Deterministic Blind Rendezvous in Cognitive Radio Networks

Blind rendezvous is a fundamental problem in cognitive radio networks. The problem involves a collection of agents (radios) that wish to discover each other (i.e., rendezvous) in the blind setting where there is no shared infrastructure and they initially have no knowledge of each other. Time is divided into discrete slots and spectrum is divided into discrete channels, [n] = 1, 2, ..., n. Each agent may access (or hop on) a single channel in a single time slot and two agents rendezvous when they hop on the same channel in the same time slot. The goal is to design deterministic channel hopping schedules for each agent so as to guarantee rendezvous between any pair of agents with access to overlapping sets of channels. The problem has three complicating considerations: first, the agents are asymmetric, i.e., each agent Ai only has access to a particular subset Si ⊂ [n] of the channels and different agents may have access to different subsets of channels (clearly, two agents can rendezvous only if their channel subsets overlap), second, the agents are synchronous, i.e., they do not possess a common sense of absolute time, so different agents may commence their channel schedules at different times (they do have a common sense of slot duration), lastly, agents are anonymous i.e., they do not possess an identity, and hence the schedule for Ai must depend only on Si. Whether guaranteed blind rendezvous in the asynchronous model was even achievable was an open problem. In a recent breakthrough, two independent sets of authors, Shin et al. (Communications Letters, 2010) and Lin et al. (INFOCOM, 2011), gave the first constructions guaranteeing asynchronous blind rendezvous in O (n2) and O (n3) time, respectively. We present a substantially improved and conceptually simpler construction guaranteeing that any two agents, Ai, Aj, will rendezvous in O (|Si||Sj| log log n) time. Our results are the first that achieve nontrivial dependence on |Si|, the sizes of the sets of available channels. This allows us, for example, to save roughly a quadratic factor over the best previous results in the important case when channel subsets have constant size. We also achieve the best possible bound of O (1) rendezvous time for the symmetric situation, previous works could do no better than O (n). Using techniques from the probabilistic method and Ramsey theory we establish that our construction is nearly optimal: we show both an Ω (|Si||Sj|) lower bound and an Ω(log log n) lower bound when |Si|, |Sj| ≤ n/2.

[1]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[2]  Luiz A. DaSilva,et al.  Rendezvous for Cognitive Radios , 2011, IEEE Transactions on Mobile Computing.

[3]  L.A. DaSilva,et al.  Sequence-Based Rendezvous for Dynamic Spectrum Access , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[4]  Donald E. Knuth,et al.  Efficient balanced codes , 1986, IEEE Trans. Inf. Theory.

[5]  Andrzej Pelc,et al.  Deterministic rendezvous in networks: A comprehensive survey , 2012, Networks.

[6]  Shmuel Gal,et al.  The theory of search games and rendezvous , 2002, International series in operations research and management science.

[7]  Lei Zhang,et al.  Neighbor discovery for wireless networks via compressed sensing , 2010, Perform. Evaluation.

[8]  Michael O. Rabin,et al.  Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..

[9]  Jongmin Shin,et al.  A Channel Rendezvous Scheme for Cognitive Radio Networks , 2010, IEEE Communications Letters.

[10]  Béla Bollobás,et al.  Littlewood's Miscellany , 1986 .

[11]  IndykPiotr A Small Approximately Min-Wise Independent Family of Hash Functions , 2001 .

[12]  Zhaoquan Gu,et al.  Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[13]  Jae Wook Shin,et al.  Deterministic rendezvous scheme in multichannel access networks , 2010 .

[14]  Ueli Maurer,et al.  Tight security proofs for the bounded-storage model , 2002, STOC '02.

[15]  David P. Williamson,et al.  Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming , 1995, JACM.

[16]  Andrzej Pelc,et al.  The Wakeup Problem in Synchronous Broadcast Systems , 2000, SIAM J. Discret. Math..

[17]  Piotr Indyk,et al.  A small approximately min-wise independent family of hash functions , 1999, SODA '99.

[18]  P. Varaiya,et al.  Differential games , 1971 .

[19]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[20]  Hai Liu,et al.  Taxonomy and challenges of rendezvous algorithms in cognitive radio networks , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[21]  Mun Choon Chan,et al.  Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.

[22]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[23]  Hai Liu,et al.  Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks , 2011, 2011 Proceedings IEEE INFOCOM.

[24]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[25]  J. Spencer Ramsey Theory , 1990 .

[26]  Brian M. Sadler,et al.  Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy , 2006, ArXiv.

[27]  S. Bhogle,et al.  LITTLEWOOD'S MISCELLANY , 1990 .

[28]  Hai Liu,et al.  Ring-Walk Based Channel-Hopping Algorithms with Guaranteed Rendezvous for Cognitive Radio Networks , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.