Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty

Size: px
Start display at page:

Download "Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty"

Transcription

1 Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty Jing Xu, Qingsi Wang, Rong Jin, Kai Zeng and Mingyan Liu Department of Electrical and Information Engineering Huazhong University of Science and Technology, Wuhan, China Electrical and Computer Engineering, University of Michigan, Ann arbor, USA Computer Information Science, University of Michigan-Dearborn, Dearborn, USA Abstract Secondary user data capturing is a fundamental building block for cognitive radio network forensics. It faces great challenges mainly due to the unknown secondary user behavior, wide spectrum, and packet capturing uncertainty. There is a lack of fundamental understanding of the data capturing problem in theory. In this paper, for the first time, we formulate the dynamic sniffer channel assignment problem without the knowledge of users behavior patterns as a non-stochastic multiarmed bandit (MAB) problem. Moreover, we consider a more practical scenario with the consideration of packet capturing uncertainty and switching cost. We then propose an efficient solution to solve the problem and analyze the regret of our policy. Finally, a simulation study validates the convergence of our method. I. INTRODUCTION Cognitive radio network (CRN) is a promising paradigm to solve the contradiction of limiting wireless spectrum resources and a growing number of applications in wireless networks. By exploiting the spectrum in an opportunistic fashion, cognitive radio networks allow the secondary users (SUs) to use the licensed bands without introducing harmful interference to primary users (PUs). Many approaches have been proposed in the literature, such as spectrum sensing, spectrum management, spectrum mobility, spectrum sharing, etc. [1]. While most prior researches focus on the problem of utilizing the spectrum resources efficiently, recent work has begun to pay attention to security issues in CRNs [2]. A lot of new threats fundamental to cognitive radio itself and their countermeasures have been proposed, such as spectrum sensing data falsification [3], primary user emulation attack [4], jamming attack [5] and so on. However, systematical management of cognitive radio networks remains largely untouched in the literature. Network forensics is a discipline relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, malicious activities detection, and legal evidence collecting. It is a useful approach to prevent attacks, diagnose the network and track down criminals. Network forensics consists of two parts: data capture and data analysis. Data capture is the basic of network forensics, on which the quality of data analysis depends largely. Channel fading, signal coverage and interference make this task more difficult in a wireless environment. Existing work on data capture mainly focuses on traditional wireless networks. A passive monitoring system has been proposed [6], in which a dedicated set of hardware devices, called sniffers, are used to gather detailed PHY/MAC information. The sniffer deployment problem in this framework has been discussed [7], [8], [9]. Recently, a few of works studied the data capture problem in cognitive radio networks [10], [11]. Special characteristics of cognitive radio networks introduce more challenges. For example, there is wider spectrum and dynamic traffic due to opportunistic access. However, there is a lack of theoretical understanding of this problem. Furthermore, data capture uncertainty is not considered in the existing work, which is a common phenomenon in wireless networks. In this paper, we investigate the sniffer channel assignment problem in SU data capturing for cognitive radio network forensics. Our objective is to capture as many as possible (target) SUs packets without prior knowledge of SUs activities (traffic patterns and channel access policies). Hence, we perform online learning of SUs behavior patterns and construct the sniffer deployment schemes based on the learning results. There is an interesting trade-off between exploitation (i.e. assigning sniffers exclusively to channels believed to give the maximum rewards based on current knowledge) and exploration (i.e. trying out each channel to find the best one). Thus, we formulate this problem as a non-stochastic multiarmed bandit problem (MAB). Our model does not make

2 2 any assumption on the statistical distribution of the SUs activities, including traffic patterns and channel access policies. Moreover, our model captures the intrinsic feature of wireless monitoring, i.e., packet loss caused by wireless fading channel and sniffer impairment. In this paper, our main contributions are: We formulate the data capturing problem without the knowledge of SU activities as a non-stochastic MAB problem. In the model, we consider the impact of practical factors: imperfect monitoring conditions, sniffer heterogeneity derived from different monitoring environments, and switching cost. We propose an efficient solution to solve the problem and analyze the regret of our algorithm. We perform an extensive simulation study to validate our method. It is shown that the proposed sniffer-channel assignment policy is highly efficient. The rest of this paper is organized as follows. Section II summarizes the related work on network monitoring and data capturing in wireless networks. In Section III we present the system mode and our problem formulation. Details of our method and the regret analysis are introduced in Section IV and Section IV-C separately. Section V provides our simulation study, followed by conclusion and future work in Section VI. II. RELATED WORK Data capture for network forensics in cognitive radio networks is a new research area that is under explored. However, there has been much work done on passive wireless monitoring, which is similar to data capture. Therefore, we survey the related work from these two aspects in this section. A. Passive monitoring in traditional wireless networks A framework to collect PHY/MAC information for wireless LAN monitoring was first proposed in [6], which is the basis of passive wireless monitoring system. To determine the optimal monitoring resource allocation to maximize captured information in wireless mesh networks, the sniffer channel assignment problem was formulated as a maximum coverage problem [7]. In [8], Arun et al. defined a quality metric for monitoring, named QoM, which indicates the expected number of active users monitored, and considered the problem of maximizing QoM. Arora et al. [9] further extended the preceding work by using multi-armed bandit method to perform sequence learning under the condition of unknown users s statistics information. It is noteworthy that all the prior researches aimed to monitor the occurrence of wireless users, which is an easier job compared with packet capture. B. Data capture in cognitive radio networks Data capturing problem in cognitive radio networks has attracted attention recently. It was first studied in [10], in which support vector regression was utilized to predict packet arrival time and a greedy scheduling scheme for minimizing the number of monitor switches was proposed. Yan et al. [11] also utilized the similar idea, and designed an online nonparametric density estimation method to learn and predict the time-evolving mixed traffic patterns on all the channels for SUs. The sniffer channel assignment problems were formulated as inter programming problems by considering the channel switching costs with the goal of maximizing QoM. However, their work is different from ours in the following aspects: In their framework, the objective is to monitor all the traffic of SUs, and the special inspection sniffers are adopted to scan the channels to obtain the information whether SUs appear on each channel. It implies that the inspection sniffers can sense multiple channels on one time slot and their deployment details are not discussed. In our problem, our goal is to capture only the packets of the target SUs. There are no dedicated sniffers for channel scanning. Each sniffer monitors a channel for a time slot to capture the target packets. Then the system learns the target users activities and makes decisions of sniffer channel assignment scheme at the next time slot. In turn, the capture results will directly affect the learning process. On the other hand, all the aforementioned works assume that the monitoring system is perfect. This means that once a node has been monitored by one sniffer within its monitoring vicinity operating on the same channel, the packet will always be captured without any error. However, the assumption does not always hold in practice. A variety of factors will lead to packet miss, such as poor wireless channel condition or sniffer impairment. Imperfect monitoring conditions will decrease the quality of data capture, and even affect the learning results. In this paper, we consider the packet capturing uncertainty and heterogeneous sniffer capture effects. III. SYSTEM MODEL AND PROBLEM FORMULATION A. System model Given a cognitive radio network with K channels that are licensed by a PU network, there is a SU network where the SUs communicate using a synchronous slotted scheme, and we refer to [12] for the detailed communication system model. In each time slot, each SU chooses a set of channels to sense, and when a channel with licensed primary users is idle, it can be accessed by SUs using a CSMA/CA mechanism with acknowledgments for each successful transmission from the receiver. The entire process then repeats. Independent of the communication system, we introduce a third-part network monitoring system for forensics. We assume

3 3 that the communication scheme among SUs is known to the monitoring system, and the objective is to capture as many as possible packets of the SUs. The monitoring system consists of S sniffers and a coordinator, where S K. The coordinator dynamically assigns channels to be monitored by the sniffers for each slot, and each sniffer can only capture packets in the designated channel. Each sniffer then reports the observed information to the coordinator via a dedicated channel. The coordinator learns the behavioral patterns of SUs based on the collected information, and decides the channel assignment of the sniffers for the next slot. We consider a practical scenario where the observation of sniffers can be imperfect, i.e., the packets of SUs are only captured with certain probability, which is called the (packet) capture probability. We denote by P c the capture probability matrix, of which the (i, j)th entry P c (i, j) [0, 1] is the probability that a SU packet on channel j is captured by sniffer i when it is deployed on this channel. We assume P c is known a priori via measurement and is time invariant. Note that when a given sniffer is assigned to different channels, a non-negligible channel switching cost can be incurred, so as to model, e.g., the impact of switch delay and the energy consumption (see [13] for a detailed study). B. Problem formulation As aforementioned, the dynamic channel assignment of sniffers faces the classic exploitation-exploration dilemma modeled by the MAB problem: deploying the sniffers on the channels that have been active for immediate reward versus deploying them on under-utilized channels that can bring potentially higher reward in the future. Moreover, we do not assume any statistical model on the SUs activities, and we thus formulate the problem as a non-stochastic bandit problem as follows. Let A be the set of admissible sniffer-channel matching schemes, that is, A = {a = (a 1, a 2,..., a S ) a i [K], a i a j, i, j}, where a i = j if sniffer i is assigned to channel j, and [K] = {1, 2,..., K} 1. For any a A, there exists a unique matrix representation A such that A ij = 1 if a i = j and 0 otherwise. For example, when K = 4 and S = 2, an admissible scheme is a = ( 1 4 ), and we have ( ) A = In the rest of this paper, we use the notation a to represent the sniffer channel assignment scheme in either format whenever there is no ambiguity in the context. Also, when a is in the matrix form, a i,j denotes its (i, j)th entry. K}. 1 Other notation in the form of [ ] is similarly defined as [K] = {1, 2,..., Let A be the set of all probability distributions over A. Then, we consider the following repeated game between the coordinator and the group of SUs: For each time slot t = 1, 2,..., T : 1) the coordinator selects a probability distribution p t from A, and decides a sniffer-channel matching scheme a t A according to this distribution; 2) the group of SUs independently generates x t j packet on each channel j, where j = 1, 2,..., K and x t j {0, 1}; 3) if sniffer i is deployed on channel j, any generated packet on channel j is captured with probability P c (i, j). The objective of the coordinator is to maximize the quality of monitoring (QoM), i.e., the total number of packets captured on all channels given any traffic pattern of SUs. In particular, given any realization of the SU traffic (x t j, j [K], t [T ]) over the horizon T > 0, let yi,j t be sniffer i s observation of packets on channel j, which is 0 when sniffer i is not deployed on channel j, and y t i,j = { x t j, w.p. P c (i, j) 0, w.p. 1 P c (i, j). when sniffer i is assigned to channel j. We also associate a switching cost to each consecutive matching schemes as C(a t a t 1 ), which is a linear function of the total number of channel switchings at time t, comparing a t with a t 1, and we assume that C(a t a t 1 ) [0, 1] for all a t, a t 1 A. We then define the reward R t (a t a t 1 ) of using a t at time t when a t 1 is chosen at t 1 as S K R t (a t a t 1 ) = yi,j t βc(a t a t 1 ), i=1 j=1 where β [0, 1] is the weight assigned to the switching cost, and we set C(a 1 a 0 ) = 0 for any a 0 A for the fictitious zeroth time slot. The coordinator s decision p t is based on all past observations h t = (yi,j τ, i [S], j [K], τ [t 1]). Let the set of all possible observations over time be H, and the decision policy of the coordinator is then given by a map σ : H A. Given any realization of the traffic of SUs (x t j, j [K], t [T ]), the reward of any policy σ of the coordinator is defined as { T } G(σ) := E σ R t (a t a t 1 ), t=1 where the expectation is taken with respect to the randomness in the generation of sniffer deployment and also that in the packet capture process, which depends on the choice of σ, and we explicitly denote this dependency using the superscript.

4 4 We evaluate a given policy σ using the notion of (weak or external) regret, which is defined as the difference between the average number of packets captured by the dynamic deployment using σ, and that by the optimal static snifferchannel matching scheme a in hindsight. Formally, given (x t j, j [K], t [T ]), let { T } a = arg max a A Ea R t (a a), t=1 where the expectation is with respect to the random packet capture given a. Let σ : H A be a static policy such that σ (h t ) is a degenerate distribution with all probability mass on a for any h t H, and set G max = G(σ ). The regret is then defined as Regret = G max G(σ). IV. NO-REGRET SNIFFER-CHANNEL MATCHING POLICY In this section, we introduce sniffer-channel matching policies that achieve order-optimal sublinear regrets. We first present a policy for the case when there is no switching cost, which will be used as a building block when incorporating the switching costs in the second part. A. Sniffer-channel matching under capture uncertainty A straightforward solution to the sniffer assignment problem under capture uncertainty is to treat each sniffer-channel matching scheme as an arm, and to invoke the classic Exp3 algorithm [14]. Though sublinear in time, the regret of classical bandit no-regret learning algorithm like Exp3 typically scales polynomially in the size of the action space. A naive conversion of a combinatorial problem to the classic bandit setting like the aforementioned results in an exponentially large action space, and the regret performance is rather unsatisfactory for most applications. We note that the sniffer assignment problem under capture uncertainty is in essence a bipartite matching problem, as we have named a as a sniffer-channel matching scheme. Similar problems in a balanced bipartite graph have been studied in the literature. For a balanced bipartite graph, a perfect matching is a matching in which every vertex of the graph is incident to exactly one edge, and each matching can be expressed as a permutation. Helmbold et al. [15] first investigated online permutation learning problem with full information, where the player observes the outcomes of all arms and the instantaneous reward of permutations that are selected in a decision round can also be observed. In [16], the problem was extended from this full feedback setting to a partial feedback setting, where only the instantaneous reward of the selected permutation is observed, and the ExpMatch algorithm was proposed. The problem setting considered in ExpMatch is given by the following repeated game: For each round t = 1, 2,..., T : 1) The decision maker chooses a perfect matching between two sets of vertices U and V, where U = V = n. 2) An adversary assigns an individual loss l i,j [0, 1] for each matched pair (i, j), where i U and j V. 3) The value of l i,j is reported from each pair (i, j) to the decision maker, who suffers a loss as the sum of all individual losses, and the game proceeds to the next round. The decision maker then aims to minimize the total matching loss of rounds up to some horizon T. We note that our formulation does not exactly fit the above framework that motivates the ExpMatch algorithm. In particular, as outlined in our system model, there can be missed detection by the sniffers of packets, and the coordinator then only observes the behavior of SUs subject to uncertainty characterized by the capture probability. The reward y i,j in our formulation is hence given by a random variable with an arbitrarily assigned mean (depending on the value of x t j ), whereas l i,j in the above framework is a deterministic though arbitrary value. However, as we will soon elaborate, the Exp- Match algorithm also provides a solution to our problem with a regret that is uniformly sublinear in time and polynomial in the number of channels, and we highlight the necessary adaptation of ExpMatch to our context. The algorithm in the sniffer-channel matching context is reported in Algorithm 1. In the (adapted) ExpMatch algorithm (Algorithm 1), two matrices are maintained. One is the weight matrix ω, and the other is a doubly stochastic matrix D that is obtained from ω. At each time slot, the coordinator assigns probability masses to sniffer-channel matching schemes by decomposing the doubly stochastic matrix D (Step 2) using the subroutine Decompose, and in particular the generated distribution over A has a support of size less than S K + 1. A snifferchannel matching is then realized using the mixture of this distribution and the uniform distribution (Step 3). At the end of a time slot, the observation from each monitored channel is reported to the coordinator (Step 4), and the gathered information is then used to estimate the true rewards (the number of SU packets) on each channel (Step 5). Finally, the weight matrix is updated (Step 6) and a corresponding doubly stochastic matrix is constructed for the next slot (Step 7) using Sinkhorn-Knopp (see [16] for the detail of this subroutine). Instead of regarding each matching as an arm in the bandit problem and maintaining a weight for each matching, the (adapted) ExpMatch keeps individual weights for snifferchannel pairs, and uses the total SK weights to generate a distribution over exponentially many matchings. This is the key to induce a polynomial dependence of regret on S and

5 5 Algorithm 1 ExpMatch for sniffer-channel matching subject to imperfect detection Input: Parameters: γ (0, 1], S, K Initialize: ω 1 = (ω 1 i,j ) S K, ω 1 i,j = 1 K, D1 = (D 1 i,j ) K K, D 1 i,j = 1 K ; 1: for t = 1, 2,, T do 2: Calculate a probability distribution over A according to D t (1:S), where D t (1:S) is the truncated matrix consisting of the first S rows of D t : {(a, µ a ), a A} = Decompose(D t (1:S)) where a A µ a = 1. 3: Realize a sniffer-channel matching scheme a t with the probability γ p a = (1 γ)µ a + K for all a A. 4: Receive the packet capture rewards yi,j t [0, 1]. 5: Form the estimates ỹ t i,j = yt i,j θ i,j a t i,j for all i [S] and j [K], where θ i,j = 6: Update the weights ω t+1 i,j a A:a i,j=1 p a = ω t i,j exp (γỹ t i,j) for all i [S] and j [K]. 7: Update D and convert it to a doubly stochastic matrix: 8: end for D t+1 (1:S) = ωt+1 D t+1 = Sinkhorn-Knopp(D t+1 ) K instead of an exponential one We refer the readers to [16] for the detailed exposition and analysis of the ExpMatch algorithm, including the two subroutines Decompose and Sinkhorn-Knopp. The computational complexity of Algorithm 1 mainly depends on that of Step 1. In the original Decompose subroutine in ExpMatch, a distribution over balanced bipartite matchings is obtained by iteratively decomposing a K K doubly stochastic matrix (i.e., the input would be D t instead of ). Though the corresponding bipartite graph is unbalanced in the sniffer-channel matching problem, we can simply add K S fictitious sniffers to construct a balanced bipartite graph and apply the original Decompose. Given S K, this implementation however consumes most of the computational power for virtual sniffers in the iteration. Using Birkhoff-von Neumann theorem, we see that a row subset of a doubly stochastic matrix can be decomposed as a convex combination of matrices of the same size, where each matrix has only one non-zero element in each row. Hence, we can compute a distribution over all matchings using a maximum matching subroutine for a S K bipartite graph, and we omit the detail of the adapted Decompose for brevity. An additional improvement for efficiency in the implementation is to reuse the maximum matching from the previous iteration [15]. To summarize, the computational complexity of Algorithm 1 is in general O(SK 3 ) in our sniffer-channel matching problem. B. Switching Cost In this part, we consider the impact effect of switching cost. When there is no switching cost associated with each pair of consecutive actions by the coordinator, the adversary can be regarded oblivious who determines the reward on time slot t based on only the current sniffer-channel matching a t. In other words, the adversary is unaware of the coordinator s past deployment decisions. With the introduction of switching costs, the adversary can be consider as non-oblivious with one unit of memory for the coordinator s action in the last step, and exerts an additional cost C(a t a t 1 ) at time slot t. Online learning problems with a non-oblivious adversary have attracted considerable attention in recent years with various learning algorithms proposed [17] [18]. The main idea is to divide slots to mini-batches and the actions in each mini-batch of slots are static so as to neutralize the effect of bounded memory of the adversary. Based on the meta algorithm proposed in [18], we introduce a new algorithm by modifying Algorithm 1, shown as Algorithm 2. Algorithm 2 1: for n = 1, 2,, T/τ do 2: Execute Algorithm 1 until Step 3, i.e, compute a distribution p = (p a, a A) over A using a doubly stochastic matrix D n and generate a sniffer-channel matching scheme b n according to probability distribution p. 3: for k = 1, 2,..., τ do 4: Exercise the matching a t = b n for the time slot t = (n 1)τ + k. 5: Receive the packet capture rewards yi,j t [0, 1]: 6: end for 7: Update ω n+1 using 1 τ τ k=1 y(n 1)τ+k i,j. 8: Execute Step 7 of Algorithm 1, i.e., generate D n using ω n+1. 9: end for

6 6 In other words, each mini-batch of slots are wrapped up as one slot to feed Algorithm 1. The size of a batch, i.e., the value of τ, affects the overall regret of this algorithm. This value will be specified in the next section. C. Regret results We start from Algorithm 1. ExpMatch and its prototype for non-combinatorial bandit problems, i.e., Exp3 [14], are both learning algorithms in the family of exponential weight algorithms[19][20], and are particularly designed for the partial observation case in which only the reward of the played arm/matching is observed. The key to ExpMatch and Exp3 to work with partial observation is to maintain an unbiased estimator of reward on any arm/matching at any time, even though it may not be played in some realization. In the adapted ExpMatch algorithm, i.e., Algorithm 1, ỹi,j t also provides an unbiased estimate for the average reward of assigning sniffer i to channel j for our problem with the packet capture uncertainty characterized by the capture probability P c (i, j). Indeed, with straightforward calculation, it can be shown that E[ỹi,j t ] = xt i,j P c(i, j). Repeating then the rest of the regret analysis of ExpMatch in [16], we have the following result. Theorem 1. The expected regret of Algorithm 1 given any realization of SU traffic is upper bounded by O( 8SK 2 log K T + S). Next, we discuss how tight the upper bounds are. Helmbold et al. have proven that lower bounds of PermELearn (the full information version) are G best + Ω( G best T ln T + T ln T ), where G best is the reward of the best permutation on the entire sequence [15]. Obviously, the lower bounds will be inherited by Algorithm 1, which is the solution of a semi-bandit settings. Thus, we conclude that Algorithm 1 enjoys an order-optimal sublinear regret. Once we have established the regret bound for Algorithm 1, the regret result of Algorithm 2 follows from the meta algorithmic analysis in [18]. Specifically, we have the following regret bound for Algorithm 2. Theorem 2. The expected regret of Algorithm 2 given any realization of SU traffic is upper bounded by O((S + 1)(8SK 2 log K) 1/3 T 2/3 ), when using τ = (T/8SK 2 log K) 1/3. In the above result, the value of tau explicitly depends on T, which is in general not given a priori in practice. This dependence in fact can be removed by using the standard doubling trick, of which the idea is to partition the time into periods of exponentially increasing lengths and parameterize the algorithm for each period with fixed length, so as to achieve a horizon-independent bound on the same logarithmic order (see [21] for details). V. PERFORMANCE EVALUATION In this section, we present simulation results to demonstrate the performance of the proposed solutions. A. Parameters setup Synthetic traces are used in our simulation, and we focus on the following three types of SU access patterns: Static pattern: The SUs are conservative and attempt to use the same channel whenever it is idle for the entire simulation. Hopping pattern: Once any PU uses the currently residing channel, each SU switches to the neighboring channel. That is, the switching policy is a round-robin rule in the ascending order of channel indices. Random pattern: Each SU randomly selects a channel from all the idle channels. To generate a synthetic trace, three types of sequences are generated, namely the PU sequence, the target SU sequence and the sequence for the other SUs. The PU sequence is the activities of PUs. Each PU licenses a channel and its activity obeys a Poisson distribution with a rate randomly selected from [0, 1]. All the SU sequences, including the target SU and other SUs, are produced in two steps. For each SU, the first step is to generate a binary sequence over time. We then select one channel as the residing channel for this SU given one of the above access patterns, and replace the number one in the sequence with the channel index. The other SUs access the channels in a random pattern. Also, when multiple SUs choose the same channel, we randomly and uniformly choose one with access granted. In our simulation, we vary the number of sniffers S from 2 to 4 and the number of channels K from 5 to 10 to study the impact of these parameters on the performance. In addition, the capture probability matrix P c is randomly generated. The results for each pair (K, S) are averaged over 20 runs. B. Simulation Result We have observed similar results under various parameters, and we illustrate our observation using one representative setup. Figure 1 reports the regret of the proposed policy over time, when K = 5, S = 2 and T = As it can be seen, the regret tends to flatten over time for all user access patterns, which verifies the logarithmic regret bound. On the other hand, we observe that the static pattern has the largest regret among all patterns, while the regret of the other two is similar. This is because the regularity of the static pattern is the strictest one, which makes target users stuck on the fixed channels. Randomly selecting the monitoring channel based on a learned

7 7 REFERENCES Fig. 1. Regret of the proposed policy. distribution leads to fewer chances to capture target packets and the regret is approximately the upper bound. In contrast, the other two patterns make users disperse, so sniffers can capture the packets with a higher probability and learn users pattern more quickly. VI. CONCLUSION In this paper, we studied the sniffer-channel matching problem for network forensics in cognitive radio networks. Without assuming any prior knowledge of the SU behavior pattern, we formulated the problem as a non-stochastic multiarmed bandit problem. Moreover, considering packet capture certainty and switching cost in practice, we introduce the packet capture probability, and propose efficient solutions using existing online learning techniques, which enjoy an orderoptimal sublinear regret in performance. Simulation results validate that the proposed solution is efficient and resilient for imperfect monitoring conditions. Incorporating the spatial relationship between the sniffers and the monitored nodes can be an interesting research direction. ACKNOWLEDGMENT This work was partially supported by National Science Foundation of China under grants and Q. Wang and M. Liu were partially supported by the NSF under grants CIF and CNS J. Rong and K. Zeng were partially supported by US NSF under grant CNS [1] B. Wang and K. Liu, Advances in cognitive radio networks: A survey, IEEE Journal of Selected Topics on Signal Processing, special issue on Cooperative Communications and Signal Processing in Cognitive Radio Systems, vol. 5, no. 1, pp. 5 23, [2] T. C. Clancy and N. Goergen, Security in cognitive radio networks: Threats and mitigation, in Proc. IEEE CrownCom 2008, Singapore, May 2008, pp [3] F. R. Yu, H. Tang, M. Huang, Z. Li, and P. C. Mason, Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios, in Military Communications Conference, MILCOM IEEE, 2009, pp [4] S. Chen, K. Zeng, and P. Mohapatra, Hearing is believing: Detecting wireless microphone emulation attacks in white space, Mobile Computing, IEEE Transactions on, vol. 12, no. 3, pp , [5] B. Wang, Y. Wu, K. R. Liu, and T. C. Clancy, An anti-jamming stochastic game for cognitive radio networks, Selected Areas in Communications, IEEE Journal on, vol. 29, no. 4, pp , [6] J. Yeo, M. Youssef, and A. Agrawala, A framework for wireless lan monitoring and its applications, in Proc. IEEE Wise 2004, Singapore, Oct. 2004, pp [7] D.-H. Shin and S. Bagchi, Optimal monitoring in multi-channel multiradio wireless mesh networks, in Proc. ACM MobiHoc 2009, U.S.A, May 2009, pp [8] N. H. S. G. Chhetri, A and Z. R., On quality of monitoring for multichannel wireless infrastructure networks, in Proc. ACM MobiHoc 2010, U.S.A, Sep. 2010, pp [9] S. C. Arora, P and Z. R., Sequential learning for optimal monitoring of multi-channel wireless networks, in Proc. IEEE Infocom 2011, China, Apr. 2011, pp [10] S. Chen, K. Zeng, and P. Mohapatra, Efficient data capturing for network forensics in cognitive radio networks, in Proc. IEEE Icnp 2011, Canada, Oct. 2011, pp [11] Q. Yan, M. Li, F. Chen et al., Non-parametric passive traffic monitoring in cognitive radio networks, in Proc. IEEE Infocom 2013, Italy, Apr. 2013, pp [12] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitive mac for opportunistic spectrum access in ad hoc networks: A pomdp framework, IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Adaptive, Spectrum Agile and Cognitive Wireles Networks, vol. 25, no. 3, pp , [13] D. Murray, M. Dixon, and T. Koziniec, Scanning delays in networks, in Next Generation Mobile Applications, Services and Technologies, NGMAST 07. The 2007 International Conference on. IEEE, 2007, pp [14] P. Auer, N. Cesa-Bianchi, Y. Freund et al., The non-stochastic multiarmed bandit problem, SIAM Journal on Computing, vol. 32, no. 1, p. 4877, [15] D. P. Helmbold and M. K. Warmuth, Learning permutations with exponential weights, The Journal of Machine Learning Research, vol. 10, pp , [16] K. Mohan and O. Dekel, Online bipartite matching with partially-bandit feedback, in Proc. NIPS Workshop: DISCML [17] O. Dekel, R. Gilad-Bachrach, O. Shamir, and L. Xiao, Optimal distributed online prediction using mini-batches, The Journal of Machine Learning Research, vol. 13, pp , [18] R. Arora, O. Dekel, and A. Tewari, Online bandit learning against an adaptive adversary: from regret to policy regret, in Proceedings of the 29th International Conference on Machine Learning, 2012, pp [19] Y. Freund and R. E. Schapire, A decision-theoretic generalization of on-line learning and an application to boosting, J. Comput. Syst. Sci., vol. 55, no. 1, pp , Aug [20] S. Arora, E. Hazan, and S. Kale, The multiplicative weights update method: a meta-algorithm and applications. Theory of Computing, vol. 8, no. 1, pp , 2012.

Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models

Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models Shanhe Yi 1,KaiZeng 2, and Jing Xu 1 1 Department of Electronics and Information Engineering Huazhong University of Science

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

A Multi Armed Bandit Formulation of Cognitive Spectrum Access

A Multi Armed Bandit Formulation of Cognitive Spectrum Access 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks

Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks Bowen Li, Panlong Yang, Xiang-Yang Li, Shaojie Tang, Yunhao Liu, Qihui Wu Institute of Communication Engineering, PLAUST

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks

Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Opportunistic Spectrum Access with Channel

More information

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks 1 Qian Wang, Hai Su, Kui Ren, and Kai Xing Department of ECE, Illinois Institute of Technology, Email:

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering,

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony Brook, New York 11794

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

The Game-Theoretic Approach to Machine Learning and Adaptation

The Game-Theoretic Approach to Machine Learning and Adaptation The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Globecom - Cognitive Radio and Networks Symposium Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Biling Zhang,, Yan Chen, Chih-Yu Wang, 3, and K. J. Ray Liu Department

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University of Rhode

More information

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA Outline Introduction Competing Cognitive

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College

More information

Research Article Distributed Schemes for Crowdsourcing-Based Sensing Task Assignment in Cognitive Radio Networks

Research Article Distributed Schemes for Crowdsourcing-Based Sensing Task Assignment in Cognitive Radio Networks Hindawi Wireless Communications and Mobile Computing Volume 2017, Article ID 5017653, 8 pages https://doi.org/10.1155/2017/5017653 Research Article Distributed Schemes for Crowdsourcing-Based Sensing Task

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks APSIPA ASC Xi an Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks Zhiqiang Wang, Tao Jiang and Daiming Qu Huazhong University of Science and Technology, Wuhan E-mail: Tao.Jiang@ieee.org,

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information

Learning Permutations with Exponential Weights

Learning Permutations with Exponential Weights Learning Permutations with Exponential Weights David P. Helmbold Manfred K. Warmuth University of California - Santa Cruz Last update - June 8, 007 D. Helmbold & M.Warmuth (UCSC) Learning Permutations

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1805 Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Nicholas B Chang, Student Member, IEEE, and Mingyan

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

Optimized Asynchronous Multi-channel Neighbor Discovery

Optimized Asynchronous Multi-channel Neighbor Discovery Optimized Asynchronous Multi-channel Neighbor Discovery Niels Karowski TKN/TU-Berlin niels.karowski@tu-berlin.de Aline Carneiro Viana INRIA and TKN/TU-Berlin aline.viana@inria.fr Adam Wolisz TKN/TU-Berlin

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Mobility and Fading: Two Sides of the Same Coin

Mobility and Fading: Two Sides of the Same Coin 1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

Cognitive Radio Network Setup without a Common Control Channel

Cognitive Radio Network Setup without a Common Control Channel Cognitive Radio Network Setup without a Common Control Channel Yogesh R Kondareddy*, Prathima Agrawal* and Krishna Sivalingam *Electrical and Computer Engineering, Auburn University, E-mail: {kondayr,

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Framework for Performance Analysis of Channel-aware Wireless Schedulers

Framework for Performance Analysis of Channel-aware Wireless Schedulers Framework for Performance Analysis of Channel-aware Wireless Schedulers Raphael Rom and Hwee Pink Tan Department of Electrical Engineering Technion, Israel Institute of Technology Technion City, Haifa

More information

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications The first Nordic Workshop on Cross-Layer Optimization in Wireless Networks at Levi, Finland Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications Ahmed M. Masri

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

The Optimism Principle: A Unified Framework for Optimal Robotic Network Deployment in An Unknown Obstructed Environment

The Optimism Principle: A Unified Framework for Optimal Robotic Network Deployment in An Unknown Obstructed Environment The Optimism Principle: A Unified Framework for Optimal Robotic Network Deployment in An Unknown Obstructed Environment Shangxing Wang 1, Bhaskar Krishnamachari 1 and Nora Ayanian 2 Abstract We consider

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

On Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach Kehao Wang and Lin Chen

On Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach Kehao Wang and Lin Chen 300 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 1, JANUARY 2012 On Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach Kehao Wang and Lin Chen Abstract Due

More information

Learning, prediction and selection algorithms for opportunistic spectrum access

Learning, prediction and selection algorithms for opportunistic spectrum access Learning, prediction and selection algorithms for opportunistic spectrum access TRINITY COLLEGE DUBLIN Hamed Ahmadi Research Fellow, CTVR, Trinity College Dublin Future Cellular, Wireless, Next Generation

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks 1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Cooperative Diversity Routing in Wireless Networks

Cooperative Diversity Routing in Wireless Networks Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Cooperative Compressed Sensing for Decentralized Networks

Cooperative Compressed Sensing for Decentralized Networks Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information

Consensus Algorithms for Distributed Spectrum Sensing Based on Goodness of Fit Test in Cognitive Radio Networks

Consensus Algorithms for Distributed Spectrum Sensing Based on Goodness of Fit Test in Cognitive Radio Networks Consensus Algorithms for Distributed Spectrum Sensing Based on Goodness of Fit Test in Cognitive Radio Networks Djamel TEGUIG, Bart SCHEERS, Vincent LE NIR Department CISS Royal Military Academy Brussels,

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Delay Based Scheduling For Cognitive Radio Networks

Delay Based Scheduling For Cognitive Radio Networks Delay Based Scheduling For Cognitive Radio Networks A.R.Devi 1 R.Arun kumar 2 S.Kannagi 3 P.G Student P.S.R Engineering College, India 1 Assistant professor at P.S.R Engineering College, India 2 P.G Student

More information

Enumeration of Two Particular Sets of Minimal Permutations

Enumeration of Two Particular Sets of Minimal Permutations 3 47 6 3 Journal of Integer Sequences, Vol. 8 (05), Article 5.0. Enumeration of Two Particular Sets of Minimal Permutations Stefano Bilotta, Elisabetta Grazzini, and Elisa Pergola Dipartimento di Matematica

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

MULTIPATH fading could severely degrade the performance

MULTIPATH fading could severely degrade the performance 1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block

More information

Acentral problem in the design of wireless networks is how

Acentral problem in the design of wireless networks is how 1968 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999 Optimal Sequences, Power Control, and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod

More information

DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks

DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks IEEE INFOCOM 216 - The 35th Annual IEEE International Conference on Computer Communications DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks Lu

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Channel Allocation Algorithm Alleviating the Hidden Channel Problem in ac Networks

Channel Allocation Algorithm Alleviating the Hidden Channel Problem in ac Networks Channel Allocation Algorithm Alleviating the Hidden Channel Problem in 802.11ac Networks Seowoo Jang and Saewoong Bahk INMC, the Department of Electrical Engineering, Seoul National University, Seoul,

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

Internet of Things Cognitive Radio Technologies

Internet of Things Cognitive Radio Technologies Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks

Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks Bechir Hamdaoui and Kang G. Shin Abstract We have recently witnessed a rapidly-increasing demand for, and hence a shortage

More information

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior EEE CC 22 - Cognitive Radio and Networks Symposium Analysis of nterference in Cognitive Radio Networks with Unknown Primary Behavior Chunxiao Jiang, Yan Chen,K.J.RayLiu and Yong Ren Department of Electrical

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California Davis Davis, CA 95616, USA Email: senhua@ece.ucdavis.edu

More information

Structure and Synthesis of Robot Motion

Structure and Synthesis of Robot Motion Structure and Synthesis of Robot Motion Motion Synthesis in Groups and Formations I Subramanian Ramamoorthy School of Informatics 5 March 2012 Consider Motion Problems with Many Agents How should we model

More information

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS SENSOR PACEMENT FOR MAXIMIZING IFETIME PER UNIT COST IN WIREESS SENSOR NETWORKS Yunxia Chen, Chen-Nee Chuah, and Qing Zhao Department of Electrical and Computer Engineering University of California, Davis,

More information

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information