
  23. Zhai, C.; Liu, J.; Zheng, L.N. Cooperative Spectrum Sharing With Wireless Energy Harvesting in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2016, 65, 5303–5316. [Google Scholar] [CrossRef]
  24. Yin, S.X.; Qu, Z.W.; Li, S.F. Achievable Throughput Optimization in Energy Harvesting Cognitive Radio Systems. IEEE J. Sel. Areas Commun. 2015, 33, 407–422. [Google Scholar] [CrossRef]
  25. Wang, B.; Feng, Z.Y.; Huang, D.Y.; Zhang, P. Discontinuous spectrum sensing scheme for energy-constrained cognitive radio networks. Electron. Lett. 2013, 49, 429–430. [Google Scholar] [CrossRef]
  26. Liang, Y.C.; Zeng, Y.H.; Peh, E.C.Y.; Hoang, A.T. Sensing-Throughput Tradeoff for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2008, 7, 1236–1337. [Google Scholar]
  27. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: New York, NY, USA, 2009. [Google Scholar]
Figure 1. β vs. the corresponding α , for different P ¯ t h .
Figure 1. β vs. the corresponding α , for different P ¯ t h .
Sensors 18 02540 g001
Figure 2. Normalized achievable throughput versus α & β ( γ = −16 dB).
Figure 2. Normalized achievable throughput versus α & β ( γ = −16 dB).
Sensors 18 02540 g002
Figure 3. The optimal α , β and achievable throughput versus γ .
Figure 3. The optimal α , β and achievable throughput versus γ .
Sensors 18 02540 g003
Figure 4. The lower bound β 1 , the upper bound β 2 and the optimal β versus γ .
Figure 4. The lower bound β 1 , the upper bound β 2 and the optimal β versus γ .
Sensors 18 02540 g004
Figure 5. Probability of false alarm P f vs. γ , for different P ¯ t h .
Figure 5. Probability of false alarm P f vs. γ , for different P ¯ t h .
Sensors 18 02540 g005
Table 1. Simulation parameters
Table 1. Simulation parameters
ParameterValue
Noise variance σ n 2 1 0 8 W
Time-slot duration T50 ms
The average rate of energy harvesting e H 0.5 J/s
The average consumed energy rate of sensing e S 0.1 J/s
The sampling frequency f s 100 kHz
τ 0 0.3
τ 1 0.2
Storing efficiency η 0.7
γ −16 dB
The target detection probability P ¯ t h 0.9

Share and Cite

MDPI and ACS Style

Wu, H.; Chen, Y. Optimal Time Assignment Policy for Maximizing Throughput in Cognitive Sensor Network with Energy Harvesting. Sensors 2018, 18, 2540. https://doi.org/10.3390/s18082540

AMA Style

Wu H, Chen Y. Optimal Time Assignment Policy for Maximizing Throughput in Cognitive Sensor Network with Energy Harvesting. Sensors. 2018; 18(8):2540. https://doi.org/10.3390/s18082540

Chicago/Turabian Style

Wu, Hao, and Yong Chen. 2018. "Optimal Time Assignment Policy for Maximizing Throughput in Cognitive Sensor Network with Energy Harvesting" Sensors 18, no. 8: 2540. https://doi.org/10.3390/s18082540

APA Style

Wu, H., & Chen, Y. (2018). Optimal Time Assignment Policy for Maximizing Throughput in Cognitive Sensor Network with Energy Harvesting. Sensors, 18(8), 2540. https://doi.org/10.3390/s18082540

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop