Abstract
With the emergence of cognitive radios, the open spectrum access paradigm that is proposed to overcome the shortcomings of the traditional spectrum allocation paradigm became viable. Researchers have been accumulating efforts to verify the validity of existing networking schemes and protocols as well as designing new ones for this new paradigm. As link failures, due to the activity of primary users, are common in cognitive radio networks, it is essential not to overlook their effect when developing networking solutions including those for multicasting. In this paper, we study the problem of provisioning a multicast session via a tree that has the maximum achievable immunity against any single spectrum failure. The immunity is measured as the minimum percentage of multicast receivers that remain connected with the root of the multicast tree upon the occurrence of a single spectrum failure. The problem is formulated an Integer Linear Program. We also propose a suboptimal algorithm to solve the problem and compare its performance to the optimal performance obtained using the ILP. Results proved the good performance of our algorithm which was always within
Introduction
Recent advancements in transceiver design enabled software-based reconfiguration of radio devices, which emerged as the software-defined radio technology (also referred to as cognitive radio) [30,34]. Facilitated by this new technology, and motivated by the significant spectrum crowdedness as well as underutilization, the Open Spectrum Access (OSA) paradigm was proposed [2,46]. This paradigm created a new type of wireless networks called cognitive radio networks (CRNs) in which unlicensed wireless users (also referred to secondary users (SUs)) may use any part of the spectrum as long as they do not cause any harm (in terms of interference) to licensed wireless users (also referred to as primary users (PUs)). In other words, the OSA paradigm opens the whole spectrum to any kind of wireless users provided that they do not interrupt or negatively affect the operation of PUs. This paradigm creates a number of challenges which distinguishes cognitive radio networks from traditional multi-channel wireless networks [1,3,6,13,18,21,24,31]. These challenges include:
Heterogeneous channel availability: depending on the spatial distribution of active PUs, different SUs may observe different sets of available frequency channels.
Time-varying channel availability: depending on the temporal channel occupation distribution of PUs in its vicinity as well as their possible mobility, the set of channels available for an SU to use may vary over time.
Time-varying network topology: the variability of channel availability, due to the dynamic activity of PUs, imposes variability in network topology. As a pair of connected SUs become disconnected if they no longer share a common channel, some nodes may lose connectivity with the rest of the network causing fragmentation.
Broadcast deformation: in CRNs, an SU may not be able to broadcast a packet to all of its neighboring SUs in one transmission because they do not all share a common frequency channel to use.
Frequent and correlated link failures: when a PU starts using its frequency channel, all SUs which can interfere with its transmission must vacate the channel. This means that all the links between this set of SUs which operate on the same channel have failed. Thus, traditional protection techniques that assume independent link failures are not applicable to CRNs. Furthermore, depending on the frequency of PUs activity, such failures may occur frequently.
The aforementioned challenges motivated a vast volume of research on different aspects of CRNs. Being an essential mode of communication in computer networks, data multicast has been one of these aspects [7,9,23,35,36,38,40,41,44]. In this paper, we are interested in studying the effect of spectrum failures (the appearance of a PU on its channel of operation is referred to as a spectrum failure in this paper) on multicast communication in CRNs. We aim at minimizing the damage that any spectrum failure may create to the multicast tree, where this damage is measured as the number of multicast members that get disconnected from the multicast source upon such a failure. Depending on their geographical locations, transmission power levels, and channels of operation, different PUs may cause different levels of damage to an existing multicast tree. Furthermore, the way the multicast tree is constructed will affect its immunity to spectrum failures (see Section 3.1 for an example).
Paper contributions
The contributions of this work are as follows:
Formalizing the problem of multicast tree construction with maximum immunity against spectrum failures, and presenting an immunity metric as the ratio of the multicast members that remain connected after any failure to the total number of members. We call this problem “Multicast Tree Construction with Maximum Immunity (MTMI)”, and we define it formally in Section 4. Developing an Integer Linear Program (ILP) formulation [26] for the MTMI in order to find the optimal multicast tree (the one withe the maximum immunity). As ILPs are not guaranteed to give a solution in polynomial time, we propose a suboptimal algorithm with excellent accuracy. The accuracy of the proposed algorithm is evaluated against the optimal solution obtained by solving the ILP using IBM ILOG CPLEX Optimizer [27].
Paper organization
The rest of this paper is organized as follows. We review the work related to multicast routing and recovery in cognitive radio networks in Section 2. In Section 3, we outline some preliminaries regarding the network model and the spectrum failure model. The motivation and problem statement are presented in Section 4. The MTMI problem is formulated as an Integer Linear Program in Section 5. Section 6 presents the details of the proposed sub-optimal algorithm to solve the MTMI problem. Results and performance evaluation are discussed in Section 7. We finally conclude the paper in Section 8.
Literature review
In this section, we review related works on multicast communication in cognitive radio networks.
Multicast routing in cognitive radio networks
Due to their special properties (reviewed in part in Section 1) which are enforced by the opportunistic nature of spectrum availability, CRNs needed new mechanisms and protocols to provision the multicast service different from the ones used in traditional wireless networks. A multipath on-demand multicast routing protocol for CRNs was presented in [5]. The protocol is based on the reinforcement learning method of artificial intelligence, and it aims at improving both throughput and end-to-end delay. Results proved the superiority of the proposed protocol over existing state-of-the-art protocols especially under high PU activity.
An assisted multicast scheduling strategy for a single cell in cognitive radio mesh networks is proposed in [8]. In this strategy, client nodes assist the base station in delivering the multicast data over orthogonal channels to reduce the total multicast time. Network coding is also utilized for further reduction in the overall multicasting time. The use of network coding for multicasting in CRNs has also been proposed in [37]. The aim of this work was to apply network coding, considering both channel uncertainty and node mobility, to minimize the total transmission cost (amount of transmitted data). In [19], random network coding-based multicasting approach is proposed and the objective was again to minimize the total number of transmissions.
Using a dynamic programming approach, an on-demand multicast routing protocol that considers channel assignment, channels heterogeneity, and channel-switching delay is proposed in [7]. The protocol aims at reducing end-to-end delay and enhancing throughput. The authors in [29] proposed an optimization method for multicast scheduling in CRNs using network coding. Several factors where considered in this optimization problem including PUs protection and fairness. Two methods were proposed: a greedy method which is based on a centralized optimization, and an online method that is based on stochastic optimization. In [42], an optimization model that jointly finds multicast routes and channels assignment is formulated with the objective of increasing multicast throughput in multi-hop CRNs. The application of Non-orthogonal multiple access (NOMA) to multicast in CRNs is investigated in [32]. Via SU scheduling, significant performance gains have been achieved by using cooperative NOMA. Other NOMA-inspired multicasting approaches for CRNs are proposed in [15,20].
The authors of [38] addressed the problem of constructing energy efficient multicast trees in CRNs, and proposed a low-complexity approximation algorithm with performance guarantees. A multicast tree construction method is proposed in [45] so that the overall bandwidth utilized by the multicast tree is minimized and the predetermined QoS requirements are met. The authors proposed two methods to solve this problem based on minimal spanning tree, such that time slots are assigned to tree links in a way that reduces bandwidth consumption. In [4], a minimum spanning tree-based multicast routing protocol is proposed. The objective in this work was to increase the overall throughput and enhance the packet delivery rate.
The problem of joint power and rate allocation to maximize the average sum multicast rate in CRNs while maintaining some QoS guarantees (in terms of service outage probability) is studied in [47]. In [39], the multichannel multicast problem was studied. The paper introduced the concept of local multicast to tackle the hidden channel problem, and presented an channel assignment algorithm for this purpose which considers both partially overlapped channels and orthogonal channels. In [14], the authors considered a wireless mesh network of multi-radio nodes which are equipped with directional antennas. The objective was to select the best multicast/broadcast tree, channels, and antenna beams to keep the interference minimized.
In [16], the problem of optimizing the multicast group power allocation to minimize the group outage probability is studied. This optimization is investigated under PU QoS guarantees and average transmission power constraints. The problem of energy efficient multicasting in CRNs using omni-directional and directional antennas is studied in [11]. The objective of this study was to build a multicast tree and to schedule the transmissions along this tree so that the total energy consumption is minimized. Designing a protocol to route video multicast data has been the focus of [33]. The protocol is proposed for a single-hop infrastructure-based CRN. In [28], a multi-objective optimization model is proposed to constrcut multicast routing trees for a given session so that the worst end-to-end delay is mininmized, the multicast rate is maximized, and the number of transmission links used is minimized.
