ieee transactions on signal processing, vol. 59, no. 3, … · 2012-05-04 · ieee transactions on...

19
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via Game Theory Jiaheng Wang, Member, IEEE, Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE Abstract—Cognitive radio (CR) systems improve the spectral efficiency by allowing the coexistence in harmony of primary users (PUs), the legacy users, with secondary users (SUs). This coexistence is built on the premises that no SU can generate interference higher than some prescribed limits against PUs. The system design based on perfect channel state information (CSI) can easily end up violating the interference limits in a real- istic situation where CSI may be imperfect. In this paper, we propose a robust design of CR systems, composed of multiple PUs and multiple noncooperative SUs, in either single-input single-output (SISO) frequency-selective channels or more general multiple-input multiple-output (MIMO) channels. We formulate the design of the SU network as a noncooperative game, where the SUs compete with each other over the resources made available by the PUs, by maximizing their own information rates subject to the transmit power and robust interference constraints. Following the philosophy of the worst-case robustness, we take explicitly into account the imperfectness of SU-to-PU CSI by adopting proper interference constraints that are robust with respect to the worst channel errors. Relying on the variational inequality theory, we study the existence and uniqueness properties of the Nash equilibria of the resulting robust games, and devise totally asyn- chronous and distributed algorithms along with their convergency properties. We also propose efficient numerical methods, based on decomposition techniques, to compute the robust transmit strategy for each SU. Index Terms—Cognitive radio, convex optimization, imperfect CSI, MIMO, Nash equilibrium, noncooperative game, variational inequality, worst-case robustness. I. INTRODUCTION W HILE the ever-increasing demand of wireless service makes the radio spectrum a very scarce and precious resource, it has been recently reported that the existing fixed spectrum assignment policies cause very inefficient spectrum usage [1]. In such a situation, cognitive radio (CR) [2] emerged as a promising approach to improve the efficiency of spectrum utilization by allowing intelligent cognitive nodes to access the licensed bandwidth. A CR system is built on a hierarchical struc- ture [3], [4], distinguishing primary users (PUs), who are legacy Manuscript received June 05, 2010; revised September 10, 2010; accepted October 24, 2010. Date of publication November 15, 2010; date of current ver- sion February 09, 2011. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Ye (Geoffrey) Li. This work was supported by the Hong Kong RGC 618709 research grant. J. Wang and D. P. Palomar are with the Department of Electronic and Com- puter Engineering, Hong Kong University of Science and Technology, Hong Kong (e-mail: [email protected]; [email protected]). G. Scutari is with the Department of Electrical Engineering, State Univer- sity of New York (SUNY) at Buffalo, Buffalo, NY 14260 USA (e-mail: gesu- [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSP.2010.2092773 spectrum holders, from secondary users (SUs), also known as cognitive users, who are allowed to share the licensed spec- trum with PUs, provided that they induce limited interference or no interference at primary receivers [1]. Within this con- text, alternative approaches have been considered in the liter- ature to allow concurrent communications in either single-input single-output (SISO) channels [5] or multiple-input multiple- output (MIMO) channels [6] (see also [4] for a recent tutorial on the topic). One classical approach to devise CR systems would be using global optimization techniques, under the framework of network utility maximization (NUM) (see, e.g., [7], [8]) or cooperative games (Nash bargaining solutions) [9], [10]. However, recent results in [11] have shown that NUM prob- lems are NP-hard under different choices of the system utility function. Moreover, the (suboptimal) algorithms proposed in the aforementioned papers lack any mechanism to control the amount of aggregate interference generated by the transmitters, and they are centralized and computationally expensive. This raises some practical issues that are insurmountable in the CR context. For example, these algorithms need a central node having full knowledge of all the channels and interference structure at every receiver, which poses serious implementation problems in terms of scalability and amount of signaling to be exchanged among the nodes. For these reasons, in this paper, we follow a different approach and model the SUs as competi- tors with no will to cooperate. We concentrate on decentralized strategies, where the SUs are able to self-enforce the negotiated agreements on the usage of the available spectrum without the intervention of a centralized authority. This form of equilibrium is, in fact, the well-known concept of Nash equilibrium (NE) in noncooperative game theory [12]. In the literature, noncoopera- tive game theory has been successfully applied to the design of the network over SISO frequency-selective interference chan- nels [13]–[18] as well as MIMO interference channels [19], [20], and recently to the CR framework [21]–[24]. The aforementioned works were all based on the assump- tion of perfect channel state information between SUs and PUs (SU-to-PU CSI). In practice, however, SU-to-PU CSI is seldom perfectly known, due to the loose or usually no cooper- ation between PUs and SUs, as well as many other factors such as inaccurate channel estimation and time delays or frequency offsets between the reciprocal channels. Consequently, although designated to meet the interference constraints, an SU may still break this limitation because of imperfect SU-to-PU CSI. This violation of the interference constraints cannot be tolerated in any CR system and therefore the imperfectness of SU-to-PU CSI has to be taken into account in the system design. There are two common ways to model imperfect CSI: Bayesian and worst-case approaches. The Bayesian philosophy assumes that the channel is a random quantity and guarantees the constraint 1053-587X/$26.00 © 2010 IEEE

Upload: others

Post on 23-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183

Robust MIMO Cognitive Radio Via Game TheoryJiaheng Wang, Member, IEEE, Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE

Abstract—Cognitive radio (CR) systems improve the spectralefficiency by allowing the coexistence in harmony of primaryusers (PUs), the legacy users, with secondary users (SUs). Thiscoexistence is built on the premises that no SU can generateinterference higher than some prescribed limits against PUs. Thesystem design based on perfect channel state information (CSI)can easily end up violating the interference limits in a real-istic situation where CSI may be imperfect. In this paper, wepropose a robust design of CR systems, composed of multiplePUs and multiple noncooperative SUs, in either single-inputsingle-output (SISO) frequency-selective channels or more generalmultiple-input multiple-output (MIMO) channels. We formulatethe design of the SU network as a noncooperative game, where theSUs compete with each other over the resources made availableby the PUs, by maximizing their own information rates subject tothe transmit power and robust interference constraints. Followingthe philosophy of the worst-case robustness, we take explicitlyinto account the imperfectness of SU-to-PU CSI by adoptingproper interference constraints that are robust with respect to theworst channel errors. Relying on the variational inequality theory,we study the existence and uniqueness properties of the Nashequilibria of the resulting robust games, and devise totally asyn-chronous and distributed algorithms along with their convergencyproperties. We also propose efficient numerical methods, basedon decomposition techniques, to compute the robust transmitstrategy for each SU.

Index Terms—Cognitive radio, convex optimization, imperfectCSI, MIMO, Nash equilibrium, noncooperative game, variationalinequality, worst-case robustness.

I. INTRODUCTION

W HILE the ever-increasing demand of wireless servicemakes the radio spectrum a very scarce and precious

resource, it has been recently reported that the existing fixedspectrum assignment policies cause very inefficient spectrumusage [1]. In such a situation, cognitive radio (CR) [2] emergedas a promising approach to improve the efficiency of spectrumutilization by allowing intelligent cognitive nodes to access thelicensed bandwidth. A CR system is built on a hierarchical struc-ture [3], [4], distinguishing primary users (PUs), who are legacy

Manuscript received June 05, 2010; revised September 10, 2010; acceptedOctober 24, 2010. Date of publication November 15, 2010; date of current ver-sion February 09, 2011. The associate editor coordinating the review of thismanuscript and approving it for publication was Prof. Ye (Geoffrey) Li. Thiswork was supported by the Hong Kong RGC 618709 research grant.

J. Wang and D. P. Palomar are with the Department of Electronic and Com-puter Engineering, Hong Kong University of Science and Technology, HongKong (e-mail: [email protected]; [email protected]).

G. Scutari is with the Department of Electrical Engineering, State Univer-sity of New York (SUNY) at Buffalo, Buffalo, NY 14260 USA (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TSP.2010.2092773

spectrum holders, from secondary users (SUs), also known ascognitive users, who are allowed to share the licensed spec-trum with PUs, provided that they induce limited interferenceor no interference at primary receivers [1]. Within this con-text, alternative approaches have been considered in the liter-ature to allow concurrent communications in either single-inputsingle-output (SISO) channels [5] or multiple-input multiple-output (MIMO) channels [6] (see also [4] for a recent tutorialon the topic).

One classical approach to devise CR systems would beusing global optimization techniques, under the frameworkof network utility maximization (NUM) (see, e.g., [7], [8])or cooperative games (Nash bargaining solutions) [9], [10].However, recent results in [11] have shown that NUM prob-lems are NP-hard under different choices of the system utilityfunction. Moreover, the (suboptimal) algorithms proposed inthe aforementioned papers lack any mechanism to control theamount of aggregate interference generated by the transmitters,and they are centralized and computationally expensive. Thisraises some practical issues that are insurmountable in the CRcontext. For example, these algorithms need a central nodehaving full knowledge of all the channels and interferencestructure at every receiver, which poses serious implementationproblems in terms of scalability and amount of signaling to beexchanged among the nodes. For these reasons, in this paper,we follow a different approach and model the SUs as competi-tors with no will to cooperate. We concentrate on decentralizedstrategies, where the SUs are able to self-enforce the negotiatedagreements on the usage of the available spectrum without theintervention of a centralized authority. This form of equilibriumis, in fact, the well-known concept of Nash equilibrium (NE) innoncooperative game theory [12]. In the literature, noncoopera-tive game theory has been successfully applied to the design ofthe network over SISO frequency-selective interference chan-nels [13]–[18] as well as MIMO interference channels [19],[20], and recently to the CR framework [21]–[24].

The aforementioned works were all based on the assump-tion of perfect channel state information between SUs andPUs (SU-to-PU CSI). In practice, however, SU-to-PU CSI isseldom perfectly known, due to the loose or usually no cooper-ation between PUs and SUs, as well as many other factors suchas inaccurate channel estimation and time delays or frequencyoffsets between the reciprocal channels. Consequently, althoughdesignated to meet the interference constraints, an SU may stillbreak this limitation because of imperfect SU-to-PU CSI. Thisviolation of the interference constraints cannot be tolerated inany CR system and therefore the imperfectness of SU-to-PUCSI has to be taken into account in the system design. Thereare two common ways to model imperfect CSI: Bayesian andworst-case approaches. The Bayesian philosophy assumes thatthe channel is a random quantity and guarantees the constraint

1053-587X/$26.00 © 2010 IEEE

Page 2: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1184 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

Fig. 1. System model of a hierarchical CR system with multiple PUs and mul-tiple noncooperative SUs.

on the average. Although this model has been adopted to opti-mize the average performance of conventional communications[25], [26], it may not be suitable for a CR system, becausean average interference constraint may not be acceptable tothe PU as it may affect the normal communication of the PU.On the other hand, the worst-case approach, more suitablefor characterizing instantaneous CSI with errors, assumes thatthe actual channel lies in the neighborhood—the so-calledchannel uncertainty region—of a known nominal channel (e.g.,the estimated channel). The size of this region represents theamount of channel uncertainty, i.e., the bigger the region is themore uncertainty there is. Then, using the worst-case robustdesign [27]–[33], one can guarantee a performance level forany channel realization in the uncertainty region. This meetsexactly the requirement of a CR system—the interference con-straints must be satisfied even if PU CSI is imperfect. Hence, itis not surprising that the idea of the worst-case robustness hasrecently been used to design robust beamforming for SUs in amultiple-input single-output (MISO) CR system [34], [35].

In this paper, we consider the design of robust CR systemswith multiple PUs and multiple noncooperative SUs in eitherSISO frequency-selective channels or MIMO channels (seeFig. 1). Our goal is to devise the most appropriate form ofconcurrent communications of the SUs competing over the re-sources that the PUs make available, while taking into accountimperfect SU-to-PU CSI. Given the competitive nature of theSU network, we formulate the resource allocation problemamong SUs as a strategic noncooperative game, where each SUcompetes against the others to maximize his own informationrate under the power constraints and the robust interferenceconstraints. Following the worst-case robustness philosophy,the imperfectness of SU-to-PU CSI is explicitly taken intoaccount by the robust interference constraints. The main con-tributions of the paper are the following.

First, we consider robust issues in game theoretical formula-tions, which have seldom been investigated in existing works.

In particular, if the uncertainty on CSI is independently mod-eled for each subchannel as in [36], then the game formulationboils down into the problems considered in [14]–[20], [23], [24].In this paper, we consider a more practical and general situa-tion where the channel uncertainty is coupled across frequencydimensions in SISO frequency-selective channels or spatial di-mensions in MIMO channels.

Second, the presence of the robust interference constraintsleads to an intractable optimization problem for each player, asthe constraint set is given in the form of the intersection of aninfinite number of convex sets. We show that this difficulty canbe overcome by rewriting the constraint set into an equivalentand more convenient form.

Third, the robust game formulation, even with the equivalentconstraint set, is still difficult to study, because there is noclosed-form expression for the best-response of each player.This means that all previous results based the fixed-point theoryin [16], [17], [19], [20], and [23] are no longer applicable.Herein, we rely on the more advanced theory of finite-dimen-sional variational inequalities (VIs) [37], [38]. We study theexistence and uniqueness properties of the NE of the robustgames, and propose totally asynchronous and distributed algo-rithms along with their convergence properties to achieve theNE.

Finally, we propose efficient and low-complexity numericalmethods, based on decomposition techniques [8], to computethe best-response—the robust transmit strategy—of each SU.Note that our framework contains all existing single-user robustCR designs (e.g., [34]) as special cases.

The paper is organized as follows. Section II introduces thesystem model, robust interference constraints, and robust gameformulations. In Section III, the robust interference constraintsets are equivalently transformed into the more favorable forms.Then, we study the robust games via the VI theory, and de-vise distributed algorithms for the SU network in Section IV. InSection V, we show how to obtain the robust transmit strategyfor each SU through convex optimization. Numerical results areprovided in Section VI; and Section VII draws the conclusion.

Notation: Uppercase and lowercase boldface denote matricesand vectors, respectively. , , and denote the sets of realnumbers, complex numbers, and positive semidefinite matrices,respectively. represents the ( th, th) element of matrix .By or , we mean that is a positive semidefiniteor definite matrix, respectively. and denote the identity ma-trix and the vector of ones, respectively. The operators and

for vectors and matrices are defined componentwise. The op-erators , , , and denote the Hermitian, in-verse, stacking vectorization, and trace operations, respectively,The operator is the diagonal matrix with the same ele-ments or diagonal elements of a vector or matrix, respectively.The spectral radius [39] of a matrix is denoted by , and themaximum and minimum eigenvalues of a Hermitian matrix aredenoted by and , respectively. denotes theEuclidean norm of a vector, and and denote theFrobenius and spectral norms of a matrix, respectively. and

represent the Kronecker and Hadamard product operators, re-spectively, and .

Page 3: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1185

II. SYSTEM MODEL AND PROBLEM STATEMENT

We consider a hierarchical CR network composed of PUsand SUs, coexisting in the same area and sharing the samespectrum (see Fig. 1). Because of the lack of coordinationamong all users, the set of SUs can be naturally modeled asa vector Gaussian interference channel. Our interest lies in1) devising the most appropriate form of concurrent communi-cations of SUs competing over the physical resources that PUsmake available, while preserving the Quality of Service (QoS)of PUs; and 2) improving the robustness of the CR systemagainst the imperfectness of SU-to-PU CSI.

Due to the distributed and competitive nature of the CRsystem, we concentrate on decentralized strategies, where SUsare able to self-enforce the negotiated agreements on the usageof the available spectrum without the intervention of a cen-tralized authority. More specifically, adopting an informationtheoretical perspective, we formulate the resource allocationproblem among SUs as a strategic noncooperative game, whereeach player (transmit-receive pair) competes against the othersto maximize the information rate over his own channel, underconstraints on the transmit power and the interference inducedto PUs. Imperfect SU-to-PU CSI is explicitly taken into ac-count by introducing proper interference constraints that arerobust with respect to the worst channel errors. We considertransmissions over both SISO frequency-selective channels andMIMO channels.

A. SISO Frequency-Selective Channels

Suppose that the bandwidth shared by the PUs and SUs can bedivided into frequency bins. Let be the cross-channeltransfer function over the frequency bin between the sec-ondary transmitter and the secondary receiver , for

, and ; whereas the channel transferfunction of link over frequency bin is denoted by .The cross-channel transfer function between the transmitter ofSU and the receiver of PU over the frequency bin is de-noted by , . The transmit strategy of each

SU is given by his power allocation vectorover the frequency bins, subject to the following power con-straints:

(1)

where is the transmit power in units of energy per trans-

mission, and are the peak power (orspectral mask) limits. Assuming w.l.o.g that each SU as well aseach PU uses a Gaussian codebook [40], the maximum achiev-able rate on SU link for a given power allocation profile

is

(2)where denote power allocation of all users ex-cept the one, and includes the noise power plus theinterference from all PUs.

Interference Constraints: Opportunistic communications inCR systems enable SUs to transmit with overlapping spectrumand/or coverage with PUs, provided that the degradation in-duced on PUs’ performance is null or tolerable [3], [4]. This canbe handled by, e.g., introducing some interference constraintsthat impose upper bounds on the per-carrier and total aggregateinterference caused by one SU to one PU. Under the assump-tion of perfect SU-to-PU CSI, the interference constraints oneach SU can be written as

(3)where is the maximum average interference1 that can begenerated by SU at primary receiver , and is themaximum peak interference that can be generated over thefrequency bin.

In practice, however, SU-to-PU CSI is seldom perfect due tomany issues. To take into account imperfect SU-to-PU CSI, weadopt the following common imperfect CSI model [27]–[35]:the actual channel is assumed to be within the neighborhood ofa nominal channel, while the nominal channel could be the es-timated or feedback channel. Specifically, for PU , SU onlyknows a nominal channel , which is a cor-

rupted version of the actual channel by an

error , i.e.,

(4)

where belongs to an elliptical uncertainty region de-fined by the weighted Euclidean norm as

(5)

where are given positive weights. Theradius represents the size of the uncertainty region, i.e.,the larger the radius is, the more uncertainty there is. Theproperness of this model has been justified in [29] and [30]. Inparticular, when , the ellipsoid reduces to a sphere,which is the most common model in the literature [27]–[30].Following the philosophy of worst-case robustness, an SUshould keep his interference against a PU below the requiredthresholds for any possible channel (error) in the uncertaintyregion. More specifically, each SU should satisfy, instead ofthe constraints in (3), the robust interference constraints in (6)at the bottom of the next page.

Game Theoretical Formulation: The resource allocationproblem among the SUs is formulated as a robust strategicnoncooperative game , where

1Note that there is also another kind of average interference constraints, wherethe average is taken over the random channel, for which the interested reader isreferred to [41].

Page 4: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1186 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

is the set of the SUs, is the utilityfunction defined in (2), and

(7)

is the set of robust admissible strategies for SU , whereand are defined in (1) and (6), respectively. Each SU ’sproblem is to determine, for a fixed but arbitrary power profile

of the other SUs, an optimal strategy that solves thefollowing optimization problem in the variable

(8)

A strategy profile is a NE of if

. In theforthcoming sections, we provide a full characterization ofthe robust game . For comparison, we also consider thenon-robust game , with the

non-robust strategy set , where each SUregards the nominal channels , as the actual channels.

B. MIMO Channels

In this section, we focus on transmissions over MIMO chan-nels: each SU link is equipped with and transmitand receive antennas, respectively; the receiver of each PU isequipped with antennas. Let be the cross-channel transfer function between the secondary transmitterand the secondary receiver ; whereas the channel transfer func-tion of link is denoted by . The cross-channel transferfunction between the transmitter of SU and the receiver ofPU is denoted by . The transmit strategy ofSU is determined by his transmit covariance matrix , whichshould satisfy the following power constraints:

(9)where is the transmit power in units of energy per trans-mission, and is the spacial peak average power constraint.With each SU and each PU using Gaussian codebooks [40],the maximum achievable rate on SU link for a given profile

is

(10)

where ,, and is the covariance matrix of

the noise plus the interference from the PUs.Interference Constraints: Under the assumption of perfect

CSI of PUs, the interference constraints imposed to each SUin the MIMO case are given by

(11)where and are the maximum average and peak inter-ference that can be generated by SU at the receiver of PU ,respectively.

To characterize the imperfectness of SU-to-PU CSI, we usea similar model as in the SISO case. More specifically, eachsecondary transmitter is assumed to know a corrupted version

of the actual channel , given by

(12)

where is an error matrix belonging to an elliptical uncer-tainty region , defined by the weighted Frobenius norm as

(13)

with the weight matrix . Similarly, the ellipsoid reducesto a sphere when , as the most frequently used model[27]–[30]. As the interference limits must be strictly met for anychannel (error) in the uncertainty region, SU should satisfy,instead of the constraints in (11), the robust interference con-straints in (14) at the bottom of the page.

Game Theoretical Formulation: We formulate optimizationof the transmit strategies of the SUs as a robust strategic nonco-operative game , whereis the utility function defined in (10), and

(15)

is the set of robust admissible strategies for SU , whereand are defined in (9) and (14), respectively. Each SUtries to find his optimal transmit strategy , given the transmitstrategies of the others, by solving the following optimiza-tion problem:

(16)

(6)

(14)

Page 5: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1187

We will study the robust game in the following sections.For comparison, we also consider the non-robust game

with the non-robust strategy set, where each SU regards the nominal channels

, as the actual channels.

III. CHARACTERIZATION OF THE ROBUST INTERFERENCE

CONSTRAINT SETS

The presence of the robust interference constraints makesthe analysis of the games and quite involved. Thereason is that the robust interference constraint sets and

are given in the form of the intersection of an infinitenumber of convex sets. In this section, we overcome this dif-ficulty by rewriting the sets and into more conve-nient and equivalent forms, which paves the way to studyingthe robust games and , and designing distributed al-gorithms along with their convergence properties.

A. SISO Frequency-Selective Channels

The set in (6) can be rewritten in a more convenient formas given next.

Proposition 1: Given , the setis equivalent to (17) at the bottom of the page.

Proof: We first introduce the following lemma.Lemma 1 (S-Procedure [42]): Let , 1, 2, be defined

as

where , and . Then, theimplication holds if and only if thereexists such that

provided that there exists a point with .Consider first the robust sum interference constraint in

(18)

which, by introducing and, can be expressed as

(19)

According to Lemma 1, (19) holds if and only if there existssuch that

(20)

Note that the condition is satisfied since .Next, consider the robust peak interference constraint

(21)which can be rewritten as

(22)

where , , and

. It follows that

(23)

Hence, (22) amounts to

(24)

or equivalently

(25)

This completes the proof.The interference constraints in the equivalent set (17) are

linear matrix inequalities (LMIs), which are a generalization oflinear inequalities in [42]. Therefore, (17) is in fact an in-tersection of the sublevels2 of linear functions, and thus muchmore convenient than the original form (6). Furthermore, manynumerical methods, for example the interior-point method [43],require the constraint set of a convex optimization problem to bean intersection of sublevels of some convex functions. There-fore, Proposition 1 not only provides a simpler strategy set tostudy the game, but also is an indispensable step to efficientlycompute the solution to each single-user optimization problemin (8) (the best-response of each player).

2An �-sublevel of a function � � �� is defined as �� � ���� ����� � ��.

(17)

Page 6: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1188 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

B. MIMO Channels

In the case of MIMO channels, the set in (14) can beequivalently rewritten as follows.

Proposition 2: Given , the setis equivalent to (26) at the bottom of the page.

Proof: The proof is based on Lemma 1 and the followingintermediate result.

Lemma 2 ([44, Proposition 3.4]): Provided , the con-dition

holds if and only if there exists such that

First, consider in the constraint

(27)which is equal to

(28)

where . Invoking Lemma 1 and following sim-ilar steps as in the proof of Proposition 1, one can see that (28)holds if and only if there exists such that

(29)

The condition , in Lemma 1, is readily satisfied since.

Let us consider now the constraint

(30)which is equivalent to

(31)

It follows from Lemma 2 that (31) holds if and only if thereexists such that

(32)

Then, by defining , one can easily rewrite (32)as in (26), which completes the proof.

Similarly, the equivalent set (26) consists of a group of LMIs,which makes the study of the robust game more afford-able, as well as the computation of the optimal solution to thesingle-user optimization problem (16).

IV. NASH EQUILIBRIA OF THE ROBUST GAMES

Given a strategic noncooperative game, the existence of a NEin pure strategies is not guaranteed; neither is the uniqueness northe convergence (e.g., of best-response based algorithms) to anequilibrium when one exists (or even is unique). In this sectionwe provide a positive answer to these key issues for the robustgames and introduced in Sections II-A and II-B,respectively.

The main difficulty in the analysis of the proposed games isthat one cannot compute the best-response mapping of each userin closed form in either the SISO case or the MIMO case. Hence,none of the results in [16], [17], [19], [20], [23] based on themachinery of the fixed-point theory can be successfully appliedto studying our games. We overcome this issue by exploringthe more advanced theory of finite dimensional variational in-equalities (VIs). A brief introduction to the VI theory is givenin Appendix A, while more details on VI and its application togames can be found in [24], [37], and [38], respectively. Thebasic rule of using the VI theory is to find a correspondence be-tween the formulated game and a VI problem, and then exploitthe well established results on VIs.

A. SISO Frequency-Selective Channels

Before studying the game, we introduce the following nota-tions and definitions. Define as

if

if (33)

(26)

Page 7: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1189

where the interference-plus-noise to noise ratio is de-fined as

(34)

with

(35)

(36)

(37)

The matrix in (33) is instrumental to obtain sufficient condi-tions guaranteeing the uniqueness of the NE as well as the con-vergence of the proposed algorithms. Following similar steps asin [24], one can rewrite the game as a proper VI problem.Then, building on the equivalent form of in Proposition 1,we characterize the robust game as given next (The proofis similar to that of [24, Theorem 6] and is omitted because ofthe space limitation).

Theorem 1: Suppose w.l.o.g. that each strategy set isnonempty. Then, the game admits a NE. Furthermore, theNE of is unique if , where is defined in (33).

Remark 1: On the Uniqueness Condition. The uniquenesscondition has an intuitive physical interpretation: TheNE is unique if there is not too much interference in the system[15]–[18], [24]. A sufficient condition for is given byone of the two following conditions:

i) low received interference

(38)

ii) low generated interference

(39)

where the first condition imposes a limit on the interference thateach receiver can tolerate, whereas the second one introducesan upper bound on the interference that each transmitter cangenerate.

Distributed Algorithms: Asynchronous SISO RICA. Wefocus on distributed algorithms, named robust iterative CRalgorithms (RICAs), to reach the NE of . We proposetotally asynchronous algorithms, in the sense that in the up-dating procedure some users may change their strategies morefrequently than the others, and they may even use outdated in-formation on the interference caused by the others. To formallydescribe the asynchronous algorithms, we first introduce somedefinitions as given in [17]. Assume w.l.o.g. that the set oftimes at which the SUs update their strategies is a discrete set

. Let denote the power allocationof SU at the iteration, and denote the set of times

at which is updated (thus, at time , is leftunchanged). Let denote the most recent time at which theinterference from SU is perceived by SU at the iteration(thus ). At the iteration, SU chooses his

best response using the interference level caused by

. Somestandard conditions in asynchronous convergence theory thatare fulfilled in any practical implementation need to be satisfiedby the schedule and ; we refer to [17] for the de-tails. Through the whole paper we assume that these conditionsare satisfied and call such an updating schedule as feasible.Using the above notations, the asynchronous SISO RICA isformally described in Algorithm 1. The convergence propertiesof Algorithm 1 are given in Theorem 1, whose proof followssimilar steps of that for [24, Theorem 9] and thus is omittedbecause of the space limitation.

Algorithm 1: Asynchronous SISO RICA

1: Choose any feasible ;2: For3: For each , compute:

if

otherwise

4: End

Theorem 2: Suppose that . Then, any sequencegenerated by the asynchronous SISO RICA de-

scribed in Algorithm 1 converges to the unique NE of the gamefor any feasible updating schedule of the users.

Note that Algorithm 1 contains as special cases plenty ofalgorithms obtained by choosing different schedules of usersin the updating procedure. Two special cases are the sequen-tial and simultaneous RICAs, as the counterparts of the well-known sequential and simultaneous iterative water-filling algo-rithm (IWFA) [13], [16]. However, RICAs differ from the clas-sical IWFAs in the following points: i) RICAs preserve the QoSof PUs, even with imperfect PU CSI; and ii) The single-useroptimization problem (8) does not admit a closed-form solu-tion like water-filling. In Section V-A, we will show how to ef-ficiently solve (8).

From Theorems 1 and 2, we can observe an interestingphenomenon: The more uncertainty on PU CSI, the more likelythe proposed algorithms converge to the unique NE of thegame . To see this, denote by and thematrices defined in (33) for , respectively. Then,we have componentwise, implyingthat . The reason is that, when theuncertainty region of one PU’s channel enlarges, the worst-caserobust transmit strategy of one SU will restrict more conser-vatively his interference to this PU, which meanwhile alsocauses less interference to the other SUs. Observe also that, as

, the uniqueness and convergence conditions forthe robust game coincide with those for the non-robustgame as in [24].

Page 8: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1190 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

B. MIMO Channels

Different from the game over SISO frequency-selectivechannels, in the game , the strategies of the players arecomplex matrices, making much more difficult to an-alyze. To simplify the study of the game, we first transform

into an equivalent game with real strategy sets by the iso-morphism mapping between complex and real matrices. Morespecifically, the real counterparts, under the isomorphism map-ping, of a complex matrix and a complex vector

are given by

and (40)

respectively. A variety of properties of the isomorphism map-ping can be found in [45].

Now, consider the game ,where each player’s strategy is given by the real matrix

with , , 2. Denote by , , ,the real counterparts of the complex matrices , ,

, , respectively. For each player , the utility functionis defined as

(41)

where . The strategyset is given by (42) at the bottom of the page, where

In the game , the optimal strategy of each SU , given thestrategies of the others, is the solution to the following convexoptimization problem:

(43)

The relationship between and is given next.Lemma 3: The games and are equivalent, and

the equivalence is in the following sense. Let be

a NE of . Then, is a NE of if and only if is aNE of under the one-to-one mappingand for .

Proof: The equivalence follows readily from the propertiesof the isomorphism mapping [45]. To be specific, let , and

be the real counterparts of complex matrices , and ,respectively. Then, 1) ; 2)

; 3) ; 4); 5) ,

where is defined in (Section IV-B). Suppose that and aresquare matrices. Then, 6) ; 7)

; 8) ; 9) ; 10)

and 11) is an eigenvalue of if and only if it is an eigenvalueof .

Lemma 3 implies that we can study w.l.o.g. insteadof . To this end, we first introduce some definitions. Let

be defined as

ifif (44)

where

(45)

(46)

with

(47)

(48)

(42)

Page 9: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1191

The main properties of game and thus are givenin the following.

Theorem 3: Given the game (or ), the followingholds: a) Suppose w.l.o.g. that each strategy set (or ) isnonempty. Then, the game admits a NE. b) Suppose that eachchannel matrix is full column-rank. Then, the NE of thegame is unique if , where and are de-fined in (44).

Proof: See Appendix A.Distributed Algorithms: Asynchronous MIMO RICA. We pro-

pose totally asynchronous and distributed algorithms to reachthe NE of . Similar to the SISO case, let us introducethe set and the time index , and define

. Then,the asynchronous MIMO RICA is formally described in Algo-rithm 2, whose convergence properties are given in Theorem 4.

Algorithm 2: Asynchronous MIMO RICA

1: Choose any feasible ;

2: For

3: For each , compute:

if

otherwise

4: End

Theorem 4: Suppose that each channel matrix isfull column-rank, and . Then, any sequence

generated by the asynchronous MIMO RICAdescribed in Algorithm 2 converges to the unique NE offor any feasible updating schedule of the users.

Proof: See Appendix B.Note that the condition is satisfied, similar to

the SISO case, when there is not too much interference amongthe SUs [19], [20], [23]. One can also conclude from Theorems 3and 4 that the worst-case robust design turns channel uncertaintyto a conducive factor for the SU network to converge to theunique NE of . The results in Theorems 3 and 4 can bereadily applied to the non-robust game by taking

.

V. BEST RESPONSE OF SINGLE-USER OPTIMIZATION

In the distributed algorithms described so far, each SU needsto find his best response by solving the single-user optimizationproblem (8) in the game , or (16) in the game . Theproblems (8) and (16), even though convex, are still difficult tohandle, due to the intractable forms of and definedin (6) and (14), respectively. Nevertheless, this difficulty canbe overcome by using the equivalent forms of and in(17) and (26), respectively. In this section, we provide efficientmethods to solve (8) and (16).

A. SISO Frequency-Selective Channels

According to Proposition 1, the problem (8) is equivalentto (49) at the bottom of the page with the auxiliary variable

. This is a tractable convex problem, since its feasible set isgiven by an intersection of the sublevels of the linear functions.Consequently, many general numerical methods, e.g., the inte-rior-point method [43], can be applied to finding the optimal so-lution to (49) in polynomial time. Interestingly, one can simplifythe computation of the optimal solution of (49) by exploring thestructure of the problem and rewriting it in a more convenientform, as detailed next.

Proposition 3: The problem (49) is equivalent to the fol-lowing problem:

(50)

Proof: We will use the following fact.Lemma 4 (Schur’s Complement [39]): Let

be a Hermitian matrix. Then, if and only if(assuming ), or

(assuming ).

(49)

Page 10: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1192 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

Let and . We firstnotice that the LMI in (49) implies ,i.e., . We consider two cases: i)

for all ; ii) forsome . In case i), is invertible, so the LMI in(49), from Lemma 4, amounts to

(51)

In case ii), by selecting the and rows and columnsof the LMI in (49), we have

(52)

implying . However, if , thenfor , meaning that at the optimum of (49) it must

be for all . In other words, case ii) cannothappen in practice. Therefore, the equivalence between (51) andthe LMI in (49) can be extended from the case that

for to the case that for ,without losing any optimality. This completes the proof.

The equivalent reformulation (50) has several desirable prop-erties. First, it is still a convex problem. Indeed, the function

(53)

is jointly convex in (as its Hessian matrix is posi-tive semidefinite), implying that the constraint

(54)

is convex. Second, compared to (49), the problem (50) needsless computational complexity, since the dimension of the LMIconstraints in (49) is much bigger than that of the equivalent

constraints in (50). Third, (50) has a hidden decomposable struc-ture in terms of the variables . Therefore, it is pos-sible, using a multilevel decomposition method [8], e.g., thedual-primal decomposition, to decompose (50) to several levels,each containing a simpler problem with the dimension muchsmaller than that of (50). The details on how to use the decom-position method to solve (50) are provided in Appendix C.

B. MIMO Channels

Invoking Proposition 2, the problem (16) can be equivalentlyrewritten as (55) at the bottom of the page with the auxiliaryvariables and . Similarly, (55) is a convex problem withLMI constraints, and thus can be efficiently solved. Unlike (49)in the SISO case, in general (55) cannot be simplified, in order toreduce the computational complexity. Nevertheless, in the spe-cial case of MISO channels—the receivers of SUs and PUs areequipped with only one antenna—the original problem (16) canbe equivalently transformed into a second-order cone program(SOCP), thus leading to lower complexity.

Denote the MISO channel from SU transmitter to SU re-ceiver by , and the nominal MISO channel

from SU transmitter to PU by . Let

and . Then,we have the following result.

Proposition 4: In the MISO case, the optimal solution to (16)is given by , where is the optimal solution tothe following problem:

(56)

Proof: In the MISO case, the problem (16) with the robustinterference constraints reduces to

(57)

By interpreting each robust interference constraint as a infinitenumber of constraints and analyzing the KKT conditions of(57), it can be proved that the solution to (57) is always rank-one

(55)

Page 11: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1193

Fig. 2. Iteration of the projection subgradient method in the dual-primal de-composition to find the robust power allocation for a single SU in SISO fre-quency-selective channels; � � �, � � �10 dB, � � �, ��� � 3 dB,� � ����.

(see, e.g., [6] for a similar approach). Then, without loss of anyoptimality, we can express as and rewrite (57)as

(58)

Now we show that (58) can be equivalently reformulated as anSOCP, following similar steps as in [27].

Defining , then the robust constraint in (58)is equal to

(59)

Using the triangle inequality and the Cauchy-Schwarz in-equality with , it follows that

(60)

where the equalities are achieved when

(61)

with . This indicates

(62)so (58) is equivalent to

(63)

Notice that the objective function and constraints in (63) areinvariant to the phase rotation on . Therefore, one can choosew.l.o.g. such that and ,meaning that (63) is equivalent to (56).

Proposition 4 indicates that, in the MISO case, the robustMIMO precoding reduces to the robust beamforming, whichcan be obtained by solving the SOCP (56). On the other hand,one may notice that the sufficient conditions guaranteeing theconvergence of the distributed algorithms to the unique NE of

are not satisfied in the MISO case, since is not fullcolumn-rank. However, in the MISO case, the best response ofeach SU—the optimal solution to the problem (57)—is a dom-inant strategy,3 implying that the game has a unique NE. Sucha NE of can be immediately obtained after one roundof the decoupled single-user optimization. Finally, we point outthat [34] considered, as a special case of our framework, a MISOrobust design with only one PU and one SU ,but interestingly provided a semi-closed-form solution.

VI. NUMERICAL RESULTS

In this section, we demonstrate the effect of the robustCR design through numerical experiments. For the sake ofsimplicity, we consider a single PU and adoptthe following setting for each SU. We consider: 1) av-erage power constraints only and no peak power constraint

; 2) spherical channel uncer-tainty regions ; 3) normalized anduncorrelated noise ; 4) the radiiof the uncertainty regions and to be a fraction of thenominal channels as andwith a common . Following the worst-case ro-bustness philosophy, we compare the robust designs ( and

) and the non-robust designs ( and ) throughtheir worst-case performance, i.e., the worst-case interferencegenerated at the primary receiver. To this end, we need to knowthe worst channel error for a specific transmit strategy, whichis approximately obtained by choosing the worst one (resultingin the maximum interference) among 1000 randomly generatederrors on the boundary4 of the spherical uncertainty region.In the following, we first show the performance of the robusttransmit strategies, obtained in Section V, for a single SU,and then the robust CR systems based on and formultiple SUs.

A. Single-User Scenario

In this scenario, we focus w.l.o.g. on the sum (aggregate)interference generated by the SU, and set

, (the subscripts and are suppressed since). Denote by the relative distance between the

PU and the SU, where is the distance between the PU’s re-ceiver and the SU’s transmitter, and is the distance between

3Roughly speaking, a feasible strategy profile is a dominant strategy for aplayer if, regardless of the strategies of the other players, the strategy globallymaximizes the payoff function of the player.

4Since the interference constraints are convex in errors, the maximum mustbe achieved on the boundary of the convex uncertainty region.

Page 12: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1194 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

Fig. 3. Comparison of the robust and non-robust power allocation for a single SU in SISO frequency-selective channels; � � ��, � � ��� dB, � � �.(a) Average information rate. (b) Average worst-case sum interference.

Fig. 4. Comparison of the robust and non-robust precoding for a single SU in MIMO channels; � � � � �, � � ��� dB, � � �. (a) Average informationrate. (b) Average worst-case sum interference.

the SU’s receiver and transmitter. Then, the relative path loss isgiven by with . Given the normalized noise, SNR isrepresented by .

SISO Frequency-Selective Channels: As mentioned inSection V-A and shown in Appendix C, the robust power allo-cation problem (50) can be solved through the decompositionmethod. In Fig. 2, we show the iteration of the projectionsubgradient method for a randomly chosen channel realization,where the convergence to the optimal solution is observed.In Fig. 3, we depict the average rates and worst-case suminterference of the robust, non-robust, and perfect-CSI powerallocation. By perfect CSI we mean that the transmitter knowsthe worst channel error for the non-robust strategy so that theinterference constraint can be met exactly. The average is takenover and whose elements are randomly generated accordingto zero-mean, unit-variance, i.i.d. Gaussian distributions. Onecan see that the non-robust power allocation achieves thehighest rate at the cost of violating the interference limit, which

becomes severe at high SNR or when channel uncertainty in-creases. The perfect-CSI power allocation satisfies exactly theinterference constraint with a lower rate, but perfect SU-to-PUCSI is seldom available in practice. The robust power allocationcan provide an acceptable rate for the SU, and meanwhilenever violates the interference constraint even with imperfectSU-to-PU CSI.

MIMO Channels: In Fig. 4, we show, respectively, the av-erage rates and worst-case sum interference of different pre-coding techniques in a MIMO CR system. The average is takenover and , whose elements are randomly generated ac-cording to zero-mean, unit-variance, i.i.d. Gaussian distribu-tions. From Fig. 4, one can also observe that, while the non-ro-bust MIMO precoding may generate interference dramaticallyhigher than the given threshold even for a small amount of un-certainty, the PU’s communications can be efficaciously pro-tected by the SU using the robust MIMO precoding that alwayscomplies with the interference restriction.

Page 13: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1195

Fig. 5. Topology of a CR system with 3 SUs and 1 PU.

B. Multi-User Scenario

We consider a symmetric topology of a CR system as depictedin Fig. 5, which includes one PU as the base station at the centerof a hexagonal cell, and 3 SUs at the vertices of the hexagonwith the same distance to their receivers. The relative path lossbetween the SUs and the PU is given by , whereis the relative distance and . For simplicity, we imposeto all SUs a common power budget and acommon peak interference limit ( and

). As a result, SNR of each SU isrepresented by .

SISO Frequency-Selective Channels: To illustrate how thechannel uncertainty affects the game, we show in Fig. 6 theprobability of the condition versus the relative dis-tance with randomly generated and , whose elementsfollow zero-mean, unit-variance, i.i.d. Gaussian distributions.Fig. 6 verifies our conclusion that the more uncertainty onSU-to-PU CSI (i.e., bigger ), the more likely the distributedalgorithms converge to the unique NE of the game. Then, inFig. 7, we demonstrate the iterative procedure of the sequentialSISO RICA for and over a randomly chosen channelprofile (satisfying the condition ) with the initialpoint from zero. The sequential updating is a special case ofour proposed asynchoronous algorithm, where the SUs arescheduled in round bin. Upon the convergence of both therobust and non-robust designs, during the whole iteration,the robust strategy never breaks the interference limit, whichis, however, violated by the non-robust strategy of each SU.Note that, in this case, the worst-case peak interference for agiven strategy can be found in a simple and closed form as

for each SU .MIMO Channels: In Fig. 8, we demonstrate the iterative pro-

cedure of the simultaneous MIMO RICA, where the SUs simul-taneously update their strategies at each iteration, for and

over a randomly chosen channel profile (satisfying thecondition ) with the initial point also from zero.Both the robust and non-robust designs converge very fast tothe (unique) NEs of and , respectively. Similarly,

Fig. 6. Probability that the uniqueness and convergence conditions in Theo-rems 1 and 2 are satisfied; � � �, � � �, � � �, � � ������� dB�,� � �, � � � dB.

Fig. 8 indicates that, at the cost of moderate loss of SUs’ rates(compared to the non-robust strategy), the robust strategy canguarantee an interference level for any channel (error) withinthe uncertainty region, which is exactly our design goal in thispaper.

VII. CONCLUSION

In this paper, we considered the robust design of a CRsystem, composed of multiple primary and secondary users,with imperfect SU-to-PU CSI. The resource allocation problemof the SU network has been formulated as a noncooperativegame, in which each SU maximizes his information rate,subject to power constraints and robust interference constraintsimposed by the PUs. We have analyzed the robust games usingthe advanced theory of VIs, and proposed totally asynchronousdistributed algorithms along with their convergence properties.Furthermore, we proposed efficient methods to compute thebest-response—the robust transmit strategy—of each SU.

APPENDIX APROOF OF THEOREM 3

Before proving the theorem, we need some intermediate def-initions and results on the VI theory, as given next.

Definition of the VI Problem: Given a subset of the Eu-clidean n-dimensional space and a mapping ,a VI problem, denoted by , is to find a vectorsuch that

(64)

Existence and Uniqueness Results: The theory and solutionmethods for various kinds of VIs are well developed. Here, werecall some of the basic conditions for the existence and unique-ness of the solution to a VI, as they are used in the paper. Aclassical existence result follows from [38, Corollary 2.2.5]:

is solvable if i) is a nonempty, convex, and com-pact subset of a finite-dimensional Euclidean space; and ii) isa continuous mapping. As far as the uniqueness of the solution,

Page 14: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1196 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

Fig. 7. Comparison of the robust game �� and non-robust game � using the sequential SISO RICA; � � �, � � �����10 dB�, � � �, � � 3 dB,� � ����. (a) Iteration of the SUs’ rates. (b) Iteration of the SUs’ worst-case peak interference.

Fig. 8. Comparison of the robust game �� and non-robust game � using the simultaneous MIMO RICA; � � � � �, � � �����10 dB�, � � �� ,� � 3 dB, � � ����. (a) Iteration of the SUs’ rates. (b) Iteration of the SUs’ worst-case peak interference.

we refer to the following condition [38, Proposition 3.5.10]:Suppose that i) the set has a Cartesian structure, i.e.,

with and , and each

is closed and convex; and ii) is a con-tinuous uniformly-P function, i.e., there exists a constraint

such that for any and in

(65)

Then, has a unique solution.Reformulation of the Games and as a VI

Problem: We focus only on the game without loss ofgenerality. By convexity and the first-order (necessary andsufficient) optimality conditions [42] of each optimizationproblem (43), we infer that a strategy profile is a NE of

if and only if

(66)

where . Defineand where

(67)

with . Then, is a NE ofif and only if is a solution to . Therefore,

we can resort to the VI theory to study , or equivalently.

Proof of Theorem 3: The existence of a NE of (or) comes readily from the existence of a solution to

, since the function is continuous and the set iscompact and convex. Regarding the uniqueness, we show nextthat, under the conditions in Theorem 3 (b), is a uniformlyP-function on , implying the uniqueness of the solution of

. To this end, we need the following definitions.

Page 15: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1197

The Jacobian matrix of evaluated at is denoted byand is given by [20]

(68)

where and. We also introduce

(69)

(70)

Using the property that a complex matrix andits real counterpart have the same eigen-values and the following inequalities:

, ,, ,

, , one can see that for any, where is defined in (47). This implies

(71)where are defined in (45). We also need an upper boundof :

(72)

where the first inequality follows from , andis defined in (46).

Now we are ready to study the uniformly P-property of .Given two points , we define for each a realscalar function as

(73)

Note that is continuously differentiable on (0, 1). We canthen apply the mean-value theorem and write

(74)

for some . Let . Then,is given by

(75)

Introducing , it follows that

(76)

(77)

(78)

(79)

where (77) follows from the Cauchy-Schwarz inequality and; (79) follows from the fact that , as a

convex combination of and , belongs to .

Introducing with , andwhere and are defined in (44). from (74), (79), we have

(80)

If is a P-matrix,5 then there exists a constant such that[24]

(81)

holds for an arbitrary vector . Therefore, under theP-property of , we have

(82)

for , implying the uniformly P-property of .Note that a necessary condition for to be a P-matrix is that

, which is equivalent to the requirement thatis full column-rank for all . Invoking [46, Lemma 5.13.14] andfollowing the same steps as in [24, App. B], it is not difficultto show the equivalence: is a P-matrix ,which completes the proof.

APPENDIX BPROOF OF THEOREM 4

To prove the convergence of the asynchronous RICA, wecan follow the similar steps as in the proof of [20, The-orem 12], according to which it is enough to prove the

5A matrix� � is called P-matrix if its every principal minor is posi-tive.

Page 16: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1198 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

convergence of the simultaneous RICA. In the simulta-neous RICA, all SUs update their strategies at each iter-ation (thus ), and at the iteration SUchooses his best response based on the strategies of the others

.Given the equivalence of and , we focus on

. For each SU , is given by the solution to (43)with , and satisfies the first-order optimality con-dition

(83)Adding (66) evaluated at and (83) evaluated at the NE

, we have

(84)

Now we can apply the mean-value theorem to (84). Introducingand following

the steps (73)–(75), we have for some

(85)

where and. Recalling the definitions of and in (69)

and (70), respectively, and following the similar steps (76)–(79),we obtain from (85)

(86)

Assuming that is full column-rank, , then, then (86) implies

(87)

Introducing with ,and recalling the definitions of and in (44), (87) can berewritten as

(88)

It follows that the error sequence , generated by thesimultaneous RICA, converges to zero if

(89)

which thus guarantees the global convergence of Algorithm 2.

APPENDIX CDECOMPOSITION METHOD FOR SINGLE-USER

OPTIMIZATION IN

For simplicity, we suppress the subscript forall notations, since the optimization problem(50) is structurally the same for all SUs. Define

,

, , ,

,

, , and

(90)

Consequently, the convex problem (50) can be expressed as

(91)

This problem has a decomposable structure in terms of the vari-ables , so one can exploit multilevel decompositionmethods [8] to further simply it. In the following, we elabo-rate how to use the so-called dual-primal decomposition methodto solve (91). Note that other decomposition methods, e.g., theprimal-dual decomposition, are also applicable.

The Third-Level Subproblem: To avoid meaningless resultsin the subproblems, we first introduce the following redundantconstraints into (91):

(92)

which do not change the optimal solution to (91). Then, for each, at the lowest (third) level is the subproblem

(93)

where

(94)

with given and . The redundant con-straints in (92) prevent the subproblem (93) to reach the mean-

Page 17: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1199

ingless point (see the proof of Proposition 3).Hence, the feasible set of (93) is an interval , where

and

(95)

Let . Then, we have

(96)which is monotonically decreasing on . Therefore,the solution to (93) is just the root of on ,which can be efficiently found via the bisection method.

The Second-Level Subproblem: Denote the solution to(93) by , and the optimum value by

for given and . Then, at the middle(second) level is a maximization problem with the variablefor given as

(97)

where with .The First-Level Master Problem: Denote the optimum value

of (97) by . Finally, at the top (first) level is a minimizationproblem with the variable as

(98)

To solve (97) and (98), we rely on the subgradient-based algo-rithms. The following proposition provides the subgradients6 ofthe objectives in (97) and (98).

Proposition 5: Considering the problems (97) and (98), thefollowing statements hold:

a) Given and , a subgradient ofwith respect to is

(99)

If , , then , ;if for some , then

if

if(100)

where

(101)

6Given a convex function � � ��� , a vector � is a subgradient of � ata point � � if ���� � ���� � � �� � ��, �� � . If instead � is aconcave function, then � is a subgradient of � at � if�� is a subgradient of theconvex function �� at �.

b) Given as the optimal solution to (97) and , a subgra-dient of is

(102)

Proof: The calculation of the above subgradients is basedon [8, Lemma 1]. Due to the space limitation, we refer the in-terested readers to [8] for more details.

Given the subgradients in Proposition 5, one can choosedifferent subgradient methods, with different tradeoffs betweenthe complexity and the convergence rate, to find the optimal so-lutions to (97) and (98). For example, the cutting-plane methodmay converge faster but has relatively high complexity. Here,we briefly introduce the subgradient projection method thatmay converge slowly but is very simple. Specifically, considera convex problem

(103)

Given a subgradient of , is iteratively updated ac-cording to

(104)

where is the step size. With the properly chosen step size,for example a diminishing step size ,where is the initial step size and is a fixed nonneg-ative number, the sequence is guaranteed to convergeto the optimal solution to (103). Note that, when , i.e.,only one PU, the complicated cutting-plane method reduces tothe simple bisection method.

REFERENCES

[1] FCC Spectrum Policy Task Force, “Report of the Spectrum EfficiencyWorking Group,” Tech. Rep. 02-135, Nov. 2002.

[2] J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radiosmore personal,” IEEE Personal Commun., vol. 6, no. 6, pp. 13–18, Aug.1999.

[3] S. Haykin, “Cognitive radio: Brain-empowered wireless communica-tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb.2005.

[4] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spec-trum gridlock with cognitive radios: An information theoretic perspec-tive,” Proc. IEEE, vol. 97, no. 5, pp. 894–914, May 2009.

[5] M. Gastpar, “On capacity under receive and spatial spectrum-sharingconstraints,” IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 471–487, Feb.2007.

[6] R. Zhang and Y.-C. Liang, “Exploiting multi-antennas for oppor-tunistic spectrum sharing in cognitive radio networks,” IEEE J. Sel.Topics Signal Process., vol. 2, no. 1, pp. 88–102, Feb. 2008.

[7] M. Chiang, C. W. Tan, D. P. Palomar, D. O. Neill, and D. Julian, “Powercontrol by geometric programming,” IEEE Trans. Wireless Commun.,vol. 6, no. 7, pp. 2640–2651, Jul. 2007.

[8] D. P. Palomar and M. Chiang, “Alternative distributed algorithms fornetwork utility maximization: Framework and applications,” IEEETrans. Autom. Control, vol. 52, no. 12, pp. 2254–2269, Dec. 2007.

[9] E. G. Larsson, E. A. Jorswieck, J. Lindblom, and R. Mochaourab,“Game theory and the flat fading Gaussian interference channel,” IEEESignal Process. Mag., vol. 26, no. 5, pp. 18–27, Sep. 2009.

Page 18: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

1200 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011

[10] A. Leshem and E. Zehavi, “Game theory and the frequency selectiveinterference channel—A tutorial,” IEEE Signal Process. Mag., vol. 26,no. 5, pp. 28–40, Sep. 2009.

[11] Z. Luo and S. Zhang, “Spectrum management: Complexity and du-ality,” IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 57–72,Feb. 2008.

[12] M. Osborne and A. Rubinstein, A Course in Game Theory. Cam-bridge, MA: MIT Press, 1994.

[13] W. Yu, G. Ginis, and J. M. Cioffi, “Distributed multiuser power controlfor digital subscriber lines,” IEEE J. Sel. Areas Commun., vol. 20, no.5, pp. 1105–1115, Jun. 2002.

[14] Z. Luo and J.-S. Pang, “Analysis of iterative waterfilling algorithm formultiuser power control in digital subscriber lines,” EURASIP J. App.Signal Process., vol. 2006, pp. 1–10, Feb. 2006.

[15] G. Scutari, D. P. Palomar, and S. Barbarossa, “Optimal linear pre-coding strategies for wideband noncooperative systems based on gametheory—Part I: Nash equilibria,” IEEE Trans. Signal Process., vol. 56,no. 3, pp. 1230–1249, Mar. 2008.

[16] G. Scutari, D. P. Palomar, and S. Barbarossa, “Optimal linear pre-coding strategies for wideband noncooperative systems based on gametheory—Part II: Algorithms,” IEEE Trans. Signal Process., vol. 56, no.3, pp. 1250–1267, Mar. 2008.

[17] G. Scutari, D. P. Palomar, and S. Barbarossa, “Asynchronous iterativewater-filling for Gaussian frequency-selective interference channels,”IEEE Trans. Inf. Theory, vol. 54, no. 7, pp. 2868–2878, Jul. 2008.

[18] J.-S. Pang, G. Scutari, F. Facchinei, and C. Wang, “Distributed powerallocation with rate constraints in Gaussian parallel interference chan-nels,” IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3471–3489, Aug.2008.

[19] G. Scutari, D. P. Palomar, and S. Barbarossa, “Competitive design ofmultiuser MIMO systems based on game theory: A unified view,” IEEEJ. Sel. Areas Commun., vol. 25, no. 7, pp. 1089–1103, Sep. 2008.

[20] G. Scutari, D. P. Palomar, and S. Barbarossa, “The MIMO iterativewaterfilling algorithm,” IEEE Trans. Signal Process., vol. 57, no. 5,pp. 1917–1935, Mar. 2009.

[21] G. Scutari, D. P. Palomar, and S. Barbarossa, “Cognitive MIMO radio:Competitive optimality design based on subspace projections,” IEEESignal Process. Mag., vol. 25, no. 6, pp. 46–59, Nov. 2008.

[22] G. Scutari, D. P. Palomar, J.-S. Pang, and F. Facchinei, “Flexible de-sign of cognitive radio wireless systems: From game theory to varia-tional inequality theory,” IEEE Signal Process. Mag., vol. 26, no. 5, pp.107–123, Sep. 2009.

[23] G. Scutari and D. P. Palomar, “MIMO cognitive radio: A game-the-oretical approach,” IEEE Trans. Signal Process., vol. 58, no. 2, pp.761–780, Feb. 2010.

[24] J.-S. Pang, G. Scutari, D. P. Palomar, and F. Facchinei, “Design ofcognitive radio systems under temperature-interference constraints: Avariational inequality approach,” IEEE Trans. Signal Process., vol. 58,no. 6, pp. 3251–3271, Jun. 2010.

[25] A. M. Tulino, A. Lozano, and S. Verdú, “Capacity-achieving input co-variance for single-user multi-antenna channels,” IEEE Trans. WirelessCommun., vol. 5, no. 2, pp. 662–671, Mar. 2006.

[26] X. Zhang, D. P. Palomar, and B. Ottersten, “Statistically robust designof linear MIMO transceivers,” IEEE Trans. Signal Process., vol. 56,no. 8, pp. 3678–3689, Aug. 2008.

[27] S. A. Vorobyov, A. B. Gershman, and Z.-Q. Luo, “Robust adaptivebeamforming using worst-case performance optimization: A solutionto the signal mismatch problem,” IEEE Trans. Signal Process., vol. 51,no. 2, pp. 313–324, Feb. 2003.

[28] Y. C. Eldar and N. Merhav, “A competitive minimax approach to robustestimation of random parameters,” IEEE Trans. Signal Process., vol.52, no. 7, pp. 1931–1946, Jul. 2004.

[29] R. Lorenz and S. P. Boyd, “Robust minimum variance beamforming,”IEEE Trans. Signal Process., vol. 53, no. 5, pp. 1684–1696, May 2005.

[30] A. Pascual-Iserte, D. P. Palomar, A. I. Pérez-Neira, and M. A. Lagunas,“A robust maximin approach for MIMO communications with partialchannel state information based on convex optimization,” IEEE Trans.Signal Process., vol. 54, no. 1, pp. 346–360, Jan. 2006.

[31] J. Wang and D. P. Palomar, “Worst-case robust MIMO transmissionwith imperfect channel knowledge,” IEEE Trans. Signal Process., vol.57, no. 8, pp. 3086–3100, Aug. 2009.

[32] J. Wang and D. P. Palomar, “Robust MSE precoding in MIMO channelswith pre-fixed receivers,” IEEE Trans. Signal Process., vol. 58, no. 11,pp. 5802–5818, Nov. 2010.

[33] J. Wang and M. Payaró, “On the robustness of transmit beamforming,”IEEE Trans. Signal Process., vol. 58, no. 11, pp. 5933–5938, Nov.2010.

[34] L. Zhang, Y.-C. Liang, Y. Xin, and H. V. Poor, “Robust cognitivebeamforming with partial channel state information,” IEEE Trans.Wireless Commun., vol. 8, no. 8, pp. 4143–4153, Aug. 2009.

[35] G. Zheng, K.-K. Wong, and B. Ottersten, “Robust cognitive beam-forming with bounded channel uncertainties,” IEEE Trans. SignalProcess., vol. 57, no. 12, pp. 4871–4881, Dec. 2009.

[36] A. J. Anandkumar, A. Anandkumar, S. Lambotharan, and J. Chambers,“Robust rate maximization game under bounded channel uncertainty,”presented at the IEEE Int. Conf. Acoust., Speech, Signal Process.(IEEE ICASSP), Dallas, TX, Mar. 2010.

[37] G. Scutari, D. P. Palomar, J.-S. Pang, and F. Facchinei, “Convex opti-mization, game theory, and variational inequality theory,” IEEE SignalProcess. Mag., vol. 27, no. 3, pp. 35–49, May 2010.

[38] F. Facchinei and J.-S. Pang, Finite-Dimensional Variational Inequali-ties and Complementarity Problems. New York: Springer, 2003.

[39] R. A. Horn and C. R. Johnson, Matrix Analysis. New York: Cam-bridge Univ. Press, 1985.

[40] T. M. Cover and J. A. Thomas, Elements of Information Theory. NewYork: Wiley, 1991.

[41] R. Zhang, “On peak versus average interference power constraints forprotecting primary users in cognitive radio networks,” IEEE Trans.Wireless Commun., vol. 8, no. 4, pp. 2112–2120, Apr. 2009.

[42] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge,U.K.: Cambridge Univ. Press, 2004.

[43] Y. Nesterov and A. Nemirovskii, Interior-Point Polynomial Algorithmsin Convex Programming, ser. Studies in Applied Mathematics 13.Philadelphia, PA: SIAM, 1994.

[44] Z. Luo, J. F. Sturm, and S. Zhang, “Multivariate nonnegative quadraticmappings,” SIAM J. Optim., vol. 14, no. 4, pp. 1140–1162, 2004.

[45] G. A. F. Seber, A Matrix Handbook for Statisticians. New York:Wiley, 2008.

[46] R. W. Cottle, J.-S. Pang, and R. E. Stone, The Linear ComplementarityProblem. Boston, MA: Cambridge Academic, 1992.

Jiaheng Wang (S’08–M’10) received the Ph.D.degree in electrical engineering from the Hong KongUniversity of Science and Technology, Hong Kong,in 2010 and the B.E. and M.S. degrees from theSoutheast University, Nanjing, China, in 2001 and2006, respectively.

He is currently a Postdoctoral Researcher withthe Signal Processing Laboratory, ACCESS Lin-naeus Center, KTH Royal Institute of Technology,Stockholm, Sweden. His research interests mainlyinclude optimization in signal processing, wireless

communications, and networks.

Gesualdo Scutari (S’05–M’06) received the Elec-trical Engineering and Ph.D. degrees (both withhonors) from the University of Rome “La Sapienza,”Rome, Italy, in 2001 and 2004, respectively.

He is an Assistant Professor in the Departmentof Electrical Engineering at State University ofNew York (SUNY) at Buffalo, Buffalo, NY. Hehad previously held several research appointments,namely, at the University of California at Berkeley;Hong Kong University of Science and Technology,Hong Kong; University of Rome, “La Sapienza,”

Rome, Italy; and the University of Illinois at Urbana-Champaign, Urbana, IL.He has participated in many European projects, namely IST SATURN (onmultiantenna systems), IST-ROMANTIK (on multihop systems), WINSOC(on wireless sensor networks), and SURFACE (on reconfigurable air interfacesfor wideband multiantenna communication systems). His primary researchinterests include applications of convex optimization theory, game theory, andvariational inequality theory to signal processing and communications; sensornetworks; and distributed decisions.

Dr. Scutari received the 2006 Best Student Paper Award at the InternationalConference on Acoustics, Speech and Signal Processing (ICASSP) 2006.

Page 19: IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, … · 2012-05-04 · IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 3, MARCH 2011 1183 Robust MIMO Cognitive Radio Via

WANG et al.: ROBUST MIMO COGNITIVE RADIO VIA GAME THEORY 1201

Daniel P. Palomar (S’99–M’03–SM’08) receivedthe Electrical Engineering and Ph.D. degrees (bothwith honors) from the Technical University of Cat-alonia (UPC), Barcelona, Spain, in 1998 and 2003,respectively.

He is an Associate Professor in the Departmentof Electronic and Computer Engineering at theHong Kong University of Science and Technology(HKUST), Hong Kong, which he joined in 2006. Hehad previously held several research appointments,namely, at King’s College London (KCL), London,

U.K.; the Technical University of Catalonia (UPC), Barcelona, Spain; StanfordUniversity, Stanford, CA; the Telecommunications Technological Center ofCatalonia (CTTC), Barcelona, Spain; the Royal Institute of Technology (KTH),Stockholm, Sweden; the University of Rome “La Sapienza,” Rome, Italy; andPrinceton University, Princeton, NJ. His current research interests includeapplications of convex optimization theory, game theory, and variationalinequality theory to signal processing and communications.

Dr. Palomar is an Associate Editor of the IEEE TRANSACTIONS ON

INFORMATION THEORY and has been an Associate Editor of the IEEE

TRANSACTIONS ON SIGNAL PROCESSING, a Guest Editor of the IEEE SIGNAL

PROCESSING MAGAZINE 2010 Special Issue on Convex Optimization for SignalProcessing, a Guest Editor of the IEEE JOURNAL ON SELECTED AREAS IN

COMMUNICATIONS 2008 Special Issue on Game Theory in CommunicationSystems, and the Lead Guest Editor of the IEEE JOURNAL ON SELECTED

AREAS IN COMMUNICATIONS 2007 Special Issue on Optimization of MIMOTransceivers for Realistic Communication Networks. He serves on the IEEESignal Processing Society Technical Committee on Signal Processing forCommunications (SPCOM). He was the General Co-Chair of the 2009 IEEEWorkshop on Computational Advances in Multi-Sensor Adaptive Processing(CAMSAP). He is a recipient of a 2004–2006 Fulbright Research Fellowship;the 2004 Young Author Best Paper Award by the IEEE Signal ProcessingSociety; the 2002–2003 best Ph.D. prize in Information Technologies and Com-munications by the Technical University of Catalonia (UPC); the 2002–2003Rosina Ribalta first prize for the Best Doctoral Thesis in Information Technolo-gies and Communications by the Epson Foundation; and the 2004 prize for theBest Doctoral Thesis in Advanced Mobile Communications by the VodafoneFoundation and COIT.