INVITED PAPER A Mathematical Theory of Network Interference and Its Applications A unifying framework is developed to characterize the aggregate interference in wireless networks, and several applications are presented.
By Moe Z. Win, Fellow IEEE, Pedro C. Pinto, Student Member IEEE, and Lawrence A. Shepp
ABSTRACT | In this paper, we introduce a mathematical I. INTRODUCTION framework for the characterization of network interference in In a wireless network composed of many spatially wireless systems. We consider a network in which the scattered nodes, communication is constrained by various interferers are scattered according to a spatial Poisson process impairments such as the wireless propagation effects, and are operating asynchronously in a wireless environment network interference, and thermal noise. The effects subject to path loss, shadowing, and multipath fading. We start introduced by propagation in the wireless channel include by determining the statistical distribution of the aggregate the attenuation of radiated signals with distance (path network interference. We then investigate four applications of loss), the blocking of signals caused by large obstacles the proposed model: 1) interference in cognitive radio net- (shadowing), and the reception of multiple copies of the works; 2) interference in wireless packet networks; 3) spectrum same transmitted signal (multipath fading). The network of the aggregate radio-frequency emission of wireless net- interference is due to accumulation of signals radiated by works; and 4) coexistence between ultrawideband and nar- other transmitters, which undesirably affect receiver nodes rowband systems. Our framework accounts for all the essential in the network. The thermal noise is introduced by the physical parameters that affect network interference, such as receiver electronics and is usually modeled as additive the wireless propagation effects, the transmission technology, white Gaussian noise (AWGN). the spatial density of interferers, and the transmitted power of the The modeling of network interference is an important interferers. problem, with numerous applications to the analysis and design of communication systems, the development of KEYWORDS | Aggregate network interference; coexistence; interference mitigation techniques, and the control of cognitive radio; emission spectrum; packet networks; spatial electromagnetic emissions, among many others. In partic- Poisson process; stable laws; ultrawideband systems; wireless ular, interference modeling has been receiving increased networks interest in the context of ultrawideband (UWB) technol- ogies, which use extremely large bandwidths and typically operate as an underlay system with other existing narrowband (NB) technologies, such as GSM, GPS, Wi-Fi, and WiMAX. The most common approach is to
Manuscript received June 16, 2008; revised October 3, 2008. Current version published model the interference by a Gaussian random process March 18, 2009. This work was supported by the Portuguese Science and Technology [1]–[6]. This is appropriate, for example, when the inter- Foundation under Grant SFRH-BD-17388-2004, the Charles Stark Draper Laboratory Robust Distributed Sensor Networks Program, the Office of Naval Research under ference is the accumulation of a large number of inde- Presidential Early Career Award for Scientists and Engineers (PECASE) pendent signals, where no term dominates the sum, and N00014-09-1-0435, and the National Science Foundation under Grant ANI-0335256. M. Z. Win and P. C. Pinto are with the Laboratory for Information and Decision thus the central limit theorem (CLT) applies [7]. The Systems, Massachusetts Institute of Technology, Cambridge, MA 02139 USA Gaussian process has many well-studied properties and (e-mail: [email protected]; [email protected]). L. A. Shepp is with the Department of Statistics, RutgersVThe State University, often leads to analytically tractable results. However, there Piscataway, NJ 08854 USA (e-mail: [email protected]). are several scenarios where the CLT does not apply, e.g., Digital Object Identifier: 10.1109/JPROC.2008.2008764 when the number of interferers is large but there are
0018-9219/$25.00 2009 IEEE Vol. 97, No. 2, February 2009 | Proceedings of the IEEE 205 Win et al.: A Mathematical Theory of Network Interference and Its Applications
dominant interferers [8]–[11]. In particular, it is known that effects (e.g., Nakagami-m fading and log-normal shadow- the CLT gives a very poor approximation for modeling the ing). The main contributions of the paper are as follows. multiple access interference in time-hopping UWB systems • Distribution of the network interference: We provide [12], [13]. In many cases, the probability density function a complete probabilistic characterization of the (pdf) of the interference exhibits a heavier tail than what is aggregate network interference generated by the predicted by the Gaussian model. Several mathematical nodes in a wireless network. Our analysis reveals models for impulsive interference have been proposed, the innate connection between the distribution of including the Class A model [14], [15], the Gaussian-mixture the network interference and various important model [16], [17], and the stable model [18], [19]. system parameters, such as the path loss exponent, A model for network interference should capture the the transmitted power, and the spatial density of essential physical parameters that affect interference, the interferers. namely: 1) the spatial distribution of the interferers • Interference in cognitive radio networks: We char- scattered in the network; 2) the transmission character- acterize the statistical distribution of the network istics of the interferers, such as modulation, power, and interference generated by the secondary users synchronization; and 3) the propagation characteristics of when they are allowed to transmit in the same the medium, such as path loss, shadowing, and multipath frequency band of the primary users according to a fading. The spatial location of the interferers can be spectrum-sensing protocol. We analyze the effect modeled either deterministically or stochastically. Deter- of the wireless propagation characteristics on such ministic models include square, triangular, and hexagonal distribution. lattices in the two-dimensional plane [20]–[23], which are • Interference in wireless packet networks: We obtain applicable when the location of the nodes in the network is expressions for the throughput of a link, consid- exactly known or is constrained to a regular structure. ering that a packet is successfully received if the However, in many scenarios, only a statistical description signal-to-interference-plus-noise ratio (SINR) ex- of the location of the nodes is available, and thus a sto- ceeds some threshold. We analyze the effect of the chastic spatial model is more suitable. In particular, when propagation characteristics and the packet traffic the terminal positions are unknown to the network de- on the throughput. signer a priori, we may as well treat them as completely • Spectrum of the aggregate network emission: We derive random according to a homogeneous Poisson point process the power spectral density (PSD) of the aggregate [24].1 The Poisson process has maximum entropy among all radio-frequency (RF) emission of a network. Then, homogeneous processes [25] and corresponds to a simple we put forth the concept of spectral outage and useful model for the location of nodes in a network. probability (SOP) and present some of its applica- The application of the spatial Poisson process to tions, including the establishment of spectral regula- wireless networks has received increased attention in the tions and the design of covert military networks. literature. In the context of the Poisson model, the issues • Coexistence between UWB and NB systems: We con- of wireless connectivity and coverage were considered in sider a wireless network composed of both UWB and [26]–[32], while the packet throughput was analyzed in NB nodes. We first determine the statistical distribu- [33]–[38]. The error probability and link capacity in the tion of the aggregate UWB interference at any loca- presence of a Poisson field of interferers were investigated tion in the two-dimensional plane. Then, we in [39]–[43]. The current literature on network interfer- characterize the error probability of a given NB vic- ence is largely constrained to some particular combination tim link subject to the aggregate UWB interference. of propagation model, spatial location of nodes, transmis- Our framework accounts for all the essential physical sion technology, or multiple-access scheme; and the exist- parameters that affect network interference and provides ing results are not easily generalizable if some of these fundamental insights that may be of value to the network system parameters are changed. Furthermore, none of the designer. In addition, this framework can be applied to mentioned studies attempts a unifying characterization various other areas, including noncoherent UWB systems that incorporates various metrics, such as outage probabi- [44], transmitted reference UWB systems [45], and lity, packet throughput, power spectral density, and error physical-layer security [46]. probability. This paper is organized as follows. Section II describes In this paper, we present a unifying framework for the the system model. Section III derives the representation characterization of network interference. We consider that and distribution of the aggregate interference. Section IV the interferers are scattered according to a spatial Poisson characterizes the interference due to secondary users in process and are operating in a wireless environment sub- cognitive radio networks. Section V analyzes the packet ject to path loss as well as arbitrary fading and shadowing throughput of a link subject to network interference. Section VI characterizes the spectrum of the network 1The spatial Poisson process is a natural choice in such situations because, given that a node is inside a region R, the pdf of its position is interference. Section VII characterizes the error probabil- conditionally uniform over R. ity of NB communication in the presence of UWB network
206 Proceedings of the IEEE |Vol.97,No.2,February2009 Win et al.: A Mathematical Theory of Network Interference and Its Applications
interference. Section VIII concludes this paper and summarizes important findings.
II. SYSTEM MODEL
A. Spatial Distribution of the Nodes We model the spatial distribution of the nodes according to a homogeneous Poisson point process in the two- dimensional infinite plane. The probability of n nodes being inside a region R (not necessarily connected) depends only on the total area AR of the region and is given by [24]
n ð ARÞ IP fn in Rg ¼ e AR ; n 0 n! Fig. 1. Poisson field model for the spatial distribution of nodes. Without loss of generality, we assume the origin of the coordinate where is the (constant) spatial density of interfering system coincides with the probe receiver. nodes, in nodes per unit area. We define the interfering nodes to be the terminals that are transmitting within the fre- quency band of interest, during the time interval of interest, fZkg are independent random variables (RVs), which and hence are effectively contributing to the total interfer- account for propagation effects such as multipath fading ence. Then, irrespective of the network topology (e.g., point- and shadowing. The term 1=R2b accounts for the far-field to-point or broadcast) or multiple-access technique (e.g., path loss with distance R, where the amplitude loss time or frequency hopping), the above model depends only exponent b is environment-dependent and can approxi- on the density of interfering nodes.2 mately range from 0.8 (e.g., hallways inside buildings) to 4 TheproposedspatialmodelisdepictedinFig.1.For (e.g., dense urban environments), with b ¼ 1correspond- analytical purposes, we assume there is a probe link ing to free-space propagation [48].5 The proposed model is composed of two nodes: the probe receiver, located at the general enough to account for various propagation origin of the two-dimensional plane (without loss of scenarios, including the following. generality), and the probe transmitter (node i ¼ 0), 1) Path loss only: Z1 ¼ 1. 2 deterministically located at a distance r0 from the origin. 2) Path loss and Nakagami-mfading:Z1 ¼ ,where All other nodes ði ¼ 1 ...1Þ are interfering nodes, whose 2 Gðm; 1=mÞ.6 1 2 G random distances to the origin are denoted by fRigi¼1, 3) Path loss and log-normal shadowing: Z1 ¼ e , 7 2 G where R1 R2 . where G Nð0; 1Þ. The term e has a log- normal distribution, where is the shadowing B. Wireless Propagation Characteristics coefficient.8 In many cases of wireless systems design and analysis, 4) Path loss, Nakagami-m fading, and log-normal 2 2 it is sufficient to consider the power relationship between shadowing: Z1 ¼ with Gðm; 1=mÞ,and 2 G the transmitter and receiver to account for the propagation Z2 ¼ e with G Nð0; 1Þ. characteristics of the environment. Specifically, we For cases where the evolution of signals over time is of consider that the power Prx received at a distance R from interest, we consider the waveform relationship between a transmitter is given by
5 2b Q As we shall see in the rest of this paper, the simple 1=R dependence allows us to obtain valuable insights in numerous wireless Ptx k Zk scenarios. However, care must be taken for extremely dense networks, Prx ¼ (1) R2b since the close proximity of nodes to the origin would invalidate this far- field dependence. 6We use Gðx; Þ to denote a gamma distribution with mean x and 2 where Ptx is the average power measured 1 m away from variance x . 7 2 the transmitter3; b is the amplitude loss exponent4;and We use Nð ; Þ to denote a Gaussian distribution with mean and variance 2. 8This model for combined path loss and log-normal shadowing can be 2Time and frequency hopping can be easily accommodated in this expressed in logarithmic form [48]–[50], such that the channel loss in model, using the splitting property of Poisson processes [47, Section 6] to decibels is given by LdB ¼ k0 þ k1 log10 r þ dBG, where G Nð0; 1Þ. obtain the effective density of nodes that contribute to the interference. The environment-dependent parameters ðk0; k1; dBÞ can be related to 3 Unless otherwise stated, we will simply refer to Ptx as the ðb; Þ as follows: k0 ¼ 0, k1 ¼ 20b,and dB ¼ð20= ln 10Þ .The Btransmitted power.[ parameter dB is the standard deviation of the channel loss in dB (or, 4Note that the amplitude loss exponent is b, while the corresponding equivalently, of the received SNR in decibels) and typically ranges from power loss exponent is 2b. 6 to 12.
Vol. 97, No. 2, February 2009 | Proceedings of the IEEE 207 Win et al.: A Mathematical Theory of Network Interference and Its Applications
the transmitter and receiver in terms of their equivalent a given realization of P.Asweshallsee,this low-pass (ELP) representations. Specifically, the ELP naturally leads to the derivation of outage metrics received signal can be written as9 [51]–[54] such as interference outage probability, spectral outage probability, and error outage prob- ability, which in the described scenario are more Q pffiffiffiffiffi Z Z meaningful than the corresponding P-averaged YðtÞ¼ k k hðt; ÞXðt Þd (2) Rb metrics. 2) Fast-varying P:Inthiscase,theinterferershavea short session lifetime, where each node periodi- cally becomes active, transmits a burst of symbols, where the kernel hðt; Þ is the time-varying ELP impulse and then turns off (dynamic scenario). Then, the response of the multipath channel, and XðtÞ is the ELP set of interfering nodes (i.e., nodes that are trans- transmitted signal. In this case, the RVs fZ g account for k mitting and contributing to the interference) the slow-varying propagation effects (typically, slow- changes often, and hence P experiences a varia- varying log-normal shadowing), while hðt; Þ implicitly tion analogous to that of a fast block fading model. accounts for the multipath fading. A canonical example In this scenario, it is insightful to average the for hðt; Þ is the tapped-delay line model given by interference analysis over P,whichnaturally leads to the derivation of the average metrics. X ÀÁ The framework proposed in this paper enables the analysis |2 fc qðtÞ hðt; Þ¼ hqðtÞe qðtÞ (3) of both scenarios. In the rest of this paper, we illustrate q several applications of our framework for the case of slow- varying P only. Some examples of the analysis for fast- varying P can be found in [55] and [56]. where fc is the carrier frequency; hqðtÞ and qðtÞ are, respectively, the time-varying amplitudes and delays associated with the qth multipath; and ðtÞ denotes the III. INTERFERENCE REPRESENTATION Dirac-delta function. AND DISTRIBUTION For the purpose of this paper, the power relation in (1) In this section, we consider a general model for interfer- is sufficient for characterizing interference in cognitive ence, which will be used to investigate several applications radio networks in Section IV, and for analyzing interfer- in wireless networks throughout Sections V–VII. Specif- ence in packet wireless networks in Section V. The time- ically, let Y ¼½Y ; ...; Y T be a real random vector varying representation in (2) is useful for determining the 1 Nd ðRVÞ of arbitrary dimension Nd, representing the aggre- spectrum of the aggregate network emission in Section VI, gate interference at the probe receiver, located in the and for characterizing coexistence between UWB and NB origin of the two-dimensional plane (see Fig. 1). For exam- systems in Section VII. ple, the RVYcan correspond to a projection of the aggregate interference process YðtÞ onto some set of basis functions C. Mobility and Session Lifetime of the Interferers Nd 1 f iðtÞgi¼1. We can express the aggregate interference Y as Typically, the time variation of the distances fRigi¼1 of the interferers is highly coupled with that of the shadowing 1 X1 fGigi¼1 affecting those nodes. This is because the shadow- Qi ing is itself associated with the movement of the nodes Y ¼ 1AðQi; RiÞ (4) Ri near large blocking objects. Thus, we introduce the nota- i¼1 B 1 tion P to succinctly denote the distances fRigi¼1 and 1 [ shadowing fGigi¼1 of the interferers. We consider the dis- where tance Ri and the shadowing Gi associated with each interferer to be approximately constant over at least the 1; ðq; rÞ2A duration of a symbol, i.e., RiðtÞ Ri and GiðtÞ Gi.Fur- 1Aðq; rÞ¼ (5) thermore, we can consider two scenarios that differ in the 