 Research Article
 Open Access
Uplink User Signal Separation for OFDMABased Cognitive Radios
 MustafaE Şahin^{1}Email author,
 Ismail Guvenc^{2} and
 Hüseyin Arslan^{1}
https://doi.org/10.1155/2010/502369
© Mustafa E. Şahin et al. 2010
 Received: 9 May 2009
 Accepted: 21 October 2009
 Published: 13 December 2009
Abstract
Spectrum awareness of orthogonal frequency division multiple access (OFDMA) based cognitive radios (CRs) can be improved by enabling them to separate the primary user signals in the uplink (UL). Assuming availability of information about the basic parameters of the primary system as well as time synchronization to the first arriving user signal, two algorithms are proposed in this paper. The first one targets estimating the size of the frequency allocation block of the primary system. The performance of this algorithm is compared with the results of a Gaussian approximationbased approach that aims to determine the probability of correct block size estimation theoretically. The second one is a semiblind user separation algorithm, which estimates the carrier frequency offsets and time delays of each block by exploiting the crosscorrelations over pilot subcarriers. A twodimensional clustering method is then employed to group the estimates, where each group belongs to a different user. It is shown that the proposed algorithms can improve the spectrum opportunity detection of cognitive radios. Feasibility of the algorithms is proved through practical simulations.
Keywords
 Cognitive Radio
 Carrier Frequency Offset
 Orthogonal Frequency Division Multiple Access
 Resource Block
 OFDMA System
1. Introduction
Spectrum awareness is one of the fundamental features of cognitive radios (CRs) [1]. It has conventionally been considered a radio's being aware of the occupied and available frequency bands within its target spectrum [2]. It is achieved through spectrum sensing, where interference temperature is measured over the entire spectrum targeted, and the parts whose energy level exceeds a certain threshold are considered to be occupied [3, 4]. A different aspect was added to the spectrum awareness concept in [5] by attempting to characterize the source of the signal in the occupied spectrum. In this work, we propose to enhance the spectrum awareness by providing the cognitive radios with the capability of separating the primary user signals from each other in the uplink (UL). We consider orthogonal frequency division multiple access (OFDMA) based CR systems that coexist with a primary network that is also OFDMAbased. The proposed algorithm can be applicable to single carrierfrequency disivion multiple accessing (SCFDMA) based UL systems, as well, given that the resource blocks employed enable estimation of user specific parameters.
Due to the involvement of multiple user signals, the uplink of OFDMA systems poses a number of challenges that do not exist in the downlink (DL). Most of these problems including multiuser channel estimation [6], carrier frequency offset (CFO) estimation [7], synchronization and symbol timing estimation [8, 9], multiuser interference cancellation [10], and subcarrier and power allocation [11] are investigated extensively in the prior art. However, the problem of separating UL user signals without access to the subcarrier assignment scheme (SAS) has not been investigated in detail in the literature.
A practical cognitive radio application where user separation might be quite useful is a cochannel femtocell network coexisting with a macrocell network [12, 13], both of which have an OFDMAbased physical layer. If the coexistence is based on a shared spectrum approach where the femtocell utilizes the available parts of the macrocell spectrum in an opportunistic manner, user separation can be very beneficial to the femtocell. How the user separation and block size estimation algorithms proposed in this paper that might improve the spectrum opportunity detection for femtocells is explained in Section 5. Other possible applications regarding femtocellmacrocell coexistence are discussed in detail in [14].
User separation in ULOFDMA was considered in [15] for interleaved OFDMA systems. In [15], subcarriers allocated to different users follow a certain periodic structure, which leads to a userspecific CFO. Hence, by estimating the CFOs, different user signals are identified and separated. In this paper, however, we propose a semiblind user separation algorithm that can be applied to any SAS, which does not necessarily involve any periodicity. The user separation algorithm considered in this paper is based on exploiting the differences in user CFOs and delays. In the uplink of an OFDMA system, CFOs of users vary due to the differences in oscillator frequencies as well as the Doppler shifts caused by the different velocities of users. User delays, on the other hand, vary due to the different distances of users to the UL receiver.
In this paper, we assume time synchronization to the first arriving UL user signal as well as availability of information on the basic OFDMA system parameters such as FFT size, sampling time, and cyclic prefix (CP) duration. Considering scenarios where information about block dimensions is not available, a block size estimation algorithm is devised, which exploits the correlation between the pilot subcarriers within the same block. A Gaussian approximationbased approach is then introduced, which tries to determine the potential performance of the block size estimation algorithm theoretically.
The organization of the paper is as follows. Section 2 provides the ULOFDMA system model. In Section 3, the block size estimation method is presented, and a Gaussian approximation approach to block size estimation is given. In Section 4, a mathematical model of the proposed user separation algorithm is provided. In Section 5, the potential contribution of block size estimation and user separation algorithms to spectrum opportunity detection of cognitive radios is explained. Simulation results are presented in Section 6, and Section 7 concludes the paper.
2. ULOFDMA System Model
Consider an OFDMA system with users in the uplink. The sampled time domain signal at the transmitter of user can be written as
where is the total transmitted energy per symbol for user , is the FFT size, is the set of subcarriers with elements assigned to user out of used subcarriers, is the subcarrier index, is the length of the cyclic prefix, and is the data on the th subcarrier of th user.
A received symbol of user after the FFT operation can be written as
where is the carrier frequency offset (normalized by the subcarrier spacing , where is the sampling frequency), is the sampling clock error, is the timing offset of user , is the random phase noise caused by the instability of user 's oscillator, is the frequency selective channel of user , is the intercarrier interference (ICI) of user , and is complex additive white Gaussian noise (AWGN). In the remainder of this paper, it will be assumed that the random phase noise as well as the sampling clock error in (2) are negligible.
From (2), it is seen that the CFO has two effects on the received signal. First, it results in amplitude degradation and a constant phase shift, and second, in ICI. Another effect, which becomes apparent when the phases of identical pilot subcarriers in two adjacent symbols are compared [16], is a phase shift that changes linearly over symbols. Taking this linear phase shift into account, the received signal over multiple symbols can be modeled as
where is the symbol index.
3. Block Size Estimation
If the coexistence of the primary network and the cognitive radio is cooperative (which might be the case, e.g., in a cognitive femtocell deployment where both the macrocell and femtocells are operated by the same service provider), then the primary network might provide information about its fundamental parameters such as , , and to the cognitive radio. Although the CR might get informed about the dimensions of , as well, it is possible that the CR has to determine the block size blindly.
 (i)
The pilot subcarriers are at the corners of the resource blocks, for example, as in the PUSC mode of WiMAX standard. Note that extensions to other pilot structures may also be possible after certain modifications.
 (ii)
In the transmitter, the (BPSK modulated) pilot subcarriers within the same resource block are assigned the same value.
Although the second condition causes some slight increase in the peaktoaverage power ratio (PAPR) of the UL signal, this increase is tolerable especially in a cooperative coexistence scenario, where the primary network is willing to facilitate cognitive communications.
The pilots in each are correlated with each other, whereas the data subcarriers are uncorrelated. Also, there is not a considerable correlation between the pilots in different s since each is assigned a random BPSK value for its pilots. The dimensions of can be determined by exploiting the correlation between the pilots within the s.
The vertical dimension of can be found by performing autocorrelation over an entire symbol (vertical correlation), where it is assumed that the orientation of subcarriers versus symbols is as depicted in Figure 2. Without taking the effects of delays and CFOs into consideration, we define the absolute value of the vertical correlation as
where is the lag index, denotes the expectation operation, is the separation between the pilots in the same symbol of , is the average subcarrier power, and is the noise power. Note that the expectation is performed over all subcarriers, and the term is the ratio of the number of pilot pairs in a symbol (number of s) to the number of occupied subcarriers .
In a similar manner, the horizontal dimension of can be obtained via an autocorrelation over rows (horizontal correlation), where a row is the set of subcarriers at the same subcarrier index . The absolute value of the horizontal correlation is given by
where is the separation between the pilots in the same row of . The expectation is performed over all symbols involved in the correlation, and the term is the ratio of the number of pilot pairs (number of s) to the number of nonempty subcarriers in a row.
