SPA: Almost Optimal Accessing of Nonstochastic Channels in Cognitive Radio Networks

In this work, we address the spectrum utilization problem in cognitive radio (CR) networks, in which a CR can only utilize spectrum opportunities when the channel is idle. One challenge for a CR is to balance exploring new channels and exploiting existing channel, due to the fact that the channel availability and channel quality, potentially heterogeneous and time-dependent, are often unknown in advance due to the large number of channels, and the limited hardware capability of single CR. In this work, we propose joint channel sensing, probing, and accessing schemes for secondary users in cognitive radio networks. Our method has time and space complexity O(N · u) for a network with N channels and u secondary users, while applying classic methods requires exponential time complexity. We prove that, even when channel states are selected by adversary (thus nonstochastic), it results in a total regret uniformly upper bounded by Θ(√TN log N), w.h.p, for communication lasts for T timeslots. Our protocol can be implemented in a distributed manner due to the nonstochastic channel assumption. Our experiments show that our schemes achieve almost optimal throughput compared with an optimal static strategy, and perform significantly better than previous methods in many settings.

[1]  Gábor Lugosi,et al.  Minimizing regret with label efficient prediction , 2004, IEEE Transactions on Information Theory.

[2]  Yi Gai,et al.  Learning Multiuser Channel Allocations in Cognitive Radio Networks: A Combinatorial Multi-Armed Bandit Formulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[3]  Shaojie Tang,et al.  Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks , 2011, IEEE Transactions on Computers.

[4]  Gaurav Kasbekar,et al.  Opportunistic medium access in multi-channel wireless systems: A learning approach , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  Shie Mannor,et al.  PAC Bounds for Multi-armed Bandit and Markov Decision Processes , 2002, COLT.

[6]  Shaojie Tang,et al.  Truthful online spectrum allocation and auction in multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Xia Zhou,et al.  TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.

[8]  T. L. Lai Andherbertrobbins Asymptotically Efficient Adaptive Allocation Rules , 2022 .

[9]  Zhi Ding,et al.  Opportunistic spectrum access in cognitive radio networks , 2008, IJCNN.

[10]  Xiang-Yang Li,et al.  TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks , 2011, IEEE/ACM Transactions on Networking.

[11]  Xia Zhou,et al.  eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.

[12]  Xiang-Yang Li,et al.  Online market driven spectrum scheduling and auction , 2009, CoRoNet '09.

[13]  Xiang-Yang Li,et al.  SALSA: Strategyproof Online Spectrum Admissions for Wireless Networks , 2010, IEEE Transactions on Computers.

[14]  Xiang-Yang Li,et al.  SOFA: Strategyproof Online Frequency Allocation for Multihop Wireless Networks , 2009, ISAAC.

[15]  Shaojie Tang,et al.  Spectrum Bidding in Wireless Networks and Related , 2008, COCOON.

[16]  Marwan Krunz,et al.  Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors , 2009, MobiCom '09.

[17]  Mingyan Liu,et al.  Online learning in opportunistic spectrum access: A restless bandit approach , 2010, 2011 Proceedings IEEE INFOCOM.

[18]  Dan Xu,et al.  Opportunistic spectrum access in cognitive radio networks: when to turn off the spectrum sensors , 2008, WICON.

[19]  Nicolò Cesa-Bianchi,et al.  Gambling in a rigged casino: The adversarial multi-armed bandit problem , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[20]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.

[21]  Zhongcheng Li,et al.  Almost Optimal Channel Access in Multi-Hop Networks with Unknown Channel Variables , 2013, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[22]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[23]  Zhi Ding,et al.  Optimal Sensing-Transmission Structure for Dynamic Spectrum Access , 2009, IEEE INFOCOM 2009.

[24]  XiaoHua Xu,et al.  TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[25]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[26]  Ao Tang,et al.  Opportunistic Spectrum Access with Multiple Users: Learning under Competition , 2010, 2010 Proceedings IEEE INFOCOM.

[27]  Qing Zhao,et al.  Decentralized multi-armed bandit with multiple distributed players , 2010, 2010 Information Theory and Applications Workshop (ITA).

[28]  A. Cox Optimal Stopping and Applications , 2009 .