Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Size: px
Start display at page:

Download "Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks"

Transcription

1 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 Jammig-resistat Multi-radio Multi-chael Opportuistic Spectrum Access i Cogitive Radio Networks Qia Wag, Member, IEEE, Kui Re, Seior Member, IEEE, Peg Nig, Member, IEEE ad Shegsha Hu, Studet Member, IEEE Abstract For achievig optimized spectrum usage, most existig opportuistic spectrum sesig ad access protocols model the spectrum sesig ad access problem as a partially observed Markov decisio process (POMDP) by assumig that the iformatio states ad/or the primary users (PUs) traffic statistics are kow a priori to the secodary users (SUs). While theoretically soud, the existig solutios may ot be effective i practice due to two mai cocers. First, the assumptios are ot practical, as before the commuicatio starts, PUs traffic statistics may ot be readily available to the SUs. Secodly ad more seriously, existig approaches are extremely vulerable to malicious jammig attacks. By leveragig the same statistic iformatio ad stochastic dyamic decisio makig process that the SUs would follow, a cogitive attacker with sesig capability ca sese ad jam the chaels to be accessed by SUs while ot iterferig PUs. To address the above cocers, we formulate the atijammig multi-chael access problem as a o-stochastic multi-armed badit (NS-MAB) problem, where the SU seder ad the SU receiver adaptively choose chaels to operate respectively. By leveragig probabilistically-shared iformatio betwee the seder ad the receiver, the proposed spectrum sesig ad access protocol eables them to hop to the same set of chaels with high probability while gaiig resiliece to jammig attacks without affectig PUs activities. We aalytically show the covergece of the learig algorithms ad derive the performace boud based o regret. We further discuss the problem of trackig the best adaptive strategy ad characterize the performace boud based o a ew regret. Extesive simulatios are coducted to validate the theoretical aalysis. The results show that the probabilistic spectrum sesig ad access protocol ca overcome the limitatio of existig solutios ad is highly resiliet to various jammig attacks eve with jammed ACK iformatio. Idex Terms Ati-jammig, cogitive radio etworks, multi-radio multi-chael. INTRODUCTION COGNITIVE radio is a emergig advaced radio techology i wireless access, with may promisig beefits icludig dyamic spectrum sharig, robust cross-layer adaptio ad collaborative etworkig. Opportuistic spectrum access (OSA), which is at the core of cogitive radio techologies, has recetly received icreasig attetio due to its great potetial to improve the spectrum utilizatio efficiecy ad reliability [2] [6]. The basic idea of OSA is that idividual secodary users (SUs) dyamically search ad access the spectrum vacacy to maximize the spectrum utilizatio while itroducig limited iterferece to the primary users (PUs). I existig literature, the optimality of the chael sesig ad access problem has bee extesively studied from Qia Wag ad Shegsha Hu are with the School of Computer Sciece, Wuha Uiversity, Chia. qiawag@whu.edu.c. Kui Re is with the Departmet of Computer Sciece ad Egieerig, The State Uiversity of New York at Buffalo, NY 426, USA. kuire@buffalo.edu. Peg Nig is with the Departmet of Computer Sciece, North Carolia State Uiversity Raleigh, NC 27695, USA. pig@csu.edu. A prelimiary versio [] of this paper was preseted at the 9th IEEE Iteratioal Coferece o Network Protocols (ICNP ), Vacouver, BC Caada, 2. the sigle-chael access settig to the multi-chael access settig ad from perfect sesig to imperfect sesig usig various optimizatio tools. Most of existig solutios, however, ievitably assumed that traffic statistics are pre-kow to SUs. I practice, such assumptio may ot always hold ad more seriously, solutios based o this assumptio are vulerable to malicious jammig attacks. First, PU s traffic statistics (i.e., iitial iformatio states, trasitio probabilities ad the order of trasitio probabilities) may ot be readily available to the SUs prior to the start of sesig actios. Without a priori iformatio o the traffic patters, those opportuistic spectrum sesig ad access protocols caot work. Moreover, a cogitive jammer with sesig capabilities ca choose chaels to sese by leveragig the same statistic iformatio ad stochastic dyamic decisio makig process. Based o the sesig results, the attackers the jam the idle chaels potetially used by SUs without affectig activities of PUs. This is due to the fact that the structure of those sesig policies is fixed ad the chael selectio procedure that SUs follow is publicly kow. Therefore, a jammer ca predict which chaels the SUs are goig to use i each timeslot ad prevet the spectrum from beig utilized efficietly.

2 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 2 Traditioal ati-jammig schemes, icludig both frequecy hoppig spread spectrum (FHSS) ad direct-sequece spread spectrum (DSSS) [7], commoly rely o some pre-shared secrets (i.e., hoppig sequeces ad spreadig codes) to achieve jammigresistat commuicatio. However, they are ot directly applicable to CRNs due to the fact that the presharig of secrets are ot applicable i a dyamic SU etworice SUs may ever meet each other before the start of commuicatio. Recetly, ucoordiated frequecy hoppig (UFH) ad ucoordiated direct-sequece spread spectrum (UDSSS) ad their variatios were proposed to elimiate the reliace o the pre-shared secrets [8] [3]. The major problem with UFH ad UDSSS is that they are both very expesive. For UFH, it takes a log time for a SU seder to trasmit a message to a SU receiver. This is ot practical for CRNs where SUs eed to fiish trasmissio quickly to yield the chael to PUs. O the other had, UDSSS may take less time to deliver a message, but the message decodig process at the receiver side will icur a large cost. Moreover, applyig UDSSS directly to the ati-jammig problem i CRNs results i a problem. UDSSS is commoly used i a broadcast commuicatio settig where the commuicatio chael is publicly kow ad SUs are usig radomly-selected spreadig codes to defed agaist jammig. I CRNs, it will cause large iterferece to PUs whe they are also active o the same commuicatio chael. I [4], [5], the problem of defedig jammig attacks i cogitive radio etworks was ivestigated usig game-theoretic approaches. However, they oly explored the siglechael case ad assumed that the SU receiver ca always commuicate with the secodary seder (i.e., they are cosidered as a sigle player) ad sesig is perfect. I [6], the spectrum sesig problem was formulated uder time-varyig chaels as a adversarial badit problem. Similar to [4], [5], the authors oly cosidered the case of sigle sesig chael ad assumed that the SU receiver ad the SU seder were cosidered as a sigle player. I [7], [8], ati-jammig games were ivestigated i CRNs. However the SU seder ad the SU receiver are still cosidered as a sigle player, i.e., they are assumed to stay coordiated by iitializatio with the same radom seed. To address the above limitatios, i this paper we propose a decetralized ad robust ati-jammig multi-chael spectrum access protocol for ad hoc CRNs, which ca accommodate both the eviromet dyamics ad the strategic behaviors of the jammers. Compared to existig UFH protocols, i a CRN settig, our protocol ca adaptively choose the most likely free chaels with high probability istead of radomly sesig ad accessig chaels. That is, the trasceivers will selectively sese chaels with high probability of o-occupacy by the jammer ad the PUs, based o the history iformatio of sesig ad access. However, if the SU seder detects the presece of a PU o a sesed chael, it will remai silet ad does ot access that chael i the curret timeslot. The sesig results together with the immediately followig access results will be feedbacked to the sesig actios i the future timeslots. Therefore, commuicatio efficiecy ca be sigificatly improved without affectig PU s activities. Differet from existig determiistic dyamic spectrum access protocols, we adopt a probabilistic spectrum sesig ad access approach, where the seder ad the receiver sese/access chaels i a upredictable way ad their kowledge of chaels ca coverge due to shared iformatio the jammer does t have. As will be show, by leveragig probabilistically-shared iformatio betwee the seder ad the receiver, the commuicatio efficiecy ca be retaied while gaiig resiliece to jammig attacks. Compared to the prelimiary versio [], i this paper we have made substatial improvemets icludig both the theoretical performace aalysis ad experimets. New experimetal results ad full proofs of performace bouds are provided. We also discuss the problem of trackig the best compoud (adaptive) strategy ad characterize the bouds o the ew regret. The mai cotributios of this paper are: We propose the first olie adaptive multi-chael jammig-resistat spectrum access protocol for ad hoc CRNs by formulatig the ati-jammig problem as a o-stochastic MAB problem. We aalytically show the covergece of the learig algorithms as T goes to ifiity, i.e., the time-averaged performace differece betwee the SU seder ad thesu receiver s optimal strategies is o more tha 2k Tε l, where k = max{k 2 s,k r }, k r ad are the umber of chaels the receiver ad the seder ca access simultaeously i each timeslot, respectively, ε is the probability of sesig ad is the total umber of chaels. The proposed algorithm ca be efficietly implemeted i polyomial time. We further cosider the problem of trackig the best adaptive strategy ad preset a extesio of our costructio for ati-jammig spectrum access. We aalyze the performace boud o the ew regret defied based o the adaptive optimal strategy. We aalytically show the time-averaged performace differece betwee the SU seder ad the SU receiver s optimal strategies is upper bouded by O(2k l), where k = max{,k r }. Sice,k r ad are pre-set system parameters, the performace boud is costat as T goes to ifiity. The exteded algorithm for trackig the best compoud strategy ca also be implemeted i polyomial time. We preset a thorough quatitative performace characterizatio of the proposed scheme. The performace is evaluated by aalyzig a practical metric the expected time for message delivery with high

3 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 3 probability. We also perform a extesive simulatio study to validate our theoretical results. It is show that the proposed algorithm is efficiet ad highly effective agaist various jammig attacks eve with jammed ACK iformatio. 2 MODELS AND ASSUMPTIONS 2. System Model ad Assumptios I a typical cogitive radio etwork (CRN), there exist a primary user (PU) etwork ad a secodary user (SU) etwork. To facilitate dyamic spectrum access, the spectrum is divided ito chaels, each of which evolves idepedetly ad has the same total badwidth. Differet from most existig works, i our model we assume the chael statistics are ot ecessarily the same for chaels. I the system, PUs occupy ad vacate the spectrum followig a discretetime Markov process, where chael i trasits from busy state ( ) to idle state ( ) with probability p i ad stays i idle state ( ) with probabilityp i. I the SU etwork, SUs seepectrum opportuities amog chaels. Specifically, SUs reserve a sesig iterval i each timeslot to detect the presece of a PU. Based o the outcomes of sesig, the SU seders decide whether to take the opportuity to access the curretly idle chaels or ot, ad vacate the spectrum wheever PUs reclaim them. At the ed of a timeslot, the SU receiver seds a short ackowledgemet to the SU seder o the chael where a packet trasmissio is successful. It is worth otig that we ivestigate the problem of robust spectrum sesig ad access i a ad hoc SU etwork without a cetral cotroller for coordiatig the SUs. Therefore, each autoomous SU aims to maximize its ow performace by sesig ad accessig the spectrum idepedetly [2]. Differet from most existig opportuistic spectrum access (OSA) protocols [2] [6] where traffic statistics are kow a priori, we cosider a more geeral ad practical sceario where traffic statistics are ot available to SUs before the start of commuicatio. For ease of expositio, i the followig discussio we term oe pair of commuicatig SUs as the seder ad the receiver. I a multi-radio settig, the seder ad the receiver are equipped with < ad k r < radios, respectively, eablig them to access multiple chaels simultaeously i each timeslot. Sice SUs must ot iterferece with active PUs i each timeslot, a SU seder thus seses < ad accesses oly k a chaels sequetially. At the receiver side, various efficiet message verificatio schemes ca be used for packet verificatio to defed agaist pollutio attacks, ad fragmets that have passed itegrity checks are reassembled to recostruct the origial message. To relax the strict sychroizatio betwee the seder ad the receiver, we ca let the hoppig frequecy of the receiver be much slower tha the hoppig frequecy of the seder, so packet losses caused by the lack of sychroizatio betwee seder ad receiver ca be eglected. Note that i our model, we do ot cosider ode autheticatio ad message privacy, which are orthogoal to the security problems this work addresses. 2.2 Threat Model ad Assumptios I CRNs, PUs such as TV users are licesed users (i.e., beig protected by law) ad usually well physically protected. From the jammer s perspective, it is very difficult to lauch effecitve attacks, ad there will be heavy pealties o the attackers if beig detected [7]. Therefore, we assume the jammer does ot have high icetive to attack PUs ad risk itself i jammig the licesed bads whe PUs are active. Istead, the jammer s target is o the secodary users (SUs), who are ulicesed users ad oly permitted to access the spectrum whe ot iterferig with PUs. The SUs access to the spectrum is opportuistic i ature without clear legal protectio. Besides, SU etworks are usually dyamic ad hoc etworks formed by radomly deployed self-orgaizig wireless devices, where it is difficult to implemet effective security coutermeasures. A stealthy attacker ca choose to jam ay targeted SUs ad prevet the targets from usig the spectrum for commuicatio. Note that such attacks agaist SUs by the jammer are stealthy ad do ot affect PUs commuicatios. That is, the attacker utilizes the same sesig iterval to detect (sese) the activity of the PUs ad oly jam the idle chaels (which are potetially used by SUs) based o the sesig outcomes. We assume the jammer has similar radio capabilities as SUs. That is, i each timeslot, the jammer is capable of sesig ad jammig k j (k j < ) chaels simultaeously. Assumig the jammer kows the whole spectrum access protocol, his objective the is to prevet the spectrum from beig utilized efficietly by the legitimate SUs. Specifically, we cosider four types of jammers with differet jammig strategies: Static jammer. A static jammer is a oblivious attacker, who selects the same set of chaels i each timeslot to sese. Based o the sesig results he emits jammig sigals o the sesed idle chaels. Note that the jammig actio is made idepedet of the sesig history the jammer may have observed i the past. Radom jammer. A radom jammer is also a oblivious attacker, who selects a set of chaels uiformly at radom from the public set of chaels i each timeslot to sese. Based o the sesig results he emits jammig sigals o the sesed idle chaels. Similar to the static jammer, the jammig actio is made idepedet of the sesig history he may have observed i the past. Myopic jammer. A myopic jammer is a powerful cogitive attacker ruig the myopic algorithm, which

4 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 4 is a well-kow OSA strategy ad ca achieve suboptimal performace (The priciple of myopic policy will be show later i Sectio 3). Iitially, the jammer selects k j chaels to sese i each timeslot util all the chaels have bee sufficietly sesed. The he ca make a accurate estimatio of the traffic statistics usig the sesig results, based o which he utilizes myopic policy to predict PUs chael occupacy patter ad emits jammig sigals o the most likely idle chaels. Obviously, i each timeslot the jammig strategy is selected based o the sesig history ad pre-kow chael occupacy statistics. Adaptive jammer. A adaptive jammer is also a cogitive attacker ruig a multi-armed badit (MAB) algorithm, which is a olie learig protocol (The MAB based learig protocol will be show i sectio 4). The jammer selects k j chaels to sese i each timeslot ad jams the sesed idle chaels based o his sesig history ad past observatios. Note that, i the power adaptive jammig attack model we assume the jammer ca adjust his sesig ad jammig strategies by leveragig the outcomes of jammig. I other words, we assume that the jammer kows whether he succeeds i jammig the trasmittig chaels (where both the seder ad the receiver reside o i a timeslot) for all the past timeslots. We emphasize that it is almost impossible to implemet such a powerful jammer i practice. However, for the purpose of performace compariso we show that SUs equipped with our ati-jammig spectrum sesig ad access protocol are still resiliet to such adaptive jammig attacks. 3 VULNERABILITY ANALYSIS OF MULTI- CHANNEL OPPORTUNISTIC SPECTRUM AC- CESS PROTOCOLS I this sectio, we aalyze the weakess of the existig multi-chael opportuistic spectrum access protocols uder jammig attacks due to their determiistic feature, which motivates us to develop a probabilistic spectrum sesig ad access approach i the ext sectio. For ease of illustratio, i the followig we cosider a SU etwork with a sigle seder-receiver pair, but the same ideas ca also be applied ad exteded to a multi-user settig. is sesed idle. The objective of the seder the is to maximize the rewards that it ca gai over a (potetially ifiite) umber of timeslots. It has bee show that this optimizatio problem ca be solved by a stochastic dyamic programmig (SDP) approach [9] to obtai optimal performace. To reduce the computatio complexity of SDP caused by the expesive backward iductio procedure, may researches has bee focused o idex policies ad myopic policy that maximizes the coditioal expected reward acquired attwas first proposed ad explored i [2], [3]. By cocetratig oly o the preset ad completely igores the future, myopic approaches achieves suboptimal performace i geeral. I myopic policy, it has also bee show that a sufficiet statistic or the iformatio state of the system for the optimal decisio makig is the belief vector Ω(t) = [ω (t),ω 2 (t),...,ω (t)], where ω i (t) is the coditioal probability that chael i is idle i timeslot t. I timeslot t, a sesig actio a(t) deotes the chaels to be sesed. Let K i (t) {,} deote whether a ACK o chael i is received or ot i timeslot t. Give a(t) ad K i (t), the belief state i timeslot t+ is give by [2] ω i (t+) = p i, i a(t),k i (t) = p i, i a(t),k i(t) = ω i (t)p i +( ω i(t))p i, i / a(t). Assume all chaels have the same trasmissio rate B i, the myopic policy uder Ω is defied as â(t) = argmax a(t) i a(t) ω i(t)b i. Recetly, the dyamic multi-chael access problem was studied uder a special class of restless multi-armed badit problems (RMBP) i [6], based o which a idex policy called Whittle s idex policy has also bee applied i the dyamic spectrum access. Similar to myopic policy, the proposed Whittle s idex policy eables the SU seder to choose those chaels whose curret states have the largest idices to sese ad access. However, a strict costrait which requires the activatig of exact m = arms/chaels at each time step may cause the optimality to be lost, but eve so the Whittle s idex policy has the ear optimal performace. Aother iterestig observatio is that the Whittle s idex policy has the same structure as the myopic policy whe chaels are stochastically idetical. 3. Opportuistic spectrum access with kow chael traffic statistics I the cotext of cogitive radio for opportuistic spectrum access, a sigle-chael access problem withi the framework of POMDP was ivestigated, ad myopic policies uder both perfect ad imperfect sesig cases have bee ivestigated i [2] [6]. The mai idea of these schemes is that the seder chooses a subset of chaels to sese based o its past observatios ad gais a fixed reward if a chael 3.2 Aalysis of OSA Uder Malicious Jammig Attacks Although theoretically soud, almost all the existig OSA protocols (icludig idex based policies) oly work well i o-malicious eviromets. Amog others, oe key assumptio made by the existig solutios is that the traffic statistics should be kow a priori. Take idex based policies for example, it is required that the iitial belief vectors Ω() ad the order of state trasitio probabilities (i.e.,p i is greater

5 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 5 or less tha p i ) o all chaels be pre-kow to SUs. I practice, however, these statistics may ot be readily available [5]. More seriously, due to the determiistic ature of the chael/frequecy selectio procedure, those OSA protocols are vulerable to malicious jammig attacks. That is, a itelliget jammer, who kows the traffic statistics of all chaels or lears them through sesig ad estimatio by observig all chaels, ca leverage such iformatio to predict which chael to be used. Sice the idex policies always choose the first chaels with the largest idices for sesig ad accessig, the jammer ca use the same dyamic decisio process to perform effective jammig attacks. I the worst case, the commuicatio ca be completely jammed as the jammer maitais the same updates iformatio for chael idex as SUs i each timeslot. From a theoretical perspective, most of OSA protocols are formulated as optimizatio problems with determiistic solutios. For example, the idex policies are established based o the stochastic model of the chael statistics. Cosider the Whittle s idex policy developed uder the restless multi-armed badit problems (RMBP) [2]. Sice the evolvemet of iformatio state (belief vector) is kow, the players ( the seder ad the receiver) ca compute ahead of time exactly what payoffs (rewards) will be received from each arm (chael). Based o the above aalysis, it is ecessary ad importat to develop probabilistic OSA protocols that are resistat to various jammig attacks ad ca accommodate the special characteristics of CRNs. To ehace the robustess of OSA, the problem of defedig jammig attacks i cogitive radio etworks was ivestigated usig game-theoretic approaches [4], [5]. However, they oly explored the sigle-chael case ad assumed that the SU receiver ca always commuicate with the secodary seder (i.e., they are cosidered as a sigle player) ad sesig is perfect. I [6], the spectrum sesig problem was formulated uder time-varyig chaels as a adversarial badit problem. Similar to [4], [5], the authors oly cosidered the case of sigle sesig chael ad assumed that the SU receiver ad the SU seder were cosidered as a sigle player. I this paper, we cosider a more practical model ad make a step towards the developmet of robust multi-radio multi-chael OSA protocols for CRNs. 4 JAMMING-RESISTANT MULTI-RADIO MULTI-CHANNEL OPPORTUNISTIC SPECTRUM ACCESS 4. Scheme Overview Based o the above aalysis, we ca see that whe a attacker lauches malicious jammig attacks to disrupt legitimate commuicatios i SU etworks, the chael statistics (which are determied by activities of PUs whe there exists o jammig) caot correctly reflect the true state (idle or busy) of the chael. That is, the rewards (i.e., idicatios of successful packet receptios) associated with each chael caot be modeled by a statioary distributio or o statistical assumptios ca be made about the trasitio of iformatio state ad the geeratio of rewards. This is due to the dyamic behaviors of both PUs ad jammers, i.e., PUs occasioally occupy ad free the chaels ad a jammer may adjust his sesig ad jammig strategy to maximize the effect of jammig. These effects will make the geeratio of rewards arbitrarily chage o chaels i each timeslot. Motivated by this observatio, it is ecessary to keep a exploratio of the best possible set of chaels for trasmissio to adapt the dyamics of jammers ad PUs. Meawhile, it is also ecessary to exploit the previously-chose favorable set of chaels as too much exploratio will potetially uderutilize them. Obviously, the proposed ati-jammig problem is thus the oe balacig betwee exploitatio ad exploratio, rather tha oly optimizatios. 4.2 Problem Formulatio: A Multi-player Game I this paper, we cosider a jammig ad atijammig game amog a SU seder, a SU receiver ad a jammer uder dyamic PU behaviors. To fully utilize the vacat spectrum, the objective of the SU seder-receiver is to choose the sesig, access/receivig actios i each timeslot to maximize the total expected rewards (i.e., successfully received packets) over T timeslots. O the cotrary, the jammer s objective is to miimize the total expected rewards to disrupt the legitimate SU commuicatios. Sice chael states (idle or busy) are ot directly observable before chael sesig, the seder chooses chaels to sese durig the sesig iterval, where the sesig actio is made based o all the past decisios ad observatios. Due to PUs dyamic actios o a chael, the seder oly chooses k a (k a ) idle chaels to access. At the receiver side, the receiver idepedetly chooses k r chaels to receive, where the selectio is also made based o all the past decisios ad observatios. Durig the same timeslot, the jammer chooses k j chaels to sese ad jam the sesed idle chaels based o his chose jammig strategy. Note that, although we cosider a sigle SU pair i our ati-jammig problem, the proposed scheme ca be directly applied to a SU commuicatio etwork with multiple SU seder-receiver pairs. This is because each SU, which is autoomous i a ad hoc SU etwork, ca utilize our proposed scheme to maximize its ow performace by takig iterferece/collistios caused by other SU pairs as jammig sigals. It is easy to see that whe the umber of other SU pairs i the eighborhood of the receiver which use the same chaels is much less tha, the impact of uitetioal iterferece ca be egligible.

