Abstract
In this chapter, we will design distributed spectrum access mechanism based on imitation, which is also a common phenomenon in many social animal and human interactions [1].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For ease of exposition, we adopt the backoff mechanism as an example. Our analysis can apply to many other medium access control (MAC) schemes such as TDMA.
- 2.
Note that in general the length of a mini-slot is much smaller than the length of spectrum sensing and access period in a time slot. For example, for IEEE 802.11af systems (also known as WhiteFi Networks), the length of a mini-slot is \(4\) microseconds and the spectrum sensing duration is \(0.5\) milliseconds [7].
- 3.
There are several approaches for establishing a common control channel in cognitive radio networks, e.g., sequence-based rendezvous [11], adaptive channel hopping [12] and user grouping [13]. Please refer to [14] for a comprehensive survey on the research of common control channel establishment in cognitive radio networks.
References
W. Wyrwicka, Imitation in Human and Animal Behavior (Transaction Publishers, New Brunswick, 1996)
K. Schlag, Why imitate, and if so, how? a boundedly rational approach to multi-armed bandits. J. Econ. Theory 78, 130–156 (1998)
M. Lopes, F.S. Melo, L. Montesano, Affordance-based imitation learning in robots, in IEEE/RSJ International Conference on Intelligent Robots and Systems (2007)
S. Iellamo, L. Chen, M. Coupechoux, Let cognitive radios imitate: imitation-based spectrum access for cognitive radio networks, Technical Report, arXiv:1101.6016 (2011)
X. Chen, J. Huang, Imitation-based social spectrum sharing. IEEE Trans. Mob. Comput. (2014). http://arxiv.org/pdf/1405.2822v1.pdf
P. Gupta, P. Kumar, The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)
A.B. Flores, R.E. Guerra, E.W. Knightly, P. Ecclesine, S. Pandey, IEEE 802.11 af: a standard for TV white space spectrum sharing. IEEE Commun. Mag. 51(10), 92–100 (2013)
R.J. Drost, R.D. Hopkins, R. Ho, I.E. Sutherland, Proximity communication. IEEE J. Solid-State Circuits 39(9), 1529–1535 (2004)
L. Anderegg, S. Eidenbenz, Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, in 9th Annual International Conference on Mobile Computing And Networking (2003)
P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced Communications and Multimedia Security (2002)
L.A. DaSilva, I. Guerreiro, Sequence-based rendezvous for dynamic spectrum access, in 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (2008)
K. Bian, J.-M. Park, R. Chen, Control channel establishment in cognitive radio networks using channel hopping. IEEE J. Sel. Areas Commun. 29(4), 689–703 (2011)
L. Lazos, S. Liu, M. Krunz, Spectrum opportunity-based control channel assignment in cognitive radio networks, in 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (2009)
B. Lo, A survey of common control channel design in cognitive radio networks. Phys. Commun. 4, 40–62 (2011)
R. Zhang, Y. Zhang, J. Sun, G. Yan, Fine-grained private matching for proximity-based mobile social networking, in IEEE INFOCOM (2012)
M. Von Arb, M. Bader, M. Kuhn, R. Wattenhofer, Veneta: serverless friend-of-friend detection in mobile social networking, in IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2008)
B. Cohen, Incentives build robustness in bittorrent. Workshop Econ. Peer-to-Peer Syst. 6, 68–72 (2003)
T. Ferguson, A Course in Large Sample Theory (Chapman and Hall, London, 1996)
C. Alós-Ferrer, S. Weidenholzer, Contagion and efficiency. J. Econ. Theory 143(1), 251–274 (2008)
J. Scott, Social network analysis. Sociology 22(1), 109 (1988)
M. Benam, J. Weibull, Deterministic approximation of stochastic evolution in games. Econometrica 71, 873–903 (2003)
R. Jain, D. Chiu, W. Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer systems, DEC Research Report TR-301 (1984)
M. Lopez-Benitez, F. Casadevall, Empirical time-dimension model of spectrum use based on a discrete-time markov chain with deterministic and stochastic duty cycle models. IEEE Trans. Veh. Technol. 60(6), 2519–2533 (2011)
H. Li, Multi-agent Q-learning for competitive spectrum access in cognitive radio systems, in Fifth IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks (2010)
A. Anandkumar, N. Michael, A. Tang, Opportunistic spectrum access with multiple users: learning under competition, in IEEE INFOCOM (2010)
T. Rappaport, Wireless Communications: Principles and Practice, vol. 2 (Prentice Hall PTR, New Jersey, 1996)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Chen, X., Huang, J. (2015). Imitative Spectrum Access Mechanism. In: Social Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-15215-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-15215-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15214-1
Online ISBN: 978-3-319-15215-8
eBook Packages: EngineeringEngineering (R0)