Optimal spectrum access and power control of secondary users in cognitive radio networks

Yang Yang, Linglong Dai*, Jianjun Li, Shahid Mumtaz, Jonathan Rodriguez

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)
4 Downloads (Pure)


In future 5G communication system, radio resources can be effectively reused by cognitive radio networks (CRNs), where a lot of secondary users (SUs) are able to access the spectrum of primary users (PUs). In this paper, we analyze the optimal spectrum access and power control of SUs on multiple bands with the target of maximizing the average sum rate (ASR) of SUs. Specifically, based on the stochastic geometry, the random distributions of PUs and SUs are modeled by Poisson point processes (PPPs), based on which we derive out the closed-form outage probabilities and obtain the ASR of SUs. Then, we formulate the maximization problem of ASR on multiple bands under the constraints of outage probabilities. With the help of convex optimization, the optimal density of SUs is obtained in closed-form when the power of SUs is fixed. The convexity of ASR is also verified, and we evaluate the optimal power of SUs when the density of SUs is fixed. Based on these two obtained results, a spectrum access and power control algorithm is further proposed to maximize the ASR of SUs on multiple bands. Simulation results demonstrate that the proposed algorithm can achieve a higher maximum ASR of SUs over the average power allocation algorithm, and the density and power boundary of SUs are constrained by PUs as well as the interference in the networks.

Original languageEnglish
Article number98
JournalEURASIP Journal on Wireless Communications and Networking
Issue number1
Publication statusPublished - 1 Dec 2017
Externally publishedYes


  • Cognitive radio networks
  • Convex optimization
  • Poisson point process
  • Power control
  • Spectrum access


Dive into the research topics of 'Optimal spectrum access and power control of secondary users in cognitive radio networks'. Together they form a unique fingerprint.

Cite this