Skip to main content

Imitative Spectrum Access Mechanism

  • Chapter
  • First Online:
Social Cognitive Radio Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 566 Accesses

Abstract

In this chapter, we will design distributed spectrum access mechanism based on imitation, which is also a common phenomenon in many social animal and human interactions [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For ease of exposition, we adopt the backoff mechanism as an example. Our analysis can apply to many other medium access control (MAC) schemes such as TDMA.

  2. 2.

    Note that in general the length of a mini-slot is much smaller than the length of spectrum sensing and access period in a time slot. For example, for IEEE 802.11af systems (also known as WhiteFi Networks), the length of a mini-slot is \(4\) microseconds and the spectrum sensing duration is \(0.5\) milliseconds [7].

  3. 3.

    There are several approaches for establishing a common control channel in cognitive radio networks, e.g., sequence-based rendezvous [11], adaptive channel hopping [12] and user grouping [13]. Please refer to [14] for a comprehensive survey on the research of common control channel establishment in cognitive radio networks.

References

  1. W. Wyrwicka, Imitation in Human and Animal Behavior (Transaction Publishers, New Brunswick, 1996)

    Google Scholar 

  2. K. Schlag, Why imitate, and if so, how? a boundedly rational approach to multi-armed bandits. J. Econ. Theory 78, 130–156 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  3. M. Lopes, F.S. Melo, L. Montesano, Affordance-based imitation learning in robots, in IEEE/RSJ International Conference on Intelligent Robots and Systems (2007)

    Google Scholar 

  4. S. Iellamo, L. Chen, M. Coupechoux, Let cognitive radios imitate: imitation-based spectrum access for cognitive radio networks, Technical Report, arXiv:1101.6016 (2011)

  5. X. Chen, J. Huang, Imitation-based social spectrum sharing. IEEE Trans. Mob. Comput. (2014). http://arxiv.org/pdf/1405.2822v1.pdf

  6. P. Gupta, P. Kumar, The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  7. A.B. Flores, R.E. Guerra, E.W. Knightly, P. Ecclesine, S. Pandey, IEEE 802.11 af: a standard for TV white space spectrum sharing. IEEE Commun. Mag. 51(10), 92–100 (2013)

    Article  Google Scholar 

  8. R.J. Drost, R.D. Hopkins, R. Ho, I.E. Sutherland, Proximity communication. IEEE J. Solid-State Circuits 39(9), 1529–1535 (2004)

    Article  Google Scholar 

  9. L. Anderegg, S. Eidenbenz, Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, in 9th Annual International Conference on Mobile Computing And Networking (2003)

    Google Scholar 

  10. P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced Communications and Multimedia Security (2002)

    Google Scholar 

  11. L.A. DaSilva, I. Guerreiro, Sequence-based rendezvous for dynamic spectrum access, in 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (2008)

    Google Scholar 

  12. K. Bian, J.-M. Park, R. Chen, Control channel establishment in cognitive radio networks using channel hopping. IEEE J. Sel. Areas Commun. 29(4), 689–703 (2011)

    Article  Google Scholar 

  13. L. Lazos, S. Liu, M. Krunz, Spectrum opportunity-based control channel assignment in cognitive radio networks, in 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (2009)

    Google Scholar 

  14. B. Lo, A survey of common control channel design in cognitive radio networks. Phys. Commun. 4, 40–62 (2011)

    Article  Google Scholar 

  15. R. Zhang, Y. Zhang, J. Sun, G. Yan, Fine-grained private matching for proximity-based mobile social networking, in IEEE INFOCOM (2012)

    Google Scholar 

  16. M. Von Arb, M. Bader, M. Kuhn, R. Wattenhofer, Veneta: serverless friend-of-friend detection in mobile social networking, in IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2008)

    Google Scholar 

  17. B. Cohen, Incentives build robustness in bittorrent. Workshop Econ. Peer-to-Peer Syst. 6, 68–72 (2003)

    Google Scholar 

  18. T. Ferguson, A Course in Large Sample Theory (Chapman and Hall, London, 1996)

    Book  MATH  Google Scholar 

  19. C. Alós-Ferrer, S. Weidenholzer, Contagion and efficiency. J. Econ. Theory 143(1), 251–274 (2008)

    Article  MATH  Google Scholar 

  20. J. Scott, Social network analysis. Sociology 22(1), 109 (1988)

    Article  Google Scholar 

  21. M. Benam, J. Weibull, Deterministic approximation of stochastic evolution in games. Econometrica 71, 873–903 (2003)

    Article  MathSciNet  Google Scholar 

  22. R. Jain, D. Chiu, W. Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer systems, DEC Research Report TR-301 (1984)

    Google Scholar 

  23. M. Lopez-Benitez, F. Casadevall, Empirical time-dimension model of spectrum use based on a discrete-time markov chain with deterministic and stochastic duty cycle models. IEEE Trans. Veh. Technol. 60(6), 2519–2533 (2011)

    Article  Google Scholar 

  24. H. Li, Multi-agent Q-learning for competitive spectrum access in cognitive radio systems, in Fifth IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks (2010)

    Google Scholar 

  25. A. Anandkumar, N. Michael, A. Tang, Opportunistic spectrum access with multiple users: learning under competition, in IEEE INFOCOM (2010)

    Google Scholar 

  26. T. Rappaport, Wireless Communications: Principles and Practice, vol. 2 (Prentice Hall PTR, New Jersey, 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Chen, X., Huang, J. (2015). Imitative Spectrum Access Mechanism. In: Social Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-15215-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15215-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15214-1

  • Online ISBN: 978-3-319-15215-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics