Next Article in Journal
Modeling and Analysis of an Electromagnetic Fully Variable Valve Train with a Magnetorheological Buffer
Next Article in Special Issue
Multi-Source Reliable Multicast Routing with QoS Constraints of NFV in Edge Computing
Previous Article in Journal
Flexibly Extensible Planar Self-Isolated Wideband MIMO Antenna for 5G Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Non-Cooperative Spectrum Access Strategy Based on Impatient Behavior of Secondary Users in Cognitive Radio Networks

1
School of Measure-control Technology and Communication Engineering, Harbin University of Science and Technology, Harbin 150080, China
2
Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410004, China
3
School of Information Science and Engineering, Fujian University of Technology, Fujian 350118, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(9), 995; https://doi.org/10.3390/electronics8090995
Submission received: 7 July 2019 / Revised: 29 August 2019 / Accepted: 3 September 2019 / Published: 5 September 2019
(This article belongs to the Special Issue AI Enabled Communication on IoT Edge Computing)

Abstract

:
In the cognitive radio network (CRN), secondary users (SUs) compete for limited spectrum resources, so the spectrum access process of SUs can be regarded as a non-cooperative game. With enough artificial intelligence (AI), SUs can adopt certain spectrum access strategies through their learning ability, so as to improve their own benefit. Taking into account the impatience of the SUs with the waiting time to access the spectrum and the fact that the primary users (PUs) have preemptive priority to use the licensed spectrum in the CRN, this paper proposed the repairable queueing model with balking and reneging to investigate the spectrum access. Based on the utility function from an economic perspective, the relationship between the Nash equilibrium and the socially optimal spectrum access strategy of SUs was studied through the analysis of the system model. Then a reasonable spectrum pricing scheme was proposed to maximize the social benefits. Simulation results show that the proposed access mechanism can realize the consistency of Nash equilibrium strategy and social optimal strategy to maximize the benefits of the whole cognitive system.

1. Introduction

With the prosperity of the ubiquitous sensing technology, wireless sensor networks (WSNs) are widely used in environmental monitoring, smart home, medical systems, space exploration and many other areas [1,2,3,4,5,6,7]. As an important form of the underlying network technologies of Internet of Things (IoT) [8,9], the node deployment cost [10,11], limited energy [12] and the shortage of wireless spectrum resources [13] has restricted the development of WSNs. In order to solve the spectrum crisis, cognitive radio (CR) technology is becoming a hot research topic [14,15]. The core idea of CR is to make the radio devices intelligent and able to perform cognitive behaviors such as sensing, reasoning, learning, decision making and executing [16,17,18], which is consistent with the idea of artificial intelligence (AI) [19,20,21,22,23] to some extent. Especially in the distributed CRN, cognitive users have no knowledge of the system parameters, and can only make corresponding spectrum decision based on historical data by using their own learning ability.
There are two types of users in cognitive radio networks (CRNs), which can be called primary user (PU) and secondary user (SU), respectively. The PU obtains the fixed spectrum resources through purchase. Thus, the PU is the legal owner of the fixed spectrum and also can be called the licensed user. The SU, which is also known as the cognitive user, can only detect the idle spectrum through spectrum sensing, and then opportunistically accesses the idle spectrum to avoid interfering with the PU.
Since SUs need to share the spectrum with the PU, when an SU opportunistically utilizes the licensed spectrum, the SU may need to wait for the PU or other SUs to finish the transmission, thereby increasing the sojourn time of the SU in the system. Moreover, in order not to affect the performance of the PU, the SU must suspend its transmission in time to wait for PU to leave or switch to another idle channel to continue its transmission [24]. Queueing theory can effectively characterize the heterogeneity of different access channels and the influences of PU behavior on the communication performance of SU. Therefore, it is especially suitable for analyzing the sojourn time of SU. At present, many scholars have used queueing theory to study the dynamic spectrum access performance of SUs [25,26,27,28,29].
In [30], in view of the traffic loads of SUs, the authors designed the sensing-based and the probability-based spectrum decision schemes to minimize the overall sojourn time of SUs based on the preemptive resume priority (PRP) M/G/1 queueing theory. In [31], considering a dynamic spectrum access system in which SU could choose to either rent a licensed dedicated band or to use spectrum holes, the authors analyzed the equilibrium behavior for the SU decision strategies and applied the analysis results to maximize the revenue from renting dedicated bands to SUs based on the server-breakdown queueing model. In [32], the authors used the preemptive priority queueing model to investigate the different equilibrium strategic behaviors of SUs with no queue length information, partial queue length information and full queue length information. However, all the papers mentioned above assume that once the SU chooses to access the spectrum, it will not leave the system until the service transmission is completed. That is to say, the impatient behavior of SU is not considered. The impatient behavior in queueing theory means that when a customer arrives at the system, it will join the queue and wait for service if there is no idle server. But when the waiting time exceeds its endurance time, the customer will choose to leave because of impatience. In real wireless communication systems, if the services of SUs have strict requirements on the transmission delay, such as the delay-sensitive multimedia services and voice services which need to meet some delay constraints, SUs will still choose to renege from the waiting line, even if they have decided to access the spectrum once the waiting time in queue exceeds the tolerable time of SUs. In [33] and [34], the impatient behavior of SUs was considered when the spectrum access strategies were designed in CRN. However, the authors only analyzed the traffic model in which the service times of SU and PU followed the negative exponential distribution in [33], and in [34], the service times of PU and SU were supposed to follow geometrical distribution. Therefore, both of the analytical models have limitations for their application. In this paper, we use the queueing theory to obtain the Nash equilibrium and socially optimal access strategies for SUs with impatient behavior in CRNs. Similar research focusing on SU access strategies from the economic aspects can be found in [35] and [36]. In [35], the authors studied the queueing control in cognitive radio systems and achieved the individually and socially optimal strategies based on the observable queue system in which SUs could know the current queue length when they arrived. In [36], for simplicity, the service times of PUs and SUs were assumed to be exponentially distributed and the scenario was modeled as an M/M/1 queueing game with server breakdowns where each SU wanted to optimize its benefit in a selfish distributed manner. At the same time, neither article takes into account the impatience of SUs. Therefore, considering the fact that if its waiting time exceeds the tolerance limit, the SU may give up the transmission and renege from the queue before entering service, we propose a repairable M/G/1+M queueing model with balking and reneging based on the queueing theory with impatient customers to extend the analysis model to more general cases. Then, we investigate the expected waiting time and actual transmission time of SUs by employing the system model and analyze the Nash equilibrium access strategy and socially optimal access strategy. On the basis of the analysis results, the corresponding spectrum pricing scheme is developed to maximize the social welfare.
The rest of this paper is organized as follows. In Section 2, we present the system model to characterize the spectrum access strategy and evaluate the waiting time and actual service time of SUs. Next, we propose a reasonable spectrum pricing scheme to maximize the social welfare by comparing the Nash equilibrium access strategy with socially optimal access strategy in Section 3. Then, numerical results are shown in Section 4. Finally, we give our concluding remarks in Section 5.

2. System Model and Problem Statement

At present, the architecture of CRN can be either centralized or distributed architecture [37]. In a centralized architecture, SU decisions are based on the information of the channel state and queue length obtained from the centralized controller, which may lead to large communication overhead. Moreover, the deployment of the centralized controller may not be feasible in some environments, such as in ad hoc or sensor networking environment. Therefore, we only consider the distributed architecture in this paper. Without the coordination and control of the centralized controller in the distributed CRN, the SU cannot accurately know the number of other ones sharing the same channel. The unobservable queue model is used to depict the non-cooperative and distributed nature of SUs. The queue is only a virtual queue which can describe the congestion between SUs accessing the same channel. The SU sojourn time analysis is based on the statistical information of the behaviors of PU and SU. We suppose there is only one licensed channel in the system. SU must ensure PU has absolute priority in accessing the channel and suspend its transmission immediately to wait for the PU to leave once the PU is detected during the transmission. SUs can be treated as the customers in the queueing theory and receive services according to the first-come first-served (FCFS) principle. Moreover, the licensed channel can be considered as a server working at ON/OFF state. The ON state means the channel is not occupied by the PU currently, and can be regarded as idle or working normally for the server to provide services to customers, while the OFF state represents the channel being occupied by the PU and unable to support services to SUs. That is, the occurrence of the PU can be treated as a breakdown of the server and the transmission time of PU as the repair time. For simplicity, we assume that no other breakdown will occur during the repair period. The actions of PU and SU are assumed to follow independent Poisson processes with generalized time distribution of transmission duration. The transmission times are independent and identically distributed. Let λ p and λ s represent the average arrival rates of PU and SU, respectively. X p denotes the transmission duration of PU, and X s denotes the effective transmission time of SU without interruptions from PU. Furthermore, let Fp(x), fp(x), Fs(x), fs(x) denote the cumulative distribution function (CDF) of X p , the probability density function (PDF) of X p , the CDF of X s and the PDF of X s , respectively.
Due to the spectrum scarcity, the SUs must compete for the limited idle spectrum resources in CRN, and each of them wants to maximize its own benefit through the best decision. The non-cooperative game theory can be used to model and analyze the interaction between SUs [38]. Each SU is assumed to be risk neutral, that is, it only has interests in maximizing the expected value of its own benefit [39]. Therefore, we assume that when each SU arrives at the system, it will decide whether to join the waiting queue of the channel and share the spectrum resources with other SUs according to its estimated net welfare. To model the decision process, we assume all SUs that successfully complete the transmission can get a fixed service benefit R. On the other hand, each SU incurs a holding cost of C per unit of time in the system, which can be regarded as a penalty for the delay or traffic congestion. If an SU spends T s time units in the system, its expected net benefit is (denoted by U s ):
U s = R C T s
According to (1), the SU then accesses the channel and joins the queue to wait for the transmission if the value of U s is nonnegative. Otherwise, the SU balks because the sojourn time in the system is too long resulting in negative expected net benefit. Based on the non-cooperative game theory, SU makes a decision as to whether or not to join the channel according to the strategy of maximizing its own benefit, since each SU is a rational player. The decision strategy of SU can be described by a fraction q ( 0 q 1 ), which is the joining probability. Given the joining rule q, if the potential arrival rate of SUs is λs, then the effective arrival rate to access the channel is λsq. In addition, due to the limitation of the delay requirement, an SU will choose to give up the transmission and leave the system, if its required waiting time exceeds the tolerable waiting time τ before it gets the right to use the channel. We assume that the tolerable waiting time τ follows exponential distribution with mean 1/r. The M/G/1 + M queueing theory with impatient customers can be used to model and analyze the system. Moreover, we assume that SUs will not leave the system until finishing the whole transmission once they start transmitting.
From (1), we can see that the net welfare of SU mainly depends on its sojourn time in the system, because the service benefit R and unit cost C are fixed. The sojourn time of SU consists of the waiting time in the queue and the actual transmission time. Then we will analyze the waiting time and transmission time based on the system model. Let Wsn be the required waiting time of SU S n ( n = 1 ,   2 ,   ) before service, then define:
α n = { 1 if   S n   finishes   the   transmission   sucessfully 0 if   S n   reneges   while   waiting
For each required waiting time y ≥ 0, let P α n ( y ) , ( P ¯ α n ( y ) ) denote the conditional probability of SU giving up the transmission and choosing to leave because of impatience (completing the transmission), so we have:
P α n ( y ) = P ( α n = 0 | W s n = y ) ,   P ¯ α n ( y ) = P ( α n = 1 | W s n = y )
From (2), P α n ( y ) + P ¯ α n ( y ) = 1 , y 0 .
We apply the level crossing methods to study the required virtual waiting time of SUs. Considering that the SUs whose waiting time exceeds τ will renege from the queue before the start of service, they add zero to the required wait of any SU. Thus for the sample path of virtual wait for SUs, the system point (SP) will jump if the event { W s n = y > 0 ,   α n = 1 } occurs. Otherwise, SP makes no jump if the event { W s n = y > 0 ,   α n = 0 } occurs, since S n receives zero service time. Let W s ( t )   ( t 0 ) denote the virtual waiting time of a would-be time-t arrival with the probability density function f s w ( x ) . The sample path of W s ( t )   ( t 0 ) is shown in Figure 1.
Assuming renegers arrive at an and stayers arrive at bn, n = 1, 2, …, we denote the actual transmission time of SU by Gs, and let Gs(x) be the corresponding distribution function. According to the level crossing methods, for any fixed level x > 0, the system point downcrossing and upcrossing rates of level x are equal in the steady state. Therefore, we can get:
f s w ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x ) + λ s q y = 0 x G ¯ s ( x y ) P ¯ α n ( y ) f s w ( y ) d y
where P0 represents the stationary probability of the channel being idle and P0 can be expressed as follows:
P 0 + 0 f s w ( x ) = 1
Moreover, F ¯ p ( x ) and G ¯ s ( x ) denote the complementary CDF of F p ( x ) and G s ( x ) , respectively. Thus, we have:
F ¯ p ( x ) = 1 F p ( x ) ,   x 0 ;   G ¯ s ( x ) = 1 G s ( x ) ,   x 0
In (4), the left side is the SP downcrossing rate of level x, while the right side consisting of three terms is the SP upcrossing rate of level x. The first term is the rate of SP jumps starting from level 0 due to PU arrivals that upcross level x. The jump size has the CDF F ¯ p ( x ) . The second term is the SP upcrossing rate of x due to effective SU arrivals, when the channel is idle. Because the waiting time of those SUs equals zero, the corresponding SP jumps start from level 0 and the jump size has the CDF G ¯ s ( x ) . The third term is the upcrossing rate of x by SP jumps at arrival instants when the virtual wait is at state-space levels y ( 0 < y < x ). For each required waiting time y 0 , the probability of SUs staying for successful transmission is P ¯ α n ( y ) . When the actual transmission time of SUs is longer than xy, the SP can upcross level x. The three terms on the right side of equation (4) account for the total rates at which SP jumps upcross level x. Moreover, because of the impatience, the required waiting time of SUs cannot be more than τ . Hence, we can obtain:
f s w ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x ) + λ s q y = 0 x G ¯ s ( x y ) e r y f s w ( y ) d y
Since (7) is a Volterra integral equation of the second kind, it can be solved by the classical successive substitution method. The initial step is:
ϕ 0 ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x )
which is substituted in the integral of (7) for fsw(y) to complete the second iteration as:
ϕ 1 ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x ) + λ s q y = 0 x G ¯ s ( x y ) e r y ϕ 0 ( y ) d y
Repeating the substitution, then we can obtain:
ϕ 2 ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x ) + λ s q y = 0 x G ¯ s ( x y ) e r y ϕ 1 ( y ) d y ϕ n ( x ) = λ p P 0 F ¯ p ( x ) + λ s q P 0 G ¯ s ( x ) + λ s q y = 0 x G ¯ s ( x y ) e r y ϕ n 1 ( y ) d y
The Laplace–Stieltjes transform (LST) of the CDF for Xp is given by:
F p ( s ) = x = 0 e s x f p ( x ) d x
Consequently,
x = 0 e s x F ¯ p ( x ) d x = x = 0 e s x ( 1 F p ( x ) ) d x = 1 s ( 1 F p ( s ) )
Considering the effect of PU preemption on SUs, the LST of the CDF for the actual transmission time of SUs can be written as:
G s ( s ) = E ( e s G s ) = 0 E ( e s G s | X s = x ) f s ( x ) d x = F s ( s + λ p λ p F p ( s ) )
where F s ( s ) is the LST of the effective transmission time of SUs. Hence, we have:
x = 0 e s x G ¯ s ( x ) d x = x = 0 e s x ( 1 G s ( x ) ) d x = 1 s ( 1 G s ( s ) )
Taking the LST of both sides of (8), (9) and (10) yields:
ϕ 0 ( s ) = λ p P 0 s ( 1 F p ( s ) ) + λ s q P 0 s ( 1 G s ( s ) ) ϕ 1 ( s ) = λ p P 0 ( 1 F p ( s ) ) s + λ s q P 0 ( 1 G s ( s ) ) s + λ p λ s q P 0 ( 1 G s ( s ) ) ( 1 F p ( s + r ) ) s ( s + r ) + λ s 2 q 2 P 0 ( 1 G s ( s ) ) ( 1 G s ( s + r ) ) s ( s + r ) F s w ( s ) = lim n ϕ n ( s ) = j = 0 ( λ s q ) j [ λ p P 0 ( 1 F p ( s + j r ) ) 1 G s ( s + j r ) + λ s q P 0 ] k = 0 j 1 G s ( s + k r ) s + k r
where ϕ n ( s ) is the LST of ϕ n ( s ) . If ϕ n ( s ) converges, its limit is the LST of fsw(x) in (7). We can prove the convergence of ϕ n ( s ) . The proof is given in the Appendix.
Therefore, the LST of the PDF for the virtual waiting time of SUs is:
F s w ( s ) = lim n ϕ n ( s ) = j = 0 ( λ s q ) j [ λ p P 0 ( 1 F p ( s + j r ) ) 1 G s ( s + j r ) + λ s q P 0 ] k = 0 j 1 G s ( s + k r ) s + k r
Then, the idle probability P0 can be obtained according to (5) and (16):
P 0 = 1 F s w ( 0 ) = { 1 + j = 0 ( λ s q ) j [ λ p ( 1 F p ( j r ) ) 1 G s ( j r ) + λ s q ] k = 0 j 1 G s ( k r ) k r } 1
We take the LST of both sides of (7) and have:
F s w ( s + r ) = s F s w ( s ) λ s q [ 1 G s ( s ) ] P 0 λ p [ 1 F p ( s ) ] λ s q [ 1 G s ( s ) ] P 0
Letting s 0 gives:
F s w ( r ) = ( 1 P 0 ) P 0 [ λ s q E ( G s ) + λ p E ( X p ) ] λ s q E ( G s )
where E ( G s ) means the expected actual transmission time of SUs given by:
E ( G s ) = E ( X s ) 1 λ p E ( X p )
For SU customers, let W s v , W s t , W s respectively denote the virtual waiting time in queue before service, the time SU will wait to enter the server before reneging and the time spent in the queue regardless of whether or not SU reaches the server. Thus, we have [40]:
P ( W s > x ) = P ( W s t > x ) P ( W s v > x ) = e r x x f s w ( y ) d y
and
E [ W s ] = 0 P ( W s > x ) d x = 1 P 0 F s w ( r ) r
Hence, the proportion of SUs that get complete service is:
p s = P 0 + 0 f s w ( y ) e r y d y = P 0 + F s w ( r )

