0 EURASIP Journal on

Wireless Communications and Networking

a SpringerOpen Journal

RESEARCH Open Access

A robust beamformer design for underlay cognitive radio networks using worst case optimization

Uditha Lakmal Wijewardhana1*, Marian Codreanu1, Matti Latva-aho1 and Anthony Ephremides2

Abstract

We propose a robust beamforming design for underlay cognitive radio networks where multiple secondary transmitters communicate with corresponding secondary receivers and coexist with a primary network. We consider a scenario where all transmitters have multiple antennas and all primary and secondary receivers are equipped with a single antenna. The main focus is to design the optimal transmit beamforming vectors for secondary transmitters that maximize the minimum of the received signal-to-interference-plus-noise ratios of the cognitive users. The interference powers to the primary receivers are kept below a threshold to guarantee that the performance of the primary network does not degrade due to the secondary network. Imperfect channel state information (CSI) in all relevant channels are considered, and a bounded ellipsoidal uncertainty model is used to model the CSI errors. We recast the problem in the form of semidefinite program and an iterative algorithm based on the bisection method is proposed to achieve the optimal solution. Further, we propose upper and lower bounds for the optimal value of the considered problem, which provides better initialization for the algorithm. Numerical simulations are conducted to show the effectiveness of the proposed method against the non-robust design.

Keywords: Cognitive radio networks; Optimization; Robust beamforming design; Semidefinite programming (SDP); Semidefinite relaxation

1 Introduction

Scarcity of wireless spectrum is one of the major challenges faced by the modern wireless communication industry. Due to rapid deployment of wireless services in the recent past and the fixed spectrum allocation policy, the wireless spectrum has been increasingly crowded. On the other hand, according to the Federal Communication Commissions and other regulatory bodies, most of the allocated spectrum is under utilized [1]. Therefore, the secondary usage of wireless spectrum has been proposed as a method to utilize more efficiently the wireless spectrum [1-4].

Cognitive radio networks (CRNs) [2-4] operate on this idea of the secondary usage of spectrum. Here, the secondary network is allowed to opportunistically access the spectrum owned by the primary network provided that

Correspondence: uditha@ee.oulu.fi

1 Centre for Wireless Communications, University of Oulu, P.O. Box 4500, Oulu 90014, Finland

Full list of author information is available at the end of the article

it does not degrade the performance of the primary network. Hence, there are two major challenges that should be addressed by a CRN. The first challenge is to maximize the performance of the users in the CRN as much as possible. The second challenge is to guarantee the performance or the quality of service (QoS) of the primary network, which is the main constraint in a CRN. Specifically, in underlay CRNs, the performance of the secondary (cognitive) users should be maximized while the maximum interference power to the primary users (PUs) should remain below a pre-specified threshold [4].

Resource allocation problem for underlay CRNs have been studied recently in [5-9], assuming that perfect channel state information (CSI) knowledge for all relevant links is available for the design. Beamformer design for multiple-input-multiple-output (MIMO) ad hoc CRN is presented in [5]. The weighted sum-rate of the CRN is maximized in [5] subject to the individual power constraints and interference constraint to the coexisting PU. A semi-distributed algorithm is proposed to

Springer

© 2014 Wijewardhana et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

achieve a locally optimal solution and an alternative centralized algorithm has been proposed based on geometric programming and network duality. A game theoretic approach for the same problem with a CRN that coexists with multiple PUs is presented in [6].

However, in practice, the channel vectors are estimated from training sequences and, inherently, this leads to imperfect estimation. These CSI estimation errors can greatly affect the performance of the network, resulting in degradation in both primary and secondary users' QoS. Such channel errors are usually modeled either by a bounded uncertainty model such as D-norm, polyhedron, ellipsoidal [10] or a stochastic error model [11].

Robust beamformer design with imperfect CSI has received a considerable attention recently. Usually, this problem is tackled by either worst-case optimization [12-27] or stochastic optimization [24,28]. In worst-case optimization (or maximin optimization), the uncertain parameters can take some given set of possible values, but without any known distribution. Then the optimization variables are designed in such a way that an objective value is maximized while guaranteeing the feasibility of the constraints over the given set of possible values of the parameters. This method has been applied to design the robust beamforming vectors for underlay CRNs in [2026], where the channel errors are either norm bounded or bounded by ellipsoids. With the exception of [24] and [26], most of the abovementioned work consider a CRN where a single secondary transmitter (TX) co-exists with a primary network. The problem of maximizing the minimum signal-to-interference-plus-noise ratio (SINR) in an underlay CRN, where the transmitter communicates with multiple secondary receivers (RXs) is studied in [21]. An iterative solution has been proposed based on semidefinite relaxation [29], and if the solution is not rank-one, rank-one approximations [29] have to be used to achieve the beamforming vectors. For the same problem, a method to achieve a rank-one solution with some tolerance is presented in [22]. Therefore, none of the above work guarantee the optimal solution of the problem of maximizing the minimum SINR in an underlay CRN.

The sum mean square error is minimized in [24] for an underlay MIMO ad hoc CRN constrained to individual power budgets of secondary TXs, where the channel errors are bounded by Euclidean balls. There the authors have cast the problem as a semidefinite program (SDP) and solved iteratively via standard interior point methods to achieve a suboptimal solution for the problem. In [26], the same problem of minimizing the sum mean square error for an underlay MIMO ad hoc CRN subject to individual power budgets for the secondary TXs was considered. A distributed solution was proposed under the assumption that secondary TXs have perfect CSI knowledge of the channels to the secondary RXs. Furthermore,

the SINR of an underlay MIMO secondary link is maximized in [30] constrained to the power budget of the secondary TX under the same assumption that secondary TX has perfect CSI knowledge of the channel to the secondary RX.

The focus of this paper is to design the optimal robust beamforming vectors for the secondary TXs in a CRN that coexists with a primary network. We address the problem of maximizing the worst SINR of any secondary user subject to interference constraints to primary network and individual power constraints. Further, we assume that the network controller has imperfect CSI knowledge and all relevant channel vectors may take any value within some pre-specified bounded uncertainty ellipsoids [10,14,17]. An equivalent reformulation of the problem is obtained, and then the S-procedure [31,32] is used to handle the non-convex quadratic constraints due to channel uncertainties. In particular, we replace each quadratic constraint pair by a linear matrix inequality (LMI) for a fixed objective value by means of the S-lemma [18,21], which leads to a SDP. An iterative algorithm based on the bisection method is proposed to solve the relaxed version (relaxed the non-convex rank constraints in the problem) of the reformulated problem. Finally, we show that the optimal solution for the original problem can be achieved by introducing a properly chosen objective function to the feasibility check step of the iterative algorithm.

As the main contribution, in this work, we show the ability to handle CSI uncertainty in a multiple-input-single-output (MISO) communication network with interference temperature constraints. Further, we provide a rigorous proof for the tightness of SDP relaxation in worst SINR maximization problem in multi-cell downlink scenario with a single user per cell and subject to interference temperature constraints. Additionally, we show that the proposed solution approach can be extended to maximize the worst weighted SINR or, more generally, the worst among a set of increasing functions of each SINR.

Organization: Section 2 describes the network and the channel uncertainty models used in this paper. The problem formulation for the worst-case scenario and a suitable equivalent reformulation is presented in Section 3. In Section 4, the SDP-based solution is presented and an iterative algorithm is proposed to obtain the optimal beamforming vectors. Simulation results are presented in Section 5. Finally, we conclude the paper with Section 6.

Notations: Throughout this paper, C1, H1 and R denotes the set of l-dimensional complex vectors, the set of l-dimensional complex Hermitian matrices and the set of real values, respectively. Further, the complex column vectors and matrices are represented by the boldfaced lowercase and uppercase letters, respectively, e.g. w and W. We denote a real scalar by a lower case letter and Re(-) denotes the real part of a complex number. The superscript (-)T

denotes the transpose and (-)H denotes the Hermitian (conjugate transpose) operation for a vector or a matrix. W ^ 0 and W 0 means that W is positive semidefi-nite and positive definite, respectively. Rank and the trace of a matrix are represented by Rank(W) and Trace(W), respectively. Modulus of a scalar is denoted by j-j and || • || denotes the Euclidean norm of a vector. The expectation of a random variable is denoted by £{•}. In addition, In denotes the n-dimensional identity matrix while 0 denotes an all-zero vector or matrix with appropriate dimensions. We denote the complex normal distribution with mean ¡i and covariance a 2 by CN(¡, a 2). The distribution TCN(a2, a, b) represents the truncated complex normal distribution with parameters a2, a and b (see [33], Chap. 4 in [34]). Finally, in an optimization problem, if w is a variable, then w* denotes the optimal value or the optimal solution.

2 System model

We provide the detailed description of the considered system model in this section. Specifically, we describe the network model and the channel uncertainty model used throughout the paper.

2.1 Network model

We consider an underlay CRN consisting of multiple transmitter-receiver pairs which coexists with a primary network. The network model is shown in Figure 1. The set of secondary links is denoted by N and we label them as n = 1,..., N. We use the same indexing for the secondary transmitters and receivers, i.e., we refer to the transmitter (receiver) of the nth secondary link as the nth secondary TX (RX). We consider a MISO downlink scenario and assume that each secondary TX (a base station) is equipped with nt antennas to communicate with its corresponding secondary RX (a mobile station). We

i nm ^- - -'

\ h-ra/c

V Secondary TX o Secondary RX # Primary RX

Figure 1 System model. Underlay cognitive radio network with two secondary TX-RX pairs (N = 2) coexists with a primary network consisting a single primary RX (K = 1). Straight arrows show the desired channels and the dashed arrows show the interfering channels.

represent the set of all primary RXs by K and label them as k — 1,..., K. Further, we assume that all the primary and secondary RXs are equipped with a single antennaa.

We assume that all secondary TXs operate in the same frequency band as the primary network and use transmit beamforming to communicate with their corresponding secondary RXs. We further assume that a network controller decides the resource allocation and beamforming vectors for each secondary TX.

Single-stream beamforming transmission strategy is assumed and hence the signal transmitted by the nth secondary TX is given by

xn — wndn,

where dn denotes the (complex) information symbol and wn is its associated beamforming vector. We assume that the information symbols are independent, i.e., E{dndm} — 0 for all m — n, n, m e N, and normalized such that E{|d n |2} — 1 for all n e N. Therefore, the transmit power of the nth secondary TX is given by ||wn||2 and it is limited by Pmax, the maximum available transmit power, for all n e N.

We denote the channel vector from the mth secondary TX to the nth secondary RX by gmn e Cnt. The signal received at the nth secondary RX can be written as

yn — gnnWndn gmnWmdm + Zn,

m—1 m —n

where the first term is the signal of interest, the second term represents the interference from the secondary network and zn e C is the additive noise at the nth secondary RX. We assume that the noise term zn has power a2 and it includes the receiver's thermal noise and the interference from the primary network. Therefore, the instantaneous SINR at the nth secondary RX can be expressed as

SINRn —

N m—1 m—n

gm wm r + °2

The interfering channel from the nth secondary TX to the Ath primary RX is denoted by hn/c e Cnt. Now, the total interference power caused by the secondary network on the /th primary RX can be written as

h — E lhHk

which should be limited by the interference threshold Ith in order to guarantee the QoS of the primary network.

2.2 Channel uncertainty model

We assume that the channels are uncertain at the network controllerb, but they belong to a known compact sets of

possible values. Specifically, we assume that the channel vectors, gmn and hn/c for all n, m e N and k e K, belong to known ellipsoidal uncertainty sets.

We model the channel vector, gmn, from the mth secondary TX to the nth secondary RX as the sum of two components, i.e.,

gmn —

where gmn e Cnt denotes the estimated value at the network controller and emn represents the corresponding channel estimation error. It is assumed that emn can take any value inside a nt-dimensional complex ellipsoid. Hence, the channel uncertainty set can be defined as

Emn (Qm n ) — jemn : emn Q

lem and a suitable equivalent reformulation is presented in this section.

3.1 Problem formulation

Now, with the channel uncertainty model above, we can re-write the instantaneous SINR at the nth secondary RX as

l( g nn + enn) wn

En i/- - \h m—i K gmn + emn) wm m—n '

and the interference power, caused by the secondary network on the kth primary RX as

where Qmn is a complex Hermitian positive definite matrix (Qmn ^ 0), assumed to be known, which specifies the size and shape of the ellipsoid. For example, when Qmn = (l/§mn) I, the ellipsoidal channel error model (6) reduces to ||emn ||2 < n. This represents a ball uncertainty region [35] with uncertainty radius %mn. In this model, %mn = 0 implies that perfect CSI knowledge is considered and with %mn the channel uncertainty becomes larger causing CSI knowledge to become imperfect [21].

We use the same uncertainty model for the channel vector, hnk, from the nth secondary TX to the kth primary RX, i.e.,

hnk — h nk + e nk.

where hnk e Cnt is the estimated value at the network controller and eenk denotes the corresponding channel estimation error. The ellipsoidal channel uncertainty set can be defined as

Enk (Qk) — |enk : eHk QQnkenk < 1J .

where Qnk > 0 specifies the size and shape of the uncertainty ellipsoid.

3 Problem formulation

Our objective is to maximize the performance of the CRN while satisfying the QoS requirements of the primary network. We consider the minimum SINR among all secondary receivers as the performance indicator of the CRN and the interference received from the CRN as the QoS measurement for the primary network. Then the solution of the problem will guarantee a certain SINR for all secondary RXs while the interference to all the RXs in the primary network will be lower than a predefined threshold Ith. The mathematical formulation of the mentioned prob-

Ik — (hnk + enkj wn

The resource allocation problem we address in this work is to optimize the transmit beamforming vectors in CRN, {wn1, to maximize the minimum SINR of the secondary RXs for given parameters Pmax and Ith. Due to the CSI uncertainty, the beamfomer design should guarantee a certain SINR for any channel error value inside the uncertainty region. Further, the design should keep the interference to the primary RXs below the threshold for all channel errors inside the uncertainty region to guarantee the performance of the primary network. This problem can be mathematically expressed as

maximize subject to

minn—1....N infemneEmn.meN SINRn

'n^ Enk

nil 2 < ^max

neN Ik < Ith. k e K (11) n e N.

where the optimization variables are wn, emn, enk for n, m e N, k e K. Note that SINRn depends on emn for all m e N (see (9)) and Ik depends on enk for all n e N (see (10)). In Problem (11), the infimum in the objective function and supremum in the first constraint are taken over all possible channel errors contained in the given uncertainty region.