For further review of existing work on multicast in CRNs, we refer the reader to the comprehensive survey on this topic presented in [36]. It also highlights open research problems and directions in this field. We further refer the reader to the work presented in [22] which discusses the research challenges related to multicast routing, spectrum allocation, cross-layer multicast scheduling, and multicasting with QoS guarantees in cognitive radio ad hoc networks.
Multicast recovery in cognitive radio networks
In general, two approaches are used to recover from failures in wireless networks, namely protection (also known as proactive) and restoration (also known as reactive) recovery. In the protection approach, backup resources are reserved a priori to be used for recovery in case of failure. The restoration approach, on the other hand, restores the functioning status of the provisioned service after the occurrence of the failure. Therefore, no resources are reserved a priori but instead new resources are looked for and allocated after the failure. After a deep literature review, we could identify only a few research articles, [10,12,17,25,40,43], that address the problem of recovering multicast service from spectrum failures in CRNs. There articles are reviewed below.
In [12], the authors use the protection approach to route multicast traffic based on a multilayer hyper-graph model. Primary and backup paths which are failure-disjoint are selected for each multicast receiver. On the other hand, the work in [25] uses the restoration approach. A local multicast-route recovery process is launched upon the occurrence of a spectrum failure in which the route is fixed around the failure instead of end-to-end recovery. In [43], the problem of robust multicast in mobile ad hoc cognitive radio networks is studied. A semi-mesh topology is used to provision the multicast session where two paths are maintained between the source and each multicast receiver. The two paths are not necessarily link disjoint, and therefore they may fail together. If such a case occurs, a restoration process is launched.
In [40], the authors proposed a multicast routing approach which they call HyTopCast (short for Hybrid Topology Multicast). HyTopCast aims at establishing more stable multicast trees as well as providing a multicast route repair service. It does not take into account, however, the possibility of correlated failures in the constructed tree. A robust multicasting algorithm for CRNs is proposed in [10] based on the protection approach. The purpose of this work is protecting multicast sessions from a single spectrum failure at a time with the minimum protection cost, while at the same time maximizing the number of protected multicast trees that can be simultaneously provisioned.
In [17], the multicast problem in CRNs is studied with the objective of minimizing the outage probability of the multicast group by designing a power allocation policy. A group is considered to be in an outage when the aggregate rate of all the members of the multicast session drops below some predefined target rate.
Our work is different from the works reviewed above in the sense that we do not propose neither a proactive nor a reactive recovery technique. Instead, we propose a method to construct a multicast tree that has the best immunity against any single spectrum failure, i.e., we minimize the worst effect of any single spectrum failure on the constructed tree. This proposal can be used for both protection and restoration as follows:
If restoration is used, our approach ensures that the maximum number of multicast receivers that may get disconnected, and therefore need to be restored, is minimized.
If protection is used, our approach can be exploited to construct both the primary and the backup trees.
Table 1 compares between the existing works on reliable multicast routing in CRNs. We compare between them in terms of the reliability assurance method, the number of multicast sessions considered, and the metrics used to evaluate the solution or the joint objectives considered with the routing problem. Below, we explain what each of the reliability assurance methods mentioned in Table 1 means:
The comparison between existing protection/restoration works on multicast in cognitive radio networks
In this section, we outline some preliminary models that we use later in the paper.
Network model
We consider a CRN that consists of a set of SUs denoted as They are within the transmission range of each other. They share at least one common channel (i.e.,
We denote the set of SUs which are neighbors to SU i as
Finally, a multicast session exists in the network where
Spectrum failure model
Two types of failures are usually of concern when it comes to computer networks; node failures and link failures. In wireless networks, a link exists between a pair of nodes if they are within the transmission range of each other and they share a common wireless channel to communicate over. As channel availability is a function of PU activity in CRNs, link failures are often frequent (contrary to node failures). Furthermore, link failures in CRNs are usually correlated. To illustrate this correlation, consider the example in Fig. 1. The example shows a network of eight SUs

An example to illustrate the correlation between links failures in CRNs. The network consists of eight SUs
From now on, we will use the term “spectrum failure” to refer to the appearance1
In the form a wireless transmission.
Keep in mind that a spectrum failure might cause one or more links in the network (or none) to fail as the example above demonstrated.
In this section, we first give an example to illustrate the motivation behind this work in Section 4.1. Then, in Section 4.2, we present the problem statement and formally define the “Multicast Tree Construction with Maximum Immunity (MTMI)” problem.
Motivation
We start this section by giving a motivational toy example (shown in Fig. 2) to explain the importance of channel assignment in reducing the effect of a spectrum failure. The example includes one PU

A toy example to explain how the damage that a spectrum failure might cause to the multicast tree depends on the channel assignment. Black circles represents SUs which are members of the multicast session, while white circles represent SUs that are just relay nodes.
Before giving the formal definition of the problem, we need to give two preliminary definitions.
s is the root of the tree. The tree spans all the nodes in Any link Each link
We are now ready to formally define the problem of constructing a multicast tree with maximum immunity against spectrum failures, abbreviated as the MTMI problem.
In this section, we propose an integer linear programming (ILP) formulation to solve the MTMI problem. Before presenting the ILP formulation, we need to present some notations:
Before presenting the details of the proposed ILP, we need to explain the network flow model we used to facilitate the tree construction requirement for the ILP. In graph theory, a flow network is a directed graph in which each link may carry an amount of flow that does not exceed its capacity, and each node can be either a supply node, a demand node, or a relay node. A supply node is one that has flow to supply to others, a demand node is one that demands flow to consume, and a relay node is one that relays the flow it receives to others. In general types of flow problems, any node i of any of the three types above must satisfy the following condition:
The most common type of flow problems is the min-cost flow in which all the supply from supply nodes must be delivered to all demand nodes with minimum cost, where the cost is usually assigned to links per unit of flow. In our case, the source of the multicast session s is a supply node of The only supply node s receives no flow (i.e., no incoming links in the resulting solution). Each other SU node may receive flow from no more than one SU and via a single link (i.e., at most one incoming link in the resulting solution).
These two conditions guarantee that the solution will always be a tree (the proof of this is trivial and therefore omitted). We are now ready to present the ILP formulation. Apparently, the objective function is to maximize
Tree constraints. The source node s must have no incoming links (constraint (2)), while other SUs may have no more than one incoming link (constraint (3)).
Network flow constraints. This set of constraints govern the flow. Constraint (4) guarantees that no flow passes through link A multicast receiver node must receive exactly one unit of flow from its neighbors. The source node s does not receive any flow from its neighbors. Any other node must forward all the flow it receives (flow conservation, i.e.,
The
Spectrum failure constraints. This set of constraints accounts for the cost of spectrum failures. The binary variable
Figure 3 explains constraint (10). When a PU p affects the flow incoming to a node j in the resulting tree, constraint 3 propagates this effect to all neighbors in the subtree rooted at j. Then, those neighbors propagate in a similar manner to all their neighbors downstream in the tree. This method helps us account for the loss of connectivity with mutlicast receivers down in the tree due to a failure caused by a PU upstream although this PU does not directly affect those receivers. Before discussing the explanation in Fig. 3, we would like to reassert the two conditions enforced on the solution by constraints (4) and (7) which are:
No flow
Explanation of constraint (10) of the proposed ILP formulation. No channel may be assigned to link
Given the two assertions above, for a pair of SUs j and i where 
PU p does not affect the flow incoming to j (i.e.,
PU p does not affect the flow incoming to j (i.e.,
PU p affects the flow incoming to j (i.e.,
PU p affects the flow incoming to j (i.e.,
To give an example, consider the tree in Fig. 2. PU
In this section, we propose a greedy algorithm to solve the MTMI problem. We refer to this algorithm throughout the paper as the G-MTMI algorithm, and it is outline in Algorithm 2. The G-MTMI algorithm exploits another algorithm that we call the “Minimum Cost Route (MCR)” which is outlined in Algorithm 1. The MCR algorithm finds the best route from the source of multicast session s to one multicast receiver from an input set

Minimum Cost Route (MCR) algorithm
The G-MTMI algorithm, outlined in Algorithm 2, takes the following inputs:
The network of SUs represented as an undirected graph The set of PUs The set of multicast receivers The source of the multicast session s. The channel availability
As an output, the algorithm returns the constructed multicast tree T and its immunity level
For a set
Minimum Cost Route (MCR) algorithm
The MCR algorithm, outlined in Algorithm 1, is based on the well-known Dijkstra’s algorithm. It finds the minimum-cost path that connects the source s to a multicast receiver2
The node that is reached first.
Note that
The modifications made over the original version of Dijkstra’s algorithm to make up the MCR algorithm are:
Because there are multiple channels that may be used on each link The cost of a route is the maximum of the individual costs of the links that constitute the route, and not the sum of those costs as it is in the original version of Dijkstra’s algorithm. The algorithm terminates when reaching a node that is a member of the input set The set of channels to be used between nodes u and v on a link All links incoming to node u except
Greedy MTMI algorithm (G-MTMI)
After finding the route with the minimum cost, the second part of the algorithm (from line 31 to line 42) performs the following updates for each link

To evaluate the performance of the proposed G-MTMI algorithm, we used a network topology in which SUs are deployed on a squared-grid field of side length L. As Fig. 4 shows, the side length of each cell in the grid is r (

The grid topology of SUs,

The immunity versus PU activity range for a multicast group of size 8.

The immunity versus PU activity range for a multicast group of size 12.
In order to verify the accuracy of the G-MTMI algorithm, we performed four sets of experiments depicted in Figs 5, 6, 7, and 8 for a multicast group of size 8, 12, 16, and 20 respectively. In all of these figures, we compare the optimal immunity (obtained using the ILP in Section 5) to the immunity obtained using the G-MTMI algorithm. The protection range of PUs is varied from

The immunity versus PU activity range for a multicast group of size 16.

The immunity versus PU activity range for a multicast group of size 20.
As the results show, the accuracy of the G-MTMI algorithm is within
In this section, we study how the immunity of the constructed multicast tree varies with respect to network parameters like number of channels, number of PUs, geographical distribution of PUs in the network field, PU protection range, and the size of the multicast group. Instead of studying immunity against each of the different parameters concerning PUs, we define a new metric that we call the “reliability factor” which takes into consideration all of those aspects together. Given a SU s, its reliability factor on channel k, denoted
The worst value of
The average reliability factor for SU s, denoted
Finally, the average reliability for the entire network, denoted as σ, is defined as follows:
To study the relationship between σ and immunity, we varied the size of the multicast group from 8 to 20 in an increment of 4. For each group size, we varied the number channels from 4 to 10, the number of PUs from 10 to 40, and the PU protection range from

The immunity versus
As Fig. 9 shows, immunity increases in an exponential pattern with the increase of σ. The pattern is the same regardless of the size of the multicast group. Furthermore, the achieved immunity is approximately the same, on the average sense, regardless of the size of the multicast group. This result suggests that the problem of calculating the achievable multicast immunity can be transformed into the problem of calculating σ. In other words, σ is a network property from which the immunity of multicast sessions in the network can be inferred. We are currently investigating the problem of developing distributed algorithms to calculate σ for any given CRN.
The problem of constructing multicast trees with maximum immunity against spectrum failures, abbreviated as the MTMI problem, is studied in this paper. The immunity of a multicast tree was defined as the minimum ratio of the number of multicast receivers that remain connected with the source of the multicast tree to the size of the multicast session among all possible spectrum failures. The MTMI problem was formulated as an Integer Linear Program (ILP) to find the optimal solution. Furthermore, a sub-optimal algorithm was also proposed. Results shows that the proposed algorithm is, on average, within
We have also defined the reliability metric σ and showed that the achievable immunity of a multicast session in a network is a function of σ. Therefore, evaluating σ can give a hint of how immune multicast sessions are going to be in a given CRN.
