Noncooperative Spectrum Sensing Strategy Based on Recurrence Quantification Analysis in the Context of the Cognitive Radio

: This paper addresses the problem of noncooperative spectrum sensing in very low signal-to-noise ratio (SNR) conditions. In our approach, detecting an unoccupied bandwidth consists of detecting the presence or absence of a communication signal on this bandwidth. Digital communication signals may contain hidden periodicities, so we use Recurrence Quantification Analysis (RQA) to reveal the hidden periodicities. RQA is very sensitive and offers reliable estimation of the phase space dimension m or the time delay τ . In view of the limitations of the algorithms proposed in the literature, we have proposed a new algorithm to simultaneously estimate the optimal values of m and τ . The new proposed optimal values allow the state reconstruction of the observed signal and then the estimation of the distance matrix. This distance matrix has particular properties that we have exploited to propose a Recurrence-Analysis-based Detector (RAD). The RAD can detect a communication signal in a very low SNR condition. Using Receiver Operating Characteristic curves, our experimental results corroborate the robustness of our proposed algorithm compared with classic widely used algorithms.


Introduction
The need to make better use of the radio spectrum is leading to the development of new spectrum access strategies.Among these strategies, the opportunistic spectrum access based on the cognitive radio concepts allows the sharing of a spectral bandwidth between two categories of users: Primary User "PU" and Secondary User "SU".The PU holds the license to exploit the bandwidth, and the SU is an opportunistic user willing to use the channel when the PU is idle.One of the most crucial challenges for the SU is the identification of a free bandwidth by conducting a spectrum sensing [1,2].Many reliable spectrum sensing methods have been developed to help the SU limit their interference to the PU's transmission [3][4][5][6][7][8][9][10][11].Among the spectrum sensing approaches, we can mention Waveform Detection (WFD) [12], Cyclostationary-Features-based Detection (CFD) [13], and Energy-based Detection (ED) [14,15].One of the most reliable methods, WFD, requires prior knowledge of the PU's signal characteristics.Based on the cyclic spectrum estimation, the CFD requires a relatively high computational cost for a high-frequency resolution.ED is the simplest detection method, but it is unable to distinguish a communication signal from an energetic noise when the noise is not a weak-sense stationary stochastic process or the signal-to-noise ratio (SNR) is very low.Recently, spectrum sensing algorithms, based on the promising concept of machine or deep learning, have been proposed [16][17][18][19].However, these algorithms do not perform well in a noncooperative context or at a low SNR (SNR ≤ −3 dB) and require a huge database to be optimized.To overcome these issues, we developed a blind strategy based on the Recurrence Quantification Analysis (RQA) of the received signal [20].RQA is a nonlinear data analysis technique applied to various fields to study the dynamics of complex systems.It is particularly useful for analyzing time series data that exhibit nonlinear, nonstationary, or chaotic behavior.It is widely introduced in the financial sector, particularly in the analysis of cryptocurrencies like Bitcoin [21].In the field of cardiology, RQA has been also employed to understand the nonlinear dynamics of heart rate variability after acutely induced myocardial ischemia by percutaneous transluminal coronary angioplasty [22].RQA is a versatile tool that has been applied to a wide range of applications, from financial markets and cardiology to atmospheric science, urban management, and neurocognitive research.Its ability to reveal important properties of time series data, such as determinism, laminarity, stability, randomness, regularity, and complexity, makes it a valuable technique for analyzing the dynamics of complex systems across various domains [21][22][23][24][25]. In this paper, we propose to use RQA in digital communications, because it is able to reveal some intrinsic features of digital communication signals, such as hidden periodicities, stationarity features, or linearity properties.Indeed, due to modulation standards, transmitted signals may contain hidden periodicities.Using this fact, we use Recurrence Quantification Analysis (RQA) tools to detect if the bandwidth allocated to the PU is available or not.The main RQA tool used to quantify the recurrence level is the Recurrence Rate (RR), which is considered the probability of having recurring states in a signal.In a recent work, we proposed an RRbased Detector (RRD) [20].However, the RRD is very sensitive to SNRs and depends on the choice of a recurrence threshold.To overcome the RRD's limits, in this paper, we propose an efficient algorithm called the Recurrence-Analysis-based Detector (RAD).The RAD exploits the similitude of distances among various states of the signal in a multidimensional space.This similitude of distances is evaluated by a square symmetrical matrix named the distance matrix.Using symmetrical properties, we only exploit the upper triangular part of this matrix in order to considerably reduce the computational cost of the RAD.Then, we show that for a White Gaussian Noise (WGN), the coefficients of the first top diagonal of the distance matrix become a representative sample of all other coefficients.This is not the case for a communication signal even with a small SNR.This new approach can detect a communication signal in a very low SNR.We have analytically established the probabilities of detection P d and false alarm P f a .Through Monte Carlo simulations, we studied the Receiver Operating Characteristic (ROC) curves of the RAD.The theoretical and experimental results show the ability of the RAD to detect the presence of a communication signal as soon as the SNR is greater than −12 dB with a very low probability of a false alarm.
The rest of this paper is organized as follows: Section 2 presents the problem of spectrum sensing and our motivation for RQA.Section 3 deals with the concepts of RQA and the state of the art in the determination of embedding parameters in order to exhibit the hidden recurrences.Sections 4 and 5 present the Recurrence-Analysis-based detector model and its theoretical and experimental performance.The last section contains the conclusion and perspectives.

Spectrum Sensing Problem
The radio spectrum is a limited natural resource.Many techniques, such as cooperative communication systems and heterogeneous networks, have been developed to deal with this scarcity of the radio spectrum [26].However, none of them can meet the strong demand for radio spectrum.The cognitive radio introduced by Mitola [27,28] is a promising solution allowing dynamic access to the radio spectrum [1].Dynamic spectrum access (DSA) is defined as a technique by which the operating spectrum of a radio network can be selected dynamically from the available spectrum [26].The DSA allows the SU to exploit the holes in the spectrum dedicated to the PU.The great challenge of DSA for the SU remains the spectrum sensing stage, during which the SU should detect the presence of the PU on a given bandwidth.

Spectrum Sensing as a Statistical Decision
The PU's signal detection by the SU can be modeled as a binary hypothesis testing problem, given as [26]: • Hypothesis H 0 : PU's signal is absent • Hypothesis H 1 : PU's signal is present Let y(n) be the signal observed by the Secondary User (SU): where h is the channel gain and b(n) is the channel noise.The noise samples b k are assumed to be independent and identically distributed ( denotes the mathematical expectation.The Test Statistic T should be compared with a predetermined threshold λ for decision making.In this case, the probability of false alarm P f a and the probability (Pr) of detection P d [29] are defined as follows: where ≜ stands for equal by definition.
For good performance, P d should be increased as much as possible while keeping P f a under a small preselected value.In the noncooperative spectrum sensing context, the detection algorithms should be able to find out intrinsic features of the communication signal to enhance a spectrum sensing task.One of the main features can be the recurrence of internal states in the communication signals.Hereinafter, we develop a robust algorithm based on RQA.

RQA Benefits
The RQA enjoys several specific properties: RQA is based on the chaos theory and is normally used to extract the hidden recurring states of a dynamic system.The various parts of a transmission chain, such as modulation, filtering, coding, multiplexing, etc, generate hidden recurring states in the communication signals.Therefore, RQA can help detect the presence of the PU's signal on a desired bandwidth.

2.
In a previous work [20], we showed that RQA is a promising tool for the spectrum sensing task.Indeed, in a noncooperative context, we proposed the Recurrence-Ratebased detection model (RRD), and this previous algorithm was able to detect the presence of the PU's signals with SNR ≥ −5 dB.