3.2 An equivalent reformulation

Since the minimization in the objective function of Problem (11) is over all secondary RXs, the optimal value should be less than or equal to any SINR value that can be achieved by a secondary RX for the optimal beam-former design. Therefore, the optimization Problem (11) can be equivalently written in the epigraph form (see

SINRn —

p. 134 in [31]) (strictly speaking, this is a hypograph form, as Problem (11) is a maximization) asc

maximize y

subject to y <

(gnn + enn

\H enn) wn

EN | I \H |2 I 2

m=1 1 (ggmn + emn) wm1 + an m=n

Vemn e imn, n e N (12)

N (in + e^/) wn < ith, Venk e En, // e £

l|Wn I2 < Pmax, n eN,

where the optimization variables are y and wn, emn, en/ for n, m e N, // e By introducing the new variables,

— I (gmn + emn) wm I

G N\{n}, n G N

Ink —

(h nk + ¿nk) wn

, n G N, k G K

Problem (12) can be recast equivalently as

maximize y

subject to (gnn + enn) wnw^ (g nn + enn)

^ ] smn +

m—1 \m—n

, Venn G Enn, n G N

(êmn + emn) wm(gmn + emn) < smn,

Vemn G imn, m g N\{n}, n G N (15c)

J^Ink < Ith, k G K

(link + enkj wn(hn£ + enk) < Ink, venk g enk, n g N, k g K (15e)

W^Wn < Pmax, n G N,

(15e) are tight (i.e., they hold with equality at optimality). Hence, Problem (15) is an equivalent reformulation of Problem (12).

4 Optimal beamformer design

In this section, we propose an iterative algorithm to solve the equivalent Problem (15) and compute the optimal beamforming vectors for the underlay CRN.

4.1 Optimal solution and iterative algorithm

The outer product wnwH in Problem (15) is a rank-one positive semidefinite matrix. We introduce a new set of variables Wn = wnwj for all n e N. Then the constraints (15b), (15c), (15d) and (15f) become linear in Wn , and Wn should be rank one. Furthermore, we can see that the constraint (15b) is quadratic in enn, constraint (15c) is quadratic in emn and (15e) is quadratic in en/. This suggests that we can use the following lemma to recast these constraints in such a way that they become linear matrix inequalities (LMIs) for fixed value of y in Problem (15).

S-lemma[18,31,32]: Let be a real valued function of an l-dimensional complex vector y, defined as

(y) = yHAiy + 2Re (bjy) + C,

where Ai g Hl, b,- e Cl, ci e R and i = 0,1. Assume that there exists a vector ^ e Cl such that 01 (y) < 0. Then the following conditions are equivalent:

S1: O0(y) > 0 for all y e Cl such that O1 (y) < 0. S2 : There exists X > 0 such that the following LMI is feasible:

Consider the first constraint in Problem (15). It can be re-written as

eHn Wn enn + 2Re( (W, g nn enn

) + êiïn Wn ê nn > 0, n G N (16)

^ ] smn + ®n m—1

\m—n y

for all enn e Cnt such that

eH Qnn enn - 1 < 0, n g N

where the optimization variables are y and wn, emn, enk, smn, Ink for all n, m e N, k e K. Note that we have re-written 1st constraint in Problem (12) as two separate ones, i.e., (15b) and (15c). Furthermore, it is easy to show (e.g., by contradiction) that constraints (15c) and

should be satisfied. The existence of an enn for which (17) holds strictly is obvious (e.g., enn = 0). Hence, we can regard the left-hand sides of (16) and (17) as 00 (enn) and 01 (enn) in S-lemma. Then, according to S-lemma, the inequality (16) is satisfied for all channel errors enn

that satisfy (17) if there exists ¡¡nn > 0 such that the condition

nn —

g^Wn g^Wngnn - A TT—1 Smn + o2

+ ßnn

Qnn 0 0 -1

h 0. n e N

is satisfied.

Following the same procedure, it follows that the inequality (15c) is satisfied for all channel errors emn e Emn if there exists imn > 0 such that

$mn —

-Wm -Wm gmn

—ggmnWm smn - gmnWmgmn

Qmn 0 0 -1

h 0. m e N\{n}. n e N

is satisfied. Similarly, the inequality (15e) is satisfied for all channel errors enk e Emn if there exists vnk > 0 such that

®nk —

n h nk

-hHkWn Ink - hHkWnhnk

Qnk 0 0 -1

h 0. n e N. k e K

is satisfied.

Thus. we can rewrite Problem (15) equivalently as follows:

maximize y

subject to Ann h 0. n e N

$mn h 0. m e N\{n}. n e N

&nk h 0. n e N. k e K

EN—1 Ink < Ith. k e K

ßmn > 0. n. m e N vnk > 0. n e N. k e K Wn h 0. n e N Trace (Wn) < Pmax. n e N Rank (Wn) — 1. n e N.

Specifically, for a fixed y , the feasibility can be checked by solving the problem

P0(Y) : find Wm lmm vnk, smB> Ink}n,meN,keK

subject to Ann(Y) > 0, n e N

®mn > 0, m e N\{n}, n e N &nk > 0, n e N, k e K TN=1 Ink < Ith, k e K lmn > 0, n, m e N vnk > 0, n e N, k e K Wn > 0, n e N Trace (Wn) < Pmax, n e N,

where the optimization variables are Wn, imn, vnk, smn, Ink for all n, m e N, k e K, using a standard SDP solver and the optimal solution is the maximum value of y for which Problem (22) is feasible.

However, it turns out that we can employ a simple trick to handle also the rank constraint of Problem (21). The procedure is based on replacing the dummy objective function in Problem (22) with the sum power minimization for the secondary network. Then the problem used to check the feasibility can be written as

P1(Y) : minimize Y,n=1 Trace (Wn)

subject to constraints of P0(y)

where the optimization variables are Wn, imn, vnk, smn, Ink for all n, m e N, k e K. Clearly, Problem (22) is feasible if and only if Problem (23) is feasible (because they have the same set of constraints). Furthermore, the following proposition ensures that Problem (23) returns always a set of rank one matrices Wn.

Proposition 1. If Problem (23) is feasible (for a given y ), then the optimal matrices W*n are always rank one, i.e.,

W* = w* W

n — n n

for all n e N.

(21) Proof. The proof is presented in Appendix 1.

where the optimization variables are y and Wn , ^mn, vnk, smn, Ink for n, m e N, k e K. Note that if the rank constraints are neglected, Problem (21) can be easily solved using the bisection method (see p. 146 in [31]) which provides the optimal solution for Problem (21).

Note that for a given feasible value of y. Problem (22) can also have higher rank solutions but Problem (23) has only rank one solutions. The optimal beamforming vectors that maximize the minimum SINR can be found directly by eigen-decomposition of W*n for all n e N. This implies that the global optimal solution of the original Problem (11) is obtained.

Following iterative algorithm can be used to design the optimal robust beamforming vectors for an underlay CRN that maximize the minimum SINR of the cognitive users within a pre-defined accuracy e > 0.

In the bisection method, exactly |~log2((yupp — yiow)/£)~\ iterations are required before the algorithm terminates (see p. 146 in [31]), where yiow and yupp are the initial lower and upper bounds for the optimal value. Hence, a good initialization can reduce the number of iterations required in the algorithm which leads to lower resource consumption. Therefore, in practice, it is highly beneficial to have good initial lower and upper bounds which are simple to obtain. Next, we describe an efficient method for finding lower and upper bounds (i.e., yiow and yupp) to initialize the above algorithm.

4.2 Initial lower bound

When a constraint in a maximization problem is modified (perturbed) in such a way that it gets tightened, the optimal value of the perturbed problem is always a lower bound for the optimal value of the original problem (see pp. 249-251 in [31]). We use this fact to compute an efficient initial lower bound, yiow, for Algorithm 1.

Algorithm 1 Robust cognitive beamforming via bisection method

., Ith, Pmax. tolerance

given network parameters

)gmn, hnk, Qmn, Qnk, ®n\

J n,meN,ke^

e > 0, initial lower and upper bounds for the optimal

value yiow and Yupp.

repeat

1. Y :— (Wow + Yupp)/2.

2. Solve the convex feasibility Problem P1 (y).

3. if p1 (y) is feasible, Ylow :— Y ; else Yupp :— Y. until Yupp - Ylow < e.

outPuts y* and jwn «)n—wn)nGA/. -

Consider the first constraint of Problem (15),

(ênn + enn) Wn(ê nn + enn) > Y

^ ] smn + ®n

m—1 \m —n

We introduce a new variable t, that should satisfy the inequality

t > E Smn + n G N.

Now, using (24) and (25), the constraint (15b) can be tightened as follows:

(gnn + enn)H wnw^l (gnn + enn) > y t, n e N, (26)

E Smn + al < t, n e N. (27)

m=1 m=n

We define a new set of variables x = \ and umn — ^F-,

ynk = 1-f,vn = ^S. for n € N,k € K. Then, the perturbed problem can be written as

maximize Y

subject to (gnn + enn) Vn( gnn + enn ) — Y, Venn e Enn, n e N E^—1 Umn + ^X < 1, n e N

m — n ^

(gmn + emn) Vm (gmn + emn) < umn,

Vemn e Emn, m e N\{n}, n e N EN—1 ynk < Ith, k e K

(link + enk) Vn (hnk + enk) < Ink,

Venk e Enk, n e N, k e K Trace (Vn ) < Pmaxx, n e N Rank (Vn ) — 1, n e N,

where the optimization variables are y, x and Vn, emn, en/, ^mn, yn/ for all n, m e N, // e

Following the same method as in Section 4.1, using S-lemma to recast the quadratic constraints as LMIs, Problem (28) can be reformulated as follows:

maximize Y subject to Ann ^ 0,

nGN ^ 0, m g N\{n}, n g N

m—1 m—n

ë nk ^ 0, n G N, k G K Y!m—1 Umn + < 1, n G N

El1 ynk < Ith x, k G K

frmn > 0, n, m g N

vnk > 0, n g N, k g K

Vn ^ 0, n G N

Trace (Vn ) < PmaxX, n G N

Rank (Vn ) — 1, n G N,

Vn Vn gnn

tÊiïn Vn S^n Vn gnn - Y

+ fr n

Qnn 0 0 -1

Now the perturbed Problem (12) with the relaxed constraint can be written as

maximize y

O nk =

Stm Wm

-Vm g m

gmn Vn g m

Qmn 0 0 -1

-hHkVn ynk - hHkVnh

Qnk 0 0 -1

and the optimization variables are y, x and Vn, jlmn,vnk, umn, ynk for all n, m e N, k e K. Note that the non-convex product terms ysmn (in Problem (21)) are not present in Problem (29). Hence, without the rank constraints the Problem (29) is convex (even when y is considered as a variable). Therefore, the relaxed problem can be efficiently solved using SDP solvers such as SeDuMi [36] or SDPT3 [37].

Let us denote the optimal matrices Vn for Problem (29) by Vn for all n e N. Then a rank-one feasible solution for Problem (29) can be achieved by eigenvalue decomposition as follows:

— ^max ymax Y^a

where Amax is the maximum eigenvalue and ymax represents the corresponding eigenvector of matrix V*n. The feasibility of V^1 is proved in Appendix 2. Since the matrices Ven are feasible for the perturbed Problem (29), the corresponding objective value obtained by solving Problem (29) is a lower bound for Problem (15).

4.3 Initial upper bound

An upper bound for a maximization problem can be found by relaxing a constraint of the original problem. Specifically, here we relax the first constraint,

(gnn + enn)

En i I \H I- 2

m—1 Kgmn + emn) wm I + Gn m—n ' '

€ N,

in Problem (12). Since the interference from the mth secondary TX to the nth secondary RX is a non-negative

?mn + emn ) wm I

be relaxed as

entity, i.e., | (g mn + emn ) Hwm |2 > 0, the constraint (34) can

(gnn + enn

-, n € N.

subject to y <

V-^N n—1

(g nn + nn n I

Venn € Enn, n € N

(hnk + e nk) wn

< Ith,

venk € £nk, n € N, k € K

nil2 < Pmax,

€ N,

where the optimization variables are y and wn, enn, en^ for

n e N, k e K.

Following a similar approach as in sections 3.2 and 4.1, by introducing variables Wn = wnw^,Ink = I(h.nk + enk)Hwn |2 and using the S-lemma to recast the quadratic constraints, Problem (36) can be reformulated as

maximize y

subject to Ann ^ 0, n e N,

Gnk > 0, n e N, k e K

EN=1 Ink < Ith, k e K

pnn > 0, n e N (37)

vnk > 0, n e N, k e K

Wn ^ 0, n e N

Trace (Wn) < Pmax, n e N

Rank (Wn) = 1, n e N,

Wn Wn gnn

L gnn Wn gHnWn gnn -

+ ßnn

Qnn 0 0 -1

O nk —

-Wn -Wn 1»nk ^

-hlHkWn Ink - J»HkWnhnk

Qnk 0 0 -1

and the optimization variables are y and Wn, jlnn, vnk, Ink for all n e N, k e K. Without the rank constraints, Problem (37) can be efficiently solved using existing SDP solvers. Note that the non-convex product terms ysmn (in Problem (21)) are not present in Problem (37). Hence, without the rank constraints, Problem (37) is convex (even when we consider y as a variable). Further, the optimal solution of Problem (37) gives an upper bound for Problem (15). It should be mentioned that we solve a relaxed

mn —

A nn —

version of Problem (37). Hence, the optimal solution of the relaxed problem also provides an upper bound for Problem (15).

4.4 Extension to a more general objective function

Consider the resource allocation problem where the CRN is required to optimize the transmit beamforming vectors to maximize the worst weighted SINR or, more generally the worst among a set of increasing functions of each SINR. Let fn be an increasing function of SINRn. Since transmit power and primary interference constraints are inherited in underlay CRNs, for a bounded uncertainty in the channel errors, this problem can be mathematically expressedd as

maximize minn=1,...,n infemneEmnmeNfn (SINRn)

subject to sup~ e£nkAeM Ik < Ith, k e K IIWn ||2 < ^max n e N,

where the optimization variables are wn, emn, enk for n, m e N, k e K.

The function fn is an increasing function of SINRn; hence,

inf fn (SINRn) = fn[ inf r SINRn

emn eSmn ,mGN \Smn GEmn ,mGN

Therefore, the optimization Problem (40) can be equiva-lently written in the hypograph form (see p. 134 in [31]) as

5 Results and discussion

Numerical simulations are performed to validate and assess the performance of the proposed beamforming scheme. We consider a network model where two secondary TX-RX pairs (N = 2) coexist in a primary network with two primary RXs (K = 2). We assume that each secondary TX is equipped with four antennas (nt = 4). Further, all complex entries of the estimated channel vectors are independent and identically distributed (i.i.d) according to CN(0,1). We assume that Qmn = Qmk = (1/§2)Int for all n, m e N, k e K. Thus, an estimation error can take any value inside a ball with radius §. We use a truncated normal distribution

(see [33], Chap. 4

in [34]) to generate each complex entry of the estimation errors. Additionally, we assume that a2 = a2 = 1 for all n e N and the maximum available transmit power of a secondary TX is Pmax = 10a2. To maintain the QoS requirements for the primary network, we limit the maximum allowable interference power from the secondary network in the order of the received noise power, i.e., Ith = a2 (= 1).

