Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503148
Bo Chai, Ruilong Deng, Peng Cheng, Jiming Chen
In this paper, we study power allocation in cognitive sensor networks where cognitive users (cognitive enabled sensor nodes) opportunistically share a common spectrum with primary users (licensed devices). We define an energy efficiency-oriented utility function as a new metric to evaluate power allocation. Consider that sensor nodes are self-interested to maximize their own utility, we formulate the energy efficient power allocation problem as a non-cooperative game. We firstly prove that there exist Nash equilibriums in the proposed game. Secondly, we prove that the power allocation game is a supermodular game with some conditions. Finally, we use best response algorithm to identify the Nash equilibrium. Simulations are conducted to demonstrate that the proposed power allocation strategy can achieve satisfactory performance in terms of energy efficiency, convergence speed and fairness in cognitive sensor networks.
{"title":"Energy-efficient power allocation in cognitive sensor networks: A game theoretic approach","authors":"Bo Chai, Ruilong Deng, Peng Cheng, Jiming Chen","doi":"10.1109/GLOCOM.2012.6503148","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503148","url":null,"abstract":"In this paper, we study power allocation in cognitive sensor networks where cognitive users (cognitive enabled sensor nodes) opportunistically share a common spectrum with primary users (licensed devices). We define an energy efficiency-oriented utility function as a new metric to evaluate power allocation. Consider that sensor nodes are self-interested to maximize their own utility, we formulate the energy efficient power allocation problem as a non-cooperative game. We firstly prove that there exist Nash equilibriums in the proposed game. Secondly, we prove that the power allocation game is a supermodular game with some conditions. Finally, we use best response algorithm to identify the Nash equilibrium. Simulations are conducted to demonstrate that the proposed power allocation strategy can achieve satisfactory performance in terms of energy efficiency, convergence speed and fairness in cognitive sensor networks.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"33 1","pages":"416-421"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76400103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503857
Chin-Liang Wang, Jyun-Yu Chen, Hung-Chin Wang
In this paper, we investigate the effect of channel estimation errors on the capacity of amplify-and-forward cooperative relay systems. Since an exact capacity expression in the presence of channel estimation errors is difficult to be found, we turn to derive its lower bound instead. Accordingly, by maximizing the derived lower bound, we propose power allocation schemes for both single-relay and multi-relay systems. For single-relay systems, an analytical solution for inequality constrained problem is too complicated to be obtained. Thus, we propose a gradient descent algorithm with a log-barrier function to solve the inequality constrained problem. For multi-relay systems, in terms of the channel estimates and the corresponding mean-squared errors, we provide a water-filling solution for the optimal power allocation among the relays. Simulation results show that the proposed power allocation schemes yield capacity gain compared with equal power allocation at low to medium signal-to-noise ratios.
{"title":"Capacity analysis and power allocation under imperfect channel estimation for AF-based cooperative relay systems","authors":"Chin-Liang Wang, Jyun-Yu Chen, Hung-Chin Wang","doi":"10.1109/GLOCOM.2012.6503857","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503857","url":null,"abstract":"In this paper, we investigate the effect of channel estimation errors on the capacity of amplify-and-forward cooperative relay systems. Since an exact capacity expression in the presence of channel estimation errors is difficult to be found, we turn to derive its lower bound instead. Accordingly, by maximizing the derived lower bound, we propose power allocation schemes for both single-relay and multi-relay systems. For single-relay systems, an analytical solution for inequality constrained problem is too complicated to be obtained. Thus, we propose a gradient descent algorithm with a log-barrier function to solve the inequality constrained problem. For multi-relay systems, in terms of the channel estimates and the corresponding mean-squared errors, we provide a water-filling solution for the optimal power allocation among the relays. Simulation results show that the proposed power allocation schemes yield capacity gain compared with equal power allocation at low to medium signal-to-noise ratios.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"65 1","pages":"4677-4682"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83951781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503338
Ying An, Jiawei Huang, Hong Song, Jianxin Wang
End-to-end reliability in Delay Tolerant Networks (DTNs) is challenging and complicated because of high delay and absence of stable end-to-end path in the intermittently-connected mobile environment. Some existing acknowledgement mechanisms use active forwarding to provide the end-to-end reliability, while incurring excessive retransmissions or replications. The other passive mechanisms aim to reduce the storage overhead but may suffer a large delay. To improve the storage-delay tradeoff, we propose a Congestion Level based end-to-end ACKnowledgement (CL-ACK) mechanism, which adaptively adjusts the spread manner of ACK packets according to the ratio of drops over replications. Simulation results show that CL-ACK effectively controls resources consumption, reduces end-to-end delay, and achieves high message delivery rate.
{"title":"A Congestion Level based end-to-end acknowledgement mechanism for Delay Tolerant Networks","authors":"Ying An, Jiawei Huang, Hong Song, Jianxin Wang","doi":"10.1109/GLOCOM.2012.6503338","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503338","url":null,"abstract":"End-to-end reliability in Delay Tolerant Networks (DTNs) is challenging and complicated because of high delay and absence of stable end-to-end path in the intermittently-connected mobile environment. Some existing acknowledgement mechanisms use active forwarding to provide the end-to-end reliability, while incurring excessive retransmissions or replications. The other passive mechanisms aim to reduce the storage overhead but may suffer a large delay. To improve the storage-delay tradeoff, we propose a Congestion Level based end-to-end ACKnowledgement (CL-ACK) mechanism, which adaptively adjusts the spread manner of ACK packets according to the ratio of drops over replications. Simulation results show that CL-ACK effectively controls resources consumption, reduces end-to-end delay, and achieves high message delivery rate.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"44 1","pages":"1574-1579"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90491858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503123
Qinghua Shen, W. Zhuang
Delay constraint and sensor energy consumption requirements are two core issues for e-healthcare applications in wireless body area networks. In this paper, we investigate the data transmission scheduling problem to utilize the sleep and opportunistic transmission for energy efficiency, while guaran- teeing the worst-case delay for medical data transmission. To achieve sensor energy saving by exploiting propagation channel quality with a deterministic delay requirement poses challenges in developing a scheduling policy. We address this problem using a Lyapunov optimization formulation and propose a two-step scheduling algorithm. We prove that the algorithm can provide worst-case delay guarantee under certain conditions. Theoretical analysis and simulation results are presented to demonstrate the tradeoff between the transmission delay and energy consumption.
{"title":"Energy efficient scheduling for delay constrained communication in wireless body area networks","authors":"Qinghua Shen, W. Zhuang","doi":"10.1109/GLOCOM.2012.6503123","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503123","url":null,"abstract":"Delay constraint and sensor energy consumption requirements are two core issues for e-healthcare applications in wireless body area networks. In this paper, we investigate the data transmission scheduling problem to utilize the sleep and opportunistic transmission for energy efficiency, while guaran- teeing the worst-case delay for medical data transmission. To achieve sensor energy saving by exploiting propagation channel quality with a deterministic delay requirement poses challenges in developing a scheduling policy. We address this problem using a Lyapunov optimization formulation and propose a two-step scheduling algorithm. We prove that the algorithm can provide worst-case delay guarantee under certain conditions. Theoretical analysis and simulation results are presented to demonstrate the tradeoff between the transmission delay and energy consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"14 1","pages":"262-267"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74691453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503406
Yan Zhang, Xu Zhou, Xuezhen Zhang, Shuhao Liu, D. Liao
In P2P file sharing systems over mobile cellular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of the requesting peer's demand respectively. Our algorithms take the requesting peer's downlink bandwidth as the target of the sum of the selected peers' uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the lowest traffic load before choosing each peer. We also provide a Fuzzy Cognitive Map that can be used to estimate peers' service ability in P2P systems over mobile cellular networks. Simulation results show that in respective cases DBaT-B and DBaT-N can both achieve much better load balance on cells than some traditional algorithms while ensuring favorable file transfer speed.
{"title":"Peer selection in P2P file sharing systems over mobile cellular networks with consideration of downlink bandwidth limitation","authors":"Yan Zhang, Xu Zhou, Xuezhen Zhang, Shuhao Liu, D. Liao","doi":"10.1109/GLOCOM.2012.6503406","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503406","url":null,"abstract":"In P2P file sharing systems over mobile cellular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of the requesting peer's demand respectively. Our algorithms take the requesting peer's downlink bandwidth as the target of the sum of the selected peers' uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the lowest traffic load before choosing each peer. We also provide a Fuzzy Cognitive Map that can be used to estimate peers' service ability in P2P systems over mobile cellular networks. Simulation results show that in respective cases DBaT-B and DBaT-N can both achieve much better load balance on cells than some traditional algorithms while ensuring favorable file transfer speed.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"40 1","pages":"1981-1987"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84588451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503907
Kuhn-Chang Lin, Jiun-You Lai, Y. Su
Energy-efficient scheduling problem in wireless communication system is investigated in this paper. We propose two near-optimal schedulers which have simple structures for the general hard delay constraint scenario. Both single-user and multiuser cases are considered. The first scheduler invokes Gaussian approximation while the second one is inspired by the inverse water-filling (IWF) approach. The scheduling policies consist of a channel-awareness term and a delay-awareness term. Numerical results show that the proposed policies achieve near optimal performance when the total required transmit bits, R, is large. For the multiuser scenario, our scheduling strategy consists of an initial resource (number of time slots) allocation and a slot-by-slot user selection and bit loading algorithm. The former depends on the rate requirement and a priori knowledge of user-dependent channel statistic while the latter use an order statistic based approach designed to minimize the expected total energy consumption.
