Next Article in Journal
Advancing mmWave Altimetry for Unmanned Aerial Systems: A Signal Processing Framework for Optimized Waveform Design
Previous Article in Journal
Categorical-Parallel Adversarial Defense for Perception Models on Single-Board Embedded Unmanned Vehicles
Previous Article in Special Issue
Deep Reinforcement Learning-Based 3D Trajectory Planning for Cellular Connected UAV
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Unlicensed Spectrum Access and Performance Analysis for NR-U/WiGig Coexistence in UAV Communication Systems

1
The College of Communication Engineering, Chengdu University of Information Technology, Chengdu 610225, China
2
The National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
Drones 2024, 8(9), 439; https://doi.org/10.3390/drones8090439
Submission received: 17 July 2024 / Revised: 20 August 2024 / Accepted: 26 August 2024 / Published: 28 August 2024

Abstract

:
Unmanned aerial vehicles (UAVs) are extensively employed in pursuit, rescue missions, and agricultural applications. These operations necessitate substantial data and video transmission, requiring significant spectral resources. The unlicensed millimeter wave (mmWave) spectrum, especially in the 60 GHz frequency band, offers promising potential for UAV communications. However, WiGig users are the incumbent users of the 60 GHz unlicensed spectrum. Therefore, to ensure fair coexistence between UAV-based new radio-unlicensed (NR-U) users and WiGig users, unlicensed spectrum-sharing strategies need to be meticulously designed. Due to the beam directionality of the NR-U system, traditional listen-before-talk (LBT) spectrum sensing strategies are no longer effective in NR-U/WiGig systems. To address this, we propose a new cooperative unlicensed spectrum sensing strategy based on mmWave beamforming direction. In this strategy, UAV and WiGig users cooperatively sense the unlicensed spectrum and jointly decide on the access strategy. Our analysis shows that the proposed strategy effectively resolves the hidden and exposed node problems associated with traditional LBT strategies. Furthermore, we consider the sensitivity of mmWave to obstacles and analyze the effects of these obstacles on the spectrum-sharing sensing scheme. We examine the unlicensed spectrum access probability and network throughput under blockage scenarios. Simulation results indicate that although obstacles can attenuate the signal, they positively impact unlicensed spectrum sensing. The presence of obstacles can increase spectrum access probability by about 60% and improve system capacity by about 70%.

1. Introduction

UAVs are widely employed in various fields, such as emergency search and rescue operations [1], agricultural irrigation [2], and urban infrastructure development [3], due to their easy deployment and flexible scheduling. As UAVs take on more complex tasks, the demand for data transmission rates increases, leading to growing spectrum needs. Unlicensed spectrum sharing is an effective solution to address these urgent spectrum demands. The unlicensed millimeter wave spectrum, particularly the 60 GHz frequency band, holds significant potential for UAV communications [4,5]. It provides high-bandwidth, low-interference communication capabilities, making it suitable for various UAV applications. For example, the 60 GHz unlicensed millimeter wave band can support high-definition video and image transmission due to its high bandwidth. Its high-speed data transmission for short distances makes it ideal for applications like surveillance and patrolling. The Low latency and low interference also make it suitable for real-time control and navigation of UAVs. Moreover, the new radio unlicensed (NR-U), part of the 5G standard, supports communication over unlicensed bands, including the 60 GHz band, enhancing the flexibility and performance of UAV communication.
The global unlicensed spectrum available includes the 2.4 GHz, 5 GHz, and 60 GHz bands. In the 60 GHz unlicensed band, Europe has released 9 GHz of available spectrum, which is ten times that of the unlicensed spectrum below 6 GHz. The United States has released 14 GHz of unlicensed bandwidth [6], which is sixteen times that of the unlicensed spectrum below 6 GHz. As confirmed by the 3rd Generation Partnership Project (3GPP), the 60 GHz band is an attractive candidate because it is currently not very crowded and can provide a large amount of continuous bandwidth [7,8]. From the perspective of 3GPP standardization, NR-U (New Radio-unlicensed) operating below 7 GHz has already been standardized by 3GPP, while the spectrum access standard for NR-U operating in the millimeter-wave bands will be addressed in subsequent releases, namely NR Rel-17 and above.
However, there are already some Radio Access Technologies (RATs) operating in these bands, such as 802.11b/g/n working at 2.4 GHz, 802.11n/ac working at 5 GHz, and 802.11ad/ay (also known as WiGig) operating in the 60 GHz band. One of the most critical issues allowing cellular networks or NR-U to operate in unlicensed spectrum is to ensure fair and harmonious coexistence with other systems operating in the unlicensed bands [9,10].
For fair coexistence, any wireless access terminal that wants to use unlicensed spectrum (for example, a 5G network using unlicensed spectrum) must be designed according to the requirements and standards of the respective bands [10,11]. Therefore, duty cycle mechanisms and the Listen Before Talk (LBT) access mechanism have been proposed to solve the coexistence problem. In the 5 GHz and 60 GHz bands, the standard stipulates that Europe and Japan use the Listen Before Talk (LBT) mechanism [11]. To comply with the regulations (referred to as Collision Avoidance Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) in IEEE 802.11 versions), LAA, MulteFire, Wi-Fi, and WiGig all adopt the LBT mechanism [12,13].
LBT is a spectrum-sharing mechanism where devices sense the spectrum usage situation through this mechanism before accessing the unlicensed spectrum. It determines the channel’s busyness or idleness by comparing the received interference with an energy detection threshold. However, compared to LTE-U/Wi-Fi coexistence, NR-U/Wi-Fi coexistence cannot adopt the traditional LBT spectrum sensing mechanism, because the 5G NR-U network using unlicensed spectrum employs beamforming transmission, which changes the interference layout and thus alters the coexistence framework of unlicensed spectrum. In the beamforming-based transmission for NR-U/Wi-Fi coexistence, the traditional LBT technology leads to more severe exposed and hidden node problems [14,15]. For example, the use of omnidirectional LBT makes the exposed node problem more prominent, as verified in WiGig systems [10]. If the directionality of directional transmission is known, using directional LBT can improve spatial reuse, but it leads to a more severe hidden node problem [16]. Therefore, there is a trade-off between omnidirectional LBT and directional LBT [17]. To achieve this, two distributed LBT-based spectrum sensing strategies have been proposed: Pair LBT [17] and LBT switching [18].

1.1. Related Works

Beam-based transmission presents unique challenges in channel detection due to the limitations of Listen-Before-Talk (LBT) mechanisms. Previous studies have explored various methods to address the issue of undetectable interference at the transmitter. For instance, Ref. [19] discussed the receiver-assisted LBT as a more effective mechanism for interference assessment. The work [20] introduced a speak-before-listening (SBR) mechanism and Ref. [21] proposed the Listen-Before-Receive (LBR) strategy. Building on this, Ref. [22] presented a closed-loop LBT mechanism and Ref. [23] combined directional LBT-LBR with millimeter-wave beam training to reduce complexity. Additionally, existing receiver-assisted LBT strategies typically employ a fixed energy detection threshold [10,12,13,23], leading to a trade-off between spectrum efficiency and interference management. Therefore, it is necessary to optimize the receiver’s energy detection threshold to ensure fair coexistence between NR-U and Wi-Fi systems [9,24]. Traditional optimization-based coexistence approaches in unlicensed mmWave bands can be found in [10,25,26]. An underlying assumption of these methods, however, is that they know the topology or scheduling knowledge of other networks, which is usually unavailable in practice. Thus, the work in [27] adopted an efficient 3D radio environment map (REM) construction scheme based on sparse Bayesian learning (SBL) to recover the accurate REM with limited and optimized sampling data. Recently, DRL based spectrum sharing strategies have been introduced into the cognitive radio field due to their abilities to fit well in unknown environments [28,29,30,31,32,33]. However, past works are all proposed for spectrum sharing in sub-7 GHz bands. Thus, the work [5] attempted to exploit the DRL technique to tackle the NR-U/WiGig coexistence issue in unlicensed mmWave bands. Furthermore, the work [34] has proposed a Deep Q-learning Network (DQN) based scheme to achieve the fair coexistence of NR-U network with the existing WiGig network in unlicensed mmWave bands. Through the use of a centrally coordinated multi-point (CoMP) server that manages the operations of NR-U access points, a joint beamforming coordination and user selection approach is proposed to enable the fair coexistence between multi-operator NR-U networks and a WiGig network [35]. The authors in [5] studied the NR-U/WiGig coexistence in unlicensed mmWave bands, with the goal of maximizing the NR-U data rate while satisfying all UE’s QoS requirements. The proposed scheme in [5], however, cannot trade off different goals. Furthermore, online learning-based codebook optimization algorithms in [28] have shown their efficiency in NR-U even without prior network knowledge, but the impact of the codebook selection on WiGig was not considered. Thus, the work in [36] focuses on the codebook selection for the NR-U/WiGig coexistence in unlicensed mmWave bands.
In unlicensed millimeter-wave bands, data communication is extremely sensitive to obstacles in the environment. Obstacles can cause significant blocking effects, leading to communication interruptions. However, obstacles can play a positive role in spectrum sensing access because they can block interference, allowing different wireless access systems to achieve fair and harmonious coexistence. Obstacles can also increase spectrum access opportunities and improve system capacity. However, although the impact of obstacles on path loss has been studied in the literature [37,38,39], the impact of obstacles on access to unlicensed spectrum has not yet been studied. Such research is of great significance for access to millimeter-wave unlicensed spectrum based on beam transmission.

1.2. Motivations and Contributions

From the above discussion, in beam-based NR-U systems, to achieve coexistence with various wireless access technologies, a new and effective spectrum sensing access needs to be designed. Motivated by this, we propose a new and effective spectrum sensing strategy, i.e., collaborative spectrum sensing of the cellular user (CU) (we use UE to denote this type of user in this article to distinct the WiGig user.) and WiGig user (WUE), which addresses the problems of missed detection and false alarms in traditional LBT, as well as the spectrum access issues in special scenarios. We also analyze the influence of blockage on the spectrum access for the NR-U/WiGig coexistence systems. The contributions of our study are concluded as follows:
(1) A new and effective collaborative spectrum sensing strategy for the NR-U/WiGig coexistence is proposed, which solves the hidden and exposed node problems and spectrum sensing issues in special scenarios. The optimal transmit power for the gNB and WiGig as well as the optimal sensing detection threshold are obtained by maximizing the system sum rate using the Dinkelbach method.
(2) The effects of blockage on the spectrum sensing and system capacity are analyzed. The spectrum access probability and system sum rate with blockage are derived and compared with that of LoS links.
(3) The numeric simulations are performed to verify the theoretic analysis. The results show the proposed spectrum access strategy has the maximal sum rate with the optimal detection threshold and has the lower complexity although it has the relatively lower sum rate. At the same time, the NR-U/WiGig coexistence system with blockage has a higher spectrum access probability and sum rate compared to that without blockage scenarios.
The rest of the paper is organized as follows: In Section 2, we describe the system model of the mmWave cellular network coexisting with WiGig. In Section 3, we design a frame structure for the unlicensed mmWave spectrum sharing. To maximize the sum rate of cellular users as well as reduce the interference to WiGig networks, the unlicensed spectrum sharing problem is formulated in Section 4 and the Dinkelbach-based algorithm is designed to solve this problem. In Section 5, we evaluate the unlicensed spectrum sensing with blockages and analyze their impact on sensing performance. Simulation results are given in Section 6 and conclusions are drawn in Section 7.

2. Problem Description and Motivations

The traditional LBT (Listen Before Talk) technology no longer works in the beamforming-based NR-U/WiGig coexistence systems, which is mainly reflected in the following aspects:
(a) One of the significant characteristics of millimeter wave communication is beam-based transmission, which allows for beam steering to facilitate spectrum sharing between coexistence systems (it is important to recognize that UAVs are versatile within a coexistence system, capable of being gNBs, STAs, WiGigs, or WUEs. This versatility stems from the UAVs’ dual functionality as both mobile base stations and users. Consequently, in the system model outlined herein, the designations gNB (BS1), STA (UE1), WiGig (BS2), and WUE (UE2) correspond to the base stations and users of the NR-U and WiGIG systems, respectively. The specific node functioning as the UAV is not predefined, allowing for adaptability based on varying scenario requirements and communication needs. Therefore, to maintain general applicability across diverse scenarios, no particular node is explicitly identified as the UAV). Traditional spectrum sensing techniques such as Listen-Before-Talk (LBT), which rely on omnidirectional or directional sensing of interference by the base station, are no longer effective in millimeter-wave communications. As illustrated in Figure 1 with co-location scenario of WUE and STA users, conventional LBT spectrum sensing would conclude that the coexistence systems cannot operate concurrently. This is due to the WUE detecting interference from the gNB. However, in millimeter-wave communications, the directional capabilities of beams can be utilized to avoid mutual interference, thereby enabling simultaneous transmission. Consequently, the traditional LBT technique is rendered ineffective in this scenario.
(b) Additionally, traditional LBT can lead to false alarms and missed detection issues, as exemplified in Figure 2. In Figure 2a, the traditional LBT technique would cause the WiGig base station to omnidirectionally detect interference from the gNB base station. To avoid conflict, the WiGig base station would cease signal transmission. However, in reality, due to the directional nature of beams, the coexistence systems could communicate simultaneously, resulting in a false alarm. In Figure 2b, the WiGig base station employs directional sensing and does not detect the signal sent by the gNB base station. Consequently, the WiGig base station proceeds with its signal transmission, which causes substantial interference to the users, leading to a missed detection issue.
(c) Finally, when the gNB base station, STA, WiGig base station, and WUE are essentially aligned in a straight line, the traditional LBT technique completely fails, as shown in Figure 3. In Figure 3, the six scenarios from top to bottom in the left side of Figure 3 demonstrate that the STA and WUE users do not interfere with each other due to the opposite directions of transmission, allowing for concurrent transmission. In contrast, the six scenarios from top to bottom in the right side of Figure 3 cannot coexist due to mutual interference. According to traditional LBT spectrum sensing technology where the WiGig base station detects interference, none of the scenarios in Figure 3 can achieve concurrent transmission, leading to resource wastage and sensing failure.
Based on the above descriptions and analysis, it is evident that traditional LBT technology has its limitations in millimeter-wave communications. Therefore, this paper studies the spectrum-sharing access protocols suitable for beam-based communication, aiming to improve and supplement the traditional LBT technology.

3. Proposed the Spectrum Access Strategy for NR-U/Wi-Fi Coexistence Systems

The collaboration-based unlicensed spectrum sensing technology for the NR-U/WiGig system is proposed in this section. This strategy consists of two main steps:
(1) Beam Scanning Alignment: Before UE and WUE carry out LBT, beam scanning is performed to align the optimal beams of the base station and users, which has been studied in many documents [40,41,42]. Although some literature combines LBT with beam scanning, the results do not avoid the problem of false alarms [23]. Conducting LBT before beam scanning may reduce the complexity during the beam scanning phase. However, it is at the cost of losing sensing accuracy in the LBT phase, which also causes subsequent conflicts between STA and WUE users and degrades system performance. Therefore, in this study, beam scanning is conducted first to acquire the communication direction of the base station, and then LBT is carried out. It is worth noting that maintaining beam alignment can be difficult in dynamic environments where users or obstacles are moving. However, online learning-based code-book optimization algorithms are adaptable to highly dynamic systems and show their efficiency in NR-U even without prior network knowledge [36,43].
(2) LBT Spectrum Sensing in Optimal Communication Directions: The precondition for establishing NR-U communication is that the communication can be normally maintained with very low interference from the WiGig system. At the same time, to ensure the communication quality of the WiGig user (WUE), the interference from the gNB to the WUE must also be sufficiently small. Hence, both gNB and WiGig users need to conduct LBT spectrum sensing, respectively.
The proposed spectrum sensing protocol flowchart is shown in Figure 4.
In the protocol flowchart, base stations and users carry out beam scanning alignment. Then, the base station sends a Reference Signal (RTS) to request spectrum sensing toward the user direction. If simultaneous RTS messages come from multiple devices, the multiple users adopt Markov chain-based contention window back-off mechanism or priority-based access to avoid conflict. Users perform energy detection based on the signal received from the base station direction. If it is greater than the threshold value, there is interference in that direction and the spectrum sensing result is busy. Otherwise, the result is idle. Since both UE (STA) and WUE perform spectrum sensing simultaneously, there are four possible sensing results: WUE-idle, UE-idle; WUE-busy, UE-busy; WUE-idle, UE-busy; WUE-busy, UE-idle.
Situation 1: UE-idle, WUE-idle. In this case, the UE and WUE users do not interfere with each other, as in the scenarios in Figure 1 and Figure 2a, and left side of Figure 3. The directional nature of the beams in millimeter-wave communication allows both users to transmit simultaneously on the same frequency without interfering with each other. Under this condition, both users transmit data at normal power.
Situation 2: UE-busy, WUE-busy. In this situation, both UE and WUE users receive interference from each other, as in scenarios 2–5 in the right side of Figure 3. Here, the UE and WUE users have two options: one is for the UE to transmit data at normal power and the WUE to not transmit data, ensuring the priority and reception quality of UE; the other option is for the UE to increase the transmission power while the WUE decreases it. Although this option improves spectral efficiency, the communication quality of WUE is not guaranteed.
Situation 3: UE-idle, WUE-busy. In this situation, the UE is unaffected by the WUE’s communication, but the WUE is affected by the UE’s communication, as in the first scenario in the right side of Figure 3. Here, the UE and WUE users also have two choices: one is for the UE to transmit data at normal power and the WUE not to transmit, meaning the WUE does not send when interfered with; the other choice is for the UE to transmit normally while the WUE increases the transmission power to resist the interference from the UE’s communication. This option can improve spectral efficiency while the communication quality of the WUE can also be ensured, with the UE being completely undisturbed.
Situation 4: UE-busy, WUE-idle. In this situation, the UE is interfered with by the WUE’s communication, but the WUE is not affected by the UE’s communication, as in the sixth scenario in the right side of Figure 3. Here, the system also has two options: one is for the UE to transmit data at normal power and the WUE not to communicate, ensuring the priority and communication quality of the UE; the other option is for the UE to increase the transmission power and the WUE to decrease it, which reduces the interference experienced by the UE and improves communication quality, but may affect the WUE’s communication.
Based on the proposed collaborative spectrum sensing protocol for NR-U/WiGig coexistence systems, the frame structure for gNB and WiGig are shown in Figure 5, which illustrates our proposed CO-BT-LBT scheme and represents an original contribution of this paper.
To verify the effectiveness of the proposed collaborative spectrum sensing strategy, we compare the complexity of the proposed strategy with the existing main spectrum access strategies as shown in Table 1.
Table 1 compares the complexity of various channel access schemes. The parameter K 1 and M 1 are the required beam pair links (BPL) in Tx monitoring and BPL in Rx monitoring, respectively. The parameter K 2 is the subset of K 1 monitoring beams with energy below the threshold. The parameter M 2 is the subset of the M 1 receiver monitoring beams with energy below the threshold. Besides, independent beam training performs k 2 = M 2 BPL before RTS/CTS sending. Next, the transmitter sends RTS in M 2 beams, and the receiver performs an entire beam sweeping in K 2 beams at the same time. After K 2 times of beam sweeping, the receiver sorts the receiving beams in descending order according to the reference signal receiving power (RSRP). The largest M beams in RSRP are then chosen to constitute a temporary beam set R R t e m p .
It can be found that the joint directional LBT and beam training (JOL-BT) reduces more than 1/3 beam pair link (BPL) numbers than that of the independent directional LBT and beam training channel access mechanism (IDL-BT). It is shown that by increasing the number of antennae, the performance of the proposed mechanism can be remarkably improved. Moreover, the proposed collaborative beam training and LBT channel access scheme (CO-BT-LBT) has the lowest complexity.

4. Mathematical Formulation of the Proposed Solution

In the proposed collaborative spectrum sensing strategy, the false alarm and miss detection can be solved for the co-location scenario of UE and WUE, where any three points of gNB, UE, WiGig and WUE are in a straight line. For the scenario of gNB, UE, WiGig and WUE are all in a straight line, the proposed spectrum sensing strategy can accurately sense the channel state (idle or busy) with the perfect beamforming. However, for the imperfect beamforming with the strong side lobes, the scenarios where the gNB and WiGig systems can access the unlicensed spectrum simultaneously become infeasible, and vice versa. The detailed analysis is as follows:
When the directions of two communication links are opposite, the mutual interference can be avoided and thus, the coexistence system can be achieved. However, when the side-lobe gains are high, the two communication links may interfere with each other, potentially preventing simultaneous access to the unlicensed spectrum. In this case, the signal-interference-noise-ratio (SINR) of UE and WUE are deduced as
SINR u e = P 1 H b s , u e G t , b s , m G r , u e , m P 2 H w g , 1 G t , w g , s G r , u e , m + σ 2 = P 1 α P 2 β + σ 2
and
SINR w u e = P 2 H w g , 2 G t , w g , m G r , w u e , m P 1 H b s , w u e G t , b s , s G r , w u e , m + σ 2 = P 2 β P 1 μ + σ 2
where α = H b s , u e G t , b s , m G r , u e , m , β = H w g , 1 G t , w g , s G r , u e , m , γ = H w g , 2 G t , w g , m G r , w u e , m and μ = H b s , w u e G t , b s , s G r , w u e , m . The parameters P 1 and P 2 denote the transmit power of the gNB and WiGig, respectively. The channel parameters H b s , u e , H w g , u e , H w g , w u e and H b s , w u e represent the channel power gain from the gNB to the UE and WUE, and the channel power gain from the WiGig to the UE and WUE, respectively. The parameter G x , y , z is the beamforming gain, x t , r denoting the transmitter or the receiver, y b s , w g , u e , w u e denoting the gNB, WiGig, UE and WUE, and z m , s denoting the main lobe or the side lobe.
At the transmitter or receiver, the antenna gain can be calculated as [44]
G x , y , m = 10 log 10 N + G e l e .
where G e l e denotes the independent power gain of each antenna, which is different from the parameters G x , y , z and N is the number of antennas.
The antenna gain loss in the direction of angle ϕ compared to the expected direction to the user u can be expressed as [44]
G u , l o s s k ϕ = min 12 36 ϕ 13 π 2 , 30 .
During the LBT process, the interference received by the WUE from gNB is expressed as
I = P t , u e 1 P L d + G t x , u e 1 + G r x , u e 2 G u e 2 , l o s s k ϕ [ dB ] ,
where P L d is the path loss when the transmission distance is d.
In scenarios with strong side lobes that cause mutual interference, the problem of maximizing the system sum rate when gNB and WiGig can simultaneously communicate with users can be formulated as:
P : max P 1 , P 2 , I 1 t h , I 2 t h log 2 1 + P 1 α P 2 β + σ 2 + log 2 1 + P 2 γ P 1 μ + σ 2 s . t . C 1 : P 2 β I 1 t h C 2 : P 1 μ I 2 t h C 3 : 0 P 1 P max C 4 : 0 P 2 P max C 5 : 0 I 1 t h P max C 6 : 0 I 2 t h P max .
From the above problem, we can see that P is nonconvex due to the fraction-form objective function. The first constraint guarantees the interference received by the WUE is below the threshold. The second constraint guarantees the interference received by the UE is below the threshold. The constraints C 1 and C 2 guarantee the cellular and WiGig systems can access the unlicensed spectrum simultaneously. The third and fourth constraints ensure that the transmission power of the base stations, gNB, and WiGig is within the maximum transmission power. The fifth and sixth constraints indicate that the interference tolerance of UE and WUE is also limited to the maximum transmission power. To solve this problem, we need to transform it to a standard convex problem first and then adopt the classical optimization tool CVX to obtain the optimal transmit power.
By applying the Dinkelbach method to convert the fraction form into the rational expression [45,46,47,48], P can be transformed into
P-D : max P 1 , P 2 , I 1 t h , I 2 t h , q P 2 β + σ 2 + P 1 α q P 1 μ + σ 2 + P 2 γ s . t . C 1 : P 2 β I 1 t h C 2 : P 1 μ I 2 t h C 3 : 0 P 1 P max C 4 : 0 P 2 P max C 5 : 0 I 1 t h P max C 6 : 0 I 2 t h P max .
The equivalence of (6) and (7) is obtained by the following theorem.
The optimal q * can be obtained as q * = P 2 β + σ 2 + P 1 α P 1 μ + σ 2 + P 2 γ if and only if
F ( q * ) = F ( q * , P 1 * , P 2 * , I 1 t h , * , I 2 t h , * ) = max P 1 , P 2 , I 1 t h , I 2 t h P 2 β + σ 2 + P 1 α q * P 1 μ + σ 2 + P 2 γ = 0 .
Proof. 
see Appendix A.    □
From (7), we can see that the objective function and constraints are all linear functions of variables P 1 , P 2 , I 1 t h and I 2 t h . The problem (7) is convex and can be solved by CVX. Then by iterating variable q, we can obtain the final optimal solution. For a given q in (7), the optimal transmit power can be obtained by CVX. The proposed Dinkelbach iterative algorithm is summarized in Algorithm 1.
Algorithm 1 Dinkelbach-based Iterative Power Allocation Algorithm
 1:
Initialize the related parameters P 1 , P 2 , I 1 th and I 2 th .
 2:
Set maximal transmit power P max , channel parameters α , β , γ , σ , and μ , the convergence tolerance ϵ .
 3:
while not converged do 
 4:
  Solve P-D by CVX tool.
 5:
  Update q by q new = P 2 β + σ 2 + P 1 α P 1 μ + σ 2 + P 2 γ .
 6:
  if  | q new q | ϵ  then
 7:
   Converge
 8:
  else
 9:
    q = q new
10:
  end if 
11:
end while 
12:
Obtain the optimal power allocation P 1 * , P 2 * , I 1 th , * , I 2 th , * , and q * .
To show the convergence of the proposed algorithm, we find that P 1 μ + σ 2 + P 2 γ 0 , f ( q ) is monotonic decreasing function of q. Define q * = max P 1 , P 2 , I 1 t h , I 2 t h P 2 β + σ 2 + P 1 α P 1 μ + σ 2 + P 2 γ = P 2 * β + σ 2 + P 1 * α P 1 * μ + σ 2 + P 2 * γ , we have f q * = P 2 * β + σ 2 + P 1 * α q * P 1 * μ + σ 2 + P 2 * γ = 0 . So, q n and q n + 1 denoting the nth and ( n + 1 ) th iteration parameters satisfy q n q * , q n + 1 q * and accordingly, f ( q n ) f ( q * ) = 0 , f ( q n + 1 ) f ( q * ) = 0 . Substituting q n + 1 = P 2 n β + σ 2 + P 1 n α P 1 n μ + σ 2 + P 2 n γ , where ( P 1 ( n ) , P 2 ( n ) , I 1 ( n ) , I 2 ( n ) ) represents the optimal power allocation in the nth iteration into f ( q n + 1 ) , it is easy to obtain f ( q n ) = ( P 1 μ + σ 2 + P 2 γ ) ( q n + 1 q n ) 0 and thus q n + 1 q n . Increasing the value of q with the iteration number, f ( q ) will finally be reduced and finally be equal to zero after sufficient iterations and optimal q * can be deduced by f ( q * ) = 0 . Therefore, it is clear to conclude that the proposed algorithm is convergent and stops at an optimal solution.
The arithmetic cost of the Dinkelbach approach is in the order of O ( log ( n M ) ) , where n is a number of variables and M = max i { 1 , 2 , } ( c i , d i , 1 ) with c i ’s being the coefficients of numerator and d i ’s being the coefficients of the denominator in the optimization fraction-form function.
When the side lobe of gNB interferes with the WUE and the side lobe of WiGig has no interference with the UE, the WUE can access the spectrum and the sum-rate maximization problem is formulated as
P-1 : max P 1 , P 2 , I 2 t h F ( P 1 , P 2 , I 1 t h , I 2 t h ) = log 2 1 + P 1 α σ 2 + log 2 1 + P 2 γ P 1 μ + σ 2 s . t . 0 P 1 μ I 2 t h , 0 P 1 P max , 0 P 2 P max , 0 I 2 t h P max .
In the P-1, the first-order derivatives of objective function with respect to P 1 and P 2 are F P 1 = P 2 γ α σ 2 + P 1 α P 2 γ lg 2 P 2 γ α P 1 α + σ 2 P 2 γ + P 1 α + σ 2 lg 2 > 0 and F P 2 = γ P 1 μ + σ 2 + P 2 γ ln 2 > 0 , respectively. Thus, the objective function is the increasing function with respect to P 1 and P 2 . The optimal transmit power of gNB and WiGig is P 1 = min I 2 t h μ , P max and P 2 = P max .
When the interference received by the UE or WUE is above the threshold, the two communications cannot occur simultaneously and the NR-U system cannot access the spectrum to protect the incumbent user in the unlicensed spectrum. The sum-rate maximization problem can be formulated as max P 1 , P 2 , I 2 t h log 2 1 + P 1 α σ 2 conditioned on I 2 t h min P 1 μ , P max or I 1 t h min P 2 β , P max . As we can see the objective function is increasing function with respect to P 1 , the optimal transmit power for P 1 in this situation is as follows: when P 1 μ P max , P 1 o p t = P max μ ; when P 1 μ P max , P 1 o p t = P max . Due to the gNB being unable to access the unlicensed spectrum, the transmit power P 2 does not exist.
When the directions of two communications are the same, which causes mutual interference for the coexistence systems, the two communications cannot occur simultaneously. However, when the interference is below the threshold, UE and WUE can also both access the unlicensed spectrum. The situation and analysis are similar to the case in which the directions of the two communications are opposite. We omit it here for brevity.