3.
During the detection procedure, a spectrum sensing algorithm based on RQA does not require the estimation of the noise variance, as required by some spectrum sensing algorithms such as ED, which is a great advantage.4.
RQA can help detect a communication signal in a very low SNR; and contrary to ED, Recurrence Analysis can distinguish a noisy communication signal from a high energy noise.5.
RQA does not have a high computational cost like CFD.In noncooperative spectrum sensing, RQA is more robust compared with the widely used ED or CFD.

Recurrence Quantification Analysis
Recurrence is a fundamental feature of dynamic systems that can be exploited to study the behavior of these systems and to discover their intrinsic properties [20,30,31].To analyze hidden recurrences in dynamic and nonlinear systems, an important concept in the chaos theory, in which RQA can be used [32][33][34][35].During the evolution of a dynamic system, some internal states can be quasi-periodically repeated.In the phase space, the successive states of a dynamic system form trajectories that characterize the temporal evolution of the system.Knowing the temporal evolution equation, any state of the system can be precisely determined at any time.Unfortunately in real-world situations, this equation is unknown; instead, we dispose only of a sequence of scalar measurements as time series [36,37].From these time series, we should reconstruct the phase space.The gold standard method for the phase space reconstruction is delay-coordinate embedding [36].The objective of a delay-coordinate embedding method is to use the delayed versions of y(n) to form a multidimensional observable x k called state vector or state of y(n).The state vector x k at moment k is defined as follows: where y k denotes the sample of y at the moment k, τ is the time delay, and m is the embedding dimension.The main challenge for the delay-coordinate embedding method is the reliable estimation of τ and m.Theoretically, the time delay τ can be almost arbitrarily chosen if the observation y(n) is noise-free with an infinite number of samples.However, these conditions cannot be satisfied in real applications because of noise which can generate statistical dependence among the state vectors x k .Therefore, the time delay τ has to be wisely chosen in order to reduce this statistical dependence [20,36,38].To determine the optimal time delay τ 0 , one can use the autocorrelation function, Average Mutual Information (AMI), or phase portrait approach.The most appropriate method is the AMI because it measures the general dependence between two random variables [39].Therefore, it could provide a better criterion for the optimal time delay τ 0 .The concept of AMI consists, first of all, in estimating the mutual information I(τ) between y(n) and its delay version y(n − τ) by varying the value of τ from 0 to N; N denotes the number of samples contained in y(n).After that, the optimal τ 0 is chosen as the first τ value that minimizes I(τ) [20,40,41].Based on Equation (1), we can conclude that I(τ), and indirectly τ 0 , depends on three parameters: the SNR value, the sampling rate, and the modulation scheme.Consequently, using the AMI method to determine τ 0 is not so suitable in the context of a noncooperative spectrum sensing algorithm.

Phase Space Dimension
The optimal embedding dimension m 0 for an observed signal y(n) is the minimum dimension for the state vectors x k to give a reliable reconstruction of y(n) phase space [35,37].From the literature, many approaches to estimate m 0 have been developed [38,42,43].The most used approach is based on the False Nearest Neighbors (FNNs) method [43].According to the principle of FNNs, any two true neighboring points in the m − dimensional reconstructed phase space must remain neighbors in the (m + 1) − dimensional reconstructed phase space.Otherwise, they are called false neighbors.A perfect embedding means all neighboring points should be true neighbors [20,42,43].Inspired by the FNNbased algorithm proposed in [42], we identify m 0 by using the distance ratio, a(i, m), defined as follows [42]: where are the state vectors from the m − dimensional phase space; and ∥.∥ ∞ is L − in f inity norm.The major drawback of using the distance ratio a(k, m) is its sensitivity to the reference state vector x k .To overcome this drawback, we consider the average value ā(m, τ) instead of a(k, m): To investigate the dependence of ā(m, τ) on m, the coefficient of proximity r(m, τ) is defined as follows: When m becomes greater than a limit value m lim , the proximity coefficient r(m, τ) converges to one.Hence, m 0 = m lim + 1 becomes the minimum embedding dimension [42].Based on Equation ( 7), we can observe that r(m, τ) depends on the time delay value τ.This assertion is corroborated by simulation results.Figure 1 illustrates, for example, the evolution of r(m, τ) for two extreme values of τ; for τ = 2, the optimal value of m 0 = 6; whereas for τ = 100, we obtain m 0 = 9.As m depends on the choice of τ, we propose hereinafter an optimization strategy to find simultaneously the optimal values of m and τ.
So we define the cost function f (m, τ): The optimal values m 0 and τ 0 become Numerical results show that values of (m 0 , τ 0 ) obtained from (10) become independent from modulation schemes, SNR, and the number of samples per symbol N s .Figure 2 illustrates the cost function f(m, τ) with respect to (m, τ) for a noisy 16-QAM signal.We can notice that The number K of state vectors is given by Based on Takens' theorem (in Taken's theorem, the phase space of a system can be reliably reconstructed if and only if m ≥ 2D + 1, where D ≥ 1 is the dimension of the system attractor [36,44]) and the minimum number K min of state vectors for reliable detection, we conclude that m 0 and τ 0 should be chosen in the following ranges: However, we notice that in practice K min ≪ N. Consequently, we can The recurring states in the phase space can be highlighted by the Recurrence Plot.The flat area of the curve f(m, τ) corresponds to a set of optimal values of (m, τ).Consequently, the optimal values (m 0 , τ 0 ) of (m, τ) should be chosen as follows (m 0 , τ 0 )

Recurrence Plot
The Recurrence Plot (RP) illustrates recurrences contained in a signal.The RP is based on the recurrence matrix R (ε,m) i,j [30,36]: where i, j ∈ {1, the RP presents some intrinsic patterns of the system.For example, Figures 3-5 represent, respectively, the RP of 16-QAM signal, GMSK signal, and a random zero mean White Gaussian Noise (WGN) with a variance σ 2 b .We can notice that the patterns in the RP of the 16-QAM signal are different from those of the GMSK signal, whereas the RP of the WGN has no particular pattern.Heuristically, we can set the recurrence threshold as ε = 0.5σ y where σ 2 y denotes the variance of the observed signal y(n); the embedding parameters are established as m = 16 and τ = 6.

Recurrence Plot
State Vectors X i As the visual analysis of RP is not objective, Zbilut and Webber introduced a procedure to quantify RP structures [45,46].In the literature, one has five classical tools to perform the RQA.Some RQA tools are based on the recurrence density, while others use the line structures of the RP [36].The classical RQA tools are developed and extended in [30,36].The main challenge with classical or extended RQA tools is the choice of an optimal recurrence threshold ε of Equation (15).A small value of ε does not reveal noticeable occurrences, while a large value of ε may lead to the appearance of neighbors for most of the existing points and cause false occurrences [30,47].The choice of ε is a delicate issue affecting the reliability of the spectrum sensing based on classical or extended RQA tools [20].To overcome this issue, we propose in the following sections a new algorithm called the Recurrence-Analysis-based Detector (RAD), which only exploits the distance matrix.This distance matrix does not depend on the recurrence threshold ε and nor does the proposed detection model RAD.

Recurrence-Analysis-Based Detector
The Recurrence Rate (RR) is an essential tool of RQA.Our previous works based on the RQA detection model [20] show that an RR-based detection model (RRD) suffers from major shortcomings, as follows: 1.
It cannot detect the presence of a communication signal when SNR ≤ −5 dB.

2.
It is very sensitive to the recurrence threshold ε.

3.
The computational cost is relatively high 4.
The performance of an RRD is sensitive to the types of modulations of a communication signal.
To overcome the above limitations, we develop hereinafter a new detection model, the Recurrence Analysis Detection model (RAD), which is able to operate in very low SNR conditions.In order to reduce drastically the computational cost and avoid the delicate issue of the recurrence threshold ε, the RAD only uses the distances d ij = x i − x j 2 of the upper triangular part of the distance matrix.

Detection Model
Usually, the RQA is performed on the entire distance matrix D = (d ij ) 1≤i,j≤K of different state vectors.As D is a symmetrical matrix, in order to reduce the computational cost, we use the upper triangular part of D, without the main diagonal defined by its general coefficients: We denote by u d the coefficients of the first upper diagonal of D and by u ∆ the other coefficients of the upper triangular part of D, without the main diagonal.u d and u ∆ verify two great properties: 1.
For a WGN, u d and u ∆ have the same Probability Density Function (PDF), which is not the case for a noisy communication signal.Hence, to detect the presence of a communication signal, we check if u d is representative of u ∆ .For this purpose, we use a statistical test of conformity to evaluate this representativeness [48].

2.
The u d of a WGN or a communication signal has the same PDF.This remark allows us to design a detector free of noise variance estimation.
To provide a better understanding of this notion of representativeness, we present the histogram of the u d and u ∆ of WGN and the communication signal, respectively, in Figures 6 and 7, and we define the confidence interval Φ ∆ as follows: where u ∆ is the average value of u ∆ and λ is the predetermined detection threshold for RAD.Further details about λ can be found in Section 4.2.4.
On the basis of the histogram of distance and by using Kolmogorov-Smirnov test [49], for a WGN only, we note that u d and u ∆ can be approximated by the same PDF (see Figure 6).Consequently, by using the statistical test of conformity based on the estimation average value, we show that u d is representative of u ∆ .Indeed, u d ∈ Φ ∆ ; u d denotes the average value of u d .Contrariwise, Figure 7 gives the histogram of distance for a communication signal buried in the WGN with an SNR= 0 dB; we can notice that u d / ∈ Φ ∆ , so u d is not representative of u ∆ .Using the statistical test of conformity, we propose the following test statistic T: In the course of our work, we establish the analytical expressions of the probability of detection P d and the probability of false alarm P f a in order to compare the theoretical and experimental results.

Analytical Expression of the Probability of False Alarm
The probability of a false alarm P f a can be expressed from the PDF of T under H 0 .In order to find this PDF, one should evaluate the PDF of u ∆ and u d ; see Equation (18).4.2.1.The PDF of u ∆ under Hypothesis H 0 Under H 0 , the average value u ∆ of u ∆ is defined as follows: where Based on the central limit theorem for independent random variables and for a large K, u ∆/H 0 is asymptotically normally distributed with mean u ∆/H 0 and variance σ 2 where To calculate µ ∆/H 0 and σ 2 ∆/H 0 , we can use the PDF f u ∆/H 0 (u) of u ∆/H 0 .An outcome u ∆/H 0 of u ∆/H 0 is given by → N (0, 1).
By setting Z = m−1 k=0 v 2 k , we can conclude that Z follows a Chi distribution χ(m) with m degrees of freedom [50,51]: The expectation value E[Z] and variance var[Z] of Z are given as follows [50,51]: where Γ(m) = +∞ 0 x m−1 e −x dx is the Gamma function.From Equation ( 24), we show that the PDF f u ∆/H 0 of u ∆/H 0 is defined as follows: [52]: The mean µ ∆/H 0 and variance σ 2 ∆/H 0 of X∆/H 0 can be determined by using Equation ( 24) as follows: Finally, we have 4.2.2.The PDF of u d under Hypothesis H 0 Under H 0 , the average value u d of u d is defined as follows: where u Because of the structure of the upper triangular distance matrix, the coefficients of the first top diagonal u (k) d/H 0 are strongly decorrelated.In addition, K d is a large number.Thus, we can approximate u d by a Gaussian variable by using the central limit theorem: Using a similar approach to the calculation of the expectation value µ ∆/H 0 and variance σ 2 ∆/H 0 of u ∆/H 0 , we obtain  20), ( 30), ( 31) and ( 33)-( 35) we end up with where Applying the random variable transformation theorem [52,53] on T from Equation ( 18), we end up with t ≥ 0:

Probability of False Alarm and Detection Threshold
Based on Equation ( 38), the P f a is expressed as follows: er f c(x) denotes the Complementary Error Function-the Complementary Error Function er f c(x) is defined as follows: -and the detection threshold λ is

Analytical Expression of the Probability of Detection
Taking into account the presence of the communication signal s(n) and keeping the same approach as under H 0 , we demonstrate that where We deduce the PDF of T under the hypothesis H 1 as follows: with t ≥ 0. µ 1 and σ 2 1 are given by Consequently, the Probability of Detection P d becomes

Simulations Results
To evaluate the efficiency and the robustness of the proposed detection method, we generate Receiver Operating Characteristic (ROC) curves using Monte Carlo simulations [54,55].The parameters defined in Table 1 are used with different kinds of communication signals, such as 64-QAM, 16-QAM, BPSK, and 4-ASK.In order to compare the theoretical and experimental performance of the RAD, we generated P d versus SNR performance curves.Figure 8 shows these performance curves.The theoretical curves were generated by Equation (50) and the experimental curves according to the Monte Carlo simulations.It can be clearly observed that the theoretical results match the simulated ones.From the theoretical and experimental curves, reliable detection is possible as soon as SNR ≥ −12 dB with P d ≥ 0.95 and P f a = 0.05.
The Receiver Operating Characteristic curves for different SNR values can be viewed in Figure 9. Here, the RAD is applied on a 16-QAM signal, and the observation time is 31.25 ms.For SNR = −14 dB and P f a = 0.1, the RAD detects the presence of a communication signal with P d = 0.76, but for SNR = −13 dB, P d = 0.9.The detector proves itself powerful as soon as the SNR ≥ −12 dB, since the detection probability P d = 0.95 with a very low value of P f a = 0.05; see Figure 9.
Another advantage of the proposed detector is its robustness against any type of classical modulations, such as QAM, PSK, and ASK; see Figure 10, where the ROC curves for 4-ASK, BPSK, and 64-QAM signal are almost identical.The performance of RAD increases with the number of samples N. Figure 11 depicts this performance evolution based on N in a Gaussian channel where SNR = − 12 dB.We notice that for P f a = 0.1, the RAD detects the communication signal with P d = 0.5 when N = 500 samples, with P d = 0.8 when N = 1000 samples, and with P d = 0.97 when N = 2000 samples.By comparing RAD with two other blind spectrum sensing algorithms, Energy Detection (ED) [56] and Cyclostationary Features Detector (CFD) [57,58], and according to the results presented in Figures 12 and 13, we notice the superiority of the RAD to ED and CFD in a Gaussian channel.For example, for the SNR = −12 dB and P f a = 0.05, the RAD detects the signal with P d = 0.95, whereas the probability of detection for the ED is only P d = 0.67 (see Figure 12).Figure 13 shows that the RAD is able to detect the communication signal in very weak low SNR conditions.For −12 dB ⩽ SNR ⩽ −10 dB, the RAD detects the presence of a communication signal with P d ⩾ 0.95 for P f a = 0.05.ED achieves RAD performance only when SNR ⩾ −10 dB, and CFD works correctly when SNR ⩾ −7 dB with P d ⩾ 0.97.After testing the performance of the detector in a Gaussian channel, we are now interested in the behavior of the RAD in a multipath channel.As a model, we use model D of the Rayleigh channel defined in [59] with the following parameters (Tables 2 and 3):

Complexity Analysis of Recurrence-Analysis-Based Detector
Theoretical and experimental analyses show the superiority of the RAD compared with the Energy Detector (ED) and the Cyclostationary Feature Detector (CFD) in a low SNR scenario detection process.The complexity of the algorithms is measured through the number of complex multiplications that the algorithms have to perform for the calculation of the test statistics [60].In this section, we provide the complexity analyses of the ED, CFD, and RAD.
The ED detection process is summarized in Figure 15.The complexity of the computation can be evaluated according to Equation (51).N multiplication operations are required to perform y 2 k .Consequently, the computation complexity C ED becomes [60] C ED = N (52)

Complexity Analysis of Cyclostationary-Feature-Based Detector
In a blind context, the CFD is based on the reliable estimation of the cyclic spectrum [13,61,62].The crest factor F c of the cyclic spectrum can be used as a decision statistic [13]: where α stands for the cyclic frequency and D(α) denotes the Cyclic Domain Profile (CDP).The computation of F c requires six steps [13].First, a Hamming sliding window w(n) is used to apodize the observed signal y(n).Then, we apply a first Fast Fourier Transform (FFT) and calculate the complex demodulates of the apodized signal.After that, we compute the spectral correlation of the different complex demodulates and apply a second FFT.At the end, we obtain the cyclic spectrum, and we compute the crest factor F c of the cyclic spectrum.
Let N be the number of samples contained in the observed signal y(n) and N p be the number of samples contained in each apodized block of y(n).L = N p 4 denotes the decimation factor, and P = N L is the number of apodized blocks from y(n).The apodization is carried out with a Hamming window [13,61,63].Figure 16 summarizes the essential steps of F c computation.The apodization equation is defined as follows: where w k denotes the Hamming window coefficients, y k is the samples of the observed signal y(n), and r k becomes the coefficients resulting from the apodization.The apodization step requires PN p multiplication operations.The second step in the CFD detection process is the first FFT applied on apodized blocks.The complexity of FFT computation is known as N p log 2 N p .Consequently, the P apodized blocks require PN p log 2 N p multiplication operations.The complex demodulates computation requires PN 2 p multiplication operations, and the step of complex demodulates multiplication requires P 2 N 2 p multiplication operations.The second FFT with P data points to obtain the estimation of cyclic spectrum requires N 2 p P log 2 P multiplication operation and the calculation of crest factor F c alone requires 2N + 1 multiplication operations.
Finally, the algorithmic complexity of CFD, C CFD , is

Algorithmic Complexity of Recurrence-Analysis-Based Detector
To make decisions, the RAD uses a statistic test defined in Equation (18).The RAD detection process is summarized in Figure 17.elementary operations.The statistic test of the RAD requires one addition operation.Consequently, the computation complexity C RAD of the RAD becomes C RAD = 2N 2 + 4N(τ − mτ − 1) + 2(mτ) 2 + 2τ 2 − 4mτ 2 − 4τ + 2mτ + 6 (56) From Equations ( 52), (55), and (56), in Figure 18, we generated the curves of the evolution of the algorithmic complexity of the ED, CFD, and RAD based on the number of samples contained in the observed signal y(n).The results in Figure 18 show that ED is the simplest algorithm, whereas CFD is the most complicated one.We also notice that the RAD algorithm is less complicated than the CFD algorithm.

Conclusions
This paper deals with the problem of noncooperative spectrum sensing in very low SNR conditions.Many algorithms have recently been developed to overcome the scarcity of radio spectrum.However, most of them suffer from noise uncertainty and do not work correctly in very low SNR conditions.In this paper, we use the promising approach of the Recurrence Quantification Analysis (RQA) to propose a robust detection model, named the Recurrence-Analysis-based Detector (RAD).The RAD benefits from the exploitation of the similitude among the different state vectors.Indeed, our analyses reveal that for a White Gaussian Noise, the coefficients contained on the first upper diagonal are representative of other coefficients of the distance matrix, which is not the case for a communication signal.Thus, by applying a conformity test between the coefficients of the first upper diagonal and other coefficients of the distance matrix, the presence or absence of a communication signal can be revealed.The RAD presents five major advantages: it is more robust than the Energy Detector (ED) and the Cyclostationary Feature Detector (CFD), which are widely used in the noncooperative spectrum sensing context; it does not suffer from noise variance estimation, because the estimation of the noise variance is not required during the spectrum sensing process; it is able to detect the communication signal in a very low SNR condition; contrary to the ED, the RAD is able to distinguish a noisy communication signal and a high energy noise; the RAD does not need a high computational cost like the CFD.Our present work also presents two major contributions.First, we determined, for digital communication signals, the optimal values of the time delay τ and embedding dimension m needed for the phase space reconstruction.Second, we established the analytical expression of detection threshold λ, the probability of detection P d , and the probability of false alarm P f a of the detection model based on RQA.From the ROC curves, we can notice without ambiguity that the RAD is more robust than the ED and CFD algorithms.Our current simulations show that the RAD is able to detect the communication signal for SNR ≥ −12 dB.In addition to facilitating the blind detection of communication signals, RQA could be used to accurately estimate the characteristic frequencies of the signal of interest.In our future work, we will optimize the performance of the RAD detector based on this reliable estimation of the characteristic frequencies of the signal of interest.

Figure 1 .
Figure 1.The proximity coefficient r(m, τ) based on the embedding dimension m for a 16-QAM signal.3.1.3.Optimal Values of m and τ r(m, τ) is a bivariate function whose expression leads to lim

Figure 6 .Figure 7 .
Figure 6.Histogram of u d and u ∆ for a White Gaussian Noise (WGN): We have u d = 90.6 and u ∆ = 90.For P f a = 0.01, the detection threshold of the RAD becomes λ = 12.5.Based on the u ∆ value, the confidence interval becomes Φ ∆ = [77.5; 102.5].We notice that u d ∈ Φ ∆ .Consequently, using the conformity test, we can conclude that u d is representative of u ∆ .

Figure 11 .
Figure 11.Receiver Operating Characteristic of the RAD model based on the number of observed samples in a Gaussian channel with SNR = −12 dB.

Figure 14 .
Figure 14.Performance Curve P d as a function of SNR for 16-QAM signal in a Rayleigh channel.

6. 1 .
Complexity Analysis of Energy-Based Detector Let y(n) be the observed signal with N samples y k .The energy E y of y(n) is given by

Figure 15 .
Figure 15.Energy Detector process.λ ED denotes the detection threshold of the ED.

Figure 16 .
Figure 16.Different steps of the CFD detection process.

Figure 17 .
Figure 17.Different steps of the RAD detection process.The algorithmic complexity of the RAD essentially concerns the distance matrix computation and the calculation of average values of distance matrix coefficients.From the observed signal y(n) containing N samples, we obtain K = N − (m − 1)τ state vectors.Each state vector contains m coordinates.The distance d ij = x − x j from the state vector x i to other state vectors x j requires mK addition operations.Because we exploit only the upper triangular part of the distance matrix with the main diagonal coefficients, we use m 2 K(K − 2) addition operations.The computation of the average value of the first upper diagonal requires K elementary operations, and the average value of other coefficients

Figure 18 .
Figure 18.Curves of the algorithmic complexity of ED, CFD, and RAD.
35) 4.2.3.The Probability Density Function of T under hypothesis H 0 u d/H 0 and u ∆/H 0 are Gaussian random variables.Based on Equations (

RAD vs ED; 16-QAM signal; SNR = -12 dB ED RAD Figure 12.
ROC performance: ED vs RAD.The RAD is superior to ED.

Table 2 .
Rayleigh Channel Model Features.

Table 3 .
Delay and Gain values for 6 paths [59].Figure 14 summarizes the performance of the RAD in a noisy Rayleigh channel.The RAD's performance remains almost unchanged.It detects a communication signal with P d ≥ 0.92 with P f a = 0.05 as soon as SNR ≥ −12 dB.