MIMO Active Interference Cancellation for
Stealth Cognitive Radio in MB-OFDM UWB
Hsin-Jui Chou and Jen-Ming Wu
Inst. of Communications Engineering
National Tsing Hua University
Hsinchu, Taiwan, ROC
jmwu@ee.nthu.edu.tw
ABSTRACT -Cognitive Radio (CR) is considered as a
promising approach for efficient utilization of precious radio
spectrum resources. In this paper, we present a new approach
that combine active interference cancellation (AIC) and
vertical Bell Laboratories Layered Space-Time (V-BLAST)
techniques to transmit data through a multiple-input and
multiple-output (MIMO) system within protected band which
has been assigned for primary subscribers. This method
allows the transmitter to transmit data in the protected band
in a stealth fashion (as low as -120dB to -300dB) so that the
primary subscribers will be unaware of the transmission.
We show the opportunity of the secondary user to utilize the
valuable spectrum of the protected band as well. The
simulation shows that BER performance in the protected
band is as good as in the unprotected band. We have also
simulated the proposed scheme with the co-existence of
WiMAX and MB-OFDM UWB devices as the primary user
and the secondary user respectively.
Index Terms - Cognitive Radio, MIMO, Inter-Carrier
Interference Cancellation, VBLAST
I. INTRODUCTION
Nowadays, the radio electromagnetic spectrum has become
a very precious naturalistic resource in the wireless
communication. Federal Communications Commission
(FCC) in the United States, and its counterparts around the
world, allocate a wide range of the radio spectrum of
varying channel bandwidths. For examples, AM/FM radio,
UHF/VHF television, cell phones, Global Position System
(GPS), IEEE802.16e, Ultra-Wide Band (UWB), and so on.
Just as wireless services have begun proliferating, there is
little radio frequency spectrum left over [1]. However, not
every channel in every band is always in use. For example
in UWB technique, FCC allocated 7.5 GHz of spectrum in
the 3.1 - 10.6 GHz frequency band for unlicensed devices
or users who want to access the UWB [2]. However, the
spectrum is not utilized as economically as we expect. It is
reported that the actual spectrum usage efficiency measure
in an urban area in 3-4 GHz is about 0.5%, and moreover
drops to 0.3% in 4-5 GHz [3].
In fact, the FCC has determined that, in some locations
or at some times of day, 70 percent of the allocated
spectrum may be sitting idle. Therefore the solution lies
with Cognitive Radios (CR). Cognitive radio defines as a
paradigm for wireless communication in which either a
network or a wireless node changes its transmission or
reception parameters to communicate efficiently avoiding
interference with licensed or unlicensed users.
Active Interference Cancellation (AIC) technique,
provides one of the CR solution [4]. Data in AIC technique
is transmitted with some canceling data together, and then
it can avoid interference with other user at same frequency
band.
In this paper, we assume a secondary user with MIMO
MB-OFDM UWB system operating in the spectrum of
3.1GHz - 4.6GHz. The primary user of WiMAX service
operates at 3.5GHz with 10MHz channel bandwidth.
Therefore, with the two services trying to function
simultaneously, the narrowband of the primary user
becomes a protected band. Conventional CR approach
would require the secondary user to provide
detect-and-avoidance (DAA) capability so that the second
user operation would not interfere with the primary user at
the expense giving up using this protected band. In this
paper, we seek the possibility that, at the constraint of not
interfering with the primary user, the secondary user could
still utilize the protected band for its data transmission. It
exhibits that the power spectrum is still clean or below the
sensitivity level and at the primary user. The receiver of the
secondary user employs MIMO avenues, e.g. V-BLAST, to
resolve the information. Since power spectrum in protected
band is suppressed with respect to the primary user, the
primary user receiver will view these signals as noise-like
interferences so that the secondary user can secretly
transmit data with acceptable bit-error rate (BER)
performance and be without polluting protected band.
In Section II we overview the SISO AIC technique and
signal model. In Section III, we introduce the MIMO AIC.
We briefly show that how AIC system avoids interference
with the primary user who has already occupied at the
frequency band. In Section IV, we discuss about the
decoder of MIMO AIC system. We need the special
decoder for AIC system. Section V is devoted to BER
comparisons and some other simulation. Last, summary
and concluding remarks appear in Section VI.
II. SISO ACTIVE INTERFERENCE CANCELLATION
In this section, we briefly overview the AIC algorithm.
Suppose a secondary user tries to send data in a particular
frequency band, however, it discovers that there is a
primary user has already occupied in a narrow band of
three tones conflicting with the secondary user.
Customarily, the secondary user could tum off these tones
Authorized licensed use limited to: HUNAN UNIVERSITY. Downloaded on April 27, 2009 at 22:52 from IEEE Xplore. Restrictions apply.
12510050 75
subcarrier
25
-300 -+---"T""-...----"T""-...--_-.......-_-.....----.--~
o
III. PROPOSED MIMO ACTIVE INTERFERENCE
CANCELLATION
W
opt =-(PI H • PI )-1 PI H • d1. (8)
The power in victim band is minimized. It is more
efficient than the tum-off method that AIC method
sacrifices a few tones to suppress power and does a great
job. In finding the AIC signal, we take up-sampling rate of
4 (i.e. r =4). To observe the result more clearly 20 times
up-sampling (r =20) is adopted in simulations. For 5-tone
AIC, its outcomes as well as a lot of nullifying tones being
utilized. For 9-tone AIC, it creates a notch up to 100 --120
dB. We compare AIC method and tum-off method with the
same number of tones utilization. Figure 1 tells us that
turn-off method suppress about 15-20 dB, but Fig. 2 shows
AIC method stripes interferences away for about 120 dB
notch. Even 25-tone utilization for tum-off just notch
power magnitude around 25 dB. It is still worse than
performance of 9-tone AIC as the black line does.
·250
-200
50
I 3-tone AIC I :;.
o f'1t\y\~")\1r~'r,;V"{\!yrrVV~r)ifJ\r~~1
-50 Is-tone AIC I
E
~ -100 I 7-tone AIC I
a.~ I 9-tone AIC I
~ -150 •
o
a..
where d l is interference extracted from unvictim tones
toward victim tones. What we need to do now is to cancel
d1 for clean transmission circumstances. Let w represent
the X(k)--X(k+q-1) tones, it is the AIC information, which
is computed as following:
Plw=-dh (6)
where PI is the small kernel derived from P by limiting the
index according to wand d1. The criterion is minimizing
the mean square error, e2, or
W opt =arg minlle
2
11 =arg min~P1 · w + d111 2 } (7)
w w
As a result,
Fig. 2. Power spectrum ofdifferent Ale tones use for
suppression. We take 3, 5, 7 and 9 tones for comparison.
Power Spectrum after Ale
In SISO AIC, the secondary user can only use the
unvictim frequency band that the primary user doesn't use.
The secondary user avoids using the victim band to
transmit data. Here we look for the possibility that the
secondary user could still utilize the protected band for its
data transmission at the constraint of not interfering with
the primary user. Let the secondary user be a MIMO
OFDM system, which use M antennas to transmit
information data. Let the channel between the secondary
user's transmitter and the primary user be H' and the
channel between the transmitter and the receiver of the
125
3-tone
7-tone
-13-tone
25-tone
100
V''YV\ ~V
••
50 75
subcarrier
25
-300 '------__.L--__-"--__--L-__----"---__-----L-..-l
o
Power spectrum of tum-off
-50
-250
50c-----~--.--------,---------,---.j
m
~ -100
2
I
~ -150
i
-200
Fig. 1 Power spectrum for different turn-off tones, named for
3, 7, 13 and 25 tones for comparison
No-l
x(n) = "LX(k)'expU21D1kl No) (1)
k=O
In order to evaluate the interference in-between the tone
frequencies, we up-sample the corresponding spectrum,
which is given by Y(i), and the up-sampling rate is
denoted by r,
1 No-l • n I
Y(/) = -"L x(n)· exp( - J2;r--)
No n=O No r
1 No-l No-l I (2)
= -"L("LX(k). exp(j2;r~(k--)))
No n=O k=O No r
=_1 IX(k).P(l,k)
No k=O
where 1=0, ... , (r . No -1) and P(l, k) is the transformation
kernel matrix.
We first have to compute the interference coming from
the secondary user's information data, which might
interfere with the protected band that the primary user used.
Secondary user tum off tones of victim band signals and
see how much interference comes from other tones of the
unvictim band signal.
g=[X(O) .. X(k-1) 0 ... 0 X(k+q) .. X(No-1)] (3)
where g is a vector containing the secondary user's
transmit data. Assuming that the primary user occupied q
tones in the middle of the frequency band, we turn off q
tones in the vector g. And then according to (2), we define
the vector d by up-sampling the vector g,
d=P'g (4)
dl =[d(k· r), ...,d«k +q -1)· r)], (5)
•
When the information data of OFDM symbol with No
subcarriers is denoted by X(k),k = 0, .. .,No-I. The discrete
signal can be expressed as :
around protected band (which the primary user has already
used) to avoid interference. However, the achievements are
limited. As Fig. 1 shows, nullifying these 3-tones make
about 5--1O-dB notch and nullifying up to 25-tones can
merely suppress 25--30dB. As tum-off subcarriers increases,
notch depth increases limitedly. The subcarriers involved in
the secondary user could be wider than the protected band,
so we call these involved subcarriers in the secondary user
the victim band.
Authorized licensed use limited to: HUNAN UNIVERSITY. Downloaded on April 27, 2009 at 22:52 from IEEE Xplore. Restrictions apply.
Fig. 3. The secondary user is a MIMO OFDM system that
mIght interfere with the primary. Similarly, the primary user
might also confuse the receive part of the seconaary user.
Let. Y be the interfering signal that arrives the primary user
from the transmitter of the secondary user within the
protected band. Y has dimension of No, where No is the
number of OFDM subcarriers of the secondary user. Let
H' be the estimated channel frequency response between
them of dimension No. as well. We have
Y=H'.X=[H'l ... H'My[J~]=[Yl+ ...+YM]
(9) where each Yk =H'kT.Xk' k=1, ... ,M and Xk is the
transmit data stream from the kth antenna of secondary user.
We use the first antenna to do the AIC algorithm that
cancels the interference caused by other antennas.
Therefore, according the same rule to the SISO AIC, we
first turn off tones of victim band signal in first transmit
antenna and see how much interference comes from other
tones of the un-victim band signal, or even from other
antennas' data tones. Let
Xl =[XI(O) ...X I(k-1) 0 ... 0 XI(k+q) ...XI(No-1)]
be the signal of the 1st antenna, where q is the number of
tones within the victim band. Then we get some part of
received signal in primary user :
Yl =H'l X
=[Y1(O) ... Y1(k-l) 0 ... 0 ~(k+q) ... ~(No-l)]
Let d be the up-sampled signal of Y I with up-sampling rate
of r and the interference be d1, that is
d=P.(YI+···+YM ) (10)
dl =[d(k·r),...,d«k+q-l)·r)] . (11)
Let wy =[Y1(k), ... ,Y1(k+q-l)] and W =[X1(k), ... ,Xi(k+q-l)]
tones, which is the AIC information. To cancel the
interference, the requirement of (12) should be satisfied,
PI Wy =-d}, (12)
where P I is the small kernel derived from P by limiting the
index according to wyand d i . The criterion is minimizing
the mean square error, e2, or
wy,op' =arg mJnlle2 11 =arg mJn~Pl . wy +d1r} (13)
As a result,
_ '+ _ (H )-1 H '+ (14)
w opt - W Y 'opt H - - PI . PI PI . d . H
where (.)+ represent pseudo-inverse matrix operation. At
last, after the action of AIC, the transmit data stream
becomex=[xl , ••• ,XM ] where
Xl = [X1(O) ... X1(k-l), w, X 1(k+Q) ... X 1(No)]T(15)mtfDDRl
antfDDam
_ ... secondary to primary
user interference
Secondary
User
Rx
•••••••••~ primary to secondary
user interference
secondary user
----+ data transmission
Ale toors
....~
..
..
..
...