6 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 6 We ext formalize the jammig ad ati-jammig game usig mathematical otatio. We first umber the chaels/frequecies from to ad costruct the vector space {,}. Obviously, the seder s sesig ad access strategy space ad the receiver s receivig strategy space are deoted as S s {,} of size ( ) ad Sr {,} of size ( ) k r, respectively. I a SU s strategy/vector, the value of the f- th (f {,...,}) etry of a vector is if the f-th chael is chose for sedig ad access or receivig; otherwise. Accordigly, the jammig strategy space ( for the jammer is deoted as S j {,} of size ) k j. Differet from a SU s strategy, the value i the f-th etry deotes that the jammer chooses the f-th chael to sese ad jam ad the value is otherwise. Differet from the above three parties, PUs activities o the chaels are idepedet of other parties s actios, ad a PU s actio/strategy ca also be deoted as a vector s p {,}, where the value deotes the chael is idle ad the value deotes the chael is occupied. Durig each timeslot, the seder, the receiver ad the jammer choose their ow respective strategies s s S s, s r S r ad s j S j, respectively. I each timeslot, assume the PU s strategy or activity is s p. From the receiver s perspective, s s s p s j ca be cosidered as a joit decisio made by the seder, the PU ad the jammer, where deotes bitwise AND operatio. We say that i timeslot t the seder, a reward g f,t = is itroduced for chael f if the f-th etry of s s s p s j is ; otherwise o reward is received, i.e., g f,t =. O the receiver side, the receptio of a reward depeds o the state of the chael f the receiver has chose for packet receptio. I additio, we use erasure codig combied with short sigatures to verify/autheticate the received packets, reassemble message ad defed agaist pollutio-based DoS attacks [9]. Note that, we do ot differetiate betwee packet jammig ad packet collisios as they both cause iterferece to the legitimate packets, ad packet codig ca be used to recover bit errors i received packets. After the receiver chooses a strategy s r, a reward o chael f is revealed to the receiver if ad oly if f is chose as a receivig chael. There are four possible cases: Case : No packet is received o f. This is because f has ot bee selected by the seder for trasmissio. I this case, reward is obtaied. Case 2: A packet is received of. If the received packet fails to pass the verificatio, reward is obtaied. Case 3: A packet is received o f. Jammed or collided packets that caot be recovered will be discarded, resultig i reward. Case 4: A packet is received o f. If o jammig is detected or corrupted packets due to jammig ca be recovered via packet codig, a reward is obtaied. Similarly, after the seder chooses a strategy s s, a reward o chael f is revealed to the seder if ad oly if f is chose as a sedig chael. A reward is obtaied if a ACK is received o f, otherwise the reward is. I this paper, we formally formulate the jammigresistat spectrum sesig ad access problem as a o-stochastic MAB problem (NS-MAB) [2] [23], where each chael ca be cosidered as a arm of a multi-arm badit. Due to the jammig effect ad dyamics behaviors of PUs, each chael f is the associated with a arbitrary ad ukow sequece of rewards, which ca be obtaied o a chael if the seder ad the receiver choose f for sedig ad receivig simultaeously. For ease of aalysis ad presetatio, we first defie some importat otatio. I each timeslot t {,...,T}, the seder (receiver) idepedetly selects a strategy I t from his strategy sets. We write f i if chael f is chose i strategy i, i.e., the value of the fth etry of i is. Note that a strategy is a vector of dimesio, I t deotes a particular strategy chose for timeslot t, ad i deotes a geeral strategy i the strategy set. The total rewards of a strategy i durig timeslot t is g i,t = f i g f,t, ad the cumulative rewards up to timeslot t of each strategy i is G i,t = t s= g i,s = t f i s= g f,s. The total rewards over all chose strategies up to timeslot t is thus Ĝt = t s= g I s,s = t s= f I s g f,s, where I s is chose radomly accordig to certai distributio over the strategy set. To quatify the performace, we use the followig metric called regret: max i Sx G i,t Ĝx T, x {s,r}, where the superscript is used to differetiate the seder from the receiver, ad the maximum is take over all strategies available to the seder or the receiver. The regret is defied as the accumulated rewards (or successfully received packets) differece over T timeslots betwee the proposed strategy ad the optimal static oe. The static optimal strategy deotes the best fixed solutio (i.e., the best set of chaels that if keepig to use them largest rewards will be geerated.) for message receptio i the presece of jammig. Note that the seder ad the receiver will adaptively choose their ow strategies i each timeslot based o the updated probability distributios over the strategy set. As for the seder (receiver), the updates of the probability distributio are determied by the outcomes of joit actios of PU, the jammer ad the receiver (seder). Thus, the accumulated rewards of the seder (receiver) alog the time deped o the actios of the other three parties i each timeslot. 4.3 Our Costructio I this subsectio, we preset our jammig-resistat spectrum sesig ad access protocol. Our algorithm is a probabilistic oe that ca accommodate the

7 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 7 Algorithm A Jammig-resistat Multi-radio Multichael Spectrum Sesig ad Access Protocol. Iput:,k r,, T, ε (,], δ (,), β s,β r (,], γ s,γ r (,/2], η s,η r >. Iitializatio: Iitialize all system parameters, settig the chael weight wf, x = f [,], the strategy weight wi, x = i [,N x ], ad the total strategy weight W x = N x = ( ), where x = s,t. For timeslot t =,2,...,T : Select a strategy It x accordig to p x i,t ( i [,N x ]), with p x i,t computed followig Eq. (5). 2: Compute chael selectio probability qf,t x ( f [,]) as qf,t x = i:f i px i,t. 3: Trasmit a packet if ad oly if the chael is sesed to be idle. 4: Perform verificatio ad jammig detectio oce a packet is received o chael f. Trasmit back a ackowledgemet o f if the received packet passes the check. 5: Compute rewards gf,t x ( f It x ) ad virtual rewards gf,t x with the revealed g f,t ( f [,]), followig Eqs. (3) ad (4). 6: Update chael weight wf,t x ad strategy weight wi,t x followig Eqs. () ad (2), respectively. Update the total strategy weight as Wt x = N x i= wx i,t. Ed chages of chael status caused by a (potetially) malicious jammer. The dyamic property of the proposed solutio lies i the trade-off betwee exploratio actio ad exploitatio actio, which will both affect the system performace. As show i Algorithm, the algorithm comprises two subalgorithms:a s at the seder side ada r at the receiver side. I Algorithm, the system parameters β,γ ad η are determied by the regret boud, ad the derivatio of them will be show i proof of Theorem. Let N x (x {s,r}) deote the total umber of strategies. Each strategy is assiged a strategy weight, ad each chael is assiged a chael weight. Durig each timeslot, the chael weight is dyamically adjusted based o the virtual chael rewards revealed to the seder ad the receiver: w x f,t = w x f,t eηx g x f,t, x {s,r}. () We use expoetially weighted forecasters which follow the Exp3 ( Expoetial-weight algorithm for Exploratio ad Exploitatio ) first proposed i [2]. I a multi-armed badit settig, at time t, a expert is chose with probability that icreases with the past performace of the expert. I practice, the most popular choice of such kid of fuctio is expoetial fuctio. It is easy to see that the icrease of the virtual chael rewards leads to larger chael weights. A strategy idicates the choices of chaels for use, so we defie the weight of a strategy as the product of the weights of all chaels: w x i,t = Π f i w x f,t = wx i,t eηs g x i,t, x {s,r}. (2) where gi,t x = f i gx f,t. Here, the reaso to estimate reward for each chael first istead of estimatig rewards for each strategy directly is that the reward of each chael ca provide useful iformatio about the other uchose strategies cotaiig the same chaels. The parameter β is used to cotrol the bias i estimatig the chael reward g s g s f,t = g r f,t = f,t gf,t s +βs εqf,t s ad gr f,t, which are computed as: R t if f I s t, β s εq s f,tr t otherwise, gf,t r +βr qf,t r β r qf,t r if f I r t, otherwise, where qf,t x (x {s,t}) deotes the chael f s probability distributio, ad R t is a radom variable uder Beroulli distributio satisfyig P{R t = } = ε. The parameter β is a fixed value that will be determied before the executio of the protocol (see the proof of Theorem ). Based o the true rewards revealed to the seder ad the receiver, we defie the virtual rewards to icrease weight of good chaels, i.e., icrease the access probabilities of good chaels which have bee less ofte sesed. I Algorithm, at the begiig of each timeslot, the trasceiver chooses a strategy based o the probability distributio p x i,t (x {s,t}) as: p x i,t = ( γ x ) wx i,t W + γx t x C x i C x (5) ( γ x ) wx i,t W otherwise, t x where x {s,r}. The parameter γ x is used to balace betwee wx i,t W ad t x C. x I the calculatio of the strategy probability distributio, the first part is a distributio which assigs to each actio a probability mass expoetial i the estimated cumulative reward for that actio, ad the secod part is the uiform distributio. If ot mixed with the uiform distributio, the algorithm might have large deviatios with high probability, i.e., from time to time it may cocetrate o the wrog strategy for too log ad the icur a large regret. So the mixig is doe to make sure that the algorithm tries out all strategies ad gets good estimates of the gais for each chael [2]. Note γ x is a fixed value that will be determied before the executio of the protocol (see the proof of Theorem ). The coverig strategy set C x is defied to esure that each chael/frequecy is sampled sufficietly ofte. The coverig set has the property that for each chael f, there is a strategy i i the coverig set such that f i. Based o the defiitio of strategy, each strategy icludes k x (x {s, r}) active chaels. Thus, we ca costruct oe typical ad simple coverig set with size C x = (x {s,r}). (3) (4)

8 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 8 Discussios. I practice, the trasceiver (i.e., the seder ad the receiver) may ot have the same sesig outcomes due to sesig errors. So, i our desig we let the seder perform sesig i each timeslot, ad the receiver oly selects chaels to liste o. Note that the operatig poit of the spectrum sesor is set as the probability of the collisio with PUs [2], which icludes two types of sesig errors: false alarm probability ad miss detectio probability. Without loss of geerality, we use τ to deote the sesig error probability i the followig aalysis, where τ = P{false alarm}( P{PU active}) + P{miss detectio}p{p U active}. To elimiate the iformatio asymmetry betwee the seder ad the receiver, the seder uses the ackowledge iformatio to update the probability distributio over strategy set. Thus, the accumulated rewards for the seder ad the receiver are equivalet, i.e., Ĝ s t = Ĝr t (Note that, we make this assumptio to obtai the upperboud performace of the proposed ati-jammig scheme. I Sectio 6, we evaluate the case where ACKs are radomly jammed by the attacker, showig the strog resiliece of our proposed scheme). I additio, because the seder ad the receiver are ot perfectly sychroized, it is ecessary ad importat to evaluate how close the seder s ad the receiver s strategies are as time goes. Sice the closer the trasceivers chose strategies, the more rewards geerated. This is equivalet to sayig that how well the learig based algorithm proceeds to maximize the system throughput. The spectrum sesig usually cosumes more eergy compared to receptio, i.e., it is costly to obtai the sesig results [24]. I certai applicatio scearios, legitimate odes may oly have a limited umber of sesig times due to eergy costrait. Let ε deote the proportio of timeslots whe sesig is performed. For T timeslots, the umber of sesig times is approximately Tε. I Algorithm, we itroduce a Beroulli radom variable with P{R t = } = ε at the seder side. Thus, the seder seses the chael with probability ε. There are two possible cases whe the seder does ot perform sesig i a timeslot. I the first case, the seder remais silet i this timeslot without trasmittig ay packets. Due to the radom sesig ad access strategy, it is hard for the adversary to predict the behaviors of the seder. However, as o packets are trasmitted, the trasmissio delay may be icreased. I the secod case, the seder still accesses the most possibly free chaels based o the previous probability distributio. I this case, there is a tradeoff betwee the collisio probability with PUs ad the umber of sesig times. 4.4 Theoretical Aalysis I this subsectio, we aalyze the performace of Algorithm i terms of both optimality ad efficiecy. For ease of aalysis, we first give the followig two importat defiitios. Defiitio : A algorithm A is α-static (or α- adaptive) approximatio of the static (or adaptive) optimal solutio if ad oly if it ca trasmit the message successfully i time αt with high probability (w.h.p) l ǫ whe the static (or adaptive) optimal solutio ca trasmit the same message successfully with the same probability l ǫ i time T, where ǫ > is a costat ad l is the umber of packets i the message. Defiitio 2: The regret of a algorithm A is the differece betwee the accumulated rewards usig the static optimal strategy ad that usig A over T timeslots, i.e., G max T ĜA T, where Gmax T = f i T max i S G i,t = max i S s= g f,s ad ĜA T = T s= g I s,s = T s= f I s g f,s. The first defiitio is used to characterize the approximatio ratio betwee the proposed algorithm ad the static ad adaptive optimal solutios. The secod defiitio is used to characterize the throughput performace betwee the proposed algorithm ad the optimal solutio. I the followig aalysis, we will write G max istead of G max T wheever the value of T is clear from the cotext. I additio, we will write G max T (s) ad G max T (r) to deote the rewards of the static optimal strategies for the seder ad the receiver, respectively. Due to the probabilistic strategy selectio, the seder ad the receiver are ot perfectly sychroized i each timeslot. However, we show that the seder s sesig strategy ad the receiver s receivig strategy will coverge to their ow optimal strategies. The followig theorem measures how close their optimal strategies are as T. Theorem : The ormalized reward distace T Gmax T (s) G max T (r) coverges to at rate O(/ T) as T. Proof: We first prove that at the receiver side, with probability at least δ, the regret G max T (r) ĜAr T is at most 6k r Tl, while β r k = r T l δ, γr = 2η r ad η r = l 4T ad T max{kr l δ,4l}. We use a superscript for η, γ, β to differetiate betwee the seder ad the receiver. However, for ease of expositio, we do ot differetiate betwee the other otatio sice they are idepedet i the proofs for the seder ad the receiver. Now we itroduce some otatio for performace aalysis: G i,t = T t= g i,t ad G i,t = T t= g i,t for all i N, where G i,t (G i,t ) deotes the total gai (virtual gai, respectively) of strategy i i T timeslots, ad G f,t = T t= g f,t ad G f,t = T t= g f,t for all f, where G f,t (G f,t ) deotes the total gai (virtual gai, respectively) o chael f i T timeslots. The relatioship betwee gai ad virtual gai is derived as follows.

9 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 9 The proof is applicable for ay chael f. u > ad c >, by usig the boud of Cheroff, we get P[G f,t > G f,t + u] e cu E[e c(g f,t G f,t ) ]. Let u = l δ /β ad c = β, we obtai e cu E[e c(g f,t G f,t ) ] = δ E[eβ(G f,t G f,t ) ]. Thus, we ca show that e β(g f,t G f,t ) for all T. Let Z t = e β(g f,t G f,t ). By showig E[Z t ] Z t for all t 2 ad E[Z ], it is easy to prove δ (,), β < ad f, P[G f,t > G f,t + β l δ ] δ Next we show the regret boud by usig l WT W. First, we directly ca obtai the lower boud by the defiitio l WT W = l N G i= eηr i,t ln η r max i N G i,t ln. The we derive the upper boud as follows: η r g i,t = η r f i g f,t +β r q f,t η r f i, where the secod iequality term holds due to q f,t γr C ( f) by the defiitio. Usig the fact that e x + x + x 2 for all x, for all t =,2,,T we have l Wt l N i= (η r ) 2 g 2 w i,t W t e ηr g i,t ηr k r(+β r ) C γ r i,t )) l( + N η r N γ r i= p i,tg i,t + (ηr ) 2 (6) W t = l( N w i,t i= W t ( + η r g i,t + p i,t i= γ (η r g r i,t + (ηr ) 2 g 2 i,t )) N γ r i= p i,tg 2 i,t. We derive the iequalities usig the followig two commo facts: N i= p i,t γ r ad iequality l(+x) x for all x >. Let N deote the strategy set {,...,N}. O the oe had, we have N i= p i,tg i,t = N i= p i,t f i g f,t = f= g f,t i N:f i p i,t = f= g f,t q f,t = g It,t + β r. O the other had, N i= p i,tg 2 i,t = N i= p i,t( f i g f,t )2 N i= p i,tk r f i g 2 f,t = k r f= g 2 f,t i N:f i p i,t = k r f= g 2 f,tq f,t k r ( + β r ) f= g f,t, which holds the fact that g f,t +βr q f,t. Note that for clearly differetiatig betwee the regret bouds for the seder ad the receiver, i the derivatio we loose the bouds a little bit by choosig k r istead of mi{k r, ε( τ), k j }. Therefore, l Wt W t ηr γ (g r It,t +β r )+ (ηr ) 2 k r(+β r ) γ r f= g f,t. Summig for t =,,T, we have the followig iequality l WT η r γ r (ĜT + β r T) + (η r ) 2 k r(+β r ) W γ r f= G f,t γ r (ĜT + β r T) + (η r ) 2 k r(+β r ) γ C max r i N G i,t. Here, Ĝ T deotes the expected total gai of the proposed algorithm i T timeslots. By usig the upper ad the lower bouds together, we get Ĝ T ( γ r η r k r ( + β r ) C )max i N G i,t γr η ln β r T. r Applyig Eq. (6), we ca show with probability at least δ, Ĝ T ( γ r η r k r ( + β r ) C )(max i N G i,t kr β l γr r δ ) η ln β r T. r Here, we used the fact γ r η r k r ( + β r ) C > which follows the assumptios of the theorem. η r By doig some traspositios ad usig the followig fact max i N G i,t Tk r, we have max i N G i,t ĜT (γ r + η r ( + β r )k r C )Tk r + ( γ r η r (+β r )k r C ) kr β l r δ ++ γr η ln +β r T r with probability at least δ. Let K = mi{, k j,k r }. Sice G ˆ T = KT L ˆ T ad max i N G i,t = KT mi i N L i,t, we have L ˆ T KT(γ r +η r (+ β r )k r C )+( γ r η r (+β r )k r C )mi i N L i,t + ( γ r η r ( + β r )k r C ) kr β l r δ + γr η ln + β r T r with probability δ. By simplifyig the iequality, we have L ˆ T mi i N L i,t k r Tγ r + 2η r Tk r + k r β r l δ + γr k r η r k r l+β r T with probability δ Settig β r = T l δ ad γ r = 2η r k r C, we ca get G max T (r) ĜAr T = max i N G i,t ĜT 4η r Tk 2 r C + ln η + 2 k r r T l δ which holds with probability δ if T kr l( δ ). Fially, by usig the facts C = k r ad N kr, ad settig η r = ln 4kr 2T C, we ca prove max i N G i,t ĜT 6k r Tl by properly choosig δ. Similarly, at the seder side we first show the coectio betwee the true ad the estimated cumulative rewards. The oly differece is that the computatio of estimated chael rewards is ivolved with a radom variable ε. We prove that with probability at least δ, the regret G max T (s) ĜAs T is 2 bouded by 4 β s = Tl ε by property choosig δ, εl 4T ad Tε l 2 δ, γs = 2ηs ε ad η s = T max{ ks l2 2 δ εl,4l}. To clearly differetiate the regret bouds for the seder ad the receiver, we loose the bouds a little bit by choosig k r ad istead of mi{k r, ε( τ), k j }. Hece, the sesig error probabilityτ does ot appear i the fial expressio of performace boud. Fially, as ĜAs T 6k r Tl + 4ks 2 2 l δ, = ĜAr T, Gmax T Tl ε 2k (s) G max T (r) ε Tl, where k = max{k 2 s,k r }. Thus, T Gmax T (s) G max T (r) at rate O(/ T) as T. Theorem 2: Algorithm has time complexity O(k x T) ad space complexity O(k x ), where x {s,r}. Proof: I the proposed algorithm, the computatio of probability distributios of strategy ad chael are the most time-cosumig steps due to the expoetial umber of possible strategies. I this proof, we show that the time complexity ca be reduced by usig dyamic programmig. We use S( f, k) to deote the strategy set of which each strategy selects k chaels from f, f +,,. Also, we use S( f, k) to deote the strategy set of which each strategy selects k chaels from,2,, f. We defie W t ( f, k) = i S( f, k) f i w f,t ad W t ( f, k) = i S( f, k) f i w f,t. Note W t ( f, k) = W t ( f +, k) + w f,t W t ( f +, k ) ad W t ( f, k) = W t ( f, k) + w f,t W t ( f, k ), which implies both W t ( f, k)

10 JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 ad W t ( f, k) ca be calculated i O(k x ) (lettig W t ( f,) =, W( +, k) = W(, k) = ) by usig dyamic programmig approach f ad k k x. I step, a strategy should be draw from ( ) k x strategies. Istead of drawig a strategy, we choose chael for the strategy oe by oe. Here, we choose chaels oe by oe i the icreasig order of chael idices, i.e., we determie whether the chael should be selected, ad the chael 2, ad so o. f, if k k x chaels have already bee selected from chaels,,f, we select a chael f with probability w f,t W t (f+,k x k ) W t (f,k x k) ad ot select f with probability Wt (f+,kx k) W t (f,k x k). Let w(f) = w f,t if chael f i; w(f) = otherwise. Obviously, w(f) is actually the weight of f i the strategy weight. I our algorithm, w i,t = f=w(f). Let c(f) = if f is selected i i; c(f) = otherwise. f f=c(f) deotes the total umber of chaels selected from chaels,2,, f ii. By this implemetatio, the probability of choosig i is w( f)w t ( f+,k x f= f f= c(f)) f= w( f) W = t ( f,k x f f= c(f)) W = wi,t t (,k x) W t. This probability is equivalet to that i Algorithm, which implies the implemetatio is correct. Because we do ot maitai w i,t, it is impossible to compute q f,t as we described i Algorithm. The, q f,t ca be calculated i O() as q f,t = ( γ) kx k= +γ {i C:f i} C W t (f,k)w f,t W t (f+,k x k ) W t (,k x) for each roud. I practice, the trasmitted messages, which may have much larger size tha the legth of timeslots, have to be split ito small fragmets to fit the timeslots. As show above, the proposed jammig-resistat spectrum sesig ad access protocol is probabilistic i ature, so we caot guaratee the trasmitted message is delivered i certai umber of timeslots with probability oe. So, to evaluate the trasmissio efficiecy, we cosider the expected time for a message delivery with high probability, which implies the probability goes to oe whe the total umber of packets goes to ifiity. Based o the ackowledgemet iformatio, i each timeslot the seder will pick up a packet that has ot bee delivered. Without loss of geerality, assumig a message M is partitioed ito l packets M,M 2,,M l, each of which has size M i = M /l ( i l). The, the trasmitted message M ca be recostructed at the receiver if ad oly if all l packets are successfully received. The followig theorems characterize the approximatio factors for the static optimal ad adaptive optimal solutios. Theorem 3: Whe l 36(+cǫ)k r l/(c ) 2 ǫ 2, our algorithm is ( + cǫ)-static approximatio for ay costat c >. Proof: See []. 3 lk(+cǫ) Theorem 4: Whe l 36ε( τ)( k j)(c ) 2 ǫ, our 2 algorithm is 2 k rε( τ)( k j) K( + cǫ)-adaptive approximatio for ay costat c >, where K = mi{k r, ε( τ), k j }, ε is the probability of sesig a chael ad τ is the sesig error probability. Proof: See []. Discussios. As ca be see i the proof of Theorem, the parameters β, η ad γ are fixed values ad they are all pre-computed before the protocol executio. If we aim at esurig that with probability at least δ the regret boud ca be achieved, we ca set a preferable value for δ. The parameter selectio process is as follows. We have β x k = x T l δ, γx = l 4T. Here, ad k r are pre-selected 2η x ad η x = system parameters. Oce T is obtaied, the specific values of β x, η x ad γ x ca be determied such that the regret boud holds (or asymptotic optimality is achieved). To determie T, i our protocol desig, we let the seder determie a feasible T ad ecode it i each packet for trasmissio. The receiver obtais T by successfully decodig ay received packet ad begis to ru the algorithm. Assume p is the probability of message delivery, the seder determies T by first estimatig a lower boud k r of k r ad a upper boud k j of k j. It the calculates ǫ such that l = p ǫ ad determies the costat c > such that l = 36(+cǫ)k r l/(c ) 2 ǫ 2. Fially, the expected time k for message delivery is T = (+cǫ)l/(ε( τ) k j r ). By theorem 3, with probability at least p the message M ca be successfully recovered at the receiver. 5 TRACKING THE ADAPTIVE COMPOUND STRATEGY FOR ANTI-JAMMING SPECTRUM ACCESS I the above discussios, regret is computed as the accumulated reward differece betwee the proposed ati-jammig strategy ad the static optimal strategy. We have show that the proposed jammig-resistat i Algorithm ca track the static optimal strategy ad coverge to it as time goes. Accordig to the defiitio, the static optimal strategy is selected as the fixed best strategy used for all timeslots. However, for each timeslot there always exists the best strategy agaist the joit strategy of the other parties ivolved i the ati-jammig game. Likig these strategies from all timeslots together, the best compoud strategy is formulated, ad this is so-called the adaptive optimal strategy. So, a iterestig questio ca be raised here: at each timeslot, the good strategy may chage, is it possible to select a sequece of strategies to approximate the adaptive/compoud strategy? 5. The Proposed Costructio I Algorithm, the size of the static optimal strategy set is ( k r ) ( ( ) ). However, for all possible compoud

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks 1 Qian Wang, Hai Su, Kui Ren, and Kai Xing Department of ECE, Illinois Institute of Technology, Email:

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau, Member, IEEE, Mighua Che, Member, IEEE, ad Soug Ch Liew, Seior Member, IEEE Abstract I the literature, asymptotic studies of multi-hop wireless

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution 1 Database-assisted Spectrum Access i Dyamic Networks: A Distributed Learig Solutio Yuhua Xu, Member, IEEE, Yitao Xu ad Alaga Apalaga, Seior Member, IEEE arxiv:1502.06669v2 [cs.it] 3 Jul 2015 Abstract

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau Computer Laboratory, Uiversity of Cambridge; Dept. of E. & E. Egg., Uiversity College Lodo Chi-Ki.Chau@cl.cam.ac.uk Mighua Che Dept. of Iformatio

More information

Is Diversity Gain Worth the Pain: Performance Comparison Between Opportunistic Multi-Channel MAC and Single-Channel MAC

Is Diversity Gain Worth the Pain: Performance Comparison Between Opportunistic Multi-Channel MAC and Single-Channel MAC Is Diversity Gai Worth the Pai: Performace Compariso Betwee Opportuistic Multi-Chael MAC ad Sigle-Chael MAC Yag Liu 1, Migya Liu 1 ad Jig Deg 2 1 Departmet of Electrical Egieerig ad Computer Sciece, Uiv.

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

Cooperative Spectrum Sensing in Cognitive Radio Networks

Cooperative Spectrum Sensing in Cognitive Radio Networks Cooperative Spectrum Sesig i Cogitive Radio Networks Ghurumuruha Gaesa ad Ye (Geoffrey) Li School of Electrical ad Computer Egieerig Georgia Istitute of Techology, Atlata, Georgia 30332 0250 Abstract I

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI Stable Throughput Regio of Dowlik NOMA Trasmissios with imited CSI Yog Zhou ad Vicet W.S. Wog Departmet of Electrical ad Computer Egieerig The Uiversity of British Columbia, Vacouver, Caada e-mail: {zhou,

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

Management of a Shared Spectrum Network in Wireless Communications

Management of a Shared Spectrum Network in Wireless Communications Maagemet of a Shared Spectrum Network i Wireless Commuicatios Shiig Wu, Jiheg Zhag, Rachel Q. Zhag Departmet of Logistics ad Maritime Studies The Hog Kog Polytechic Uiversity, Hog Kog Departmet of Idustrial

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Hierarchical Beamforming for Large One-Dimensional Wireless Networks

Hierarchical Beamforming for Large One-Dimensional Wireless Networks Hierarchical Beamformig for Large Oe-Dimesioal Wireless Networks Alla Merzakreeva, Olivier Lévêque Swiss Federal Istitute of Techology - Lausae, Switzerlad {alla.merzakreeva, olivier.leveque}@epfl.ch Ayfer

More information

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks The Throughput ad Delay Trade-off of Wireless Ad-hoc Networks. Itroductio I this report, we summarize the papers by Gupta ad Kumar [GK2000], Grossglauser ad Tse [GT2002], Gamal, Mame, Prabhakar, ad hah

More information

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Converge-Cast with MIMO

Converge-Cast with MIMO Coverge-Cast with MIMO Luoyi Fu, Yi Qi 2, Xibig Wag 3, Xue Liu 4,2,3 Depart. of Electroic Egieerig, Shaghai Jiaotog Uiversity, Chia 4 Depart. of Computer Sciece & Egieerig, Uiversity of Nebraska Licol,

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks Eergy-Optimal Olie Algorithms for Broadcastig i Wireless Networks Shay Kutte, Hirotaka Oo, David Peleg, Kuihiko Sadakae, ad Masafumi Yamashita Abstract The paper cosiders the desig of eergy-efficiet olie

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system Iteratioal Research Joural of Egieerig ad Techology (IRJET) e-iss: 2395-0056 Volume: 03 Issue: 04 Apr-206 www.irjet.et p-iss: 2395-0072 A Research o Spectrum Allocatio Usig Optimal Power i Dowli Wireless

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems Measuremet-Based Opportuistic Feedbac ad Schedulig for Wireless Systems Gustavo de Veciaa ad Shailesh Patil Wireless Networig ad Commuicatios Group Dept. of Electrical ad Computer Egieerig The Uiversity

More information

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel Decode-forward ad Compute-forward Codig Schemes for the Two-Way Relay Chael Peg Zhog ad Mai Vu Departmet of Electrical ad Computer Egieerig McGill Uiversity Motreal, QC, Caada H3A A7 Emails: peg.zhog@mail.mcgill.ca,

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

Neighbor Discovery for Cognitive Radio Ad Hoc Networks

Neighbor Discovery for Cognitive Radio Ad Hoc Networks Neighbor Discovery for Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig, Kyug Hee Uiversity, 1 Seocheo,Giheug, Yogi, Gyeoggi 449-701 Korea +8-10-561-811 htike@etworkig.khu.ac.kr,

More information

Zero Pre-shared Secret Key Establishment in the Presence of Jammers

Zero Pre-shared Secret Key Establishment in the Presence of Jammers Zero Pre-shared Secret Key Establishmet i the Presece of ammers Tao i College of Computer Sciece Northeaster Uiversity Bosto, MA 25 taoji@ccs.eu.edu Guevara Noubir College of Computer Sciece Northeaster