3. Spectrum Access Strategies of SUs

The spectrum access strategies of SUs can be described by a fraction q ( 0 < q < 1 ), which is the probability of joining. Let US(q) denote the average net benefit of SUs which choose to access the channel with the probability q. Considering that each SU can receive a reward of R due to transmission completion, from (1) US(q) can be written as:
U s ( q ) = p s [ R C E ( G S ) ] C E ( W s ) = [ P 0 + F s w ( r ) ] [ R C E ( G s ) ] C 1 P 0 F s w ( r ) r = 1 P 0 P 0 λ p E ( X p ) λ s q E ( G s ) [ R C E ( G s ) + C r ] C r

3.1. Individual Equilibrium Strategy

Each SU wants to obtain a non-negative benefit value. Let qe denote the individual equilibrium access strategy and no SU can improve its own benefit by unilaterally changing the strategy under the Nash equilibrium state. For a new arrival SU, if US(0) ≤ 0, then even if there is no other SU to share the spectrum, the tagged SU has to suffer a non-positive benefit by joining. It implies none of the SUs will choose to access the channel no matter what channel state (even if the channel is idle). In order to avoid trivialities, we assume US(0) > 0. If there exists a unique access probability q e ( 0 < q e < 1 ) satisfying US(qe) = 0, then the strategy of SUs joining with probability qe is the unique Nash equilibrium mixed strategy. In the case US(1) > 1, even if all SUs choose to access the channel, they can still enjoy a non-negative benefit, so the strategy of joining with probability q e = 1 is the unique equilibrium strategy.
In summary, it is a Nash equilibrium strategy for SUs to access the channel with probability qe if qe satisfies the following conditions:
{ ( 1 P 0 ) P 0 λ p E ( X p ) λ s q e E ( G s ) [ R C E ( G s ) + C r ] = C r , 0 < q e < 1 ( 1 P 0 ) P 0 λ p E ( X p ) λ s E ( G s ) [ R C E ( G s ) + C r ] > C r , q e = 1

3.2. Socially Optimal Strategy

If the wireless spectrum resource is regarded as a public good, then the best way to share it is to maximize the expected net benefit of the whole cognitive system per time unit which is also known as the social benefit (denoted by So). Therefore, the aim of socially optimal strategy is to find a joining probability q o to maximize the net benefit So,which is given by:
q o = arg max   S o 0 < q 1 = arg max   { 0 < q 1 λ s q [ p s ( R C E ( G s ) ) C E ( W s ) ] } = arg max   { 0 < q 1 λ s q [ 1 P 0 P 0 λ p E ( X p ) λ s q E ( G s ) ( R C E ( G s ) + C r ) C r ] }

3.3. Spectrum Pricing

Since SUs act only in accordance with the individually optimal decisions and don’t consider the negative externalities which they impose on the later arrivals, a discrepancy between the individually and socially optimal behaviors may result. A cost charged to SUs may effectively motivate them to adopt the strategy to improve the whole social benefit. The pricing mechanism does not deny individual rationality, but achieves collective rationality under the premise of satisfying individual rationality and maximizes the benefit of the whole society. When a spectrum access fee m is charged, the net benefit function of SUs becomes:
U s = R C T s m
Then, if each SU follows its equilibrium strategy, a new equilibrium joining probability can be obtained. According to (24) and (27), in the state of equilibrium we can get the spectrum access fee m by solving the equation as follows:
U s ( q e ) = p s [ R C E ( G s ) ] C E ( W s ) m = 0
More concretely, finding out the socially optimal joining probability q o from (26) and substituting q o instead of q e in (28), we can get m by solving (28). The spectrum access fee achieves the consistency between the individual and social targets. Since the exact expression of the optimal spectrum price cannot be obtained, its existence and validity can only be illustrated by numerical examples.

4. Numerical Results

In this section, we propose some numerical results to illustrate the equilibrium and socially optimal access strategies. In order to make the analysis results more general, we consider two kinds of user models called Exp model and ErlExp model. Furthermore, we define f τ ( x ) = r e r x as the PDF of the patience time of SUs which follows the exponential distribution.
(a) Exp Model
The effective transmission time of PUs and SUs is assumed to be exponentially distributed with PDF f p ( x ) = μ p e μ p x and f s ( x ) = μ s e μ s x , respectively. From (11) and (13), we have:
F p ( s ) = μ p s + μ p ,   G s ( s ) = μ s ( s + μ p ) s 2 + s ( λ p + μ p + μ s ) + μ s μ p
(b) ErlExp Model
The transmission time of PU is assumed to follow second-order Erlang distribution having PDF f p ( x ) = μ p 2 x e μ p x , and the effective transmission time of SU is exponentially distributed having PDF f s ( x ) = μ s e μ s x . Therefore, we get:
F p ( s ) = ( μ p s + μ p ) 2 ,   G s ( s ) = μ s ( s + μ p ) 2 ( s + λ p ) ( s + μ p ) 2 λ p μ p 2 + μ s ( s + μ p ) 2
Figure 2 shows the effect of spectrum access fee m on the social benefit S and the SU equilibrium joining probability q e . The system parameters are set as follows: (a) Exp model: R = 12, C = 1, r = 0.2, λ p = 0.3 , μ p = 0.5 , λ s = 1.5 , μ s = 2 ; (b) ErlExp mode: μ p = 0.9 , the other parameters are the same as those in Exp model. The number of iterations is 3. As can be seen in Figure 2, as the spectrum price increases, the equilibrium joining probability of SUs decreases rapidly, while the social benefit increases first, and then decreases gradually after reaching the maximum value. For example, when the access fee m = 1.7 , the social benefit reaches a maximum in the Exp model. If the fee continues to increase, the social benefit will begin to decline. When the access cost plus the delay loss of SUs exceeds the fixed return R that means negative net benefit, no SU is willing to access the channel, resulting in zero access probability and zero social benefit. The above results show that if the access fee is too high, the SUs will refuse to use the spectrum because of the high cost, resulting in insufficient utilization of spectrum resources; and if the access fee is too low, it will lead to an increase of SU access demands, resulting in excessive system congestion and the decline of social benefit. Therefore, only when a reasonable price is found can the social benefit be maximized. It also illustrates the effectiveness of the spectrum pricing mechanism. The pricing mechanism can effectively control the access number of SUs, and realize the consistency of the individual equilibrium strategy and the socially optimal strategy to finish the rational allocation of spectrum resources.
Figure 3 shows the variation of social benefit S with the parameter r under the no-charge access mechanism and the optimal spectrum pricing mechanism in the Exp model. Except the spectrum access fee m, the other system parameters are the same as those in Figure 2. As shown in Figure 3, the social benefit gradually increases with the raise of r. This is because as the parameter r increases, the number of SUs who choose to renege grows, resulting in a decrease of the average waiting time of SUs, and the access probability of SUs becoming bigger. At the same time, the increase of r reduces the waiting loss of SUs, so it can bring more benefit to the whole society. Moreover, comparing with the no-charge mechanism, we can see that when the parameter r is small, the socially optimal pricing mechanism improves the social benefit more effectively. Only when r is increased to a certain value, the socially optimal access probability becomes 1, that is, no access control for SUs needs to be performed, and the no-charge access mechanism is consistent with the socially optimal pricing mechanism.

5. Conclusions

In this paper, we consider the impatient behavior of SUs and study the spectrum access strategies for them based on a repairable M/G/1 + M queueing model with balking and reneging. Applying the proposed system model, we compare the individual equilibrium and socially optimal access strategies for SUs and give the corresponding spectrum pricing mechanism to maximize the social benefit. Numerical results demonstrate our analysis and prove the effectiveness of the pricing mechanism.

Author Contributions

Conceptualization, Z.Z.; data curation, D.L.; investigation, Z.Z.; software, M.L.; writing—original draft, Z.Z.; writing—review & editing, J.W.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix

A proof of the convergence of ϕ n ( s ) is as follows:
Let f p ( s ) = ( 1 F p ( s ) ) / s , g s ( s ) = ( 1 G s ( s ) ) / s . By the hypothesis R e ( s ) > 0 , ϕ n ( s ) can be simplified to:
ϕ n ( s ) = j = 0 n { ( λ s q ) j [ λ p P 0 f p ( s + j r ) k = 0 j 1 g s ( s + k r ) + ( λ s q ) P 0 k = 0 j g s ( s + k r ) ] }
where
f p ( s + j r ) = x = 0 e ( s + j r ) x F ¯ p ( x ) d x x = 0 e j r x F ¯ p ( x ) d x = f p ( j r )
Similarly, we get:
g s ( s + k r ) g s ( k r )
Let M j = ( λ s q ) j [ λ p P 0 f p ( s + j r ) k = 0 j 1 g s ( s + k r ) + ( λ s q ) P 0 k = 0 j g s ( s + k r ) ] and N j = ( λ s q ) j + 1 P 0 k = 0 j g s ( k r ) + ( λ s q ) j λ p P 0 f p ( j r ) k = 0 j 1 g s ( k r ) so we can have M j N j . Moreover, we apply the ratio test and get:
lim j | N j + 1 N j | = lim j | ( λ s q ) j + 1 [ λ p P 0 f p ( j r + r ) k = 0 j g s ( k r ) + ( λ s q ) P 0 k = 0 j + 1 g s ( k r ) ] ( λ s q ) j [ λ p P 0 f p ( j r ) k = 0 j 1 g s ( k r ) + ( λ s q ) P 0 k = 0 j g s ( k r ) ] | = 0 < 1
Thus, it is proved ϕ n ( s ) = j = 0 n M j is convergent.

References

  1. Wang, J.; Gao, Y.; Yin, X.; Li, F.; Kim, H.J. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9472075. [Google Scholar] [CrossRef]
  2. Lin, Y.; Zhu, X.L.; Zheng, Z.G.; Dou, Z.; Zhou, R.L. The individual identification method of wireless device based on dimensionality reduction and machine learning. J. Supercomput. 2019, 75, 3010–3027. [Google Scholar] [CrossRef]
  3. Kumar, D.P.; Amgoth, T.; Annavarapu, C.S.R. Machine learning algorithms for wireless sensor networks: A survey. Inform. Fusion 2019, 49, 1–25. [Google Scholar] [CrossRef]
  4. Wang, J.; Gao, Y.; Liu, W.; Wu, W.B.; Lim, S. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Contin. 2019, 58, 711–725. [Google Scholar] [CrossRef]
  5. Wang, J.; Gu, X.J.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum-Cent. Comput. Inf. Sci. 2019, 9, 18. [Google Scholar] [CrossRef]
  6. Park, J.H.; Lee, W.C.; Choi, J.P.; Choi, J.W.; Um, S.B. Applying case-based reasoning to tactical cognitive sensor networks for dynamic frequency allocation. Sensors 2018, 18, 4294. [Google Scholar] [CrossRef] [PubMed]
  7. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An intelligent data gathering schema with data fusion supported for mobile sink in WSNs. Int. J. Distrib. Sens. Netw. 2019, 15. [Google Scholar] [CrossRef]
  8. Dou, Z.; Si, G.Z.; Lin, Y.; Wang, M.Y. An adaptive resource allocation model with anti-jamming in IoT network. IEEE Access 2019, 7, 93250–93258. [Google Scholar] [CrossRef]
  9. Zhang, Z.Y.; Guo, X.H.; Lin, Y. Trust management method of D2D communication based on RF fingerprint identification. IEEE Access 2018, 6, 66082–66087. [Google Scholar] [CrossRef]
  10. Nguyen, T.; Pan, J.; Dao, T. An Improved Flower Pollination Algorithm for Optimizing Layouts of Nodes in Wireless Sensor Network. IEEE Access 2019, 7, 75985–75998. [Google Scholar] [CrossRef]
  11. Yin, Y.; Xu, Y.; Xu, W.; Min, G.; Pei, Y. Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments. Entropy 2017, 19, 358. [Google Scholar] [CrossRef]
  12. He, S.; Xie, K.; Xie, K.; Xu, C.; Jin, W. Interference-aware Multi-source Transmission in Multi-radio and Multi-channel Wireless Network. IEEE Syst. J. 2019, 13, 2507–2518. [Google Scholar] [CrossRef]
  13. He, S.; Xie, K.; Chen, W.; Zhang, D.; Wen, J. Energy-aware Routing for SWIPT in Multi-hop Energy-constrained Wireless Network. IEEE Access 2018, 6, 17996–18008. [Google Scholar] [CrossRef]
  14. Wang, D.; Song, B.; Chen, D.; Du, X.J. Intelligent cognitive radio in 5G: AI-based hierarchical cognitive cellular networks. IEEE Wirel. Commun. 2019, 26, 54–61. [Google Scholar] [CrossRef]
  15. Kotobi, K.; Mainwaring, P.B.; Tucker, C.S.; Bilen, S.G. Data-throughput enhancement using data mining-informed cognitive radio. Electronics 2015, 4, 221–238. [Google Scholar] [CrossRef]
  16. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  17. Tang, B.; Tu, Y.; Zhang, Z.Y.; Lin, Y. Digital signal modulation classification with data augmentation using generative adversarial nets in cognitive radio networks. IEEE Access 2018, 6, 15713–15722. [Google Scholar] [CrossRef]
  18. Tu, Y.; Lin, Y.; Wang, J.; Kim, J.U. Semi-supervised learning with generative adversarial networks on digital signal modulation classification. CMC-Comput. Mater. Contin. 2018, 55, 243–254. [Google Scholar]
  19. Zhang, J.; Jin, X.; Sun, J.; Wang, J.; Sangaiah, A. Spatial and semantic convolutional features for robust visual object tracking. Multimed. Tools Appl. 2018, in press. [Google Scholar] [CrossRef]
  20. Zhang, J.; Lu, C.; Li, X.; Kim, H.; Wang, J. A full convolutional network based on DenseNet for remote sensing scene classification. Math. Biosci. Eng. 2019, 16, 3345–3367. [Google Scholar] [CrossRef]
  21. Zhang, J.; Lu, C.; Wang, J.; Wang, L.; Yue, X. Concrete cracks detection based on FCN with dilated convolution. Appl. Sci. 2019, 9, 2686. [Google Scholar] [CrossRef]
  22. Zhang, J.; Jin, X.; Sun, J.; Wang, J.; Li, K. Dual model learning combined with multiple feature selection for accurate visual tracking. IEEE Access 2019, 7, 43956–43969. [Google Scholar] [CrossRef]
  23. Yin, Y.; Chen, L.; Xu, Y.; Wan, J.; Mai, Z. QoS prediction for service recommendation with deep feature learning in edge computing environment. Mob. Netw. Appl. 2019. [Google Scholar] [CrossRef]
  24. Lin, Y.; Wang, C.; Wang, J.X.; Dou, Z. A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 2016, 16, 1675. [Google Scholar] [CrossRef] [PubMed]
  25. Zakariya, A.Y.; Rabia, S.I. Analysis of an interruption-based priority for multi-class secondary users in cognitive radio networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016. [Google Scholar]
  26. Joo, C.; Shroff, N.B. A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017. [Google Scholar]
  27. Wang, Y.C.; Tang, X.; Wang, T. A unified QoS and security provisioning framework for wiretap cognitive radio networks: A statistical queueing analysis approach. IEEE Trans. Wirel. Commun. 2019, 18, 1548–1565. [Google Scholar] [CrossRef]
  28. Wang, S.; Maharaj, B.T.; Alfa, A.S. Queueing analysis of performance measures under a new configurable channel allocation in cognitive radio. IEEE Trans. Veh. Technol. 2018, 67, 9571–9582. [Google Scholar] [CrossRef]
  29. Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. Age of information and throughput in a shared access network with heterogeneous traffic. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  30. Wang, L.C.; Wang, C.W.; Adachi, F. Load-balancing spectrum decision for cognitive radio networks. IEEE J. Sel. Areas Commun. 2011, 29, 757–769. [Google Scholar] [CrossRef]
  31. Jagannathan, K.; Menache, I.; Modiano, E.; Zussman, G. Non-cooperative spectrum access - the dedicated vs. free spectrum choice. IEEE J. Sel. Areas Commun. 2012, 30, 2251–2261. [Google Scholar] [CrossRef]
  32. Zhu, S.; Wang, J.T.; Li, W.W. Optimal service rate in cognitive radio networks with different queue length information. IEEE Access 2018, 6, 51577–51586. [Google Scholar] [CrossRef]
  33. Wang, J.; Huang, A.P.; Wang, W. Admission control in cognitive radio networks with finite queue and user impatience. IEEE Wirel. Commun. Lett. 2013, 2, 175–178. [Google Scholar] [CrossRef]
  34. Jin, S.F.; Ge, S.Y.; Yue, W.Y. Performance evaluation for an opportunistic spectrum access mechanism with impatience behavior and imperfect sensing results. In Proceedings of the 2015 Seventh International Conference on U-Biquitous and Future Networks, Sapporo, Japan, 7–10 July 2015. [Google Scholar]
  35. Li, H.S.; Han, Z. Socially optimal queuing control in cognitive radio networks subject to service interruptions: To queue or not to queue? IEEE Trans. Wirel. Commun. 2011, 10, 1656–1666. [Google Scholar]
  36. Do, C.T.; Tran, N.H.; Nguyen, M.V.; Hong, C.S.; Lee, S. Social optimization strategy in unobserved queueing systems in cognitive radio networks. IEEE Commun. Lett. 2012, 16, 1944–1947. [Google Scholar] [CrossRef]
  37. Smith, P.J.; Senanayake, R.; Dmochowski, P.A.; Evans, J.S. Distributed spectrum sensing for cognitive radio networks based on the sphericity test. IEEE Trans. Commun. 2019, 67, 1831–1844. [Google Scholar] [CrossRef]
  38. Lu, Y.; Duel-Hallen, A. A sensing contribution-based two-layer game for channel selection and spectrum access in cognitive radio Ad-hoc networks. IEEE Trans. Wirel. Commun. 2018, 17, 3631–3640. [Google Scholar] [CrossRef]
  39. Zhang, Y.; Wang, J.T.; Li, W.W. Optimal pricing strategies in cognitive radio networks with heterogeneous secondary users and retrials. IEEE Access 2019, 7, 3631–3640. [Google Scholar] [CrossRef]
  40. Stanford, R.E. Reneging phenomena in Single channel queues. Math. Oper. Res. 1979, 4, 162–178. [Google Scholar] [CrossRef]
Figure 1. Sample path of the virtual wait of secondary users (SUs) considering the impatient behavior.
Figure 1. Sample path of the virtual wait of secondary users (SUs) considering the impatient behavior.
Electronics 08 00995 g001
Figure 2. The impact of spectrum access fee m on the social benefit S and the SU equilibrium access probability qe.
Figure 2. The impact of spectrum access fee m on the social benefit S and the SU equilibrium access probability qe.
Electronics 08 00995 g002
Figure 3. The impact of r on the social benefit S under different spectrum pricing mechanisms in Exp model.
Figure 3. The impact of r on the social benefit S under different spectrum pricing mechanisms in Exp model.
Electronics 08 00995 g003

Share and Cite

MDPI and ACS Style

Zeng, Z.; Liu, M.; Wang, J.; Lan, D. Non-Cooperative Spectrum Access Strategy Based on Impatient Behavior of Secondary Users in Cognitive Radio Networks. Electronics 2019, 8, 995. https://doi.org/10.3390/electronics8090995

AMA Style

Zeng Z, Liu M, Wang J, Lan D. Non-Cooperative Spectrum Access Strategy Based on Impatient Behavior of Secondary Users in Cognitive Radio Networks. Electronics. 2019; 8(9):995. https://doi.org/10.3390/electronics8090995

Chicago/Turabian Style

Zeng, Zhen, Meng Liu, Jin Wang, and Dongping Lan. 2019. "Non-Cooperative Spectrum Access Strategy Based on Impatient Behavior of Secondary Users in Cognitive Radio Networks" Electronics 8, no. 9: 995. https://doi.org/10.3390/electronics8090995

APA Style

Zeng, Z., Liu, M., Wang, J., & Lan, D. (2019). Non-Cooperative Spectrum Access Strategy Based on Impatient Behavior of Secondary Users in Cognitive Radio Networks. Electronics, 8(9), 995. https://doi.org/10.3390/electronics8090995

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop