invited paper practicalissuesforspectrum managementwith ... · of the available spectrum. cognitive...

23
INVITED PAPER Practical Issues for Spectrum Management With Cognitive Radios This paper discusses some of the practical spectrum management issues that impact the adoption of cognitive radio technology. By Stephen M. Dudley, Member IEEE , William Christopher Headley , Marc Lichtman, Student Member IEEE , Eyosias Yoseph Imana , Xiaofu Ma, Student Member IEEE , Mahi Abdelbar , Aditya Padaki, Student Member IEEE , Abid Ullah, Munawwar M. Sohul , Taeyoung Yang, Member IEEE , and Jeffrey H. Reed, Fellow IEEE ABSTRACT | The policy of permanently assigning a frequency band to a single application has led to extremely low utilization of the available spectrum. Cognitive radio, with its ability to be both intelligent and frequency agile, is thought to be one of the prime contenders to provide the necessary capabilities needed for dynamic spectrum access systems. With this in mind, this paper discusses the practical issues inherent to the deployment of spectrum management systems utilizing cognitive radios. KEYWORDS | Cognitive radio; communication system security; intelligent systems; radio spectrum management; wireless communication; wireless networks Nomenclature 3G Third generation (cellular). 3GPP Third-Generation Partnership Project (cellular). 4G Fourth generation (cellular). AMT Aeronautical Mobile Telemetry. ADC Analog-to-digital convertor. ASA Authorized shared access. AWGN Additive white Gaussian noise. BRAN Broadband radio access network. CDBS Consolidated database system (FCC). CEPT Conference of Postal and Telecommunications Administrations (European). CR Cognitive radio. DAC Digital-to-analog convertor. DSA Dynamic spectrum access. EC European Commission. ETSI European Telecommunications Standards Institute. EU European Union. FBI Federal Bureau of Investigation (the United States). FCC Federal Communications Commission. FSMS Federal Spectrum Management System. GAA General authorized access. GHz Gigahertz. GPS Global Positioning System. HF High frequency. IA Incumbent access. IETF Internet Engineering Task Force. ISM Industrial, scientific, and medical. LDA Linear discriminant analysis (machine learning). LSA Licensed shared access. LTE Long-term evolution (cellular). MAC Media-access control. MBAN Medical body area network. MEMS Microelectromechanical systems. Manuscript received September 30, 2013; accepted December 23, 2013. Date of publication February 4, 2014; date of current version February 14, 2014. This work was supported in part by the National Science Foundation (NSF) Enhancing Access to the Radio Spectrum (EARS) Program under Projects 1343222 and 1247928, and by the TWC under Project 1228902. The authors are with the Electrical and Computer Engineering Department, Virginia Polytechnic Institute and State University, Blacksburg, VA 24061-1019 USA (e-mail: [email protected]). Digital Object Identifier: 10.1109/JPROC.2014.2298437 0018-9219 Ó 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 242 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Upload: others

Post on 18-Apr-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

INV ITEDP A P E R

Practical Issues for SpectrumManagement WithCognitive RadiosThis paper discusses some of the practical spectrum management issues

that impact the adoption of cognitive radio technology.

By Stephen M. Dudley, Member IEEE, William Christopher Headley,

Marc Lichtman, Student Member IEEE, Eyosias Yoseph Imana,

Xiaofu Ma, Student Member IEEE, Mahi Abdelbar, Aditya Padaki, Student Member IEEE,

Abid Ullah, Munawwar M. Sohul, Taeyoung Yang, Member IEEE, and

Jeffrey H. Reed, Fellow IEEE

ABSTRACT | The policy of permanently assigning a frequency

band to a single application has led to extremely low utilization

of the available spectrum. Cognitive radio, with its ability to be

both intelligent and frequency agile, is thought to be one of the

prime contenders to provide the necessary capabilities needed

for dynamic spectrum access systems. With this in mind, this

paper discusses the practical issues inherent to the deployment

of spectrum management systems utilizing cognitive radios.

KEYWORDS | Cognitive radio; communication system security;

intelligent systems; radio spectrum management; wireless

communication; wireless networks

Nomenclature

3G Third generation (cellular).

3GPP Third-Generation Partnership Project (cellular).

4G Fourth generation (cellular).

AMT Aeronautical Mobile Telemetry.ADC Analog-to-digital convertor.

ASA Authorized shared access.

AWGN Additive white Gaussian noise.

BRAN Broadband radio access network.CDBS Consolidated database system (FCC).

CEPT Conference of Postal and Telecommunications

Administrations (European).

CR Cognitive radio.

DAC Digital-to-analog convertor.

DSA Dynamic spectrum access.

EC European Commission.

ETSI European Telecommunications StandardsInstitute.

EU European Union.

FBI Federal Bureau of Investigation (the United

States).

FCC Federal Communications Commission.

FSMS Federal Spectrum Management System.

GAA General authorized access.

GHz Gigahertz.GPS Global Positioning System.

HF High frequency.

IA Incumbent access.

IETF Internet Engineering Task Force.

ISM Industrial, scientific, and medical.

LDA Linear discriminant analysis (machine learning).

LSA Licensed shared access.

LTE Long-term evolution (cellular).MAC Media-access control.

MBAN Medical body area network.

MEMS Microelectromechanical systems.

Manuscript received September 30, 2013; accepted December 23, 2013. Date of

publication February 4, 2014; date of current version February 14, 2014. This work

was supported in part by the National Science Foundation (NSF) Enhancing Access

to the Radio Spectrum (EARS) Program under Projects 1343222 and 1247928, and by

the TWC under Project 1228902.

The authors are with the Electrical and Computer Engineering Department,

Virginia Polytechnic Institute and State University, Blacksburg, VA 24061-1019 USA

(e-mail: [email protected]).

Digital Object Identifier: 10.1109/JPROC.2014.2298437

0018-9219 � 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

242 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 2: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

MHz Megahertz.Mil STD Military standard.

MIMO Multiple-input–multiple-output (antenna).

NIST National Institute of Standards (the United

States).

NPRM Notice of Proposed Rule Making (FCC).

NTIA National Telecommunications and Information

Administration.

OFDM Orthogonal frequency-division multiplexing.PA Priority access.

PAWS Protocol to Access White Space (IETF).

PCA Principle components analysis (machine

learning).

PCAST President’s Council of Advisors on Science and

Technology (the United States).

PHY Physical layer.

PUE Primary user emulation.REM Radio environment map.

RF Radio frequency.

RFIC Radio-frequency integrated circuit.

SAW Surface-acoustic wave.

SDR Software-defined radio.

SNR Signal-to-noise ratio.

SON Self-organizing networks (cellular).

TDM Time-division multiplexing.TV Television.

VoIP Voice-over-Internet Protocol.

Wi-Fi Wireless fidelity (IEEE 802.11).

WiMAX Worldwide interoperability for microwave

access.

WRAN Wireless regional area network.

I . INTRODUCTION

Some predict that demand for cellular spectrum could see

a 1000� rise over 3G demand [1]. Notwithstanding the

move to smaller cells and off-loading to Wi-Fi, not enough

spectrum appears to be available to meet this demand. Part

of the ‘‘spectrum scarcity’’ problem is that the regulatory

approach to spectrum allocation is extremely inefficient,

resulting in spectrum being allocated but unused, or usedonly occasionally, in many areas [2], [3].

A major factor driving us toward new spectrum-sharing

models is that the electromagnetic spectrum has been

shown to be a catalyst for economic development [4].

Eager to further spur their economies, nations are

competing for leadership in technologies that allow for

spectrum sharing [5]–[8]. CRs, which are capable of DSA,

have been claimed by proponents in the European Unionand the United States as the most effective solution to the

spectral congestion problem. CRs can be a critical

technology to spur positive change in the current

regulatory policies (see [2], [9]–[11], and article 4.1 of

[12]). Recently, there have been several efforts to

incorporate CR and DSA technologies into the develop-

ment of standards for a wide variety of applications (see

Table 1). While spectrum sharing is not new (e.g.,Automatic Link establishment), the use of CR technologies

may make it easier to develop and deploy systems that

share spectrum.

In some ways, DSA is a radical change from fixed

spectrum assignment. A change like this will not happen

overnight, nor will it happen through technology advance-

ment alone. Given these facts, this paper looks at some of

the practical issues in the deployment of DSA using CRs.

A. Paper OutlineThis paper is divided into six sections. Section II

provides some background information about new licens-

ing models currently being debated within regulatory

agencies, and an overview of a recently completed DSA

standardVIEEE 802.22. Section III considers spectrum

Table 1 Applications of DSA Technologies

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 243

Page 3: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

management systems, and the various architectures that

have been suggested for providing legacy user protection.Section IV looks at how individual radio nodes achieve

frequency agility, and the issues that are faced in designing

systems with these capabilities. Section V provides a brief

excursion into machine learning techniques. Section VI

considers oversight and regulatory issues. Section VII

concludes with a discussion of the implications on future

standards of the topics considered in the paper.

II . BACKGROUND

One of the implications of dynamic spectrum sharing is the

need for new licensing models. Both the European Union

and the United States are taking steps to update their

regulatory processes to include new forms of licensing,

with commercial interests providing input [24]. In the areathat has been explored the longest, TV white space, the

IEEE 802.22 standard has been created.

A. Licensing ModelsThe U.S. PCAST issued a report on July 20, 2012,

relating to spectrum allocation [2]. Some of the high level

points made in that report are shown in Fig. 1 and are

addressed in this section. The report recommended athree-tiered Federal Spectrum Access System that involves

classifying users into one of the following categories: 1) IA;

2) secondary access; and 3) GAA.

The incumbent users (also know as primary users)

would receive protection from interference from all other

types of access. Secondary access users would be issued

short-term priority operating rights in a specific geograph-

ical area, but must vacate the band when an incumbent is

present.The report noted that receiver performance can limit

efficient use of the spectrum and recommended the

management of receivers as well as transmitters. Declar-

ing a receiver’s tolerance for interfering signals makes it

easier to manage spectrum decisions when new entrants

arrive.

It was also recommended that the model for spectrum

allocation be changed from the current ‘‘semipermanentassignment’’ system to a more flexible system that adds

short-term and medium-term licenses. Medium-term

licenses are envisioned to be three or fewer years and

have no automatic rights of renewal. This scheme would

allow firms to experiment with networks and business

models. It would also provide assurance to government

agencies that may need additional spectrum in the near

future. A short-term license, on the other hand, involves afixed set of standards, terms, and conditions, so as to

accelerate the agreement process. The idea of a short-term

license is new, and the meaning of ‘‘short term’’ will likely

be shaped by the market over time. An example short-term

license might be renting spectrum over the course of a few

days when the Super Bowl is in a city in order to provide

adequate cellular service. The addition of medium-term

and short-term licensing will likely spur new and innovatewireless applications.

ASA is an alternative spectrum-sharing structure that

involves two tiers. ASA started as a joint project by seven

companies (Digital Europe, Ericsson, Huawei, Intel,

Nokia, NSN, and Qualcomm) in order to promote the

use of unused spectrum in Europe through DSA and CR

Fig. 1. Licensing models [2], [24].

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

244 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 4: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

technology [12]. The ASA concept has been named LSA bythe Radio Spectrum Policy Group within the European

Union. LSA seeks to grant shared access licenses to operate

on bands that have been licensed to other users [12]. One

operator can pay another operator for a certain amount of

bandwidth, at a certain quality of service. This type of

system uses the idea of a licensed secondary user, in which

the secondary user has rights to the spectrum in locations

(be it time, frequency, and/or geography) where theprimary user is not present. A licensed primary and

secondary user can be thought of as two licensed primary

users, where one has priority over the other. Having

licenses for shared access allows operators to predict the

quality of service.

The U.S. FCC is evaluating schemes for DSA [25]. The

NPRM for the 3.5-GHz band echoes the PCAST three-

tiered structure [8]. The NPRM describes IA in the 3.5-GHzband as belonging to authorized federal users and grand-

fathered fixed satellite services. The second tier is the PA,

which includes users with a definite need for guaranteed

access to broadband spectrum at specific facilities such as

hospitals, utilities, government installation, and public safety

entities. Tier three is theGAA, for opportunistic use on

noninterfering bases in specified geographical areas.

The European Commission is also taking spectrum-sharing initiatives. The Radio Spectrum Policy Group, an

advisory group that assists the European Commission,

released a report that explores dynamic spectrum-sharing

approaches and the identification of higher frequency

bands that could be candidates for shared spectrum [12].

Similar to PCAST, this report proposes multiple modes of

spectrum sharing in order to remain flexible. The

European Commission’s proposal differs from PCAST’s inthat Europe is targeting all spectrum with its sharing

initiative, while the United States is so far primarily

interested in sharing of TV white space and spectrum

currently allocated for government use [12].

B. IEEE 802.22 Wide-Area Regional NetworkIEEE 802.22 is a standard for WRANs using the TV

white space [26]. The primary application of thistechnology is providing wireless broadband access to rural

homes. Using DSA techniques, IEEE 802.22 allows the

sharing of spectrum allocated to TV broadcasters, as well

as other incumbents such as wireless microphone systems.

IEEE 802.22 uses a point-to-multipoint wireless access

system (similar to cellular), formed by a base station and

connected users. Spectrum sensing data are fused with

occupancy data retrieved from a database service and usedby the base station to determine which channels are

available for operation. As such, each base station must

include a GPS receiver for geolocation. To deal with low-

power incumbents (e.g., wireless microphones), the IEEE

802.22.1 amendment was created to describe a beacon

signal that can be transmitted in order to indicate the

incumbent’s presence. In IEEE 802.22, the spectrum

manager acts as the cognitive engine inside each base

station, and is responsible for tasks such as maintaining

spectrum availability information, channel selection and

management, scheduling spectrum sensing, enforcing

regulatory policies, and allowing self-coexistence. Fig. 2

shows the logical interfaces of the IEEE 802.22 spectrum

manager.The standard’s PHY implementation, which is OFDM

based, can support a cell radius up to 30 km. To support

multiple IEEE 802.22 cells in close proximity, self-

coexistence procedures are defined. The IEEE working

group for IEEE 802.22 was formed in 2004, and the first

standard was published in July 2011. As of the writing of

this paper, FCC rules require each spectrum manager to

check the FCC database daily, but no rules have yet to beestablished to cover sensing applications (e.g., detecting

wireless microphones operating in the same band, for

example).

C. IEEE 802.15.4j Medical Body Area NetworkCurrent MBAN solutions are mostly deployed in the

2.4-GHz ISM band. Since the ISM band is becoming

more and more crowded, interference could limit large-

scale deployment of MBAN applications. In the United

States, the FCC recently allocated the 2360–2400-MHz

spectrum for MBAN use on a secondary basis, sharing thespectrum of aeronautical mobile telemetry. The IEEE

802.15 Task Group 4j (TG 4j) has been developing an

amendment to the IEEE 802.15.4 standard to extend its

PHY and MAC layer solutions to the MBAN spectrum.

DSA protocols play an important role in allowing

MBAN operations since aeronautical mobile telemetry

devices are mostly receive-only. To avoid requiring explicit

coordination between primary and secondary users on acase-by-case basis, a beacon signal, called a hub, is placed

near the patient, and low-power transmitters on the body

can transmit only when they receive the beacon. The hub

gets its authority to transmit from a key that it receives as

part of the general coordination process that grants

spectrum access to the medical facility. For its part, the

FCC decided not to require all users to apply for

Fig. 2. IEEE 802.22 system functions [26].

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 245

Page 5: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

authorization. MBAN users operate on a secondary user

basis, meaning they must not cause harmful interference

and they must accept all interference from incumbents.

III . SYSTEMS FOR SPECTRUMMANAGEMENT

Fig. 3 provides a pictorial overview of the spectrum

management system assumed in this paper.Introduction of CRs into spectrum sharing and

spectrum management opens up many avenues for

efficient system design. It also introduces new challenges,

some of which will be discussed in this section. As shown

in the figure, this paper assumes that CRs have frequency

agility and spectrum sensing capabilities. The location of

cognitive engines and knowledge bases typically depends

on the nature of the spectrum management system.This paper assumes a classification of spectrum

management systems into the categories of supervised

systems and unsupervised systems. For details, see Table 2.

(Note that other taxonomies exist [27].)

A. Legacy Protection and Commercial ViabilityWithout protection for legacy users, spectrum sharing

will never be allowed by regulatory authorities. This makeslegacy assurance the most important practical issue for

DSA. The nature of the incumbent user and the potential

secondary user significantly affects willingness of the

incumbent user to enter into a sharing relationship.

Research has not yet provided a reliable mechanism to

gauge the level of protection that each type of DSA system

can provide. This is still a very new field, and it is

impossible, simply by doing thought experiments or

running simulations, to know what real problems will

come up when systems are actually deployed.

Given that DSA is not just a single system, but rather a

general philosophy for many different kinds of systems,there are many cases for which metrics need to be

identified, as well as decisions made about mechanisms to

gauge effectiveness of legacy protection. What we have

seen so far is willingness of some users (e.g., AMT) to

allow sharing with some organizations (e.g., the medical

community) to allow a specific application (e.g., MBAN)

Fig. 3. Example spectrum management system.

Table 2 Spectrum Management System Types

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

246 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 6: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

where the primary user has a relatively straightforwardmechanism to identify and hold the organization account-

able (e.g., allow only one user, or conform to a

coordination process). It is unclear how long it will take

to reach the point where all spectrum can be accessed by

any user simply by petitioning the spectrum management

system and complying with its rules. It should be expected

that there will be many trials of different types of spectrum

management systems, with different kinds of primary andsecondary users, before confidence in such systems will

reach that tipping point.

B. Choosing the Right ArchitectureChoosing the right architecture is both a function of

the technical characteristics of the system, and the

political realities of the parties involved. The question of

tangible benefits to primary users has directed some of thediscussion about regulatory policy and the types of

cooperation that can be achieved [28]. If the primary

user has no mechanism to benefit from sharing spectrum,

then cooperation is unlikely. For example, a system that

incorporates spectrum trading may not be viable if the

primary user is a federal organization that is forbidden by

law from receiving compensation for spectrum.

The ‘‘right’’ architecture is still being debated in bothresearch and commercial communities. For many incum-

bents, even if they are using spectrum inefficiently, they

see huge risks in admitting secondary users. Although early

research favored unsupervised systems using a pure

sensing-based approach, the failure to provide solid

guarantees of protection led to a shift toward researching

centrally supervised systems and databases. Research into

decentralized approaches is just beginning [29]. Researchis ongoing with all three types (unsupervised, centrally

supervised, and distributed supervision). Whether there

will be many flavors of systems, each tailored to a specific

circumstance, or whether there will be adrift toward a

general strategy for all DSA systems is not clear at this

point.

An unsupervised approach does not suffer issues with

latency in decision making, and is relatively low cost.However, selfish optimization without the knowledge of

the network can result in low overall spectrum efficiency.

In addition, there are types of primary users for which this

type of system would be unsuitable. Given these facts, the

design of algorithms for these systems also includes the

study of game theory, in which games are devised that

attempt to provide minimum performance guarantees

[30], [31].Decentralized supervision uses network information

from neighbors to make better decisions than could be made

if restricted to its own sensors and data (see Section III-C). Of

the three general approaches, it is the one most suited for

implementation with CRs since it requires collaboration to

achieve its goals. However, as noted in [32], a decentralized

approach may not achieve the global optimum solution if it is

not omniscient. A research direction for decentralizedapproaches is the utilization of distributed databases to

create more reliable REMs [29].

Centrally supervised architectures are commonly

touted as most easily accommodating legacy assurance.

This is due to the fact that they can be made to comply with

arbitrary policies or levels of security and do not require

radios to have a high degree of cognitive capabilities (yet

can accommodate those that do). However, there is asignificant tradeoff between complexity, cost, and latency.

Design approaches for these kinds of systems are still in

their infancy. IEEE 802.22 is an example of a centrally

supervised system, as would be systems that involve the

sharing of spectrum with cellular service providers (e.g., a

proposal for allowing cellular providers to use naval radar

spectrum at inland locations).

Whether systems are unsupervised, have distributedsupervision, or are centrally supervised, there may be a

need for sensing. Likewise, there may be a role for the use

of databases to maintain information about the environ-

ment. That information could be static (e.g., TV station

locations) or dynamic (e.g., sensing of wireless micro-

phone usage). Issues with sensing and databases will be

discussed in subsequent sections.

C. Collaborative Sensing IssuesCollaborative sensing is one of the solutions proposed

for several sensing problems: sensing accuracy, spectrum

coverage, processing complexity, and energy efficiency

[33]–[38]. The intelligent combining of the spectrum

sensing data and/or decisions from multiple CRs can

improve the sensing accuracy (with respect to the

probability of detection and false alarm) while potentiallylowering the sensing requirements of all of the CRs in the

group (with respect to sensing time, sensing approach, and

energy usage) [38], [39].

Issues faced by collaborative sensing systems are the

overhead that collaboration creates, the management of

sensors (sensor clustering), fusion of data from sensors,

and distributed spectrum search. Each will be considered

in subsequent sections.

1) Overhead: There are two main approaches to

collaborative spectrum sensing: centralized approaches

[40] and distributed approaches [41]. In centralized

approaches, the cooperating CRs send their spectrum

sensing information to a data fusion center. The data

fusion center then makes global spectrum decisions for all

of the cooperating CRs. In distributed approaches, each CRmakes its own sensing decisions based on sensing

information from cooperating radios. In each of these

approaches, there is a natural tradeoff between the per-

formance benefits gained from collaboration and the

amount of overhead required [42]. This overhead takes the

form of information that must be passed among the CRs

(in distributed approaches) or to a data fusion center (in

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 247

Page 7: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

centralized approaches), thus increasing network trafficand energy needs.

In the literature [38], [43], it is typically assumed that

the collaboration channels (channels by which the

cooperating CRs communicate with the fusion center

and/or each other) are ideal. An issue not typically

considered in the literature that needs additional research

is the impact of nonideal channels [44], [45].

2) Appropriate Clustering of Sensors: It is known that

there are diminishing returns on the performance gains

that can be achieved through collaboration as the number

of collaborating CRs increases. Therefore, when develop-

ing collaborative approaches to spectrum sensing, it is

important to consider how best to cluster the CRs to

achieve adequate performance gains while keeping energy

needs reasonable. In other words, determining what is theappropriate way to group CRs together for the best

cooperation results [46]–[48].

3) Fusion of Potentially Diverse Sensing Data: There is a

natural tradeoff between collaborative sensing perfor-

mance and overhead between using hard and soft

decisions. Hard decisions, in which each CR sends a

distinct, or ‘‘hard,’’ decision to the fusion center, will tendto lower overhead with respect to data transmissions in the

cooperation channels. However, there is a fundamental

performance loss that will occur as a result of losing some

of the detailed sensing information [43].

On the other hand, soft decisions provide more of the

detailed sensing information to the fusion center, leading

to more intelligent cooperative spectrum sensing decisions

to be made. Naturally, each CR sending more detailedspectrum sensing information will lead to an increase in

data transmission overhead. Additionally, soft decisions

are more prone to errors caused by nonideal collaboration

channels [49].

In an attempt to balance these tradeoffs between hard

and soft decisions, so-called softened hard, or hybrid,

decisions have been proposed for data fusion; see, for

example, [50]. These approaches can provide lower overheadthan purely soft decisions, while improving upon the sensing

performance with respect to purely hard decisions.

Another critically important practical issue with

collaborative data fusion deals with the consideration of

nonidentical, or heterogeneous, CR sensing capabilities

when performing collaboration. In the literature [49], the

majority of works on collaborative spectrum sensing

assume that the sensors have identical sensing capabilitiesand/or sensing channels. For example, they typically

assume each sensor uses the same sensing approach

(cyclostationarity, likelihood-based, cumulants, etc.) or is

impacted by the same type of channel.

4) Distributed Spectrum Search: Sharing between local

databases has been proposed as an enabling approach for

spectrum search in the wide spectrum bands [51]. Theissue is that understanding the entire radio environment is

a challenging task for a single node. Distributing the task of

spectrum search among multiple nodes reduces the impact

to each individual node.

Conducting a spectrum search can be a multilayer

process [52]. A receiver can be dedicated to scanning the

spectrum, and the results maintained in a database. In

addition, some MAC protocols have a learning feature thatcan characterize availability of channels based on past

decisions [52], [53]. Optimizing the placement of learning

processes, and the use of databases and cognitive engines

to exploit this information, is an ongoing research area.

D. Database ReliabilityInformation reliability is critical for database systems.

As an example, geolocation databases are envisioned tomaintain data about primary user locations and their

operation parameters (e.g., transmit power, antenna

parameters, protection contours, and operational periods)

[54]–[57]. Spectrum availability is calculated based on

these parameters [58]. Unreliable data would lead to

allocation of spectrum bands that are already in use by

primary users.

Given that the spectrum management system isdatabase driven, primary user data are acquired by

database administrators from regulatory databases (e.g.,

the FCC CDBS [59]) and potentially through web

registration methods. The database administrators [56],

[57] and regulators (e.g., FCC, NTIA, and CEPT) must

ensure that primary user registration and update mechan-

isms provide complete and accurate data. The reliability of

database information is a subject of research [60]. Metricsare being devised to measure that reliability. These include

utility, objectivity, and integrity of data. Utility is the

usefulness of information to its intended user. Objectivity

is the presentation of information in an accurate, clear,

complete, and unbiased manner. Integrity is the protection

of information from unauthorized access or revision in

order to ensure information is not compromised through

corruption or falsification.The IETF PAWS outlines secondary user device

registration to a database, as well as spectrum requests

and database responses [61]. The protocol also provides

certain security measures for protection against PUE

attacks, spoofing the database, modifying or jamming a

query request/response, and tracking the white space

device location and identity. Significant effort is being

applied to improve the reliability of primary user’sspectrum usage data in the regulatory spectrum licensing

databases [59], [62].

Conventional data reliability methods cannot address

the problem of primary user parameter inference through

normal secondary user database queries [63], [64]. For

example, is it necessary to prevent a secondary user from

inferring the presence or capabilities of another user (say

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

248 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 8: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

radar, or FBI communications)? These techniques createprimary user privacy concerns in spectrum-sharing data-

bases, some of which will be addressed in Section VI-D.

Research is still needed in the area of primary user

operational privacy concerns within spectrum management

systems.

The database enabled spectrum sharing will be divided

into categories of federal and nonfederal spectrum users.

The NTIA FSMS will maintain operational data aboutfederal primary users like radar systems, government

agencies, etc., and the FCC CDBS will maintain data about

nonfederal spectrum users like TV stations, satellite

systems, cellular systems, etc. NTIA will make available

bits and pieces of spectrum that is not used by federal

systems in frequency, space, and time to the geolocation

database manager for secondary use. This categorization of

spectrum users will address the concerns of the federalagencies whose operational privacy is one of the major

hurdles holding back the federal government from opening

up some of its spectrum for sharing with commercial

systems.

E. System/Network LatencyLatency in system interactions is a practical issue facing

developers of spectrum management systems. As with anycontrol system, the latency of the decision cycle can affect

system stability, as well as limit the maximum number of

clients supported. The system can have two kinds of

latencies. The first relates to how long it takes to establish

an initial security and trust association. The second relates

to how long it takes to query the database/server and

receive a response. If the system is expected to provide

guarantees of maximum latency in order to respond toevents when all the nodes need to (re)register with a

database at once, designing the servers can become an

economic issue involving both sizing of the server

infrastructure and the transport network. Although there

is no strict need for research into better strategies to

implement the network pieces of the system (since such

network design techniques are well known), choosing the

best strategy requires careful engineering, and may benefitfrom future research in the area of forming security and

trust relations.

IV. THE RADIO

A. Cognitive RadioFor the purposes of this paper, a CR is defined as a

radio that has sensing capabilities, frequency agility, and is

operating in a spectrum management system under

cognitive control. A practical CR measures the state of

the spectrum using a locally implemented spectrum sensor

and/or by probing a network level database. The assump-

tion in this section is that CRs have a sensing receiver. If

there are quiet periods in the operation, a CR can use its

main receiver as a sensing receiver so a secondary receivechain is not always required. It is also noted that since the

purpose of this receiver is detection of a signal, not

decoding of the message, that processing gains can

sometimes be achieved.

B. Radio ComplexityImplementing DSA techniques in the radio, as

discussed in this section, has an impact on radio cost.One aspect of this cost is software. DSA applications often

need the ability to be reconfigured in real time. Although

software techniques to do this are well known, real-time

configuration software is more difficult to write. This

comes partly from the challenges imposed by software

validation and general testing, partly from the need to

address new security issues, and partly from the large

number of use cases inherent to DSA.DSA strategies within the radio also have to compete

directly with simple packaging exercises that place

multiple RF chains in a single device such as is currently

done for smartphones that operate with 3G, 4G, LTE,

Bluetooth, and Wi-Fi. In the sections that follow will be a

brief discussion of hardware issues. This includes:

achieving frequency flexibility in the RF chain, searching

the spectrum for primary users, tradeoffs related tospectrum sensing, and the availability of propagation

models for higher frequencies.

C. Achieving Frequency FlexibilityCRs need to be operational over multiple frequency

bands. Using a sufficiently selective flexible RF removes

the need for high-performance ADCs and DACs in CRs.

Frequency flexibility can be achieved through the follow-ing: wideband tunable oscillators, wideband antennas, and

wideband tunable filters in transmitters and receivers (see

Fig. 4 and discussion below).

1) Tunable Oscillators: RFICs with wide tuning range

have already been reported and are available in the market

[65]. However, oscillator noise is still a problem that needs

more research.

2) Wideband Antennas and RF Amplifiers: There is a

fundamental limit theory addressing the well-known

tradeoff between antenna size and achievable instanta-

neous gain bandwidth for transmit antennas [66]–[69].

For receive antennas different limits apply. The funda-

mental limit of receiver antenna size is related to SNR

bandwidth and the noise figure of the antenna [70]. Noiseand selectivity of RF front–ends are dominant factors

causing practical spectrum sensing issues in the receiver.

Mitigation of coupling effects between small form-

factor MIMO systems remains a challenge. However,

ultrawideband electrically small antenna designs covering

3.1–10.6-GHz band have been extensively investigated in

the literature (see [71] and [72] among others), and

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 249

Page 9: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

commercial off-the-shelf products are available in the

market. Practical issues for designing receive antennas

come from performing tradeoffs between selectivity and

sensitivity of the RF front–end as opposed to being unable

to design wideband antennas.

Superwideband low-noise amplifiers and mixers with

good linearity performance, as well as wideband power

amplifiers with good linearity and efficiency performance,have been proposed [73], [74]. However, a similar level of

progress has not been achieved in RF filtering. The

problem of RF filtering is a major challenge for making CR

a reality [75]. This is mainly because of the technical

tradeoffs between high selectivity and broad tuning range

in RF filters.

3) RF Bandpass Filters in Receivers: Pre-selector(bandpass) filters are often placed at the input of the

main receiver and the sensing receiver. The pre-selector

filters attempt to maximally reject all undesired adjacent

channel signals with minimal effect on the desired signal.

Without pre-selector filters, an excess amount of undesired

signal enters the receiver and distorts the desired signal.

This degrades both the quality of the signal for demodu-

lation purposes and for spectrum sensing purposes.The selectivity specification of the pre-selector filter

can be very stringent when adjacent channels are very

close to the desired frequency band. The selectivity

specification can be even more challenging in full duplex

systems where the full transmit power may appear on the

receive antenna. Noise generated by a wideband transmit

power amplifier, as well as leakage from the transmitted

signal, can easily degrade the sensitivity of the receivers.Therefore, selectivity of wideband tunable RF filters in

DSA capable receivers must be comparable to fixed

frequency RF filters found in devices such as cell phones.

There are two traditional approaches to construct

frequency flexible RF filters in receivers, multiband filters

and tunable filters. A nontraditional approach is relaxing

the selectivity specifications of the filters.

• Multiband filters (using multiple frequency-

dedicated filters): A major challenge with this

strategy is the insertion loss of the switchingnetwork (which affects the SNR), and the physical

size of each filter. Miniaturization of surface

acoustic wave and bulk acoustic wave filter tech-

nologies is addressing the latter problem. For

example, some commercial smartphones support

a dozen frequency bands on a single device using

very small fixed filters. However, as the number of

required frequency bands increases, managingthem becomes more costly, and at some point

becomes impractically large.

• Tunable filter: RF filter implementation technol-

ogies such as SAW-based devices and ceramics are

not suitable for making tunable filters. For this

reason, different technologies such as semicon-

ductor varactors, ferroelectric materials, and

MEMS are used to make tunable filters. However,flexible RF filter technologies provide significantly

inferior selectivity performance compared to fixed

RF filters [76].

• Relaxing selectivity specification: When RF filters

cannot be sufficiently selective, approaches that

relax the selectivity specifications can be consid-

ered. For example, designing the network to be

half-duplex significantly relaxes the selectivityspecifications of the RF filters. In [77], Marshall

proposed a network level technique in which

Fig. 4. Achieving frequency selectivity over a wideband.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

250 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 10: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

transmission frequencies are selected such that theexpected nonlinearity distortion in the receiver is

minimized. Marshall showed that this technique

has the potential of significantly relaxing the

selectivity and linearity specifications of the

receiver.

Incorporating cognitive control of receiver parameters,

such as sampling frequency and local oscillator frequency

of the receiver, relative to the state of the spectrum, hasbeen proposed. This technique potentially relaxes the

selectivity and linearity specifications of the receiver since

it avoids worst case situations that may be a lot worse than

the expected cases. Techniques to reconstruct the effects

of RF front–end nonlinearity in wideband spectrum

sensing have also been proposed that would allow

mitigation to be applied, thus further reducing the worst

case nonlinearity.1

4) RF Bandpass Filters in Transmitters: For efficient

spectrum sharing, each transmitter needs to emit the

desired signal with minimal interference on other

frequency bands. Undesired transmissions can originate

from harmonics, spectral sidelobes due to discontinuities

in the pulsing of the signal, and spectral regrowth due to

power amplifier nonlinearity.The same mitigation strategies for receivers (multiband

filters or tunable filters) can be used to eliminate

transmissions outside the desired band. Because harmo-

nics are relatively far off in frequency, the specification of

the transmitter’s RF filter is not as strict as that of the

receiver. Tunable filters are not mature enough for RF

filtering in the transmitter.

In terms of relaxing the need for tight filter specifica-tions, the transmitter can also implement one or more of

the following: digital pulse-shaping filters to reduce

spectral sidelobes, backoff in the power amplifier to

reduce spectral regrowth, and implementing half-duplex

(e.g., time-division duplex) versus full duplex systems.

D. Spectrum SearchFast and reliable spectrum search is an important

aspect of white space characterization. One way to detect

available white space is to test for primary users operating

within the communication range of a secondary user.Searching for primary users over a wideband spectrum

sensing allows nodes to search for primary user signals in a

wide spectrum band [78].

Initial approaches to wideband spectrum sensing used

multiresolution spectrum radios based on wavelet trans-

form [79] and fast Fourier transform processors [80]. The

idea is to estimate the power spectral density of the

wideband signal using an RF front–end with a widebandarchitecture. Most of the existing literature on wideband

sensing focuses on improving the detection reliability [81]of the primary user signal.

A significant practical issue is the time it takes for

reliable detection. A common research goal is to speed up

the channel search process by designing a sensing policy

that identifies the desired signals quickly. In [82], random

and serial search mechanisms are proposed for indepen-

dent and correlated channel occupancies. The perfor-

mance of these search schemes is compared in terms of themean time to detect the primary user signal. In [83] and

[84], a two-stage channel search is proposed to reduce the

average channel search time by focusing on frequency

channels which are more likely to be vacant. These

approaches perform better than conventional methods

when the spectrum is crowded. In [85], a wideband

channel clustering scheme is proposed to cluster users

with smaller bandwidth requirements in order to avoidunnecessary blockage to users with larger bandwidth

requirements.

E. Sensing Constraints and TradeoffsAt the expense of implementation complexity, multi-

layer and clustering-based channel search can be used to

reduce the average channel search time by giving unequal

focus on different channels based on a priori information[83], [84]. The secondary user applies single-channel

sensing on each individual channel to determine if it is

vacant. Practical issues involved in single-channel sensing

are discussed below.

1) Time Constraints: There are two types of CR

architectures typically discussed that are relevant to

spectrum sensing, single-receiver designs, and dual-receiver designs [86]. In single-receiver designs, spectrum

sensing must be accomplished during the so-called ‘‘quiet

times’’ when data transmission is idle. This architecture

inherently requires a time slot for sensing and a time slot

for data transmission. In dual-receiver designs, these quiet

times are only necessary when sensing must be performed

on the band being used for data transmission. The

necessity of quiet times to perform spectrum sensingleads to a tradeoff between spectrum sensing accuracy and

data throughput [87].

Detrimental channel effects, such as shadowing and

multipath, determine how long spectrum sensing decisions

will remain relevant (due to Doppler spread and channel

coherence effects, for example), thus dictating the needed

update rate. For example, spectrum sensing in mobile

applications, where the wireless channel is changingrapidly, requires much faster sensing capabilities than

static or slowly varying channels.

In many cases, the specific spectrum management

application will provide constraints upon the availability

and length of quiet times. For example, in IEEE 802.22, it

is specified that the maximum time it should take to detect

licensed primary users within a given channel, during

1This technique is developed at Wireless@Virginia Tech. Papersdescribing the technique were recently submitted for publication.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 251

Page 11: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

normal operation, should be much less than 2 s, under theconstraints of over 90% probability of incumbent detection

and a false alarm rate of less than 10% [26]. In more

unpredictable and critical spectrum-sharing applications,

where a variety of wireless devices and wireless commu-

nication standards are simultaneously in operation (such

as in hospital environments), the sensing time and update

rate need to be much faster [88].

2) Performance Tradeoffs: There are a large number of

spectrum sensing algorithms to choose from. In general,

low complexity spectrum sensing algorithms (e.g., energy

detection [89] and eigenvalue decomposition [90]) per-

form poorly in bad channel conditions, but may be the only

choice given receivers with low processing power. The

setting of detection thresholds for these cases is still a

highly researched topic [91], [92]. On the other hand,more accurate and highly complex algorithms (e.g.,

cyclostationarity detection [93], [94], wavelet approaches

[95], and cumulants [96]) provide more information about

the signal than mere detection. These algorithms typically

require some sort of pattern recognition approach in order

to perform decision making, leading to additional

complexity and overhead. For more in-depth details of

different spectrum sensing algorithms and their associatedtradeoffs, the reader is referred to [31], [33], [34], [86],

and [97]–[99].

When performing spectrum sensing, the performance

of the sensing algorithm improves as the observation time

of the signal of interest increases. This tradeoff between

performance and observation interval is typically referred

to as processing gain. In DSA applications, the optimum

point is dictated by the tolerance of the primary spectrumuser to interference. In other words, the time required to

sense the primary user and vacate its spectrum is a

deciding factor for system viability.

3) Environmental Constraints: An important practical

issue to consider when choosing a spectrum sensing

algorithm is the sensing channel. Although AWGN and

flat-fading assumptions are sufficient under some condi-tions (e.g., in sparsely cluttered line-of-sight environ-

ments), they do not suit more general wireless operating

environments, where multipath and frequency-selective

fading effects may be prominent. As a means of dealing

with these issues, MIMO systems have been discussed as a

possible solution [100], [101]. Exploiting resolvable

multipath with modified spectrum sensing algorithms

such as modified energy detectors and equal gain detectioncan actually improve the detection performance. However,

these approaches introduce their own practical issues (i.e.,

interantenna spacing to guarantee independency of signal

streams).

Another issue that has a severe effect on sensing

reliability is the hidden node problem [86]. If the DSA

transceiver is unable to detect the primary user, either

because of physical location, severe multipath fading, orshadowing, this will cause unwanted interference to the

primary user. Cooperative sensing is proposed in the

literature for handling this kind of practical issue [102].

F. Need for New Propagation ModelsPropagation models are crucial for spectrum manage-

ment systems to ascertain the spectral reuse factor and to

obtain interference maps. Ample propagation models areavailable at conventional frequency bands, typically up to

3 GHz. However, propagation models and vector channel

models for frequencies greater than 3 GHz is an area that

is still developing. Several attempts have been made by

researchers to obtain the propagation model with the

popularization of the WiMAX standard. However, there is

an ample scope for developing better propagation models.

A propagation model specifically designed for the3.5-GHz range is the Stanford University Interim model

formulated for the IEEE 802.16 working group [103]. The

ECC-33 model was a new propagation model developed by

fitting the Okumura data, and works similar to the popular

Cost Hata 231 model. The WINNER project has developed

channel models, which are classified as 3GPP spatial

channel models for MIMO [104]. However, they are

geometry-based channel models and not specific to 3.5 GHzor small cells. Phase 2 of the project included several

system level simulation studies and presented an in-depth

study of outdoor-to-indoor communication channels [105].

Not all of these models are specific to high-frequency

channels being considered for commercial use on a sharing

basis. At present, the Stanford University Interim or

ECC-33 models provide reasonable fits, but not good

enough to ensure an adequate quality of service. Moreover,exhaustive building penetration studies and vector channel

models for MIMO systems need to be carried out for

successful system implementations at these frequencies.

One intriguing idea suggested by Ronan Farrell is the

use of CRs to improve models by comparing what the

model predicts with what the radio is actually seeing. In

essence, this is a call for a longitudinal study of radio

models, looking for inferences about when or where themodels do not match actual conditions.

G. Decision Reliability in a DSA EnvironmentTraditionally, propagation models (sensing papers)

have only concerned themselves with the channel between

the primary user transmitter and the sensor. From this

channel model, they determine a probability of detection

and probability of false alarm of the primary user. MichaelMarcus has proposed that this view be amended to include

all three channels between the primary user transmitter,

secondary user, and primary user receivers [106]. The

reasoning behind this is that there may be correlation

between two or more of the channels. This makes it more

difficult to answer the question of how likely it is that the

failure to detect a primary user signal down to some

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

252 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 12: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

arbitrary level (say �120 dBm) means that the secondaryusers’ transmission will be below some threshold (say

�80 dBm) by the time it reaches any primary user.

