{"title":"存在干扰的认知网络中协调的分布式学习算法","authors":"Suneet Sawant, M. Hanawal, S. Darak, Rohit Kumar","doi":"10.23919/WIOPT.2018.8362853","DOIUrl":null,"url":null,"abstract":"Efficient utilization of licensed spectrum in the cognitive radio network is challenging due to lack of coordination among the Secondary Users (SUs). Distributed algorithms proposed in the literature aim to maximize the network throughput by ensuring orthogonal channel allocation for the SUs. However, these algorithms work under the assumption that all the SUs faithfully follow the algorithms which may not always hold due to the decentralized nature of the network. Moreover, they are vulnerable to Denial of Service attacks. In this paper, we study distributed algorithms that are robust against malicious behavior (jamming attack). We consider jammers launching coordinated attack where they select non-overlapping channels in each time slot and can lead to significantly higher number of collisions for SUs than uncoordinated attack. We setup the problem as a multiplayer bandit and develop distributed learning algorithms. The analysis shows that when the SUs faithfully implement proposed algorithms, the regret is constant with high probability. We validate our claims through exhaustive synthetic experiments and also through a realistic USRP based experiments.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Distributed learning algorithms for coordination in a cognitive network in presence of jammers\",\"authors\":\"Suneet Sawant, M. Hanawal, S. Darak, Rohit Kumar\",\"doi\":\"10.23919/WIOPT.2018.8362853\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Efficient utilization of licensed spectrum in the cognitive radio network is challenging due to lack of coordination among the Secondary Users (SUs). Distributed algorithms proposed in the literature aim to maximize the network throughput by ensuring orthogonal channel allocation for the SUs. However, these algorithms work under the assumption that all the SUs faithfully follow the algorithms which may not always hold due to the decentralized nature of the network. Moreover, they are vulnerable to Denial of Service attacks. In this paper, we study distributed algorithms that are robust against malicious behavior (jamming attack). We consider jammers launching coordinated attack where they select non-overlapping channels in each time slot and can lead to significantly higher number of collisions for SUs than uncoordinated attack. We setup the problem as a multiplayer bandit and develop distributed learning algorithms. The analysis shows that when the SUs faithfully implement proposed algorithms, the regret is constant with high probability. We validate our claims through exhaustive synthetic experiments and also through a realistic USRP based experiments.\",\"PeriodicalId\":231395,\"journal\":{\"name\":\"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)\",\"volume\":\"334 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/WIOPT.2018.8362853\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/WIOPT.2018.8362853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed learning algorithms for coordination in a cognitive network in presence of jammers
Efficient utilization of licensed spectrum in the cognitive radio network is challenging due to lack of coordination among the Secondary Users (SUs). Distributed algorithms proposed in the literature aim to maximize the network throughput by ensuring orthogonal channel allocation for the SUs. However, these algorithms work under the assumption that all the SUs faithfully follow the algorithms which may not always hold due to the decentralized nature of the network. Moreover, they are vulnerable to Denial of Service attacks. In this paper, we study distributed algorithms that are robust against malicious behavior (jamming attack). We consider jammers launching coordinated attack where they select non-overlapping channels in each time slot and can lead to significantly higher number of collisions for SUs than uncoordinated attack. We setup the problem as a multiplayer bandit and develop distributed learning algorithms. The analysis shows that when the SUs faithfully implement proposed algorithms, the regret is constant with high probability. We validate our claims through exhaustive synthetic experiments and also through a realistic USRP based experiments.