Next Article in Journal
On the Impulse Response of Singular Discrete LTI Systems and Three Fourier Transform Pairs
Previous Article in Journal
Digital Signal Processing (DSP)-Oriented Reduced-Complexity Algorithms for Calculating Matrix–Vector Products with Small-Order Toeplitz Matrices
Previous Article in Special Issue
Resource Allocation of UAV-Assisted IoT Node Secure Communication System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Noncooperative Spectrum Sensing Strategy Based on Recurrence Quantification Analysis in the Context of the Cognitive Radio

1
LABSTICC UMR CNRS 6285, Université de Bretagne Occidentale, 29238 Brest, France
2
Lab-STICC, UMR 6285, ENSTA Bretagne, 29806 Brest, France
*
Author to whom correspondence should be addressed.
Signals 2024, 5(3), 438-459; https://doi.org/10.3390/signals5030022
Submission received: 24 July 2023 / Revised: 18 June 2024 / Accepted: 25 June 2024 / Published: 1 July 2024
(This article belongs to the Special Issue Advances in Wireless Sensor Network Signal Processing)

Abstract

:
This paper addresses the problem of noncooperative spectrum sensing in very low signal-to-noise ratio (SNR) conditions. In our approach, detecting an unoccupied bandwidth consists of detecting the presence or absence of a communication signal on this bandwidth. Digital communication signals may contain hidden periodicities, so we use Recurrence Quantification Analysis (RQA) to reveal the hidden periodicities. RQA is very sensitive and offers reliable estimation of the phase space dimension m or the time delay τ . In view of the limitations of the algorithms proposed in the literature, we have proposed a new algorithm to simultaneously estimate the optimal values of m and τ . The new proposed optimal values allow the state reconstruction of the observed signal and then the estimation of the distance matrix. This distance matrix has particular properties that we have exploited to propose a Recurrence-Analysis-based Detector (RAD). The RAD can detect a communication signal in a very low SNR condition. Using Receiver Operating Characteristic curves, our experimental results corroborate the robustness of our proposed algorithm compared with classic widely used algorithms.

1. Introduction

The need to make better use of the radio spectrum is leading to the development of new spectrum access strategies. Among these strategies, the opportunistic spectrum access based on the cognitive radio concepts allows the sharing of a spectral bandwidth between two categories of users: Primary User “PU” and Secondary User “SU”. The PU holds the license to exploit the bandwidth, and the SU is an opportunistic user willing to use the channel when the PU is idle. One of the most crucial challenges for the SU is the identification of a free bandwidth by conducting a spectrum sensing [1,2]. Many reliable spectrum sensing methods have been developed to help the SU limit their interference to the PU’s transmission [3,4,5,6,7,8,9,10,11]. Among the spectrum sensing approaches, we can mention Waveform Detection (WFD) [12], Cyclostationary-Features-based Detection (CFD) [13], and Energy-based Detection (ED) [14,15]. One of the most reliable methods, WFD, requires prior knowledge of the PU’s signal characteristics. Based on the cyclic spectrum estimation, the CFD requires a relatively high computational cost for a high-frequency resolution. ED is the simplest detection method, but it is unable to distinguish a communication signal from an energetic noise when the noise is not a weak-sense stationary stochastic process or the signal-to-noise ratio (SNR) is very low. Recently, spectrum sensing algorithms, based on the promising concept of machine or deep learning, have been proposed [16,17,18,19]. However, these algorithms do not perform well in a noncooperative context or at a low SNR (SNR ≤ −3 dB) and require a huge database to be optimized. To overcome these issues, we developed a blind strategy based on the Recurrence Quantification Analysis (RQA) of the received signal [20]. RQA is a nonlinear data analysis technique applied to various fields to study the dynamics of complex systems. It is particularly useful for analyzing time series data that exhibit nonlinear, nonstationary, or chaotic behavior. It is widely introduced in the financial sector, particularly in the analysis of cryptocurrencies like Bitcoin [21]. In the field of cardiology, RQA has been also employed to understand the nonlinear dynamics of heart rate variability after acutely induced myocardial ischemia by percutaneous transluminal coronary angioplasty [22]. RQA is a versatile tool that has been applied to a wide range of applications, from financial markets and cardiology to atmospheric science, urban management, and neurocognitive research. Its ability to reveal important properties of time series data, such as determinism, laminarity, stability, randomness, regularity, and complexity, makes it a valuable technique for analyzing the dynamics of complex systems across various domains [21,22,23,24,25]. In this paper, we propose to use RQA in digital communications, because it is able to reveal some intrinsic features of digital communication signals, such as hidden periodicities, stationarity features, or linearity properties. Indeed, due to modulation standards, transmitted signals may contain hidden periodicities. Using this fact, we use Recurrence Quantification Analysis (RQA) tools to detect if the bandwidth allocated to the PU is available or not. The main RQA tool used to quantify the recurrence level is the Recurrence Rate (RR), which is considered the probability of having recurring states in a signal. In a recent work, we proposed an RR-based Detector (RRD) [20]. However, the RRD is very sensitive to SNRs and depends on the choice of a recurrence threshold. To overcome the RRD’s limits, in this paper, we propose an efficient algorithm called the Recurrence-Analysis-based Detector (RAD). The RAD exploits the similitude of distances among various states of the signal in a multidimensional space. This similitude of distances is evaluated by a square symmetrical matrix named the distance matrix. Using symmetrical properties, we only exploit the upper triangular part of this matrix in order to considerably reduce the computational cost of the RAD. Then, we show that for a White Gaussian Noise (WGN), the coefficients of the first top diagonal of the distance matrix become a representative sample of all other coefficients. This is not the case for a communication signal even with a small SNR. This new approach can detect a communication signal in a very low SNR. We have analytically established the probabilities of detection P d and false alarm P f a . Through Monte Carlo simulations, we studied the Receiver Operating Characteristic (ROC) curves of the RAD. The theoretical and experimental results show the ability of the RAD to detect the presence of a communication signal as soon as the SNR is greater than −12 dB with a very low probability of a false alarm.
The rest of this paper is organized as follows: Section 2 presents the problem of spectrum sensing and our motivation for RQA. Section 3 deals with the concepts of RQA and the state of the art in the determination of embedding parameters in order to exhibit the hidden recurrences. Section 4 and Section 5 present the Recurrence-Analysis-based detector model and its theoretical and experimental performance. The last section contains the conclusion and perspectives.

2. Spectrum Sensing Problem

The radio spectrum is a limited natural resource. Many techniques, such as cooperative communication systems and heterogeneous networks, have been developed to deal with this scarcity of the radio spectrum [26]. However, none of them can meet the strong demand for radio spectrum. The cognitive radio introduced by Mitola [27,28] is a promising solution allowing dynamic access to the radio spectrum [1]. Dynamic spectrum access (DSA) is defined as a technique by which the operating spectrum of a radio network can be selected dynamically from the available spectrum [26]. The DSA allows the SU to exploit the holes in the spectrum dedicated to the PU. The great challenge of DSA for the SU remains the spectrum sensing stage, during which the SU should detect the presence of the PU on a given bandwidth.

2.1. Spectrum Sensing as a Statistical Decision

The PU’s signal detection by the SU can be modeled as a binary hypothesis testing problem, given as [26]:
  • Hypothesis H 0 : PU’s signal is absent
  • Hypothesis H 1 : PU’s signal is present
Let y ( n ) be the signal observed by the Secondary User (SU):
y ( n ) = h s ( n ) + b ( n )
where h is the channel gain and b ( n ) is the channel noise. The noise samples b k are assumed to be independent and identically distributed (i.i.d). The noise b ( n ) is a Complex Circular Gaussian variable E b ( n ) = 0 ; E | b ( n ) | 2 = σ b 2 ; E . denotes the mathematical expectation.
The Test Statistic T should be compared with a predetermined threshold λ for decision making. In this case, the probability of false alarm P f a and the probability (Pr) of detection P d [29] are defined as follows:
P f a P r { T λ | H 0 }
P d P r { T > λ | H 1 }
where ≜ stands for equal by definition.
For good performance, P d should be increased as much as possible while keeping P f a under a small preselected value. In the noncooperative spectrum sensing context, the detection algorithms should be able to find out intrinsic features of the communication signal to enhance a spectrum sensing task. One of the main features can be the recurrence of internal states in the communication signals. Hereinafter, we develop a robust algorithm based on RQA.

2.2. RQA Benefits

The RQA enjoys several specific properties:
  • RQA is based on the chaos theory and is normally used to extract the hidden recurring states of a dynamic system. The various parts of a transmission chain, such as modulation, filtering, coding, multiplexing, etc, generate hidden recurring states in the communication signals. Therefore, RQA can help detect the presence of the PU’s signal on a desired bandwidth.
  • In a previous work [20], we showed that RQA is a promising tool for the spectrum sensing task. Indeed, in a noncooperative context, we proposed the Recurrence-Rate-based detection model (RRD), and this previous algorithm was able to detect the presence of the PU’s signals with SNR 5 dB.
  • During the detection procedure, a spectrum sensing algorithm based on RQA does not require the estimation of the noise variance, as required by some spectrum sensing algorithms such as ED, which is a great advantage.
  • RQA can help detect a communication signal in a very low SNR; and contrary to ED, Recurrence Analysis can distinguish a noisy communication signal from a high energy noise.
  • RQA does not have a high computational cost like CFD. In noncooperative spectrum sensing, RQA is more robust compared with the widely used ED or CFD.

3. Recurrence Quantification Analysis

Recurrence is a fundamental feature of dynamic systems that can be exploited to study the behavior of these systems and to discover their intrinsic properties [20,30,31]. To analyze hidden recurrences in dynamic and nonlinear systems, an important concept in the chaos theory, in which RQA can be used [32,33,34,35]. During the evolution of a dynamic system, some internal states can be quasi-periodically repeated. In the phase space, the successive states of a dynamic system form trajectories that characterize the temporal evolution of the system. Knowing the temporal evolution equation, any state of the system can be precisely determined at any time. Unfortunately in real-world situations, this equation is unknown; instead, we dispose only of a sequence of scalar measurements as time series [36,37]. From these time series, we should reconstruct the phase space. The gold standard method for the phase space reconstruction is delay-coordinate embedding [36]. The objective of a delay-coordinate embedding method is to use the delayed versions of y ( n ) to form a multidimensional observable x k called state vector or state of y ( n ) . The state vector x k at moment k is defined as follows:
x k = [ y k , y k + τ , , y k + ( m 1 ) τ ] T
where y k denotes the sample of y at the moment k, τ is the time delay, and m is the embedding dimension. The main challenge for the delay-coordinate embedding method is the reliable estimation of τ and m.

3.1. Estimation of the Embedding Parameters

3.1.1. Time Delay

Theoretically, the time delay τ can be almost arbitrarily chosen if the observation y ( n ) is noise-free with an infinite number of samples. However, these conditions cannot be satisfied in real applications because of noise which can generate statistical dependence among the state vectors x k . Therefore, the time delay τ has to be wisely chosen in order to reduce this statistical dependence [20,36,38]. To determine the optimal time delay τ 0 , one can use the autocorrelation function, Average Mutual Information (AMI), or phase portrait approach. The most appropriate method is the AMI because it measures the general dependence between two random variables [39]. Therefore, it could provide a better criterion for the optimal time delay τ 0 . The concept of AMI consists, first of all, in estimating the mutual information I ( τ ) between y ( n ) and its delay version y ( n τ ) by varying the value of τ from 0 to N; N denotes the number of samples contained in y ( n ) . After that, the optimal τ 0 is chosen as the first τ value that minimizes I ( τ ) [20,40,41]. Based on Equation (1), we can conclude that I ( τ ) , and indirectly τ 0 , depends on three parameters: the SNR value, the sampling rate, and the modulation scheme. Consequently, using the AMI method to determine τ 0 is not so suitable in the context of a noncooperative spectrum sensing algorithm.

3.1.2. Phase Space Dimension

The optimal embedding dimension m 0 for an observed signal y ( n ) is the minimum dimension for the state vectors x k to give a reliable reconstruction of y ( n ) phase space [35,37]. From the literature, many approaches to estimate m 0 have been developed [38,42,43]. The most used approach is based on the False Nearest Neighbors (FNNs) method [43]. According to the principle of FNNs, any two true neighboring points in the m d i m e n s i o n a l reconstructed phase space must remain neighbors in the ( m + 1 ) d i m e n s i o n a l reconstructed phase space. Otherwise, they are called false neighbors. A perfect embedding means all neighboring points should be true neighbors [20,42,43]. Inspired by the FNN-based algorithm proposed in [42], we identify m 0 by using the distance ratio, a ( i , m ) , defined as follows [42]:
a ( k , m ) = x k ( m + 1 ) x l ( m + 1 ) x k ( m ) x l ( m ) ;
where k , l = { 1 , 2 , , N m τ } ; x k ( m ) are the state vectors from the m d i m e n s i o n a l phase space; and . is L i n f i n i t y norm. The major drawback of using the distance ratio a ( k , m ) is its sensitivity to the reference state vector x k . To overcome this drawback, we consider the average value a ¯ ( m , τ ) instead of a ( k , m ) :
a ¯ ( m , τ ) = 1 N m τ k = 1 N m τ a ( k , m )
To investigate the dependence of a ¯ ( m , τ ) on m, the coefficient of proximity r ( m , τ ) is defined as follows:
r ( m , τ ) a ¯ ( m + 1 , τ ) a ¯ ( m , τ )
When m becomes greater than a limit value m lim , the proximity coefficient r ( m , τ ) converges to one. Hence, m 0 = m lim + 1 becomes the minimum embedding dimension [42]. Based on Equation (7), we can observe that r ( m , τ ) depends on the time delay value τ . This assertion is corroborated by simulation results. Figure 1 illustrates, for example, the evolution of r ( m , τ ) for two extreme values of τ ; for τ = 2 , the optimal value of m 0 = 6 ; whereas for τ = 100 , we obtain m 0 = 9 . As m depends on the choice of τ , we propose hereinafter an optimization strategy to find simultaneously the optimal values of m and τ .

3.1.3. Optimal Values of m and τ

r ( m , τ ) is a bivariate function whose expression leads to
lim ( m , τ ) ( m 0 , τ 0 ) r ( m , τ ) = 1
So we define the cost function f ( m , τ ) :
f ( m , τ ) = a ¯ ( m , τ ) a ¯ ( m + 1 , τ )
The optimal values m 0 and τ 0 become
( m 0 , τ 0 ) = a r g m i n ( m , τ ) N * f ( m , τ )
Numerical results show that values of ( m 0 , τ 0 ) obtained from (10) become independent from modulation schemes, SNR, and the number of samples per symbol N s . Figure 2 illustrates the cost function f ( m , τ ) with respect to ( m , τ ) for a noisy 16-QAM signal. We can notice that
τ 6 , m 1 , f ( m , τ ) 0
The number K of state vectors is given by
K = N ( m 1 ) τ K m i n
Based on Takens’ theorem (in Taken’s theorem, the phase space of a system can be reliably reconstructed if and only if m 2 D + 1 , where D 1 is the dimension of the system attractor [36,44]) and the minimum number K m i n of state vectors for reliable detection, we conclude that m 0 and τ 0 should be chosen in the following ranges:
m 0 , τ 0 3 ; N K m i n τ 0 × 6 ; N K m i n 2
However, we notice that in practice K m i n N . Consequently, we can
m 0 , τ 0 3 ; N τ 0 × 6 ; N 2
The recurring states in the phase space can be highlighted by the Recurrence Plot.

3.2. Recurrence Plot

The Recurrence Plot (RP) illustrates recurrences contained in a signal. The RP is based on the recurrence matrix R i , j ( ε , m ) [30,36]:
R i , j ( ε , m ) = Θ ε x i x j 2
where i , j { 1 , , K } and K = N ( m 1 ) τ denotes the number of reconstructed state vectors x k ; ε is the recurrence threshold, Θ ( . ) represents Heavisides’ step function, and . 2 is the L 2 or Frobenius norm. d i j = x i x j 2 are the coefficients of the distance matrix M. According to Equation (15), the states x i and x j are recurring states if x i x j < ε . In the RP, a recurrence is represented by a black dot. If the parameters m, τ , and ε are optimal, the RP presents some intrinsic patterns of the system. For example, Figure 3, Figure 4 and Figure 5 represent, respectively, the RP of 16-QAM signal, GMSK signal, and a random zero mean White Gaussian Noise (WGN) with a variance σ b 2 . We can notice that the patterns in the RP of the 16-QAM signal are different from those of the GMSK signal, whereas the RP of the WGN has no particular pattern. Heuristically, we can set the recurrence threshold as ε = 0.5 σ y where σ y 2 denotes the variance of the observed signal y ( n ) ; the embedding parameters are established as m = 16 and τ = 6 .
As the visual analysis of RP is not objective, Zbilut and Webber introduced a procedure to quantify RP structures [45,46]. In the literature, one has five classical tools to perform the RQA. Some RQA tools are based on the recurrence density, while others use the line structures of the RP [36]. The classical RQA tools are developed and extended in [30,36]. The main challenge with classical or extended RQA tools is the choice of an optimal recurrence threshold ε of Equation (15). A small value of ε does not reveal noticeable occurrences, while a large value of ε may lead to the appearance of neighbors for most of the existing points and cause false occurrences [30,47]. The choice of ε is a delicate issue affecting the reliability of the spectrum sensing based on classical or extended RQA tools [20]. To overcome this issue, we propose in the following sections a new algorithm called the Recurrence-Analysis-based Detector (RAD), which only exploits the distance matrix. This distance matrix does not depend on the recurrence threshold ε and nor does the proposed detection model RAD.

4. Recurrence-Analysis-Based Detector

The Recurrence Rate (RR) is an essential tool of RQA. Our previous works based on the RQA detection model [20] show that an RR-based detection model (RRD) suffers from major shortcomings, as follows:
  • It cannot detect the presence of a communication signal when SNR 5 dB.
  • It is very sensitive to the recurrence threshold ε .
  • The computational cost is relatively high.
  • The performance of an RRD is sensitive to the types of modulations of a communication signal.
To overcome the above limitations, we develop hereinafter a new detection model, the Recurrence Analysis Detection model (RAD), which is able to operate in very low SNR conditions. In order to reduce drastically the computational cost and avoid the delicate issue of the recurrence threshold ε , the RAD only uses the distances d i j = x i x j 2 of the upper triangular part of the distance matrix.

4.1. Detection Model

Usually, the RQA is performed on the entire distance matrix D = ( d i j ) 1 i , j K of different state vectors. As D is a symmetrical matrix, in order to reduce the computational cost, we use the upper triangular part of D, without the main diagonal defined by its general coefficients:
D i j = d i j ; 1 i < j K
We denote by u d the coefficients of the first upper diagonal of D and by u Δ the other coefficients of the upper triangular part of D, without the main diagonal. u d and u Δ verify two great properties:
  • For a WGN, u d and u Δ have the same Probability Density Function (PDF), which is not the case for a noisy communication signal. Hence, to detect the presence of a communication signal, we check if u d is representative of u Δ . For this purpose, we use a statistical test of conformity to evaluate this representativeness [48].
  • The u d of a WGN or a communication signal has the same PDF. This remark allows us to design a detector free of noise variance estimation.
To provide a better understanding of this notion of representativeness, we present the histogram of the u d and u Δ of WGN and the communication signal, respectively, in Figure 6 and Figure 7, and we define the confidence interval Φ Δ as follows:
Φ Δ = u ¯ Δ λ ; u ¯ Δ + λ
where u ¯ Δ is the average value of u Δ and λ is the predetermined detection threshold for RAD. Further details about λ can be found in Section 4.2.4.
On the basis of the histogram of distance and by using Kolmogorov–Smirnov test [49], for a WGN only, we note that u d and u Δ can be approximated by the same PDF (see Figure 6). Consequently, by using the statistical test of conformity based on the estimation average value, we show that u d is representative of u Δ . Indeed, u ¯ d Φ Δ ; u ¯ d denotes the average value of u d . Contrariwise, Figure 7 gives the histogram of distance for a communication signal buried in the WGN with an SNR = 0 dB; we can notice that u ¯ d Φ Δ , so u d is not representative of u Δ .
Using the statistical test of conformity, we propose the following test statistic T:
T = | u ¯ Δ u ¯ d | H 0 H 1 λ
In the course of our work, we establish the analytical expressions of the probability of detection P d and the probability of false alarm P f a in order to compare the theoretical and experimental results.

4.2. Analytical Expression of the Probability of False Alarm

The probability of a false alarm P f a can be expressed from the PDF of T under H 0 . In order to find this PDF, one should evaluate the PDF of u ¯ Δ and u ¯ d ; see Equation (18).

4.2.1. The PDF of u ¯ Δ under Hypothesis H 0

Under H 0 , the average value u ¯ Δ of u Δ is defined as follows:
u ¯ Δ / H 0 = 1 K Δ k = 1 K Δ u Δ / H 0 ( k )
where K Δ = ( K 1 ) ( K / 2 1 ) and u Δ / H 0 ( k ) { d i j ; 1 i K 2 ; i + 2 j K } .
Based on the central limit theorem for independent random variables and for a large K, u ¯ Δ / H 0 is asymptotically normally distributed with mean u ¯ Δ / H 0 and variance σ Δ / H 0 2 :
u ¯ Δ / H 0 N μ Δ / H 0 , σ Δ / H 0 2
where
μ Δ / H 0 = E u ¯ Δ / H 0
σ Δ 2 = v a r u ¯ Δ / H 0
To calculate μ Δ / H 0 and σ Δ / H 0 2 , we can use the PDF f u Δ / H 0 (u) of u Δ / H 0 . An outcome u Δ / H 0 of u Δ / H 0 is given by
u Δ / H 0 = d i j = k = 0 m 1 b i + k τ b j + k τ 2
As b ( n ) N 0 , σ b 2 , then b i + k τ b j + k τ N 0 , 2 σ b 2 and v k = b i + k τ b j + k τ σ b 2 N 0 , 1 .
By setting Z = k = 0 m 1 v k 2 , we can conclude that Z follows a Chi distribution χ ( m ) with m degrees of freedom [50,51]:
Z = u Δ / H 0 σ b 2 ( m )
The expectation value E Z and variance v a r Z of Z are given as follows [50,51]:
E Z = μ Z = 2 Γ m + 1 2 Γ m 2
v a r Z = m μ Z 2
where Γ ( m ) = 0 + x m 1 e x d x is the Gamma function.
From Equation (24), we show that the PDF f u Δ / H 0 of u Δ / H 0 is defined as follows: [52]:
f u Δ / H 0 ( u ) = u m 1 2 m 1 σ b m Γ ( m 2 ) exp u 2 4 σ b 2
The mean μ Δ / H 0 and variance σ Δ / H 0 2 of X ¯ Δ / H 0 can be determined by using Equation (24) as follows:
μ Δ / H 0 = σ b 2 E Z
σ Δ / H 0 2 = 2 σ b 2 K Δ v a r Z
Finally, we have u ¯ Δ / H 0 N μ Δ / H 0 , σ Δ / H 0 2 with
μ Δ / H 0 = 2 σ b Γ m + 1 2 Γ m 2
σ Δ / H 0 2 = 2 σ b 2 K Δ m 2 Γ m + 1 2 Γ m 2 2

4.2.2. The PDF of u ¯ d under Hypothesis H 0

Under H 0 , the average value u ¯ d of u d is defined as follows:
u ¯ d / H 0 = 1 K d k = 1 K d u d k / H 0 ( k )
where u d / H 0 ( k ) { d i , i + 1 } ; 1 i K d = K 1 .
Because of the structure of the upper triangular distance matrix, the coefficients of the first top diagonal u d / H 0 ( k ) are strongly decorrelated. In addition, K d is a large number. Thus, we can approximate u ¯ d by a Gaussian variable by using the central limit theorem:
u ¯ d / H 0 N μ d / H 0 , σ d / H 0 2
Using a similar approach to the calculation of the expectation value μ Δ / H 0 and variance σ Δ / H 0 2 of u ¯ Δ / H 0 , we obtain
μ d / H 0 = 2 σ b Γ m + 1 2 Γ m 2
σ d / H 0 2 = 2 σ b 2 K d m 2 Γ m + 1 2 Γ m 2 2

4.2.3. The Probability Density Function of T under hypothesis H 0

u ¯ d / H 0 and u ¯ Δ / H 0 are Gaussian random variables. Based on Equations (20), (30), (31) and (33)–(35) we end up with
u ¯ Δ / H 0 u ¯ d / H 0 N 0 , σ 0 2
where
σ 0 2 = σ Δ / H 0 2 + σ d / H 0 2 2 C o v u ¯ d / H 0 , u ¯ Δ / H 0
Applying the random variable transformation theorem [52,53] on T from Equation (18), we end up with t 0 :
f T / H 0 ( t ) = 2 σ 0 2 π exp t 2 2 σ 0 2

4.2.4. Probability of False Alarm and Detection Threshold

Based on Equation (38), the P f a is expressed as follows:
P f a = λ f T / H 0 ( t ) d t = e r f c λ σ 0 2
e r f c ( x ) denotes the Complementary Error Function—the Complementary Error Function e r f c ( x ) is defined as follows:
e r f c ( x ) = 2 π x + e θ 2 d θ
—and the detection threshold λ is
λ = σ 0 2 e r f c 1 P f a

4.3. Analytical Expression of the Probability of Detection

Taking into account the presence of the communication signal s ( n ) and keeping the same approach as under H 0 , we demonstrate that
u ¯ Δ / H 1 N μ Δ / H 1 , σ Δ / H 1 2
u ¯ d / H 1 N μ d / H 1 , σ d / H 1 2
where
μ Δ / H 1 = 2 σ s 2 + σ b 2 Γ m + 1 2 Γ m 2
σ Δ / H 1 2 = 2 ( σ s 2 + σ b 2 ) K Δ m 2 Γ m + 1 2 Γ m 2 2
μ d / H 1 = 2 σ b Γ m + 1 2 Γ m 2
σ d / H 1 2 = 2 σ b 2 K d m 2 Γ m + 1 2 Γ m 2 2
We deduce the PDF of T under the hypothesis H 1 as follows:
f T / H 1 ( t ) = 1 σ 1 2 π e t μ 1 σ 1 2 2 + e t + μ 1 σ 1 2 2
with t 0 . μ 1 and σ 1 2 are given by
μ 1 = μ Δ / H 1 μ d / H 1 ,
σ 1 2 = σ Δ / H 1 2 + σ d / H 1 2 2 C o v u ¯ Δ / H 1 , u ¯ d / H 1
Consequently, the Probability of Detection P d becomes
P d = λ + f T / H 1 ( t ) d t = 1 1 2 e r f c λ μ 1 σ 1 2 e r f c λ μ 1 σ 1 2

5. Simulations Results

To evaluate the efficiency and the robustness of the proposed detection method, we generate Receiver Operating Characteristic (ROC) curves using Monte Carlo simulations [54,55]. The parameters defined in Table 1 are used with different kinds of communication signals, such as 64-QAM, 16-QAM, BPSK, and 4-ASK.
In order to compare the theoretical and experimental performance of the RAD, we generated P d versus SNR performance curves. Figure 8 shows these performance curves. The theoretical curves were generated by Equation (50) and the experimental curves according to the Monte Carlo simulations. It can be clearly observed that the theoretical results match the simulated ones. From the theoretical and experimental curves, reliable detection is possible as soon as SNR 12 dB with P d 0.95 and P f a = 0.05 .
The Receiver Operating Characteristic curves for different SNR values can be viewed in Figure 9. Here, the RAD is applied on a 16-QAM signal, and the observation time is 31.25 ms. For SNR = 14 dB and P f a = 0.1 , the RAD detects the presence of a communication signal with P d = 0.76 , but for SNR = 13 dB, P d = 0.9 . The detector proves itself powerful as soon as the SNR 12 dB, since the detection probability P d = 0.95 with a very low value of P f a = 0.05 ; see Figure 9.
Another advantage of the proposed detector is its robustness against any type of classical modulations, such as QAM, PSK, and ASK; see Figure 10, where the ROC curves for 4-ASK, BPSK, and 64-QAM signal are almost identical.
The performance of RAD increases with the number of samples N. Figure 11 depicts this performance evolution based on N in a Gaussian channel where SNR = 12 dB. We notice that for P f a = 0.1 , the RAD detects the communication signal with P d = 0.5 when N = 500 samples, with P d = 0.8 when N = 1000 samples, and with P d = 0.97 when N = 2000 samples.
By comparing RAD with two other blind spectrum sensing algorithms, Energy Detection (ED) [56] and Cyclostationary Features Detector (CFD) [57,58], and according to the results presented in Figure 12 and Figure 13, we notice the superiority of the RAD to ED and CFD in a Gaussian channel. For example, for the SNR = 12 dB and P f a = 0.05 , the RAD detects the signal with P d = 0.95 , whereas the probability of detection for the ED is only P d = 0.67 (see Figure 12). Figure 13 shows that the RAD is able to detect the communication signal in very weak low SNR conditions. For 12 dB ≤ SNR 10 dB, the RAD detects the presence of a communication signal with P d 0.95 for P f a = 0.05 . ED achieves RAD performance only when SNR 10 dB, and CFD works correctly when SNR 7 dB with P d 0.97 .
After testing the performance of the detector in a Gaussian channel, we are now interested in the behavior of the RAD in a multipath channel. As a model, we use model D of the Rayleigh channel defined in [59] with the following parameters (Table 2 and Table 3):
Figure 14 summarizes the performance of the RAD in a noisy Rayleigh channel. The RAD’s performance remains almost unchanged. It detects a communication signal with P d 0.92 with P f a = 0.05 as soon as SNR 12 dB.

6. Complexity Analysis of Recurrence-Analysis-Based Detector

Theoretical and experimental analyses show the superiority of the RAD compared with the Energy Detector (ED) and the Cyclostationary Feature Detector (CFD) in a low SNR scenario detection process. The complexity of the algorithms is measured through the number of complex multiplications that the algorithms have to perform for the calculation of the test statistics [60]. In this section, we provide the complexity analyses of the ED, CFD, and RAD.

6.1. Complexity Analysis of Energy-Based Detector

Let y ( n ) be the observed signal with N samples y k . The energy E y of y ( n ) is given by
E y = 1 N k = 1 N y k 2
The ED detection process is summarized in Figure 15.
The complexity of the computation can be evaluated according to Equation (51). N multiplication operations are required to perform y k 2 . Consequently, the computation complexity C E D becomes [60]
C E D = N

6.2. Complexity Analysis of Cyclostationary-Feature-Based Detector

In a blind context, the CFD is based on the reliable estimation of the cyclic spectrum [13,61,62]. The crest factor F c of the cyclic spectrum can be used as a decision statistic [13]:
F c ( α ) = max α D ( α ) 1 2 N + 1 k = 1 2 N + 1 D 2 ( α ) H 0 H 1 λ C F D
where α stands for the cyclic frequency and D ( α ) denotes the Cyclic Domain Profile (CDP). The computation of F c requires six steps [13]. First, a Hamming sliding window w ( n ) is used to apodize the observed signal y ( n ) . Then, we apply a first Fast Fourier Transform (FFT) and calculate the complex demodulates of the apodized signal. After that, we compute the spectral correlation of the different complex demodulates and apply a second FFT. At the end, we obtain the cyclic spectrum, and we compute the crest factor F c of the cyclic spectrum.
Let N be the number of samples contained in the observed signal y ( n ) and N p be the number of samples contained in each apodized block of y ( n ) . L = N p 4 denotes the decimation factor, and P = N L is the number of apodized blocks from y ( n ) . The apodization is carried out with a Hamming window [13,61,63]. Figure 16 summarizes the essential steps of F c computation.
The apodization equation is defined as follows:
r k = w k y k ; k = 1 . . N p
where w k denotes the Hamming window coefficients, y k is the samples of the observed signal y ( n ) , and r k becomes the coefficients resulting from the apodization.
The apodization step requires P N p multiplication operations. The second step in the CFD detection process is the first FFT applied on apodized blocks. The complexity of FFT computation is known as N p log 2 N p . Consequently, the P apodized blocks require P N p l o g 2 N p multiplication operations. The complex demodulates computation requires P N p 2 multiplication operations, and the step of complex demodulates multiplication requires P 2 N p 2 multiplication operations.
The second FFT with P data points to obtain the estimation of cyclic spectrum requires N p 2 P log 2 P multiplication operation and the calculation of crest factor F c alone requires 2 N + 1 multiplication operations.
Finally, the algorithmic complexity of CFD, C C F D , is
C C F D = 34 N 2 + 64 N L + 10 N + 2

6.3. Algorithmic Complexity of Recurrence-Analysis-Based Detector

To make decisions, the RAD uses a statistic test defined in Equation (18). The RAD detection process is summarized in Figure 17.
The algorithmic complexity of the RAD essentially concerns the distance matrix computation and the calculation of average values of distance matrix coefficients. From the observed signal y ( n ) containing N samples, we obtain K = N ( m 1 ) τ state vectors. Each state vector contains m coordinates. The distance d i j = x x j from the state vector x i to other state vectors x j requires m K addition operations. Because we exploit only the upper triangular part of the distance matrix with the main diagonal coefficients, we use m 2 K ( K 2 ) addition operations. The computation of the average value of the first upper diagonal requires K elementary operations, and the average value of other coefficients requires ( K 2 ) 2 2 elementary operations. The statistic test of the RAD requires one addition operation. Consequently, the computation complexity C R A D of the RAD becomes
C R A D = 2 N 2 + 4 N ( τ m τ 1 ) + 2 ( m τ ) 2 + 2 τ 2 4 m τ 2 4 τ + 2 m τ + 6
From Equations (52), (55), and (56), in Figure 18, we generated the curves of the evolution of the algorithmic complexity of the ED, CFD, and RAD based on the number of samples contained in the observed signal y ( n ) . The results in Figure 18 show that ED is the simplest algorithm, whereas CFD is the most complicated one. We also notice that the RAD algorithm is less complicated than the CFD algorithm.

7. Conclusions

This paper deals with the problem of noncooperative spectrum sensing in very low SNR conditions. Many algorithms have recently been developed to overcome the scarcity of radio spectrum. However, most of them suffer from noise uncertainty and do not work correctly in very low SNR conditions. In this paper, we use the promising approach of the Recurrence Quantification Analysis (RQA) to propose a robust detection model, named the Recurrence-Analysis-based Detector (RAD). The RAD benefits from the exploitation of the similitude among the different state vectors. Indeed, our analyses reveal that for a White Gaussian Noise, the coefficients contained on the first upper diagonal are representative of other coefficients of the distance matrix, which is not the case for a communication signal. Thus, by applying a conformity test between the coefficients of the first upper diagonal and other coefficients of the distance matrix, the presence or absence of a communication signal can be revealed. The RAD presents five major advantages: it is more robust than the Energy Detector (ED) and the Cyclostationary Feature Detector (CFD), which are widely used in the noncooperative spectrum sensing context; it does not suffer from noise variance estimation, because the estimation of the noise variance is not required during the spectrum sensing process; it is able to detect the communication signal in a very low SNR condition; contrary to the ED, the RAD is able to distinguish a noisy communication signal and a high energy noise; the RAD does not need a high computational cost like the CFD. Our present work also presents two major contributions. First, we determined, for digital communication signals, the optimal values of the time delay τ and embedding dimension m needed for the phase space reconstruction. Second, we established the analytical expression of detection threshold λ , the probability of detection P d , and the probability of false alarm P f a of the detection model based on RQA. From the ROC curves, we can notice without ambiguity that the RAD is more robust than the ED and CFD algorithms. Our current simulations show that the RAD is able to detect the communication signal for SNR ≥ −12 dB. In addition to facilitating the blind detection of communication signals, RQA could be used to accurately estimate the characteristic frequencies of the signal of interest. In our future work, we will optimize the performance of the RAD detector based on this reliable estimation of the characteristic frequencies of the signal of interest.

Author Contributions

Conceptualization, J.-M.K. and A.M.; J.-M.K. developed the proposed approach, performed the principle, and the simulations and prepared the manuscript; K.C.Y. and D.L.J. participated in the development of the theoretical study and reviewed the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Dataset available on request from the authors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  2. Mansour, A.; Mesleh, R.; Abaza, M. New challenges in wireless and free space optical communications. Opt. Lasers Eng. 2017, 89, 95–108. [Google Scholar] [CrossRef]
  3. Nasser, A.; Mansour, A.; Yao, K.C.; Chaitou, M.; Charara, H. Spatial and time diversities for canonical correlation significance test in spectrum sensing. In Proceedings of the Signal Processing Conference (EUSIPCO), 2016 24th European, Budapest, Hungary, 29 August–2 September 2016; pp. 1232–1236. [Google Scholar]
  4. Nasser, A.; Mansour, A.; Yao, K.C.; Charara, H.; Chaitou, M. Spectrum sensing for full-duplex cognitive radio systems. In Proceedings of the International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), Grenoble, France, 30 May–1 June 2016; Springer: Cham, Switzerland, 2016; pp. 363–374. [Google Scholar]
  5. Nasser, A.; Mansour, A.; Yao, K.; Abdallah, H.; Charara, H. Spectrum sensing based on cumulative power spectral density. EURASIP J. Adv. Signal Process. 2017, 1, 38–56. [Google Scholar] [CrossRef]
  6. Moawad, A.; Yao, K.; Mansour, A.; Gautier, R. Autocepstrum Approach for Spectrum Sensing in Cognitive Radio. In Proceedings of the 2018 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–6. [Google Scholar]
  7. Ding, G.; Wang, J.; Wu, Q.; Zhang, L.; Zou, Y.; Yao, Y.; Chen, Y. Robust Spectrum Sensing With Crowd Sensors. IEEE Trans. Commun. 2014, 62, 3129–3143. [Google Scholar] [CrossRef]
  8. Luo, L.; Roy, S. Efficient Spectrum Sensing for Cognitive Radio Networks via Joint Optimization of Sensing Threshold and Duration. IEEE Trans. Commun. 2012, 60, 2851–2860. [Google Scholar] [CrossRef]
  9. Zeng, Y.; Liang, Y. Eigenvalue-based spectrum sensing algorithms for cognitive radio. IEEE Trans. Commun. 2009, 57, 1784–1793. [Google Scholar] [CrossRef]
  10. Li, B.; Li, S.; Nallanathan, A.; Nan, Y.; Zhao, C.; Zhou, Z. Deep Sensing for Next-Generation Dynamic Spectrum Sharing: More Than Detecting the Occupancy State of Primary Spectrum. IEEE Trans. Commun. 2015, 63, 2442–2457. [Google Scholar] [CrossRef]
  11. Burel, G.; Bouder, C.; Berder, O. Detection of direct sequence spread spectrum transmissions without prior knowledge. In Proceedings of the GLOBECOM’01, IEEE Global Telecommunications Conference, San Antonio, TX, USA, 25–29 November 2001; Volume 1, pp. 236–239. [Google Scholar]
  12. Zhang, X.; Gao, F.; Chai, R.; Jiang, T. Matched filter based spectrum sensing when primary user has multiple power levels. China Commun. 2015, 12, 21–31. [Google Scholar] [CrossRef]
  13. Kadjo, J.M.; Yao, K.C.; Mansour, A. Blind detection of cyclostationary features in the context of Cognitive Radio. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Limassol, Cyprus, 12–14 December 2016; pp. 150–155. [Google Scholar]
  14. Sobron, I.; Diniz, P.S.R.; Martins, W.A.; Velez, M. Energy Detection Technique for Adaptive Spectrum Sensing. IEEE Trans. Commun. 2015, 63, 617–627. [Google Scholar] [CrossRef]
  15. Lopez-Benitez, M.; Casadevall, F. Signal Uncertainty in Spectrum Sensing for Cognitive Radio. IEEE Trans. Commun. 2013, 61, 1231–1241. [Google Scholar] [CrossRef]
  16. Yang, K.; Huang, Z.; Wang, X.; Li, X. A Blind Spectrum Sensing Method Based on Deep Learning. Sensors 2019, 19, 2270. [Google Scholar] [CrossRef]
  17. Xue, H.; Gao, F. A machine learning based spectrum-sensing algorithm using sample covariance matrix. In Proceedings of the 2015 10th International Conference on Communications and Networking in China (ChinaCom), Shanghai, China, 15–17 August 2015; pp. 476–480. [Google Scholar]
  18. Zhang, K.; Li, J.; Gao, F. Machine learning techniques for spectrum sensing when primary user has multiple transmit powers. In Proceedings of the 2014 IEEE International Conference on Communication Systems, Macau, China, 19–21 November 2014; pp. 137–141. [Google Scholar]
  19. Xiao, H.; Zhou, X.; Tian, Y. Research on Wireless Spectrum Sensing Technology Based on Machine Learning. In Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage; Springer: Berlin/Heidelberg, Germany, 2018; pp. 472–479. [Google Scholar]
  20. Kadjo, J.M.; Yao, K.C.; Mansour, A. Blind Spectrum Sensing Based on Recurrence Quantification Analysis in the Context of Cognitive Radio. In Proceedings of the 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 3–7 September 2018; pp. 1835–1839. [Google Scholar]
  21. Ünal, B. Stability Analysis of Bitcoin using Recurrence Quantification Analysis. Chaos Theory Appl. 2022, 4, 104–110. [Google Scholar] [CrossRef]
  22. Martín, C.J.; Itayetzin, B.C.V.; Gertrudis, H.G.G.; Claudia, L. Nonlinear Dynamics of Heart Rate Variability after Acutely Induced Myocardial Ischemia by Percutaneous Transluminal Coronary Angioplasty. Entropy 2023, 25, 469. [Google Scholar] [CrossRef]
  23. Costa, D.G.d.B.; Reis, B.M.d.F.; Zou, Y.; Quiles, M.G.; Macau, E.E. Recurrence density enhanced complex networks for nonlinear time series analysis. Int. J. Bifurc. Chaos 2018, 28, 1850008. [Google Scholar] [CrossRef]
  24. Zhang, Q.; Chen, X.; Yin, F.; Hong, F. Analysis and Research on Chaotic Dynamics of Evaporation Duct Height Time Series with Multiple Time Scales. Atmosphere 2022, 13, 2072. [Google Scholar] [CrossRef]
  25. Marwan, N.; Kurths, J. Cross recurrence plots and their applications. In Mathematical Physics Research at the Cutting Edge; Nova Science Publishers: Hauppauge, NY, USA, 2004; pp. 101–139. [Google Scholar]
  26. Atapattu, S.; Tellambura, C.; Jiang, H. Energy Detection for Spectrum Sensing in Cognitive Radio; Springer: New York, NY, USA, 2014. [Google Scholar]
  27. Mitola, J.; Maguire, G.Q. Cognitive radio: Making software radios more personal. IEEE Pers. Commun. 1999, 6, 13–18. [Google Scholar] [CrossRef]
  28. Mitola, J. Cognitive Radio Architecture Evolution. Proc. IEEE 2009, 97, 626–641. [Google Scholar] [CrossRef]