V. COGNITIVE ENGINES

Cognitive engines are implied for spectrum management

systems that employ CRs. Cognitive engines may exist

either in the radio (for unsupervised systems or distributed

supervision systems) or in designated servers somewhere

in the network. Cognitive engines are based on either

machine learning or optimization techniques, and themost common techniques are listed in Table 3. The tasks

that cognitive engines are assigned include achieving

situation awareness, parameter adaption, and pattern

recognition. Each of these tasks, and issues that they

engender, will be considered in this section.

A. Achieving Situation AwarenessAs shown in Fig. 5, situation awareness is the first step

in the cognitive cycle. A given situation can be described

by the environment, user’s needs, or any other observable

problem. The goal of situation awareness is to use previous

knowledge that was gathered in the past under the same,or similar, situations for decision making purposes.

Therefore, a major component in situation awareness is

the ability to classify current situations in order to see if itis similar to one or more previous situations.

The use of situational awareness leads to a cognitive

engine that has a case-based reasoning component to it.

This type of cognitive engine uses optimization augmented

by learning. For example, a cognitive engine may use a

genetic algorithm for optimization and a neural network to

perform situation classification, but a case-based reasoner

to store what it has learned. The result is a radio that cansave time and/or reach better solutions by leveraging

previously gathered knowledge. A practical issue

concerning case-based reasoning is the amount of memory

required to hold previous cases, actions, and results.

Solutions include forgetting the oldest case (treating it like

a first-in–first-out buffer) and eliminating cases that had

poor results when compared to similar cases [108].

B. Choosing Utility Functions forParameter Adaption

In CR applications, prior knowledge of a given situationis typically in the form of optimization results; in other

words, identifying the best set of knobs (adjustable

parameters) for a given situation. The best set of knobs

can then be immediately used by the radio, or can act as a

seed for additional optimization [108]. Table 4 lists

common knobs and meters in CR applications.

When performing these multiobjective optimizations, a

utility function must be chosen. When multiple factors areinvolved, the typical strategy is to turn the problem into a

single objective optimization by assigning weights to each

of the factors. Although there are numerous optimization

algorithms available, genetic algorithms have gained wide

use in CR applications [108], [111].

Commonly used utility functions include weighted

sum, exponential, and constant elasticity of substitution

[108]. The weights in the chosen utility function aretypically chosen manually, based on the importance of

each objective for the given application. Unfortunately, the

importance of each objective is not always clear.

Additional complexity may be added when the weights of

each objective change based on the situation. For example,

when sending VoIP data, the system will have strict latency

requirements but may not require high throughput.

Conversely, for streaming video or large file transfer,throughput may be an issue, and not latency. For a survey

on intelligence in CR parameter adaption, we refer the

reader to [111].

C. Choosing Features for Pattern RecognitionPatterns in the spectrum access of incumbents,

opportunistic users, or malicious users can be used to

improve situation awareness, leading to improved com-

munications and threat avoidance. For example, an

opportunistic user in another channel could use incum-

bent patterns to predict where the next channel is likely to

Table 3 Cognition Toolbox

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 253

Page 13: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

be available, in the event that it has to immediately

evacuate the current channel.

Pattern recognition can often be formulated as amachine learning classification problem, using algorithms

such as k-nearest neighbors, support vector machines, or

neural networks [112]. When developing a pattern

recognition system, one practical issue is choosing the

appropriate set of features. Another is having enough

training data to represent real-world conditions.

In any pattern recognition algorithm, there is the risk

of using too many features. For example, in signalclassification, one might take into account a signal’s

modulation scheme, bandwidth, received power, center

frequency, etc. If the goal is to classify incumbent signals,

then all of these features may not be required as inputs to

the classifier. In machine learning and statistics, the

process of dimensionality reduction is used to reduce the

number of random variables, or features, under consider-

ation. The goal of dimensionality reduction is to find asubset of the original features that provides equal or

similar performance. A linear combination of two or more

features may also be used (this can be thought of as

merging features prior to classification).

Dimensionality reduction is rarely performed in real

time. Instead, it is used during the design of the classifier,

in order to reduce the number of features the classifiermust process. By reducing the number of features, the

computational complexity of training and using the

classifier is reduced, and less system memory is required.

In order to perform dimensionality reduction during the

design process, a large and realistic set of training data

must be obtained. If the training data do not reflect real-

world conditions, then an important feature may be

unknowingly removed from the set and the accuracy ofdecision making degraded.

Dimensionality reduction is a well-researched area of

statistics and machine learning. Common procedures

include PCA [113] and LDA [114]. When the training data

set is small (which often occurs in CR), PCA can outperform

LDA [115]. For a tutorial on PCA, we refer the reader to [113].

D. Self-Organizing NetworksOne of the strategies for dealing with spectrum

congestion for LTE deployments is to move toward a

heterogeneous network (Het-Net) of small cells and

macrocells. This results in a large number of network

elements with complex interactions among them. Manag-

ing the complexity of manual approaches to managing the

radio access network leads to SONs [116], [117]. Three

focus areas exist within this umbrella: self-configuration,self-optimization, and self-healing. Self-configuration is

needed to reduce the costs of installing new nodes and

managing larger network structures such as domains. Self-

optimization is needed given that channel conditions and

connectivity situations are different over geography and

time. Self-healing is needed to control network manage-

ment costs [117]–[121].

Table 4 Common Knobs and Meters in CR

Fig. 5. Cognitive cycle [108].

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

254 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 14: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

The concepts associated with CR are suited for the taskof implementing SONs. SON typically applies to the

automatic configuration and optimization of LTE base

stations. Therefore, the SON algorithms could be im-

plemented on the base stations themselves or on a

centralized server that communicates with the base

stations. For example, when a new base station is added,

surrounding base stations could automatically reconfigure

their emission power and antenna tilt using optimizationtechniques.

Implementing SON has its own practical issues. One of

the practical issues in SON implementations is reliability

in a multivendor scenario [122]. Another issue is resolving

goals. Nine use cases have been identified for SON. The

goals of energy savings, load balancing, coverage, and

interference mitigation are conflicting. Research is begin-

ning to identify algorithms that allow an operator tochoose the desired behavior (see, for example, [123] for a

discussion of load balancing and handover tradeoffs and

[124] for node optimization interactions).

VI. OVERSIGHT

A. SecuritySecurity has typically not been an issue on the critical

path leading to deployment. More often, it is considered as

a postdeployment mitigation process. However, most of

the bands available for spectrum sharing are controlled by

Federal or civilian agencies (defense, aeronautical, mari-

time, public safety, etc.) whose mission cannot afford to be

compromised. It should be expected that all reasonable

security threats and mitigation approaches be identifiedbefore sharing will be allowed. What follows are some

threats that must be considered for DSA (individual

approaches may also incur other threats).

1) Primary User Emulation: PUE involves an adversary or

malicious node emulating the signal of the incumbent in a

given band, so that the opportunistic users will evacuate

the channel(s) [125]. A greedy node may perform PUE inorder to improve its own throughput, or an adversary may

perform the attack with the goal of causing denial of

service. Thus, PUE threatens the objectives of availability

and access control.

PUE detection strategies can be split up into location

based and nonlocation based [126]. Location-based strat-

egies involve knowing the location of all primary users, and

using some metric to estimate location at each radio.Nonlocation-based strategies assume either that the

adversary is moving, or that the adversary is much closer

than the primary user, or that the primary user has a digital

signature incorporated into its signal [127]. In many

dynamic spectrum applications, these assumptions will not

be valid, thus the PUE attack is a practical issue that needs

additional research. Fig. 6 illustrates the PUE attack and

the spectrum sensing data falsification attack, which is

described in the following section.

2) Spectrum Sensing Data Falsification: In any DSA

application that involves sharing sensing data between

nodes, an attack known as spectrum sensing data

falsification is possible. The decision engine in CRs relies

heavily on valid spectrum occupancy information. Whenthis information is fused between nodes, the spectrum

sensing data falsification attack involves injecting false

sensing information [126]. This could be done by a greedy

node who wants to improve its own throughput, a

malicious node causing denial of service, or even a

malfunctioning node that is unintentionally sending wrong

information (e.g., broken hardware).

Most proposed detection strategies involve building atrust or reputation value for each node based on past

reports, in which outliers are used to indicate a possible

lack of trust [126]. The ability for a radio to identify

malicious or malfunctioning entities is a practical issue in

dynamic spectrum sharing, and these detection strategies

should be considered during the design process.

3) Cognitive Control Channel Attack: DSA protocols oftenhave a common control channel used to share information,

which could be corrupted by jamming or by packet

flooding. Avoiding such points of failure is a practical issue

in the design of DSA systems. One research direction is the

use of a rendezvous strategy instead of a statically allocated

common control channel [129].

4) SDR Hacking: Policies used in DSA will likely evolveover time, and CRs need a way to adjust to policies that are

created after the design process. If nodes are designed to

be updated remotely through the Internet, then there are

clear hacking vulnerabilities. Furthermore, if users have

Fig. 6. Security threats associated with dynamic spectrum

sharing [128].

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 255

Page 15: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

control over software on their own radios, then they mayeither deliberately or inadvertently disable policies

intended to protect incumbent users. It may even be

possible for an adversary to hack radios and turn them into

hostile jammers. Research into secure downloading

systems for firmware or policy updates is, therefore,

needed.

B. Industry and Government RegulationThe issue of standardization occurs at multiple levels,

and several of these levels will be addressed here. There is

a clear need to standardize the expression of capabilities

and needs. This shows up both in the form of device

classifications and in dealing with policies. There is also a

need to minimize the amount of information that needs to

be transmitted in order to convey meaning. Additionally,

there is a need for standardization of metrics to facilitateinteroperability and regulation. Each of these will be

considered.

1) Device Classification and Certification: There are, as of

yet, a relatively small number of devices capable of

supporting DSA. From a search of the FCC database [130],

only 336 approvals for SDR capable devices were given

between 2005 and 2012 (compared to a total of �16 000approvals per year for all radio devices).

It is likely that new classifications will be required, but

the fear that the approval process may be a bottleneck is

likely more perceived than real. Organizations like the

FCC maintain a knowledge base that contains guidance for

cases that come up between rule making events (for

example, see [131]). The European Union maintains a set

of what are called harmonized standards (see [132] and[133]). When new cases come up, there is a process to

provide a notified body of opinion from a certification lab.

Each has mechanisms for dealing with the kinds of changes

envisioned.

Receiver performance characteristics play a crucial role

in spectral efficiency and quality of service. Receiver

characterization has traditionally not been considered in

spectrum management processes in favor of a system basedon characterizing only the transmitters. However, DSA

creates new situations, such as spectrum placement of new

users adjacent to incumbent users.

A literature survey reveals that most studies related to

this have been carried out by regulatory and government

bodies (FCC, Ofcom, etc.). One of the initial studies into

receiver performance standards was carried out in [134]. A

detailed analysis and methodology of receiver perfor-mance, and the relevant influencing factors, has been

presented in [135].

The U.K. Office of Communications has reported the

various receiver characteristics specific to several receiver

architectures in [136]. The PCAST report [2] also gives a

brief description about receiver regulations and the

specific receiver characteristics needed to aid in better

spectrum management. In a recent report by the U.S.Government Accountability Office [137], a survey of the

receiver performance, and their impact on spectrum, has

been described. The Receivers and Spectrum Working

Group of the FCC has reported elaborate means to describe

the interference limits, and the means to incorporate them

as a policy, in [138].

A final issue with regard to certification is the question

of how and when certification is required. The currentsystem is based either on onetime certification testing

(usually with a very small number of units), or on

providing manufacturing guarantees of low power. With a

radio able to operate in bands with sensitive primary

users, the question may become how to ensure over time

that the radio is still fit for duty across all bands; passive

filters will no longer be a guarantee of noninterference.

The definition of ‘‘over time’’ includes both whether theyare still being manufactured to meet the original specs as

well as whether fielded units are still meeting those

specs.

2) Policy Drift Over Geography and Time: As spectrum

management systems are developed, the question of how

to deal with differences in policy becomes more signifi-

cant. Barring the existence of a universal set of policiesapplicable worldwide, a CR that crosses a national

boundary will be required to adhere to different policies.

It may also need to communicate with a different type of

spectrum management system, as well as with common

control channels operating at different frequencies. The

question of whether this will be a balkanizing issue has yet

to be answered and, while it is not a technical issue per se,

it will affect device design and the willingness ofmanufacturers to invest.

Another practical issue in dynamic spectrum sharing is

how to deal with evolving capabilities of new radios and

with policy changes that occur after a radio is designed and

manufactured. Making the radio flexible enough to deal

with future policy changes has been proposed as a way of

dealing with this.

At the heart of the question of how to deal with policyover time is the tradeoff between expressiveness and

complexity. In general, the more expressive the mecha-

nism, the more flexible it is. Given this fact, a significant

amount of research has been devoted to the concept of

policy reasoners that can interpret whatever policies they

are given (see [139]–[143]). However, at the other

extreme, there is caution about trying to create more

complexity than is really needed. Systems that come withexpensive processing requirements will not be acceptable

to the community. As expressed in [143], ‘‘In this effort,

two fundamental dangers must be avoided: development of

a perfect language that nobody wants to use (similar to Ada

or Esperanto) and development of a large number of non-

compatible languages that each solve one piece of the

problem but not an efficient composite solution.’’

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

256 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 16: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

The ability to change configuration of the radios, and/or their policies, introduces the issue of maintaining

synchronization between a radio’s configuration and the

configuration needed to operate correctly with the

spectrum management system. More research in this

area is needed.

3) Metrics for Regulatory Agencies: In the past, regulatory

agencies made band plans and system allocations withknowledge of component limitations of specific electronic

implementations. With DSA, there are no specific

passband filters or RF characteristics that all hardware

will contain. Therefore, it is not possible to achieve

spectrum management goals (like transmit spectrum

bounds) simply by controlling hardware characteristics.

The metrics used by regulatory agencies for determining

suitability become more complex with DSA.Governments are mandating spectrum efficiency when

considering purchase of spectrum-dependent systems [6],

[12]. However, one of the findings of the PCAST report is

that the traditional metric used for determining spectrum

efficiency, bits per second per hertz, has not guaranteed

that all available spectrum is being used. New metrics need

to be defined, and not just for efficiency. Other parameters

are important, such as receiver performance, time taken tovacate a band, interference tolerance metrics, probability

that spectrum is available, etc. New models also have to be

developed to deal with issues such as propagation

characteristics.

C. Enforcement MethodologiesThe traditional method of enforcing spectrum usage is

based on equipping engineers with spectrum analyzers andsending them to an area where violations are continuously

occurring. With a static allocation process, it is easy to

determine that any user transmitting in an unauthorized

band is a violator. With DSA, the difficulty greatly

increases. Not only is every secondary user device a

potential violator, but also they may only be causing a

problem episodically, so having engineers sitting and

waiting for an event could be very costly.Research into mechanisms that could assist enforce-

ment agencies takes several forms. There is research into

locating users by receive signal strength, time-of-arrival

differences, watermarking transmitters (inserting some-

thing into the signal to provide identity), and spectral

fingerprinting (identifying radio characteristics unique to a

transmitter).

Regulatory requirements specify a framework forsharing spectrum bands that can be used for proactive

enforcement using regulatory databases [2], [144], [145].

The use of a database in this manner is foreseen by the FCC

CDBS [59]. It contains a list of stations that require

protection.

Additional research is needed to decide the full details

of what should be included in a regulatory database, and

how it should be used. One potential use case is that aspectrum manager could access the database and use a

regulatory-approved interference prediction model for

authorizing access, or for optimizing the spectrum

allocation process. In this mode, it might get items such

as the following from the database: interference power

spectral density limits for incumbents, channel models,

spectrum masks for secondary user transmitters, underlay

masks for receivers, cochannel and adjacent channelinterference limits for receivers, etc. It could then run

calculations locally to coordinate spectrum assignments

between secondary users, or even to detect noncompliance

and enforce interference limits.

D. Information PrivacyA database service that holds spectral occupancy

information could be tampered with or probed in orderto gain information about the location of important

entities (e.g., Navy ships). An adversary could be a valid

CR that joins a network under normal conditions, but

requests spectrum occupancy information beyond what is

appropriate, such as information in a geographical area

that the radio has no intention to be in. Although

database security is a well-researched area, the question

of how to provide information from the database withoutunintentionally disclosing sensitive information is an area

in need of further research. For example, military users

may not want their location or capability information in a

database. This could be a fundamental problem with

applying a database approach to spectrum shared with

military users.

Another issue deals with who is authorized to collect

and analyze data coming from another radio. As anexample, collecting and analyzing spectrum data from a

military system is considered a felony in some countries.

Does the presence of sensors on a radio in the same band as

a military system, and the ability to either store data or

process data via cognitive engines on a radio, constitute a

violation of those laws? If so, the impact could be that

systems that share spectrum with military radios may not

be able to exploit learning (because of data storage),spectrum fingerprinting, or perhaps even be equipped with

a cognitive engine that could be used to process signals. It

would also impact the ability to exploit collaboration

between nodes and/or spectrum managers.

The 2013 Presidential Memorandum on Expanding

America’s Leadership in Wireless Innovation states that

‘‘All policies, practices, and templates shall be subject to

safeguards reasonably necessary to protect classified,sensitive, and proprietary data’’ [6]. A similar injunction

exists in the EU Commission Implementing Decision of

April 23, 2013, to ‘‘ensure the protection of information

which is considered confidential or classified by a Member

state’’ [146]. Research into algorithms and approaches that

deal with the necessity of sharing position and capability

information are needed to meet these requirements.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 257

Page 17: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

E. Creating Confidence: Test BedsA serious challenge facing implementation of DSA

systems is proving that the system will work as advertised.

Incumbent users and regulatory agencies need confidence

that dynamic sharing of spectrum will not cause harmful

interference to existing equipment before they will allow

systems to be deployed. Commercial entities need to feel

that opportunistic spectrum access is reliable, both from a

technology standpoint and a regulatory standpoint, beforethey will pursue significant investment. This dependency

was recognized in the PCAST spectrum report. It

recommended that the NTIA and the NIST provide test

services to support the development of policies and

underlying technologies [2]. In terms of scale, a ‘‘test city’’

and a ‘‘mobile test service’’ were suggested as components.

VII. IMPLICATIONS FORFUTURE STANDARDS

It is clear that regulators and commercial interests alike

believe that spectrum allocations in the future will stress-

sharing mechanisms. IEEE 802.22 is one of the first DSA-

based standards, and is paving the road for next-generation

DSA technology. The two market places that have proven to

be lucrative in the past, Wi-Fi and cellular, are the next tar-gets in standards efforts. The IEEE 802.11 standard is getting

a DSA update in the form of 802.11af, and LTE is looking to

exploit its carrier aggregation feature for DSA. A brief

discussion of IEEE 802.11af, LTE, and cognitive radar follows.

A. IEEE 802.11af White-FiIEEE 802.11af is a technical standard currently under

development with the goal of providing Wi-Fi in the TVwhite space. The standard will define modifications to

both the 802.11 physical layers and the 802.11 MAC layers,

to meet the legal requirements for channel access and

coexistence in the unused spectrum between TV stations.

The TV white spaces occur below 1 GHz, which means

802.11af has the potential for much greater distances than

the previous versions of 802.11. Future devices that

include 802.11af technologies will most likely also includeother Wi-Fi technologies such as 802.11ac and 802.11n.

The physical layer of 802.11af is based on IEEE 802.11ac,

except scaled down to work with 6-, 7-, and 8-MHz

channels [147]. Multiple channels can be in an aggregated

contiguous or noncontiguous manner. One of the design

requirements of 802.11af is an adjacent channel leakage

ratio of �55 dB, which is much higher than the current

Wi-Fi requirements [12]. The MAC layer protocol will alsobe based on previous Wi-Fi technology, with the addition

of spectrum sensing and a method of communicating with

a central database containing occupancy information.

B. LTE and LTE-AdvancedEven though the 3GPP LTE and LTE-Advanced

specifications do not include CR mechanisms such as

spectrum sensing, it is envisioned that the evolution ofLTE will lead toward use in shared spectrum. There is an

abundance of literature proposing CR and DSA schemes

for LTE, in both frequency-division duplex and time-

division duplex modes [148]. While most of the proposed

schemes involve spectrum sharing, it is possible to

implement a simple version of dynamic spectrum sharing

by requiring all LTE base stations to query a spectrum

occupancy database before transmitting. This databasemethod will likely represent the first wave of DSA-enabled

LTE, simply because it does not require as many additions

to the specifications.

Release 10 introduced a feature known as carrier

aggregation, which allows the user and base station to

communicate on multiple blocks of spectrum, known as

component carriers. These component carriers can be

adjacent, nonadjacent and in the same band, or nonadja-cent and in different bands. Each component carrier can

have a bandwidth of 1.4, 3, 5, 10, 15, or 20 MHz and a

maximum of five component carriers can be aggregated (for a

max of 100 MHz). Initially, carrier aggregation will only be

specified for a few specific operating bands. This means that

the technology cannot be directly applied to any given piece

of spectrum that allows opportunistic sharing. However, it is

one step closer to realizing DSA-enabled LTE.An example scenario that combines carrier aggregation

and dynamic spectrum sharing involves an LTE network

which operates in spectrum owned by the network

provider, but includes aggregate carriers in shared bands

which turn on and off based on the spectrum availability. It

is possible to turn off an aggregate carrier while the system

is running, given that vital control information is carried

on the primary carrier operating in the network operator’sspectrum. Turning off ‘‘extra carriers’’ simply reduces the

capacity of the link. Although LTE is not specifically a DSA

technology, it may evolve into a technology with DSA

capabilities, and features such as carrier aggregation and

SONs will surely aid in this evolution.

C. Cognitive RadarThe idea of using cognition in radar systems is an area

of research seeing increasing interest in recent years

[149]–[151]. The basic idea is that performance improve-

ments can be achieved over traditional radar systems

through the added capabilities of observation, memory,

and learning of the radar’s geographical, temporal, and

spectral environments. More specifically, it is envisioned

that a cognitive radar system could, in real time, makeintelligent adjustments to its system parameters in order to

deal with changes in its environment, to more closely track

its targets of interest, and to adjust for potential

interference sources [152]. It is due to this last point that

cognitive radar is thought of as a key technology for the

successful development of spectrum-sharing applications

in the government controlled radar bands.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

258 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 18: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

D. Other AreasThere is an ongoing debate within the public safety

community about how to deal with the spectrum allocated

to FirstNet [17] for building a United States-wide public

safety network. Building a complete network is a veryexpensive proposition, and given that it is most likely to be

based on LTE, there have been a number of proposals for

the spectrum to be shared between public safety and

commercial carriers. If this comes to pass, LTE standards

would be affected.

Although hospitals have long been the place where you

were most likely to be asked to turn off your cell phone,

the hospital room of the future is destined to be one of thedensest RF environments anywhere. A large number of

medical devices are moving toward wireless interfaces, and

RFID tagging is beginning to be used to track equipment

within the hospital (e.g., to reduce costs of finding

equipment when it must be calibrated or updated as part

of a safety recall). Using strictly the ISM bands (e.g., Wi-Fi)

will not be sufficient for the volumes of data produced in

these environments when doctors begin to place wearablemedical monitoring devices on their patients. MBANs are

the first, but not likely the only, foray into spectrum sharing

for hospitals.

Given the convenience and cost reduction often

afforded by going wireless, and the increased traffic flow

occasioned by machine-to-machine communications in the

Internet of Things, it should be expected that new types of

spectrum-sharing arrangements will be created in thefuture. So far, we have seen the development of standards

for a centrally supervised database system (IEEE 802.22)

and an unsupervised beacon-based system (IEEE 802.14.4j).

We expect to see centrally supervised database systems for

LTE and for IEEE 801.11af. The former would manage a

potentially large number of bands from 1 to 3.5 GHz and the

latter would manage TV white space. As other bands are

considered, the legacy protection requirements of the

incumbents, and the business models of the secondary

users, could see development of standards for some of the

other architectures (distributed supervision, or sense-only,

systems).

VIII . CONCLUSION

There is currently a paradigm shift underway in the

management of RF spectrum. Regulatory bodies are

coming face to face with the realization that the currentpolicies of fixed spectrum allocations are spectrally

inefficient and undesirable given the current explosion

of demand for wireless technologies. Regulatory policy

makers, as well as the research community at large,

envision DSA technologies as one of the key enablers to

this move away from rigid spectrum assignments.

The development of spectrum management systems is

still in its infancy and introduces unique issues typicallyunconsidered in traditional systems. These issues will need

to be addressed by equipment designers, network devel-

opers, policy makers, and even end users to guarantee

success. Given these facts, the purpose of this paper has

been to review some of the immediate practical issues

inherent to the development of spectrum management

systems utilizing CRs for DSA. A summary of the issues

discussed can be found in Fig. 7.While this paper could not possibly cover all of the

possible practical issues, the authors are hopeful that it will

aid in the up-and-coming spectral evolution/revolution. h

Acknowledgment

The authors would like to thank the many reviewers who

provided them with feedback about on how to approach some

of these topics, including M. Marcus, R. Farrell, P. Stanforth,

S. Hasan, and R. Pavlak.

Fig. 7. Summary of practical issues for spectrum management.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 259

Page 19: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

REF ERENCE S

[1] Qualcomm, ‘‘The 1000� data challenge,’’2013. [Online]. Available: http://www.qualcomm.com/solutions/wireless-networks/technologies/1000x-data.

[2] President’s Council of Advisors onScience and Technology, ‘‘Report to thePresident realizing the full potential ofgovernment-held spectrum to spur economicgrowth,’’ Jul. 2012.

[3] J. A. Stine, ‘‘Model based spectrummanagementVPart 1: Modeling andcomputational manual,’’ MITRECorporation, McLean, VA, USA, 2011.

[4] P. Ryan, ‘‘Treating the wireless spectrum as anatural resource,’’ Environ. Law Reporter,vol. 35, p. 10620, 2005.

[5] White House Office of the Press Secretary,‘‘Presidential MemorandumVUnleashingthe Brtoadband Revolution,’’ 2010.

[6] White House Office of the Press Secretary,‘‘Presidential MemorandumVExpandingAmerica’s Leadership in WirelessInnovation,’’ 2013.

[7] European Commission, ‘‘Digital agenda forEuropeVRadio spectrum policy documentarchive,’’ Jul. 3, 2013. [Online]. Available:http://ec.europa.eu/digital-agenda/radio-spectrum-policy-document-archive.

[8] U.S. Federal Communications Commission,‘‘Enabling innovative small cell use in3.5 GHz band NPRM & order,’’ 2012.

[9] J. A. Stine, ‘‘Spectrum consumptionmodels,’’ in Cognitive Radio Technology,B. A. Fette, Ed. Burlington, MA, USA:Academy Publishers (Imprint of Elsevier),2009, pp. 645–666.

[10] FCC Spectrum Policy Task Force, ‘‘Report ofthe spectrum efficiency working group,’’2002.

[11] J. H. Reed, J. T. Bernhard, and P. Jung-Min,‘‘Spectrum access technologies: The past,the present, and the future,’’ Proc. IEEE,vol. 100, no. Special Centennial Issue,pp. 1676–1684, May 13, 2012.

[12] European Parliament, DecisionNo 243/1012/EU of the European Parliamentand the Council of 14 March 2012establishing a multiannual radio spectrumpolicy programme,’’ Strasbourg, France,243/2012/EU, 2012.

[13] C. Stevenson, G. Chouinard, L. Zhongding,W. Hu, S. J. Shellhammer, and W. Caldwell,‘‘IEEE 802.22: The first cognitive radiowireless regional area network standard,’’IEEE Commun. Mag., vol. 47, no. 1,pp. 130–138, Jan. 2009.

[14] K. G. Shin, J. Hyoil, A. W. Min, andA. Kumar, ‘‘Cognitive radios for dynamicspectrum access: From concept to reality,’’IEEE Wireless Commun., vol. 17, no. 6,pp. 64–74, Dec. 2010.

