Conference PaperPDF Available

Opportunistic Spectrum Access in Cognitive Radio Networks

Authors:

Abstract and Figures

Driven by regulatory initiatives and radio technology advances, opportunistic spectrum access has the potential to mitigate spectrum scarcity and meet the increasing demand for spectrum. In this paper, we consider a scenario where secondary users can opportunistically access unused spectrum vacated by idle primaries. We introduce two metrics to protect primary performance, namely collision probability and overlapping time. We present three spectrum access schemes using different sensing, back-off, and transmission mechanisms. We show that they achieve indistinguishable secondary performance under given primary constraints. We provide closed form analysis on secondary user performance, present a tight capacity upper bound, and reveal the impact of various design options, such as sensing, packet length distribution, back-off time, packet overhead, and grouping. Our work sheds light on the fundamental properties and design criteria on opportunistic spectrum access.
Content may be subject to copyright.
Opportunistic Spectrum Access in Cognitive Radio
Networks
Senhua Huang, Xin Liu, and Zhi Ding
University of California, Davis
Davis, CA 95616, USA
Abstract—Enabled by regulatory initiatives and radio technol-
ogy advances, opportunistic spectrum access has the potential to
mitigate spectrum scarcity and satisfy the increasing demand for
spectrum. In this paper, we consider a scenario where secondary
users can opportunistically access unused spectrum vacated by
idle primaries. We introduce two metrics to protect primary
performance, namely collision probability and overlapping time.
We present two spectrum access schemes using different sensing,
back-off, and transmission mechanisms. We show that they
achieve indistinguishable secondary performance under given
primary constraints. We provide closed form analysis on sec-
ondary user performance, present a tight capacity upper bound,
reveal the impact of various design options, such as sensing,
packet length distribution, back-off time, packet overhead, and
grouping. Our work sheds light on the fundamental properties
and design criteria on opportunistic spectrum access.
I. INTRODUCTION
The breakneck proliferation of wireless devices and rapid
growth of wireless services continue to stretch the limited
spectral resource. In fact, most spectrum bands suitable for
terrestrial wireless communication have already been allocated
by the regulatory agencies to existing licensees. On the other
hand, the current approach of static spectral allocation is
highly wasteful. Measurement has shown that over 60% of
the licensed spectrum below 6GHz remains unused or under-
utilized [1], [2]. To exploit the reported “white space” in exist-
ing bands [1], cognitive radio networks have been considered
as the viable technology to improve spectral efficiency. With
primary licensee’s consent, secondary users equipped with
cognitive radios may be allowed to transmit on primary bands
when the Primary users are inactive [3], [4], [5].
Serious challenges must be resolved in order for the cogni-
tive radios to be acceptable. First, secondary users must not
be disruptive to primary user communications. Secondly, an
access mechanism is required to reduce contention between
secondary users to efficiently share spectrum opportunities.
However, coordination and synchronization among secondary
users may be limited due to the decentralized nature of sec-
ondary user access, particularly if secondary users of different
networks coexist. In addition, each secondary users may not
be able to sense all channels due to the limitation on hardware
or/and sensing capability, and thus algorithm to decide which
channel to monitor is needed.
In this paper, we focus on non-intrusive spectrum access
schemes that do not require primary users to alter theirexisting
hardware or behavior. The activities of primary users on
different frequency bands are modeled as independent M/G/1
queues, where secondary users can exploit a primary channel
when it is idle. We introduce two protection metrics (collision
probability and overlapping time), to which secondary users’
access schemes must abide in order to protect the quality
of service (QoS) of primary users. Such constraints can be
imposed by primary licensees or spectral regulators.
Under the constraints, we investigate the capacity of sec-
ondary users under various sensing-based random access
schemes. We propose two random access schemes for sec-
ondary users, namely, VX and KS schemes, with different
sensing, transmission, and back-off mechanisms. We study
extensively the throughput performance of secondary users
with the VX scheme. We thoroughly investigate both the
simple system setup with with one primary band and one
secondary user, and the more general case in which there
are multiple primary bands and multiple secondary users. Our
results illustrate the fundamental properties and design criteria
of opportunistic spectral access for cognitive radio networks.
The rest of the paper is organized as follows. We first
describe a number of related works in the field in Section II
before presenting our system model, performance metrics and
problem formulation in Section III. We present two random
access schemes, and analyze the throughput performance and
optimum access parameters in Section IV. Simulation results
are also given in Section IV to verify our analysis. We extend
the results to multi-band competitive systems in Section V.
We conclude the paper and discuss future work in Section VI.
II. RELATED WORK
To facilitate spectrum sharing, researchers have considered
the design of a common control channel to exchangespectrum
access and sensing information and facilitate collaborative
sensing and spectrum reservation/sharing, e.g., in [6], [7], [8].
Centralized and decentralized spectrum auction and brokerage
have been proposed for efficient spectrum sharing, e.g., in [9],
[10], [11]. Co-existence of cognitive users in unlicensed band
has also been studied [12], [13], [14].
Researchers have also considered sensing-based decentral-
ized cognitive medium access schemes [15], [16], [17]. In
[15], the authors model the states of primary bands as two-
state Markovian process and maximize the transmission rate
of secondary users in certain time slots. In [16], the authors
design a CSMA/CA-based cognitive radio MAC protocol that
uses channel statistics to determine the optimal access range
2
and the number of channels to access. In [17], the authors
develop a slotted transmission scheme of secondary user via
periodic channel sensing based on Constraint Markov Decision
Processes. In comparison, our model is more general. We do
not assume exponential busy periodof primary users (required
in Markovian models), neither synchronization between mul-
tiple users or feedback from receivers. Our work introduces
explicit guarantee on the performance of primary users and we
provide closed form analysis on the capacity limit of secondary
users under the primary constraints.
III. SYSTEM MODEL
Consider a system with Nhomogeneous primary bands
(channels) and Msecondary users (SUs). Primary users (PUs)
are the legacy users of these bands and thus have higher
priority over SUs. A primary band is called busy if it is used
by one or more PUs, and idle otherwise.
We assume the arrival process of a PU is Poisson while
the service time distribution can be arbitrary. This assumption
holds in many situations. For example, in a data network,
packet arrival process is Poisson while packet length distri-
bution can be arbitrary. Similarly, the arrival process of a data
session is often Poisson while the length of the data file can be
heavy tail. In addition, the call arrival process for voice traffic
can also be modeled as a Poisson process. When there are
multiple PUs in a band, the busy and idle periods of the band
can be modeled as the busy and idle periodsof an M/G/1 queue
(with multiple inputs). In this case, the idle time distribution is
exponential while the busy time distribution is general. From
the viewpoint of an SU, because the objective is to utilize
the idle period, one can treat the aggregated primaries as one
PU. Therefore, we assume, without loss of generality, there
is one PU per band and the activities in different bands are
independent and identically distributed (i.i.d.). We also assume
that the system is stationary and ergodic.
Let V1and L1be random variables denoting the idle period
and busy period of a primary band, respectively. Let v1=
E[V1]and l1=E[L1]. Let
α=v1
v1+l1
.
Note that αis the probability (or the percentage of time) that
a primary band is idle. In other words, a primary band is idle
αfraction of time, which could be exploited by SUs.
The focus here is on the non-intrusive spectrum access
schemes of cognitive radio devices. The non-intrusiveness has
two-folded meanings. On one hand, PUs are not required to
change their existing transmission strategies and algorithms to
coordinate with SUs. On the other hand, the access activities
of SUs should guarantee that the impact incurred on the
transmissions of PUs is insignificant. We also assume that
the PU’s channel access is not affected by SU’s behavior.
For example, PUs does not sense the channel before its
transmission. If a PU and a SU transmit simultaneously, the
PU does not retransmit or back-off. In other words, the idle
and busy periods of a primary band are not affected by SUs.
An SU performs sensing before transmission and only trans-
mits if the primary band is idle. We assume that SUs perform
perfect sensing, i.e., the false alarm and missing probability of
the sensing is zero. Additionally, we assume that the sensing of
the channel takes an infinitely small amount of time to finish.
Furthermore, due to the limit of radio front-end equipment,
we assume that the SU cannot sense the channel when it
is transmitting. We do not assume synchronization between
primary and secondary users or control channel among SUs.
A. Primary Protection
In our system, collision only happens in the following
scenario: a secondary user senses the channel idle and starts
transmission, and the primary user returns to the band before
the SU finishes its transmission. To capture the impact of
collision on PUs and thus to protect PUs, we introduce the
following metrics. The first constraint metric is the probability
of the collision observed by the PU. As shown in Fig. 1,
collision is defined as the event that the PU starts transmission
when the SU is transmitting a packet on the channel. Let Pc
1
and Pc
2be the collision probabilities observed by a PU and
an SU, respectively. Under the assumption of stationary and
ergodicity, we have:
Pc
1= lim
T>
No. of collisions in [0,T]
No. of busy periods of PU in [0,T]
Pc
2= lim
T>
No. of collisions in [0,T]
No. of packets transmitted for SU in [0,T] .
(1)
This constraint is suitable for the situation where the average
packet length of SUs, is close to that of PUs.
V2
2nd user
1
st user
V1L1
V2
scheme1:Vx Virtual
Xmit L2V2L2
Time
Tim
e
V2
Overlapping Time
R1 Sensing Point of SU
Successful Transmission
Collision!
2nd user
s
cheme2:Ks Tim
e
Successful Transmission
L2
Collision!
Fig. 1. Random Access Schemes of A Cognitive Radio User.
On the other hand, if a busy period of a PU consists of
one or more service sessions (e.g., the whole duration of a
telephone call or the total time to transfer a large file), then
only a very small portion of the primary’s traffic session is
affected by collision. For example, suppose that the PU is
having voice communication, the busy period (call session)
may be thousands times longer than the duration of a IP packet
transmitted by SUs. In this case, from the perspective of the
PU, the collision probability metric is not appropriate, and the
duration of the interruption caused by SUs is more important.
Therefore, the second constraint metric is the percentage of
3
overlapping time. One example of the overlapping time is
illustrated in Fig. 1 with length R1. Specifically, we have
the following definition of the percentage of overlapping time
observed by the PU:
Pr
1= lim
T>
Length of overlapping time in [0,T]
T.(2)
To protect the transmission of PUs, the system can set the
following constraints:
Pc
1η
or, Pr
1r0,(3)
where ηand r0are performance thresholds predetermined by
the network operator of the primary bands and/or the spectrum
regulators. In fact, we will show that the above two constraints
are closely related in the following sections.
B. Objective Function
We assume that there are always packets waiting for trans-
mission for the SU. So the results obtained can be regarded as
an upper bound on the capacity of SUs. We also assume that
SUs have the knowledge of the statistics of the channels. In
particular, each SU knows the average of busy period l1and
idle period v1, i.e., the average channel occupancy behavior
of the PUs. This knowledge can be obtained by the SU from
historic information, measurement results, and/or database.
SUs also have the information of the access constraints posed
by the PUs or government regulators, i.e., ηor r0, which are
predefined when they are admitted into the network.
The objective of the spectrum access is to maximize the
achievable capacity (throughput) of the SU, denoted by C2.
More specifically, C2is defined as the time proportion that an
SU transmits on the channel without collision. Given that α
is the fraction of time the PU is idle, we have C2α. The
resulting optimization problem is formulated as below:
max{C2}
s.t.
Pc
1η
or, Pr
1r0.
(4)
In other words, an SU can decide its sensing scheme, access
scheme, packet length and distribution, and back-off duration
and distribution to maximize its capacity. For the rest of the
paper, let L2be a random variable denoting the secondary
transmission time, which is refereed to as packet length. Let
V2be a random variable denoting the back-off time, which is
also referred to as vacation. Let l2=E[L2]and v2=E[V2].
IV. ONE PRIMARY BAND,ONE SU
In this section, we first consider the case where there is only
one SU and one primary band. We analyze the throughput
performance of the SU under the constraints posed by the PU.
A. Random Access Schemes
The media access schemes (or protocol) we consider in this
paper are illustrated in Fig. 1 and described as below:
VX Scheme (Virtual-Xmit-if-Busy): The SU senses the
channel. If the channel is idle, the SU transmits a packet
of length L2. Then, the SU starts a vacation of length V2.
If the channel is busy, the SU starts a so-called virtual
transmission stage and then enters into the vacation stage
afterward. Here, virtual transmission means that the SU
does not actually transmit the packet but waits for a
time interval which is equal to the packet length. After
vacation, the SU senses the channel again.
KS Scheme (Keep-Sensing-if-Busy): After a vacation,
the SU senses the channel. If the channel is idle, the
SU transmits a packet and then starts vacation. If the
SU senses the channel busy, it keeps sensing until the
channel is idle. Then, the SU transmits a packet and starts
a random vacation of length V2.
Since the sensing is perfect, given L2=τ, the collision
probability observed by the SU in the above random access
schemes is
Pr{Collision|L2=τ}=1
τ
1
v1
et
v1dt
=1eτ
v1.
Note here we ignore the probability that one secondary packet
collide with multiple PU’s busy periods. This is reasonable
when l2is much smaller than l1+v1. However, we note that
in all simulations, such events are not ignored. We show that
the analysis and simulation match well for a wide range of
values.
In the VX scheme, the transmission activity (including
virtual transmission) of the SU is independent of the PU’s
occupancy of the channel, thus its analysis is simplified. In
this paper, we obtain closed form analysis on the collision
probability, the overlapping time, the capacity of the SU.
The closed-form solutions provide insights on the system
performance and facilitate the implementation of the MAC
protocol. On the other hand, the analysis is more difficult in
the KS scheme, since the transmission of the SU is somewhat
dependent on the activities of the PU. Interesting enough,
simulation results show that the throughput performance of the
KS scheme is indistinguishable from that of the VX scheme
under the same collision probability constraint.
B. Performance Analysis of VX Scheme Under Collision Prob-
ability Constraint
In the VX scheme, the probability that the SU actually
transmits a packet is equal to the probability that the SU senses
the channel idle. Due to the independence between the sensing
activities of the SU and the activities of the PU, this probability
is α=v1/(v1+l1). Let fL2(τ)be the probability density
function of L2. The average collision probability observed by
4
the SU can be expressed as below:
Pc
2=
0
(1 eτ
v1)fL2(τ)dτ. (5)
The virtual transmission stage in the VX scheme has the
same statistic characteristics as the actual transmission. Thus,
the number of “collision” events in time interval [0,T]can
be calculated as α·Pc
2·T
l2+v2. Consequently, the collision
probability for the PU can be calculated as
Pc
1= lim
T>
α·Pc
2·T
l2+v2
T
l1+v1
=Pc
2
v1
l2+v2
.
(6)
Let ˆ
L2denote the contribution of each transmission to the
throughput of the SU. In particular, if a SU’s packet of length
L2is successfully transmitted, ˆ
L2=L2, otherwise ˆ
L2=0.
Let ˆ
l2=E[ˆ
L2]. We can regard ˆ
l2as the average length of
effective packets. Then we have
ˆ
l2=
0
1
v1
et
v1t
0
τfL2(τ)dt
=
0
τeτ
v1fL2(τ)dτ.
(7)
The achievable capacity of the SU is obtained as the time
proportion that the SU actually transmits packets (excluding
the time when the SU performs virtual transmission) without
collision, i.e.,
C2=αˆ
l2
v2+l2
=α
0τeτ
v1fL2(τ)
v2+l2
.(8)
Our objective is to find the optimum l2,fL2, and v2to
maximize C2in (8) under the collision probability constraint
Pc
1η.
According to (6), to satisfy the collision probability con-
straint Pc
1η,wehave
l2+v2v1
0(1 eτ
v1)fL2(τ)
η.(9)
Note that in (9), when l2v1+l1,wehavev2>0since
the right hand side in (9) can be approximated as l2. The
maximum throughput of the SU is achieved when equality
holds in the above inequality. Thus, we have
Cmax
2=ηα
0
τ
v1eτ
v1fL2(τ)
0(1 eτ
v1)fL2(τ).(10)
For the VX scheme, we have the following result.
Proposition 1. For a primary channel of which the idle
period V1obeys the exponential distribution, suppose that the
probability of channel being idle as α, under the constraint
that the collision probability of the primary user is less than
η, there exists an upper bound on the achievable capacity of
the SU which is expressed as below:
C2η·α. (11)
Proof: We have
0
τ
v1
eτ
v1f(τ)+
0
eτ
v1fL2(τ)
=
0
(τ
v1
+1)eτ
v1fL2(τ)
0
(τ
v1
+1) 1
1+ τ
v1
fL2(τ)
=1,
where the inequality holds because ex<1
x+1 for x>0.
Thus,
0
τ
v1
eτ
v1fL2(τ)1
0
eτ
v1fL2(τ)dτ .
Therefore, we have
0
τ
v1eτ
v1fL2(τ)
0(1 eτ
v1)fL2(τ)1
As a result,
C2ηα.
Note that, through the derivation, we only require that
the primary idle period be exponential and do not pose any
requirement on the distribution of L1,L2, and V2.
The result is somewhat surprising: C2cannot be larger
than ηα to satisfy the collision probability constraint, where
αis the time fraction of spectrum vacancy. The intuition is
as follows. Since the idle period is exponentially distributed,
whenever an SU starts to transmit on an idle channel, it faces
the same probability of collision. Therefore,the aggressiveness
of an SU’s transmission should be proportional to the collision
probability allowed by PUs. When η=1, the SU can fully
utilize the idle periods, and thus reach the capacity limit α
when l2goes to zero. On the other hand, if η=0, the SU can
never transmit and thus the capacity is zero. We note that in
both access schemes, the aggressiveness is controlled by L2
and V2.
The other side of the story is more straightforward. If the
idle period is deterministic, the capacity of SU, C2, can reach
αregardless of the value of η. An SU can simply track the
beginning of the idle period and transmit until the end of
the idle period. Deterministic and exponential distribution are
the two extremes in terms of predictability/entropy. While one
can maximize C2in the case of deterministic idle period, our
conjecture is that the exponential idle period results in the
worst opportunistic spectrum access capacity among all idle
period distributions (for a given l1and v1).
In the following, we consider two special cases, i.e., expo-
nentially distributed L2and fixed L2.
1) Exponentially distributed L2:When the packet length
of the SU, L2, is exponentially distributed, we have
Pc
2=l2
l2+v1
,(12)
5
Pc
1=v1
v2+l2
·l2
l2+v1
.(13)
Following (7), we have
ˆ
l2=l2
v2
1
(l2+v1)2.(14)
From (9), in order to satisfy the collision probability, for a
given l2, the optimal v2should be chosen such that
v2=max{0,v1l2
η(v1+l2)l2}.(15)
Therefore, for given l2and η,Cmax
2is given as:
Cmax
2=ηα v1
l2+v1
.(16)
We can observe that the smaller l2, the larger the C2. This is
intuitive. With smaller l2, the collision probability is smaller,
and the amount of transmission wasted is smaller when a
collision happens. Therefore, more packets can be transmitted
successfully with the collision constraint satisfied. We note
that Cmax
2ηα when l20.
2) Fixed Packet Length of SU: If the SU uses fixed packet
length, i.e., L2=l2,wehave
Pc
1=(1el2
v1)v1
v2+l2
,(17)
From (9), in order to satisfy the collision probability, for a
given l2,v2should be chosen such that
v2=max{0,v1(1 el2/v1)
ηl2}.(18)
Following similar approach in (8), we have
Cmax
2=ηα l2el2/v1
v1(1 el2/v1).(19)
Again, we can observe that Cmax
2ηα when l20.
3) Choosing fixed length packet: It is interesting to compare
the capacity performance of the SU with random and fixed
length packet (with the same mean). We have the following
Proposition for the VX scheme.
Proposition 2. For VX, let the largest packet length be lmax =
(2 l2/v1
el2/v11)v1. Under the constraint Pc
1ηand E[L2]=
l2, the SU achieves the maximum throughput when it transmits
fixed length packets, i.e., L2=l2. In other words,
C2(l2)=ηα
0
τ
v1eτ
v1fL2(τ)
0(1 eτ
v1)fL2(τ)ηα
l2
v1el2/v1
1el2/v1,
(20)
where fL2(τ)is the probability density function of L2with
finite support 0τlmax.
Proof: Define X=L2
v1and its expectation mX=l2
v1.
From our assumption of fL2(τ), we know that the probability
density function of X,fX(x)=0if x∈ [0,2l2/v1
el2/v11].
Next, we define an auxiliary function:
g(x)=(emX1)xex+mXex,0<x<2mX
emX1,
whose second order derivative is
g(x)=(x(emX1) (2emX2mX))ex.
For 0<x<2mX
emX1,g(x)0; thus, g(x)is concave
over the support of fX(x). Therefore, by Jensen’s inequality,
we have:
E[g(X)] =
0
g(x)fX(x)dx
g(E[X]) = g(mX)=mX,
or,
0
[xex(1 emX)+emXmXex]fX(x)dx emXmX.
Simple manipulations of this equation leads to the result of
the proposition:
0xexfX(x)dx
0(1 ex)fX(x)dx mXemX
1emX.
Proposition 2 specifies a maximum packet length. First,
packet size is limited in practice. Second, we note that, if L2>
v1, the collision probability will be very high and undesirable
for both the PU and SU. Since lmax =(2l2/v1
el2/v11)v1>v
1,
lmax is a reasonable length constraint.
4) Simulations: In our simulations, we set v1=1,η=
0.1, and l1=0.5, leading to the channel idling probability
α=0.667 which approximately equals the proportionof white
space according to measurement.
In Fig. 2, we present results for the VX scheme when the
SU adopts exponentially distributed packets and fixed length
packets, respectively. For 106busy PU periods, we vary the
average SU packet length l2from 0.1to 1.0. Parameter v2of
the SU is obtained according to (15) and (18) to satisfy the
collision probability constraint. With no assumption about the
distribution of L1and V2in the analysis, different distributions
are tested to verify the analytical results. Here, we include the
cases L1being exponentially distributed (denoted by E) and
fixed (denoted by F). The distributions of V2are exponential
(denoted by E) and uniform over [0,2v2](denoted by U). In
the legend, X/Y means that L1follows X distribution and V2
follows Y distribution. Simulation result matches our analysis
very well, both in terms of collision probability and capacity
for different distributions of L1and V2.
In Fig. 3, we compare the throughput of VX and KS.
Without a selection criterion of v2for the KS, for each given
l2,wesetv2for the KS scheme using the same formula for the
VX scheme with η=0.1. We then adjust the value of v2in
the VX scheme using the actual collision probability obtained
from the simulation results of the KS scheme, and compare
the throughput. Hence, the comparison is fair because they
achieve the same collision probability. We observe a higher
collision probability for the more aggressive KS scheme. Also,
for both access schemes, the SU with fixed length packet
always achieves larger throughput.
6
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.03
0.04
0.05
0.06
0.07
Throughput of SU: C2
C2 with VX, E/E
C2 with VX, E/U
C2 with VX, F/U
Analytical C2
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.1
0.105
0.11
Average Packet length of SU: l2
Collision Probability: P1
c
P1
c, E/E
P1
c, E/U
P1
c, F/U
η
l1 = 0.5
v1 =1
Fixed L2
Exponential L2
Fig. 2. Throughput of SU in VX scheme.
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.04
0.05
0.06
0.07
0.08
0.09
Throughput of SU: C2
C2 with VX
C2 with KS
Analytical C2
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.11
0.12
0.13
0.14
0.15
Average Packet Length of SU: l2
Collision Probability: P1
c
VX with fixed L2
KS with fixed L2
VX with exp. L2
KS with exp. L2
Fixed L2
Exponential L2
l1 = 0.5
v1 = 1
Fig. 3. Compare VX and KS schemes.
5) Observations:
VX and KS schemes have indistinguishable throughput
for the SU under the same collision probability constraint.
Therefore, insistent sensing in KS scheme does not help.
The main reason is that the idle period of channel, V1,
is exponentially distributed and the SU has to guarantee
the collision probability.
For VX scheme, an upper-bound of the throughputof the
SU is Cηα. We conjecture that this upper-bound is
valid for any access schemes that exploit the idle time of
a memoryless channel without coordination from the PU
under the collision probability constraint.
For a large range of packet length l2, fixed length
packet achieves the best capacity overother packet length
distributions.
C. Overlapping Time Constraint
The upper bound of the SU throughputC2ηα may appear
pessimistic, but not surprising. Consider applications with
l2l1. For example, when the primary has many packets in
each busy session (e.g., a large file transfer) or the primary has
voice traffic on the channel, one secondary packet may overlap
with a very small proportion of PU transmission in a busy
period. Most PU packets will be successful while only a small
portion suffers from collision. Thus, the collision probability
constraint on Pc
1is overly pessimistic because it counts the
whole busy period as collision. To be more practical, we
introduce the overlapping time constraint as defined in (2),
and study the corresponding throughput performance of the
SU.
Our objective is to relate the overlapping time constraint to
the previously discussed collision probability constraint. The
problem is to calculate Pr
1in (2). Denote Lvas the random
length of overlapping time given that there is a collision. We
have:
Pr
1=Pc
1
E[Lv]
l1+v1
.(21)
Under the assumption that l2l1+v1, the probability that the
packet from the SU collides with more than one busy period
of the PU is negligible. Therefore, Lv=min{L1,L
residual
2},
where Lresidual
2is the remaining transmission time of the SU’s
packet when the PU returns to the channel. For brevity, we
present two special cases here.
First, when L2is exponentially distributed, Lresidual
2fol-
lows the same distribution as L2.IfL1is exponential with
mean l1, then Lvis also exponential with mean l1l2
l1+l2. Con-
sequently, we have
Pr
1=Pc
1
l1l2
(l1+l2)(l1+v1).(22)
From (22), we can observe that Pr
1increases linearly with
respect to Pc
1and the increasing factor is much smaller than
1. This is reasonable since the overlapping part is only a very
small proportion of the whole busy period if l2l1.
If L2=l2(fixed length packet) and L1is exponentially
distributed, we have
E[Lv]=l1l2
1(el2/v1el2/l1)
(v1l1)(1 el2/v1).(23)
Consequently, the proportion of the overlapping time is
Pr
1=Pc
1
l1[v1(1 el2/v1)l1(1 el2/l1)]
(l1+v1)(v1l1)(1 el2/v1).(24)
Based on (21), (22), and (24), we can easily convert the
optimization problem under the overlapping time constraint
to a problem under the corresponding collision probability
constraint. Therefore, most of previous results in solving the
collision probability constraint apply to this case.
In our simulations, we set l1=0.5,v1=1, and
l2=0.05 = 0.1l1. The average vacation time v2is set to
satisfy the collision probability constraint Pc
1η. Fig. 4
shows the resulting Pr
1with respect to ηfor exponentially
distributed L2and fixed L2. We can observe that, in both cases,
Pr
1increases linearly with ηand the analytical results agree
with simulations. Also observe that for fixed L2, the fraction
of overlapping time is smaller than that with exponentially
7
distributed L2for any given η. This again shows the advantage
of fixed SU packet length. Our results are much more opti-
mistic by using overlapping time constraint. In particular, the
achievable throughputfor the SU is much closer to the limit of
the available spectrum holes, α. For example, for exponentially
distributed L2, if the constraint is posed as Pr
10.018, the
throughput of the SU is C2=0.4. When the constraint is
Pr
10.015, the throughput of using fixed length packet is
C2=0.65, very close to the maximum α=0.67.
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
0
0.02
0.04
0.06
Collision Probability: P1
c
Overlapping Proportion: P1
r
Simulated P1
r for fixed L2
Analytical P1
r for fixed L2
Simulated P1
r for exp. L2
Analytical P1
r for exp. L2
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
0
0.5
1
Throughput of SU: C2
C2 for fixed L2
C2 for exp L2
l1 = 0.5
v1 = 1
l2 = 0.05 Exponential L2
Fixed L2
P1
r = 0.01, fixed L2
P1
r = 0.018, exp. L2
P1
r = 0.016, fixed L2
P1
r = 0.0030, exp L2
Fig. 4. Throughput of SU under different constraints.
D. Packet Overhead
Our results have thus far favored smaller l2for better
throughput C2. This requires quick actions by SU. However,
packet overhead must be considered in practical transmission
by the SU. Therefore, we consider the effect of packet over-
head here by assuming that a fixed length overhead is added to
a payload of length L2. Let l0be the length of the overhead.
The collision probability observed by the SU is:
Pc
2=Pr{l0+L2>V
1}
=
0
(1 el0+t
v1)fL2(t)dt. (25)
Correspondingly, the PU collision probability constraint is
Pc
1=Pc
2·v1
l2+v2+l0
η. (26)
The average length of successfully transmitted payload of the
SU is
ˆ
l2=
0
tfL2(t)
t+l0
1
v1
eτ
v1dt
=el0
v1
0
tet
v1fL2(t)dt.
(27)
To satisfy the collision probability constraint, we have the
optimal v2for the VX scheme as:
v2=max{0,v1Pc
2
ηl2l0}(28)
Thus, the effective throughput of the SU is
C2=αˆ
l2
l2+v2+l0
αη
0
t
v1el0+t
v1fL2(t)dt
0(1 el0+t
v1)fL2(t)dt
.
(29)
Using a similar approach as in the proof of Proposition 1,we
can show that Cmax
2η. In this case, small packet size may
not always be desirable. Next, we present the optimal packet
size when L2is exponential and fixed, respectively.
1) Exponentially distributed L2:We start with
Pc
1=α1v1
l2+v1
el0
v1l1+v1
l2+v2
.(30)
The maximum effective throughput (excluding the overhead)
of the SU is:
Cmax
2=αη l2v1
(l2+v1)2
el0/v1
1v1
l2+v1el0/v1.(31)
The optimal average packet length l2is:
l
2=v11el0
v1.(32)
2) Fixed Length L2:For fixed payload length of the SU,
Pc
1=(1el0+l2
v1)v1
v2+l2+l0
,(33)
Cmax
2=ηα l2
v1
e(l0+l2)/v1
1e(l2+l0)/v1.(34)
The optimal l2is the solution of
1l
2
v1
el
2+l0
v1=0,(35)
In Fig. 5, we illustrate the numerical results of the through-
put performance of the VX scheme with exponentially dis-
tributed L2and fixed L2. In the calculation, we set l1=0.5,
v1=1,l0=0.05, and η=0.1. Clearly, the throughput of the
SU with overhead is smaller than that without overhead. The
optimal l2for both exponentially distributed L2and fixed L2
demonstrate the trade-off between overhead cost and packet
collision. The optimal values of l2in this simulation are found
to be l
2=0.21 and l
2=0.26 for exponential L2and fixed
L2, respectively.
V. RANDOM ACCESS SCHEME FOR MULTI-BAND
COMPETITIVE SYSTEM
Now consider the system with multiple primary channels
and multiple SUs. Denote the number of channels N, and
the number of SUs M. Let only one PU own each channel.
Each SU can only transmit in one channel at a time. Multiple
SUs compete for available spectrum in Nchannels. We
consider the VX scheme only in this section. All SUs adopt
the same access parameters, and thus they can be viewed
as homogeneous. They do not communicate with one other.
Additionally, as perfect sensing is assumed, an SU can detect
8
0 0.2 0.4 0.6 0.8 1
0.01
0.02
0.03
0.04
0.05
0.06
0.07
Average Packet Length: l2
Throughput of SU: C2
exp. L2
fixed L2
exp. L2 overhead
fixed L2 overhead
l1 = 0.5
v1 = 1
overhead l0 = 0.05
Fig. 5. Throughput of SU with Packet Overhead.
transmissions by both the PU and other SU’s in a channel.
Assuming instantaneous sensing, as in Section IV, collision
in channels can only happen between the returning incumbent
PU and a transmitting SU.
Two sensing strategies are considered:
Random-Sensing: After a random vacation time V2, each
SU randomly selects a channel, and then detects whether
the channel is busy. If it is, then SU enters the Virtual
Transmission stage. If the channel is idle, the SU trans-
mits its packet before taking a vacation.
All-Channel-Sensing: After a vacation, eachSU senses all
channels. If there is no idle channel, the SU enters the
Virtual Transmission stage. Otherwise, the SU randomly
selects an idle channel for packet transmission.
With the Random-Sensing strategy, the SU only needs to
monitor one band at each instant. By comparison, the All-
Channel-Sensing strategy requires that each SU monitor all
channels. Thus, the former is much easier to implement than
the latter.
We present Monte-Carlo simulations on the performance
of the two strategies. We set l1=0.5,v1=1, and
l2=0.1. Due to limited paper length, we only present
results for exponentially distributed L2here. The aggregated
SU throughput is defined as the sum throughput of all SUs
in one particular channel. Similarly, the aggregated collision
probability is the collision probability observed by the PU. For
comparison, we introduce a One-Band-One-Secondarysystem
(OBOS), where the SU has the same average packet length l2
and the collision constraint of the PU is equal to the aggregated
collision probability in the multi-band competitive system.
Fig. 6 illustrates the aggregated throughput of MSUs and
the collision probability of the PU when N=1. We can see
that, for fixed l2and under the same collision probability, the
aggregated throughput of MSUs is the same as the throughput
of the SU in an OBOS system. In other words, given the
same collision probability constraint, the system with multiple
SUs has no throughput loss/gain. This is reasonable, because
there is no collision between SUs under perfect sensing.
Since SUs are homogeneous, each SU achieves an equal
fraction (1
M)of the total throughput. We can also observe
that collision probability caused by one individual SU with
M>1is less than the collision probability with M=1.
This is due to the lower probability of the channel being
idle from the perspective of one SU. Additionally, each SU
contributes proportionally to the collision probability of the
PU, demonstrated by the almost linear increase of Pc
1with
respect to M.
1 2 3 4 5 6
0.02
0.04
0.06
0.08
0.1
0.12
Aggregated Throughput
Simulated Aggregated C2
Analytical C2 for M=1, N=1
1 2 3 4 5 6
0
0.05
0.1
0.15
0.2
Number of SUs: M
Aggregated P1
c
Aggregated P1
c
l1 = 0.5
v1 = 1
l2 = 0.1
v2 = 2.2
N = 1 C2 = 0.0822
P1
c = 0.1351
Fig. 6. Aggregated Throughput of SUs in VX scheme.
Next, we test a more general case where there are MSUs
and Nprimary bands with M=3N. Note that the primaries’
activities are i.i.d., and all SUs behave in the same way, the
performance is the same for all channels. Therefore, we only
show the results for one of Nchannels here. The aggregated
throughput of SUs and collision probability in each chan-
nel for Random-Sensing and All-Channel-Sensing strategies
are shown in Fig. 7. The results show that, the aggregated
throughput of SUs for both sensing strategies matches very
well with the throughput in the OBOS system under the
condition that they have the same collision probability for
each channel. If we adjust the values of l2and v2, such
that the aggregated collision probabilities caused by Random-
Sensing and All-Channel-Sensing strategies are the same, then
they will have the same throughput. This indicates that, All-
Channel-Sensing strategy does not improve the total spectral
efficiency, despite the added complexity. This is mainly due
to the memoryless characteristics of the idle time, rather than
the limitation that each SU can access one channel each time.
We also observe that, without dividing the available bands
explicitly among multiple SUs, the autonomous random access
performs the same as the coordinated method of organizing
SUs into separate groups, each assigned a group of spectral
bands. From the perspective of each secondary user, the total
throughput it can achieve is N
MN=N
3times the aggregated
throughput in each channel.
9
1 2 3 4 5 6 7 8
0.1
0.15
0.2
Aggregated Throughput
Random−Sensing
OBOS with Random−Sensing’s P1
c
All−Sensing
OBOS with All−Sensing’s P1
c
1 2 3 4 5 6 7 8
0.1
0.15
0.2
0.25
Number of Bands:N
Aggregated P1
c
Random−Sensing
All−Sensing
l1 = 0.5
v1 = 1
l2 = 0.1
M = 3N
Fig. 7. Aggregated Throughput of SUs with Multiple Primary Bands.
As a summary for multi-band multi-user systems, we have:
For the same collision probability constraint, the system
with multiple SUs has no loss/gain in terms of total
throughput.
Under the same collision probability constraint, sens-
ing all the frequency bands does not improve the total
throughput of SUs.
Dividing SUs into groups to access partitioned bands has
the same throughput as the strategy of allowing each SU
to randomly access all bands.
VI. CONCLUSIONS AND FUTURE WORK
In this paper, we study the data capacity of cognitive radio
users in opportunistic spectral access under stringent intru-
sion constraints on collision probability and the overlapping
collision time. Two random access schemes are proposed for
cognitive radio devices to exploit the spectral opportunities
in primary bands. We obtain closed-form expressions for the
collision probability of the PU and the capacity of the SU.
We show that the proposed random access schemes have
similar capacity performance. Furthermore, we find that the
collision probability and the overlapping time constraints are
closed related. SUs can utilize a significant amount of spectral
vacancy in the primary band under overlapping time constraint
when appropriate. In addition, we consider the overhead cost
in the SUs’ packets and demonstrate that an optimal trade-
off can be obtained for exponential and fixed packet length.
Finally, we investigate the aggregated throughput performance
and collision probability in a multi-band multi-secondary
system.
Our work provides a better understanding on the fun-
damental properties and performance limit of opportunistic
spectrum access. Future works in this direction may involve
the extension to systems with inaccurate sensing devices.
Imperfect sensing will induce collisions between different SUs
and hidden nodes problems in networks. Advanced signal
processing techniques in physical layers can also be integrated
in the design of media access schemes.
VII. ACKNOWLEDGMENT
This work is supported in part by the National Science
Foundation Grant CNS-0520126.
REFERENCES
[1] “Spectrum policy task force report,” Federal Communications Commi-
sion, Report, Et docket No. 02-135, November 2002.
[2] J. Yang, “Spatial channel characterization for cognitive radios,” MS
Thesis, UC Berkeley, 2004.
[3] “Facilitating opportunities for flexible, efficient, and reliable spectrum
use employing cognitive radio technologies, notice of proposed rule
making and order,” Federal Communications Commision, Report, Et
docket No. 03-322, December 2003.
[4] M. Marcus, “Real time spectrum markets and interruptible spectrum:
new concepts of spectrum use enabled by cognitive radio,” in First
IEEE International Symposium on Dynamic Spectrum Access Networks,
DySPAN, 2005, pp. 512– 517.
[5] S. Haykin, “Cognitive radio: brain-empowered wireless communica-
tions,” IEEE Journal on Selected Areas in Communications, vol. 23,
no. 2, pp. 201–220, 2005, 0733-8716.
[6] D. Raychaudhuri and X. Jing, “A spectrum etiquette protocol for efficient
coordination of radio devices in unlicensed bands,” in 14th IEEE
Proceedings on Personal, Indoor and Mobile Radio Communications
(PIMRC), vol. 1, 2003, pp. 172–176.
[7] D. Carbric, S. M. Mishra, D. Willkomm, R. Brodersen, and A. Wolisz,
“A cognitive radio approach for usage of virtual unlicensed spectrum,
in 14th IST Mobile and Wireless Communications Summit, 2005.
[8] Y. Yuan, P. Bahl, R. Chandra, P. A. Chou, J. I. Ferrell, T. Moscibroda,
S. Narlanka, and Y. Wu, “Knows: Cognitive radio networks over white
spaces,” in Second IEEE International Symposium onDynamic Spectrum
Access Networks, DySPAN, 2007, pp. 416–427.
[9] M. Buddhikot, P. Kolodzy, S. Miller, K. Ryan, and J. Evans, “Dim-
sumnet: New directions in wireless networking using coordinated
dynamic spectrum access,” in IEEE International Symposium on a
World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM),
aromina/Giardini Naxos, Italy, 2005.
[10] J. Huang, R. Berry, and M. Honig, “Auction-based spectrum sharing,”
to appear in ACM/Kluwer Journal of Mobile Networks and Applications
special issue on WiOpt’04., 2005.
[11] S. Gandhi, C. Buragohain, L. Cao, H. Zheng, and S. Suri, “A general
framework for wireless spectrum auctions,” in Second IEEE Interna-
tional Symposium on Dynamic Spectrum Access Networks, DySPAN,
2007, pp. 22–33.
[12] X. Jing, S.-C. Mau, D. Raychaudhuri, and R. Matyas, “Reactive cogni-
tive radio algorithms for co-existence between ieee 802.11b and 802.16a
networks,” in IEEE Globecom, St. Louis, MO, 2005.
[13] R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed
bands,” in First IEEE International Symposium on Dynamic Spectrum
Access Networks, DySPAN, Baltimore MD, 2005, pp. 251– 258.
[14] H. Jianwei, R. A. Berry, and M. L. Honig, “Spectrum sharing with
distributed interference compensation,” in First IEEE International Sym-
posium on Dynamic Spectrum Access Networks, DySPAN, 2005, pp. 88–
93.
[15] Q. Zhao, L. Tong, and A. Swami, “Decentralized cognitive mac for
dynamic spectrum access,” in First IEEE International Symposium on
Dynamic Spectrum Access Networks, DySPAN, 2005, pp. 224–232.
[16] A. C.-C. Hsu, D. S. L. Wei, and C. C. J. Kuo, “A cognitive mac protocol
using statistical channel allocation for wireless ad-hoc networks,” in
Proc. Wireless Communications and Networking Conference (WCNC),
2007, pp. 105–110.
[17] Q. Zhao, S. Geirhofer, L. Tong, and B. M. Sadler, “Optimal dynamic
spectrum access via periodic channel sensing,” in Proc. Wireless Com-
munications and Networking Conference (WCNC), 2007.
... Addressing blockchain technology offers the potential for decentralized, reliable, resilient and secure spectrum management by providing a transparent and tamper resistant ledger for recording spectrum transactions and ensuring trust among users [1], [2]. On the other hand, CR can identify underutilized or unused spectrum bands and opportunistically access them without causing harmful interference to PUs, who have primary rights to use those bands [1], [21]. ...
... Advanced spectrum sensing methods, energy detection, sequential energy detection, cyclostationary detection, and cooperative sensing, are available in the CR Module. This module is inspired by the CR module presented in [21]. It continuously scans various frequency bands for signals while monitoring the radio environment. ...
Article
Full-text available
The radio frequency spectrum serves as a fundamental resource for wireless communication, encompassing various frequency bands allocated for diverse services and applications. Dynamic spectrum management (DSM) is essential to optimise the utilisation of this limited and valuable natural resource, with the aim of improving performance and adapting to changing wireless communication demands. Traditional static spectrum allocation methods have shown inefficiencies, leading to spectrum scarcity and under-utilisation. To address these challenges, the integration of blockchain and Cognitive Radio (CR) technologies has emerged as a promising approach. Blockchain, with its decentralised and secure attributes, can improve transparency and trust in spectrum allocation processes, while CR enables intelligent spectrum sensing and allocation to maximise utilisation. However, this promising approach comes with its own critical challenges, especially when dealing with the 6th Generation (6G) mobile communication. These challenges are related to the fact that the blockchain ecosystem needs to be interoperable and scalable enough to be compatible with the 6G high-demand and substantial resources. Specifically, integrating blockchain with CR requires efficient interoperability techniques where blockchain can easily and effectively interact with the CR platforms as well as radio spectrum environments. Furthermore, the spectrum management system over 6G networks needs to be designed in a way where massive 6G resources can be accommodated and managed without having any service performance degradation. This paper introduces a novel radio spectrum management model in 6G networks, named as BSM-6G, which integrates blockchain technology with CR where interoperability is preserved and scalability is maximised. Specifically, the proposed BSM-6G model merges blockchain’s transparent record keeping with CR’s intelligent spectrum management capabilities. To overcome the interoperability issue, BSM-6G provides an interoperable blockchain Oracle approach which facilitates the real-time interaction among the blockchain platform, the CR, and any data sources off-chain. This paper details all the technical and procedural challenges when implementing the proposed interoperability Oracle approach. To address the scalability challenge, BSM-6G utilizes the Proof-of-History (PoH) consensus protocol to align with the requirements of DSM in advanced networks like Beyond 5th Generation (B5G) and 6G. Evaluation results indicate that BSM-6G offers viable and less complex blockchain Oracle integration architecture measured by the technical implementation of BSM-6G, as well as low interoperability cost measured by transaction response time and transaction fee cost. Compared to state-of-the-art spectrum-based blockchain systems, BSM-6G shows a high scalable DSM-based blockchain in 6G networks measured by transactions per second (TPS).
... In general, in most CRN studies, PU traffic is considered to be independent and is distributed identically through an OFF/ON process. [39][40][41] In this process, the ON and OFF states are indicative of whether the channel is in use or not. As evident, the OFF state means that the channel is not in use by PU, and an ON state indicates the contrary. ...
Article
Full-text available
Internet of Things (IoT) applications have massively increased in the last few years. Future‐generation IoTs are going to be massive in number, heterogeneous in nature, and extremely demanding in terms of computation and communication requirements. Therefore, effective techniques are needed to optimize the use of scarce communication resources. This work proposes a novel multi‐objective framework to investigate the channel assignment problem in cognitive radio network (CRN)‐based IoT applications. The multi‐objective optimization framework comprises three objective functions. The first objective aims to maximize the overall system throughput fairness, the second objective aims to maximize the overall system residual energy, and the third objective aims to increase the user satisfaction level by maximizing the overall priority index. The problem of channel assignment is modeled and solved using Mixed Integer Linear Programming (MILP) and ε$$ \varepsilon $$‐constraint technique. This technique generates a set of Pareto efficient solutions, and an optimal solution among these solutions is selected using a fuzzy logic decision mechanism. Moreover, power level selection is incorporated by solving the problem multiple times for different power levels and obtaining a preferred solution for each power level. The simulations are conducted to unveil an interesting trade‐off between the conflicting system design objectives, that is, the overall throughput and the overall residual energy while incorporating the significance of primary user (PU) activity when preforming channel assignment in CRN.
... This assumption holds in many situations. For example, the call arrival process for voice traffic can be modeled as a Poisson process, and the arrival process of a data session or the packet in a data network is also often Poissonian (Huang et al., 2008). If an SU arrives and finds the band in the on mode, it immediately occupies it and its transmission time is exponentially distributed with parameter μ s . ...
Article
Full-text available
Cognitive radio networks that accommodate primary users (PUs) and secondary users (SUs) are usually modeled using a queueing system that gives PUs absolute priority over SUs. Under the back-off protocol, if a PU enters a band that is currently in use by an SU, the SU’s transmission is interrupted and the interrupted SU either (1) stays on the band ready to resume service after the PU’s transmission ends, (2) reattempts to associate with the current band at a later time (ISR), or (3) gets discarded by the system (ISD). In this paper, we compare these three service mechanisms from the perspectives of (a) effectiveness (i.e., the throughput of PU requests), (b) fairness among SUs and (c) the social welfare of the system. We first consider a system with non-strategic SUs to procure the system characteristics with which to make comparisons. The counterpart system with strategic SUs is then investigated, which includes SU joining strategies for both cooperative and non-cooperative scenarios. Our comparison results indicate that when SUs are non-strategic the ISD mechanism performs best. When SUs are strategic (i.e., when they choose to join the system or not by weighing up the waiting cost against any reward or compensation), the ISD mechanism still brings the greatest social welfare for both the cooperative and non-cooperative strategies. However, the ISD mechanism performs best in terms of effectiveness only when the ratio of the reward or compensation to the waiting cost is greater than a certain threshold; when the ratio is below this threshold, the ISR mechanism is best. Regarding fairness among SUs, the ISD mechanism performs best when SUs adopt uncooperative joining strategies, but no clear result is found when the SUs follow cooperative strategies. For this scenario, we carry out numerical experiments to show how the optimal mechanism changes as the system parameters vary.
... In many application domains, possible actions have a certain combinatorial structure. For example, each action may be a size-k subset of keywords in online advertisements (Rusmevichientong and Williamson 2006), or an assignment between workers and tasks in crowdsourcing , or a spanning tree in communication networks (Huang, Liu, and Ding 2008). To deal with such a combinaotrial action space, the model of combinatorial pure exploration of multiarmed bandits (CPE-MB) was first proposed by . ...
Article
In this paper, we first study the problem of combinatorial pure exploration with full-bandit feedback (CPE-BL), where a learner is given a combinatorial action space X \subseteq {0,1}^d, and in each round the learner pulls an action x \in X and receives a random reward with expectation x^T \theta, with \theta \in \R^d a latent and unknown environment vector. The objective is to identify the optimal action with the highest expected reward, using as few samples as possible. For CPE-BL, we design the first polynomial-time adaptive algorithm, whose sample complexity matches the lower bound (within a logarithmic factor) for a family of instances and has a light dependence of \Delta_min (the smallest gap between the optimal action and sub-optimal actions). Furthermore, we propose a novel generalization of CPE-BL with flexible feedback structures, called combinatorial pure exploration with partial linear feedback (CPE-PL), which encompasses several families of sub-problems including full-bandit feedback, semi-bandit feedback, partial feedback and nonlinear reward functions. In CPE-PL, each pull of action x reports a random feedback vector with expectation of M_x \theta , where M_x \in R^{m_x \times d} is a transformation matrix for x, and gains a random (possibly nonlinear) reward related to x. For CPE-PL, we develop the first polynomial-time algorithm, which simultaneously addresses limited feedback, general reward function and combinatorial action space (e.g., matroids, matchings and s-t paths), and provide its sample complexity analysis. Our empirical evaluation demonstrates that our algorithms run orders of magnitude faster than the existing ones, and our CPE-BL algorithm is robust across different \Delta_min settings while our CPE-PL algorithm is the first one returning correct answers for nonlinear reward functions.
... Furthermore, the need for wireless and mobile data has increased due to the heavy use of personal digital assistants (PDAs), smart phones and tablets that allows the exchange of data either by voice or video through geographical and time boundaries. Therefore, it is necessary to introduce the CRN as an intelligent technology that can adapt to the time-varying radio frequency (RF) environment for covering the urgent demand for higher data rates and wider bandwidth [10,11]. This paper proposes an analytical paradigm fitting fast mobile environment to examine the performance analysis of vehicular dual-hop CRN with amplify and forward (AF) relay over Nakagami-channels, with < 1 distribution model with intelligent resource management schemes that are designed for fixed, nomadic, and mobile communication. ...
Preprint
Full-text available
Cognitive relay network is a spectrum dynamic paradigm that exploits the unused portions of the licensed spectrum. This is based on merging both cooperative relaying techniques and cognitive radio network to achieve spectrum efficiency and enhance the overall system performance. In this paper, the presence of mobile users at the destination node is considered. Here, the end users can navigate at relatively fast vehicular velocities causing dynamic multipath fading and high Doppler shift. which can be fairly modeled using Nakagami- m fading channel (i.e., m < 1). In a spectrum scarcity environment, a secondary user must deploy an optimal power allocation policy to get higher transmission rates while the overall interference affecting the primary user (PU) is kept below a certain threshold value. In particular, the outage probability performance is studied over the mixed Rayleigh and Nakagami- m fading channels for different scenarios based on the statistical characteristics of signal-to-noise ratio. The first scenario is the cognitive dual hop amplify and forward relay network over independent and non-identical (i.n.i.d) distributed mixed fading channels. In the second scenario, the cognitive relay network consists of a single amplify and forward relay in addition to the direct link transmission with a selection combining at the destination over i.n.i.d distributed mixed fading channels. Numerical results are presented to evaluate the impact of the fading parameter, m , the maximum aggregated intrusion constraint, and the locations of the primary users (PUs) on different channel scenarios at high vehicular speeds.
Thesis
Full-text available
To cite this version: Munguakonkwa Emmanuel Migabo. Energy efficient and scalable channel coding and clustering approach for narrowband internet of things (NB-IoT). Modeling and Simulation. Université Paris-Est; Tshwane University of Technology, 2021. English. NNT : 2021PESC0043. tel-03648532
Thesis
The Narrowband-Internet of Things (NB-IoT) is one of the leading licensed Low Power Wide Area Networks (LPWANs) that is expected to play a very important role in connecting the exponentially increasing number of connected devices that make up the Internet of Things (IoT). To enable its network scalability, NB-IoT requires more efficient utilization of its limited energy, channel capacity, and spectrum network resources. These characteristics place various constraints in terms of the design of the physical (PHY) channel coding and spectrum access as well as the network layer protocol for the NB-IoT. A few existing channel coding approaches have been proposed to enhance the NB-IoT’s network reliability, and therefore, enable long-distance transmissions. However, most of the existing NB-IoT channel coding approaches are based on repeating transmission data and control signals and do not consider the channel conditions. Although these repetitions ensure network reliability, they are energy expensive and compromise the performance of the data rate of the network. At the same time, the increasing number of devices to be handled by a single Base Station (BS) within a cell increases the probability for interlink interference which compromises the uplink communication reliability, further increases the number of required data transmission repetitions, and therefore, reduces the overall energy efficiency of the network. To mitigate these identified problems, a multi-layer approach is proposed in this study. Firstly, a channel-aware two-dimensional Energy-Efficient Adaptive Channel Coding (EEACC) approach is considered at the PHY layer. The EEACC not only selects an appropriate modulation coding scheme (MCS) based on the estimated channel conditions (dynamically classified as bad, medium or good based on a periodically assessed BLER performance outcome) but also minimizes the transmission repetition number under a pre-assessed probability of successful transmission. Secondly, at the PHY and network layers, the study considers a two-layers NB-IoT mixed spread spectrum and clustering approach with network coding (N-MANC). At one layer, the approach uses an Adaptive Frequency Hopping Spread Spectrum (AFHSS) technique that uses a lightweight and secure pseudo-random sequence with a varying period T depending on the number of NB-IoT nodes in the considered cell to exploit the channel diversity as a way to mitigate inter-link and cross-technology interference. At the second layer, the mixed approach consists of a cooperative clustering approach based on a defined energy-signal strength gradient used for Cluster Head (CHs) selection, and a network coding (data aggregation) to further boost the overall energy efficiency of the network. A systematic mathematical model of the NB-IoT PHY layer is first developed and modelled. Then, the proposed algorithms are implemented and validated in MATLAB. The obtained simulation results demonstrate that the important QoS metrics such as energy efficiency, network reliability, data rate, transmission latency, network scalability, and lifetime are improved by the proposed algorithms when compared to existing approaches.
Article
Full-text available
Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.
Article
Network slicing (NS) management devotes to providing various services to meet distinct requirements over the same physical communication infrastructure and allocating resources on demands. Considering a dense cellular network scenario that contains several NS over multiple base stations (BSs), it remains challenging to design a proper real-time inter-slice resource management strategy, so as to cope with frequent BS handover and satisfy the fluctuations of distinct service requirements. In this paper, we propose to formulate this challenge as a multi-agent reinforcement learning (MARL) problem in which each BS represents an agent. Then, we leverage graph attention network (GAT) to strengthen the temporal and spatial cooperation between agents. Furthermore, we incorporate GAT into deep reinforcement learning (DRL) and correspondingly design an intelligent real-time inter-slice resource management strategy. More specially, we testify the universal effectiveness of GAT for advancing DRL in the multi-agent system, by applying GAT on the top of both the value-based method deep Q-network (DQN) and a combination of policy-based and value-based method advantage actor-critic (A2C). Finally, we verify the superiority of the GAT-based MARL algorithms through extensive simulations.
Article
Full-text available
While essentially all of the frequency spectrum is allocated to different applications, observations provide evidence that usage of the spectrum is actually quite limited, particularly in bands above 3 GHz. In this paper we present a Cognitive Radio approach for usage of Virtual Unlicensed Spectrum (CORVUS), a vision of a Cognitive Radio (CR) based approach that uses allocated spectrum in a opportunistic manner to create "virtual unlicensed bands" i.e. bands that are shared with the primary (often licensed) users on a non-interfering basis. Dynamic spectrum management techniques are used to adapt to immediate local spectrum availability. We define the system requirements for this approach, as well as the general architecture and basic physical and link layer functions of CORVUS.
Conference Paper
Full-text available
The MAC protocol of a cognitive radio (CR) device should allow it to access unused or under-utilized spectrum without (or with minimal) interference to primary users dynamically. To fulfill such a goal, we propose a cognitive MAC protocol using statistical channel allocation and call it SCA-MAC in this work. SCA-MAC is a CSMA/CA-based protocol, which exploits statistics of spectrum usage for decision making on channel access. For each transmission, the sender negotiates with the receiver on transmission parameters through the control channel. A model is developed for CR devices to evaluate the successful rate of transmission. A CR device should pass the threshold of the successful transmission rate via negotiation before it can begin a valid transmission on data channels. The operating range and channel aggregation are two control parameters introduced to maintain the MAC performance. To validate our ideas, we conducted theoretical analysis and simulations to show that SCA-MAC does improve the throughput performance and guarantee the interference to incumbents to be bounded by a predetermined acceptable rate. The proposed MAC protocol does not need a centralized controller, as the negotiation between the sender and the receiver is performed using the CSMA/CA-based algorithm.
Conference Paper
Full-text available
The problem of dynamically accessing a set of parallel channels occupied by primary users is considered. The secondary user is allowed to sense and to transmit in a single channel. By exploiting idle periods between bursty transmissions of primary users, and by using a periodic sensing strategy, optimal dynamic access is achieved by maximizing the throughput of the secondary user while constraining collision probability with the primary user. The optimal dynamic spectrum access problem can then be formulated within the framework of constrained Markov decision processes (CMDPs). The optimal control policy is identified via a linear program, and its performance is analyzed numerically and through Monte Carlo simulations. Finally, we compare the optimal scheme to an ideal benchmark case when simultaneous sensing of all channels is assumed.
Article
Full-text available
We study auction-based mechanisms for sharing spectrum among a group of users, subject to a constraint on the interference temperature at collocated receivers. The users access the channel using spread spectrum signaling and thus generate interference with each other. Each user receives a utility that is a function of the received signal-tointerference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an SINR-based auction, which, when combined with logarithmic utilities, leads to a weighted max-min fair SINR allocation. The second is a power-based auction that maximizes the total utility when the bandwidth is large enough. Both auction mechanisms achieve social optimality in a large system limit where bandwidth, power and the number of users are increased in a fixed proportion. We also give su#cient conditions for global convergence of a distributed updating algorithm and discuss the convergence speed.
Conference Paper
Full-text available
FCC has proposed to allow unlicensed operations in the TV broadcast bands. This portion of the spectrum has several desirable properties for more robust data communication as compared to the ISM bands. However, there are a number of challenges in efficiently using the TV bands. For example, the available spectrum is fragmented, and its availability may vary over time. In this paper, we present a cognitive radio system, called KNOWS, to address these challenges. We present the design of our prototype, which includes a new hardware platform and a spectrum-aware Medium Access Control (MAC) protocol. We have implemented the MAC protocol in QualNet, and our results show that in most scenarios KNOWS increases the throughput by more than 200% when compared to an IEEE 802.11 based system.
Conference Paper
Full-text available
We propose a real-time spectrum auction framework to distribute spectrum among a large number wireless users under interference constraints. Our approach achieves conflict-free spectrum allocations that maximize auction revenue and spectrum utilization. Our design includes a compact and yet highly expressive bidding language, various pricing models to control tradeoffs between revenue and fairness, and fast auction clearing algorithms to compute revenue-maximizing prices and allocations. Both analytical and experimental results verify the efficiency of the proposed approach. We conclude that bidding behaviors and pricing models have significant impact on auction outcomes. A spectrum auction system must consider local demand and spectrum availability in order to maximize revenue and utilization.
Article
While essentially all of the frequency spectrum is allocated to different applications, observations provide evidence that usage of the spectrum is actually quite limited, particularly in bands above 3 GHz. In this paper we present a Cognitive Radio approach for usage of Virtual Unlicensed Spectrum (CORVUS), a vision of a Cognitive Radio (CR) based approach that uses allocated spectrum in a opportunistic manner to create "virtual unlicensed bands" i.e. bands that are shared with the primary (often licensed) users on a non-interfering basis. Dynamic spectrum management techniques are used to adapt to immediate local spectrum availability. We define the system requirements for this approach, as well as the general architecture and basic physical and link layer functions of CORVUS.