0; otherwise speed of variation of P over larger time windows (e.g., the session lifetime of communication). T and Q ¼½Q ; ; ...; Q ; represents an arbitrary random P i i 1 i Nd 1) Slow-varying :Inthiscase,theinterferershavea quantity associated with interferer i. The purpose of the term long session lifetime during which P is approxi- Qi is to accommodate various propagation effects such as mately constant (quasi-static scenario). Thus, it is multipath fading and shadowing. The indicator function insightful to condition the interference analysis on 1Aðq; rÞ allows for the selection of the nodes that contribute to the aggregate interference–the active users–based on some 9 Boldface letters are used to denote complex quantities and vectors. condition relating Qi and Ri. The proposed model is general
208 Proceedings of the IEEE |Vol.97,No.2,February2009 Win et al.: A Mathematical Theory of Network Interference and Its Applications
enough to accommodate various choices of the active set A, where QðwÞ is the characteristic function of Qi.Forthe including the following. case of A¼fðq; rÞ : ðjqj2=r Þ G P g,weobtain 1) If A¼fðq; rÞ : r 2Ig, then (4) represents the aggregate interference resulting from all the nodes ZZ |w q I inside a region described by .Forexample,if Yðw; AÞ¼exp 2 1 e r fQðqÞdqrdr (8) I¼½u; vÞ, then (4) represents the aggregate Q interference resulting from the nodes inside the G annulus u r v. 2 G 2 2b where Q¼fq : jqj P r g. 2) If A¼fðq; rÞ : ðjqj =r Þ G Pthg, then (4) repre- sents the aggregate interference resulting only from 2 2b B. Distribution of the the nodes for which the received power jQij =Ri at 10 Aggregate Interference Amplitude the origin is below some threshold P . th Using the general result in Section III-A, we now The distribution of the aggregate interference Y plays an characterize the distribution of the aggregate inter- important role in the design and analysis of wireless net- ference amplitude generated by all the nodes in the works, such as in determining the probabilities of inter- plane. The following corollary provides such statistical ference outage, spectral outage, and error outage. characterization.
A. Interference From the Active Set 1 Corollary 3.1 (Symmetric Stable Distribution): Let fRigi¼1 1 denote the sequence of distances between the origin and Theorem 3.1: Let fR g denotethesequenceof i i¼1 random points of a two-dimensional Poisson process with distances between the origin and the random points of a 1 spatial density .LetfQigi¼1 be a sequence of spherically two-dimensional Poisson process with spatial density . 11 T 1 symmetric (SS) RVs Qi ¼½Qi;1; ...; Qi;Nd , i.i.d. in i, Let fQigi¼1 be a sequence of Nd-dimensional RVs T independent of the sequence fR g.LetY denote the Q ¼½Q ; ...; Q , independent identically distributed i i i;1 i;Nd aggregate interference at the origin generated by the (i.i.d.) in i,andindependentofthesequencefR g.Let i nodes scattered in the infinite plane, such that YðAÞ denote the aggregate interference generated by the nodes from the active set A,suchthat X1 Q Y ¼ i X1 Rb Qi i¼1 i YðAÞ ¼ 1AðQi; RiÞ i¼1 Ri
for b > 1. Then, its characteristic function YðwÞ¼ IE fe|w Yg is given by where >1. Then, its characteristic function |w YðAÞ Yðw; AÞ ¼ IE fe g is given by YðwÞ¼expðÞ jwj (9) ZZ |w q 1Aðq;rÞ Yðw; AÞ ¼ exp 2 1 e r fQðqÞdqrdr where (6) 2 ¼ (10) where fQðqÞ is the pdf of Qi. b no Proof: This follows immediately from Campbell’s 1 2=b ¼ C IE jQi;nj (11) theorem [24]. Ì 2=b Using the above theorem with A¼fðq; rÞ : r 2Ig, we obtain and C is defined as Z hi w 1 ; 6¼ 1 Yðw; AÞ ¼ exp 2 1 Q rdr (7) ð2 Þ cosð =2Þ I r C ¼ 2 (12) ; ¼ 1
with ð Þ denoting the gamma function.
10 11 As we shall see in Section IV, this is useful for characterizing A RVXis said to be spherically symmetric if its pdf fXðxÞ depends interference in cognitive radio networks. only on jxj.
