1 Introduction

The explosive growth of real time wireless communication applications requires unprecedented demand on the radio spectrum [1]. However, wireless spectrum is scarce resource and the fixed spectrum allocation approach has seriously affected the development and the applications of wireless networks [2]. Therefore, to improve spectral efficiency becomes main goal for wireless communication networks and a challenging task for researchers worldwide. Cognitive radio (CR) has been proposed as a promising technology to upgrade the efficiency by using “spectrum holes” without affecting the spectrum used by primary users [3].

Power control plays an important role in CR networks for the improvement of the spectrum efficiency in wireless communications. For the past few years, some scientists have been working on enhancing network throughput [4,5,6,7] where the cognitive users adjust their transmit power to maximize their network rate under different constraints, including interference power limit from primary users, transmit power budget or SINR requirements for cognitive users.

High speed data transmission consumes more energy to guarantee quality of service (QOS) in wireless communications [8]. To overcome this problem, energy efficiency for cognitive radio networks has become increasingly crucial and attracted more attention from academic field recently. In [9], the authors consider a joint subchannel allocation and power control strategy to maximize energy efficiency of each cognitive transmitter for orthogonal frequency-division multiple access (OFDMA) CRNs with multiple cognitive transmitters. In [10], the authors consider power allocation schemes that adopt spectrum sharing combined with soft-sensing information, adaptive sensing thresholds, and adaptive power to design an energy efficient system. A power allocation scheme, basing on maximizing energy efficiency for spectrum sharing cognitive radio systems, is proposed in [11] with constraints in peak or average of power. In [12], the authors specifically deal with the problem of energy efficiency power control for single user OFDM-CR system. In [13], user association and power allocation in mm Wave-based ultra dense networks is considered with attention to load balance constraints, energy harvesting by base stations, user quality of service requirements, energy efficiency, and cross-tier interference limits. Zhang et al. [14] proposes a distributed radio resource allocation scheme to maximize the energy-efficiency in uplink OFDMA dense femtocell networks. They model the subchannel allocation and power control problem into a non-cooperation game. In [15], the studied scheme maximizes energy efficiency by allocating both transmit power of each small cell base station to users and bandwidth for backhauling, according to the channel state information and circuit power consumption. However, these existing works normally assume perfect knowledge about channel gain information, which is difficult or even infeasible to obtain perfectly in a practical CR network. In particular, the minimum acceptable SINR for all cognitive users can not be guaranteed when there exist perturbations in channel gains.

As an important issue for consideration in CRNs, robust energy efficiency power allocation has been studied in [16]. The authors investigate a robust energy efficiency maximization problem in underlay CRNs with multiple cognitive users and primary users. They consider that all channels lie in some bounded uncertainty regions. Under the worst-case conditions, a scheme to handle power allocation problem via fractional programming is proposed. An energy-efficient resource management with channel uncertainty is proposed in [17]. The authors aim to maximize the energy efficiency of a CR network while considering practical restrictions, including the power budget of the system, the interference thresholds of primary users, the rate requirements of cognitive users, and the fairness among them. The interference constraint is introduced as chance-constrained form and treated by the Bernstein approximation. These works consider the channel uncertainty with norm-bounded parameter perturbations. In [18], the authors propose a power control and sensing time optimization problem in a cognitive small cell network, where cognitive radio enabled small cell architecture is designed to opportunistically access the spectrum via cognitive small basestation. And there are no base stations or communication infrastructures in this paper.

The SINR of an active cognitive radio link may dip below the target requirement in the continuously changing environment. Different from the robustness considered in [16, 17], a protection algorithm is provided where robustness is captured in the constraints and the energy efficiency of communication links in the objective function in this paper. Our target is to maximize the energy efficiency of the cognitive system while having interference threshold protection factor and SINR requirement protection margin. The main contributions of this paper are summarized as follow:

  1. (1)

    An interference protection factor to provide a protection margin for the interference threshold of primary users is provided to keep the interference from cognitive-user transmitters below a permissible threshold that the primary user can tolerate. Thus the protection scheme can guarantee quality of service (QOS) of the primary users when there are disturbances in the network.

  2. (2)

    Based on protection factor, by using constrained fractional programming optimization that takes protection factors as the uncertain variables, a robust energy efficiency power allocation scheme is proposed with the consideration of total SINR of dB per joule of energy metric as an energy efficient objective function. Additionally, this scheme is also robust because of the introduction of interference constraint and target SINR requirement constraint.

The remainder of the paper is organized as follows. The system model for cognitive radio networks is introduced in Sect. 2. In Sect. 3, we present our robust energy efficiency power allocation algorithm. In Sect. 4, performance analysis for our proposed algorithm is performed through simulation results. Finally, the conclusion of this work is given in Sect. 5.

2 System model

We consider a cognitive radio network where a secondary system coexists with a primary system and each cognitive user has single transmitter and single receiver. We assume that there are \(M\) active cognitive radio transmitter–receiver pairs and only one primary user in the vicinity of interest, as shown in Fig. 1.

Fig. 1
figure 1

System model: underlay cognitive radio networks

In this system cognitive users share the radio spectrum with primary user via the underlay mode. For the underlay based CR systems, cognitive users can use same frequency spectrum with primary user as long as the interference power provided by cognitive users is less than a predefined tolerable threshold [19]

$$\sum\limits_{i} {p_{i} h_{i} } \le IT$$
(1)

where \(p_{i}\) denotes the transmit power of cognitive user \(i\). \(h_{i}\) denotes the channel gain between the primary receiver and cognitive transmitter \(i\). \(IT\) is defined in a way to make sure that the tolerant interference power threshold does not violate the threshold at the primary receivers [20]. This constraint protects the communication links of primary users.

Let \(g_{ij}\) be the channel gain from the cognitive transmitter \(j\) to the cognitive receiver \(i\) and it includes all path loss and fading effects. Let \(H_{i1}\) denote the channel from the primary transmitter to the cognitive receiver \(i\). \(T_{1}\) represents the transmit power for the primary user. The SINR at the receiver on the active link \(i\) can be written as

$$r_{i} = \frac{{g_{ii} p_{i} }}{{\sum\nolimits_{j \ne i} {g_{ij} p_{j} + H_{i1} T_{1} + n_{i} } }}$$
(2)

where \(n_{i}\) is the background noise at the cognitive receiver \(i\).

The SINR of cognitive user constitutes the QOS of the user. Since the cognitive user adjusts it’s transmit power to achieve the target SINR and maintain the desired QOS, we must make sure the SINR at each cognitive receiver achieves the value of its own target requirement. The achieved SINR satisfies

$$r_{i} \ge r_{i}^{fixed}$$
(3)

This constraint is the requirement that the \(i\)th received SINR is above a given SINR target \(r_{i}^{fixed}\) for all \(i\). In this work, we want to provide a flexible power control scheme, since it is addressed to QOS-flexible services [21], in such a way that the fixed target SINR can be adjusted according to a given performance criterion, which the fixed target SINR modified to support the time-varying target SINR

$$r_{i} \ge r_{i}^{t}$$
(4)

where \(r_{i}^{t}\) can be regarded as the minimum time-varying SINR determined from the QOS constraints.

The constraints (4) can be equivalently represented as

$$\left( {R - G} \right)P \ge N$$
(5)

where \(R\) is a diagonal matrix with \(\frac{1}{{r_{1}^{t} }},\frac{1}{{r_{2}^{t} }}, \ldots ,\frac{1}{{r_{M}^{t} }}\), matrix \(N = \left[ {\frac{{H_{11} T_{1} + n_{1} }}{{g_{11} }},\frac{{H_{21} T_{1} + n_{2} }}{{g_{22} }}, \ldots ,\frac{{H_{M1} T_{1} + n_{M} }}{{g_{MM} }}} \right]\), \(P = \left[ {p_{1} ,p_{2} , \ldots ,p_{M} } \right]^{T}\), and the element of matrix \(G\) is

$$G_{ij} = \left\{ {\begin{array}{*{20}l} {\frac{{g_{ij} }}{{g_{ii} }},} \hfill & {i \ne j} \hfill \\ {0,} \hfill & {i = j} \hfill \\ \end{array} } \right.$$
(6)

As we know that the performance of the green radio systems are usually measured by energy efficiency metric which presents the total SINR delivered to the destination per joule of consumed energy, i.e.,

$$\eta_{EE} = \frac{{\sum\nolimits_{i} {r_{i} } }}{{\sum\nolimits_{i} {p_{i} + P_{C} } }}$$
(7)

where \(\eta_{EE}\) denotes the energy efficiency.\(P_{C}\) presents the circuit power consumption of the source in the transmit mode.

Our goal is to maximize the energy efficiency of cognitive user with the constraints on that the total interference of cognitive users on primary user is below a given threshold and each cognitive user achieves a predefined SINR. This scheme is an energy efficiency algorithm (EEA). To be specific, we can figure out this problem of maximizing energy efficiency as the following fraction programming

$$\begin{array}{*{20}l} {\hbox{max} \frac{{\sum\nolimits_{i} {r_{i} } }}{{\sum\nolimits_{i} {p_{i} + P_{C} } }}} \hfill \\ {s.t.\quad C1:\sum\limits_{i} {p_{i} h_{i} } \le IT} \hfill \\ {\quad C2:r_{i} \ge r_{i}^{t} } \hfill \\ \end{array}$$
(8)

In our proposed power allocation algorithm, we assume that the instantaneous channel gains are perfectly estimated at the receiver. In particular, since this problem is not convex optimization, fractional programming approach is proposed in [22].

3 Robust energy efficiency power allocation algorithm

The channel gains in cognitive radio systems are imperfect owing to many practical factors. The energy efficiency power allocation algorithms without considering channel uncertainty are not appropriate when we concern this fact, since the allocated power by the traditional energy efficiency power allocation algorithms will break the optimization rules that assure the interference to primary user and the SINR requirement of the cognitive users under certain predefined threshold.

In addition, when new users enter the cell in the system or the channel gains perturbations exist, the optimal transmit power must be adjusted since the interference generated by the cognitive users may be violated the interference power threshold. When the interference power at a primary receiver is greater than the interference threshold, an outage event happens. The QOS of primary user will not be guaranteed. An active primary link protection scheme introduces a protection factor \(\varepsilon\) to the interference power threshold. The introduction of \(\varepsilon\) can cushion the perturbation of the channel gains, which is modified the interference constraint C1 in (8) as

$$\sum\limits_{i} {p_{i} h_{i} } \le IT\left( {1 - \varepsilon } \right)$$
(9)

where \(\varepsilon > 0\) and it is a simple percentage. This margin must be large enough such that the interference from cognitive users does not larger than the threshold. In particular, the larger \(\varepsilon\), the better we can protect primary users. Furthermore, \(\varepsilon\) should be a time-varying variable according to time-varying target SINR requirement. That is

$$\sum\limits_{i} {p_{i} h_{i} } \le IT\left( {1 - \varepsilon \left( t \right)} \right)$$
(10)

For our power allocation scheme, we call \(\varepsilon \left( t \right)\) the interference protection factor.

The SINR requirements for cognitive users should remain feasible and near-optimal under the perturbation of parameters in the nominal optimization problem. To guarantee that active cognitive users continue to have acceptable SINR when there are disturbances in the CRN, a protection margin \(\xi_{i} \left( t \right)\) is provided [20], i.e.,

$$r_{i} \ge r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)$$
(11)

where \(\xi_{i} \left( t \right)\) is the protection margin for each user’s SINR. \(\xi_{i} \left( t \right)\) must large enough so that the SINR of each cognitive user do not drop below the SINR target and cause SINR outage. We use the term “robust” in the sense of safety margin against SINR outage.

The proposed energy efficiency power control algorithm is modified to a robust version which solves the following power control problem subject to the time-varying robustness settings

$$\begin{array}{*{20}l} {\hbox{max} \frac{{f_{r} \left( {p_{i} } \right)}}{{f_{c} \left( {p_{i} } \right)}}} \hfill \\ {s.t.\quad C3:\sum\limits_{i} {p_{i} h_{i} } \le IT\left( {1 - \varepsilon \left( t \right)} \right)} \hfill \\ {\quad C4:r_{i} \ge r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)} \hfill \\ \end{array}$$
(12)

where \(f_{r} \left( {p_{i} } \right) = \sum\nolimits_{i} {r_{i} }\), and \(f_{c} \left( {p_{i} } \right) = \sum\nolimits_{i} {p_{i} + P_{C} }\). The robust energy efficiency algorithm (REEA) is formulated.

In the following section, we present robust power allocation formulation in cognitive radio network by using protection margins. We will enhance the interference constraint and the target SINR constraint to deal with this problem.

Robust optimization techniques based on the worst case analysis are more appropriate. In our proposed scheme, we take robustness into consideration through the introduction of the protection factors \(\varepsilon \left( t \right)\) and \(\xi_{i} \left( t \right)\) to the constraints C3 and C4 respectively. Larger protection factors guarantee that the interference power limits will not be violated and the SINR for each user will achieve the predefined value for larger perturbations.

Constraint C4 in problem (12) can be equivalently written as

$$C4^{\prime } :\;\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} \le \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}$$
(13)

We note that the problem (12) is nondeterministic polynomial (NP)-hard. Therefore, we must have its transformed forms that can provide an optimal solution. The original maximization optimize problem can be reformulated as a minimization problem so as to (12) can be written as

$$\begin{array}{*{20}l} {\hbox{min} \frac{{\sum\nolimits_{i} {p_{i} + P_{C} } }}{{\sum\nolimits_{i} {r_{i} } }}} \hfill \\ {s.t.\quad C3:\;\sum\limits_{i} {p_{i} h_{i} } \le IT\left( {1 - \varepsilon \left( t \right)} \right)} \hfill \\ {\quad C4^{\prime } :\;\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} \le \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} \hfill \\ \end{array}$$
(14)

The global optimal solution is difficult to obtain since (14) defines a non-linear fractional programming problem. Fortunately, (14) can be transformed into an equivalent parametric problem using fractional programming [23]. We introduce a time-varying parameter \(\alpha (t)\) by convex programming, and then we obtain a new optimization problem as

$$\begin{array}{*{20}l} {\hbox{min} \sum\limits_{i} {p_{i} + P_{C} } - \alpha \left( t \right)\left( {\sum\limits_{i} {\frac{{p_{i} }}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} } \right)} \hfill \\ {s.t.\quad C3:\;\sum\limits_{i} {p_{i} h_{i} } \le IT\left( {1 - \varepsilon \left( t \right)} \right)} \hfill \\ {\quad C4^{\prime } :\;\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} \le \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} \hfill \\ \end{array}$$
(15)

where \(\alpha \left( t \right)\) is for the target SINR requirement. If \({\text{p}}^{*} = \left[ {{\text{p}}_{1}^{*} , \ldots ,{\text{p}}_{I}^{*} } \right]^{T}\) is Nash equilibrium of the robust game (15) according to the particular value of \(\alpha \left( t \right)\) given by \(\alpha^{*} \left( t \right) = \frac{{f_{r}^{*} \left( {p_{i} } \right)}}{{f_{c}^{*} \left( {p_{i} } \right)}}\), \({\text{p}}^{*}\) is also the optimal solution of (14) [17]. That is, we can analyze energy efficiency over (15), subject to two constraints, which is equivalent to directly solve (12).

