Improper Gaussian signaling for

Similar documents
Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Practical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users

Clean relaying aided cognitive radio under the coexistence constraint

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Minimum Mean Squared Error Interference Alignment

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Novel spectrum sensing schemes for Cognitive Radio Networks

A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

IN this paper, we show that the scalar Gaussian multiple-access

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

On the Capacity of Distributed Antenna Systems Lin Dai

Feasibility Conditions for Interference Alignment

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Cognitive Multiple Access Networks

MULTI-INPUT multi-output (MIMO) channels, usually

Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Information Theory for Wireless Communications, Part II:

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

K User Interference Channel with Backhaul

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Interactive Interference Alignment

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Capacity of a Two-way Function Multicast Channel

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye

arxiv:cs/ v1 [cs.it] 11 Sep 2006

On Network Interference Management

The Optimality of Beamforming: A Unified View

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

Interference Channels with Source Cooperation

Appendix B Information theory from first principles

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Distributed Geometric-Programming-Based Power Control in Cellular Cognitive Radio Networks

The RF-Chain Limited MIMO System: Part II Case Study of V-BLAST and GMD

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network

MIMO Cognitive Radio: A Game Theoretical Approach Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE

Under sum power constraint, the capacity of MIMO channels

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems

Transmitter optimization for distributed Gaussian MIMO channels

Versatile, Accurate and Analytically Tractable Approximation for the Gaussian Q-function. Miguel López-Benítez and Fernando Casadevall

Statistical Beamforming on the Grassmann Manifold for the Two-User Broadcast Channel

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA

Weighted Sum Rate Optimization for Cognitive Radio MIMO Broadcast Channels

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation

A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance

EE 5407 Part II: Spatial Based Wireless Communications

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Interference Alignment at Finite SNR for TI channels

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

arxiv: v1 [cs.it] 4 Jun 2018

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Capacity of Block Rayleigh Fading Channels Without CSI

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

NOMA: Principles and Recent Results

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

NOMA: An Information Theoretic Perspective

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

Cooperative Interference Alignment for the Multiple Access Channel

Energy-Sensitive Cooperative Spectrum Sharing: A Contract Design Approach

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

On the Optimality of Beamformer Design for Zero-forcing DPC with QR Decomposition

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

Network Calculus. A General Framework for Interference Management and Resource Allocation. Martin Schubert

High SNR Analysis for MIMO Broadcast Channels: Dirty Paper Coding vs. Linear Precoding

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

IEEE C80216m-09/0079r1

Multiuser Capacity in Block Fading Channel

Interference Reduction In Cognitive Networks via Scheduling

Approximately achieving the feedback interference channel capacity with point-to-point codes

How Much Training and Feedback are Needed in MIMO Broadcast Channels?

Vector Channel Capacity with Quantized Feedback

Transcription:

Improper Gaussian signaling for multiple-access channels in underlay cognitive radio Christian Lameiro, Member, IEEE, Ignacio Santamaría, Senior Member, IEEE, arxiv:7.09768v [cs.it] 27 Nov 207 and Peter J. Schreier, Senior Member, IEEE Abstract This paper characterizes the achievable rate region of an unlicensed multiple-access channel (MAC) that coexists with a licensed point-to-point user, following the underlay cognitive radio paradigm. We assume that every transceiver except the secondary base station has one antenna, and that the primary user (PU) is protected by a minimum rate constraint. In contrast to the conventional assumption of proper Gaussian signaling, we allow the secondary users (SUs) to transmit improper Gaussian signals, which are correlated with their complex conjugate. In this setting, we show that a given point of the rate region boundary is attained by an improper signal if the sum of the interference channel gains (in an equivalent canonical model) is above a certain threshold. We derive an efficient algorithm to compute every point of the rate region boundary achieved by improper Gaussian signaling. The proposed algorithm exploits a single-user representation of the secondary MAC along with new results on the optimality of improper signaling in the single-user case when the PU is corrupted by improper noise. Keywords Improper Gaussian signaling, underlay cognitive radio, multiple-access channel. C. Lameiro and P. J. Schreier are with the Signal & System Theory Group, Universität Paderborn, Germany (email: {christian.lameiro, peter.schreier}@sst.upb.de). I. Santamaría is with the Department of Communications Engineering, University of Cantabria, Spain (e-mail: i.santamaria@unican.es).

2 I. INTRODUCTION The number of devices with wireless connectivity has enormously increased in the last years, and the trend will continue in years to come. Cognitive radio (CR) has been proposed as an efficient means to satisfy the increasing demand on wireless resources. CR is built on the premise that the radio-frequency spectrum is underutilized. That is, the theoretical limits of the spectrum are far from being fully exploited. The CR paradigm consists in the primary users (PUs), which are the rightful owners of the spectrum, sharing their resources with unlicensed users, which are called secondary users (SUs), as long as the performance of the PUs is not compromised. Depending on how the PU is protected and the approach followed by the SUs, there is interweave, overlay and underlay CR []. In this paper we consider underlay CR, where the SUs are allowed to access the channel as long as the resulting interference at the primary receiver is below a tolerable threshold. In wireless communications in general, and in underlay CR in particular, the transmission of proper Gaussian signals is a common assumption in the study of theoretical limits and achievable rate regions. The reason behind this is that such signaling scheme is known to be optimal for the point-to-point, broadcast and multiple-access channels (BC and MAC, respectively) [2]. In more sophisticated communication scenarios, such as the interference channel (IC), the optimal input distribution, except for some special cases, is still unknown. Indeed, when interference is treated as noise, the transmission of Gaussian signals that are improper rather than proper, i.e., correlated with their complex conjugate, has been shown to increase the performance in scenarios where interference is a limiting factor. As underlay CR is an interference-limited scenario (since the performance of the SUs is limited by the interference they cause to the PU), improper signaling seems to be a promising approach. An improper complex random variable is, as opposed to a proper one, correlated with its complex conjugate [3]. Therefore, the differential entropy of an improper Gaussian random variable is lower than the differential entropy of its proper counterpart. Indeed, the maximum entropy theorem states that the entropy of a complex random variable, with a given covariance matrix, Impropriety is related to circularity. We say that a random variable x is circular (or circularly symmetric) if its distribution is invariant under rotations of the form e jθ x, for any arbitrary constant θ [4]. While circularity implies propriety, the converse does not hold in general. As an exception, a Gaussian random variable that is proper is also circular.

3 is maximized if the random variable is proper and Gaussian [3], which explains the optimality of proper Gaussian signaling in the aforementioned scenarios. However, when interference is treated as noise, the achievable rate decreases with increasing entropy of the interference. Thus, if the interference is improper, the achievable rate increases. Additionally, when the receiver is corrupted by improper noise, improper signaling becomes optimal for that user. Due to these facts, the usefulness of improper signaling in interference-limited scenarios becomes evident. The payoffs of improper signaling over proper signaling were first shown by Cadambe et al. [5]. They studied the degrees-of-freedom (DoF), which characterize the asymptotic sumcapacity, of the single-antenna 3-user IC with constant channel extensions. They found that, while proper signaling provided DoF,.2 DoF were achievable by improper signaling. A great deal of works has followed these lines showing the payoffs of improper signaling for different interferece-limited networks, such as the IC [6] [9], the Z-IC [0] [3], underlay and overlay CR [4] [8], relay channels [9], [20], etc. So far, the works analyzing improper signaling schemes for underlay CR have focused on secondary networks comprised of a single SU. For example, in our previous work [4] we consider a 2-user IC, where one of the users is the PU (which transmits proper signals) and the other one corresponds to the SU (which may transmit improper signals). In this setting, and subject to a PU rate constraint, we derive the optimal transmission parameters of the SU and an insightful condition determining when improper signaling outperforms proper signaling. Similarly, [6] considers the same scenario but assuming statistical channel state information (CSI), thus the analysis of this work focuses on the outage probability. A similar scenario is considered in [8], where a single SU coexists with a full-duplex PU. Due to the lack of results of improper signaling in multiuser secondary networks, this paper aims at providing insights in such scenarios. To this end, we consider a single PU, which transmits proper Gaussian signals, sharing the spectrum with a secondary MAC, where users may transmit improper Gaussian signals. For the proper signaling case, this scenario has been studied, e.g., in [2] [25]. A similar scenario, called partial interfering MAC (PIMAC), has been considered in [26] with improper signaling and outside the context of cognitive radio. In that scenario, a pointto-point link coexists with a MAC, and authors numerically optimized the improper signaling parameters when the MAC has two single-antenna users and a single-antenna base station. Here, we consider a similar setting as in [25]. That is, every user has one antenna, except for the

4 secondary base station (BS), whose number of antennas is at least equal to the number of SUs. Unlike [25], we consider a single PU but allow the SUs to transmit improper Gaussian signals. Assuming that the interference must be such that the PU achieves a certain minimum rate, we study the achievable rate region of the SUs when the BS employs a zero-forcing (ZF) decoding scheme. We derive a necessary and sufficient condition for a given boundary point to be achieved by improper signaling. Then, we provide an algorithm to compute the transmission parameters that achieve the boundary of the rate region. Our aim is to derive insights into the properties of improper Gaussian signaling as well as its performance limits. Because of that, we assume that global CSI is available at the SUs. The results we obtain in this paper will then serve as design guidelines when more realistic assumptions on the availability of the CSI are considered. Additionally, our results can be applied outside the context of cognitive radio, when the pointto-point link is restricted to proper signaling due to lack of CSI or because it is a legacy user (see, e.g., [8]). The proposed algorithm successively identifies the SUs for which either the constraint on power budget or on the degree of impropriety is active. This set of users has known parameters and the optimization has to be carried out for the remaining users. The key idea is to transform the secondary MAC into an equivalent single-user channel. This makes it possible to apply our previous results for the single-user case [4]. However, in this equivalent single-user representation of the secondary MAC, the equivalent noise at the primary receiver may be improper, which requires extending our results in [4] to this case. Therefore, as a byproduct, our paper also extends the results in [4] to case where the PU is corrupted by improper noise. The rest of the paper is organized as follows. Section II introduces the system model. The optimal signaling for a single SU coexisting with a PU affected by improper noise is analyzed in Section III. Section IV formulates the characterization of the rate region boundary and derives the optimal transmission parameters attaining this boundary. Numerical examples are provided in Section V. II. SYSTEM MODEL A. Preliminaries about improper random variables We start by providing the necessary background on improper random variables. We refer the reader to [4] for a comprehensive treatment of the topic.

5 s {p} s {p, c } s K {p k, c k } g g K g h h h K + n {σ 2 } + n 0 {σ 2 0 I} N y y 0 s {p} s {p, c } s K {p k, c k } a ak + n {} + n {} + y y y K n K {} n K {} (a) (b) Fig. : (a) Considered underlay cognitive radio scenario and (b) its canonical model after ZF- SIC. The variance (or covariance matrix) and the circularity coefficient of the signals and noise is given in brackets. The top link is the PU. Definition ([4]). The complementary variance of a zero-mean complex random variable x is defined as σ x = E[x 2 ]. If σ x = 0, then x is called proper, otherwise improper. Furthermore, σ 2 x and σ x are a valid pair of variance and complementary variance if and only if σ 2 x 0 and σ x σ 2 x. Definition 2 ([4]). The circularity coefficient of a complex random variable x, which measures the degree of impropriety, is defined as c x = σ x. () σx 2 The circularity coefficient satisfies 0 c x. If c x = 0, then x is proper, otherwise improper. If c x = we call x maximally improper. B. System description We consider a single-antenna PU that shares the spectrum with a secondary MAC comprised of K SUs and a secondary base station (BS), as depicted in Fig. a. We assume single-antenna SUs, while the secondary BS is equipped with N K antennas. Following the underlay CR

6 principle, the PU tolerates a certain amount of interference, which we express by a minimum rate requirement. The signal at the primary receiver can be expressed as y = K phs + pk g k s k + n, (2) k= where p, h, and s are the transmit power, direct channel, and transmit symbol of the PU; p k, g k, and s k denote the transmit power, cross-channel, and transmit symbol of the kth SU; and n is additive white Gaussian noise (AWGN) with variance σ 2. For all the relevant parameters, we indicate with the subscript k the kth SU, whereas no subscript is used for the PU. We assume that the noise and the PU transmit signal are proper complex Gaussian random variables. The SUs, however, transmit complex Gaussian signals that are allowed to be improper. Similarly, the received signal at the secondary BS can be expressed as (we use the subscript 0 to indicate the secondary BS) K y 0 = pk h k s k + pgs + n 0, (3) k= where n 0 is AWGN, which is assumed to be proper with covariance matrix σ0i, 2 and h k and g are the direct channel of the kth SU and the PU cross-channel, respectively. The BS applies ZF successive interference cancellation (ZF-SIC), so that the interference between SUs is removed. Even though the minimum mean square error (MMSE) SIC receiver achieves the capacity of the MAC [27], a ZF-based decoder allows a more tractable analysis as the SUs are only coupled through the PU rate constraint. Additionally, it has been shown in [28] that ZF-SIC is sumcapacity achieving in the asymptotic high and low signal-to-noise ratio (SNR) regimes. 2 The ZF-SIC decoder works as follows [25], [29]. First, the QR decomposition of the channel matrix H = [h,..., h K ] is computed, which yields the unitary matrix Q and the upper-triangular matrix R. The received signal is then multiplied by the unitary decoder Q H, and SIC is further carried out. We consider a fixed user ordering given without loss of generality by the user indexes. Thus, the equalized received signal from each SU is y k = p k r k s k + pq H k gs + q H k n 0, (4) 2 The asymptotic optimality is shown in [28] for the ZF dirty paper coding scheme in the broadcast channel. This result can be translated into the MAC with ZF-SIC as they are duals of each other [29].

7 where r k is the kth diagonal entry of R, and q k is the kth column of Q. For compactness of the expressions and ease of their interpretation, it is sometimes useful to use the canonical model, where the noise variances and direct channel gains are set to one, as we depict in Fig. b. This is obtained by an appropriate scaling of (2) and (4). Additionally, the noise and the PU signal are proper, thus their distribution is unchanged when multiplied by a unitary complex number. We can then express (2) and (4) equivalently as y = K ps + pk ak s k + n, (5) k= y k = p k s k + n 0, (6) where n and n 0 have now unit variance, and a k is the channel gain between the kth SU and the PU. Notice that n 0 contains also the interference from the primary transmitter, as the PU transmit power is kept fixed. With a slight abuse of notation we use the same symbols in (2), (4) and the above expressions, but they should not be confused with each other. The rate achieved by the PU can then be expressed as [7] ( R({p k, c k, φ k } K k=) = 2 log + p + ) 2 K k= a kp k K k= a kp k c k e jφ k 2 2 ( + ) 2 K k= a kp k K k= a kp k c k e jφ k 2, (7) where p k = p k c k e jφ k by the kth SU can be written as [4] is the complementary variance of the kth SU. Similarly, the rate achieved R k (p k, c k, φ k ) = 2 log 2 { + pk [ pk ( c 2 k ) + 2 ]}. (8) Notice that R k (p k, c k, φ k ) = R k (p k, c k ), i.e., the SU rate is not a function of φ k. Therefore, {φ k } k K must be chosen to maximize the PU rate. We notice that ( R({p k, c k, φ k } k K ) k K a kp k c k e jφ k 2 > 0 + p + ) 2 ( a k p k > + ) 2 a k p k, (9) k K k K which is always true. Therefore, maximizing R in φ k is equivalent to maximizing k K a kp k c k e jφ k 2, which implies φ k = φ, k K. (0) Therefore, the optimization needs to be carried out in the transmit powers p k and circularity coefficients c k, k =,..., K.

8 {p I, c I } n I s {p} + y as n P {} s s {p s, c s } + y s n s {} Fig. 2: Single-SU scenario with a PU affected by improper noise. In the next sections we characterize the rate region boundary of the secondary MAC subject to a PU rate constraint. As explained in Section I, this will be carried out by first deriving an equivalent single-user representation. This will allow us to apply our previous results for the single-user case [4] to determine the optimality of improper signaling. However, in the equivalent single-user representation, the noise at the PU may be improper, in which case the results in [4] cannot be applied. Therefore, the next section extends the results in [4] to the case where the PU is corrupted by improper (rather than proper) Gaussian noise. These results will then be exploited in Section IV. III. SINGLE-USER CASE WITH A PRIMARY USER AFFECTED BY IMPROPER NOISE Let us consider one single SU and assume that the primary receiver is affected by improper noise, as depicted in Fig. 2. Notice that this model generalizes the one considered in [4], where the noise at the PU is assumed to be proper. In order to clearly differentiate this scenario from the one having a secondary MAC, we indicate the parameters of this user with the subscript s. For convenience, we express the improper noise at the PU as a summation of two terms, namely n = n P + n I, ()

9 where n P is proper Gaussian with variance, and n I is improper Gaussian with variance p I and circularity coefficient c I > 0, which is independent of n P. The reason behind this decomposition of the noise is that it matches the structure of the noise in the equivalent single-user representation of the secondary MAC, which we will derive in the next section. Notice also that, by (0), the optimal phase φ s of the complementary variance of the SU equals φ I, with φ I being the phase of the complementary variance of n I. Therefore, the parameters become again the transmit power and the circularity coefficient. Our goal now is to obtain p s and c s to maximize the SU rate while ensuring the PU rate constraint. That is, we want to solve the problem P IN : maximize p s,c s R s (p s, c s ), subject to 0 p s P s, 0 c s, R (p s, c s ) R, where IN stands for improper noise. R s (p s, c s ) follows (8) and the PU rate is now [ ] R(p s, c s ) = 2 log ( + p + a s p s + p I ) 2 (a s p s c s + p I c I ) 2 2 ( + a s p s + p I ) 2 (a s p s c s + p I c I ) 2. (2) The first constraint in P IN is the power budget constraint, whereas the second ensures that the circularity coefficient is valid. The last constraint is the PU rate constraint, which guarantees that the PU performance is not compromised. We now use (2) to express the rate constraint, which is the last constraint in P IN, after some manipulations as a 2 sp 2 s( c 2 s) ( β)[p+2(+a s p s +p I )] 2(a s p s +p I ) p 2 I( c 2 I) 2a s p s p I ( c s c I ), (3) where β = p 2 2 R. (4) Let q(c s ) be the value of p s that makes (3) hold with equality, which is the maximum transmit power of the SU such that the PU rate constraint is satisfied. The PU rate constraint can then be replaced by p s q(c s ), and the SU maximizes its rate by taking p s = min[q(c s ), P s ], where P s is the SU power budget. Let us first analyze the behavior of R s (p s = q(c s ), c s ) = R s (c s ). To this end, we present the following lemma.