5. Spectrum Access Analysis for the Communication with Blockage

Assuming the main lobe gain of gNB is G B , M , the beamwidth of the main lobe is θ B , M , and the sidelobe gain is G B , S , with a beam width of sidelobe θ B , S . The primary user’s receive beam has a main lobe gain of G U , M , and sidelobe gain G U , S . Similarly, WiGig’s transmit beam main lobe gain is G W , M , with a main lobe width of θ W , M and a sidelobe gain of G W , S , and a sidelobe width of θ W , S , the WUE’s receive beam main lobe gain G W U , M and sidelobe gain G W U , S .
Based on a uniform random 2-D distribution assumption of all the nodes, the probabilities that this node lies in the mainbeam and sidebeam directions of NR-U gNB are given by P B , M = θ W , M 2 π with G B = G B , M and P B , S = 1 P B , M with G B = G B , S .
The pathloss of LOS and NLOS is, respectively, expressed as
P L L O S d = 32.4 + 17.3 log 10 d + 20 log 10 f c = A · d 1.73 , P L N L O S d = 32.4 + 31.9 log 10 d + 20 log 10 f c = A · d 3.19 .
Considering the existence of blockage, we adopt the 3GPP indoor LOS probability model as follows [44]
p L O S d 2 D = 1 , d 2 D 5 m exp d 2 D 5 70.8 , 5 m < d 2 D 49 m exp d 2 D 49 211.7 , d 2 D > 49 m .
Therefore, the average path loss is
P L d 2 D = p L O S d 2 D P L L O S d 2 D + 1 p L O S d 2 D P L N L O S d 2 D .
When gNB, UE, WiGig, and WUE are in the same line and the two communications are in the same directions, according to the proposed spectrum sensing strategy, WUE can detect the interference from the gNB and thus, the two communications cannot occur simultaneously. However, when there are blocks between the two communications as shown in Figure 6, the interference is greatly reduced and the two communications can occur at the same time. To evaluate the maximum interference received by the WUE, we assume the interference received by the mainbeam of the WUE. In this situation, the interference is expressed as
I = P B , M p N L O S I B , M = P B , M p N L O S P B , t H P L N L O S + G B , M + G U , M = θ W , M 1 exp d 5 70.8 2 π P B , t A · d 3.19 + 10 log 10 N B + 2 G e l e + 10 log 10 N w u e .
Thus, the probability of unlicensed spectrum access, which is defined as the probability of interference below the threshold, is calculated as
P = Pr I < I t h = Pr H < A · d 3.19 P B , t I t h 2 π θ W , M 1 exp d 5 70.8 10 log 10 N B 2 G e l e 10 log 10 N w u e = 1 e A · d 3.19 P B , t I t h 2 π θ W , M 1 exp d 5 70.8 10 log 10 N B 2 G e l e 10 log 10 N w u e 2 σ 2 .
Proof. 
see Appendix B.   □
Compared with the coexistence system situation without the blockage, WUE will receive stronger interference, which is expressed as
I = P B , M p L O S I B , M = P B , M p L O S P B , t H P L L O S + G B , M + G U , M = θ W , M exp d 5 70.8 2 π P B , t A · d 1.73 + 10 log 10 N B N w u e + 2 G e l e .
According to the definition of access probability, the access probability is derived as
P = Pr I < I t h = Pr H < A · d 1.73 P B , t I t h 2 π θ W , M exp d 5 70.8 10 log 10 N B N w u e 2 G e l e = 1 e A · d 1.73 2 σ 2 P B , t I t h 2 π θ W , M exp d 5 70.8 10 log 10 N B N w u e 2 G e l e .
When the WUE is not in the mainbeam of gNB, according to the proposed strategy and under the perfect beam without the sidebeam, the two communications can occur simultaneously. However, there is a sidebeam in the antenna pattern in reality and thus, the two communications possibly cannot occur simultaneously in this situation. Then, the interference is deduced as
I = P B , S p L O S I B , S = P B , S p L O S P B , t H P L L O S + G B , M G B . l o s s ϕ + G U , M = 1 θ W , M 2 π exp d 2 D 5 70.8 P B , t H A · d 1.73 + 10 log 10 N B N w u e + 2 G e l e 12 36 ϕ 13 π 2 .
The unlicensed spectrum access probability is
P = Pr I < I t h = Pr H < A · d 1.73 P B , t I t h 1 θ W , M 2 π exp d 2 D 5 70.8 10 log 10 N B N w u e 2 G e l e + 12 36 ϕ 13 π 2 = 1 exp A · d 1.73 2 σ 2 P B , t I t h 1 θ W , M 2 π exp d 2 D 5 70.8 10 log 10 N B N w u e 2 G e l e + 12 36 ϕ 13 π 2 .
Compared with the coexistence situation with the blockage, the received interference of WUE is calculated as
I = P B , S p N L O S I B , S = P B , S p N L O S P B , t H P L N L O S + G B , M G B . l o s s ϕ + G U , M = 1 θ W , M 2 π 1 exp d 2 D 5 70.8 P B , t H A · d 3.19 + 10 log 10 N B N w u e + 2 G e l e 12 36 ϕ 13 π 2 .
The unlicensed spectrum access probability can then be derived as
P = Pr I < I t h = Pr H < A · d 3.19 P B , t I t h 1 θ W , M 2 π 1 exp d 2 D 5 70.8 10 log 10 N B N w u e 2 G e l e + 12 36 ϕ 13 π 2 = 1 exp A · d 3.19 2 σ 2 P B , t I t h 1 θ W , M 2 π 1 exp d 2 D 5 70.8 10 log 10 N B N w u e 2 G e l e + 12 36 ϕ 13 π 2 .
The above analysis compares four unlicensed spectrum access scenarios: WiGig communication within gNB main lobe with obstacles between the two communicating systems, WiGig communication within gNB main lobe without obstacles between the communicating systems, WiGig communication within gNB sidelobe with obstacles between the communicating systems, and WiGig communication within gNB sidelobe without obstacles between the communicating systems. The interference and spectrum access probabilities are obtained, respectively, in the four scenarios. The comparison results are shown in the following simulation section.

6. Simulation Results and Analysis

6.1. Parameter Settings

We consider an NR-U and a Wi-Fi coexistence network with a uniform linear array (ULA) antenna at the gNB and WiGig AP. The simulation scenario is shown in Figure 7. The simulation results are obtained by the software tool MATLAB and the parameters setting is summarized in Table 2. The number of antennas at gNB and WiGig is N t = 64 and the number of receive antennas at UE and WUE is N r = 16 . The Tx antenna gain of each antenna is set as G e l e = 8 dB [44] for the ULA antenna.
We consider one unlicensed mmWave channel with 2.16 GHz around 60 GHz [11,44]. Maximum number of shared unlicensed channels is set by one. The power density of the AWGN is −174 dBm/Hz [44].

6.2. The Performance of the Proposed Unlicensed Spectrum Access Strategy

Table 3 concludes the results for access probability and sum rate, comparing the three spectrum-sharing strategies across the four situations. Situation 1 denotes that there is no mutual interference between gNB and WiGig systems. In this situation, the three strategies achieve the same access opportunities, i.e., both systems can simultaneously access the unlicensed spectrum and thus, have the same sum rate. In situation 2, there is mutual interference between gNB and WiGig systems. For JOL-BT, communication always occurs between the transmitter and receiver no matter whether the interference is strong in the communication direction. The transmitter and receiver can jointly select the other direction with weaker interference to communicate. Therefore, communication exists all the time and the access probability and sum rate are higher than the other two strategies. In the IDL-BT scheme, the transmitter and receiver independently execute the LBT process first. Then, the transmitter and receiver establish a communication link in the direction with less interference even if this link is not the optimal communication link. In situation 3, the gNB system interferes with the WiGig system but the WiGig system has no interference on the gNB system and situation 4 is opposed. In these two situations, the JOL-BT can still access the spectrum and communicate even if there is interference. So, the access probability and sum rate are the biggest. However, according to the other two schemes, only one system can access the unlicensed spectrum. Therefore, the sum rate of IDL-BT and CO-BT-LBT is lower than that of JOL-BT. Although the access probability and sum rate of the proposed unlicensed spectrum access strategy is no higher than the other two strategies, the proposed spectrum access strategy can solve the false alarm and miss detection problem in the beamforming direction-based millimeter communication with the lower complexity.
In Figure 8, the received power at UE of the proposed spectrum access strategy is compared with the existing spectrum access strategies, i.e., JOL-BT spectrum access strategy and IDL-BT spectrum access strategy. It needs to be pointed out that there is no power control algorithm in this figure. We focus on beam scanning and spectrum sensing. Different spectrum access strategies have different access probabilities and may select different transmit and receive beam pairs to communicate, which are closely related to the received power. From the figure, we can see that the received power under the JOL-BT is the highest. The received power of the proposed spectrum access strategy is relatively lower. That is because, in the JOL-BT scheme, communication always occurs between the transmitter and receiver no matter whether the interference is strong in the communication direction. The transmitter and receiver can jointly select the other direction with weaker interference to communicate. Therefore, the communication exists all the time. In IDL-BT, the transmitter and receiver independently execute the LBT process first. Then, the transmitter and receiver establish a communication link in the direction with less interference. This strategy involves establishing a communication link as long as there is a direction with interference below the threshold even if this link is not the last link. In our proposed spectrum access strategy, beam training is first performed to select the optimal communication link. Then the LBT process is conducted on the selected communication link to detect the interference. If the interference is above the threshold, the communication is interrupted and otherwise, communication is established. Therefore, communication only occurs if there is no interference or very little interference in the communication direction. That is the reason why the received power at the user is relatively lower than the JOL-BT and IDL-BT strategies. However, the complexity of our proposed access strategy is also lower than the other two strategies and the proposed spectrum access strategy can solve the false alarm and miss detection problem in the beamforming direction-based millimeter communication.
Figure 9 shows the sum rate varying with the average SNR under different detection thresholds. We can see that the sum rate with the optimal threshold obtained by the Dinkelbach algorithm achieves the maximal sum rate. The sum rate with the lower threshold has the lowest sum rate. That is because, under the lower interference detection threshold, the channel is detected busy in most cases. Thus, the UE can not access the channel and the two communications can not occur simultaneously, which results in the lowest sum rate. Also, we see that the half of maximal transmit power, which is the cut-off point [23], is not optimal and this case cannot obtain the maximal sum rate.
Figure 10 compares the access probability versus transmit power under different interference thresholds. As we can see, when the interference threshold increases, the access probability rises too. This is because when the interference threshold increases, the UE can tolerate more interference and according to the energy detection criterion, the UE has a higher probability to access the spectrum. However, the higher the interference threshold becomes, the rate of UE is lower due to the lower SINR. From Figure 10, we can also see that the spectrum access probability decreases with the larger transmit power due to that the larger transmit power brings the higher interference to the UE and thus the lower access probability.
Figure 11 compares the spectrum access probability under different situations, i.e., WUE in the main lobe of gNB with LoS link, WUE in the main lobe of gNB with blockage, in the side lobe of gNB with LoS link and in the side lobe of gNB with blockage. From the figure, we can see the access probability of a situation where WUE is in the main lobe of gNB with blockage, is the highest. This is because the probability of WUE falling in the mainbeam of gNB is larger than that of WUE falling in the sidebeam of gNB. The interference of WUE received from the gNB with blockage is lower than that without blockage. The access probability of a situation with WUE in the side lobe of gNB and having an LoS link is the lowest. That is because the probability of WUE falling within the sidebeam is lower than other situations and the interference received by the WUE from the gNB without blockage is higher. Thus, the channel is detected busy by the WUE and to protect the incumbent user, the UE cannot access the unlicensed spectrum.
Figure 12 describes the system sum rate under different situations. As we can see, conditioned on UE and WUE simultaneously transmitting signals, the sum rate of WUE in the side lobe of gNB with blockage is the highest. That is because this case results in the lowest interference received by the WUE from the gNB. In this situation, the WUE has the highest SINR and access probability. According to Shannon capacity C = p a B log 2 1 + SINR where p a is the access probability and SINR is the signal-interference-noise-ratio, the system has the highest sum rate. The WUE in the main lobe of gNB without blockage receives the highest interference and the lowest SINR. Thus, the coexisting system has the lowest sum rate. For the cases of WUE in the main lobe of gNB with blockage and WUE in the side lobe of gNB without blockage, the WUE receives about equal interference, which indicates that the main lobe gain of gNB with blockage is reduced to equal to the small side lobe gain of gNB without blockage. Moreover, when WUE is in the main lobe of gNB with blockage, it can access the unlicensed spectrum with high access probability due to the lower interference. This case can achieve a sum rate of about 2.43 bits/s/Hz higher than WUE in the same beam lobe of gNB but with no blockage.
Figure 13 shows the relationship between the access probability and the sum rate of the coexistence system. As we can see the access probability changes with the system throughput proportionally overall. However, the sum rate of the situation of WUE in the sidebeam of gNB with blockage is the highest and the sum rate of the situation of WUE in the mainbeam of gNB without blockage is the lowest. The reason is easy to see. The WUE in the sidebeam of gNB with blockage has the highest access probability and the lowest interference due to the blockage and thus the highest sum rate. The WUE in the mainbeam of gNB without blockage has the highest interference and lowest SINR compared to the four situations mentioned in Figure 13.
Figure 14 presents the trend of the sum rate with the main lobe beamwidth θ B , W . As we can see, when the main lobe beamwidth θ B , W increases, the sum rate of the situation of WUE in the mainbeam without blockage decreases. This is because when the main lobe beamwidth θ B , W of gNB increases, the probability of UE accessing the unlicensed spectrum decreases due to the higher probability of interfering with the WUE, and thus, the sum rate of the coexistence system decreases. In other cases, the trend of the system sum rate changing with the main lobe bandwidth is not significant. This is because an increase in the main lobe bandwidth results in a higher probability of the WUE falling within the main lobe, but the increased main lobe bandwidth also reduces the interference caused to the WUE. The advantages and disadvantages offset each other, resulting in minimal overall change in the sum rate.

7. Conclusions

This study introduces a novel cooperative spectrum sensing strategy for NR-U/WiGig coexistence in UAV communication systems. This method enhances traditional LBT approaches by exploiting beam directionality and effectively mitigates the challenges of hidden and exposed nodes of traditional LBT technology, improving spectrum sharing fairness and efficiency. Our analysis also shows that environmental obstacles, despite attenuating signals, boost system capacity by about 70% by increasing access probabilities by about 60%. Simulation results validate the effectiveness of our strategy in improving spectrum access and performance, even amid physical obstructions. This research advances unlicensed spectrum-sharing techniques, ensuring equitable and optimal utilization of millimeter wave bands in future UAV communication networks.

Author Contributions

Z.H.: conceptualization, methodology, software, and writing—original draft preparation. Y.X.: conceptualization, software, and writing—review and editing. Y.D.: conceptualization, software, and writing—review and editing. Z.Z.: conceptualization, resources, writing–review and editing, supervision, project administration, and funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by NSFC under Grant 62101076, in part by NSFSC under Grant 2022NSFSC0920, and in part by Talent Introduction Research Startup Project under Grant 376157.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest for publishing in this journal.

Appendix A. The Proof of Equivalence of P and P-D

Firstly, let ( P 1 * , P 2 * , I 1 t h , * , I 2 t h , * ) be a solution of (6) and we have
q * = max P 1 , P 2 , I 1 t h , I 2 t h P 2 β + σ 2 + P 1 α P 1 μ + σ 2 + P 2 γ P 2 β + σ 2 + P 1 α P 1 μ + σ 2 + P 2 γ , f o r a l l { P 1 , P 2 , I 1 t h , I 2 t h } S ,
where S is the feasible solution space. From (A1), we can deduce that P 2 β + σ 2 + P 1 α q * ( P 1 μ + σ 2 + P 2 γ ) 0 for all { P 1 , P 2 , I 1 t h , I 2 t h } S and P 2 * β + σ 2 + P 1 * α q * ( P 1 * μ + σ 2 + P 2 * γ ) = 0 .
So,
F ( q * ) = max P 1 , P 2 , I 1 t h , I 2 t h P 2 β + σ 2 + P 1 α q * P 1 μ + σ 2 + P 2 γ = 0
From (A2), the maximum is taken on at ( P 1 * , P 2 * , I 1 t h , * , I 2 t h , * ) . Thus the optimum solution of (6) is also optimal for (7).
Next, we prove that the optimum solution of (7) is also optimal for (6). Let ( P 1 * , P 2 * , I 1 t h , * , I 2 t h , * ) be the optimal solution of (7) such that P 2 * β + σ 2 + P 1 * α q * P 1 * μ + σ 2 + P 2 * γ = 0 . The definition of (7) implies
P 2 β + σ 2 + P 1 α q * P 1 μ + σ 2 + P 2 γ P 2 * β + σ 2 + P 1 * α q * P 1 * μ + σ 2 + P 2 * γ = 0
From (A3), we can deduce that q * = P 2 * β + σ 2 + P 1 * α P 1 * μ + σ 2 + P 2 * γ , which means ( P 1 * , P 2 * , I 1 t h , * , I 2 t h , * ) is a solution to the problem (6). So, the solution of problem (7) is also the solution of problem (6). The proof is completed.

Appendix B. The Proof of Equation (14)

According to the definition of unlicensed spectrum access probability, which is the probability of interference below the threshold, the spectrum access probability is calculated as
P = Pr I I t h .
By substituting (13) into (A4), we obtain the unlicensed spectrum access probability as
P = Pr I < I t h = Pr P B , t H 1 exp d 5 70.8 A · d 3.19 + 10 log 10 N B N w u e + 2 G e l e < 2 π I t h θ W , M = Pr H < I t h 2 π θ W , M 10 log 10 N B N w u e 2 G e l e 1 exp d 5 70.8 A · d 3.19 P B , t = 1 e 1 exp d 5 70.8 A · d 3.19 P B , t I t h 2 π θ W , M 10 log 10 N B N w u e 2 G e l e 2 σ 2
where the parameter H is the channel power gain. In this study, the channel is modeled as the Rayleigh channel with the parameter σ to capture the small-scale fading for the channel. Therefore, the channel power gain H is the exponential distribution. The last equation is derived by exploiting the cumulative distribution function (CDF) of the exponential distribution, i.e., F ( x , λ ) = 1 e λ x with λ = 1 2 σ 2 [49]. The proof is completed.

References

  1. Chaves, A.N.; Cugnasca, P.S.; Jose, J. Adaptive search control applied to Search and Rescue operations using Unmanned Aerial Vehicles (UAVs). IEEE Lat. Am. Trans. 2014, 12, 1278–1283. [Google Scholar] [CrossRef]
  2. Chen, H.; Lan, Y. Review of Agricultural Spraying Technologies for Plant Protection Using Unmanned Aerial Vehicle (UAV). Int. J. Agric. Biol. Eng. 2021, 14, 38–49. [Google Scholar] [CrossRef]
  3. Yao, P.; Wang, H.; Ji, H. Multi-UAVs Tracking Target in Urban Environment by Model Predictive Control and Improved Grey Wolf Optimizer. Aerosp. Sci. Technol. 2016, 55, 131–143. [Google Scholar] [CrossRef]
  4. Su, Y.; Huang, L.; LiWang, M. Joint Power Control and Time Allocation for UAV-Assisted IoV Networks Over Licensed and Unlicensed Spectrum. IEEE Internet Things J. 2024, 11, 1522–1533. [Google Scholar] [CrossRef]
  5. Ye, X.; Zhou, Q.; Fu, L. Deep Reinforcement Learning-Based Scheduling for NR-U/WiGig Coexistence in Unlicensed mmWave Bands. IEEE Trans. Wirel. Commun. 2024, 23, 58–73. [Google Scholar] [CrossRef]
  6. 5G Americas. 5G Spectrum Recommendations; 5G Americas: Bellevue, WA, USA, 2017. [Google Scholar]
  7. 3GPP TR 38.805. Study on New Radio Access Technology, 60 GHz Unlicensed Spectrum (Release 14); V14.0.0. Technical Report. March 2017. Available online: https://ieeexplore.ieee.org/document/8493138/authors#authors (accessed on 13 May 2020).
  8. Semiari, O.; Saad, W.; Bennis, M.; Debbah, M. Integrated Millimeter Wave and Sub-6 GHz Wireless Networks: A Roadmap for Joint Mobile Broadband and Ultra-Reliable Low-Latency Communications. IEEE Wirel. Commun. 2019, 26, 109–115. [Google Scholar] [CrossRef]
  9. Lagen, S.; Giupponi, L.; Goyal, S.; Patriciello, N.; Bojović, B.; Demir, A.; Beluri, M. New Radio Beam-Based Access to Unlicensed Spectrum: Design Challenges and Solutions. IEEE Commun. Surv. Tutor. 2020, 22, 8–37. [Google Scholar] [CrossRef]
  10. Wang, P.; Di, B.; Song, L. Cellular Communications Over Unlicensed mmWave Bands With Hybrid Beamforming. IEEE Trans. Wirel. Commun. 2022, 21, 6064–6078. [Google Scholar] [CrossRef]
  11. Multiple-Gigabit/s Radio Equipment Operating in the 60 GHz Band—Harmonised Standard Covering the Essential Requirements of Article 3.2 of Directive 2014/53/EU; ETSI EN 302 567 V2.1.1, 2014; ETSI: Valbonne, France, 2014.
  12. Sun, X.; Dai, L. Towards Fair and Efficient Spectrum Sharing Between LTE and WiFi in Unlicensed Bands: Fairness-Constrained Throughput Maximization. IEEE Trans. Wirel. Commun. 2020, 19, 2713–2727. [Google Scholar] [CrossRef]
  13. Lin, Y.; Sun, X.; Gao, Y.; Zhan, W.; Wang, X.; Chen, X. Fair and Efficient Spectrum Sharing in Unlicensed Bands: Does Number of Links Matter? IEEE Trans. Veh. Technol. 2023, 72, 9459–9471. [Google Scholar] [CrossRef]
  14. Wang, W.; Zeng, M.; Fei, Z. Receiver Assisted LBT Mechanism Design for Beam-based Transmission in Unlicensed Bands. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020; pp. 770–775. [Google Scholar]
  15. Patriciello, N.; Lagen, S.; Bojović, B.; Giupponi, L. NR-U and IEEE 802.11 Technologies Coexistence in Unlicensed mmWave Spectrum: Models and Evaluation. IEEE Access 2020, 8, 71254–71271. [Google Scholar] [CrossRef]
  16. Coexistence and channel access for NR unlicensed band operation. In Proceedings of the 3GPP TSG RAN WG1 90 Meeting, R1-1713785, Huawei, Qingdao, China, 27–30 June 2017.
  17. Lagen, S.; Giupponi, L.; Bojovic, B.; Demir, A.; Beluri, M. Paired Listen before Talk for Multi-RAT Coexistence in Unlicensed mmWave Bands. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  18. Lagen, S.; Giupponi, L.; Patriciello, N. LBT Switching Procedures for New Radio-Based Access to Unlicensed Spectrum. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  19. Song, H. The Research on Key Technology for the High Performance Unlicensed Spectrum Wireless Communicaiton Systems. Ph.D. Thesis, The University of Southwest Transportation, Chengdu, China, 2017. [Google Scholar]
  20. Luo, J.; Zaidi, A.; Vihriälä, J.; Giustiniano, D. Preliminary radio interface concepts for mmwave mobile communications. In Millimetre-Wave Based Mobile Radio Access Network for Fifth Generation Integrated Communications (mmMAGIC) Deliverable D4.1; mmMAGIC project 4: 1; European Commission: Brussels, Belgium, 2016. [Google Scholar]
  21. Lagen, S.; Giupponi, L. Listen before receive for coexistence in unlicensed mmWave bands. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
  22. Tandon, A. Closed loop LBT for license assisted NR in unlicensed bands. In Proceedings of the 3GPP R1-1802611, 3GPP TSG RAN WG1 92 Meeting, Spokane, WA, USA, 12–16 February 2018. [Google Scholar]
  23. Li, P.; Liu, D.; Yu, F. Joint Directional LBT and Beam Training for Channel Access in Unlicensed 60 GHz mmWave. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  24. Oni, P.B.; Blostein, S.D. Optimal Node Density for Multi-RAT Coexistence in Unlicensed Spectrum. In Proceedings of the 2019 16th Canadian Workshop on Information Theory (CWIT), Hamilton, ON, Canada, 2–5 June 2019. [Google Scholar]
  25. Daraseliya, A.; Korshykov, M.; Sopin, E.; Moltchanov, D.; Andreev, S.; Samouylov, K. Coexistence Analysis of 5G NR Unlicensed and WiGig in Millimeter-Wave Spectrum. IEEE Trans. Veh. Technol. 2021, 70, 11721–11735. [Google Scholar] [CrossRef]
  26. Hu, H.; Gao, Y.; Zhang, J.; Chu, X.; Chen, Q.; Zhang, J. On the Fairness of the Coexisting LTE-U and WiFi Networks Sharing Multiple Unlicensed Channels. IEEE Trans. Veh. Technol. 2020, 69, 13890–13904. [Google Scholar] [CrossRef]
  27. Wang, J.; Zhu, Q.; Lin, Z.; Chen, J.; Ding, G.; Wu, Q.; Gu, G.; Gao, Q. Sparse Bayesian Learning-Based Hierarchical Construction for 3D Radio Environment Maps Incorporating Channel Shadowing. IEEE Trans. Wirel. Commun. 2024. early access. [Google Scholar] [CrossRef]
  28. Tan, X.; Zhou, L.; Wang, H.; Sun, Y.; Zhao, H.; Seet, B.C.; Wei, J.; Leung, V.C.M. Cooperative Multi-Agent Reinforcement-Learning-Based Distributed Dynamic Spectrum Access in Cognitive Radio Networks. IEEE Internet Things J. 2022, 9, 19477–19488. [Google Scholar] [CrossRef]
  29. Ye, X.; Yu, Y.; Fu, L. Multi-Channel Opportunistic Access for Heterogeneous Networks Based on Deep Reinforcement Learning. IEEE Trans. Wirel. Commun. 2022, 21, 794–807. [Google Scholar] [CrossRef]
  30. Tan, J.; Zhang, L.; Liang, Y.C.; Niyato, D. Intelligent Sharing for LTE and WiFi Systems in Unlicensed Bands: A Deep Reinforcement Learning Approach. IEEE Trans. Commun. 2020, 68, 2793–2808. [Google Scholar] [CrossRef]
  31. Doshi, A.; Yerramalli, S.; Ferrari, L.; Yoo, T.; Andrews, J.G. A Deep Reinforcement Learning Framework for Contention-Based Spectrum Sharing. IEEE J. Sel. Areas Commun. 2021, 39, 2526–2540. [Google Scholar] [CrossRef]
  32. Yu, Y.; Liew, S.C.; Wang, T. Non-Uniform Time-Step Deep Q-Network for Carrier-Sense Multiple Access in Heterogeneous Wireless Networks. IEEE Trans. Mob. Comput. 2021, 20, 2848–2861. [Google Scholar] [CrossRef]
  33. Hirzallah, M.; Krunz, M. Sense-Bandits: AI-based Adaptation of Sensing Thresholds for Heterogeneous-technology Coexistence Over Unlicensed Bands. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021; pp. 1–9. [Google Scholar]
  34. Liu, J.; Deng, C.; Ma, D.; Zhang, Q.; Yu, K. A DQN-Based Fair Coexistence Scheme for NR-U and WiGig in Unlicensed mmWave Bands. In Proceedings of the 2023 9th International Conference on Computer and Communications (ICCC), Chengdu, China, 8–11 December 2023; pp. 561–566. [Google Scholar]
  35. Chen, Q.; Yang, K.; Jiang, H.; Qiu, M. Joint Beamforming Coordination and User Selection for CoMP-Enabled NR-U Networks. IEEE Internet Things J. 2022, 9, 14530–14541. [Google Scholar] [CrossRef]
  36. Ye, X.; Fu, L. Joint Codebook Selection and UE Scheduling for Unlicensed MmWave NR-U/WiGig Coexistence Based on Deep Reinforcement Learning. IEEE Trans. Mob. Comput. 2024, 23, 8919–8934. [Google Scholar] [CrossRef]
  37. Pi, Z.; Khan, F. An introduction to millimeter-wave mobile broadband systems. IEEE Commun. Mag. 2011, 49, 101–107. [Google Scholar] [CrossRef]
  38. Anderson, C.; Rappaport, T. In-building wideband partition loss measurements at 2.5 and 60 GHz. IEEE Trans. Wirel. Commun. 2004, 3, 922–928. [Google Scholar] [CrossRef]
  39. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  40. Khordad, E.; Collings, I.B.; Hanly, S.V.; Caire, G. Millimeter Wave Beam Alignment with Symbol Based Beam Switching for Wideband Time-varying Channels. In Proceedings of the 2021 15th International Conference on Signal Processing and Communication Systems (ICSPCS), Sydney, Australia, 13–15 December 2021; pp. 1–5. [Google Scholar]
  41. Wang, S.; Bi, S. Improving Beam Alignment Accuracy in mmWave Communication Systems with Auxiliary Tasks. IEEE Signal Process. Lett. 2023, 30, 992–996. [Google Scholar] [CrossRef]
  42. Heng, Y.; Mo, J.; Andrews, J.G. Learning Site-Specific Probing Beams for Fast mmWave Beam Alignment. IEEE Trans. Wirel. Commun. 2022, 21, 5785–5800. [Google Scholar] [CrossRef]
  43. Zhang, Y.; Heath, R.W. Reinforcement Learning-Based Joint User Scheduling and Link Configuration in Millimeter-Wave Networks. IEEE Trans. Wirel. Commun. 2023, 22, 3038–3054. [Google Scholar] [CrossRef]
  44. Network, T.S.G.R.A. Study on Channel Model for Frequencies from 0.5 to 100 GHz; document tr 38.901, v16.1.0, 3rd Generation Partnership Project (3GPP); ETSI: Valbonne, France, 2019. [Google Scholar]
  45. Zhang, H.; Liu, N.; Long, K.; Cheng, J.; Leung, V.C.M.; Hanzo, L. Energy efficient subchannel and power allocation for software-defined heterogeneous VLC and RF networks. IEEE J. Sel. Areas Commun. 2018, 36, 658–670. [Google Scholar] [CrossRef]
  46. Jin, F.; Zhang, R.; Hanzo, L. Resource allocation under delay-guarantee constraints for heterogeneous visible-light and RF Femtocell. IEEE Trans. Wirel. Commun. 2015, 14, 1020–1034. [Google Scholar] [CrossRef]
  47. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 13, 492–498. [Google Scholar] [CrossRef]
  48. Wu, Q.; Li, G.Y.; Chen, W.; Ng, D.W.K. Energy-efficient small cell with spectrum-power trading. IEEE J. Sel. Areas Commun. 2016, 34, 3394–3408. [Google Scholar] [CrossRef]
  49. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: New York, NY, USA, 2014. [Google Scholar]
Figure 1. Co-location of UE and WUE in a NR-U/WiGig coexistence system.
Figure 1. Co-location of UE and WUE in a NR-U/WiGig coexistence system.
Drones 08 00439 g001
Figure 2. False alarm and miss detection problems in a NR-U/WiGig coexistence system.
Figure 2. False alarm and miss detection problems in a NR-U/WiGig coexistence system.
Drones 08 00439 g002
Figure 3. The scenario of gNB, WiGig, UE, and WUE aligned in a straight line.
Figure 3. The scenario of gNB, WiGig, UE, and WUE aligned in a straight line.
Drones 08 00439 g003
Figure 4. The proposed spectrum sensing access protocol flowchart.
Figure 4. The proposed spectrum sensing access protocol flowchart.
Drones 08 00439 g004
Figure 5. The frame structures of gNB and WiGig for coexistence systems.
Figure 5. The frame structures of gNB and WiGig for coexistence systems.
Drones 08 00439 g005
Figure 6. The unlicensed spectrum coexistence systems with blockage.
Figure 6. The unlicensed spectrum coexistence systems with blockage.
Drones 08 00439 g006
Figure 7. The Simulation System Model for Coexistence in Unlicensed Spectrum.
Figure 7. The Simulation System Model for Coexistence in Unlicensed Spectrum.
Drones 08 00439 g007
Figure 8. Received Power Comparison with Different Spectrum Access Strategies.
Figure 8. Received Power Comparison with Different Spectrum Access Strategies.
Drones 08 00439 g008
Figure 9. Sum Rate Comparison with Different Interference Threshold under the Proposed Spectrum Access Strategy.
Figure 9. Sum Rate Comparison with Different Interference Threshold under the Proposed Spectrum Access Strategy.
Drones 08 00439 g009
Figure 10. Access Probability Comparison with Different Interference Threshold.
Figure 10. Access Probability Comparison with Different Interference Threshold.
Drones 08 00439 g010
Figure 11. Access Probability Comparison with and without Blockage.
Figure 11. Access Probability Comparison with and without Blockage.
Drones 08 00439 g011
Figure 12. Sum Rate Comparison with and without Blockage.
Figure 12. Sum Rate Comparison with and without Blockage.
Drones 08 00439 g012
Figure 13. Sum Rate Versus Access Probability.
Figure 13. Sum Rate Versus Access Probability.
Drones 08 00439 g013
Figure 14. Sum Rate Versus mainbeamwidth of gNB, θ B , M .
Figure 14. Sum Rate Versus mainbeamwidth of gNB, θ B , M .
Drones 08 00439 g014
Table 1. The complexity of channel access schemes.
Table 1. The complexity of channel access schemes.
Channel Access ModeNumeric Complexity
IDL-BT [23] K 1 + M 1 + 3 K 2 M 2
JOL-BT [23] K 1 + M 1 + K 2 M 2 + K 2 M
CO-BT-LBT K 2 M 2 + 2
Table 2. Simulation Parameters.
Table 2. Simulation Parameters.
NotationParameter DefinitionValueUnit
N t The number of
transmit antennas at
gNB and WiGig
64-
N r The number of
receive antennas at
UE and WUE
16-
G e l e The Tx antenna gain
of each antenna
8dB
BTotal bandwidth2.16GHz
f c The center frequency60GHz
d 1 The distance between
gNB and WiGig
15m
d 2 The distance between
gNB and UE
6m
d 3 The distance between
WiGig and WUE
1m
d 4 The distance between
gNB and WUE
20m
d 5 The distance between
WiGig and UE
20m
N 0 The power spectrum
density of the noise
−174dBm/Hz
Table 3. Performance Comparison of the three spectrum-sharing strategies.
Table 3. Performance Comparison of the three spectrum-sharing strategies.
SituationPerformance
Access ProbabilitySum RateComplexity
Situation 1JOL-BT = IDL-BT > CO-BT-LBTJOL-BT = IDL-BT = CO-BT-LBTIDL-BT > JOL-BT > CO-BT-LBT
Situation 2JOL-BT > IDL-BT > CO-BT-LBTJOL-BT > IDL-BT = CO-BT-LBTIDL-BT > JOL-BT > CO-BT-LBT
Situation 3JOL-BT > IDL-BT > CO-BT-LBTJOL-BT = IDL-BT ≈ CO-BT-LBTIDL-BT > JOL-BT > CO-BT-LBT
Situation 4JOL-BT > IDL-BT > CO-BT-LBTJOL-BT = IDL-BT ≈ CO-BT-LBTIDL-BT > JOL-BT > CO-BT-LBT
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, Z.; Xu, Y.; Deng, Y.; Zhang, Z. Unlicensed Spectrum Access and Performance Analysis for NR-U/WiGig Coexistence in UAV Communication Systems. Drones 2024, 8, 439. https://doi.org/10.3390/drones8090439

AMA Style

Hu Z, Xu Y, Deng Y, Zhang Z. Unlicensed Spectrum Access and Performance Analysis for NR-U/WiGig Coexistence in UAV Communication Systems. Drones. 2024; 8(9):439. https://doi.org/10.3390/drones8090439

Chicago/Turabian Style

Hu, Zhenzhen, Yong Xu, Yonghong Deng, and Zhongpei Zhang. 2024. "Unlicensed Spectrum Access and Performance Analysis for NR-U/WiGig Coexistence in UAV Communication Systems" Drones 8, no. 9: 439. https://doi.org/10.3390/drones8090439

Article Metrics

Back to TopTop