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA Cacellatio of Multiuser Iterferece due to Carrier Frequecy Offsets i Upli OFDMA S. Maohar, V. Tiiya, D. Sreedhar, ad A. Chocaligam Departmet of ECE, Idia Istitute of Sciece, Bagalore 56001, INDIA Abstract

More information

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK Ajay Kr. Sigh 1, G. Sigh 2 ad D. S. Chauha 2 1 Departmet of Computer Sciece ad Egieerig Jaypee Uiversity of Iformatio Techology, Sola -173 215, Idia 2

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance Time-Space Opportuistic Routig i Wireless Ad Hoc Networks, Algorithms ad Performace Fraçois Baccelli, Bartlomiej Blaszczyszy, Paul Muhlethaler To cite this versio: Fraçois Baccelli, Bartlomiej Blaszczyszy,

More information

Wavelength Band Switching in Multigranular Optical WDM Networks

Wavelength Band Switching in Multigranular Optical WDM Networks Wavelegth Bad Switchig i Multigraular Optical WDM Networks Vishal Aad Collaborators X. Cao,, Dr. Y. Xiog ad Dr. C. Qiao LANDER, CSE Departmet, SUNY at Buffalo ~1~ Vishal Aad Outlie λ The Problem with preset

More information

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection Sesors & rasducers Vol. 23 Special Issue July 203 pp. 94-98 Sesors & rasducers 203 by IFSA http://www.sesorsportal.com WSN Node Localizatio Regularizatio Algorithm Based o Quasi Optimal Criterio Parameter

More information

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2 Iteratioal Coferece o Iformatio Techology ad Maagemet Iovatio (ICITMI 15) Evaluatio of turbulet parameters based o agle-of-arrival fluctuatio Yag LI 1,Chao GAO, Yi-Mig LI, Gag YANG & Xiao-Feg LI 1 Accoutig

More information

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System Sesors & Trasducers, Vol. 168, Issue 4, April 014, pp. 10-15 Sesors & Trasducers 014 by IFSA Publishig, S. L. http://www.sesorsportal.com Subcarriers ad Bits Allocatio i Multiuser Orthogoal Frequecy Divisio

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider Wi-Fi or Femtocell: User Choice ad Pricig Strategy of Wireless Service Provider Yajiao Che, Qia Zhag Departmet of Computer Sciece ad Egieerig Hog Kog Uiversity of Sciece ad Techology Email: {cheyajiao,

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks 3878 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract

More information

Cooperative Detection and Communication in Wireless Sensor Networks

Cooperative Detection and Communication in Wireless Sensor Networks Cooperative Detectio ad Commuicatio i Wireless Sesor Networks Mohiuddi Ahmed, Yug-Szu Tu, ad Gregory Pottie Electrical Egieerig Departmet, Uiversity of Califoria, Los Ageles Box 95594, Los Ageles, Califoria

More information

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems O Balacig Exploratio vs. Exploitatio i a Cogitive Egie for Multi-Atea Systems Haris I. Volos ad R. Michael Buehrer Mobile ad Portable Radio Research Group (MPRG), Wireless@Virgiia Tech Bradley Departmet

More information

Decentralized prioritized planning in large multirobot teams

Decentralized prioritized planning in large multirobot teams Decetralized prioritized plaig i large multirobot teams Prasaa Velagapudi, Studet Member, IEEE, Katia Sycara, Fellow, IEEE, ad Paul Scerri Abstract I this paper, we address the problem of distributed motio

More information

Learning with handoff cost constraint for network selection in heterogeneous wireless networks

Learning with handoff cost constraint for network selection in heterogeneous wireless networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commu. Mob. Comput. 16; 16:441 458 Published olie 16 October 14 i Wiley Olie Library (wileyolielibrary.com). DOI: 1.1/wcm.55 RESEARCH ARTICLE Learig

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information

Sensing Strategies for Channel Discovery in Cognitive Radio Networks

Sensing Strategies for Channel Discovery in Cognitive Radio Networks Sesig Strategies for Chael Discovery i Cogitive Radio Networks (Ivited Positio Paper) Abdulkadir Celik, Ramzi Saifa, Ahmed E. Kamal Dept. of Electrical ad Computer Eg., Iowa State Uiversity, Ames, IA 50011

More information

Low Latency Random Access with TTI Bundling in LTE/LTE-A

Low Latency Random Access with TTI Bundling in LTE/LTE-A Low Latecy Radom Access with TTI Budlig i LTE/LTE-A Kaijie Zhou, Navid Nikaei Huawei Techologies Co., Ltd. Chia, zhoukaijie@huawei.com Eurecom, Frace, avid.ikaei@eurecom.fr Abstract To reduce the uplik

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

GENERALIZED SCATTERING MATRIX FOR OPTICAL STRUCTURES. Sunit Mehrotra,Reena Kumbhare and Girish P. Saraph

GENERALIZED SCATTERING MATRIX FOR OPTICAL STRUCTURES. Sunit Mehrotra,Reena Kumbhare and Girish P. Saraph GENERALIZED SCATTERING MATRIX FOR OPTICAL STRUCTURES Suit Mehrotra,Reea umbhare ad Girish P. Saraph Dept. of Electrical Egieerig Idia Istitute of Techology Bombay Mumbai 476 suit,shaku,girishs@ee.iitb.ac.i

More information

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES OPTIMIZED LIK ADAPTATIO FO WIELE PACKET COMMUICATIO BAED O DICETE-ATE MODULATIO AD CODIG CHEME Jalil eifali Harsii, ad Farshad Lahouti Wireless Multimedia Commuicatios Laboratory chool of Electrical ad

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Cooperative Diversity Based on Code Superposition

Cooperative Diversity Based on Code Superposition 1 Cooperative Diversity Based o Code Superpositio Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daiel J. Costello, Jr. Departmet of Electrical Egieerig, Uiversity of Notre Dame, Notre Dame, IN 46556, USA Email:

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Solution 2 Discussion:

Solution 2 Discussion: Mobile Couicatios Solutio 2 Discussio: 4..2007 Solutio 2.: Multiplexig For ultiplexig, SDMA, TDMA, FDMA, ad CDMA were preseted i the lecture. a.) What liits the uber of siultaeous users i a TDM/FDM syste

More information

Consensus-based Synchronization of Microgrids at Multiple Points of Interconnection

Consensus-based Synchronization of Microgrids at Multiple Points of Interconnection MITSUBISHI EECTRIC RESEARCH ABORATORIES http://www.merl.com Cosesus-based Sychroizatio of Microgrids at Multiple Poits of Itercoectio Shah, S.; Su, H.; Nikovski, D.N.; Zhag, J. TR208-2 August 7, 208 Abstract

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS Volume 5, Issue, March 2008 SHENG Yu, PENG Mu-ge, WANG We-bo A ovel adaptive modulatio ad codig strategy based o partial feedback for ehaced

More information

A D2D-based Protocol for Ultra-Reliable Wireless Communications for Industrial Automation

A D2D-based Protocol for Ultra-Reliable Wireless Communications for Industrial Automation 1 A D2D-based Protocol for Ultra-Reliable Wireless Commuicatios for Idustrial Automatio Liag Liu, Member, IEEE ad Wei Yu, Fellow, IEEE arxiv:1710.01265v3 [cs.it] 15 May 2018 Abstract As a idispesable use

More information

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL., NO., SEPTEMBER 005 35 A Framework for Aalysis of Coectivity ad Performace Bouds i Ad Hoc Networks ad Its Applicatio to a Slotted-ALOHA Sceario Fabrizio

More information

Fast Sensor Deployment for Fusion-based Target Detection

Fast Sensor Deployment for Fusion-based Target Detection Fast Sesor Deploymet for Fusio-based Target Detectio Zhaohui Yua*, Rui Ta*, Guoliag Xig*, Cheyag Lu, Yixi Che *Departmet of Computer Sciece, City Uiversity of Hog Kog Departmet of Computer Sciece ad Egieerig,

More information