Proportional and double imitation rules for spectrum access in cognitive radio networks

نویسندگان

  • Stefano Iellamo
  • Lin Chen
  • Marceau Coupechoux
چکیده

In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SU) ac-cess the frequency channels partially occupied by the licensed Primary Users(PU). Each channel is characterized by an availability probability unknown tothe SUs. We apply population game theory to model the spectrum access prob-lem and develop distributed spectrum access policies based on imitation, a be-havior rule widely applied in human societies consisting of imitating successfulbehaviors. We develop two imitation-based spectrum access policies based onthe basic Proportional Imitation (PI) rule and the more advanced Double Imi-tation (DI) rule given that a SU can only imitate the other SUs operating on thesame channel. A systematic theoretical analysis is presented for both policies onthe induced imitation dynamics and the convergence properties of the proposedpolicies to the Nash Equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solelylocal interactions and thus is especially suited in decentralized adaptive learning IThis work is supported by the project TEROPP (technologies for TERminal in OPPor-tunistic radio applications) funded by the French National Research Agency (ANR).∗Corresponding authorEmail addresses: [email protected] (Stefano Iellamo),[email protected] (Lin Chen), [email protected] (MarceauCoupechoux) Preprint submitted to Computer NetworksMarch 7, 2013 environments as cognitive radio networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks

In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks,where the unlicensed Secondary Users (SU) access the frequency channels partially occupied by the licensedPrimary Users (PU). Each channel is characterized by an availability probability unknown to the SUs. We applyevolutionary game theory to model the spectrum access proble...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 57  شماره 

صفحات  -

تاریخ انتشار 2013