Skip to main content

Is Bayesian Multi-armed Bandit Algorithm Superior?: Proof-of-Concept for Opportunistic Spectrum Access in Decentralized Networks

  • Conference paper
  • First Online:
Cognitive Radio Oriented Wireless Networks (CrownCom 2016)

Abstract

Poor utilization of an electromagnetic spectrum has led to surge of interest in paradigms such as cognitive radio, unlicensed LTE etc. Such paradigms allow opportunistic spectrum access in the vacant frequency bands of the licensed spectrum. Though various spectrum detectors to check the status of frequency bands (i.e., vacant or occupied) have been studied, the selection of the frequency band from wideband spectrum is a challenging problem especially in the decentralized network. In this paper, a testbed for analyzing the performance of decision making policies (DMPs) for identifying optimum frequency band in the decentralized network is presented. Furthermore, experimental results using real radio signals show that the proposed DMP using Bayesian multi-armed bandit algorithm leads to 7–12 % improvement in an average spectrum utilization over existing DMPs. Added advantages of 6–20 % lower switching cost and 30–46 % fewer collisions make the proposed DMP energy-efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    \(P_{vac}\) :- [.50 .10 .20 .30 .40 .60 .80 .90].

  2. 2.

    \(P_{vac}\) :- [.50 .05 .95 .10 .80 .60 .40 .75].

  3. 3.

    \(P_{vo}\) :- [.50 .05 .10 .20 .30 .40 .50 .60] \(P_{ov}\) :- [.50 .80 .70 .60 .50 .40 .30 .20].

References

  1. Asadi, A., Wang, Q., Mancuso, V.: A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutorials 16(4), 1801–1819 (2014)

    Article  Google Scholar 

  2. Phunchongharn, P., Hossain, E., Kim, D.I.: Resource allocation for device-to-device communications underlaying LTE-advanced networks. IEEE Wirel. Commun. 20(4), 91–100 (2013)

    Article  Google Scholar 

  3. Xu, Y., Anpalagan, A., Wu, Q., Shen, L., Gao, Z., Wang, J.: Decision-theoretic distributed channel selection for opportunistic spectrum access: strategies, challenges and solutions. IEEE Commun. Surv. Tutorials 15(4), 1689–1713 (2013)

    Article  Google Scholar 

  4. Anandkumar, A., Michael, N., Tang, A., Swami, A.: Distributed algorithms for learning and cognitive medium access with logarithmic regret. IEEE J. Sel. Areas Commun. 29(4), 731–745 (2011)

    Article  Google Scholar 

  5. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235–256 (2002)

    Article  MATH  Google Scholar 

  6. Liu, K., Zhao, Q.: Distributed learning in multi-armed bandit with multiple players. IEEE Trans. Signal Process. 58(11), 5667–5681 (2010)

    Article  MathSciNet  Google Scholar 

  7. Zandi, M., Dong, M.: Learning-stage based decentralized adaptive access policy for dynamic spectrum access. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5323–5327, Vancouver, Canada, May 2013

    Google Scholar 

  8. Darak, S.J., Zhang, H., Palicot, J., Moy, C.: Efficient decentralized dynamic spectrum learning and access scheme for multi-standard multi-user cognitive radio networks. In: 11th International Symposium on Wireless Communication Systems (IEEE ISWCS 2014), pp. 271–275, Barcelona, Spain, August 2014

    Google Scholar 

  9. Darak, S.J., Zhang, H., Palicot, J., Moy, C.: An efficient policy for D2D communications and energy harvesting in cognitive radios: go bayesian! In: 23rd European Signal Processing Conference (EUSIPCO), pp. 1236–1240, Nice, France, August 2015

    Google Scholar 

  10. Kaufmann, E., Cappé, O., Garivier, A.: On bayesian upper confidence bounds for bandit problems. In: 15th International Conference on Artificial Intelligence and Statistics, pp. 592–600, La Palma, Canary Islands, April 2012

    Google Scholar 

  11. Hoang, D.T., Niyato, D., Wang, P., Kim, D.I.: Opportunistic channel access and RF energy harvesting in cognitive radio networks. IEEE Trans. Sel. Areas Commun. 32(11), 1–14 (2014)

    Article  Google Scholar 

  12. Bahamou, S., Nafkha, A.: Noise uncertainty analysis of energy detector: bounded and unbounded approximation relationship. In: 21st European Signal Processing Conference (EUSIPCO), pp. 1–4, Marrakech, Morocco, September 2013

    Google Scholar 

  13. Robert, C., Moy, C., Wang, C.X.: Reinforcement learning approaches and evaluation criteria for opportunistic spectrum access. In: IEEE International Conference on Communications (ICC), pp. 1508–1513, Sydney, Australia, June 2014

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank Department of Science and Technology (DST), Government of India for INSPIRE fellowship in support of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumit J. Darak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Darak, S.J., Nafkha, A., Moy, C., Palicot, J. (2016). Is Bayesian Multi-armed Bandit Algorithm Superior?: Proof-of-Concept for Opportunistic Spectrum Access in Decentralized Networks. In: Noguet, D., Moessner, K., Palicot, J. (eds) Cognitive Radio Oriented Wireless Networks. CrownCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 172. Springer, Cham. https://doi.org/10.1007/978-3-319-40352-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40352-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40351-9

  • Online ISBN: 978-3-319-40352-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics