Medium access in cognitive radio networks: A competitive multi-armed bandit framework

Lifeng Lai, Hai Jiang, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Scopus citations

Abstract

This paper considers the design of medium access control protocols for cognitive radio networks in a highly dynamic environment. In the scenario under consideration, multiple cognitive users seek to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands. The availability of each channel is modelled as a Markov chain. The scenario in which the parameters of the Markov chain of each channel is known is first considered. An optimal symmetric strategy that maximizes the total throughput of the cognitive users is developed. Next, the situation in which the parameters of each channel are unknown a priori is considered. This problem is modelled as a competitive multiuser bandit problem, a non-trivial extension of the classical bandit problem. Low complexity medium access protocols, which strike an optimal balance between exploration and exploitation in such competitive environments, are developed. The operating points of these low complexity protocols are shown to converge to those of the scenario in which the parameters are known.

Original languageEnglish (US)
Title of host publication2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008
Pages98-102
Number of pages5
DOIs
StatePublished - Dec 1 2008
Event2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008 - Pacific Grove, CA, United States
Duration: Oct 26 2008Oct 29 2008

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Other

Other2008 42nd Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2008
CountryUnited States
CityPacific Grove, CA
Period10/26/0810/29/08

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Medium access in cognitive radio networks: A competitive multi-armed bandit framework'. Together they form a unique fingerprint.

Cite this