In both vertical and horizontal correlations, the desired peak is the one that is strongest after the peak at the origin. In order to accentuate the desired peak, noise averaging is performed by averaging over all symbols available and by averaging over rows. The desired peak in the vertical correlation is expected to appear at the th lag yielding the vertical dimension of as +1. Similarly, the horizontal dimension is obtained from the horizontal correlation as +1.
3.1. Gaussian Approximation for Block Size Estimation
In both vertical and horizontal correlations performed for block size estimation, each of the samples in the output of the correlation can be approximated using Gaussian approximation (GA). Ignoring the sample at the zeroth lag, all of the correlation samples have a zero mean except the sample at the desired peak location. Therefore, the problem of detecting a peak at the correlator output can actually be considered as finding a variable with a nonzero mean within a group of zeromean variables.
Let and denote the mean and the standard deviation of a correlation value at the th lag, respectively. If denotes the lag corresponding to the peak of the correlation outputs, then we have , and is equal to zero otherwise. Taking into account that the peak detection is performed after absolute value operation, the probability density function of can be written as
In order for to have the largest amplitude, all other samples at the other correlation lags need to have absolute values that are smaller than . This has a probability of , where is the halflength of the correlator output excluding the sample at the zeroth lag. Therefore, the total probability of detection of peak of the correlation output can be obtained by the following equation:
Performing (7) for both horizontal and vertical correlations yields the probabilities of detecting the corresponding peaks. Denoting these two probabilities as and , the probability of detecting the block size correctly is simply equal to .
Note that (7) is an approximation due to two primary reasons. First, as discussed before, noisecrossnoise terms in the pilot correlations are approximated using a GA. Secondly, all of the correlation samples are assumed to be uncorrelated random variables, which is not true in practice. The existence of delays introduces correlation between subcarriers in the same symbol, and the CFOs result in correlation between subcarriers in adjacent symbols. Despite these factors, it will be shown in Section 6 that the approximation yields relatively close results to the simulation results, especially when the block size is estimated over large number of symbols.
4. User Separation Method
The proposed user separation method is based on exploiting the differences in the 's and 's of different ULOFDMA users. The first step of the method is to determine the occupied 's via energy detection. Then, for each occupied , the UL receiver performs and estimation. Next, occupied 's are clustered according to their and values, where each separate cluster yields the 's that belong to a certain user. This way, , which is an estimate for , is obtained for each user .
The total energy of each block can be calculated as follows:
This energy value is averaged over the subcarriers within the block and inputted to an energy detector that employs a threshold as follows:
where hypothesis implies that block is occupied, and hypothesis implies that it is not. Details of energy detection in OFDMAUL, such as optimizing , can be found in [17]. Let denote the set of all the occupied 's that satisfy the hypothesis in (9). Then, for each within , carrier frequency offset and delay estimations are performed.
Regarding the CFO estimation, an important observation from (3) is that the linear phase shift caused by the CFO affects both the desired signal and ICI the same way. Therefore, a reliable estimate can be obtained by correlating two identical pilot symbols [16] or pilot subcarriers in different symbols as illustrated in Figure 2. If denotes the indices of symbols (within the th block) that carry pilot subcarriers and denotes the subcarrier indices of pilots in symbol within , a estimate for , which will be denoted as , can be obtained by performing pairwise correlation between in different symbols within , separated by symbols. Ignoring the ICI and noise terms, this correlation would be as follows:
where symbol is within . can then be obtained as
where
The timing offset causes a phase shift that changes linearly over the subcarriers but is independent from the symbol index. If denotes indices of rows with pilots within , a estimate for , which will be denoted as , can be obtained by correlating pilots at different rows separated by subcarriers (illustrated in Figure 2) as
where subcarrier is within . The estimate for is obtained as follows:
where
As seen from (10), an important condition necessary for to be reliable is that the channel can be considered constant during symbols. Taking the WiMAX standard as a reference, Table 2 [18] provides information about channel coherence times for two different frequency bands. Given that the WiMAX symbol duration is around 0.1 ms, the channel coherence time covers up to 20 symbols even at a speed of 100 km/h in the 5.8 GHz band. Similarly, for any typical OFDMAbased standard, it can be expected that this channel constancy condition is met.
Equation (13) also introduces a similar requirement in the frequency dimension. A reliable can only be obtained if for pilots separated by subcarriers are highly correlated. Although this condition is met for any in a single tap channel, in a frequency selective channel, is typically taken as a small number (e.g., in the WiMAX ULPUSC system is defined as 3).
Once 's and 's are obtained for all elements of , the user separation algorithm requires that 's be clustered according to their 's and 's, taking both values into account simultaneously. Each separate cluster generated by the clustering algorithm corresponds to a different user and yields its subcarrier allocation vector estimate .
The clustering method first yields an estimate for the number of users ( ), which is determined by finding the cluster centers through the subtractive clustering algorithm outlined in [19, 20]. A critical input required by the subtractive clustering algorithm is the ratio of dimensions of the potential clusters, which will be denoted as and . In the next step, utilizing , the separation is performed via iterative partitioning algorithm discussed in [21, 22]. Iterative partitioning splits the input data into initial clusters. Then, for each cluster, it computes the sum of absolute distances from each point in the cluster to the cluster centroid, where the centroid is the component wise median of the points in the cluster. By minimizing the total of these sums in an iterative manner, the clusters are determined.
Prior to applying the clustering method, the sets of 's and 's, which will be denoted as and , respectively, need to be normalized. The normalization is mandated by the fact that the range of numerical values for is wider than the range of 's by at least two orders of magnitude. In fact, clustering without normalization results in a user separation that is solely based on values. In particular, we apply the following normalizations:
A second point related to the subtractive clustering algorithm is that it requires to optimize the ratio of cluster dimensions for the best performance. This ratio ( ) is proportional to the ratio of variances of and , that is, , which are related to each other as follows:
where and denote the sets of all 's and 's, respectively. The input of the subtractive clustering algorithm is set as . From (18), it is seen that the wider the range of values that can take, the smaller is the dimension of the clusters (the same analogy applies dimension, as well). Moreover, (18) also indicates that can be found before performing clustering by simply calculating the ratio of to . An important assumption regarding (18) is that the and values of different users are uniformly spread within and , respectively.
Simulation parameters.
Parameter  Value 

FFT Size  512 
Occupied subcarriers  360 
, CP duration  1/8, 11.2 
Number of users  10 
Sampling frequency  5.714 MHz 
Symbol Time  100.8 
Bandwidth  5 MHz 
CFOs (in Hz) 

User distances (in m) 

RTDs (in samples) 

Typical Doppler spreads and coherence times for WiMAX.
Carrier Freq  Speed  Max. doppler  Coherence time 

2.5 GHz  2 km/h  4.6 Hz  200 ms 
2.5 GHz  45 km/h  104.2 Hz  10 ms 
2.5 GHz  100 km/h  231.5 Hz  4 ms 
5.8 GHz  2 km/h  10.7 Hz  93 ms 
5.8 GHz  45 km/h  241.7 Hz  4 ms 
5.8 GHz  100 km/h  537 Hz  2 ms 
5. Using Block Size Estimation and User Separation in Spectrum Opportunity Detection
Opportunistic spectrum usage is one of the main goals of a cognitive radio. It requires that the CR reliably determine the temporarily empty parts of the spectrum of a primary network and utilize them without causing any interference to the primary network. In this section, we propose techniques that make use of the user separation and block size estimation methods proposed in the previous sections in order to improve the opportunity detection performance.
In an OFDMAbased primary network, the spectrum opportunities correspond to the unused subcarriers within the spectrum. A simple method that might be employed for the detection of these opportunities by the cognitive radios is energy detection, where, the unused subcarriers may be simply identified through hytpothesis test as follows:
Note that similar to (9), hypothesis implies that a subcarrier is occupied, and hypothesis implies that it is not. However, with subcarrierbased opportunity detection as in (19), each of the individual subcarriers is subject to false alarms and misdetections. As an alternative, if the resource block size is perfectly known, the opportunities within the spectrum of a primary system can be determined via tilebased energy detection using (9). Since all the subcarriers within the same tile should all be affiliated with the same hypothesis (i.e., all subcarriers should be occupied, or all subcarriers should be nonoccupied), probability of misdetections and probability of falsealarms will be minimized compared to the subcarrierbased detection. If the resource block size is not known, on the other hand, block size detection algorithm as in Section 3 can be utilized to estimate the resource block dimensions and improve the opportunity detection performance with respect to the subcarrierbased detection.
 (i)
, that is, the delay estimates for tile are smaller than .
 (ii)
, that is, different delay estimates for the same resource block have a considerably large difference.
 (iii)
, that is, the absolute value of the CFO estimate for tile is larger than the maximum possible CFO value.
 (iv)
, that is, different CFO estimates for the same resource block have a considerably large difference.
As will be shown in Section 6, the performance of user separationbased opportunity detection can be improved using the above tests that pose some constraints on the occupied resource blocks.
6. Simulation Results
Computer simulations were performed in order to determine the success rate in blind block size estimation, to test the performance of the proposed user separation algorithm, and to determine the opportunity detection performance using various methods. In the simulations, the basic system parameters are set according to the WiMAX ULPUSC standard, and both an AWGN channel and a 6tap multipath channel (ITUR Vehicular A) are employed. Detailed simulation parameters are provided in Table 1, where RTD stands for the roundtripdelay.
6.1. Block Size Estimation Simulations
6.2. User Separation Simulations
Performance of the proposed user separation algorithm was tested via simulations using the following performance metrics.
Performance in finding the number of users is given as
Performance in finding the user subcarriers is given as
User separation performances when received powers depend on user distances.
AWGN  MP  







6.3. Opportunity Detection Simulations
In Figure 9, the error probabilities for four different methods are shown for an optimum ( ) and for a nonoptimum ( ) normalized threshold value, where the block size of the primary system is . The methods that are employed are subcarrier based, user separation based, tile based with known tile size, and tile based with estimated tile size. It is observed that the subcarrierbased method yields the worst performance, while the tilebased method performs the best. Therefore, if the tile size is not known, instead of employing the subcarrierbased method, first the proposed tile size estimation can be performed and then the tilebased detection method can be applied. Given that the proposed tile size estimation for this small block size is very accurate, this way, the detection performance can be made as good as in the known tile size case. User separationbased method is seen to introduce some errors and to degrade the performance when the threshold is optimum. If the optimum threshold is not available and an intuitive value such as 0.5 is employed, however, then the user separationbased method improves the performance.
Error probability curves obtained for a block size of are demonstrated in Figure 10. Being different from the case, for a block, the block size estimation method does not perform very well. Therefore, the subcarrierbased detection method is superior to the tilebased method with tile size estimation. It is noteworthy that the user separationbased method is slightly superior to the tilebased method for both optimum and nonoptimum thresholds.
7. Concluding Remarks
In order to increase the spectrum awareness of OFDMAbased cognitive radios, separation of primary user signals in the uplink is proposed. An algorithm is devised for determining the frequency allocation block dimensions blindly. The probability of finding the block size correctly is obtained through a Gaussian approximationbased approach, and it is compared with the simulated performance of the devised algorithm. Moreover, a user separation method is proposed, and a rather high performance is obtained in practical computer simulations proving its feasibility. Spectrum opportunity detection is highlighted as a potential application area where the proposed methods might be considerably useful. The improvement in opportunity detection performance of cognitive radios is quantified through simulations and shown to be significant.
Declarations
Acknowledgments
The authors would like to thank Dr. MooRyong Jeong and Dr. Fujio Watanabe of DOCOMO Communications Labs, USA, for their helpful inputs. This paper was presented in part at the IEEE Vehicular Technology Conference (VTC2009 Spring), Barcelona, Spain, April 2009.
Authors’ Affiliations
References
 Mangold S, Zhong Z, Hiertz GR, Walke B: IEEE 802.11e/802.11k wireless LAN: spectrum awareness for distributed resource sharing. Wireless Communications and Mobile Computing 2004, 4(8):881902. 10.1002/wcm.261View ArticleGoogle Scholar
 Sai Shankar N, Cordeiro C, Challapali K: Spectrum agile radios: utilization and sensing architectures. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 160169.Google Scholar
 Haykin S: Cognitive radio: brainempowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201220.View ArticleGoogle Scholar
 Akyildiz IF, Lee WY, Vuran MC, Mohanty S: NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 2006, 50(13):21272159. 10.1016/j.comnet.2006.05.001View ArticleMATHGoogle Scholar
 Yucek T, Arslan H: Spectrum characterization for opportunistic cognitive radio systems. Proceedings of IEEE Military Communications Conference (MILCOM '06), October 2006, Washington, DC, USA 16.Google Scholar
 Pun MO, Morelli M, Kuo CCJ: Maximumlikelihood synchronization and channel estimation for OFDMA uplink transmissions. IEEE Transactions on Communications 2006, 54(4):726736.View ArticleGoogle Scholar
 Cao Z, Tureli U, Yao YD: Deterministic multiuser carrierfrequency offset estimation for interleaved OFDMA uplink. IEEE Transactions on Communications 2004, 52(9):15851594. 10.1109/TCOMM.2004.833183View ArticleGoogle Scholar
 van de Beek JJ, Sandell M, Börjesson PO: ML estimation of time and frequency offset in OFDM systems. IEEE Transactions on Signal Processing 1997, 45(7):18001805. 10.1109/78.599949View ArticleMATHGoogle Scholar
 Morelli M: Timing and frequency synchronization for the uplink of an OFDMA system. IEEE Transactions on Communications 2004, 52(2):296306. 10.1109/TCOMM.2003.822699View ArticleGoogle Scholar
 Fantacci R, Marabissi D, Papini S: Multiuser interference cancellation receivers for OFDMA uplink communications with carrier frequency offset. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '04), November 2004, Dallas, Tex, USA 5: 28082812.View ArticleGoogle Scholar
 Kim K, Han Y, Kim SL: Joint subcarrier and power allocation in uplink OFDMA systems. IEEE Communications Letters 2005, 9(6):526528. 10.1109/LCOMM.2005.1437359MathSciNetView ArticleGoogle Scholar
 Chandrasekhar V, Andrews JG, Gatherer A: Femtocell networks: a survey. IEEE Communications Magazine 2008, 46(9):5967.View ArticleGoogle Scholar
 Claussen H: Performance of macro and cochannel femtocells in a hierarchical cell structure. Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece 15.Google Scholar
 Şahin ME, Guvenc I, Jeong MR, Arslan H: User separation for OFDMA uplink. Proceedings of IEEE Vehicular Technology Conference (VTC '09), April 2009, Barcelona, SpainGoogle Scholar
 Cao Z, Tureli U, Yao YD: User separation and frequencytime synchronization for the uplink of interleaved OFDMA. Proceedings of Conference Record of the Asilomar Conference on Signals, Systems and Computers, November 2002, Pacific Grove, Calif, USA 2: 18421846.Google Scholar
 Moose PH: A technique for orthogonal frequency division multiplexing frequency offset correction. IEEE Transactions on Communications 1994, 42(10):29082914. 10.1109/26.328961View ArticleGoogle Scholar
 Şahin ME, Guvenc I, Jeong MR, Arslan H: Opportunity detection for OFDMA systems with timing misalignment. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), NovemberDecember 2008, New Orleans, La, USA 39133918.Google Scholar
 Andrews JG, Ghosh A, Muhamed R: Fundamentals of WiMAX: Understanding Broadband Wireless Networking. PrenticeHall, Englewood Cliffs, NJ, USA; 2007.Google Scholar
 Chiu S: Fuzzy model identification based on cluster estimation. Journal of Intelligent and Fuzzy Systems 1994, 2(3):267278.Google Scholar
 Yager R, Filev D: Generation of fuzzy rules by mountain clustering. Journal of Intelligent and Fuzzy Systems 1994, 2(3):209219.Google Scholar
 Seber G: Multivariate Observations. John Wiley & Sons, New York, NY, USA; 1984.View ArticleMATHGoogle Scholar
 Spath H: Cluster Dissection and Analysis: Theory, FORTRAN Programs, Examples. Horwood, New York, NY, USA; Halsted Press, Chichester, UK; 1985.MATHGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.