  29. Naraghi-Pour, M.; Ikuma, T. Autocorrelation-Based Spectrum Sensing for Cognitive Radios. IEEE Trans. Veh. Technol. 2010, 59, 718–733. [Google Scholar] [CrossRef]
  30. Marwan, N.; Romano, M.C.; Thiel, M.; Kurths, J. Recurrence plots for the analysis of complex systems. Phys. Rep. 2007, 438, 237–329. [Google Scholar] [CrossRef]
  31. Webber, C.L., Jr.; Zbilut, J.P. Recurrence quantification analysis of nonlinear dynamical systems. Tutor. Contemp. Nonlinear Methods Behav. Sci. 2005, 94, 26–94. [Google Scholar]
  32. Anishchenko, V.S.; Astakhov, V.; Neiman, A.; Vadivasova, T.; Schimansky-Geier, L. Nonlinear Dynamics of Chaotic and Stochastic Systems: Tutorial and Modern Developments; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  33. Williams, G. Chaos Theory Tamed; Routledge: London, UK, 2014. [Google Scholar] [CrossRef]
  34. Ivancevic, V.G.; Ivancevic, T.T. Complex Nonlinearity: Chaos, Phase Transitions, Topology Change and Path Integrals; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  35. Kantz, H.; Schreiber, T. Nonlinear Time Series Analysis; Cambridge University Press: Cambridge, UK, 2004; Volume 7. [Google Scholar]
  36. Marwan, C.W.N. Mathematical and Computational Foundations of Recurrence Quantifications. In Recurrence Quantification Analysis. Understanding Complex Systems; Springer: Cham, Switzerland; AIP Publishing: Melville, NY, USA, 2015. Available online: https://ouci.dntb.gov.ua/en/works/leGrnZW7/ (accessed on 17 June 2024).
  37. Bradley, E.; Kantz, H. Nonlinear time-series analysis revisited. Chaos Interdiscip. J. Nonlinear Sci. 2015, 25, 097610. [Google Scholar] [CrossRef]
  38. Chelidze, D. Reliable Estimation of Minimum Embedding Dimension Through Statistical Analysis of Nearest Neighbors. J. Comput. Nonlinear Dyn. 2017, 12, 051024. [Google Scholar] [CrossRef]
  39. Kraskov, A.; Stögbauer, H.; Grassberger, P. Estimating mutual information. Phys. Rev. E 2004, 69, 066138. [Google Scholar] [CrossRef]
  40. Fraser, A.M.; Swinney, H.L. Independent coordinates for strange attractors from mutual information. Phys. Rev. A 1986, 33, 1134. [Google Scholar] [CrossRef]
  41. David, C.; Joseph, P.C. Experimental Nonlinear Dynamics Notes for MCE 567; Cambridge University Press: New York, NY, USA, 2000. [Google Scholar]
  42. Cao, L. Practical method for determining the minimum embedding dimension of a scalar time series. Phys. D Nonlinear Phenom. 1997, 110, 43–50. [Google Scholar] [CrossRef]
  43. Kennel, M.B.; Brown, R.; Abarbanel, H.D.I. Determining embedding dimension for phase-space reconstruction using a geometrical construction. Phys. Rev. A 1992, 45, 3403–3411. [Google Scholar] [CrossRef]
  44. Takens, F. Detecting strange attractors in turbulence. In Dynamical Systems and Turbulence, Warwick 1980; Springer: Berlin/Heidelberg, Germany, 1981; pp. 366–381. [Google Scholar]
  45. Webber, C.L., Jr.; Zbilut, J.P. Dynamical assessment of physiological systems and states using recurrence plot strategies. J. Appl. Physiol. 1994, 76, 965–973. [Google Scholar] [CrossRef]
  46. Zbilut, J.P.; Webber, C.L., Jr. Recurrence quantification analysis: Introduction and historical context. Int. J. Bifurc. Chaos 2007, 17, 3477–3481. [Google Scholar] [CrossRef]
  47. Thiel, M.; Romano, M.C.; Kurths, J.; Meucci, R.; Allaria, E.; Arecchi, F.T. Influence of observational noise on the recurrence quantification analysis. Phys. D Nonlinear Phenom. 2002, 171, 138–152. [Google Scholar] [CrossRef]
  48. Mansour, A. Probabilités et Statistiques pour les Ingénieurs: Cours, Exercices et Programmation; Hermes Science: Paris, France, 2007. [Google Scholar]
  49. Shorack, G.R.; Wellner, J.A. Empirical Processes with Applications to Statistics; SIAM: University City, PA, USA, 2009. [Google Scholar]
  50. Gooch, J.W. Encyclopedic Dictionary of Polymers; Springer: New York, NY, USA, 2010. [Google Scholar]
  51. Abell, M.L.; Braselton, J.P.; Rafter, J.A.; Rafter, J.A. Statistics with Mathematica; Academic Press: San Diego, CA, USA, 1999. [Google Scholar]
  52. Papoulis, A.; Pillai, S.U. Probability, Random Variables, and Stochastic Processes; McGraw-Hill Education: New York, NY, USA, 2002. [Google Scholar]
  53. Miller, S.; Childers, D. Probability and Random Processes: With Applications to Signal Processing and Communications; Academic Press: Cambridge, MA, USA, 2012. [Google Scholar]
  54. Kha, Q.H.; Ho, Q.T.; Le, N.Q.K. Identifying SNARE Proteins Using an Alignment-Free Method Based on Multiscan Convolutional Neural Network and PSSM Profiles. J. Chem. Inf. Model. 2022, 62, 4820–4826. [Google Scholar] [CrossRef]
  55. Nasser, A. Spectrum Sensing for Half and Full-Duplex Interwave Cognitive Radio System. Ph.D. Thesis, Université de Bretagne Occidentale, Brest, France, 2017. [Google Scholar]
  56. Chin, W.L.; Li, J.M.; Chen, H.H. Low-complexity energy detection for spectrum sensing with random arrivals of primary users. IEEE Trans. Veh. Technol. 2015, 65, 947–952. [Google Scholar] [CrossRef]
  57. Cohen, D.; Eldar, Y.C. Sub-Nyquist cyclostationary detection for cognitive radio. IEEE Trans. Signal Process. 2017, 65, 3004–3019. [Google Scholar] [CrossRef]
  58. Tani, A.; Fantacci, R.; Marabissi, D. A low-complexity cyclostationary spectrum sensing for interference avoidance in femtocell LTE-A-based networks. IEEE Trans. Veh. Technol. 2015, 65, 2747–2753. [Google Scholar] [CrossRef]
  59. Ahmadi, S.; Srinivasan, R.M.; Cho, H.; Park, J.; Cho, J.; Park, D. Channel Models for IEEE 802.16 m Evaluation Methodology Document; IEEE 802.16 Broadband Wireless Access Working Group, 2007; pp. 3–12. Available online: https://standards.ieee.org/ieee/802.16g/3635/ (accessed on 17 June 2024).
  60. Zayen, B.; Guibène, W.; Hayar, A. Performance comparison for low complexity blind sensing techniques in cognitive radio systems. In Proceedings of the 2010 2nd International Workshop on Cognitive Information Processing, Elba Island, Italy, 14–16 June 2010; pp. 328–332. [Google Scholar] [CrossRef]
  61. Gardner, W. Cyclostationarty in Communications and Signal Processing; IEEE PRESS: New York, NY, USA, 1994. [Google Scholar]
  62. Gardner, W. The spectral correlation theory of Cyclostationary time-series. Signal Process. 1986, 11, 13–36. [Google Scholar] [CrossRef]