We present results for both robust and non-robust beamforming designs for comparison. The robust beam-forming vectors are acquired directly following Algorithm 1 with tolerance e = 10-2. For the non-robust case, the beamforming vectors are obtained based only on the estimated channels and ignoring the uncertainty. We follow the Algorithm 1 except that at step 2, we replace Problem (23) by the following one:

maximize y

subject to fn 1 (y) <

^ —I— \H \nn + ennj wn

l(g mn + ^mnj ™m |2 + Gn

Vemn ^ ^mn, n G A/"

(h nk + S*) wn

< /th, Venk G Enk»

k G K II Wn ||2 < Pmax, n G N,

where the optimization variables are y and wn, emn, enk for n, m e N, k e K. Problem (41) has the similar format as Problem (12), the only difference is that y in the first constraint of Problem (12) should be replaced by the evaluated function valuef-1 (y) in Problem (41). Hence, following the similar steps as in sections 3.2 and 4, the Problem P1 (y) can be modified according to the new constraint. Then Problem (40) can be solved optimally by directly applying Algorithm 1 with the modified Problem P1 (y) to check the feasibility.

minimize En=1 Trace (Wn)

subject to g^n Wn g nn > W Em=1 Smn Wm gmn + a2),

\ m =n J

n e N EN=1 hk Wn link - Ith < 0, k e K

Trace (Wn ) - Pmax < 0, n e N

W„ > 0, n G N,

where the optimization variables are Wn for all n e N. The MATLAB toolbox CVX [38] is used to solve all the optimization problems, and there, the SDPs are solved using the SeDuMi solver.

Figure 2 displays the empirical cumulative density function (CDF) of the interference due to the secondary network at first primary RX for different values of § (i.e., radius of the uncertainty ball). The empirical CDF is calculated over a set of 10,000 different channel errors inside the given uncertainty region for a fixed estimated channel realization. As expected, the non-robust design can not guarantee the maximum interference threshold even

£ 0.5

Cl, 0.2

-5=0.1 (Robust)

5=0.2 (Robust)

5=0.3 (Robust)

5=0.4 (Robust)

5=0.5 (Robust)

• ........Non-robust design fi

■ /fi ' ) £ -

-2.5 -2 -1.5 -1 -0.5 0 0.5

Interference power at primary RX 1 [dB]

Figure 2 CDF of the interference due to the secondary network at a primary RX. Empirical CDF of the interference due to the secondary network at first primary RX for different values of %. A network with parameters nt = 4, N = 2 and K = 2 is considered. The interference threshold for the primary network is 1 (0 dB). The empirical CDF is calculated over different channel errors for a fixed estimated channel realization.

when the CSI uncertainties are relatively small. Specifically, with non-robust design, around 52%, 55%, 57%, 59% and 61% of the simulated channel errors exceed the interference threshold of the primary network (Ith = 1) for uncertainty ball radius of 0.1,0.2,0.3,0.4 and 0.5, respectively. On the other hand, for the proposed robust algorithm, the interference to the primary RX is always less than the threshold levele, which guarantees the required QoS of the primary network.

In Figure 3, we plot the empirical CDF of the interference due to the secondary network at first primary RX

1 0.9 if

0.8 " -5=0.1 (Robust) / M m |.i i 2,0 3,0 1.0 5

0.7 ^=0.2 (Robust)

" —5=0.3 (Robust) / ,7 1

5=0.4 (Robust) / ' / 1

0.6 - —5=0.5 (Robust) / i

........Non-robust design ' / È

0.5 /

0.4 ij

0.3 I

0.2 //

0.1 n j j

-2.5 -2 -1.5 -1 -0.5 0 0.5 1

Interference power at primary RX 1 [dB]

Figure 3 CDF of the interference due to the secondary network at a primary RX. Empirical CDF of the interference due to the secondary network at first primary RX for different values of %. A network with parameters nt = 4, N = 2 and K = 2 is considered. The interference threshold for the primary network is 1 (0 dB). The empirical CDF is calculated over different channel errors and over multiple estimated channel realizations.

for different values of % averaged over different estimated channel realizations. We generated 1,000 distinct estimated channel realizations and for each of them, 10,000 different channel errors are generated to calculate the empirical CDF. It can be seen that for more than half of the simulated cases, regardless the level of uncertainty, the non-robust solution exceeds the maximum interference threshold. On the other hand, the robust design guarantees the interference to the primary RX remain below the interference threshold (Ith = 1) for all simulated cases. Moreover, it can be observed from Figures 2 and 3 that the variation in interference power becomes large with %. When the uncertainty region is small (i.e., small %), the beamformer can be designed to direct relatively sharp nulls towards primary RXs for all possible channel values within the uncertainty region. As the radius % increases, the range of possible channel values inside the uncertainty region increases as well and causes the nulls to become less focused. Hence, the interference power varies in a wider range for different channel errors inside the uncertainty region.

Figure 4 shows the empirical CDF of the received SINR at the second secondary RX for different values of % (i.e., the radius of uncertainty balls). We plot the SINR at the second secondary RX since it gives the minimum SINR for the considered value of the channel estimate. As in Figure 2, the empirical CDF is taken over 10,000 possible channel errors inside the uncertainty region. When the uncertainty region is small, the beamformer can be designed to direct relatively sharp nulls towards the primary RXs for all possible channel values within the uncertainty region. Hence, higher transmit powers can be allocated to the sharp beams towards the secondary RXs resulting in higher SINR values for smaller % values. The

0.9 0.8 ¥ 0.7

0.2 0.1

if ; §=M.1,M.2,M.3,M.4,M5 " f j -

: ; —i=01(Robust)

I | i=02(Robust) '

- ! f i=03(Robust) ,

j I := 0 4(Robust)

- 1 1 — :=0 5(Robust) ,

J J , Non-robust design

4 6 8 10 12

SINR at secondary RX 2 [dB]

Figure 4 CDF of the received SINR at a secondary RX. Empirical CDF of the received SINR at second secondary RX for different values of % .A network with parameters nt = 4, N = 2 and K = 2 is considered. The empirical CDF is calculated over different channel errors for a fixed estimated channel realization.

ability of the secondary TXs to focus sharp beams towards the corresponding secondary RXs while simultaneously directing nulls towards other secondary and primary RXs reduces as the channel knowledge decreases (i.e., when f increases). Hence, the mean SINR reduces with the increase in the radius of uncertainty balls.

Figure 5 displays the empirical CDF of the received SINR at a specific secondary RX for different values of f, averaged over multiple estimated channels. As in Figure 3, we produced 1,000 different estimated channels, and for each of them, 10,000 different channel errors are generated to calculate the empirical CDF. We can observe that the SINR performance of the robust design with f = 0.1 is similar to the SINR performance of the non-robust design which is not able to guarantee the interference threshold. Thus, in average, our robust design provides a similar SINR performance for the secondary network as the non-robust design without exceeding the interference threshold of the primary network. Further, we notice a reduction in SINR when the uncertainty region increases. This is mainly due to the fact that the transmitter is not able to use all the available transmit power when the uncertainty region is large. This effect can be clearly seen in the next figure.

Figure 6 presents the transmit power variation at a specific secondary TX with f (i.e., the radius of uncertainty balls). This figure is drawn using the same setup as in Figures 3 and 5. When the uncertainty region is small, since the nulls towards the primary RXs are sharp, higher transmit powers can be allocated to secondary TXs to achieve higher SINR values at secondary RXs. As f decreases from 0.3 to 0, we notice a rapid increase in the transmit power. On the other hand, when the uncertainty

SINR at secondary RX [dB]

Figure 5 CDF of the received SINR at a secondary RX. Empirical CDF of the received SINR at a secondary RX for different values of f. A network with parameters nt = 4, N = 2 and K = 2 is considered. The empirical CDF is calculated over different channel errors and over multiple estimated channel realizations.

Figure 6 Transmit power variation at a secondary TX. The

transmit power variation at a secondary TX with respect to the radius of the uncertainty balls (f). A network with parameters nt = 4, N = 2 and K = 2 is considered. Transmit power is averaged over 1,000 estimated channel realizations.

region is large, the beamformer design cannot focus sharp nulls towards primary RXs for all possible channel values in the uncertainty region. Therefore, the transmitter has to decrease its transmit power to be able to guarantee the interference threshold for all possible channel values in the uncertainty region. Hence, for f values greater than 0.5, the transmit power has become small.

Next, we illustrate the gain pattern variation of the beamforming vectors designed from non-robust and robust designs for different uncertainty regions (i.e., different values of f). For illustration purposes, we consider a simple network model where a single secondary TX-RX pair (N = 1) coexist in a primary network with three primary RXs (K = 3; see Figure 7). Further, we use a simple line-of-sight model for the channels since the physical meaning of a beamforming pattern in a rich scattering environment is difficult to visualize with respect to the locations of the receivers. We model the estimated channel vector from the secondary TX to secondary RX as g11 = [iii, • • •,gi, • • •,£n]r , where the channel from antenna element i to secondary RX is given by [17]

g\i = —exp(2?rj/X{xi cos 6 +yt sin 6»)), (43)

where (xi,yi) is the location of the ith antenna element, 0 is the direction of the RX with respect to the direction of the antenna array and j = »/—1- Similarly, we model the estimated channel vector from the secondary TX to the //th primary RX as = , •••, hllk, •••, , where h'lk = exp (2jzj/k(xi cos0 +yt sin0)) gives the channel from antenna element i to the / th primary RX. We assume that the secondary TX is equipped with nt = 10 antennas arranged in a linear array and spaced

/ « SRx PRx STx

0 0.5 1 1.5 2

Figure 7 Network model for gain pattern comparison. Sample network. Secondary receiver at direction 6 = 45° and primary receivers at directions 6 = 60°, 6 = 90° and 6 = 120°. Network with

parameters nt = 10,N = 1 and K = 3. Antennas lie in a linear X/2 apart, centered at transmitter and along the direction 6 array 0°.

half-a-wavelength (k/2) apart. Further, the antenna array is centered at the transmitter and lies along the direction Q = 0°. The secondary RX is located at direction Q = 45° and the primary RXs are located at directions Q = 60°, Q = 90° and Q = 120°.

Figure 8 shows the gain patterns for the non-robust beamforming vector designed with estimated channels and robust beamforming vectors designed with Algorithm 1. As expected, the gain reduces with f, reducing the SINR at the secondary RX since the TX have to decrease its transmit power to be able to guarantee the interference threshold for primary RXs. Further, as

40 60 80 100 120 140

Angle of transmission (degrees)

Figure 8 Gain pattern comparison. Gain pattern comparison for robust and non-robust beamforming designs. Network with parameters nt = 10,N = 1 and K = 3. Antennas lie in a linear array X/2 apart, centered at a transmitter and along the direction Q = 0°. Vertical dotted lines represent the directional location of the receivers (secondary receiver Q = 45°, primary receivers Q = 60°, 90°, 120°).

f increases, we notice that the nulls around the angles at which the primary RXs are located become wider in order to protect the primary systemf. Therefore, Figure 8 validates the previous observations that as f increases the transmit power decreases reducing the SINR at secondary RXs and nulls become wider around the angles at which the primary RXs are located to protect the primary system, explaining the trade-off between secondary performance and the protection for the primary system.

6 Conclusion

We have proposed a method to design the optimal transmit beamformer vectors for an underlay cognitive radio network, which maximizes the minimum received SINRs of the cognitive users subject to primary users' interference constraints. We have considered that the network controller has imperfect CSI knowledge in all relevant channels, and bounded ellipsoidal uncertainty model has been used to model the CSI errors. First, we have converted this highly untractable non-convex problem into a convex problem by means of semidefinite relaxation. Then, an iterative algorithm has been proposed based on the bisection method to solve the relaxed problem. Furthermore, we have provided a method to obtain the optimal solution for the original problem (i.e., non-relaxed problem) by introducing a properly chosen objective function into the iterative algorithm. Finally, upper and lower bounds for the optimal value of the considered problem have been proposed, which provides better initialization for the algorithm. The simulation results show that the performance of the primary network is guaranteed by the proposed algorithm for any channel error within the considered uncertainty region. Furthermore, results show that for smaller uncertainty regions, the SINR performance of the proposed robust design is similar to that of the non-robust design.

Endnotes

aWe can apply the mathematical model of the proposed network to more general network scenarios. As an example, we can consider a multi-cell network where the transmitters are base stations (BSs) equipped with multiple antennas that communicate with the single antenna mobile stations (MSs) using time-division-multiple-access. A BS transmits signals to a single MS at a given time instant and has per-transmission power constraints. Further, the multi-cell network is subject to some interference temperature constraints.

bWe assume that the equivalent channel and the power of interference are perfectly known at each receiver.

cNote that the infimum and the supremum in Problem (11) implies that the solution should satisfy for all channel errors inside the given uncertainty region. Therefore, we have written them equivalently as

Vemn e Emn and Venk e £nk in the first and second constraints of Problem (12), respectively. We can see that the variables y and wn, emn, enk for n, m e N, k e K are optimal for Problem (12) if and only if wn, emn, enk for n, m e N, k e K are optimal for Problem (11) and the first inequality constraint of Problem (12) holds with equality. Hence, the optimal solution of Problem (12) is equivalent to that of Problem (11).

dNote that in the worst weighted SINR case the increasing functions/n(SINRn) = ZnSINRn for all n e N, where Zn is an arbitrary nonnegative weight associated with nth secondary RX. Weights Zn can be used to balance between user fairness and total throughput.

eNote that in worst-case robust optimization, the beamforming vectors are designed to keep interference to the primary RXs below the threshold for all possible channel errors (irrespective of their probability of occurrence) inside the uncertainty region. In the simulations, each complex entry of the channel error vector is generated using a truncated Gaussian distribution CN(0, Z2) truncated at -3Z and 3Z (roughly speaking, this corresponds to 1% error outage), where Z = f/3V2«i denotes the standard deviation. The larger value of f implies that the actual channel vector can be very far from the estimated value of the channel. Since in the considered simulation model, the probability of occurrence of the channel vectors which are far from the estimated value is small the probability of achieving interference close to the threshold is small.

fNote that in the non-robust design, there is no null present at 0 = 90°. This is due to the fact that the beamforming design assumes perfect CSI at the secondary TX. Since the secondary TX knows the exact channel to the primary RX, even with this gain, the secondary TX can guarantee that the interference to the primary RX for that specific estimated channel is below the interference threshold.

Appendices

Appendix 1 Proof of proposition 1

Let us rewrite Problem (23) as follows:

minimize ^«=1 Trace (Wn) subject to

Ann (Wn, Y, lnn, [Smn}m=n) h 0, n e N

®mn (Wm, lmn, Smn) h 0, m e N\[n}, n e N

®nk (Wn, Vnk, Ink) h 0, n e N, k e K

Wn h 0, n e N

Trace (W n) < "max, ne

EN=1 Ink < Ith, k e K

lmn > 0, n, m e N

vnk > 0, n e N, k e K

where the optimization variables are Wn, imn, vnk, smn, Ink for all n, m e N, k e K for a fixed Y value. The corresponding dual variables for the constraints are shown in the rightmost column of Problem (44).

Let C(-) define the Lagrangian of Problem (44) and

^ nn —

Ann b, b

nn bnn

nn cnn

h 0 n e N,

where Ann e Hnt, bnn e Cnt and cnn is a non-negative real value according to the properties of positive semidefinite matrices. Using the Karush-Kuhn-Tucker (KKT) conditions, gradient (V), complimentary slackness (C.S.), primal feasibility (P.F.) and dual feasibility (D.F.), we can write the following:

VCw% — 0^Zn — (1 + P*n) Int [Int gnm] *n

Int gH

Int hhnk

~ ~ [ ènn ] ^n

Int - hnk -

Int & nn

n e N (46)

VL^n — 0 ^ Trace (QnAn) - c*nn + n*n — 0, n e N

* mn Ank Zn

nmn Tnk,

C.S.wn >0 ^ Zn Wn — 0, n e N (48)

C.S.A*„„>0 ^ A* ** = 0, ne TV nn nn — e N (49)

P.F.u* ^ ¡m ^ 0, n, m e N (50)

P.F.$* ^ *mn ®*mn h 0, n, m e N (51)

M.z; ^ Z*n h 0, n e N (52)

D.F.^* ^ mn **mn h 0, n, m e N (53)

A*nk h 0, n e N, k e K (54)

mn n*mn ^ 0, n, m e N (55)

d.fp ^ Pn > 0, n e N. (56)

Further, we can observe for Problem (44) that the target minimum SINR

Y > 0 ^ Wn — 0, n e N.

Now, we write the first-three term of (46) as N

Zn = (1 + O Int +J2 [ In* gnm ] * *nm

Lnt gH

+ [ int hnk k=i

From (53), (54) and (56), we can say that

Zn v 0 ^ Rank (¿n) = nt,

since ZZn should be full ranked. Moreover, if * (46) and (59) suggest that Z*n v 0. From (48), this leads to W*n = 0 which contradicts with (57). Therefore, the condition

- hnk -

int hH

(59) = 0,

* In = 0, n e N

[-s^n ^ ^nn (w, y, ^ {«m„j

= -y ( ZÎ"=1 4n + ^ ) < 0.

This implies that ¡nn = 0 and hence from (50), we can say that ¡nn > 0.

By substituting (18) and (45) into (49), the following two equalities can be easily obtained:

(W + ^nQnn) A^n + wngnnbnn = 0,

(W + ¡¿nQnn) b*nn + WngnnC = 0.

Since cnn > 0, post-multiplying (67) by -b^n/cnn and adding to (66) result in

(wn + H*nnQnn) (Kn - bnnbnHH/c™) =

should be satisfied.

The rest of the proof follows from the proof of proposition 1 in [18] and we provide the details for the completeness of the paper. First, we prove that W*n has rank one provided that **nn has rank one. Then we prove that indeed **nn has rank one.

Assume that **nn has rank one and therefore it can be written as **nn = vvH, where v e Cnt+1. Then the last term in (46) can be written as Z*n = y [ Int gnn ] vv^ [ Int gnn ]H, which has also rank one. So we can write

Rank (¿n) = Rank (z* + Zj)

< Rank (¿n) + Rank (Z*n) (61)

^ nt - 1 < Rank (¿n).

Using Sylvester's rank inequality (see p. 211 in [39]) on (48) and with the help of (61), we can write following for rank of W*n:

Rank(W;) < nt+Rank (¿¿W^-Rank (Z*n) < 1. (62)

It follows from (57) and (62) that

Rank (wn) = 1. (63)

What remains is to prove that * nn indeed has rank one. First, we will show that c*nn > 0 and ¡*nn > 0. From (47) and (55), we can write

Trace (QnnA*nn) < c*m, n e N. (64)

Since Qnn v 0, by (45), (60) and (64), it is obvious that cnn > 0. We can see from (18) that when ¡nn = 0, Ann is not positive semidefinte because

The term (W + ¡i*nnQnn) >- 0, since ¡*nn > 0 and Qnn >-0, then (68) implies that Ann = b^b^f/c*nn. Hence, (45)

transforms to

b* b*H/c* b*

nn nn nn nn

u*h „*

b* / /c*

which is indeed a rank-one matrix. This concludes the proof.

Appendix 2

Proof of feasibility of eigenvalue approximation

Consider a positive definite matrix Y e H' with r = Rank(Y). Then according to the eigenvalue decomposition, we can write

Y =E Xiii yH

where X > X2 > ... > kr > 0 are the eigenvalues and yi,..., yr e C' are the respective eigenvectors of Y. Since Y is positive semidefinite, for any random vector z e C',

zHYz > X1zHy1yHz > 0.

Here, the first inequality is achieved from the fact that all the eigenvalues are non-negative and the definition of positive semidefinite matrix gives the second inequality.

Further, consider any vector z e C' where the elements are denoted by z1,..., zn e C. Then, from the definition

Trace (zzH) = ^ ZizH > 0.

Let the solution of relaxed SDP (29) be given by y*, x* and V*n, ¡1*mn, v*k, u*mn, y*nk for all n, m e N, k e K. Now, from the perturbed Problem (28), we can say that for the

matrices V*n for all n e N there exists a y* > 0 such that the following conditions are satisfied:

(Î^n + eHJ V (gnn + enn) > Y*, VeHnQnnenn < 1, n e N

J2 u*mn + °lx* < 1, n e N (73b)

(ëron + emn) Vm (gmn + emn) < umn, ^emnQmnemn < 1,

n, m e N (73c)

J2y*nk < IthX*, k e K (73d)

(hHk + eHk) V (hnk + enk) < fa veHQkenk < 1,

n e N, k e K (73e)

Tr (V) < PmaxX*, n e N. (73f)

Therefore, in order to show that the eigenvalue approximation is feasible, we should be able to find a y > 0 for the approximated beamforming vectors such that all above inequalities are satisfied.

Let the rank of V*n be r, eigenvalues and the corresponding eigenvectors be X1n > X2,n >,..., > Xr,n > 0 and yi,n, y2,n, ■■■, yr,n respectively for all n e N. Then, using the eigenvalue decomposition, the trace of the beamform-ing matrix can be written as

Tr (V,) — J2 Tr (>y,>yHn) > Tr (HnyrnrHn), j—1

where the inequality is obtained using (72) and the fact that all eigenvalues are non-negative. Therefore, it can be easily shown from (74) that the condition (73f) is satisfied for the eigenvalue approximation. Then from (71), for any error vector enk we can say that,

(hHk + eHk) ^1,ny1,nyÎ^n (hnk + enk)

< (hHk + eHk) V nk + ~enk) .

This implies that the condition (73e) is satisfied with the approximation. Further, the same method can be applied to prove that the condition (73c) is also satisfied.

According to (71), in order to satisfy the condition (73a), the beamforming matrix V*n should be rank one for all n e N, i.e., when the first inequality of (71) becomes an equality. But from the second inequality of (71), we can say that for any error vector enn there exists some y new, such that

Y* > (g£ + e&) HnY1,nyHn (gnn + enn) > Ynew > 0, n e N.

This concludes the proof and shows that we can find a Y new > 0 for the eigenvalue approximation such that the problem is feasible, but which will be a lower bound for the solution.

Competing interests

The authors declare that they have no competing interests. Author details

1 Centre for Wireless Communications, University of Oulu, P.O. Box 4500, Oulu 90014, Finland. 2University of Maryland, College Park, MD 20742, USA.

Received: 06 August 2013 Accepted: 03 March 2014 Published: 12 March 2014

References

1. FCC, Spectrum policy task force report. Tech. Rep. TR 02-155 (2002). http://www.fcc.gov/sptf/reports.html. Accessed 15 March 2013

2. J Mitola III, Cognitive radio: an integrated agent architecture for software defined radio. PhD thesis, Royal Institute ofTechnology, Sweden, 2000

3. S Haykin, Cognitive radio: brain-empowered wireless communications. IEEE J. Selected Areas Commun. 23(2), 201-220 (2005)

4. A Goldsmith, SA Jafar, I Maric, S Srinivasa, Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 97(5), 894-914 (2009)

5. SJ Kim, GB Giannakis, Optimal resource allocation for MIMO ad hoc cognitive radio networks, in Proceedings of the Annual Allerton Conference on Communications, Control, and Computing, 23-26 September 2008 (Monticello, IL, 2008), pp. 39-45

6. G Scutari, DP Palomar, S Barbarossa, Competitive optimization of cognitive radio MIMO systems via game theory, in Proceedings of the International Conference on Game Theory for Networks (Istanbul, Turkey, 2009), pp. 452-461

7. H Islam, YC Liang, A Hoang, Joint power control and beamforming for cognitive radio networks. IEEE Trans. Wireless Commun. 7(7), 2415-2419 (2008)

8. L Zhang, R Zhang, YC Liang, Y Xin, HV Poor, On Gaussian MIMO BC-MAC duality with multiple transmit covariance constraints. IEEE Trans. Inf. Theory 58(4), 2064-2078 (2012)

9. L Zhang, Y Xin, YC Liang, Weighted sum rate optimization for cognitive radio MIMO broadcast channels. IEEE Trans. Wireless Commun. 8(6), 2950-2959 (2009)

10. K Yang, Y Wu, J Huang, X Wang, S Verdu, Distributed robust optimization for communication networks, in Proceedings of the IEEE International Conference on Computer Communications, 15-17 April 2008 (Phoenix, AZ, 2008), pp. 1157-1165

11. M Shenouda, TN Davidson, On the design of linear transceivers for multiuser systems with channel uncertainty. IEEE J. Selected Areas Commun. 26(6), 1015-1024 (2008)

12. E Song, Q Shi, M Sanjabi, R Sun, ZQ Luo, Robust SINR-constrained MISO downlink beamforming: when is semidefinite programming relaxation tight?, in Proceedings of the IEEE International Conference on Acoustics,

Speech, and Signal Processing, 22-27 May 2011 (Prague, Czech Republic, 2011), pp. 3096-3099

13. SJ Kim, A Magnani, A Mutapcic, SP Boyd, ZQ Luo, Robust beamforming via worst-case SINR maximization. IEEE Trans. Signal Process. 56(4), 1539-1547 (2008)

14. RG Lorenz, SP Boyd, Robust minimum variance beamforming. IEEE Trans. Signal Process. 53(5), 1684-1696 (2005)

15. E Bjornson, G Zheng, M Bengtsson, B Ottersten, Robust monotonic optimization framework for Multicell MISO systems. IEEE Trans. Signal Process. 60(5), 2508-2523 (2012)

16. E Bjornson, E Jorswieck, Optimal resource allocation in coordinated multi-cell systems. Foundations Trends Commun. Inf. Theory 9(2-3), 111-381 (2013)

17. A Mutapcic, SJ Kim, S Boyd, ATractable Method for Robust Downlink Beamforming in Wireless Communications, in Proceedings of the Annual Asilomar Conference on Signals, Systems and Computers, 4-7 November 2007 (Pacific Grove, CA, 2007), pp. 1224-1228

18. C Shen, TH Chang, KY Wang, Z Qiu, CYChi, Distributed robust multicell coordinated beamforming with imperfect CSI: an ADMM Approach. IEEE Trans. Signal Process. 60(6), 2988-3003 (2012)

SAVorobyov, ABGershman, ZQ Luo, Robust adaptive beamforming using worst-case performance optimization: a solution to the signal mismatch problem. IEEE Trans. Signal Process. 51(2), 313-324 (2003) F Wang, W Wang, Robust beamforming and power control for multiuser cognitive radio network, in Proceedings oftheIEEEGlobal Telecommunication Conference, 6-10 December 2010 (Miami, FL, 2010), pp. 1-5

21. G Zheng, KKWong, B Ottersten, Robust cognitive beamforming with bounded channel uncertainties. IEEE Trans. Signal Process. 57(12), 4871-4881 (2009)

22. MF Hanif, PJ Smith, M Alouini, SINR balancing in the downlink of cognitive radio networks with imperfect channel knowledge, in Proceedings ofthe IEEE International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 9-11 June 2010 (Cannes, France, 2010), pp. 1-5

23. I Wajid, M Pesavento, YC Eldar, A Gershman, Robust downlink beamforming for cognitive radio networks, in Proceedings of the IEEE Global Telecommunication Conference, 6-10 December 2010 (Miami, FL, 2010), pp. 1-5

24. EA Gharavol, Y Liang, K Mouthaan, Robust linear transceiver design in MIMO ad hoc cognitive radio networks with imperfect channel state information. IEEE Trans. Wireless Commun. 10(5), 1448-1457 (2011)

25. Y Huang, Q Li, WK Ma, S Zhang, Robust multicast beamforming for spectrum sharing-based cognitive radios. IEEE Trans. Signal Process. 60, 527-533 (2012)

26. Y Zhang, ED Anese, GB Giannakis, Distributed optimal beamformers for cognitive radios robust to channel uncertainties. IEEE Trans. Signal Process. 60(12), 6495-6508 (2012)

27. L Zhang, YC Liang, YXin, HV Poor, Robust cognitive beamforming with partial channel state information. IEEE Trans. Wireless Commun. 8(8), 4143-4153 (2009)

28. G Zheng, S Ma, KKWong, TS Ng, Robust beamforming in cognitive radio. IEEE Trans. Wireless Commun. 9(2), 570-576 (2010)

29. ZQ Luo, WK Ma, AMC So, Y Ye, S Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20-34 (2010)

30. YJ Zhang, AMC So, Optimal spectrum sharing in MIMO cognitive radio networks via semidefinite programming. IEEE J. Selected Areas Commun. 29(2), 362-373 (2011)

31. S Boyd, L Vandenberghe, Convex Optimization. (Cambridge University Press, Cambridge, 2004)

32. UT Jonsson, A Lecture on the S-procedure (2001). http://www.math.kth. se/~ulfj/5B5746/Lecture.ps. Accessed 12 January 2013

33. CP Robert, Simulation of truncated normal variables. Springer J. Stat. Comput. 5(2), 121-125 (1995)

34. DJ Olive, Applied robust statistics. Preprint M-02-006 (2008). http:// lagrange.math.siu.edu/Olive/ol-bookp.htm. Accessed 1 March 2013

35. M Botros, TN Davidson, Convex conic formulations of robust downlink precoder designs with quality of service constraints. IEEE J. Selected Top. Signal Process. 1(4), 714-724 (2007)

36. I Polik, SeDuMi (2010). http://sedumi.ie.lehigh.edu/. Accessed 25 January 2013

KC Toh, MJ Todd, RH Tutuncu, SDPT3 - A Matlab software package for semidefinite programming, Version 1.3. Optimization Methods Softw. 11(1-4), 545-581 (1999)

CVX Research I, CVX: Matlab Software for Disciplined Convex Programming (2012). http://cvxr.com/cvx. Accessed 25 January 2013 CD Meyer, Matrix Analysis and Applied Linear Algebra. (Society for Industrial and Applied Mathematics, Philadelphia, PA, 2000)

doi:10.1186/1687-1499-2014-37

Cite this article as: Wijewardhana etal.: A robust beamformer design for underlay eognitive radio networks using worst ease optimization. EURASIP Journal on Wireless Communications and Networking 2014 2014:37.

Submit your manuscript to a SpringerOpen journal and benefit from:

7 Convenient online submission 7 Rigorous peer review 7 Immediate publication on acceptance 7 Open access: articles freely available online 7 High visibility within the field 7 Retaining the copyright to your article

Submit your next manuscript at 7 springeropen.com