We use the Lagrange dual algorithm to get the optimal solution. The Lagrange function of the optimization problem in (15) for cognitive user \(i\) is

$$\begin{aligned} L_{i} \left( {p_{1} , \ldots ,p_{I} } \right) & = \sum\limits_{i} {p_{i} + P_{C} } - \alpha \left( t \right)\left( {\sum\limits_{i} {\frac{{p_{i} }}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} } \right) \\ & \quad + \lambda_{i} \left( {\sum\limits_{i} {p_{i} h_{i} } - IT\left( {1 - \varepsilon \left( t \right)} \right)} \right) + \sum\limits_{i} {\nu_{i} \left( {\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} - \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} \right)} \\ \end{aligned}$$
(16)

where \(\lambda_{i}\) and \(\nu_{i}\) are the Lagrange multipliers for two constraints in (15), respectively.

The points to meet the Karush–Kuhn–Tucker (KKT) conditions are the optimal solutions since (15) is a convex optimization problem. The KKT conditions [24, 25] for the cognitive user \(i\) are as follows

$$\begin{array}{*{20}l} {0 \le p_{i} \bot 1 - \frac{\alpha \left( t \right)}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }} + \lambda_{i} h_{i} - \frac{{\upsilon_{i} r_{i}^{t} }}{{p_{i}^{2} }} \ge 0} \hfill \\ {0 \le \lambda_{i} \bot \sum\limits_{i} {p_{i} h_{i} } - IT\left( {1 - \varepsilon \left( t \right)} \right) \ge 0} \hfill \\ {0 \le \upsilon_{i} \bot \frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} - \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }} \ge 0} \hfill \\ \end{array}$$
(17)

where \(\bot\) signifies orthogonal of the corresponding variables.

From the KKT conditions of (17), the maximum energy efficiency occurs at a power level for which the partial derivation of \(L_{i} \left( {p_{1} , \ldots ,p_{I} } \right)\) with respect to \(p_{i}\) is zero, i.e.,

$$p_{i}^{*} = \sqrt {\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)\nu_{i} }}{{1 - \frac{\alpha \left( t \right)}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }} + \lambda_{i} h_{i} }}}$$
(18)

where \(\lambda_{i}\) and \(\upsilon_{i}\) are the Lagrange multipliers for the constraints (14). These Lagrange multipliers can be updated by

$$\lambda_{i} = \left\{ {\lambda_{i} + \beta_{1} \left( {\sum\limits_{i} {p_{i} h_{i} } - IT\left( {1 - \varepsilon \left( t \right)} \right)} \right)} \right\}^{ + }$$
(19)
$$\upsilon_{i} = \left\{ {\upsilon_{i} + \beta_{2} \left( {\frac{{r_{i}^{t} \left( {1 + \xi_{i} \left( t \right)} \right)}}{{p_{i} }} - \frac{1}{{\sum\nolimits_{j \ne i} {G_{ij} p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}} }}} \right)} \right\}^{ + }$$
(20)

where \(\left[ x \right]^{ + } = \hbox{max} \left( {x,0} \right)\). \(\beta_{1}\) and \(\beta_{2}\) are iteration steps.

We shall further discuss the property of the protection factor \(\varepsilon \left( t \right)\) and \(\xi_{i} \left( t \right)\) about the interference power and SINR respectively. Our robust power allocation scheme is different from the robust model in Ref. [26]. We use the term robust in the sense of safety margin against the outage.