0 Lemma. There exists 0 < c R such that R s (c s ) is monotonically increasing for 0 c s c R and monotonically decreasing for c R < c s. Proof: Please refer to Appendix A. Lemma implies a surprising result. If the power budget is sufficiently high, then the SU improves its rate by transmitting an improper signal independently of the interference channel coefficient a s (as long as a s > 0 and c I > 0). This is the case as long as proper signaling does not permit maximum power transmission, in which case the transmit power can increase by making the transmit signal improper. Nevertheless, this is still rather surprising in sharp contrast with the results obtained under proper noise in [0], [4], where improper signaling is shown to improve the rate only when a s is above a given threshold. As a matter of fact, it is well-known that improper signaling is optimal if the own receiver is affected by improper noise. This new result establishes that improper signaling is also optimal (in the sense of Pareto) if the receiver that is interfered with is affected by improper noise (even though the transmitter associated with that receiver may be transmitting proper signals). Lemma also states that there are two possible behaviors for R s (c s ). Either c R =, so that the rate increases with c s, in which case the maximum is achieved at c s = ; or 0 < c R < and then the rate increases in the interval 0 c s c R, in which case the maximum is achieved at 0 < c s = c R <. When the power budget is taken into account, the optimal circularity coefficient will not be greater than the value of c s for which q(c s ) = P s. The optimal circularity coefficient, which maximizes the SU rate while ensuring the PU rate, is given in the following theorem. Theorem. The optimal circularity coefficient, which is the optimal solution of P IN, is given by c s = min(c B, c R ), (5) where c B = max{0 c s : q(c s ) max[p s, q(0)]}, (6) and ( c R = max {0 c s : a s q(c s )c s p ) } I + β + p I c I [ + q(c s )] 0 a s where β is given by (4)., (7)

Proof: Please refer to Appendix B. Theorem provides the optimal circularity coefficient of the SU, and it can be clearly seen that, if q(0) < P s, improper signaling is optimal independently of any other system parameter. This is because, in such a case, c B > 0 and c R > 0. The latter is due to the fact that p I > 0 and c I > 0, as can clearly be seen in (7). Additionally, c B, c R and q(c s ) can be obtained in closed form as follows. First, taking p s = q(c s ) in (3) with equality we obtain a second-order equation for q(c s ). Similarly, taking p s = P s in (3) with equality yields a second-order equation, thereby obtaining c B. To obtain the value of c R we first notice that c R = if the condition in (7) is fulfilled for all c s. By replacing p s = q(c s ) in (3) and taking equality and c s = we have q() = ( β)(p + p I + 2) p 2 I ( c2 I ) 2p I 2a s [p I ( c I ) + β] = p 2 [p I ( c I ) + β] [p I ( + c I ) + β], 2a s [p I ( c I ) + β] (8) where p p2 R = 2 2 R. Using this expression, we replace c s = in the condition in (7) obtaining that c R = if a s ξ, with ξ = [p I( c I ) + β] {p 2 [p I ( c I ) + β] [p I ( + c I ) + β]} p 2 [p I ( c I ) + β] 2. (9) Finally, if c R <, we obtain, by (7), q(c R ) = p I c I p I (c R c I ) a s c R ( β a s ). (20) Replacing p s with the above q(c R ) in (3), and taking c s = c R and equality, we obtain also a second-order equation for c R. Figure 3 illustrates the behavior of the rate with c s and for different values of the interference channel coefficient a s. As stated in Lemma, R s (c s ) is increasing in the interval 0 c s c R, with c R indicated with a circle in Fig. 3. The parameters for this example are p = 00, p I = 5, c I = 0.5 and R = 3.3 b/s/hz, which makes ξ = 2.6. In the next section we will characterize the rate region boundary of the secondary MAC. This will be accomplished by deriving an equivalent single-user representation to which we apply the results of this section. IV. RATE REGION BOUNDARY We return to the general case with K SUs forming a secondary MAC, as detailed in Section II (see also Fig. ). In order to compute the boundary of the rate region, we use the rate profile

2.3.2 Rs(cs)/Rs(0). 0.9 a s = 0.05ξ 0.8 a s = 0.5ξ a s = ξ a s =.5ξ 0.7 0 0. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 c s Fig. 3: Example of the SU rate normalized by the rate achieved by proper signaling for different values of a s. We indicate the point c s = c R with a circle. approach [30]. Following these lines, a given point of the rate region, characterized by a given set of non-negative quantities {α k } K k=, with K k= α k =, can be computed by solving the following optimization problem. P : maximize {p k,c k } K k=,r r, subject to 0 p k P k, k =,..., K, 0 c k, k =,..., K, R k (p k, c k ) α k r, k =,..., K, R({p k, c k } K k=) R, where R is the PU rate constraint and we have taken the optimal phases φ k = φ k (see (0)). Our aim is to solve the above problem analytically, so that insightful conclusions about the optimality of improper signaling can be drawn. Notice that, if α k = 0 for some k, the optimal transmit power for that user is zero, i.e., p k = 0. Therefore we define K as the set of users for

3 which α k > 0, and P must then be solved for users k K. Since P is not a convex optimization problem due to the PU rate constraint, we first rewrite this constraint as follows. By regarding the aggregate interference as one interference signal with power k K a kp k and circularity coefficient k K a kp k c k / k K a kp k, it can be noticed that the PU rate is only a function of the total interference power and the circularity coefficient of the aggregate interference. The rate constraint then establishes a relationship between both. Additionally, the PU rate R decreases with the interference power and increases with its circularity coefficient. Thus we have R R k K a kp k t(c) k K a kp k c k t(c)c, (2) where t(c) is the tolerable interference power when the circularity coefficient of the aggregate interference is c (so that R R is fulfilled). Finally, the optimal value of r in problem P can be found via bisection. That is, r is fixed and P is thereby transformed into a feasibility problem. With this in mind, the lth step of the bisection method solves the feasibility problem P l : find {p k, c k } k K, c, subject to 0 p k P k, k K, 0 c k, k K, R k (p k, c k ) α k r, k K, a k p k t(c), k K a k p k c k t(c)c. In the following, we will analyze this feasibility problem for a fixed value of c. This way, we will be able to obtain closed-form expressions for the feasible points in terms of c, which will provide insights into its optimal value. Let K f denote the set of users for which log 2 ( + P k ) = α k r and K a = K\K f. Notice that for users k K f the rate α k r is only achievable for c k = 0 and p k = P k. Therefore, the feasibility problem P l is solved only for the users k K a, while treating the users in K f as a fixed additional proper interference affecting the primary receiver, so that the equivalent noise level is + k K f a k P k. Taking this into account, and with a slight k K

4 abuse of notation, we may write the PU rate constraint as k K a a k p k t(c), (22) k K a a k p k c k t(c)c. (23) Notice that t(c) and c are now the interference power and impropriety constraints for the users k K a. Therefore, t(c) is now the tolerable interference power when the noise power at the PU is + k K f a k P k. In order to obtain the transmission parameters that attain a given boundary point, we will first determine whether or not improper signaling is required to achieve that particular point. To this end, it is sufficient to analyze problem P l, at this stage, for c 0. If P l is feasible, there exists a feasible point such that (22) and (23) hold with equality while p k < P k and c k < for all k K a, and therefore these constraints can be removed from P l. This can be explained as follows. First, as c approaches zero, every c k goes towards zero as well, and c k < is then fulfilled for some feasible point (as the SU rates decrease with c k ). Second, as c k 0, the SU rates converge to log 2 ( + p k ). Since the users in K a fulfill log 2 ( + P k ) > α k r, a feasible point satisfying p k < P k and (22) with equality can then be chosen. Obviously, this is the case as long as t(c) < k K a a k P k as c 0. Otherwise, proper signaling is the optimal strategy for the whole rate region boundary as the PU rate constraint is inactive. For a given c, the feasibility problem P l is a convex optimization problem (notice that p k c k can be replaced by p k plus the constraint 0 p k p k ). The Lagrangian reads L = ) ( ) ν k [R k (p k, c k ) α k r] + λ (t(c) k Ka a k p k + µ a k p k c k t(c)c, (24) k K a k K a where we have dropped the constraints p k P k and c k, as previously explained. In the above expression, ν k 0, λ 0 and µ 0 are the Lagrange multipliers of the SU rate, interference power, and interference circularity coefficient constraints, respectively. Notice also that the constraints p k 0 and c k 0 have also been removed. As we will show later, these constraints will automatically be satisfied without considering them explicitly. Deriving

5 the Lagrangian with respect to p k and c k and equating them to zero yields a k (p k + ) ν k = a k p k c k ν k = ( ), λ µ2 λ 2 (25) µ ( ). λ 2 µ2 λ 2 (26) Using these expressions we obtain k K a k p k = a ν k ( ) a k t(c), (27) k K a λ µ2 λ 2 k K a a k p k c k = µ k K a ν k ( ) t(c)c. (28) k K a λ 2 µ2 λ 2 As mentioned before, if P l is feasible, there is a feasible solution satisfying the above constraints with equality. We therefore take equality in the above constraints, and P l will then be feasible if this solution also satisfies the rate constraints R k (p k, c k ) α k r. By taking equality in the above expressions we obtain k K λ = a ν k ( ) [ ], (29) t(c) + t(c) k K a a k 2 c 2 (t(c)+ k Ka a k) 2 µ = t(c)c k K a ν k ]. (30) ( ) 2 t(c) + t(c) k K a a k [ 2 c 2 (t(c)+ k Ka a k) 2 From the derivatives of the Lagrangian and using the foregoing expressions we obtain R k (p k, c k ) = ( ) 2 log pk c k ν k 2 = ( ) a k µ 2 log ak p k c k νk 2 2 ν k a 2 k µ = [ ] 2 log νk 2 2 a 2 k (λ2 µ 2 ) = { [ 2 log t(c) t(c) ( 2 + ) ]} ν c 2 k k K + 2 + log a a k k K a a k k K a a 2. (3) k a k k K a ν k That is, the point that satisfies the interference power and impropriety constraints with equality provides the SUs with the rate given by (3). As mentioned before, P l is then feasible if there exist ν k, k K a, such that R k (p k, c k ) α k r, which implies ν k k K a ν k { + t(c) k Ka a k 2 αkr a k [ ]} /2, k K a. (32) t(c) k Ka ( a c2 ) + 2 a k k Ka k

6 The left-hand side of this expression is equal to or smaller than one, hence this condition is equivalent to 2 log 2 { + t(c) k K a a k [ t(c) ( ) ]} c 2 + 2 α k r + log k K a a 2 k a k k K a a k, k K a. (33) Notice that the above expression can be interpreted in a very insightful way. Its left-hand side is the rate of an equivalent user whose interference channel coefficient is the sum of the interference channels of all users, transmitting with a circularity coefficient c and causing interference power t(c). This single-user representation of the secondary MAC is illustrated in Fig. 4a. Therefore, r can be maximized by choosing the value of c that maximizes the left-hand side of (33). Before going any further, we first show that the transmit powers and circularity coefficients leading to (33) (for feasible r) are valid as they are non-negative. To this end, we combine (25) (30) and obtain where ν k = ( t(c) + k K a a k ) p k = ν k, (34) a k ν k c k = ( t(c)c ), (35) t(c) + k K a a k ak ν k ν k. The transmit powers and circularity coefficients are non-negative if k Ka ν k ν k a k t(c) + k K a a k. (36) Combining the above expression with (32), it can easily be seen that this is always the case. Since the foregoing analysis transforms the scenario into an equivalent single-user model, we can use our previous results for the single-su case [4] to obtain the following main result. Theorem 2. The boundary point characterized by R k = α k r, k =,..., K, with r being the optimal solution of P, requires improper signaling if and only if k K a a k k K\K a a k P k + β, (37) where K and K a are the set of users for which α k > 0 and log 2 ( + P k ) > α k r, respectively, and β = p 2 2 R. (38) Proof: The result follows directly from (33) and Theorem in [4].

7 s {p} k Ka a k { k K\Ka n a kp k, 0} I + n {} y s {p} { k K\K a a kp k, a k K a k k K\K a a k p k c k k K\K a a k p k } n I + n {} y s eq { } t(c) k Ka a, c k + y eq s eq { } t(c) k K a a, c k + y eq n eq {} n eq {} (a) (b) Fig. 4: Equivalent single-user canonical model of the secondary MAC. There are two possible situations depending on c: (a) every user in K a fulfills c k < and p k < P k, or (b) one of these constraints is active for some users. Corollary. If the power budget is sufficiently high, the boundary point characterized by R k = α k r requires improper signaling if and only if a k β. (39) k K Theorem 2 provides a necessary and sufficient condition when improper signaling is required to achieve a given boundary point of the rate region. In order to obtain the optimal transmission parameters that achieve that point, we have to analyze how the rate of the SUs change as c, which is the circularity coefficient of the aggregate interference, increases. For the single-user case we state in [4] that, if improper signaling is optimal, the rate increases monotonically with the circularity coefficient as long as the allowable transmit power is below the power budget. In our present scenario, there are multiple users each with their own power budget constraint and circularity coefficient. Therefore, as c increases, we might reach a point where p k = P k or c k =, for some k K a. In such a case, the behavior of the SU rates as c increases beyond that point is no longer given by (3), since that expression is obtained assuming p k < P k and c k <. Let c = c be the minimum value of c such that there is one user k for which either

8 p k = P k or c k =. Since the rate of this user must be at least α k r, the other parameter is therefore given through R k (P k, c k ) = α k r or R k (p k, ) = α k r, depending on the active constraint. In turn, the parameters of this user are known and the feasibility problem P l must be solved for k K a \{k }. Therefore, we can regard the scenario in this case as one with users k K a \{k } and a PU affected by an improper noise (due to user k ). This equivalent single-user representation is depicted in Fig.??, where K a = K a \{k }. Notice that this does not change our analysis of P l in (22) (33) (with the exception of K a being replaced by K a \{k }). However, the dependency of the tolerated interference power t(c) on its circularity coefficient c is now different. Nevertheless, this equivalent scenario follows the model considered in Section III, thus we can now apply those results to derive the optimal circularity coefficient c of the equivalent user, and, consequently, the optimal transmission parameters of the SUs. In order to identify the value of c, c, such that one user reaches its power budget or its circularity coefficient goes to, we take equality in (32) and plug it in (34) and (35) yielding ( ) { [ p k = 2 α kr t(c) t(c) t(c) ( + + ) /2 c 2 + 2]}, (40) k K a a k k K a a k c k = { 2 αkr t(c)c + t(c) k Ka a k k K a a k 2 ( α kr t(c) + ) { k K a a k + t(c) k Ka a k By looking into these expressions we notice the following. Let [ k p = arg min k t(c) ]} /2 k Ka ( a c2 ) + 2 k [ ]} /2. (4) t(c) k Ka ( a c2 ) + 2 k P k 2 α kr, (42) k c = arg min α k, (43) k c p = arg min {p kp = P kp }, (44) c c c = arg min {c kc = }, (45) c with p k and c k respectively given by (40) and (4). Then the SU rates are given by (3) for 0 c c = min(c p, c c ). As mentioned before, when c increases beyond that point, user k p or k c has known parameters. Denoting this user as k, the optimization is carried out for users k K a \{k }, and expression (3) is valid by replacing K a with K a \{k }. Since now the PU is affected by improper noise in the equivalent single-user representation (due to user k having fixed and known parameters, as depicted Fig.??), the dependency of t(c) on c has the properties

9 described in Section III. However, the updated version of (3) will only be valid as long as the remaining users in set K a \{k } have a transmit power smaller than their power budget and circularity coefficients smaller than one. Hence, if the SU rates still increase beyond that point, we go back again to identifying the value of c at which the next user reaches one of these bounds (if there is such a user) and the aforementioned procedure is repeated again until the optimal value of c is identified. We describe this procedure in detail in Algorithm. The whole procedure to solve the initial problem P is the following: The maximum value of r is found via bisection method. For each step of the bisection method, P l is solved by Algorithm. Upon convergence, the solution of P l is unique and provides the optimal transmission parameters that attain the point of the rate region boundary. V. NUMERICAL EXAMPLES In this section we present simulation examples to illustrate the performance improvements achieved by improper Gaussian signaling over its proper counterpart. We start by considering K = 2 SUs, so that the achievable rate region for the secondary network can easily be depicted in a figure. We set P = P 2 = p = 00, σ 2 =, and R as 80% of the PU capacity. First, we consider a scenario with channels ] 2.6366 j0.3382 2.8824 j0.728 [h h 2 =, (46).4428 + j.086.7887 + j2.0730 h 0.885 + j0.472 g = 0.0533 + j0.227, g = 0.0533 + j0.227. (47) 0.222 + j0.99 0.222 + j0.99 g 2 These channel coefficients yield R = 5.33 b/s/hz and β = 0.94. The interference channel coefficients of the canonical model associated to this scenario are a = 0.52 and a 2 = 0.89 when user 2 is decoded first; and a = 0.788 and a 2 = 0.592 otherwise. In both cases we have a + a 2 > β. According to Theorem 2, improper signaling is optimal for 0 < α < for both user orderings, whereas proper signaling is optimal for the extreme points α = 0 and α = (as both a and a 2 are smaller than β). The boundary of the rate regions for the optimal strategy that permits improper signaling (obtained by Algorithm and bisection method for r) is depicted in Fig. 5, along with that achieved by proper signaling. We also depict the

20 Set p k = 0 and c k = 0 for those users with α k = 0, and p k = P k and c k = 0 for those users for which log 2 ( + P k ) = α k r. Set K a as those users satisfying α k > 0 and log 2 ( + P k ) > α k r, and define K as the set of users with α k > 0. Set K a = K a, c I = 0, p I = k K\K a a k P k and status=feasible if log 2 ( + P k ) α k r for all k, otherwise set status=infeasible. while K a and status=feasible do Use Theorem to obtain a candidate circularity coefficient as c s, by replacing c s, a s and q(c s ) with c, k K a a k and t(c) k Ka a k, respectively, and taking P s =. Obtain c p and c c by means of (42) (45), and set c = min(c p, c c ). if c s c then else Set c = c s and K n =. Set k = k p if c p < c c and k = k c otherwise, and c = c. Set K n = K a\{k }, c I = p Ic I +a k p k c k p I +a k p k and p I = p I + p k, with p k and c k given by (40) and (4), respectively. end if Take equality in (32) to obtain ν k = if k K a ν k then Update K a = and status=feasible. else if ν k and K n then else Set K a = K n. Set K a = and status=infeasible. end if end while if status=feasible then else ν k k K a ν k, for k K a. Obtain feasible point p k and c k by (40) and (4), respectively, k. Return status=feasible, p k, and c k, k. Return status=infeasible. end if Algorithm : Algorithm to solve P l.

2.5 R2 [b/s/hz] 0.5 Improper signaling Proper signaling Improper signaling (time sharing) Proper signaling (time sharing) 0 0 0.2 0.4 0.6 0.8.2.4.6.8 2 R [b/s/hz] Fig. 5: Rate region boundaries. We consider a < β, a 2 < β and a + a 2 > β for both user orderings. We also depict the boundaries when time sharing is allowed. circularity coefficient of the interference (c) 0.8 0.6 0.4 0.2 User 2 is decoded first User is decoded first 0 0 0.2 0.4 0.6 0.8.2.4.6.8 2 R [b/s/hz] Fig. 6: Optimal interference circularity coefficient for the rate region boundaries in Fig. 5.

22.5 Improper signaling Proper signaling Improper signaling (time sharing) Proper signaling (time sharing) R2 [b/s/hz] 0.5 0 0 0.2 0.4 0.6 0.8.2.4 R [b/s/hz] Fig. 7: Rate region boundaries. We consider a > β and a 2 > β for both user orderings. We also depict the boundaries when time sharing is allowed. rate region boundaries achieved by time sharing, which results in the convex hull of the rate regions corresponding to each user ordering. As expected, the boundaries achieved by proper and improper signaling overlap at the extreme points. However, the rate region achieved by improper signaling is significantly larger than that obtained by proper signaling for both user orderings, which is especially noticeable for intermediate values of R. As can also be observed, time sharing keeps the gap between both signaling schemes almost unchanged. Figure 6 shows the optimal circularity coefficient of the aggregate interference, c, that achieves the optimal rate region boundary. We observe that these intermediate R values, for which the improper signaling rate region is significantly larger than the proper one, correspond to maximally improper signaling, i.e., c = and c 2 =.

23 5 4 R2 [b/s/hz] 3 2 Improper signaling Proper signaling Improper signaling (time sharing) Proper signaling (time sharing) 0 0 0. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9..2 R [b/s/hz] Fig. 8: Rate region boundaries. We consider a > β and a 2 β for both user orderings. We also depict the boundaries when time sharing is allowed. For the second scenario we consider the channel coefficients ] 0.599 j0.982.0563 + j0.8070 [h h 2 =, (48) 0.572 + j0.4742.759 + j0.9756 h 0.9445 + j0.3284 g = 0.2908 + j0.358, g = 0.3209 j0.0052, (49) 0.427 j0.3326 0.3279 + j0.532 g 2 which also yield R = 5.33 b/s/hz and β = 0.94. The interference channel coefficients in the canonical model are now a =.03 and a 2 =.3 when the second user is decoded first; and a =.829 and a 2 = 0.995 otherwise. As a and a 2 are both greater than β, improper signaling is optimal on the whole rate region boundary. This is observed in Fig. 7. Again, we notice that the rate improvements are more prominent for intermediate rates than at the extreme points. As an example, let us consider the region obtained when the second user is decoded first (depicted in black). While the second user can achieve a rate around 7% higher compared to proper signaling

24 for R = 0, the rate improvement is approximately 40% for R = 0.8 b/s/hz. In this example, all boundary points are achieved by maximally improper signaling, i.e., c = c 2 =. As a final example for the 2-user case, we consider the channels ] 2.257 j3.0397 0.4956 + j0.9835 [h h 2 =, (50) 0.540 j0.9356 2.329 j0.6720 h 0.8292 + j0.5589 g = 0.0869 + j0.3653, g =.379 + j0.737. (5) 0.229 j0.220 0.030 + j0.0900 g 2 For these coefficients we have again R = 5.33 b/s/hz and β = 0.94. In the canonical model, the interference channel coefficients are a =.4 and a 2 = 0.09 when the second user is decoded first; and a =.684 and a 2 = 0.028 otherwise. The achievable rate region boundaries are depicted in Fig. 8. Since a 2 is very small for both user orderings, the second user can transmit a proper signal with maximum power in a large portion of the boundary, from R = 0 until approximately R = 0.5 b/s/hz. In that case, the optimality condition for improper signaling is not met, and the optimal strategy of the first user is also proper signaling. Nevertheless, the rate of user 2 eventually falls below its maximum value, and improper signaling again starts to provide significant gains in terms of achievable rate. Indeed, even though a 2 β, the rate of user 2 can be substantially enlarged by improper signaling. For example, when user 2 is decoded first and for R = b/s/hz, user 2 can achieve a rate approximately 55% higher compared to proper signaling. In the next scenario we consider K = 4 and N = 4. We consider an arbitrary point of the rate region boundary specified by α = [0.27, 0.3, 0.09, 0.5], and depict in Fig. 9 the average sum-rate r obtained after 000 Monte Carlo simulations as a function of P = P 2 = = P K = P SU. Each channel coefficient has been independently drawn from a proper complex Gaussian distribution with zero mean and unit variance. Additionally, we have considered a fixed user ordering. For each channel realization, the PU rate constraint has been set as 60% of its capacity in the absence of interference. We observe in Fig. 9 that the improvement between improper and proper signaling in terms of sum-rate grows with the power budget. This behavior is intuitively clear: as improper signaling permits increasing the transmit power, the increase will be larger the higher the available transmit power is. However, the performance is eventually limited by

25 average sum-rate (r ) [b/s/hz] 0.8 0.6 0.4 0.2 Improper signaling Proper signaling 0 5 0 5 20 25 30 P SU [db] Fig. 9: Average sum-rate at an arbitrary point of the rate region boundary as a function of the SU power budget. interference, thus the rate saturates as seen in Fig. 9. At the saturation point, we observe that improper signaling achieves almost three times as much sum-rate as proper signaling. As a final example, we evaluate the average sum-rate as the number of users K grows, with N = K. Each channel coefficient follows a proper complex Gaussian distribution with zero mean and unit variance, except for the PU-SU channel g, which is set to zero. We consider the point on the rate region boundary characterized by α k =, k. This is the fairness point K as each SU attains the same rate. The results are depicted in Fig. 0, where both the average sum-rate and average rate per user are depicted. As observed, the gap in the sum-rate between proper and improper signaling grows with the number of users. This is not only due to the fact that the single-user gap is scaled by a factor of K, but also because the rate per SU presents an increasing gap between improper and proper signaling, as it is also shown in Fig. 0. This result indicates that improper signaling becomes more profitable as the number of users increases, showing its suitability for multiuser interference networks.

26 average sum-rate (r ) [b/s/hz] 5 0 5 Improper signaling Proper signalig 2.5 2.5 average rate per SU [b/s/hz] 0 2 3 4 5 6 7 8 9 0 number of users (K) Fig. 0: Average sum-rate at the fairness point of the rate region boundary as a function of the number of users, with N = K. VI. CONCLUSIONS In this paper we have analyzed improper Gaussian signaling for an underlay MAC, which shares the spectrum with a PU. Firstly, we have derived a necessary and sufficient condition for improper signaling to be optimal. Secondly, we have presented an efficient algorithm to compute every point of the boundary of the rate region. Several numerical examples have shown that improper signaling can achieve significantly higher rates than proper signaling, especially as the number of users increases. Our results provide performance limits of an underlay MAC and can be used as design guidelines when only partial CSI is available, and also outside the cognitive radio context if the point-to-point user is restricted to proper signaling due to lack of CSI or because it is a legacy user. ACKNOWLEDGMENTS The work of C. Lameiro and P. J. Schreier was supported by the German Research Foundation (DFG) under grants SCHR 384/6- and LA 407/-. The work of I. Santamaría was supported by the Ministerio de Economía y Competitividad (MINECO) and AEI/FEDER funds of the UE,

27 Spain, under projects RACHEL (TEC203-474-C4-3-R) and CARMEN (TEC206-75067-C4-4-R). APPENDIX A PROOF OF LEMMA We start presenting the following auxiliary lemma, that will be used in the proof. Lemma 2. R s (c s ) is non-decreasing at c s if and only if ( a s q(c s )c s p ) I + β + p I c I [ + q(c s )] 0. (52) a s Proof: Let us rewrite (8) as 2 2Rs(cs) = p s (c s ) 2 ( c 2 s) + 2p s (c s ). (53) Taking p s (c s ) = q(c s ), (3) holds with equality. Therefore, we can replace p s (c s ) 2 ( c 2 s) in the foregoing equation by p s (c s ) 2 ( c 2 s) = a 2 s ( β)[p + 2( + a s q(c s ) + p I )] 2(a s q(c s ) + p I ) p 2 I( c 2 I) which yields 2a s q(c s )p I ( c s c I ), (54) 2 2Rs(cs) = a 2 s { ( β)[p + 2( + as q(c s ) + p I )] 2(a s q(c s ) + p I ) p 2 I( c 2 I) 2q(c s )p I ( c s c I )} + 2q(c s ). (55) To evaluate whether or not R s (c s ) is increasing, we can alternatively consider 2 2Rs(cs). Taking this into account we obtain R s (c s ) c s 0 q(c s) c s [ p ] I( c s c I ) + β + q(c s)p I c I 0. (56) a s a s To obtain the derivative of q(c s ), we make use of (3). Replacing p s (c s ) with q(c s ), (3) holds with equality. We can then take the derivative of both sides of the equality with respect to c s, which yields, after some manipulations, q(c s ) c s = q(c s )[a s q(c s )c s + p I c I ] a s q(c s )( c 2 s) + p I ( c s c I ) + β. (57)

28 Combining (57) and (56), we obtain, after some manipulations, ( R s (c s ) 0 a s q(c s )c s p ) I + β + p I c I [ + q(c s )] 0. (58) c s a To prove Lemma we have to show that (52) is only satisfied for 0 c s c R and some c R. First, by Lemma 2, the derivative is positive at c s = 0 if R s (c s ) c s > 0 p I c I [ + q(0)] > 0, (59) cs=0 which always holds since q(0) 0, p I > 0 and c I > 0. To see what happens as c s increases, we may consider two cases. When ps+β a s 0, (52) is satisfied for 0 c s, since all the involved quantities are non-negative. Therefore, in this case, R s (c s ) is increasing for all values of c s. Now let p I+β a s < 0. Let us also rewrite (52) as ( [c s p ) I + β a s R s (c s ) c s 0 a s q(c s ) + p ] Ic I + p I c I 0. (60) a s As ps+β a s < 0, the term that multiplies q(c s ) in the above expression decreases with c s. It ( ) ] may then happen that this term becomes negative, in which case a s q(c s ) [c s p I+β a s + p Ic I a s becomes a negative and decreasing function (because q(c s ) is increasing in c s as observed in (57)). Therefore, there may exist c R such that (60) holds with equality for c s = c R, in which case (60) will not hold for c s > c R. This concludes the proof. APPENDIX B PROOF OF THEOREM Let us start with the first circularity coefficient, c B, associated with the power budget constraint. If c 0 is such that q(c 0 ) = P s, then the transmit power of the SU is p s (c s ) = P s for c s c 0. Therefore, its achievable rate is decreasing in that interval as can be seen from (8), and hence the optimal circularity coefficient c s cannot be greater than c 0. Since it may happen that such a c 0 does not exist, i.e., q(c s ) < P s or q(c s ) > P s can be fulfilled for 0 c s, we obtain c s c B. Let us now consider the second circularity coefficient, c R, which is related to the PU rate constraint. Since c B considers the power budget constraint, we drop this constraint at this point to obtain c R. By Lemma we know that, when p(c s ) = q(c s ), R s (c s ) achieves its maximum at the maximum value of c s for which Rs(cs) c s 0. Thus, c s = is optimal if the