Loading [MathJax]/extensions/TeX/boldsymbol.js
Achievable Throughput Analysis and Channel Access in Energy Harvesting Cognitive Radio Sensor Network | IEEE Journals & Magazine | IEEE Xplore

Achievable Throughput Analysis and Channel Access in Energy Harvesting Cognitive Radio Sensor Network


We propose a single-sink energy harvesting cognitive radio sensor network and extend it to the multi-sink case. Then, we optimize channel access schedule to maximize the ...

Abstract:

In this paper, we consider an energy harvesting cognitive radio sensor network (EH-CRSN), which is composed of multiple secondary users (sensor nodes) opportunistically a...Show More

Abstract:

In this paper, we consider an energy harvesting cognitive radio sensor network (EH-CRSN), which is composed of multiple secondary users (sensor nodes) opportunistically access licensed channels. We first propose a novel single-sink EH-CRSN and derive its network throughput. Then, we extend the EH-CRSN to the multi-sink case which will cause interference among secondary communications. To deal with this problem, we optimize channel access schedule, so as to maximize the network throughput in many actual large-scale scenarios. Specifically, we formulate a mixed interaction game and demonstrated the existence of Nash equilibrium. A stochastic learning automata (SLA)-based channel selecting an algorithm is further proposed to achieve the Nash equilibrium. Finally, the simulation results verify the validity of network throughput function in single-sink EH-CRSN and show that the proposed solution can get the maximum or near-maximum system throughput.
We propose a single-sink energy harvesting cognitive radio sensor network and extend it to the multi-sink case. Then, we optimize channel access schedule to maximize the ...
Published in: IEEE Access ( Volume: 7)
Page(s): 82277 - 82287
Date of Publication: 13 June 2019
Electronic ISSN: 2169-3536

Funding Agency:


SECTION I.

Introduction

By overlaid deployment of sensor nodes (SNs), the wireless sensor network (WSN) is a promising paradigm to gather data and monitor event in foreseeable era of Internet of Things (IoT). Nowadays, WSNs are wildly used in agriculture, industry, medicine, smart home fields, etc. A report from Frost & Sullivan [1] predicts that the global market of WSNs will increase from 1.4 billion in 2014 to 3.26 billion in 2024. However, effectively exploiting the WSN resource is severely limited by the crowd spectrum resource and the finite network lifetime.

The spectrum is more and more crowed as the dramatic development of communication service, for devices working in the same spectrum would cause interference and collision. Cognitive radio (CR) is considered to be the best solution to solve the spectrum scarcity problem. In CR network, cognitive users could utilize spectrum resources which are not occupied by licensed users or dynamically access spectrum instead of fixed static spectrum management scheme. Hence, cognitive radio sensor networks (CRSNs) have been proposed as a reliable, robust and efficient data aware communications infrastructure to serve in many fields such as smart grid [2]. Meanwhile, the finite network lifetime can be extended by the energy harvesting (EH) techniques. With the characteristics of non-manual intervention, energy harvesting (EH) technology has been adopted for wireless communication and attracted significant attention. Concretely EH techniques can convert the environmental energy, such as solar, wind, radio frequency (RF) energy, into electric energy [3]. In particular, RF energy less depends on the environment so that it can be adapted to dark and indoor situation. On the other hand, the harvesting efficiency of RF energy is very low, but it is still suitable for low-power SN. The source of RF energy includes dedicated RF source, ambient RF energy and self-power, among which dedicated RF energy has properties of continuity and stability and is more practical compared with the others.

Especially, cognitive radio sensor network equipped with energy harvesting technique (EH-CRSN) can be used to improve the communication of energy harvesting WSN and licensed spectrum utilization [4]. With the combination of wireless-power and cognitive networks, energy efficient spectrum sensing [5], [6], energy management and radio resource management become the issue that must be addressed [7], [8]. Based on the transmission path, existing works divide into two types: relay network (including clustering network) and non-relay network. Neha et al. in [9] used SNs as relay in a Simultaneous Wireless Information and Power Transfer (SWIPT) [10] system to improve the performance of both primary and secondary users. The authors in [11] modified the one-way relaying protocol in [9] into two-way protocol to gain the improvement in spectrum efficiency and energy efficiency. In [12], Zhang et al. proposed an improved operation cycle instead of timeslot. The authors have scheduled the relay selection and power control to balance the residual energy of sensors. Furthermore, the authors of [13] combined the harvested energy with on-grid energy to maximize the utility while reducing the cost on purchased energy. Besides, clustering has been revealed that it is an efficient way of topology control for balancing the traffic load of the SNs and improving the system scalability and the lifetime of WSNs [14]. Some studies have taken cluster into consideration. In [15], Saleem et al. proposed a clustering mechanism in which SNs were grouped into different clusters. The authors optimized the selection strategies of RF source, cluster head and channel to increase the system throughput. Based on it, an improvement scheme was proposed in [16] that contained a new cluster head selection strategy and a new energy-aware mode change control strategy, which SNs could perform merely energy harvesting action when residual energy fell below threshold. Channels were allocated within every cluster for stability and reliability. In [17], Etimad et al. designed a spectrum-aware and bio-inspired routing algorithm in order to maximize spectrum efficiency especially in harsh smart grid spectrum environments. Ren et al. in [18] have investigated the channel allocation scheme of intra-cluster and inter-cluster to maximize the energy efficiency. Apart from these, network without relay has its advantages as well. In [19], Zhang et al. studied a heterogeneous wireless sensor network which consisted of EH-enabled spectrum sensors and battery powered data sensors. They proposed a resource allocation solution to minimize the energy consumption of data sensors while guaranteeing the sustainability of spectrum sensors. In [20] Zhang et al. considered the channel allocation and energy management simultaneously to reduce the collision probability of the primary user (PU). Ren et al. in [4] aimed to maximize the network utility by controlling the sampling rate and channel access. Then in [21], the authors investigated the resource management of RF-powered CRSN in order to increase the sensed data in a slot while maintaining system stability. In [22], Wu et al. took into consideration the case that PU might reoccupy the channel in the transmission duration of cognitive sensor.

In this paper, we consider a dedicated RF source powered EH-CRSN with single sink, where the frequency bands used for transmitting energy and data are different (e.g., RF energy is transmitted over 915MHz band by Powercast transmitter). Since the EH-CRSN is extremely limited by energy supply, we adopt the distributed access method which can avoid transmitting and processing the global variable required in the centralized system to reduce information exchange and computational complexity. The throughput of such distributed EH-CRSN is analyzed theoretically based on the queueing theory. On the other hand, all the existing work, as far as we known, only focus on EH-CRSN with single sink, while many actual large-scale scenarios usually need multiple sinks. Therefore, we extend the proposed network to multiple sinks case. Moreover, to deal with the interference among different secondary communications, we use potential game to exploit the optimal MAC protocol.

The rest of this paper is organized as follows. In Section II, we present the system model. We derive the maximum network throughput by modeling the energy queuing process as a Markov chain in Section III. in Section IV, We propose a mixed interaction game, study related equilibrium properties, and propose an SLA based channel selection algorithm. We present the simulation results in Section V and conclude the paper in Section VI, respectively.

SECTION II.

System Model

A. Primary Network

In our model, there are C orthogonal primary channels licensed to the primary network. The channel set is denoted by {\rm {\mathcal{ C}}}=\left \{{ {1,\ldots,c,\ldots,C} }\right \} . It is assumed that each channel has the same transmission rate for every user, like the assumption in IEEE 802.16d/e [23]. Note that we do not adopt any explicitly communication standard in this paper, for this model applies to the communication standards which satisfy that all the channels can be accessed by secondary users are orthogonal to each other and provide the same transmission rate to users. The channels are time-slotted, meaning that they have a synchronous time structure with slot duration T . The traffic of primary network on channel c \in {\rm {\mathcal{ C}}} is modeled as a time-homogeneous Bernoulli process, denoted by {b_{c}\left ({t }\right)} , in which {b_{c}}\left ({t }\right) switches its states between 0 (busy or occupied) and 1 (idle or unoccupied). Let {b_{c}}\left ({t }\right) denote the probability that a channel is occupied by the primary user. Then, the probability of {b_{c}}\left ({t }\right) = 1 is 1 - \beta and that of {b_{c}}\left ({t }\right)= 0 is \beta . We assume the channel state changes slowly.

B. Energy Harvesting CR Sensor Network

As illustrated in Fig. 1, we consider a RF-powered CRSN consisting of one sink with enough energy and SNs. Each of the nodes is equipped with an energy harvesting capability and attempts to transmit data packets to the sink through the C primary channels. The SNs set is denoted by {\mathcal{ N}} = \left \{{ {1,\ldots,N} }\right \} . Only when the primary channel is unoccupied by PU, SN is allowed to opportunistically use the channel. As shown in Fig. 2, a time slot T is divided into two parts for SUs, the sink senses the channel state with duration {T_{s}} and the SNs transmit with duration {T_{t}} = T - {T_{s}} . The sink receives data from SNs and retransmit immediately using wired mode. Besides, there are some dedicated RF sources deployed to emit RF energy through an extra specific channel orthogonal to the primary channels as long as the distance between dedicated RF source and SN is less than {r_{h}} . SNs can harvest energy while sensing the channel or transmitting data in the same time slot.

FIGURE 1. - An EH-CRSN example in which SNs harvest energy from dedicated RF source. The sink outside the protect range of PU can share a common channel with PU, while the sink in the protect range cannot. To avoid the exposed terminal and hidden terminal problem, we assume 
${r_{ip}} + {r_{t}} < {r_{is}}$
.
FIGURE 1.

An EH-CRSN example in which SNs harvest energy from dedicated RF source. The sink outside the protect range of PU can share a common channel with PU, while the sink in the protect range cannot. To avoid the exposed terminal and hidden terminal problem, we assume {r_{ip}} + {r_{t}} < {r_{is}} .

FIGURE 2. - A time slot 
$T$
 is divided into two parts for SUs, the sink senses the channel state with duration 
${T_{s}}$
 and the SNs transmit with duration 
${T_{t}} = T - {T_{s}}$
. SNs can harvest energy during sensing or transmitting period.
FIGURE 2.

A time slot T is divided into two parts for SUs, the sink senses the channel state with duration {T_{s}} and the SNs transmit with duration {T_{t}} = T - {T_{s}} . SNs can harvest energy during sensing or transmitting period.

To ensure the communication quality of SNs and sink, we define the transmitting range, which is a disk with radius {r_{t}} centered at sink. The radius {r_{t}} is determined by transmitting power and the preset SINR threshold of sink. The communication of SN and sink potentially interfere with PU if the distance between PU and SN (or sink) is less than interference distance {r_{ip}} . {r_{ip}} is the minimum distance that SN (or sink) would not interfere with PU. In the same way, PU could also interfere with SN (or sink) within PU’s interference distance {r_{is}} , with {r_{is}} \gg {r_{ip}} . In order to protect both the primary and second transmissions, SNs are prevented from accessing the same channel with PU when the sink is less than {r_{is}} from PU. Define the protect range as the disk with radius {r_{is}} centered at each PU. Obviously, interference range is larger than transmission range, so we can easily draw the conclusion of {r_{t}} < {r_{ip}} < {r_{is}} . In addition, we further assume {r_{ip}} + {r_{t}} < {r_{is}} to avoid the exposed terminal and hidden terminal problem.

1) Energy Harvesting Model

We assume a SN doesn’t have a fixed power supply, and can only charge through energy harvesting. In order to ensure a stable and adequate supply of electricity, many dedicated RF sources are deployed for strong energy emission. And each energy harvester in a SN must be equipped with a power conversion circuit that can extra DC power from the received electromagnetic waves [24]. Due to channel fading, the situation of SN has certain requirements, i.e., the distance between SN and RF source needs to be no greater than a predesigned value. So, we define the area with such predesigned radius value {r_{h}} centered at each RF source as harvesting range. For simplicity, it is assumed that EH is a random event affected by location. We suppose SNs can move freely and each SN can harvest at most one unit of energy in each time slot. When they move into the harvesting range, they can harvest energy immediately. (EH is influenced by obstruction, multipath effect, fading, the distance between SN and dedicated RF source and so on. But the theoretical analysis and the derivation of formulas are too difficult under these conditions for knowledge of the EH process statistics is difficult to obtain. So, we started with a simple case. This assumption has been adopted in many literatures such as [20] and [21]).

Firstly, we model the energy queue with infinite capacity to quantify the amount of energy saved in the energy buffer. The energy queue takes the harvested energy as the input and the expended energy as the output. Assume a SN can harvest n units of energy in each time slot T if it is in the harvesting range. SNs are randomly distributed in the network for they can move freely. It is assumed that \alpha is the probability for SN to locate in at least one harvesting range and 1 - \alpha is the probability for SN not to locate in any harvesting range. Denote {h_{i}}(t) as the number of energy units harvested by node i during slot t . Thus, {h_{i}}(t) = n with probability \alpha and {h_{i}}(t) = 0 with probability 1 - \alpha . The energy harvested during slot t can be used since slot t + 1 .

2) SN Transmission Model

Assume each node has a sensed data queue of infinite capacity. Thus, each node always has a data packet to send at the beginning of every time slot. In order to protect PUs, at the beginning of each slot, the sink obtains the information regarding the sensing result. As we mentioned above, the sink has no energy limitation through the wired power supply. Hence, we don’t consider the energy cost of channel sensing of the sink. Then, the sink transmits the channel information to all SNs through an idle channel. For it is marginal compared to the data transmission, we assumed the energy consumption of channel information sharing is negligible.

After receiving the channel information, each SN would opportunistically choose an idle channel to send signals to sink if there is more than one channel is idle. Assume that sensing and transmitting one data packet consumes m units of energies. That is, under the assumption of a constant transmission [25], [26], the number m of energy units required for the transmission of a packet of fixed size is equal to the duration {T_{t}} times the power needed to sense and transmit the packet. We assume that a node can only sense data and attempt transmission when it has more than one energy unit stored in its energy queue, i.e., m = 1 .

In this paper, it is assumed that a SN can only transmit on one channel, and the spectrum sensing is prefect. We consider a slotted Aloha based transmission mechanism. Specifically, if at least one channel is idle and the residual energy {E_{t}} is not less than m , the node transmits with probability p and keep silent with probability 1 - p . The probabilities of a node selecting all the idle channel are equal. That is, a SN attempt to transmit a data packet on a certain idle channel with probability \frac {p}{A_{t}} , where {A_{t}} is the number of idle channels. The probability that {A_{t}} \ge 1 and that {E_{t}} \ge m is q and \gamma , respectively. Thus, we have q = 1 - {\beta ^{C}} .

SECTION III.

Problem Formulation

A. Energy Queuing Model

To derive the system throughput, we firstly establish a Markov chain model for energy queuing process of one SN i . Define {E_{i}}(t) as the stored energy units of SN i at the beginning of slot t . As mentioned above, {E_{i}}(t + 1) can be given by \begin{equation*} {E_{i}}(t + 1) = \begin{cases} {E_{i}}(t) - 1, &{\mathrm{if}}~{h_{i}}(t) = 0,~{e_{i}}(t) = 1 \\ {E_{i}}(t),&{\mathrm{if}}~{h_{i}}(t) = 0,~{e_{i}}(t) = 0\\ {E_{i}}(t) + n - 1, &{\mathrm{if}}~{h_{i}}(t) = n,~{e_{i}}(t) = 1\\ {E_{i}}(t) + n, &{\mathrm{if}}~{h_{i}}(t) = n,~{e_{i}}(t) = 0 \end{cases}\tag{1}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Thus, the transition diagram of the energy queuing process can be described as Fig. 3, where \lambda = (1 - \alpha)(1 - p) . Obviously, it is an aperiodic Markov chain. The property of the Markov chain is characterized by the following theorem.

FIGURE 3. - The transition diagram of the energy queuing which is an aperiodic Markov chain.
FIGURE 3.

The transition diagram of the energy queuing which is an aperiodic Markov chain.

Theorem 1:

The energy queuing process is an aperiodic irreducible Markov chain.

Proof:

First, let us denote one-step transition probability from x to y of SN i as {P_{x,y}} = {\left ({{P^{1}} }\right)_{x,y}} = P({E_{i}}(t + 1) = y|{E_{i}}(t) = x) . We say state x communicates with state y , if {({P^{k_{1}}})_{x,y}} > 0 and {({P^{k_{2}}})_{y,x}} > 0 some {k_{1}} > 0,{k_{2}} > 0 . To prove the Markov chain is irreducible, we need to prove there is a state which every state can communicates with. That is, if there is a state y satisfies there is a state y satisfies {({P^{k_{1}}})_{x,y}} > 0,{({P^{k_{2}}})_{y,x}} > 0,\forall x \in N,{k_{1}} > 0,{k_{2}} > 0 , we can say the Markov chain is irreducible.

It is assumed that y = n . Obviously, when x = 0 , we have {({P^{1}})_{x,n}} = \alpha > 0 and {({P^{n}})_{n,x}} = {p^{n}}{(1 - \alpha)^{n}} > 0 ; when 1 < x < n , we have {({P^{x + 1}})_{x,n}} = {p^{x}}{(1 - \alpha)^{x}}\alpha > 0 and {({P^{n - x}})_{n,x}} = {p^{n - x}}{(1 - \alpha)^{n - x}} > 0 ; when n = x , we have {({P^{1}})_{x,n}} = {({P^{1}})_{n,x}} = \left ({{1 - \alpha } }\right)\left ({{1 - p} }\right) > 0 ; when n < x , we have {({P^{x - n}})_{x,n}} = {p^{x - n}}{(1 - \alpha)^{x - n}} > 0 and {\left({{P^{\left \lceil{ {\frac {x - n}{n}} }\right \rceil + \left \lceil{ {\frac {x}{n}} }\right \rceil - x}}}\right)_{n,x}} \ge {\left [{ {(1 - p)\alpha } }\right]^{\left \lceil{ {\frac {x - n}{n}} }\right \rceil }}{\left [{ {p(1 - \alpha)} }\right]^{\left \lceil{ {\frac {x}{n}} }\right \rceil - x}} > 0 . Then, the Markov chain is irreducible. Thus, Theorem 1 follows.

Theorem 1 indicates that the energy queuing process has a unique stationary distribution. We denote the stationary distribution as {\mathrm{\pi }} = ({\pi _{0}},{\pi _{1}},\ldots) , where {\pi _{k}} = P({E_{i}}(t) = P({E_{i}}(t) = k),\forall i \in {\mathcal{ N}},\forall k \in \{ 0,1,2,\ldots \} . Then, we have \begin{align*} {\pi _{0}}=&(1 - \alpha){\pi _{0}} + qp(1 - \alpha){\pi _{1}} \tag{2}\\ {\pi _{k}}=&(1 \!-\! qp)(1 \!-\! \alpha){\pi _{k}} \!+\! qp(1 \!-\! \alpha){\pi _{k + 1}},\quad k \!\in \! [1,n \!-\! 1] \tag{3}\\ {\pi _{n}}=&(1 \!-\! qp)(1 \!-\! \alpha){\pi _{n}} \!+\! \alpha {\pi _{0}} \!+\! p\alpha {\pi _{1}} \!+\! qp(1 \!-\! \alpha){\pi _{n \!+\! 1}} \tag{4}\\ {\pi _{k}}=&(1 - qp)(1 - \alpha){\pi _{k}} + (1 - qp)\alpha {\pi _{k - n}} + qp\alpha {\pi _{k - n + 1}} \\&+\,qp(1 - \alpha){\pi _{k + 1}},\;\; k \in [n + 1, + \infty)\tag{5}\end{align*} View SourceRight-click on figure for MathML and additional features.

To derive the stationary distribution, observe (5) and construct the solution follows \begin{equation*} {\pi _{k}} = b{\lambda ^{k - n}},\quad k \ge n \tag{6}\end{equation*} View SourceRight-click on figure for MathML and additional features. where b > 0 and \lambda \in [{0,1}] is a zero solution of \begin{align*} f(y) \!=\! qp(1 - \alpha){y^{n + 1}}- (qp \!+\! \alpha \!-\! qp\alpha){y^{n}} + qp\alpha y \!+\! (1 \!-\! qp)\alpha \!\!\! \\ \tag{7}\end{align*} View SourceRight-click on figure for MathML and additional features. Based on (7), we have f\left ({1 }\right) = 0 , f(0) = (1 - qp)\alpha > 0 , f'(0) = qp\alpha > 0 , f(1) ' = qp - \alpha n and f''(y) = n{y^{n - 2}}[qp(1 - \alpha)(n + 1)y - (qp + \alpha - qp\alpha)(n - 1)] . Then, we have f''(0) = 0 , f''(1) = n[qp - \alpha n + qp(1 - \alpha) + \alpha (1 - qp)] , and we can see that f''(y) is a monotonic increasing function on (0, 1]. Then, we discuss as follows:

  • for 0 < qp - \alpha n , f'(1) > 0 and f''(1) > 0 .

  • for - qp(1 - \alpha) - (1 - qp)\alpha \le qp - \alpha n < 0 , f'(1) < 0 and f''(1) \ge 0 .

  • for qp - \alpha n < - qp(1 - \alpha) - (1 - qp)\alpha , f'(1) < 0 and f''(1) < 0 .

from which we can have: if 0 < p - \alpha n , (7) has one zero solution on (0, 1); if - qp(1 - \alpha) - (1 - qp)\alpha \le qp - \alpha n < 0 or qp - \alpha n < - qp(1 - \alpha) - (1 - qp)\alpha , (7) has not zero solution on (0, 1), which means P\left ({{E_{i}(t) = + \infty } }\right) = 1 .

It is supposed that 0 < qp - \alpha n . From (7), \lambda \in (0,1) satisfies qp(1 - \alpha){\lambda ^{n + 1}} - (qp + \alpha - qp\alpha){y^{n}} + qp\alpha y + (1 - qp)\alpha = 0 which can be factored into (\lambda - 1)\left[{qp(1 - \alpha)\sum \limits _{k = 1}^{n} {\lambda ^{k}} - (qp + \alpha - qp\alpha) * * \sum \limits _{k = 1}^{n - 1} {\lambda ^{k}} - (1 - qp)\alpha }\right] = 0 . For \lambda \ne 1 , we have \begin{equation*} qp(1 - \alpha)\sum \limits _{k = 1}^{n} {\lambda ^{k}} - (qp\! +\! \alpha - qp\alpha)\sum \limits _{k = 1}^{n - 1} {\lambda ^{k}} \!=\! (1- qp)\alpha \quad ~~ \tag{8}\end{equation*} View SourceRight-click on figure for MathML and additional features. By using (6), (8) can be expressed as \begin{align*} qp(1 - \alpha)\sum \limits _{k = n + 1}^{2n} {\pi _{k}} \!-\! (qp \!+\! \alpha - qp\alpha)\sum \limits _{k = n + 1}^{2n - 1} {\pi _{k}} \!=\! (1 - qp)\alpha b\!\!\! \\ \tag{9}\end{align*} View SourceRight-click on figure for MathML and additional features. From (2) (4) (6), \lambda is given by \begin{equation*} \lambda = \frac {{(qp + \alpha - qp\alpha)b - qp{\pi _{1}}}}{qp(1 - \alpha)b} \tag{10}\end{equation*} View SourceRight-click on figure for MathML and additional features. From (4), {\pi _{1}} can be expressed as \begin{equation*} {\pi _{1}} = {\left[{\frac {qp(1 - \alpha)}{qp + \alpha - qp\alpha }}\right]^{n - 1}}{\pi _{n}} = {\left[{\frac {qp(1 - \alpha)}{qp + \alpha - qp\alpha }}\right]^{n - 1}}b\qquad \tag{11}\end{equation*} View SourceRight-click on figure for MathML and additional features. From (6), we have \begin{equation*} \sum \limits _{k = n}^{ + \infty } {\pi _{k}} = \frac {b}{1 - \lambda } \tag{12}\end{equation*} View SourceRight-click on figure for MathML and additional features. From (5), we have \begin{align*} (qp + \alpha - qp\alpha)\sum \limits _{k = n + 1}^{2n - 1} {\pi _{k}}=&(1 - qp)\alpha \sum \limits _{k = 1}^{n - 1} {\pi _{k}} + qp\alpha \sum \limits _{k = 2}^{n} {\pi _{k}} \\&\quad +\, qp(1 - \alpha)\sum \limits _{k = n + 2}^{2n} {\pi _{k}}\quad \tag{13}\end{align*} View SourceRight-click on figure for MathML and additional features. By using (9) and (12), (13) can be expressed as: \begin{align*} 0=&\left[{qp(1 - \alpha)\sum \limits _{k = n + 1}^{2n} {\pi _{k}} - (qp + \alpha - qp\alpha)\sum \limits _{k = n + 1}^{2n - 1} {\pi _{k}} }\right] \\&{}-\, qp(1 - \alpha){\pi _{n + 1}} {\mathrm{ }} + (1 -qp)\alpha \sum \limits _{k = 1}^{n - 1} {\pi _{k}} + qp\alpha \sum \limits _{k = 2}^{n} {\pi _{k}} \\=&\alpha \sum \limits _{k = 1}^{n} {\pi _{k}} - qp(1 - \alpha)b\lambda - qp\alpha {\pi _{1}} \\=&\alpha \left[{1 - {\pi _{0}} - \frac {b}{1 - \lambda }}\right] - qp(1 - \alpha)b\lambda - qp\alpha {\pi _{1}} \tag{14}\end{align*} View SourceRight-click on figure for MathML and additional features. From (14), b and {\pi _{1}} are given by \begin{align*} b=&\frac {{qp\alpha {\pi _{1}}}}{{\alpha ^{2} + {q^{2}}{p^{2}}{\pi _{1}} - {q^{2}}{p^{2}}\alpha {\pi _{1}}}} \tag{15}\\ {\pi _{1}}=&\frac {\alpha ^{2}b}{qp(qp\alpha b - qpb + \alpha)} \tag{16}\end{align*} View SourceRight-click on figure for MathML and additional features. It follows from (10) and (15) that \lambda can be expressed as \begin{equation*} \lambda = 1 + \frac {{qp{\alpha ^{2}}b - qp\alpha b}}{qp(1 - \alpha)(qp\alpha b - qpb + \alpha)} \tag{17}\end{equation*} View SourceRight-click on figure for MathML and additional features. From (16) and (11), we have \begin{equation*} qp\alpha b - qpb + \alpha = \frac {\alpha ^{2}}{qp}{\left[{\frac {qp + \alpha - qp\alpha }{qp(1 - \alpha)}}\right]^{n - 1}} \tag{18}\end{equation*} View SourceRight-click on figure for MathML and additional features. By using (6), (17) and (18), \sum \limits _{k = n}^{ + \infty } {\pi _{k}} is given by \begin{align*} \sum \limits _{k = n}^{ + \infty } {\pi _{k}} \!=\! \frac {b}{1 - \lambda } \!=\! \frac {qp\alpha b - qpb \!+\! \alpha }{\alpha } \!=\! \frac {\alpha }{qp}{\left[{\frac {qp + \alpha - qp\alpha }{qp(1 - \alpha)}}\right]^{n - 1}}\!\!\!\!\!\! \\ \tag{19}\end{align*} View SourceRight-click on figure for MathML and additional features. Thus, the probability that a SN has enough energy to transmit is given by:\begin{equation*} \gamma = P({E_{i}}(t) \ge 1) = \sum \limits _{k = 1}^{ + \infty } {\pi _{k} = } \frac {\alpha }{qp} \tag{20}\end{equation*} View SourceRight-click on figure for MathML and additional features. If qp - \alpha n < 0 , there are always enough energy units for transmitting, i.e., \begin{equation*} \gamma = \sum \limits _{k = 1}^{ + \infty } {\pi _{k}} = 1 \tag{21}\end{equation*} View SourceRight-click on figure for MathML and additional features.

B. System Throughput

With the derived probability \gamma , we now analyze the system throughput. Denote {\theta _{i}}(t) as the data packets successfully transmitted by SN i in time slot t , \theta \left ({t }\right) as the system throughput. Then, {\theta _{i}}(t) = 1 indicates there are k \ge 1 idle channels in which one channel is only selected by SN i to transmit data packets. Thus, if 0 < qp - \alpha n , E({\theta _{i}}(t)) is given by \begin{equation*} E\left [{ {\theta _{i}(t)} }\right] = \sum \limits _{k = 1}^{C} {C_{C}^{k}{(1 - \beta)^{k}}{\beta ^{C - k}}C_{k}^{1}\frac {\gamma p}{k}{{\left({1 - \frac {\gamma p}{k}}\right)}^{N - 1}}}\qquad \tag{22}\end{equation*} View SourceRight-click on figure for MathML and additional features. According to (22), the system throughput is the expectation of \theta (t) , i.e., \begin{align*} E[\theta \left ({t }\right)]=&NE({\theta _{i}}(t)) \\=&N\sum \limits _{k = 1}^{C} {C_{C}^{k}{(1 - \beta)^{k}}{\beta ^{C - k}}C_{k}^{1}\frac {\gamma p}{k}{{\left({1 - \frac {\gamma p}{k}}\right)}^{N - 1}}}\qquad \tag{23}\end{align*} View SourceRight-click on figure for MathML and additional features. If qp - \alpha n < 0 , from (22), the system throughput is given as follows:\begin{equation*} E[\theta \left ({t }\right)] = N\sum \limits _{k = 1}^{C} {C_{C}^{k}{(1 - \beta)^{k}}{\beta ^{C - k}}C_{k}^{1}\frac {p}{k}{{\left({1 - \frac {p}{k}}\right)}^{N - 1}}}\qquad \tag{24}\end{equation*} View SourceRight-click on figure for MathML and additional features.

SECTION IV.

Mixed Interaction Game in RF-CRSN Resource Management

Since multiple sinks will bring complex topological structure and network characteristics, it is difficult to write a fixed expression of throughput. Thus, the formulas derived in section III are not application any more. However, we can obtain the optimal spectrum access strategy to maximize the system throughput through formulating the problem as a potential game instead of controlling transmission probability p . In this section, we first introduce the idea of competing SNs and interfering SNs. Then, we propose a new mixed interaction game formulation to model the opportunistic access of SNs. Finally, we analyze the properties of complex interaction game.

A. Competing and Interfering Node

Assume that there are M sinks in the network. Denote the set of sinks as {\mathcal{ M}} = \left \{{ {1,\ldots,M} }\right \} . To guarantee communication quality, a SN i \in {\mathcal{ N}} always communicates with the nearest sink {M_{i}} at slot t as long as it is in the transmitting range of {M_{i}} , which is said that i communicates with {M_{i}} . However, a node communicates with one sink may also interfering some other sinks. This fact motivates us to define the interfering range, which is the area within a radius of {r_{i}} centered at each sink. Denote the set of SNs communicate with sink s as {\cal T_{s}} and the set of the other SNs in the interfering range as {\cal I_{s}} , with {\cal T_{s}} \cap {\cal I_{s}} = \emptyset . In this paper, we assume {r_{t}} = {r_{i}} for simplicity, which means the interfering range is overlapped with the transmitting range of a sink. As a result, sink s can exchange information directly with SNs belong to {\cal I_{s}} , and if more than one SN within the interfering range select the same channel simultaneously, collision will happen.

To visually present the topological structure and interaction relationship, we draw an interaction graph. The structure of this graph is determined by the distance between SNs and sinks. Specially, SNs and sinks are represented as circular nodes and triangular nodes, respectively. Connect sink s \in {\mathcal{ M}} and a SN i with solid line if i \in {\cal T_{s}} , and connect sink s \in {\mathcal{ M}} and a SN i with dotted line if i \in {\cal I_{s}} . In addition, define the SNs communicate with the same sink as competing nodes. The set of competing nodes of SN i is denoted as {\cal Z_{i}} , i.e., \begin{equation*} {\cal Z_{i}} = \left \{{ {j \in {\cal T_{M_{i}}},j \ne i} }\right \} \tag{25}\end{equation*} View SourceRight-click on figure for MathML and additional features. Besides, other than the competing nodes, define the SNs in the same interference range as interfering nodes. The set of interfered nodes of SN i is denoted as {\cal J_{i}} , i.e., \begin{equation*} {\cal J_{i}} = \left \{{ {j \in {\mathcal{ N}}:i \in {\cal I_{s}},j \in {\cal T_{s}},\forall s \in {\mathcal{ M}}} }\right \} \tag{26}\end{equation*} View SourceRight-click on figure for MathML and additional features.

As a result, collision occurs when a SN simultaneously accesses the same channel with its competing nodes or interfering nodes. For the example of proposed RF-CRSN, the interaction graph is shown in Fig. 4. As illustrated in Fig. 4, there are four channels and two PUs. PU 1 occupies the channel 1, and PU 2 occupies channel 2 and 3. Each SN has a set of available channels {\cal A_{\mathrm{i}}} \subseteq {\mathcal{ C}} , which is equal to the available channel set of sink {M_{i}} . Such as, the available channel sets of SN 3 and node 4 are both \left \{{ 4 }\right \} , for sink 2 which they communicate with is located in the protect range of the two PUs.

FIGURE 4. - An example of the proposed RF-CRSN with multi sinks.
FIGURE 4.

An example of the proposed RF-CRSN with multi sinks.

As mentioned above, the throughput of SN i is affected by actions of every SN j \subseteq {\cal Z_{i}} \cup {\cal I_{M_{i}}} while SN i influences the transmitting of SN j \subseteq {\cal Z_{i}} \cup {\cal J_{i}} . Let {a_{i}} \in {\cal A_{i}} be the selected channel of SN i , which is 0 when SN does not select any channel, i.e., {a_{i}} = 0 . Denote the channel selection strategy profile of all SNs as {\mathbf{a}} = ({a_{1}},\ldots,{a_{N}}) with the joint strategy profile set {\mathcal{ A}} = \mathop \times \limits _{i \in {\mathcal{ N}}} {\cal A_{i}} . Then, the throughput of SN i is given by \begin{equation*} {\theta _{i}}({a_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{M_{i}}}}}) = \begin{cases} \gamma \prod \limits _{j \in {\cal Z_{i}}\cup {\cal I_{M_{i}}}} {{(1 - \gamma)^{f({a_{i}},{a_{j}})}}}, &{a_{i}} \ne 0 \\ 0,&{a_{i}} = 0\\ \end{cases}\qquad \tag{27}\end{equation*} View SourceRight-click on figure for MathML and additional features. where f\left ({{a_{i},{a_{j}}} }\right) is given by \begin{equation*} f\left ({{a_{i},{a_{j}}} }\right) = \begin{cases} 1, &{a_{i}} = {a_{j}} \\ 0, &{a_{i}} \ne {a_{j}}\\ \end{cases} \tag{28}\end{equation*} View SourceRight-click on figure for MathML and additional features. Note that f\left ({{a_{i},{a_{j}}} }\right) = 1 indicates SN j chooses the same channel with SN i .

According to individual throughput, system throughput is given by \begin{equation*} {U_{0}} = \sum \limits _{i \in {\mathcal{ N}}} {\theta _{i}} \tag{29}\end{equation*} View SourceRight-click on figure for MathML and additional features. As a result, we have the optimization objective as follows \begin{equation*} \max {U_{0}}({\mathbf{a}}) \tag{30}\end{equation*} View SourceRight-click on figure for MathML and additional features.

B. Mixed Interaction Game Formulation

It is common to solve optimization problem of distributed self-organizing network by using game theory. However, cross interactions make it confusing to obtain the optimal strategy. Inspired by the local interaction game in [27], we proposed a new mixed interaction game applies to the RF-CRSN. We define the mixed interaction game as follows.

Definition 1 (Mixed Interaction Game):

The mixed interaction game of RF-CRSN is G = ({\mathcal{ N}},{\left \{{ {\cal A_{i}} }\right \}_{i \in {\mathcal{ N}}}},{\left \{{ {\cal Z_{i}} }\right \}_{i \in {\mathcal{ N}}}}, {\left \{{ {\cal J_{i}} }\right \}_{i \in {\mathcal{ N}}}},{\left \{{ {u_{i}} }\right \}_{i \in {\mathcal{ N}}}}) , where {u_{i}} is the utility function of node i , which is defined as follows \begin{align*} {u_{i}}({a_{i}},{{\mathbf{a}}_{ - i}})=&{\theta _{i}}({a_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{M_{i}}}}}) + \sum \limits _{j \in {\cal Z_{i}}} {\theta _{j}({a_{j}},{{\mathbf{a}}_{\cal Z_{j} \cup {\cal I_{M_{j}}}}})} \\&\qquad \qquad \qquad +\, \sum \limits _{k \in {\cal J_{i}}} {\theta _{k}({a_{k}},{{\mathbf{a}}_{\cal Z_{k} \cup {\cal I_{M_{k}}}}})}\qquad \quad \tag{31}\end{align*} View SourceRight-click on figure for MathML and additional features. where {{\mathbf{a}}_{ - i}} \le is the strategy set except for i .

In the mixed interaction game, {\mathcal{ N}} is the set of players, {\cal A_{i}} is the strategy space of i , {\cal Z_{i}} and {\cal J_{i}} are sets of players who would cause collision with player i . Then, let us introduce an important concept in game theory.

Definition 2 (Pure Nash Equilibrium, PNE):

A strategy profile {\mathbf{a}} is a pure Nash equilibrium if no node can improve its utility by unilaterally deviating its strategy, i.e., \begin{equation*} {u_{i}}({a_{i}},{{\mathbf{a}}_{ - i}}) \ge {u_{i}}(a{'_{i}},{{\mathbf{a}}_{ - i}}) \tag{32}\end{equation*} View SourceRight-click on figure for MathML and additional features. for \forall i \in {\mathcal{ N}},\forall a{'_{i}} \in {\cal A_{i}} .

Theorem 2:

The mixed interaction game G \!=\! ({\mathcal{ N}},{\left \{{ {\cal A_{i}} }\right \}_{i \in {\mathcal{ N}}}}, \,\,{\left \{{ {\cal Z_{i}} }\right \}_{i \in {\mathcal{ N}}}},\,\,{\left \{{ {\cal J_{i}} }\right \}_{i \in {\mathcal{ N}}}},{\left \{{ {u_{i}} }\right \}_{i \in {\mathcal{ N}}}}) has at least one PNE, and the optimal solution which maximizes the system throughput constitutes a PNE.

Proof:

Firstly, let system throughput as the potential function which is given by \begin{equation*} \Phi ({a_{i}},{{\mathbf{a}}_{ - i}}) = \sum \limits _{i \in {\mathcal{ N}}} {\theta _{i}({a_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{M_{i}}}}})} = {U_{0}} \tag{33}\end{equation*} View SourceRight-click on figure for MathML and additional features. Then, suppose a node i \in {\mathcal{ N}} unilaterally change its action from {a_{i}} to a{'_{i}} , which cause a difference given by (34), as shown at the bottom of this page,

where {\mathbf{a}}{'_{\cal Z_{l} \cup {\cal I_{M_{l}}}}} = {{\mathbf{a}}_{\cal Z_{l} \cup {\cal I_{M_{l}}}}}, l \notin {\cal Z_{i}},l \notin {\cal J_{i}},l \ne i . Thus, we have\begin{equation*} \sum \limits _{l \notin {\cal Z_{i}},l \notin {\cal J_{i}},l \ne i} {\left ({{\theta _{l}({a_{l}},{\mathbf{a}}{'_{\cal Z_{l} \cup {\cal I_{M_{l}}}}}) - {\theta _{l}}({a_{l}},{{\mathbf{a}}_{\cal Z_{l} \cup {\cal I_{M_{l}}}}})} }\right)} = 0\qquad \tag{35}\end{equation*} View SourceRight-click on figure for MathML and additional features. By using (35), (34) can be expressed as \begin{align*} \Delta \Phi=&\left [{ {\theta _{i}(a{'_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{M_{i}}}}}) - {\theta _{i}}({a_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{M_{i}}}}})} }\right] \\&+\!\left [{ {\sum \limits _{j \in {\cal J_{i}}} {\left ({{\theta _{j}({a_{j}},{\mathbf{a}}{'_{\cal Z_{j} \cup {\cal I_{M_{j}}}}}) \!-\! {\theta _{j}}({a_{j}},{{\mathbf{a}}_{\cal Z_{j} \cup {\cal I_{M_{j}}}}})} }\right)} } }\right] \\&+\!\left [{ {\sum \limits _{k \in {\cal J_{i}}} {\left ({{\theta _{k}({a_{k}},{\mathbf{a}}{'_{\cal Z_{k} \cup {\cal I_{M_{k}}}}}) \!-\! {\theta _{k}}({a_{k}},{{\mathbf{a}}_{\cal Z_{k} \cup {\cal I_{M_{k}}}}})} }\right)} } }\right]\qquad ~ \tag{36}\end{align*} View SourceRight-click on figure for MathML and additional features. On the other hand, from (31), the change of utility function is given by \begin{align*} \Delta {u_{i}}=&{u_{i}}\left ({{a{'_{i}},{{\mathbf{a}}_{ - i}}} }\right) - {u_{i}}\left ({{a_{i},{{\mathbf{a}}_{ - i}}} }\right) \\=&\Bigg [{\theta _{i}}\left ({{a{'_{i}},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{i}}}}} }\right) + \sum \limits _{j \in {\cal Z_{i}}} {\theta _{j}\left ({{a_{j},{\mathbf{a}}{'_{\cal Z_{j} \cup {\cal I_{M_{j}}}}}} }\right)} \\&+ \sum \limits _{j \in {\cal J_{i}}} {\theta _{j}\left ({{a_{j},{\mathbf{a}}{'_{\cal Z_{j} \cup {\cal I_{M_{j}}}}}} }\right)} \Bigg] - \Bigg [{\theta _{i}}\left ({{a_{i},{{\mathbf{a}}_{\cal Z_{i} \cup {\cal I_{i}}}}} }\right) \\&+ \sum \limits _{j \in {\cal Z_{i}}} {\theta _{j}\left ({{a_{j},{{\mathbf{a}}_{\cal Z_{j} \cup {\cal I_{M_{j}}}}}} }\right)} + \sum \limits _{j \in {\cal J_{i}}} {\theta _{j}\left ({{a_{j},{{\mathbf{a}}_{\cal Z_{j} \cup {\cal I_{M_{j}}}}}} }\right)} \Bigg]\qquad ~ \tag{37}\end{align*} View SourceRight-click on figure for MathML and additional features. Comparing (36) with (37), we have that the change of potential function is equal to the change of utility function, i.e., \begin{equation*} {\Phi _{i}}(a{'_{i}},{{\mathbf{a}}_{ - i}}) - {\Phi _{i}}({a_{i}},{{\mathbf{a}}_{ - i}}) = {u_{i}}(a{'_{i}},{{\mathbf{a}}_{ - i}}) - {u_{i}}({a_{i}},{{\mathbf{a}}_{ - i}})\qquad \tag{38}\end{equation*} View SourceRight-click on figure for MathML and additional features. which indicates that the mixed interaction game G is an exact potential game [28].

Exact potential game has been proved to has at least one PNE, one of which can be achieved by optimal solution maximizes the potential function [28]. Therefore, Theorem 2 is proved.

C. Learning Algorithm

There are already many algorithms to achieve the pure Nash equilibrium. However, due to lack of complete information, we adopt SLA algorithm which has been proved can get pure Nash equilibrium of potential game [27], [29]–​[31]. Before present the algorithm, let us introduce another important definition.

Algorithm 1 SLA Based Channel Select Algorithm

1:

Initially: t = 0 , {\pi _{i,k}} = \frac {1}{{\left |{ {\cal A_{i} + 1} }\right |}},\forall i \in {\mathcal{ N}} , k = 0,1,\ldots,\left |{ {\cal A_{i}} }\right |

2:

Loop t = t + 1

3:

At the beginning of slot t , each SN i selects channel {a_{i}}\left ({t }\right) according to {{\boldsymbol{\pi }}_{i}} .

4:

Each SN attempts to transmit data packet through selected channel. Then, each SN gets reward {u_{i}}(t) specified by (31).

5:

Every SN updates the {{\boldsymbol{\pi }}_{i}} according to the following rule \begin{align*} {\pi _{i,k}}\left ({{t + 1} }\right) \!=\! \begin{cases} {\pi _{i,k}}\left ({t }\right) \!+\! a{\tilde r_{i}}\left ({t }\right)\left ({{1 - {\pi _{i,k}}\left ({t }\right)} }\right),&k = {a_{i}}(t) \\ {\pi _{i,k}}\left ({t }\right) \!-\! a{\tilde r_{i}}\left ({t }\right){\pi _{i,k}}\left ({t }\right),&k {\mathrm{\ne }} {a_{i}}(t) \end{cases}\!\!\!\!\! \\ \tag{39}\end{align*} View SourceRight-click on figure for MathML and additional features. where 0 < b < 1 is the step size, {\tilde r_{i}} is the normalized utility defined as \begin{equation*} {\tilde r_{i}}\left ({t }\right) = {u_{i}}\left ({t }\right)/A \tag{40}\end{equation*} View SourceRight-click on figure for MathML and additional features. A is a constant which is large enough to ensure 0 \le {\tilde r_{i}}\left ({t }\right) \le 1 .

6:

If any SN i \in {\mathcal{ N}} select a channel k with probability close to 1, i.e., {\pi _{i,k}} > 0.99 , \forall k \in \left \{{ {0,1,\ldots,\left |{ {\cal A_{i}} }\right |} }\right \} , go to step 8; otherwise, go to step 2.

7:

End Loop

Definition 3 (Mixed Nash Equilibrium, MNE):

Define {\boldsymbol{\pi }} = \left ({{{{\boldsymbol{\pi }}_{1}},{{\boldsymbol{\pi }}_{2}},\ldots,{{\boldsymbol{\pi }}_{N}}} }\right) as mixed strategy profile, where {{\boldsymbol{\pi }}_{i}} = \left ({{{\pi _{i,0}},{\pi _{i,1}},{\pi _{i,2}},\ldots,{\pi _{i,\left |{ {\cal A_{i}} }\right |}}} }\right) is the probability distribution of SN i on the available channel set when selecting channel. {\Pi _{i}} is the set of {{\boldsymbol{\pi }}_{i}} with the joint strategy profile set \Pi = \mathop \times \limits _{i \in {\mathcal{ N}}} {\Pi _{i}} .

A mixed strategy profile {{\boldsymbol{\pi }}^ {*} } is a mixed Nash equilibrium if no node can improve its expected utility by unilaterally deviating its strategy, i.e., \begin{equation*} E\left ({{u_{i}\left ({{{{\boldsymbol{\pi }}^ {*} }} }\right)} }\right) \ge E\left ({{u_{i}\left ({{{\boldsymbol{\pi }}{'_{i}},{{\boldsymbol{\pi }}^ {*} }_{ - i}} }\right)} }\right) \tag{41}\end{equation*} View SourceRight-click on figure for MathML and additional features. \forall i \in {\mathcal{ N}},\forall {\boldsymbol{\pi }}{'_{i}} \in {\Pi _{i}} , where {{\boldsymbol{\pi }}_{ - i}} is the mixed strategy set except for i . Obviously, pure Nash equilibrium is a specific mixed Nash equilibrium.

Then, the SLA based algorithm starts with mixed strategy and ends up with pure Nash equilibrium. First of all, sinks sense the channel states and each node chooses channel with equal probability based on idle channel information. Secondly, each SN attempts to transmit data packet through the selected channel as long as it has enough energy and gets its reward. After that, every SN updates its probability distribution of channel selection according to reward following a certain rule. Then, repeat the first step until every node choose a channel with a probability close to 1. Finally, we get a pure Nash equilibrium which maximize the system throughput.

SECTION V.

Simulation Results

A. Performances in Single-Sink Network

We first study the performances of RF-CRSN with single sink. The simulation mainly includes two parts. In the first part, we compare actual system throughput with theoretical value to prove the system throughput function is correct. In the second part, we present the relationship between throughput and probability of transmitting and energy harvesting.

We consider a single-hop RF-CRSN consists of N SNs in a circle with radius {r_{t}} = 210m centered at a sink. SNs equipped with energy harvesting module are randomly located in the transmitting range. There are C channels which are independently occupied by PUs with the same probability \beta . All the transmission rates of the channel are 1Mbps. SNs keep silence with probability 1 - p and transmit with equal probability in each idle channel. Moreover, it is assumed that each SN harvests n energy units in one time slot with probability \alpha . Then, we generate three cases of parameter sets, which are: (1) N = 4,C = 4,p = 0.2,\alpha = 0.2,n = 2,\beta = 0.4 ; (2) N = 9,C = 4,p = 0.5,\alpha = 0.2,n = 1,\beta = 0.3 ; (3) N = 6,C = 8,p = 0.8,\alpha = 0.3,n = 2,\beta = 0.3 . The cumulative average system throughputs are shown in Fig. 5, in which each experimental value is obtained by averaging system throughputs of 2500 iterations. As we can see, when accumulate enough iterations, the experimental average system throughputs are close to the theoretical ones got by formula (23) and (24). For clarity, Fig. 6 shows the experimental and theoretical value of system throughput {E_{e}}\left ({\theta }\right) and {E_{t}}\left ({\theta }\right) and the differences between them under different parameters which are listed in Table 1. It is noted from the table that differences between experimental average system throughputs and theoretical values are no more than 0.05. Both Fig. 5 and Fig. 6 prove the formulas of system throughput in (23) and (24) are correct.

TABLE 1 Parameters of Nine Cases
Table 1- 
Parameters of Nine Cases
FIGURE 5. - The experimental and theoretical value of cumulative average system throughputs of three cases. The parameter sets are: (1) 
$N = 4$
, 
$C = 4, p = 0.6, \alpha = 0.2,n = 2,\beta = 0.4$
; (2) 
$N = 9,C = 4,p = 0.5$
, 
$\alpha = 0.2,n = 1,\beta = 0.3$
; (3) 
$N = 6,C = 8,p = 0.8,\alpha = 0.3,n = 5$
, 
$\beta = 0.3$
.
FIGURE 5.

The experimental and theoretical value of cumulative average system throughputs of three cases. The parameter sets are: (1) N = 4 , C = 4, p = 0.6, \alpha = 0.2,n = 2,\beta = 0.4 ; (2) N = 9,C = 4,p = 0.5 , \alpha = 0.2,n = 1,\beta = 0.3 ; (3) N = 6,C = 8,p = 0.8,\alpha = 0.3,n = 5 , \beta = 0.3 .

FIGURE 6. - The experimental and theoretical value of system throughputs and the differences between them of nine cases. The setting parameters are shown in TABLE 1.
FIGURE 6.

The experimental and theoretical value of system throughputs and the differences between them of nine cases. The setting parameters are shown in TABLE 1.

In practice, it is very important to schedule the energy harvesting and data transmission to maximize the system throughput. As an example, Fig. 7 shows the curve about the change of theoretical system throughput with transmitting probability p and energy harvesting probability \alpha . It is assumed that N = 9, C = 6, n = 2,\beta = 0.3 . If we have \alpha , we can choose an optimal p to maximize the system throughput. On the other hand, we can also change the position of dedicated RF sources or transmitting power to optimize \alpha .

FIGURE 7. - The curve about the change of theoretical system throughput with transmitting probability 
$p$
 and energy harvesting probability 
$\alpha $
.
FIGURE 7.

The curve about the change of theoretical system throughput with transmitting probability p and energy harvesting probability \alpha .

B. Performances in Multi-Sink Network

We consider an EH-CRSN with multiple sinks consisting of two PUs, 10 sinks and 30 SNs, as shown in Fig. 8. It is assumed that the interference distance of PU {r_{2}} = 500m , the interference distance of sink {r_{i}} = 240m and {r_{t}} = {r_{i}} . The number of licensed channels is set to C = 3 and the probability of a SN has enough energy to transmit \gamma = 0.5 . Here, we directly give the assumed value of \gamma for formula (20) is inapplicable in RF-CRSN with multiple sinks. For clarity, the interference relationships and access relationships between sinks and SNs are isolated in Fig. 9.

FIGURE 8. - An EH-CRSN with multiple sink consisting of two PUs, 10 sinks and 30 SNs. It is assumed that the interference distance of PU 
${r_{2}} = 500m$
, the interference distance of sink 
${r_{i}} = 240m$
 and 
${r_{t}} = {r_{i}}$
.
FIGURE 8.

An EH-CRSN with multiple sink consisting of two PUs, 10 sinks and 30 SNs. It is assumed that the interference distance of PU {r_{2}} = 500m , the interference distance of sink {r_{i}} = 240m and {r_{t}} = {r_{i}} .

FIGURE 9. - The interference relationships and access relationships between sinks and SNs of the EH-CRSN example in Fig. 8.
FIGURE 9.

The interference relationships and access relationships between sinks and SNs of the EH-CRSN example in Fig. 8.

One convergence process of SLA based channel select algorithm is shown in Fig. 10. Among them, the global optimum is obtained through the way of exhaustive search. We can see that the proposed solution converges to the maximum system throughput about 240 iterations. And Fig. 11 shows the evolution of select probabilities on different channels of a random SN. At the beginning, the SN selects each channel with the same probability. Influenced by pay off, select probabilities would jitter while all the probabilities add up to 1. Finally, this SN converges to channel 3 about 270 iterations. Moreover, it is seen that system throughput converges before the select probability which indicates that system throughput converges if the select probability close to 1.

FIGURE 10. - One convergence process of SLA based channel select algorithm compared with the global optimum and the result of random selection. The global optimum is obtained through the way of exhaustive search.
FIGURE 10.

One convergence process of SLA based channel select algorithm compared with the global optimum and the result of random selection. The global optimum is obtained through the way of exhaustive search.

FIGURE 11. - The evolution of select probability on different channel of a random SN. At the beginning, the SN selects each channel with the same probability. Influenced by pay off, select probabilities would jitter while all the probabilities add up to 1. Finally, this SN converges to channel 3 about 270 iterations.
FIGURE 11.

The evolution of select probability on different channel of a random SN. At the beginning, the SN selects each channel with the same probability. Influenced by pay off, select probabilities would jitter while all the probabilities add up to 1. Finally, this SN converges to channel 3 about 270 iterations.

Then, we repeat the convergence process 500 times to get the converge performance of the SLA based channel select algorithm. The average of repeated convergence processes is shown in Fig. 12. We can see that the average of convergence system throughput is slightly less than the maximum system throughput. The reason is that not all the Nash equilibrium of the mixed interaction game is the optimal solution which can maximize the system throughput. If the system converges to a Nash equilibrium, a SN would not change its action no matter whether the system throughput is maximum.

FIGURE 12. - The average of 500 repeated convergence processes.
FIGURE 12.

The average of 500 repeated convergence processes.

SECTION VI.

Conclusion

In this paper, we firstly developed a single-sink EH-CRSN with multiple SNs and licensed channels. In this model, SNs share multiple primary channels according to sensed channel information provided by sink, stored energy units, and transmitting probability. We derived the system throughput for two cases and the simulation results showed the function is correct. Then, we extended the model to multi-sink EH-CRSN which has more complex topology. We formulated a mixed interaction game to characterize SNs’ channel access behavior which is demonstrated to have a Nash equilibrium maximizing the system throughput. The simulation results indicated that the proposed algorithm can obtain the maximum or near-maximum system throughput.

References

References is not available for this document.