skip to main content
10.1145/1815396.1815456acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Myopic sensing for multiple SUs in multichannel opportunistic access

Authors Info & Claims
Published:28 June 2010Publication History

ABSTRACT

In this paper, we consider a scenario where multiple secondary users search for idle frequency bands in a spectrum consisting of multiple channels. The state of each channel is modeled as a discrete-time Markov process. In each time slot, one secondary user(SU) chooses one channel to sense and decides whether to use the channel based on the sensing result. When there is only one SU, former work has proved that a myopic policy maximizing the current reward is optimal when the channel state transitions are positively correlated over time. In this paper, we extend the myopic policy to multiple-SU scenario. We propose and analyze two approaches that make use of the myopic policy more efficiently when multiple SUs exist.

References

  1. Q. Zhao, L. Tong, A. Swami, and Y. Chen, "Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc Networks: A POMDP Framework," IEEE Journal on Selected Areas in Communications: Special Issue on Adaptive, Spectrum Agile and Cognitive Wireles Networks, April 2007 (also see Proc. of DySPAN, pp. 224--232, Nov. 2005).Google ScholarGoogle Scholar
  2. Q. Zhao, B. Krishnamachari, and K. Liu, "On myopic sensing for multichannel opportunistic access: Structure, optimality, and performance," IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5431ĺC5440, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Haji, A. Ahmad, M. Liu, T. Javidi, Q. Zhao, B. Krishnamachari, "Optimality of Myopic Sensing in Multichannel Opportunistic Access," IEEE Trans. Inf. Theory., vol. 55, NO. 9, pp. 4040--4050, Sep. 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yunhao Liu, Lei Chen, Jian Pei, Qiuxia Chen, Yiyang Zhao, "Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays", IEEE PerCom 2007, USA, March, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, and Lionel M Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems", IEEE PerCom 2007, USA, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Liu, Q. Zhao, and Y. Chen, "Distributed sensing and access in cognitive radio networks," in Proc. 10th International Symposium on Spread Spectrum Techniques and Applications (ISSSTA), Aug. 2008.Google ScholarGoogle Scholar
  7. H. Liu, B. Krishnamachari, and Q. Zhao, "Cooperation and learning in multiuser opportunistic spectrum access," in Proc. IEEE International Conference on Communications (ICC) Workshops, May 2008.Google ScholarGoogle Scholar
  8. R. Smallwood and E. Sondik, "The optimal control of partially observable Markov processes over a finite horizon," Operation Research, pp. 1071--1088, 1971.Google ScholarGoogle Scholar
  9. K. Liu and Q. Zhao, "Link throughput of multi-channel opportunistic access with limited sensing," Technical Report, Univ. of California, Davis, July, 2007.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Myopic sensing for multiple SUs in multichannel opportunistic access

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
        June 2010
        1371 pages
        ISBN:9781450300629
        DOI:10.1145/1815396

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader