Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models

Cognitive radio networking (CRN) is a promising technology to improve the spectrum utilization by allowing secondary users (unlicensed users) to opportunistically access white space (spectrum holes) in licensed bands. Monitoring the detailed characteristics of an operational cognitive radio network is critical to many system administrative tasks. However, very limited work has been done in this area. In this paper, we study the passive secondary user monitoring problem in an unslotted cognitive radio network, where the users’ traffic statistics are unknown in priori. We formulate the problem as a multi-armed bandit (MAB) problem with weighted virtual reward. We propose a dynamic sniffer-channel assignment policy to capture as much as interested user data. Simulation results show that the proposed policy can achieve a logarithmic regret with relative scalability.

[1]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[2]  Jonathan S. Adelstein Statement of commissioner Jonathan S. Adelstein, Re: Unlicensed operation in the TV broadcast bands; second report and order and memorandum opinion and order, ET Docket no. 04-186 , 2010 .

[3]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[4]  Bhaskar Krishnamachari,et al.  Decentralized multi-armed bandit with imperfect observations , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  Lang Tong,et al.  Low-complexity distributed spectrum sharing among multiple cognitive users , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[6]  R. Agrawal Sample mean based index policies by O(log n) regret for the multi-armed bandit problem , 1995, Advances in Applied Probability.

[7]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[8]  Jianfeng Wang,et al.  Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.

[9]  H. Robbins Some aspects of the sequential design of experiments , 1952 .

[10]  T. L. Lai Andherbertrobbins Asymptotically Efficient Adaptive Allocation Rules , 2022 .

[11]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[12]  Rong Zheng,et al.  Sequential learning for optimal monitoring of multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[14]  Rong Zheng,et al.  On Quality of Monitoring for Multichannel Wireless Infrastructure Networks , 2010, IEEE Transactions on Mobile Computing.

[15]  Lang Tong,et al.  Multi-channel opportunistic spectrum access in unslotted primary systems with unknown models , 2011, 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[16]  Prasant Mohapatra,et al.  Efficient data capturing for network forensics in cognitive radio networks , 2011, 2011 19th IEEE International Conference on Network Protocols.

[17]  Moustafa Youssef,et al.  A framework for wireless LAN monitoring and its applications , 2004, WiSe '04.

[18]  H. Vincent Poor,et al.  Cognitive Medium Access: Exploration, Exploitation, and Competition , 2007, IEEE Transactions on Mobile Computing.

[19]  D. Morgan,et al.  Cost and competition , 1986 .