In [26], let \(\left( {h_{i} + \Delta h_{i} } \right)\) denote the channel gain between the cognitive transmitter \(i\) and the primary receiver, where \(h_{i}\) and \(\Delta h_{i}\) are the nominal value and the corresponding deviation part respectively. The first constraint in (8) can be written as

$$\sum {p_{i} } \left( {h_{i} + \Delta h_{i} } \right) \le IT$$
(21)

To be convenient for explanation, let \(\Delta h_{i} = \kappa \left( t \right)h_{i}\).\(\kappa \left( t \right)\) is percentage value. Re-writing (21) in percentage form

$$\sum {p_{i} } h_{i} \left( {1 + \kappa \left( t \right)} \right) \le IT$$
(22)

The interference power constraint at the primary receiver is given by (10), it is also expressed as follows:

$$\sum {p_{i} } \frac{{h_{i} }}{{\left( {1 - \varepsilon \left( t \right)} \right)}} \le IT$$
(23)

The inequalities (23) and (24) indicate that \(\varepsilon \left( t \right)\) has relationship with \(\kappa \left( t \right)\), i.e.,

$$1 + \kappa \left( t \right) = \frac{1}{1 - \varepsilon \left( t \right)}$$
(24)

According to (24), it is necessary that the protection factor be at a value \(\varepsilon \left( t \right)\) related to \(\kappa \left( t \right)\) via

$$\varepsilon \left( t \right) = 1 - \frac{1}{1 + \kappa \left( t \right)}$$
(25)

If the value \(\varepsilon \left( t \right)\) is roughly equivalent to the \(\left( {1 - \frac{1}{1 + \kappa \left( t \right)}} \right)\) for practical cognitive systems, our robust framework is equivalent to the robust algorithm [26] when other constraints unchanged.

The constraint C4 of problem (12) can be converted into the following form,

$$\frac{{p_{i} }}{{\sum\nolimits_{j \ne i} {G_{ij} \left( {1 + \xi_{i} \left( t \right)} \right)p_{j} + \frac{{H_{i1} T_{1} + n_{i} }}{{g_{ii} }}\left( {1 + \xi_{i} \left( t \right)} \right)} }} \ge r_{i}^{t}$$
(26)

The SINR constraint has the same part as the robust model [26] except \(\left( {1 + \xi_{i} \left( t \right)} \right)\). This indicates that these algorithms have the same effect if the denominator of the SINR constraint [26] times \(\left( {1 + \xi_{i} \left( t \right)} \right)\).

4 Simulation results

In this section, we provide simulation results to show the impact of protection factor \(\varepsilon \left( t \right)\) and protection margin \(\xi_{i} \left( t \right)\) on the energy efficiency attained with our optimal power control. We also present the performance analysis of the proposed algorithm for guaranteeing both interference power and target SINR requirements to each cognitive user. An ad hoc cognitive network is considered where a cognitive system coexists with a primary system.

We assume that there are three cognitive links and one primary link in the network. The simulation parameters here are similar with those given in [27], the channel gain \(h_{i}\) is chosen randomly from the interval \(\left[ {0.16,0.20} \right]\), with uniform distributions. The transmit power for primary user \(T_{1}\) and the interference power threshold \(IT\) are 0.8 and 0.315 mW respectively. The circuitry power consumption is \(P_{C} = 0.2\;{\text{mW}}\), and the link gains \({\mathbf{g}}\) from the cognitive transmitter \(j\) to the cognitive receiver \(i\) is

$${\mathbf{g}} = \left[ \begin{aligned} \begin{array}{*{20}c} {0.9531} & {0.0454} & {0.0318} \\ \end{array} \hfill \\ \begin{array}{*{20}c} {0.0494} & {0.9889} & {0.0547} \\ \end{array} \hfill \\ \begin{array}{*{20}c} {0.0233} & {0.0498} & {0.9540} \\ \end{array} \hfill \\ \end{aligned} \right]$$
(27)

In the first scenario, the target SINR requirement is \(r_{i}^{t} = 3.52\;{\text{dB}}\) for all users. Figure 2 depicts the convergence of the total transmit power by the REEA algorithm with different \(\varepsilon \left( t \right)\) and \(\xi_{i} \left( t \right) = 0\). From Fig. 2, the total transmit power of cognitive users increases with the increasing parameter \(\xi_{i} \left( t \right)\) under a fixed SINR protection factor, which means that more transmit power is required to give the cognitive users more protection under channel uncertainty. Larger \(\varepsilon \left( t \right)\) means higher channel uncertainty. Each cognitive user requires higher transmit power to overcome the impact of channel uncertainty.

Fig. 2
figure 2

The total transmit power of REEA with different interference protection factor

The total transmit power for REEA with different SINR protection factor are shown in Fig. 3. The \(\varepsilon \left( t \right)\) is zero, and other parameters are identical to previous scenario. It is obvious that the REEA algorithm with the higher SINR protection factor has higher total transmit power. The higher total transmit power can ensure that the SINR of each cognitive user is greater than the target SINR. In addition, higher transmit power is required to avoid the SINR at cognitive receiver below the target SINR under the imperfect channel state information (CSI).

Fig. 3
figure 3

The total transmit power of REEA with different SINR protection factor

In the second scenario, the disturbance parameters margin are \(\varepsilon \left( t \right) = 10\%\) and \(\xi_{i} \left( t \right) = 5\%\). The power allocation for the cognitive users for EEA and REEA based on utility function is presented in Fig. 4. We find that similar results are obtained when users update their transmit power with different algorithm. The REEA algorithm and EEA algorithm can converge to the equilibrium points quickly. Additionally, the powers allocated by REEA algorithm are less than those obtained by EEA algorithm, since there is a trade-off between power consumption and robustness consideration. As a result, each cognitive user requires lower transmit power to guarantee the interference power threshold from primary user, i.e., Eq. (10), and an acceptable level of performance under worst case interference conditions. Large \(\varepsilon \left( t \right)\) offers more protection to the cognitive users. From Eq. (18), the optimal transmit power of each cognitive user relates to \(\xi_{i} \left( t \right)\) by considering the uncertainty of channel gain. \(\xi_{i} \left( t \right)\) will increase under large perturbations. Larger \(\xi_{i} \left( t \right)\) means higher channel uncertainty. Each cognitive user requires higher power to overcome the impact of channel uncertainty. \(\varepsilon \left( t \right)\) has greater influence than \(\xi_{i} \left( t \right)\).While EEA algorithm does not consider the disturbance of the channel gains, hence the transmit power is constant. When the channel uncertainty happens, the unchanged powers of EEA algorithm may violate primary users’ interference power threshold.

Fig. 4
figure 4

Transmit power allocated by two algorithms for \(r_{i}^{t} = 3.52\;{\text{dB}}\)

In this scenario, the target SINR has changed to \(r_{i}^{t} = 5.11\;{\text{dB}}\) at the twenty-first time-step. All other parameters are the same as in the second scenario. The transmit power for all users are shown in Fig. 5(a) which shows the superiority of our robust REEA scheme because of lower power consumption. When we give perturbed parameters as \(G_{\Delta } = \sum\nolimits_{j \ne i} {\left| {\Delta G_{ij} } \right|^{2} } \le 0.015^{2}\) and \(h_{\Delta } = \sum\nolimits_{i} {\left| {\Delta h_{i} } \right|^{2} } \le 0.05^{2}\) for the consideration of practical situation where \(\Delta G_{ij}\) and \(\Delta h_{i}\) denote the perturbation part to the channel gains of \(G_{ij}\) and \(h_{i}\) respectively. The energy efficiency for EEA and REEA algorithms is provided Fig. 5(b). REEA scheme has higher energy efficiency since more number of bits is delivered to the destination per joule of energy consumed. In addition, as the target SINR increases, the optimal transmit power by two algorithms for all users’ increases, however, the energy efficiency of two schemes decreases. And with the protection margin are captured in the constraints, the energy efficiency increases.

Fig. 5
figure 5

Transmit power and energy efficiency of REEA and EEA schemes for different target SINR requirement. a Transmit power for REEA and EEA algorithms. b Energy efficiency for REEA and EEA algorithms

We compare the performance of the two schemes for guaranteeing the target SINR requirement. Figure 6 shows the evolution of received SINRs for all cognitive users when target SINRs change at time slot 20. Solid line shows the requirement imposed by the target SINR. REEA algorithm is closer to the SINR requirements. Due to the disturbance of the channel gains, the SINRs for REEA scheme are lower than those of EEA algorithm, but they satisfy the users’ needs. REEA offers the same disturbance scene as EEA but with much less energy expenditure. And from the perspective of energy efficiency, REEA algorithm is superior to EEA algorithm.

Fig. 6
figure 6

SINR of REEA and EEA algorithms for different target SINR requirement

As mentioned previously, the interference power generated by cognitive users should be lower than the permissible interference power threshold. Figure 7 shows the interference power of two schemes for different target SINR. We find that REEA algorithm demonstrates good robustness since the requirement on the interference power is always met. However, EEA algorithm breaks the limit when the target SINR increases, which implies that this scheme is not appropriate in cognitive radio networks since the interest of primary users is ruined. In fact, EEA scheme stops iterating when the interference threshold is violated.

Fig. 7
figure 7

Interference power for REEA and EEA algorithms

When new users enter the network, the interference power threshold of the primary users or the SINR of cognitive users may be violated by this new interference. In this scenario, we set the target SINR is \(r_{i}^{t} = 4.08\;{\text{dB}}\), the interference protection factor is \(\varepsilon \left( t \right) = 10\%\), and the SINR protection margin is \(\xi_{i} \left( t \right) = 7\%\). We suppose a new cognitive user joins the network at twentieth time-slot. The protection against the disturbance from the new user is shown in Fig. 8. We find that the transmit powers of each cognitive user for EEA and REEA algorithms are both able to reach equilibrium in several time-slots. In order to guarantee the target SINR requirement, each user must adjust the transmit power when the new user comes for both schemes. The optimal power of each user for REEA is lower than that of the corresponding allocated power for EEA scheme, since the proposed REEA scheme is a conservative algorithm which considers the worst situations.

Fig. 8
figure 8

Transmit power of REEA and EEA schemes when new user enters the network

Both the channel uncertainty between cognitive users and primary users and the channel uncertainty between cognitive users are considered in the proposed CRN. We set the channel uncertainty parameters \(G_{\Delta } = 0.02^{2}\) and \(h_{\Delta } = 0.02^{2}\) in the simulation, and the SINR of each user and the interference power for two schemes are shown in Fig. 9. We note that the transmit power of EEA scheme is larger than that of REEA scheme from Fig. 9(a). Once we get the optimal power from these two schemes, we compare the actual interference generated by the schemes to the primary network, respectively. In this way we will see that EEA scheme cannot be used, since the interference to the primary user is larger than the threshold in this case. Moreover, more interference will impact the cognitive users with the increasing number of SU. But in Fig. 9(b), we find that REEA scheme performs well, since the interference from cognitive users to primary user produced by REEA is lower than the threshold.

Fig. 9
figure 9

SINR and interference power of REEA and EEA schemes when new user enters the network. a SINR of each user. b Interference power ofREEA and EEA schemes

Figure 10 shows the energy efficiency of the two schemes. We know that the energy efficiency of REEA scheme is superior to that of EEA scheme. When a new user joins the networks, the power allocated to each user is adjusted with rapid convergence speed, then the energy efficiency of the two schemes will remain stable and constant.

Fig. 10
figure 10

Energy efficiency of REEA and EEA schemes when new user enters the network

5 Conclusion

In this paper, we investigate the problem of energy efficiency power allocation in underlay CRNs with protection factors to enhance the interference power constraint and the target SINR requirement constraint. The advantage of this model is that it not only takes into account robustness for power allocation but also the energy efficiency maximization. And we formulate the energy efficiency maximization problem as a fractional programming problem with convex constraints. It was shown in our simulations that our proposed algorithm can strictly guarantee the target SINR requirement for all users and provide satisfied protection for primary user.