Keywords

1 Introduction

Cognitive radio is an innovative approach to wireless communication, which can improve spectrum utilization by spectrum sharing between primary users (PUs) and secondary users (SUs). Cognitive radio has been proposed in recent years to promote the spectrum utilization by exploiting the existence of spectrum holes [1]. According to Federal Communications Commission (FCC)[1, 2], the secondary users would sense the activities of the primary users periodically. When a channel is not occupied by a primary user, a secondary user can use the channel opportunistically after sensing. In a cognitive radio network, the SUs are allowed to access the spectrum in overlay or underlay model [3,4,5]. In underlay spectrum sharing scenario, the SU and the PU can access a licensed spectrum simultaneously as long as the interference caused to PU is kept below a predefined threshold [2]. SUs’ transmission power is constrained strictly. Accordingly, the SUs’ quality of service (QoS) can not be guaranteed and enhancing the SUs’ performance becomes a challenging issue.

For better exploitation of spectrum resources, and with the evolution of cognitive radio technologies, dynamic spectrum access [2, 3] becomes a promising approach to increase the efficiency of spectrum use, allowing an unauthorized wireless users (secondary users) to dynamically access the bands of spectrum holders (primary users). This efficiency can be improved considerably when dynamic spectrum access is associated with spectrum leasing. Dynamic spectrum leasing (DSL) [6] is proposed on the basis of DSA. In DSL model, spectrum licensees (called primary users) have the rights to sell or trade their spectrum to the third party. So primary users can lease their owned spectrum resources for a fraction of time to the secondary users to exchange reasonable remuneration. The authors in [9] proposed an improved cognitive radio (CR) model in which the secondary system can harvest energy from the primary system and access the spectrum of the primary system to transmit its own data in an underlay mode.

In this paper, we study the cooperation between PU and SU where PU use SUs to relay their message in exchange for spectrum access. We focus on designing an effective cooperation strategy for SUs to form a coalition so that the overall system performance (primarily, the throughput) can be improved. A distributed coalition formation algorithm for each SU is proposed in this paper to decide whether to join or leave a coalition based on the split and merge rules [7]. Such a decision is based on whether it can increase the maximal coalition utility value.

The rest of this paper is organized as follows. The network model and the cooperative transmission mechanism are illustrated in Sect. 2. We formulated the relay selection problem as coalitional game with transferable utility in Sect. 3 and also proposed the distributed game formation algorithm. In the Sect. 4, we analyze the performance of our proposed cooperative cognitive framework. Finally the Sect. 4 concludes the paper.

2 System Model

In our proposed framework, we assume that:

  • The network is dense where many SUs have the objective to access the channel.

  • The PU is willing to cooperate with the SUs and grant to a subset of secondary transmitters in exchange for cooperation (relaying) in the form of transmission.

  • The messages exchanged between the PU and the SU during the negotiation phase are not addressed in this paper.

  • Most of the SUs have best effort traffics (like web surfing, mails,...), these users will be authorized by the PU to share the canal with it even if the interference threshold is not respected. They will not waste time in sensing to check the presence of the PU and will leave the spectrum holes for SUs with real time services.

  • In the secondary network, each transmitter has information to deliver to a given secondary receiver (interference channel).

In this paper, we explore the ability of cognitive radio to provide sufficient capacity to support additional interference for the PU in exchange for cooperation. The PU will be willing to support additional noise level \(\varDelta \) (presented in Fig. 1) in his owned bandwidth for a fraction of time if, in exchange for this concession, they will benefit from enhanced quality of service (e.g., in terms of rate and also of outage probability). When the PU is active, he decides its strategy on the level of the additional noise level that he can support from the SUs, and also the number of successive time slots \(\mathbf X \) granted of SUs in this cooperation. This cooperation is modeled as a game, specifically, as a coalitional game.

The proposed system involves N Primary Network (owner of the spectrum rights) and M Secondary Users. The set of PUs and SUs are denoted by \( \mathscr {N} = \{1,2,....,N\}\) and \(\mathscr {M} = \{1,2,....,M\}\), respectively (Fig. 2).

Fig. 1.
figure 1

Cooperative spectrum sharing

Fig. 2.
figure 2

Coalition formation for collaborative spectrum access

In this paper, we consider a model where the SUs act as cooperative relays to assist the PUs transmission in exchange for spectrum accesses in overlay or underlay mode. The PU can coexist with one or more secondary systems and sharing the same frequency band. Both these two networks operate autonomously. Thus, the Primary Network is aware of the spectrum occupancy by PUs and the same for the Secondary Network. SUs can make use of free channels, or use the occupied channels under SINR constraints. Every PU in the \( \mathscr {N} = \{1,2,....,N\}\) will form a collation with one or more SUs, The coalition head is represented by the PU. The number of coalitions formed in our proposed model is equal to N.

The PU has two transmission modes: direct transmission and cooperative transmission. If PU selects direct transmission mode, it sends the data to its receiver directly over the entire primary portion.

In our proposed system, the time resource is partitioned into discrete time slots (Fig. 1). We suppose every channel is slot Rayleigh channel which means that the channel coefficient is constant in a slot and all transmissions are assumed to be slot synchronized. During the primary time slot, each PU may use the entire slot for direct transmission or to employ cooperation with SUs which determined by the coalition algorithm described in the next section.

The data transmission slot is divided into four portions, \(\alpha \), \(\beta \), \(\lambda \) and \(T-\alpha -\beta -\lambda \).

  • The Sensing phase with duration: \(\alpha \).

  • The Reporting phase with duration: \(\beta \).

  • The Negotiation phase with duration: \(\lambda \) (Coalition Formation).

  • The Data Transmission Phase with duration: \(T-\alpha -\beta -\lambda \).

The contributions of this paper can be summarized as follows:

  1. (1)

    We present a cooperation framework between primary users and secondary users.

  2. (2)

    Coalitional game theoretic model of spectrum access/sharing is presented.

  3. (3)

    We investigate the coalition formation and discuss the NE solution for our coalition game.

figure a

3 Proposed Cooperative Relay System

3.1 Coalition Game Overview

Coalition formation is a branch of game theory that investigates algorithms for studying the coalitional structures that form in a network. It’s recognized as an important tool in many fields, such as social sciences, biology, engineering, political science [13]. Coalitional games approaches can achieve better results in terms of performance and stability in cooperative communications networks. Coalitional games was classified in a tutorial paper [7] into three categories: canonical (coalitional) games, coalition formation games, and coalitional graph games.

3.2 Framework Conception

In this section, an algorithm for the coalition formation of our proposed framework is presented. The SU will start by sensing the canal in the sensing phase \(\alpha \) (presented in Fig. 1). If the PU is idle, then the SU will access the canal in its free spectrum holes using the Overlay Mode. The access will be granted for the current time slot. Otherwise, if the PU is active in the canal, the SU will share the same spectrum with the PU using the Underlay access mode. In our proposed model, SUs are authorized to exceed the predefined threshold with an additional interference \(\varDelta \). In turn, they will collaborate with the PU by relaying its data to their destinations. When the PU is active, one or more SUs can coexist with the PU in the same canal for X time slots. The values of \(\varDelta \) and X are defined by the PU during the negotiation phase \(\lambda \). In this case, for the next X time slots, the SUs will not waste energy in the sensing and the reporting phases, and will use the whole time slot with duration T.

Incorporating cooperation into cognitive radio networks, the SUs not only look for idle time slots to transmit their own data, but they may also relay the PUs’ packets. Thus, cooperation in cognitive radio networks can be regarded as a win-win situation. In our paper, the cooperation between the PU and the SUs is used when the PU is present in the canal and is willing to support additional interference. In general, the more SUs in the selected coalition, the less spectrum’s portion access. In turn, each SU may obtain less access time for its own data transmission. On the other hand, each SU may acquire more access time for its own data transmission if there is a fewer number of SUs in the coalition. Consequently, each SU in the game has the incentive to team up with the best partners so as to produce the maximal coalition utility value. This value depends also on the value \(\varDelta \) fixed by the PU at the beginning of the negotiation phase \(\lambda \). The coalition formation algorithm is detailed in Algorithm 1 based on the split and merge rules.

3.3 Throughput Calculation/Coalition’s Utility

As presented in the paper [11], a coalitional game G is uniquely defined by the pair (KU), where K is the set of players (PU and his SUs relay nodes), any non-empty subset \( \mathscr {C} \subseteq N\) is called a coalition, and U is the coalition value, it quantifies the worth of a coalition in a game. The strategy of each player is to decide on which coalition to join, and the payoff is the function \(U(\mathscr {C}_{j}; \varPi _{i})\).

The utility (denoted by U) is the aggregated utility value of a coalition. Specifically, \(U(\mathscr {C}_{j})\) denotes the total coalition utility value of the coalition \(\mathscr {C}_{j}\), where \(j\in \{1,2,...,N\}\) and \(\mathscr {C}_{j} \subseteq (N \cup M) \), which is defined as below:

$$\begin{aligned} U(\mathscr {C}_{j}) = \sum _{i=1}^{q_{j}+1} U_{i} \end{aligned}$$
(1)

Where \(q_{j}+1\) denotes the number of players in the coalition \(U(\mathscr {C}_{j})\) : one PU and \(q_{j}\) SUs.

The utility value \(U_{i}\) of each player is the difference between reward and cost, which is defined as:

$$\begin{aligned} U_{i}= R_{i}-C_{i} \end{aligned}$$
(2)

Where \(R_{i}\) and \(C_{i}\) represent respectively the reward and the cost given to \(SU_{i}/ PU_{i}\).

In our proposed coalition game, the throughput is considered as reward of the \(PU_{j}\) and \(SU_{ij}\) \((1 \le i \le q_{j} )\) in the coalition.

The cardinal of the coalition \(\mathscr {C}_{j}\) is equal to \(q_{j}+1\), so we have:

$$\begin{aligned} U(\mathscr {C}_{j}) = \sum _{i=1}^{q_{j}+1} (R_{i} - C_{i}) \end{aligned}$$
(3)

The aggregated utility value of each coalition is composed of the utility of the PU and the other SUs in his coalition. Then, after substitution:

$$\begin{aligned} U(\mathscr {C}_{j}) = (R_{PU_{j}} - C_{PU_{j}})+ \sum _{i=1}^{q_{j}} (R_{i} - C_{i}) \end{aligned}$$
(4)

Then we have :

The primary transmission rate is giving by :

(5)

In the equations below, W denotes the communication bandwidth, \(P_{s}\) and \(P_{p}\) the transmission power for the SU and the PU respectively, \(G_{i}^{j}\) the channel gain between node i and j and is modeled as independent zero mean complex Gaussian random variable with variance \(\sigma ^{2}\).

The achievable rate from PU transmitter-receiver over the channel on the direct link (without using the SU for relaying its data) is:

$$\begin{aligned} R_{Direct(PU)} = W * log_2 \left( 1+ \frac{P_p G_{p}^{p}}{\sigma ^{2} } \right) \end{aligned}$$
(6)

We assume that when the PU is active in the canal, it has many services in his queue to send to their destinations. He will benefit from cooperation with SUs and transmit some services to his coalition in order to relay them to their destinations. The achievable rate from Primary transmitter (PT) to Primary receiver (PR) over the channel with cooperative relay is:

$$\begin{aligned} R_{Coop(PU)} = L_{j} * \delta _{Succ(j)} * R_{Coop(SUij)} \end{aligned}$$
(7)

Where \(L_{j}\) denotes the packet length delivered by the PU of the coalition \(\mathscr {C}_{j}\) to its SUs in his coalition in order to deliver it (the packet) to PU’s receiver, and \(\delta _{Succ(j)}\) denotes the probability of successful delivery of a message by the SUs of the coalition \(\mathscr {C}_{j}\). According to [13], we have:

$$\begin{aligned} \delta _{Succ(j)} = 1- \varPi _{ .} Q_{SUij} \end{aligned}$$
(8)

Where is the \(Q_{SUij}\) probability that a SUij fails to deliver the copy of the PU’s packet to the destination. Thus, the throughput of \(SU_{ij}\) when relaying the PU’s data is:

$$\begin{aligned} R_{Coop(SUij)} = (T-\alpha -\beta -\lambda ) * W * log_2 \left( 1+ \frac{P_s G_{s}^{s}}{\sigma ^{2} } \right) \end{aligned}$$
(9)

The achievable rate from ST to SR over the channel in the overlay mode for one time slot is (\(\lambda =0\) in this case because there is no negotiation on the value of X between the PU and the SU):

$$\begin{aligned} R_{O}(SU) = \frac{T-\alpha -\beta }{T} * W * log_2 \left( 1+ \frac{P_{si} G_{si}^{si}}{\sigma ^{2} } \right) \end{aligned}$$
(10)

As explained above, the PU will grant access to his formed coalition for X time slots in the underlay mode. In the first time slot, SUs will negotiate with the PU in the negotiation phase \(\lambda \) on the value of X and the additional value \(\varDelta \). At the remaining time slots \(X-1\), SUs will exploit the whole time slot (without the sensing, the reporting and the negotiation phases). Then, the achievable rate from ST (Secondary Transmitter) to SR (Secondary Receiver) for all the \(SU_{ij}\) \((1 \le i \le q_{j} )\) in the coalition in the underlay mode for X time slots is:

$$\begin{aligned} R_{U}(SU_{i},X) = \frac{T-\alpha -\beta -\lambda }{T} W log_2 \left( 1+ \frac{P_{si} G_{si}^{si}}{\sigma ^{2} + \varDelta } \right) + (X-1) W \sum _{i=1}^{q_{j}} log_2 \left( 1+ \frac{P_{si} G_{si}^{si}}{\sigma ^{2} + \varDelta } \right) \end{aligned}$$
(11)

Then we have the average throughput for the SU in the underlay mode for the X time slot :

$$\begin{aligned} R_{U}(SU_{i}{Avrg}) = \dfrac{1}{X} * R_{U}(SU_{i},X) \end{aligned}$$
(12)

Thus,

$$\begin{aligned} R_{U}(SU_{i}{Avrg})&= \frac{T-\alpha -\beta -\lambda }{T * X} * W * log_2 \left( 1+ \frac{P_{si} G_{si}^{si}}{\sigma ^{2} + \varDelta } \right) \nonumber \\&+ \dfrac{X-1}{X}* W * \sum _{i=1}^{q_{j}} log_2 \left( 1+ \frac{P_{si} G_{si}^{si}}{\sigma ^{2}+\varDelta } \right) \nonumber \\ \end{aligned}$$
(13)

The SU will access in Overlay mode if the PU is idle in the canal and access in Underlay mode of he’s active. Let’s denote \(\varPi _p\), the probability of the presence of the PU in a given band, and Y the number of time slots when SU access in the Overlay mode. Thus, the total average throughput of the SU in our proposed model is presented below:

$$\begin{aligned} R_{Total(SU_{i},Avrg)} = \dfrac{Y}{X+Y}*(1-\varPi _p)*R_{O}(SU_{i}) + \frac{X}{X+Y} * \varPi _p * R_{U}(SU_{i}{Avrg}) \end{aligned}$$
(14)

3.4 Existence of Nash Equilibirum

The Nash equilibrium [15] is an important concept to measure the outcome of a non-cooperative game, which is a set of strategies, one for each player, such that no selfish player has incentive to unilaterally change his/her action.

According to [8], a Nash equilibrium exists if it satisfies the following conditions: \(\forall i \in N\) :

  1. (1)

    The action strategy profile \((A_{i})\) is a nonempty, convex, and compact subset of some Euclidean space.

  2. (2)

    The utility function \((U_{i})\) is a continuous and quasi-concave function over the strategy set of the players.

Proof: this can be achieved by showing the two conditions offered are met and the poof can be shown according to:

  • Since each CR user has a strategy profile that is defined by a spectrum access type with some transmission power, thus the first condition is readily satisfied.

  • To prove the second condition is also satisfied, we have to show that the given price based utility function \((A_{i})\) is quasi-concave \(\forall i \in N\).

The utility function is continuous and strictly concave because we have:

$$\begin{aligned} \frac{\partial ^{2} U^{\gamma }_{ab}}{\partial p_\gamma } > 0 \end{aligned}$$
(15)

Nash equilibrium of a game G is a strategy profile \(s^{*} \in S \) such that \(\forall i \in I \) we have the following

\( U_{i} (s_{i}^{*},s_{-i}^{*}) >= U_{i} (s_{i},s_{-i}^{*}) \forall s_{i} \in S_{i}, s_{i} \ne s_{i}^{*}, \forall i \in I \)

4 Simulations and Numerical Results

In this section, we provide and discuss numerical results about the system performance for \(N= 2\) and \(M= 5\). We aim to show by these simulations that both the PU and the SU can achieve reasonable throughput in our proposed cooperative model. For our simulations, we choose the default parameters as follow: \(K =200\,kHz\), \(Pp =10\,mW\), \(Ps(underlay)=0.1\,mw\), \(n0 =10^{-15}\,W; SINR =10\,dB\).

In Fig. 3, we plot the throughput’s variation for both PU and SU as a function of the variation of the \(\varDelta \). We note that the throughput of the PU without the cooperation decreases if the value of the \(\varDelta \) is increased, while it increases if the PU cooperates with SU. We can clearly see that the SU’s throughput is enhanced for higher value of \(\varDelta \).

In our game, every player is a general entity individual and uses a strategic learning algorithm to learn the best coalition and finally the system converge to Nash equilibrium. We use the imitative Boltzmann-Gibbs weighted strategy [11, 13]. In our paper, we are interested in SU’s strategies. Those of the PU will be studied in a future work.

Fig. 3.
figure 3

SU’s and PU’s throughput variation without and with cooperation

Fig. 4.
figure 4

Convergence of partition choice for five SUs

In Fig. 4, we plot the probability of partition’s convergence (\(N=2\), \(M=5\)). It shows that each SU can make a good decision on which partition to choose. SU1 to SU5 choose respectively partitions: \(\varPi _{28}\), \(\varPi _{7}\), \(\varPi _{24}\), \(\varPi _{28}\) and \(\varPi _{13}\). For the strategy \(\varPi _{32}\), no user converge to this strategy, because the reward for this one is the lowest one (all the SUs with the same PU that offers the lowest value of \(\varDelta \)).

From these simulations we can conclude that having a maximum utility (throughput) for players is due to the partition’s choice, which takes into account the value of \(\varDelta \) predefined by the PU and the number of the SUs present in the current coalition with the PU (Table 1).

Table 1. Possible Coalitions Structure for \(N=2\) and \(M=5\)

5 Conclusion

In this paper, we study the cooperation strategy for SUs in a CRN based on the coalition formation game theory. We focused on designing an effective cooperation strategy between PU and SU to form a coalition so that the overall system performance (primarily, the throughput) can be improved. We formulate the problem of cooperative spectrum access as a coalition game, which is solved by a proposed distributed coalition formation algorithm utilizing the split and merge rules. The simulation results showed that networks performances increase with the proposed scheme especially in terms of the throughput enhancement.