  63. Gardner, W. Exploitation Of Spectral Redundancy In Cyclostationary Signals. IEEE Signal Process. Mag. 1991, 8, 14–36. [Google Scholar] [CrossRef]
Figure 1. The proximity coefficient r ( m , τ ) based on the embedding dimension m for a 16-QAM signal.
Figure 1. The proximity coefficient r ( m , τ ) based on the embedding dimension m for a 16-QAM signal.
Signals 05 00022 g001
Figure 2. The cost function f ( m , τ ) based on ( m , τ ) : The flat area of the curve f ( m , τ ) corresponds to a set of optimal values of m , τ . Consequently, the optimal values m 0 , τ 0 of m , τ should be chosen as follows m 0 , τ 0 3 ; N τ 0 × 6 ; N 2 .
Figure 2. The cost function f ( m , τ ) based on ( m , τ ) : The flat area of the curve f ( m , τ ) corresponds to a set of optimal values of m , τ . Consequently, the optimal values m 0 , τ 0 of m , τ should be chosen as follows m 0 , τ 0 3 ; N τ 0 × 6 ; N 2 .
Signals 05 00022 g002
Figure 3. RP according to Equation (15) of a 16-QAM signal.
Figure 3. RP according to Equation (15) of a 16-QAM signal.
Signals 05 00022 g003
Figure 4. RP of a Gaussian Minimum Shift Keying (GMSK) signal.
Figure 4. RP of a Gaussian Minimum Shift Keying (GMSK) signal.
Signals 05 00022 g004
Figure 5. RP of White Gaussian Noise.
Figure 5. RP of White Gaussian Noise.
Signals 05 00022 g005
Figure 6. Histogram of u d and u Δ for a White Gaussian Noise (WGN): We have u ¯ d = 90.6 and u ¯ Δ = 90 . For P f a = 0.01 , the detection threshold of the RAD becomes λ = 12.5 . Based on the u ¯ Δ value, the confidence interval becomes Φ Δ = 77.5 ; 102.5 . We notice that u ¯ d Φ Δ . Consequently, using the conformity test, we can conclude that u d is representative of u Δ .
Figure 6. Histogram of u d and u Δ for a White Gaussian Noise (WGN): We have u ¯ d = 90.6 and u ¯ Δ = 90 . For P f a = 0.01 , the detection threshold of the RAD becomes λ = 12.5 . Based on the u ¯ Δ value, the confidence interval becomes Φ Δ = 77.5 ; 102.5 . We notice that u ¯ d Φ Δ . Consequently, using the conformity test, we can conclude that u d is representative of u Δ .
Signals 05 00022 g006
Figure 7. Histogram of u d and u Δ for a noisy 16-QAM signal; SNR = 0 dB. In this example, we have u ¯ d = 90 and u ¯ Δ = 127 . With P f a = 0.01 , we obtain λ = 12.5 and Φ Δ = 114.5 ; 139.5 . We notice that u d is not representative of u Δ , because u ¯ d Φ Δ .
Figure 7. Histogram of u d and u Δ for a noisy 16-QAM signal; SNR = 0 dB. In this example, we have u ¯ d = 90 and u ¯ Δ = 127 . With P f a = 0.01 , we obtain λ = 12.5 and Φ Δ = 114.5 ; 139.5 . We notice that u d is not representative of u Δ , because u ¯ d Φ Δ .
Signals 05 00022 g007
Figure 8. Theoretical and experimental probability of detection for RAD versus SNR.
Figure 8. Theoretical and experimental probability of detection for RAD versus SNR.
Signals 05 00022 g008
Figure 9. Receiver Operating Characteristic for 16 Q A M signal.
Figure 9. Receiver Operating Characteristic for 16 Q A M signal.
Signals 05 00022 g009
Figure 10. Robust RQA detector insensitivity versus classical modulation techniques.
Figure 10. Robust RQA detector insensitivity versus classical modulation techniques.
Signals 05 00022 g010
Figure 11. Receiver Operating Characteristic of the RAD model based on the number of observed samples in a Gaussian channel with SNR = 12 dB.
Figure 11. Receiver Operating Characteristic of the RAD model based on the number of observed samples in a Gaussian channel with SNR = 12 dB.
Signals 05 00022 g011
Figure 12. ROC performance: ED vs RAD. The RAD is superior to ED.
Figure 12. ROC performance: ED vs RAD. The RAD is superior to ED.
Signals 05 00022 g012
Figure 13. Comparison of Energy Detector (ED), Cyclostationary Features Detector (CFD), and Recurrence Analysis Detector (RAD).
Figure 13. Comparison of Energy Detector (ED), Cyclostationary Features Detector (CFD), and Recurrence Analysis Detector (RAD).
Signals 05 00022 g013
Figure 14. Performance Curve P d as a function of SNR for 16-QAM signal in a Rayleigh channel.
Figure 14. Performance Curve P d as a function of SNR for 16-QAM signal in a Rayleigh channel.
Signals 05 00022 g014
Figure 15. Energy Detector process. λ E D denotes the detection threshold of the ED.
Figure 15. Energy Detector process. λ E D denotes the detection threshold of the ED.
Signals 05 00022 g015
Figure 16. Different steps of the CFD detection process.
Figure 16. Different steps of the CFD detection process.
Signals 05 00022 g016
Figure 17. Different steps of the RAD detection process.
Figure 17. Different steps of the RAD detection process.
Signals 05 00022 g017
Figure 18. Curves of the algorithmic complexity of ED, CFD, and RAD.
Figure 18. Curves of the algorithmic complexity of ED, CFD, and RAD.
Signals 05 00022 g018
Table 1. Simulation parameters.
Table 1. Simulation parameters.
EntityParametersValue
PU’s signalSampling frequency F e 128 kHz
Symbol rate16 Bd
Bandwidth of Interest B24 kHz
SU’s DetectorObservation time15.6 ms
Sampling Frequency128 KHz
Embedding parametersDimension m16
time delay τ 6
Transmission ChannelNoise ModelAWGN
Table 2. Rayleigh Channel Model Features.
Table 2. Rayleigh Channel Model Features.
Model D of Rayleigh Channel
EntityParametersValue
FeaturesNumber of Path6
Doppler Frequency f d m a x 1.2 kHz
Table 3. Delay and Gain values for 6 paths [59].
Table 3. Delay and Gain values for 6 paths [59].
Path Number123456
Delay (ns)0300890012,90017,10020,000
Gain (dB)0−2.5−12.8−10.0−25.2−16.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kadjo, J.-M.; Yao, K.C.; Mansour, A.; Le Jeune, D. Noncooperative Spectrum Sensing Strategy Based on Recurrence Quantification Analysis in the Context of the Cognitive Radio. Signals 2024, 5, 438-459. https://doi.org/10.3390/signals5030022

AMA Style

Kadjo J-M, Yao KC, Mansour A, Le Jeune D. Noncooperative Spectrum Sensing Strategy Based on Recurrence Quantification Analysis in the Context of the Cognitive Radio. Signals. 2024; 5(3):438-459. https://doi.org/10.3390/signals5030022

Chicago/Turabian Style

Kadjo, Jean-Marie, Koffi Clément Yao, Ali Mansour, and Denis Le Jeune. 2024. "Noncooperative Spectrum Sensing Strategy Based on Recurrence Quantification Analysis in the Context of the Cognitive Radio" Signals 5, no. 3: 438-459. https://doi.org/10.3390/signals5030022

Article Metrics

Back to TopTop