{"title":"Energy-efficient scheduling for wireless communication system","authors":"Kuhn-Chang Lin, Jiun-You Lai, Y. Su","doi":"10.1109/GLOCOM.2012.6503907","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503907","url":null,"abstract":"Energy-efficient scheduling problem in wireless communication system is investigated in this paper. We propose two near-optimal schedulers which have simple structures for the general hard delay constraint scenario. Both single-user and multiuser cases are considered. The first scheduler invokes Gaussian approximation while the second one is inspired by the inverse water-filling (IWF) approach. The scheduling policies consist of a channel-awareness term and a delay-awareness term. Numerical results show that the proposed policies achieve near optimal performance when the total required transmit bits, R, is large. For the multiuser scenario, our scheduling strategy consists of an initial resource (number of time slots) allocation and a slot-by-slot user selection and bit loading algorithm. The former depends on the rate requirement and a priori knowledge of user-dependent channel statistic while the latter use an order statistic based approach designed to minimize the expected total energy consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"82 1","pages":"4969-4974"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85409703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503218
Xiaobo Ma, Jianfeng Li, Jing Tao, X. Guan
Domain names play an increasingly important role for the botnet activities. Traditionally, DNS traces from several local DNS servers are used passively to measure the DNS query behavior. However, since botnets are a wide-scale threat and usually reside in geographically dispersed networks, the vantage point of several local DNS servers is sometimes too small to help us understand the DNS query behavior (e.g., whether queried or not, average query rate) of botnets. In this paper, we actively measure the DNS query behavior of botnets in geographically dispersed networks via the DNS cache probing technique. We first analytically characterize how multiple domain names are queried by botnets in different networks under certain circumstances. Then, we actively measure real botnet samples in the wild to gain insight into how multiple domain names are queried by botnets in 480 geographically dispersed networks globally, and show that our analytical characterization well describes the DNS query behavior of the botnet samples. The active measurement technique can help to acquire extensive DNS query information in different networks and thus potentially facilitate various DNS-related research and applications.
{"title":"Towards active measurement for DNS query behavior of botnets","authors":"Xiaobo Ma, Jianfeng Li, Jing Tao, X. Guan","doi":"10.1109/GLOCOM.2012.6503218","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503218","url":null,"abstract":"Domain names play an increasingly important role for the botnet activities. Traditionally, DNS traces from several local DNS servers are used passively to measure the DNS query behavior. However, since botnets are a wide-scale threat and usually reside in geographically dispersed networks, the vantage point of several local DNS servers is sometimes too small to help us understand the DNS query behavior (e.g., whether queried or not, average query rate) of botnets. In this paper, we actively measure the DNS query behavior of botnets in geographically dispersed networks via the DNS cache probing technique. We first analytically characterize how multiple domain names are queried by botnets in different networks under certain circumstances. Then, we actively measure real botnet samples in the wild to gain insight into how multiple domain names are queried by botnets in 480 geographically dispersed networks globally, and show that our analytical characterization well describes the DNS query behavior of the botnet samples. The active measurement technique can help to acquire extensive DNS query information in different networks and thus potentially facilitate various DNS-related research and applications.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"12 1","pages":"845-849"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82301012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503203
Chin-Fu Ku, Kai-Hsiang Yang, Jan-Ming Ho
In network applications with security constraints, it is usually desirable to disseminate a file from a server through trusted network channels to a set of peers. This is a problem seldom studied in the literature though the problems of data integrity and security have been studied by many. In this paper, we study the file dissemination problem with trust relation modeled as a rooted full binary tree. We present the OOFD algorithm to schedule dissemination of the file iteratively from each peer holding a replica of the file to one of its descendants on the binary tree. We show that, in a homogeneous network, OOFD algorithm is optimum in the sense that time it takes to disseminate the file to all nodes is minimized.
{"title":"An optimal scheduling for file dissemination under a full binary tree of trust relationship","authors":"Chin-Fu Ku, Kai-Hsiang Yang, Jan-Ming Ho","doi":"10.1109/GLOCOM.2012.6503203","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503203","url":null,"abstract":"In network applications with security constraints, it is usually desirable to disseminate a file from a server through trusted network channels to a set of peers. This is a problem seldom studied in the literature though the problems of data integrity and security have been studied by many. In this paper, we study the file dissemination problem with trust relation modeled as a rooted full binary tree. We present the OOFD algorithm to schedule dissemination of the file iteratively from each peer holding a replica of the file to one of its descendants on the binary tree. We show that, in a homogeneous network, OOFD algorithm is optimum in the sense that time it takes to disseminate the file to all nodes is minimized.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"70 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89106820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503945
Wei-Te Wong, Ya-Ju Yu, Ai-Chun Pang
Given the explosive growth of mobile subscribers, network operators have to densely deploy base stations to serve the exponentially increasing access demands. Nevertheless, recent researches have pointed out that base station operation has been identified as a significant portion of total system energy consumption and 90% of the traffic is carried by only 40% of base stations even under peak traffic demand. Therefore, switching off underutilized base stations for saving power is an important issue with the increasing awareness of environmental responsibility and economical concerns of network operators. This paper targets the problem of dynamic base station operation, with an objective to minimize total power consumption of all base stations. We prove this problem is NP-hard and cannot be approximated in polynomial time with a ratio better than 3 over 2. Then, we propose a distributed algorithm to tackle it. The simulation results show that our proposed algorithm can significantly reduce the network power consumption.
{"title":"Decentralized energy-efficient base station operation for green cellular networks","authors":"Wei-Te Wong, Ya-Ju Yu, Ai-Chun Pang","doi":"10.1109/GLOCOM.2012.6503945","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503945","url":null,"abstract":"Given the explosive growth of mobile subscribers, network operators have to densely deploy base stations to serve the exponentially increasing access demands. Nevertheless, recent researches have pointed out that base station operation has been identified as a significant portion of total system energy consumption and 90% of the traffic is carried by only 40% of base stations even under peak traffic demand. Therefore, switching off underutilized base stations for saving power is an important issue with the increasing awareness of environmental responsibility and economical concerns of network operators. This paper targets the problem of dynamic base station operation, with an objective to minimize total power consumption of all base stations. We prove this problem is NP-hard and cannot be approximated in polynomial time with a ratio better than 3 over 2. Then, we propose a distributed algorithm to tackle it. The simulation results show that our proposed algorithm can significantly reduce the network power consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"30 1","pages":"5194-5200"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88327830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/GLOCOM.2012.6503269
Yanming Cao, Qi Shi, Xinbing Wang, Xiaohua Tian, Y. Cheng
While the spectrum resource of modern society is more and more insufficient, Cognitive Radio, which allows the Secondary Users (unlicensed users, SU) to access the licensed spectrum, is a promising solution to make the utilization of spectrum resource more efficient. Among many different paradigms of cognitive radio, market-driven spectrum trading has been proved to be an efficient way to deal with Cognitive Radio problems. In this paper, we consider the problem of spectrum trading with single primary user (PU) who has multiple spectra selling his idle spectra to multiple SUs in multiple types. Since there is only one PU, so it is a monopoly market, in which the PU sets the prices, powers and time for the spectrum he sells, just as a monopolist. SUs as customers choose the spectrum with exact price, power and time to buy. We model it as a two-dimensional power-time-price contract which is much different from the usual contract because the time could either be a strategy that an SU could decide to choose itself or a type which is not decided by SUs. We first discuss the situation in which the time is set as the strategy and we will prove that it can derive a feasible contract with some conditions. Then we will discuss the second situation in which the time is set as a type. In this situation, because the SU has two kinds of types, so it's difficult to make it become a feasible contract, however we will provide a solution to deal with this problem.
{"title":"Two-dimensional contract theory in Cognitive Radio networks","authors":"Yanming Cao, Qi Shi, Xinbing Wang, Xiaohua Tian, Y. Cheng","doi":"10.1109/GLOCOM.2012.6503269","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503269","url":null,"abstract":"While the spectrum resource of modern society is more and more insufficient, Cognitive Radio, which allows the Secondary Users (unlicensed users, SU) to access the licensed spectrum, is a promising solution to make the utilization of spectrum resource more efficient. Among many different paradigms of cognitive radio, market-driven spectrum trading has been proved to be an efficient way to deal with Cognitive Radio problems. In this paper, we consider the problem of spectrum trading with single primary user (PU) who has multiple spectra selling his idle spectra to multiple SUs in multiple types. Since there is only one PU, so it is a monopoly market, in which the PU sets the prices, powers and time for the spectrum he sells, just as a monopolist. SUs as customers choose the spectrum with exact price, power and time to buy. We model it as a two-dimensional power-time-price contract which is much different from the usual contract because the time could either be a strategy that an SU could decide to choose itself or a type which is not decided by SUs. We first discuss the situation in which the time is set as the strategy and we will prove that it can derive a feasible contract with some conditions. Then we will discuss the second situation in which the time is set as a type. In this situation, because the SU has two kinds of types, so it's difficult to make it become a feasible contract, however we will provide a solution to deal with this problem.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"16 1","pages":"1156-1161"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73783380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}