Malicious-Proof and Fair Credit-Based Resource Allocation Techniques for DSA Systems

被引:3
作者
Alshammari, Tamara [1 ]
Hamdaoui, Bechir [1 ]
Guizani, Mohsen [2 ]
Rayes, Ammar [3 ]
机构
[1] Oregon State Univ, Corvallis, OR 97331 USA
[2] Qatar Univ, Doha 2713, Qatar
[3] Cisco Syst, San Jose, CA 95134 USA
关键词
Distributed resource allocation and management; selfish user behavior; fairness; dynamic spectrum access; DYNAMIC SPECTRUM ACCESS; COGNITIVE RADIO;
D O I
10.1109/TWC.2014.2354646
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function that, when combined with the proposed credit-based technique, leads to further improvements of the system fairness performance. Our proposed techniques overcome user misbehavior by masking the impact of the users' pursued private objectives on the overall system performance. They also improve fairness among users by allocating service to users adaptively by accounting for how much service each user has received in the past. Our simulation results show that our proposed techniques maintain high system performance by allowing users to achieve high amounts of service and by ensuring fair allocation of spectrum resources among users even in the presence of misbehaved users. Using simulations, we also show that these high performances are also achievable under various different network scenarios.
引用
收藏
页码:606 / 615
页数:10
相关论文
共 17 条
[1]  
AlShammari T, 2014, IEEE ICC, P318, DOI 10.1109/ICC.2014.6883338
[2]  
[Anonymous], P TEL POL RES C TPRC
[3]  
[Anonymous], 1998, Reinforcement Learning: An Introduction
[4]   Balancing Reliability and Utilization in Dynamic Spectrum Access [J].
Cao, Lili ;
Zheng, Haitao .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) :651-661
[5]   Coordinating secondary-user behaviors for inelastic traffic reward maximization in large-scale \osa networks [J].
Hamdaoui, Bechir ;
Noroozoliaee, Mohammadjavad ;
Tumer, Kagan ;
Rayes, Ammar .
IEEE Transactions on Network and Service Management, 2012, 9 (04) :501-513
[6]   Cognitive radio: Brain-empowered wireless communications [J].
Haykin, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) :201-220
[7]   Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks [J].
Li, Husheng ;
Han, Zhu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3554-3565
[8]  
Li Xiang, 2011, Instrument Techniques and Sensor, P1
[9]   On Using Interference-Aware Spectrum Sensing for Dynamic Spectrum Access in Cognitive Radio Networks [J].
Lin, You-En ;
Liu, Kun-Hsing ;
Hsieh, Hung-Yun .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (03) :461-474
[10]   Distributed Learning in Cognitive Radio Networks: Multi-Armed Bandit with Distributed Multiple Players [J].
Liu, Keqin ;
Zhao, Qing .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :3010-3013