Vol. 97, No. 2, February 2009 | Proceedings of the IEEE 209 Win et al.: A Mathematical Theory of Network Interference and Its Applications
Proof: Using (7) with ¼ b,andI¼½0; 1Þ,weget C. Distribution of the Aggregate Interference Power Z hi In Section III-B, we considered the distribution of the 1 w w exp : aggregate interference amplitude.Wenowfocusonthe Yð Þ¼ 2 1 Q b rdr 0 r aggregate interference power generated by all the nodes scattered in the plane, where each interferer contributes 2b If the RV Q has an SS pdf, its characteristic function is also with the term Pi=Ri .TheRVPi represents an arbitrary SS, i.e., QðwÞ¼ 0ðjwjÞ for some 0ð Þ. As a result quantity associated with interferer i and can incorporate variouspropagationeffectssuchasmultipathfadingor Z hi shadowing, as described in (1). The following corollary 1 w w exp provides such statistical characterization. Yð Þ¼ 2 1 0 b rdr 0 r 1 Corollary 3.2 (Skewed Stable Distribution): Let fRigi¼1 which, using the change of variable jwjr b ¼ t, can be denote the sequence of distances between the origin and the random points of a two-dimensional Poisson process rewritten as 1 with spatial density .LetfPigi¼1 be a sequence of i.i.d. Z real nonnegative RVs and independent of the sequence 1 = 2 1 0ðtÞ fR g.LetI denote the aggregate interference power at the ðwÞ¼exp jwj2 b : i Y 2=bþ1 dt b 0 t origin generated by all the nodes scattered in the infinite plane, such that Appendix I shows that X1 Pi Z I ¼ 1 2b 1 ðtÞ C 1 ÈÉ i¼1 Ri 0 IE þ1 dt ¼ jQi;nj (13) 0 t for b > 1. Then, its characteristic function IðwÞ¼ IE fe|wIg is given by where C is defined in (12), and thus we conclude that the Y characteristic function of has the simple form given by hi (9), with parameters and given by (10) and (11), ðwÞ¼exp jwj 1 | signðwÞ tan (15) respectively. This completes the proof. g I 2 Random variables with characteristic function of the form of ðwÞ in (9) belong to the class of symmetric stable Y where RVs. Stable laws are a direct generalization of Gaussian distributions and include other densities with heavier 1 (algebraic) tails. They share many properties with ¼ (16) Gaussian distributions, namely, the stability property and b the generalized central limit theorem [7], [57]. Equations ¼ 1(17) 12 no (9)–(11) can be succinctly expressed as 1 1=b ¼ C1=bIE Pi (18) no 2 1 2=b Y SNd Y ¼ ; Y ¼ 0; Y ¼ C2=bIE jQi;nj b and C is defined in (12). (14) Proof: Using (7) with Nd ¼ 1, ¼ 2b, I¼½0; 1Þ, we get and this notation will be used throughout this paper. Z hi 1 w 12 Sð ; ; Þ exp We use to denote the distribution of a real stable RV with IðwÞ¼ 2 1 P 2b rdr characteristic exponent 2ð0; 2 , skewness 2½ 1; 1 , and dispersion 0 r 2½0; 1Þ. The corresponding characteristic function is
ÀÁÂÃÀÁ where PðwÞ is the characteristic function of Pi.Usingthe 2b expÀÁ jwjÂÃ1 | signðwÞ tan 2 ; 6¼ 1 ðwÞ¼ðVARIABLEERROR 2 unrecognisedsyntaxÞ change of variable jwjr ¼ t, this can be rewritten as exp jwj 1 þ | signðwÞ ln jwj ; ¼ 1. ÈÉ! We use S ð ; ¼ 0; Þ to denote the distribution of an Nd-dimensional Z Nd 1 |signðwÞPit SS stable RV with characteristic exponent and dispersion , and 1=b 1 1 IE e ðwÞ¼exp jwj dt : whose characteristic function is ðwÞ¼expð jwj Þ. Note that each of I 1=bþ1 b 0 t the Nd individual components of the SS stable RV is Sð ; ¼ 0; Þ.
210 Proceedings of the IEEE |Vol.97,No.2,February2009 Win et al.: A Mathematical Theory of Network Interference and Its Applications
Appendix II shows that according to an homogeneous Poisson process sec,with density sec. When a primary transmission occurs, the Z ÈÉ handshake procedure between the primary transmitter and 1 1 IE e| signðwÞPit dt receiver would trigger the primary receiver to transmit a t þ1 0 hi beacon with power Ppri, thus indicating its presence to the ÈÉC 1 secondary nodes. When a secondary user senses such ¼ IE P 1 | signðwÞ tan (19) i 2 beacon, it is not allowed to transmit, in order to reduce interference caused to the primary link. However, due to the wireless propagation effects such as multipath fading where C isdefinedin(12),andthusweconcludethatthe and shadowing, the secondary users may miss detecting characteristic function of I has the simple form given by this beacon, and may still transmit and interfere with the (15), with parameters , ,and given by (16)–(18). This primary link. The probability p ðrÞ that a secondary user completes the proof. g d detects the beacon transmitted by the primary receiver at a Random variables with characteristic function of the distance r is given by form IðwÞ in (15) belong to the class of skewed stable RVs. Using the notation introduced before, (15)–(18) can be Q succinctly expressed as Ppri k Zk pdðrÞ¼IP P (21) fZkg r2b no 1 1 1=b I S ¼ ; ¼ 1; ¼ C1=bIE Pi : (20) b where Ppri is the average transmit power of the beacon; P denotes the threshold for beacon detection (e.g., related to the detection sensitivity of the secondary In the remainder of this paper, we will show how the users); and the other parameters have the same meaning theory developed in this section is useful to characterize as in (1). interference in wireless networks, enabling a wide variety In what follows, we characterize the distribution of the of applications. network interference generated by all the secondary nodes that are not able to detect the primary beacon, and thus IV. INTERFERENCE IN COGNITIVE contribute to a performance degradation of the primary RADIO NETWORKS link. With the increasing need for higher data rates, the elec- A. Distribution of the Network Interference tromagnetic spectrum has become a scarce resource. Such Due to Secondary Users shortage is in part due to the current allocation policies, The power I of the network interference generated which allocate spectral bands for exclusive use of a single sec by the secondary nodes can be written as entity within a geographical area. Studies show that the licensed spectrum is mostly underused across time and geographical regions [58]. One solution that enables a more X1 PsecZi efficient use of the spectrum is cognitive radio, a new para- Isec ¼ 1Aðq; rÞ R2b digm in which a wireless terminalVthe secondary userVcan i¼1 i dynamically access unused licensed spectrum, while avoid- Q ing interference with its ownerVthe primary user [59]. One where Zi ¼ k Zi;k accounts for the random propagation example of such cognitive behavior is spectrum sensing, i.e., effects associated with node i and the ability to actively monitor the occupation of spectrum bands. It is of critical importance to develop models for cognitive radio networks, which not only quantify their P z A¼ ðz; rÞ : pri G P : communication performance but also provide guidelines for r2b the design of practical cognitive algorithms. In this section, we consider an application of the proposed framework to the characterization and control of Using (8) with Nd ¼ 1, ¼ 2b,andQ ¼ PsecZ, we can the aggregate interference in cognitive radio networks. write Specifically, we wish to quantify the performance of the primary users, when the secondary users are allowed to ! Z Z 2b 1 P r transmit in the same band, according to a spectrum- Ppri |wPsecz r2b sensing protocol. We consider the spatial model depicted Isec ðwÞ¼exp 2 sec 1 e fZðzÞrdzdr in Fig. 1, where a primary link operates in the presence of 0 0 secondary users, which are scattered in the plane (22)
Vol. 97, No. 2, February 2009 | Proceedings of the IEEE 211 Win et al.: A Mathematical Theory of Network Interference and Its Applications
where fZðzÞ is the pdf of Zi. Alternatively, we can obtain an where equivalent expression for (22) by changing the order of integration as P r2bm 1 ¼ : Z Z !Ppri 1 1 |wPsecz ðwÞ¼exp 2 ÀÁ 1 e r2b f ðzÞrdrdz : Isec sec P z 1=2b Z 0 pri P For the particular case of Rayleigh fading ðm ¼ 1Þ, we obtain
Although in general Isec ðwÞ cannot be determined in closed form, it can be used to numerically evaluate [60], P r2b [61] various performance metrics of interest, such as the pdðrÞ¼exp : interference outage probability, given by Ppri