Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks

To cope with the exploding mobile traffic in the fifth generation cellular network, the dense deployment of small cells and cognitive radios are two key technologies that significantly increase the network capacity and improve the spectrum utilization efficiency. Despite the desirable features, small cell cognitive radio networks (SCRNs) also face a higher risk of unauthorized spectrum access, which should not be overlooked. In this paper, we consider a passive monitoring system for SCRNs, which deploys sniffers for wireless traffic capture and network forensics, and study the optimal sniffer channel assignment (SCA) problem to maximize the monitoring performance. Unlike most existing SCA approaches that concentrate on user activity, we highlight the inherent error in wireless data capture (i.e. imperfect monitoring) due to the unreliable nature of wireless propagation, and propose an online-learning based algorithm called OSA (Online Sniffer-channel Assignment). OSA is a type of contextual combinatorial multi-armed bandit learning algorithm, which addresses key challenges in SCRN monitoring including the time- varying spectrum resource, imperfect monitoring, and uncertain network conditions. We theoretically prove that OSA has a sublinear learning regret bound and illustrate via simulations that OSA significantly outperforms benchmark solutions.

[1]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[2]  Valentin Rakovic,et al.  Medium Access Control Protocols in Cognitive Radio Networks: Overview and General Classification , 2014, IEEE Communications Surveys & Tutorials.

[3]  Saurabh Bagchi,et al.  Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.

[4]  José Marinho,et al.  Cognitive radio: survey on communication protocols, spectrum decision issues, and future research directions , 2011, Wireless Networks.

[5]  Jan Vondrák,et al.  Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..

[6]  Tao Jiang,et al.  Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[7]  Rong Zheng,et al.  Sequential learning for optimal monitoring of multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Dan Wang,et al.  Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks , 2019, IEEE Wireless Communications.

[9]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[10]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[11]  Prasant Mohapatra,et al.  Efficient data capturing for network forensics in cognitive radio networks , 2011, 2011 19th IEEE International Conference on Network Protocols.

[12]  Chang-Tien Lu,et al.  Non-parametric passive traffic monitoring in cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.

[13]  Guoliang Xing,et al.  Passive interference measurement in Wireless Sensor Networks , 2010, The 18th IEEE International Conference on Network Protocols.

[14]  Vera Stavroulaki,et al.  5G on the Horizon: Key Challenges for the Radio-Access Network , 2013, IEEE Vehicular Technology Magazine.

[15]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[16]  Mingyan Liu,et al.  Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks , 2016, IEEE Transactions on Wireless Communications.

[17]  Andreas Krause,et al.  Interactive Submodular Bandit , 2017, NIPS.

[18]  Rong Zheng,et al.  On Quality of Monitoring for Multichannel Wireless Infrastructure Networks , 2014, IEEE Trans. Mob. Comput..

[19]  Wei Chu,et al.  A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.

[20]  Geoffrey Ye Li,et al.  Joint User Association and Spectrum Allocation for Small Cell Networks With Wireless Backhauls , 2016, IEEE Wireless Communications Letters.

[21]  Mingyan Liu,et al.  Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty , 2014, 2014 IEEE Military Communications Conference.

[22]  Jie Xu,et al.  Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward , 2018, NeurIPS.

[23]  Rajdeep Niyogi,et al.  Network forensic frameworks: Survey and research challenges , 2010, Digit. Investig..

[24]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[25]  Prasant Mohapatra,et al.  Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.

[26]  Rong Zheng,et al.  Sequential Learning for Multi-Channel Wireless Network Monitoring With Channel Switching Costs , 2014, IEEE Transactions on Signal Processing.

[27]  T. L. Lai Andherbertrobbins Asymptotically Efficient Adaptive Allocation Rules , 2022 .

[28]  Geng Wu,et al.  5G Network Capacity: Key Elements and Technologies , 2014, IEEE Vehicular Technology Magazine.

[29]  Chunxiao Jiang,et al.  Resource Allocation for Cognitive Small Cell Networks: A Cooperative Bargaining Game Theoretic Approach , 2015, IEEE Transactions on Wireless Communications.

[30]  Jie Xu,et al.  Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[31]  Carlo Fischione,et al.  Millimeter Wave Cellular Networks: A MAC Layer Perspective , 2015, IEEE Transactions on Communications.

[32]  Cornelis H. Slump,et al.  Cognitive Small Cell Networks: Energy Efficiency and Trade-Offs , 2013, IEEE Transactions on Communications.