[15] IEEE Standard for InformationTechnologyVLocal and Metropolitan AreaNetworksVSpecific RequirementsVPart 11:Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) SpecificationsAmendment 3: 3650–3700 MHz Operationin USA, IEEE STD 802-11y-2008, 2008,pp. 1-90.

[16] D. Wang, D. Evans, and R. Krasinski, ‘‘IEEE802.15.4J: Extend IEEE 802.15.4 radiointo the MBAN spectrum,’’ IEEE WirelessCommun., vol. 19, no. 5, pp. 4–5, Oct. 2012.

[17] National Telecommunications andInformation Administration, ‘‘FirstResponder Network Authority,’’ 2012.[Online]. Available: http://www.ntia.doc.gov/category/firstnet.

[18] T. L. Doumi, ‘‘Spectrum considerations forpublic safety in the United States,’’ IEEECommun. Mag, vol. 44, no. 1, pp. 30–37,Jan. 2006.

[19] I. F. Akyildiz, D. M. Gutierrez-Estevez, andE. C. Reyes, ‘‘The evolution to 4G cellularsystems: LTE-Advanced,’’ Phys. Commun.,vol. 3, pp. 217–244, 2010.

[20] S. Haykin, ‘‘Cognitive radar: A way of thefuture,’’ IEEE Signal Process. Mag., vol. 23,no. 1, pp. 30–40, Jan. 2006.

[21] U.S. Department of Energy, ‘‘Communicationsrequirements of smart grid technologies,’’Oct. 5, 2010.

[22] U.S. Department of Defense,‘‘Mil STD-188-141B: Interoperability andperformance standards for medium and highfrequency radio systems,’’ 1999.

[23] European Telecommunications StandardsInstitute, ‘‘Broadband wireless access,’’[Online]. Available: http://www.etsi.org/technologies-clusters/technologies/broadband-wireless-access.

[24] Qualcomm, ‘‘Authorized shared access: Anevolutionary spectrum authorization schemefor sustainable economic growth andconsumer benefit,’’ Jul. 3, 2013. [Online].Available: www.cept.org/Documents/cg-crs/363/CGRS(11)07_Presentation-of-ASA-concept-(FM(11)116-Attachment).

[25] M. M. Buddhikot, ‘‘Understanding dynamicspectrum access: Models, taxonomy andchallenges,’’ in Proc. 2nd IEEE Int. Symp. NewFrontiers Dyn. Spectrum Access Netw., 2007,pp. 649–663.

[26] IEEE Standard for InformationTechnologyVLocal and Metropolitan AreaNetworksVSpecific RequirementsVPart 22:Cognitive Wireless RAN Medium AccessControl (MAC) and Physical Layer (PHY)Specifications: Policies and Proceduresfor Operation in the TV Bands, IEEEStd. 802.22-2011, 2011, pp. 1-680.

[27] B. Gao, J. Park, and Y. Yang, ‘‘A taxonomy ofcoexistence mechanisms for heterogeneouscognitive radio networks operating in TVwhite spaces,’’ IEEE Wireless Commun.,vol. 19, no. 4, pp. 41–48, Aug. 2012.

[28] M. J. Marcus, ‘‘CR: Cooperative radio orconfrontational radio,’’ in Proc. 2nd IEEE Int.Symp. New Frontiers Dyn. Spectrum AccessNetw., 2007, pp. 208–211.

[29] Y. Zhao, ‘‘Enabling cognitive radiosthrough radio environment maps,’’ Ph.D.dissertation, Bradley Dept. Electr. Comput.Eng., Virginia Tech., Blacksburg, VA, USA,2007.

[30] B. Wang, ‘‘Dynamic spectrum allocation andsharing in cognitive cooperative networks,’’Ph.D. dissertation, Electr. Eng. Dept., Univ.Maryland, College Park, MD, USA, 2009.

[31] B. Wang and K. J. R. Liu, ‘‘Advances incognitive radio networks: A survey,’’ IEEEJ. Sel. Topics Signal Process., vol. 5, no. 1,pp. 5–23, Feb. 2011.

[32] S. Haykin, ‘‘Cognitive radio: Brain-empoweredwireless communications,’’ IEEE J. Sel. AreasCommun., vol. 23, no. 2, pp. 201–220,Feb. 2005.

[33] B. Ahsant and R. Viswanathan, ‘‘A review ofcooperative spectrum sensing in cognitiveradios,’’ in Advancement in SensingTechnology. New York, NY, USA:Springer-Verlag, 2013, pp. 69–80.

[34] R. Viswanathan and B. Ahsant, ‘‘A review ofsensing and distributed detection algorithmsfor cognitive radio systems,’’ Int. J. SmartSens. Intell. Syst., vol. 5, pp. 177–190, 2012.

[35] N. Pratas, N. R. Prasad, A. Rodrigues, andR. Prasad, ‘‘Cooperative spectrum sensing:State of the art review,’’ in Proc. 2nd Int. Conf.Wireless Commun. Veh. Technol. Inf. TheoryAerosp. Electron. Syst. Technol., 2011, DOI:10.1109/WIRELESSVITAE.2011.5940902.

[36] G. Ganesan and L. Ye, ‘‘Cooperativespectrum sensing in cognitive radio, Part II:Multiuser networks,’’ IEEE Trans. WirelessCommun., vol. 6, no. 6, pp. 2214–2222,Jun. 2007.

[37] G. Ganesan and L. Ye, ‘‘Cooperativespectrum sensing in cognitive radio, Part I:Two user networks,’’ IEEE Trans. WirelessCommun., vol. 6, no. 6, pp. 2204–2213,Jun. 2007.

[38] I. F. Akyildiz, B. F. Lo, and R. Balakrishnan,‘‘Cooperative spectrum sensing in cognitiveradio networks: A survey,’’ Phys. Commun.,vol. 4, pp. 40–62, 2011.

[39] Z. Quan, S. Cui, and A. H. Sayed, ‘‘Optimallinear cooperation for spectrum sensing incognitive radio networks,’’ IEEE J. Sel. TopicsSignal Process., vol. 2, no. 1, pp. 28–40,Feb. 2008.

[40] W. Zhang, R. K. Mallik, and K. Letaief,‘‘Optimization of cooperative spectrumsensing with energy detection in cognitiveradio networks,’’ IEEE Trans. WirelessCommun., vol. 8, no. 12, pp. 5761–5766,Dec. 2009.

[41] Z. Li, F. R. Yu, and M. Huang,‘‘A distributed consensus-based cooperativespectrum-sensing scheme in cognitiveradios,’’ IEEE Trans. Veh. Technol., vol. 59,no. 1, pp. 383–393, Jan. 2010.

[42] S. Atapattu, C. Tellambura, and J. Hai,‘‘Energy detection based cooperativespectrum sensing in cognitive radionetworks,’’ IEEE Trans. Wireless Commun.,vol. 10, no. 4, pp. 1232–1241, Apr. 2011.

[43] J. Unnikrishnan and V. V. Veeravalli,‘‘Cooperative sensing for primary detectionin cognitive radio,’’ IEEE J. Sel. TopicsSignal Process., vol. 2, no. 1, pp. 18–27,Feb. 2008.

[44] S. Chaudhari, J. Lunden, V. Koivunen, andH. V. Poor, ‘‘Cooperative sensing withimperfect reporting channels: Harddecisions or soft decisions?’’ IEEE Trans.Signal Process., vol. 60, no. 1, pp. 18–28,Jan. 2012.

[45] T. C. Aysal, S. Kandeepan, and R. Piesiewicz,‘‘Cooperative spectrum sensing with noisyhard decision transmissions,’’ in Proc. IEEEInt. Conf. Commun., 2009, DOI: 10.1109/ICC.2009.5198863.

[46] A. S. Cacciapuoti, I. F. Akyildiz, and L. Paura,‘‘Correlation-aware user selection forcooperative spectrum sensing in cognitiveradio ad hoc networks,’’ IEEE J. Sel. AreasCommun., vol. 30, no. 2, pp. 297–306,Feb. 2012.

[47] Y. Chongjoon, K. Hongkyu, and H. Jun,‘‘Cooperative TV spectrum sensing incognitive radio for Wi-Fi networks,’’ IEEETrans. Consumer Electron., vol. 57, no. 1,pp. 62–67, Feb. 2011.

[48] A. C. Malady and C. R. C. M. da Silva,‘‘Clustering methods for distributedspectrum sensing in cognitive radiosystems,’’ in Proc. IEEE Military Commun.Conf., 2008, DOI: 10.1109/MILCOM.2008.4753432.

[49] W. Han, J. Li, Z. Li, J. Si, and Y. Zhang,‘‘Efficient soft decision fusion rule incooperative spectrum sensing,’’ IEEE Trans.Signal Process., vol. 61, no. 8, pp. 1931–1943,Apr. 15, 2013.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

260 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 20: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

[50] J. Ma, G. Zhao, and Y. Li, ‘‘Soft combinationand detection for cooperative spectrumsensing in cognitive radio networks,’’ IEEETrans. Wireless Commun., vol. 7, no. 11, pt. 2,pp. 4502–4507, Nov. 2008.

[51] J. Li and Y. Zhao, ‘‘Radio environmentmap-based cognitive Doppler spreadcompensation algorithms for high-speed railbroadband mobile communications,’’EURASIP J. Wireless Commun. Netw.,vol. 2012, pp. 1–18, 2012.

[52] P. Ren, Y. Wang, Q. Du, and J. Xu, ‘‘A surveyon dynamic spectrum access protocols fordistributed cognitive wireless networks,’’EURASIP J. Wireless Commun. Netw.,vol. 2012, p. 60, 2012.

[53] Q. Zhao, L. Tong, A. Swami, andY. Chen, ‘‘Decentralized cognitive mac foropportunistic spectrum access in ad hocnetworks: A POMDP framework,’’ IEEE J.Sel. Areas Communications, vol. 25, no. 3,pp. 589–600, Apr. 2007.

[54] Y. Zhao, B. Le, and J. H. Reed, ‘‘NetworksupportVThe radio environment map,’’ inCognitive Radio Technology, B. A. Fette, Ed.Burlington, MA, USA: Newnes, 2006,pp. 325–366.

[55] FARAMIR, A European FP7 project for radioenvironment mapping. [Online]. Available:http://www.ict-faramir.eu/.

[56] Spectrum Bridge Inc., Database.[Online]. Available: http://www.spectrumbridge.com/Home.aspx.

[57] Google, Whitespace database.[Online]. Available: http://www.google.org/spectrum/whitespace/.

[58] Guidelines for Channel Calculations for WhiteSpaces, U.S. Federal CommunicationsCommission, 2013.

[59] U.S. Federal Communications Commission,Consolidated database system (CDBS).[Online]. Available: http://licensing.fcc.gov/prod/cdbs/pubacc/prod/cdbs_pa.htm.

[60] U.S. Government Accountability Office,‘‘Report on assessing the reliability ofcomputer-processed data,’’ Jul. 2009.

[61] E. A. Mancuso, S. Probasco, and B. Patil,RFC 6953VProtocol to Access White SpaceDatabase (PAWS): Use cases and requirements.[Online]. Available: http://datatracker.ietf.org/wg/paws/.

[62] National Telecommunications andInformation Administration (NTIA),‘‘Planning and processes need strengtheningto promote the efficient use of spectrum byFederal agencies,’’ 2011. [Online]. Available:http://www.gao.gov/products/GAO-11-352.

[63] Y. Chen and W. W. Chu, ‘‘Protection ofdatabase security via collaborative inferencedetection,’’ IEEE Trans. Knowl. Data Eng.,vol. 20, no. 8, pp. 1013–1027, Aug. 2008.

[64] B. Barak and J. Park, ‘‘Location privacy ofprimary users in geolocation database-drivenspectrum sharing,’’ 2014, to be published.

[65] J. Craninckx, M. Liu, D. Hauspie,V. Giannini, T. Kim, J. Lee, M. Libois,B. Debaillie, C. Soens, M. Ingels,A. Baschirotto, J. Van Driessche,L. Van der Perre, and P. Vanbekbergen, ‘‘Afully reconfigurable software-defined radiotransceiver in 0.13 �m CMOS,’’ in Dig. Tech.Papers IEEE Int. Solid-State Circuits Conf.,2007, pp. 346–607.

[66] L. J. Chu, ‘‘Physical limitations ofomni-directional antennas,’’ J. Appl. Phys.,vol. 19, pp. 1163–1175, 1948.

[67] R. Collin and S. Rothschild, ‘‘Evaluation ofantenna Q,’’ IEEE Trans. Antennas Propag.,vol. AP-12, no. 1, pp. 23–27, Jan. 1964.

[68] J. S. McLean, ‘‘A re-examination of thefundamental limits on the radiation Q ofelectrically small antennas,’’ IEEE Trans.Antennas Propag., vol. 44, no. 5, pp. 672–676,May 1996.

[69] W. Davis, T. Yang, E. Caswell, andW. Stutzman, ‘‘Fundamental limits onantenna size: A new limit,’’ IET Microw.Antennas Propag., vol. 5, pp. 1297–1302,2011.

[70] T. Yang, W. A. Davis, W. L. Stutzman,S. Shajedul Hasan, R. Nealy, C. B. Dietrich,and J. H. Reed, ‘‘Antenna design strategy anddemonstration for software-defined radio(SDR),’’ Analog Integr. Circuits Signal Process.,vol. 69, pp. 161–171, 2011.

[71] H. Schantz, The Art and Science ofUltrawideband Antennas. Boston, MA, USA:Artech House, 2005.

[72] W. L. Stutzman and G. A. Thiele, AntennaTheory and Design, 3rd ed. Hoboken, NJ,USA: Wiley, 2013.

[73] Z. Heng and E. Sanchez-Sinencio,‘‘Linearization techniques for CMOS lownoise amplifiers: A tutorial,’’ IEEE Trans.Circuits Syst. I, Reg. Papers, vol. 58, no. 1,pp. 22–36, Jan. 2011.

[74] H. Zhang, X. Fan, and E. S. Sinencio,‘‘A low-power, linearized, ultra-widebandLNA design technique,’’ IEEE J. Solid-StateCircuits, vol. 44, no. 2, pp. 320–330,Feb. 2009.

[75] P. Pawelczak, K. Nolan, L. Doyle, O. Ser Wah,and D. Cabric, ‘‘Cognitive radio: Ten years ofexperimentation and development,’’ IEEECommun. Mag., vol. 49, no. 3, pp. 90–100,Mar. 2011.

[76] E. Imana, T. Yang, and J. Reed, ‘‘Relaxingpre-selector filter selectivity requirementsusing cognitive RF front-end control,’’ AnalogIntegr. Circuits Signal Process., Aug. 24, 2013,DOI: 10.1007/s10470-013-0110-2.

[77] P. F. Marshall, ‘‘Cognitive radio as amechanism to manage front-end linearityand dynamic range,’’ IEEE Commun. Mag.,vol. 47, no. 3, pp. 81–87, Mar. 2009.

[78] Z. Quan, S. Cui, A. Sayed, and H. Poor,‘‘Wideband spectrum sensing in cognitiveradio networks,’’ in Proc. IEEE Int.Conf. Commun., Beijing, China, 2008,pp. 901–906.

[79] Y. Hur, J. Park, W. Woo, K. Lim, C. Lee,H. Kim, and J. Laskar, ‘‘A widebandanalog multi-resolution spectrum sensing(MRSS) technique for cognitive radio (CR)systems,’’ in Proc. IEEE Int. Symp. CircuitsSyst., Island of Kos, 2006, DOI: 10.1109/ISCAS.2006.1693528.

[80] N. Neihart, S. Roy, and D. Allstot, ‘‘A parallelmulti-resolution sensing technique formultiple antenna cognitive radios,’’ in Proc.IEEE Int. Symp. Circuits Syst., New Orleans,LA, USA, 2007, pp. 2530–2533.

[81] Z. Quan, S. Cui, A. Sayed, and H. Poor,‘‘Optimal multiband joint detection forspectrum sensing in cognitive radionetworks,’’ IEEE Trans. Signal Process.,vol. 57, no. 3, pp. 1128–1140, Mar. 2009.

[82] L. Luo and S. Roy, ‘‘Analysis of searchschemes in cognitive radio,’’ in Proc. IEEECommun. Soc. Conf. Sensor Mesh Ad HocCommun. Netw., San Diego, CA, USA, 2007,pp. 647–654.

[83] L. Luo, N. Neihart, S. Roy, and D. Allstot,‘‘A two-stage sensing technique for dynamicspectrum access,’’ in Proc. IEEE Int.Conf. Commun., Beijing, China, 2008,pp. 3028–3037.

[84] S. Fazeli-Dehkordy, K. Plataniotis, andS. Pasupathy, ‘‘Two-stage spectrum detectionin cognitive radio networks,’’ in Proc. IEEEInt. Conf. Acoust. Speech Signal Process., 2010,pp. 3118–3121.

[85] L. Luo and S. Roy, ‘‘Analysis of dynamicspectrum access with heterogeneousnetworks: Benefits of channel packingscheme,’’ in Proc. 28th IEEE Conf. GlobalTelecommun., 2009, pp. 3508–3514.

[86] T. Yucek and H. Arslan, ‘‘A survey ofspectrum sensing algorithms for cognitiveradio applications,’’ IEEE Commun. Surv. Tut.,vol. 11, no. 1, pp. 116–130, First Quarter2009.

[87] Y.-C. Liang, Y. Zeng, E. C. Y. Peh, andA. T. Hoang, ‘‘Sensing-throughputtradeoff for cognitive radio networks,’’IEEE Trans. Wireless Commun., vol. 7, no. 4,pp. 1326–1337, Apr. 2008.

[88] M. Patel and W. Jianfeng, ‘‘Applications,challenges, and prospective in emergingbody area networking technologies,’’ IEEEWireless Commun., vol. 17, no. 1, pp. 80–88,Feb. 2010.

[89] D. Cabric, S. M. Mishra, andR. W. Brodersen, ‘‘Implementation issues inspectrum sensing for cognitive radios,’’ inConf. Rec. 38th Asilomar Conf. Signals Syst.Comput., Nov. 2004, vol. 1, pp. 772–776.

[90] Z. Yonghong and L. Ying-Chang,‘‘Eigenvalue-based spectrum sensingalgorithms for cognitive radio,’’ IEEE Trans.Commun., vol. 57, no. 6, pp. 1784–1793,Jun. 2009.

[91] X. Ling, B. Wu, H. Wen, P.-H. Ho, Z. Bao,and L. Pan, ‘‘Adaptive threshold controlfor energy detection based spectrumsensing in cognitive radios,’’ IEEE WirelessCommun. Lett., vol. 1, no. 5, pp. 448–451,Oct. 2012.

[92] L. Yixian, Z. Chunyan, W. Hongjiang, andW. Gang, ‘‘Energy detection thresholdoptimization for cooperative spectrumsensing,’’ in Proc. 2nd Int. Conf. Adv. Comput.Control, Mar. 2010, pp. 566–570.

[93] S. Haykin, D. J. Thomson, and J. H. Reed,‘‘Spectrum sensing for cognitive radio,’’ Proc.IEEE, vol. 97, no. 5, pp. 849–877, May 2009.

[94] K. Kim, I. A. Akbar, K. K. Bae, J.-S. Um,C. M. Spooner, and J. H. Reed,‘‘Cyclostationary approaches to signaldetection and classification in cognitiveradio,’’ in Proc. 2nd IEEE Int. Symp. NewFrontiers Dyn. Spectrum Access Netw.,Apr. 2007, pp. 212–215.

[95] Z. Tian and G. B. Giannakis, ‘‘A waveletapproach to wideband spectrum sensingfor cognitive radios,’’ in Proc. 1st Int. Conf.Cogn. Radio Oriented Wireless Netw. Commun.,Jun. 2006, DOI: 10.1109/CROWNCOM.2006.363459.

[96] J. Wang, X. Jin, G. Bi, Z. Cao, and J. Huang,‘‘Multiple cumulants based spectrum sensingmethods for cognitive radios,’’ IEEE Trans.Commun., vol. 60, no. 12, pp. 3620–3631,Dec. 2012.

[97] Y. Zeng, Y.-C. Liang, A. T. Hoang, andR. Zhang, ‘‘A review on spectrum sensing forcognitive radio: Challenges and solutions,’’EURASIP J. Adv. Signal Process., 2010,DOI: 10.1155/2010/381465.

[98] L. Lu, X. Zhou, U. Onunkwo, and G. Y. Li,‘‘Ten years of research in spectrum sensingand sharing in cognitive radio,’’ EURASIPJ. Wireless Commun. Netw., 2012,DOI: 10.1186/1687-1499-2012-28.

[99] D. D. Ariananda, M. K. Lakshmanan, andH. Nikookar, ‘‘A survey on spectrum sensingtechniques for cognitive radio,’’ in Proc. 2nd

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 261

Page 21: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

Int. Workshop Cogn. Radio Adv. SpectrumManage., May 2009, pp. 74–79.

[100] Y. Huang and X. Huang, ‘‘Optimal spectrumsensing over multipath channels,’’ in Proc.IEEE Int. Conf. Commun., Jun. 2012,pp. 1522–1527.

[101] Y. Huang and X. Huang, ‘‘Spectrum sensingover frequency-selective fading channel withtap and spatial correlations,’’ in Proc. IEEE23rd Int. Symp. Pers. Indoor Mobile RadioCommun., Sep. 2012, pp. 2143–2148.

[102] S. A. Astaneh and S. Gazor, ‘‘Cooperativespectrum sensing over mixture-Nakagamichannels,’’ IEEE Wireless Commun. Lett.,vol. 2, no. 3, pp. 259–262, Jun. 2013.

[103] IEEE 802.16 Working Group, ‘‘Channelmodels for fixed wireless applications,’’Tech. Rep. IEEE 802.16.3c-01/29r4, 2001.

[104] WINNER Channel Model, ‘‘Spatial channelmodel for multiple input multiple output(MIMO) simulations,’’ 2003.

[105] P. Kyosti, J. Meinila, L. Hentila, X. Zhao,T. Jamsa, C. Schneider, M. Narandzic,M. Milojevic, A. Hong, J. Ylitalo,V.-M. Hollappa, M. Alatossava, R. Bultitude,Y. de Jong, and T. Rautiainen, ‘‘WINNER IIChannel Models, IST-WINNER D1.1.2,’’2007. [Online]. Available: http://www.ist-winner.org/deliverables.html

[106] M. J. Marcus, ‘‘Wireless research topics withspectrum policy significance,’’ IEEE WirelessCommun., vol. 17, no. 6, p. 4, Dec. 2010.

[107] G. Wiederhold and J. McCarthy, ‘‘ArthurSamuel: Pioneer in machine learning,’’ IBMJ. Res. Develop., vol. 36, no. 3, pp. 329–331,May 1992.

[108] T. W. Rondeau, ‘‘Application of artificialintelligence to wireless communications,’’Ph.D. dissertation, Electr. Comput. Eng.Dept., Virginia Polytechnic Inst. State Univ.,Blacksburg, VA, USA, 2007.

[109] T. W. Rondeau, C. J. Rieser, T. M. Gallagher,and C. W. Bostian, ‘‘Online modeling ofwireless channels with hidden Markovmodels and channel impulse responses forcognitive radios,’’ in IEEE MTT-S Int. Microw.Symp. Dig., Jun. 2004, vol. 2, pp. 739–742.

[110] C. Ghosh, C. Cordeiro, D. P. Agrawal, andM. B. Rao, ‘‘Markov chain existence andhidden Markov models in spectrum sensing,’’in Proc. IEEE Int. Conf. Perv. Comput.Commun., Mar. 2009, DOI: 10.1109/PERCOM.2009.4912868.

[111] A. He, B. Kyung Kyoon, T. R. Newman,J. Gaeddert, K. Kim, R. Menon,L. Morales-Tirado, J. J. Neel, Y. Zhao,J. H. Reed, and W. H. Tranter, ‘‘A survey ofartificial intelligence for cognitive radios,’’IEEE Trans. Veh. Technol., vol. 59, no. 4,pp. 1578–1592, May 2010.

[112] K. M. Thilina, C. Kae Won, N. Saquib, andE. Hossain, ‘‘Pattern classification techniquesfor cooperative spectrum sensing incognitive radio networks: SVM and W-KNNapproaches,’’ in Proc. IEEE Global Commun.Conf., Dec. 2012, pp. 1260–1265.

[113] J. Shlens, ‘‘A tutorial on principal componentanalysis,’’ Syst. Neurobiol. Lab., Univ.California San Diego, La Jolla, CA, USA,2005.

[114] S. Balakrishnama and A. Ganapathiraju,‘‘Linear discriminant analysisVA brieftutorial,’’ Inst. Signal Inf. Process., 1998.

[115] A. M. Martinez and A. C. Kak, ‘‘PCA versusLDA,’’ IEEE Trans. Pattern Anal. Mach. Intell.,vol. 23, no. 2, pp. 228–233, Feb. 2001.

[116] Z. Zhang, K. Long, and J. Wang,‘‘Self-organization paradigms andoptimization approaches for cognitive radio

technologies: A survey,’’ IEEE WirelessCommun., vol. 20, no. 2, pp. 36–42,Apr. 2013.

[117] S. Feng and E. Seidel, ‘‘Self-organizingnetworks (SON) in 3GPP long termevolution,’’ Nomor Research GmbH WhitePaper, 2008.

[118] H. Hu, Z. J, X. Zheng, and Y. Yang,‘‘Self-configuration and self-optimization forLTE networks,’’ IEEE Commun. Mag., vol. 48,no. 2, pp. 94–100, Feb. 2010.

[119] G. Americas, ‘‘The benefits of SON in LTE:Self-optimizing and self-organizingnetworks,’’ White Paper, 2009.

[120] D. Aziz, A. Ambrosy, L. Ho, L. Ewe,M. Gruber, and H. Bakker, ‘‘Autonomousneighbor relation detection and handoveroptimization in LTE,’’ Bell Labs Tech. J.,vol. 15, no. 3, pp. 63–83, Dec. 2010.

[121] L. Lindbom, R. Love, S. Krishnamurty,C. Yao, N. Miki, and V. Chanrashekar,Enhanced Inter-Cell Interference Coordinationfor Heterogeneous Networks in LTE-Advanced:A Survey. Ithaca, NY, USA: Cornell Univ.Library, Dec. 2011.

[122] M. M. S. Marwangi, N. Fisal, S. K. S. Yusof,R. A. Rashid, A. S. A. Ghafar, F. A. Saparudin,and N. Katiran, ‘‘Challenges and practicalimplementation of self-organizing networksin LTE/LTE-Advanced systems,’’ in Proc.Int. Conf. Inf. Technol. Multimedia, KualaLumpur, Nov. 2011, DOI: 10.1109/ICIMU.2011.6122748.

[123] L. Zhiqiang, P. Hong, K. Xue, and M. Peng,‘‘Conflict avoidance between mobilityrobustness optimization and mobility loadbalancing,’’ in Proc. IEEE Global Telecommun.Conf., Dec. 2010, DOI: 10.1109/GLOCOM.2010.5683861.

[124] A. Awada, B. Wegmann, D. Rose, I. Viering,and A. Klein, ‘‘Towards self-organizingmobility robustness optimization ininter-RAT scenario,’’ in Proc. IEEE 73rd Veh.Technol. Conf., Budapest, Hungary,May 2011, DOI: 10.1109/VETECS.2011.5956234.

[125] T. C. Clancy and N. Goergen, ‘‘Security incognitive radio networks: Threats andmitigation,’’ in Proc. 3rd Int. Conf. Cogn. RadioOriented Wireless Netw. Commun., May 2008,DOI: 10.1109/CROWNCOM.2008.4562534.

[126] A. G. Fragkiadakis, E. Z. Tragos, andI. G. Askoxylakis, ‘‘A survey on securitythreats and detection techniques in cognitiveradio networks,’’ IEEE Commun. Surv. Tut.,vol. 15, no. 1, pp. 428–445, First Quarter,2013.

[127] C. Ruiliang, P. Jung-Min, and J. H. Reed,‘‘Defense against primary user emulationattacks in cognitive radio networks,’’ IEEE J.Sel. Areas Commun., vol. 26, no. 1, pp. 25–37,Jan. 2008.

[128] C. Ruiliang, P. Jung-Min, Y. T. Hou, andJ. H. Reed, ‘‘Toward secure distributedspectrum sensing in cognitive radionetworks,’’ IEEE Commun. Mag., vol. 46,no. 4, pp. 50–55, Apr. 2008.

[129] L. A. DaSilva and I. Guerreiro,‘‘Sequence-based rendezvous for dynamicspectrum access,’’ in Proc. 3rd IEEE Symp.New Frontiers Dyn. Spectrum Access Netw.,Oct. 2008, DOI: 10.1109/DYSPAN.2008.52.

[130] U.S. Federal Communications Commission,‘‘Office of Engineering and TechnologyLaboratory Division Knowledge Database(KDB),’’ 2013. [Online]. Available: https://apps.fcc.gov/oetcf/kdb/index.cfm.

[131] U.S. Federal Communications Commission,‘‘FCC Office of Engineering and TechnologyEquipment Authorization Search,’’ 2013.

[Online]. Available: https://apps.fcc.gov/oetcf/eas/reports/GenericSearch.cfm.

[132] European Commission, ‘‘EuropeanstandardsVHarmonized standards,’’ 2013.[Online]. Available: http://ec.europa.eu/enterprise/policies/european-standards/documents/harmonised-standards-legislation/list-references/.

[133] European Commission, Enterprise andindustry, 2013. [Online]. Available: http://ec.europa.eu/enterprise/index_en.htm.

[134] B. Joiner, ‘‘Receiver spectrum standards:Phase 1 Summary of research into existingstandards,’’ NTIA Rep. 03-404, Nov. 2003.

[135] Communications Receiver PerformanceDegradation Handbook, DSO Joint SpectrumCenter, Oct. 2010, JSC-CR-10-004.

[136] L. Davies and P. Winter, ‘‘Study of currentand future receiver performance,’’ in FinalRep. OFCOM, Jan. 2010.

[137] U.S. Government Accountability Office,‘‘Spectrum management: Furtherconsideration of options to improvereceiver performance needed,’’ Rep. Congr.Committees GAO-13-265, Feb. 2013.

[138] FCC Technological Advisory Council,‘‘Interference limits policy: The use ofharm claim thresholds to improve theinterference tolerance of wireless systems,’’Receivers and Spectrum Working Group,Feb. 2013.

[139] D. Wilkins, G. Denker, M. O. Stehr,D. Elenius, R. Senanayake, and C. Talcott,‘‘Policy-based cognitive radios,’’ IEEEWireless Commun., vol. 14, no. 4, pp. 41–46,Aug. 2007.

[140] J. Riihijarvi, M. Petrova, V. Atanasovski, andL. Gavrilovska, ‘‘Extending policy languageswith utility and prioritization knowledge:The CAPRI approach,’’ in Proc. IEEE Symp.New Frontiers Dyn. Spectrum, Apr. 2010,DOI: 10.1109/DYSPAN.2010.5457838.

[141] B. Bahrak, A. Deshpande, M. Whitaker, andJ.-M. Park, ‘‘BRESAP: A policy reasonerfor processing spectrum access policiesrepresented by binary decision diagrams,’’ inProc. IEEE Symp. New Frontiers Dyn.Spectrum, Apr. 2010, DOI: 10.1109/DYSPAN.2010.5457867.

[142] B. Bahrak, J.-M. Park, and H. Wu,‘‘Ontology-based spectrum access policies forpolicy-based cognitive radios,’’ in Proc. IEEEInt. Symp. Dyn. Spectrum Access Netw.,Oct. 2012, pp. 489–500.

[143] M. M. Kokar, D. Hillman, L. Shujun,B. Fette, P. Marshall, M. Cummings,T. Martin, and J. Strassner, ‘‘Towards aunified policy language for futurecommunication networks: A process,’’ inProc. 3rd IEEE Symp. New Frontiers Dyn.Spectrum Access Netw., Oct. 2008,DOI: 10.1109/DYSPAN.2008.74.

[144] U.S. Department of Commerce, ‘‘Anassessment of the near-term viability ofaccommodating wireless broadband systemsin the 1675–1710 MHz, 1755–1780 MHz,3500–3650 MHz, and 4200–4220 MHz,4380–4400 MHz bands,’’ Oct. 2010.

[145] National Telecommunications andInformation Administration, ‘‘CommerceSpectrum Management AdvisoryCommittee Final Report,’’ Working Group1-1695-1710 MHz Meteorological-Satellite.[Online]. Available: www.ntia.doc.gov/files/ntia/publications/wg-1_report_v2.pdf.

[146] European Parliament, ‘‘CommissionImplementing Decision on 23 April 2013Defining the Practical Arrangements,Uniform Formats and a Methodology inRelation to the Radio Spectrum Inventory

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

262 Proceedings of the IEEE | Vol. 102, No. 3, March 2014

Page 22: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

Established by Decision No 243/2012/EUof the European Parliament and of theCouncil Establishing a MultiannualRadio Spectrum Policy Programme,’’ 2013.[Online]. Available: http://ec.europa.eu/digital-agenda/radio-spectrum-policy-document-archive#DEC.

[147] IEEE 802.11af Working Group,IEEE 802.11-12/0866r2 (PHY Overview),2012. [Online]. Available: https://mentor.ieee.org/802.11/dcn/12/11-12-0866-02-00af-phy-overview.pptx.

[148] J. D. Deaton, R. E. Irwin, and L. A. DaSilva,‘‘The effects of a dynamic spectrum accessoverlay in LTE-Advanced networks,’’ in Proc.IEEE Symp. New Frontiers Dyn. SpectrumAccess Netw., May 2011, pp. 488–497.

[149] S. Haykin, ‘‘Cognitive radar: A way of thefuture,’’ IEEE Signal Process. Mag., vol. 23,no. 1, pp. 30–40, Jan. 2006.

[150] S. Haykin, X. Yanbo, and P. Setoodeh,‘‘Cognitive radar: Step toward bridging thegap between neuroscience and engineering,’’

Proc. IEEE, vol. 100, no. 11, pp. 3102–3130,Nov. 2012.

[151] X. Li, Z. Hu, R. C. Qiu, and M. C. Wicks,‘‘Experimental demonstration of cognitiveradar for target localization under stronginterference,’’ in Proc. Military Commun.Conf., Oct. 2012, DOI: 10.1109/MILCOM.2012.6415695.

[152] M. Wicks, ‘‘Spectrum crowding andcognitive radar,’’ in Proc. 2nd Int. WorkshopCogn. Inf. Process., Elba Island, Italy,Jun. 2012, pp. 452–457.

ABOUT T HE AUTHO RS

Stephen M. Dudley (Member, IEEE) received the

B.Sc. degree in electrical engineering from the

University of Alberta, Edmonton, AB, Canada, in

1980 and the M.S. degree in electrical engineering

from Georgia Institute of Technology, Atlanta, GA,

USA, in 1995. Currently, he is working toward the

Ph.D. degree in electrical engineering at Virginia

Polytechnic Institute and State University,

Blacksburg, VA, USA, studying wireless networks

for disaster recovery.

William Christopher Headley received the B.S.

and M.S. degrees in electrical engineering (with

first class honors) from Virginia Polytechnic Insti-

tute and State University, Blacksburg, VA, USA, in

2006 and 2009, respectively. He is a Virginia Tech

Bradley Fellow alumnus, and is currently working

toward the Ph.D. degree in electrical engineering

with Wireless @ Virginia Tech.

His research interests include wireless com-

munications, signal detection and classification,

signal parameter estimation, and collaborative spectrum sensing.

Marc Lichtman (Student Member, IEEE) received

the B.S. and M.S. degrees in electrical engineering

from Virginia Polytechnic Institute and State

University, Blacksburg, VA, USA, in 2011 and

2012, respectively, where he is currently working

toward the Ph.D. degree, under the advisement of

Dr. J. H. Reed.

His research is focused on designing anti-jam

approaches against sophisticated jammers, using

machine learning techniques. He is also interested

in analyzing the vulnerability of LTE to jamming.

Eyosias Yoseph Imana received the B.S. degree

in electrical engineering from Bahir Dar Universi-

ty, Bahir Dar, Ethiopia, in 2007 and the M.S. degree

in electrical engineering from Florida Institute of

Technology, Melbourne, FL, USA, in 2009. Cur-

rently, he is working toward the Ph.D. degree in

electrical engineering at Virginia Polytechnic In-

stitute and State University, Blacksburg, VA, USA.

His research interest is radio-frequency (RF)

front–ends of flexible radios and implementation

of wireless devices. His paper on cognitive RF front–end control was

named as the best R&D track paper in the 2012 software-defined radio

forum. He is also a recipient of the Virginia innovation partnership I6

grant to develop mobile software-defined radios.

Xiaofu Ma (Student Member, IEEE) received the

B.S. degree in electronics from Northwest Uni-

versity, Xi’an, China, in 2008 and the M.S. degree

in computer science from Tongji University,

Shanghai, China, in 2011. Currently, he is working

toward the Ph.D. degree in electrical engineering

at Virginia Polytechnic Institute and State Univer-

sity, Blacksburg, VA, USA.

His research interests include network optimi-

zation, cognitive radio, dynamic spectrum access,

and wireless healthcare.

Mahi Abdelbar graduated with honors and

received the M.S. degree from the Electronics

and Communications Department, Engineering

Faculty, Mansoura University, Mansoura, Egypt,

in 2010. Currently, she is working toward the Ph.D.

degree in electrical engineering at the Wireless @

VT laboratory, Electrical Engineering Department,

Virginia Polytechnic Institute and State University,

Blacksburg, VA, USA.

Her research interests include distributed sig-

nal detection and classification, spectrum sensing, and cognitive radio

networks.

Aditya Padaki (Student Member, IEEE) received

the B.S. degree in electronics and communication

engineering from PES Institute of Technology,

Bangalore, India, in 2009 and the M.S. degree in

electrical engineering from Missouri University of

Science and Technology, Rolla, MO, USA, in 2012.

He is currently working toward the Ph.D. degree at

Wireless @ VT, Virginia Polytechnic Institute and

State University, Blacksburg, VA, USA.

His current research is on evolving receiver

performance metrics for efficient cognitive spectrum access. He is

interested in dynamic spectrum access, cognitive radio, multiple-input–

multiple-output (MIMO) systems, radio-frequency (RF) system design, etc.

Abid Ullah is currently working toward the Ph.D. degree in electrical

engineering at Virginia Polytechnic Institute and State University,

Blacksburg, VA, USA.

His research interests include database systems for spectrum

planning.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

Vol. 102, No. 3, March 2014 | Proceedings of the IEEE 263

Page 23: INVITED PAPER PracticalIssuesforSpectrum ManagementWith ... · of the available spectrum. Cognitive radio, with its ability to be ... The U.S. PCAST issued a report on July 20, 2012,

Munawwar M. Sohul received the B.Sc. degree in

electrical and electronics engineering from

Bangladesh University of Engineering and Tech-

nology (BUET), Dhaka, Bangladesh and the M.Sc.

degree in communication and signal processing

from Imperial College, London, U.K. Currently, he is

working toward the Ph.D. degree in electrical

engineering in the Bradley Department of Electri-

cal and Computer Engineering, Virginia Polytech-

nic and State University, Blacksburg, VA, USA,

working with Dr. J. H. Reed.

His research interest in wireless communication and signal processing

includes carrier aggregation, self-organizing networks, spectrum shar-

ing, and cognitive radios.

Taeyoung Yang (Member, IEEE) received the B.S.

and M.S. degrees in electronic engineering from

Sung-Kyun-Kwan University, Korea, in 1997 and

1999, respectively, and the M.S. and Ph.D. degrees

in electrical engineering from Virginia Polytechnic

Institute and State University, Blacksburg, VA,

USA, in 2003 and 2012, respectively.

He is currently a Research Scientist with the

Bradley Department of Electrical and Computer

Engineering, Virginia Polytechnic Institute and

State University. He has strong theoretical background on radiation

physics, co-site interference, and size-performance limits of wireless

devices. Along with the theoretical background, he also has extensive

hands-on experience in antennas, RF, sensors, and measurements. He

developed fully functional prototypes to prove new technologies and

demonstrate innovative wireless solutions. His current research empha-

sis is on developing core technologies in the area of spectrum sharing

and management, cognitive medical wireless infrastructure, medical

software-defined radio user equipment, and medical cloud services.

Collaborating with academic, nonprofit, and industry partners, he is

leading Health Care of the Future research initiative at the Wireless @

Virginia Tech.

Jeffrey H. Reed (Fellow, IEEE) received theB.S.E.E.,

M.S.E.E., and Ph.D. degrees from the University of

California Davis, Davis, CA, USA, in 1979, 1980, and

1987, respectively.

Currently, he serves as Director of Wireless @

VT, Virginia Polytechnic Institute and State Uni-

versity, Blacksburg, VA, USA. He is the Founding

Faculty member of the Ted and Karyn Hume

Center for National Security and Technology and

served as its interim Director when founded in

2010. His book Software Radio: A Modern Approach to Radio Design was

published by Prentice-Hall. He is cofounder of Cognitive Radio Technologies

(CRT), a company commercializing of the cognitive radio technologies; Allied

Communications, a company developing technologies for 5G systems; and

for Power Fingerprinting, a company specializing in security for embedded

systems.

Dr. Reed became Fellow to the IEEE for contributions to software

radio and communications signal processing and for leadership in

engineering education, in 2005. He is also a Distinguished Lecturer for

the IEEE Vehicular Technology Society. In 2013, he was awarded the

International Achievement Award by the Wireless Innovations Forum. In

2012, he served on the President’s Council of Advisors of Science and

Technology Working Group that examines ways to transition federal

spectrum to allow commercial use and improve economic activity.

Dudley et al. : Practical Issues for Spectrum Management With Cognitive Radios

264 Proceedings of the IEEE | Vol. 102, No. 3, March 2014