..
..
..
H
Secondary
User
Tx
As shown in Fig. 4, we immolate the tones within victim
band in first antenna to send AIC signals and then we get
the opportunity for the antennas to transmit information
data stream in the same frequency band. Therefore, the
secondary user can slinkingly transmit data in the
frequency band where primary user has used without
adding interference to primary user. Later, in the receiver
of secondary user, we apply successive interference
cancellation technique[7][8] to detect the information from
the secondary user transmitter. The block diagram of the
proposed scheme is shown in Fig. 5.
secondary user be H as shown in Fig. 3. Assuming that the
channel information ofR' could be obtained through blind
channel estimation [5][6]. Since Rand H' would be
different, we can use one of the secondary user's transmit
antenna to execute the AIC algorithm based on the channel
information H' such that the power spectrum arriving the
primary user is minimized at the protected band.
Fig. 4. Definition the AIC tones position in the transmit
part of secondary user. IV. MIMO RECEIVER with MMSE V-BLAST
secondary user tnllSDlit part
I~=;·'H ~c Ho.....-Tr_Bfl_Sm_it_
Tx
Fig. 5. MIMO AIC structure.
The receiver of the secondary user adopts a V-BLAST
structure [8] that consists ofM transmitters and N receivers,
where M ~ The main idea ofV-BLAST algorithm is to
de-multiplex a data stream into M sub-streams, and then
each sub-stream is encoded into symbols and taken over by
individual transmitters, and finally radiated through its
belonged transmit antennas in parallel at the same time and
frequency. These transmitters operate co-channel. Each
receiver antenna takes over all the transmitted signals in
different amplitude and phase variation which are mixed
due to the wireless propagation channel, H. Using proper
signal processing at the receiver end, these mi~d signals
Authorized licensed use limited to: HUNAN UNIVERSITY. Downloaded on April 27, 2009 at 22:52 from IEEE Xplore. Restrictions apply.
where (G;)j denotes the jth row of Gj , Uk; stands for the
(20j)
(20a)
(20b)
(20c)
(20d)
(20e)
(20f)
(20g)
(20h)
(20i)
if-i+l
Initialization:
i ~ 1
( H 2)~ HG= H .H+uv ·lm ·H
k1 =argmi~l(G) j 11 2
j
Recursion:
Ukl =(Gi)kl
Sk =Uk H ·R.
I I I
R i+1 = R i - Ski (H)kl
Xkl =Q(Skl )
( H 2 )-1 HG H1 = Hi, .Hi, +G v ·Ii, · Hi,
ki+1 = arg min \I(G i+l) j 11
2
j~{kl···kJ
V. SIMULATION
In the soft-decision we only exchange two formulas' orders
of stepf and step g with minor changes.
B. Soft Decision MMSE V-BLAST
We find that the MMSE V-BLAST with soft decision
decoder does not have such problem at decoding AIC
tones. In soft decision decoder, after multiplying R with a
row vector of G, we obtain the soft-detecting signal.
Immediately, we multiply soft-detecting signal with it's
corresponding channel vector and then directly subtract to
the receive vector R. Afterward the soft-detecting signal
quantization is more appropriate to the adopted
constellation. We rewrite V-BLAST operating process of
(19) for MMSE V-BLAST with soft decision decoder as
follows:
matrix subtracted the columns kl' k2 , ••• , k i of H, 1\_11
2 is
the 2-norm of the vector and Q( . ) denotes the quantization
operation appropriate to the constellation in use, Sk
j
is the
soft-detecting signal which is subtracted out from the
received signal vector R;, {k1, k2 , ••• , km } is a permutation
of the integers 1"'M specifying the order in which
components of the transmitted symbol vector X are
extracted.
Nevertheless, the MMSE V-BLAST decoder algorithm
with hard decision is not suitable for MIMO AIC system.
The MIMO AIC system, we mentioned in above, applies
AIC tones to send the cancelling information that limited
the interference to primary user's disturbance. Therefore,
data transmitted in AIC tone is not a quantized
constellating data (i.e. QPSK or QAM or ... ).
In the simulation, we assume the secondary user to be
the MB-OFDM UWB device with 128 subcarrier OFDM
signal ranging from 3.1GHz to 3.6GHz for the first band of
the first group. A primary user of WiMAX device
operating at 3.5GHz of lOMHz bandwidth has already
occupied the frequency band which located at 86t\ 87th and
88th tone of the secondary user. Then, the secondary user
with 4x4 MIMO OFDM simultaneously tries to .send data
(19a)
(19b)
(19c)
(19j)
(19d)
(1ge)
(19f)
(19g)
(19h)
( 19i)
k1 =arg~i~l(G) j 11 2
]
Xkl =Q(Skl )
R i+1 = R i - Xkl (H)kl
( H 2 )-1 HG'+1 = Hi, ·Hi, +G v .Ii , . Hi,
ki+1 = arg min IICG HI)Jj~{kl···kj }
i ~i+l
Recursion:
U kl =(Gi)kl
Sk = Uk H ·R.
I I I
could be seperated as they are transmitted through a set of
independent parallel channels. Let X =[Xl' ... ,XM ]
denotes the vector of transmit symbols from M transmit
antennas, and R = [R1 ••• RN]T denotes the received
vector symbol. Then we can describe the relationship
between X and R :
R=H·X+v (16)
Where H is the N-by-M complex channel matrix with
statistically independent entries and v is the complex
Gaussian noise vector with zero mean and variance (J"v 2 •
Based on the formula (16), we first discuss a detection
called Minimum Mean Squared Error (MMSE) linear
detection to multiply the received signal vector R with a
linear transform matrix G, i.e.
G=(HH.H+u
v
2
.1
M
)-1.HH, (17)
,where superscripts "H" and "-I" represent matrix
Hermitian and inverse operations respectively. Then the
estimated signal vector in the linear MMSE detection may
be represented as
X=G.R=G.H·X+G·v (18)
A. Hard Decision MMSE V-BLAST
Next, we describe the V-BLAST with MMSE receiver.
In MMSE V-BLAST algorithm with hard decision, this
detection method does not detect the m signals at one run.
Instead, it multiply R with a row vector of G replace with
the matrix G. This row vector of G which has the best
post-detection SNR amongst the all row vectors of G is
selected. Then the soft-detecting signal is subtracted out
from the received signal vector. At last, we can detect the
signal from quantizing the soft detecting signal appropriate
to the constellation in use (hard decision). After detecting
one of the received signals, we could subtract the detected
signal which multiplies with it's corresponding channel
vector to the receive vector R, and then start next iteration.
This process proceeds until all the signals are detected.
The full MMSE V-BLAST with hard decision algorithm
can be described compactly as follows :
Initialization:
i ~ 1
( H 2 )-1 HG= H ·H+uv ·lm ·H
Authorized licensed use limited to: HUNAN UNIVERSITY. Downloaded on April 27, 2009 at 22:52 from IEEE Xplore. Restrictions apply.
at same band. Therefore, the secondary user would have to
interfere with the primary user at the protected band of
10MHz at 3.5GHz. Let the 84th to 90th tones of first
antenna be the AIC tones, which play the canceling signal.
And other antennas from secondary user may send QPSK
signal.
P01Ae!' spectrum 01 in JXimary users recehe part
10:2 .---~--r----r----r----r----r------,
10"
10~
Fig. 6. The 4x4 MIMO AIC system. power spectrum of the
transmit signal, which transmIt from the secondary user
and received at primary user.
Figure 6 shows the power spectrum of interference
which caused by the secondary user to the primary user.
We can observe that the notch depth is limited to be around
-110dB by using AIC technique for 4X4 MIMO OFDM
system. Then, Fig. 7 shows the bit error rate after MMSE
V-BLAST decoder with hard decision in the received part
of secondary user. They are two lines in Fig.7. The first
line which limited at 10-2 represent BER which the decoder
detect all transmitted data except the 84th -- 90th tones in
first transmitter. And the other line then shows the BER
that decoder detect only Oth -- 83rd and 91 st -- 127th tones in
each transmitter a
本文档为【MIMO Active Interference Cancellation for】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑,
图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。