CN110351884B - Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model - Google Patents
Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model Download PDFInfo
- Publication number
- CN110351884B CN110351884B CN201910581217.9A CN201910581217A CN110351884B CN 110351884 B CN110351884 B CN 110351884B CN 201910581217 A CN201910581217 A CN 201910581217A CN 110351884 B CN110351884 B CN 110351884B
- Authority
- CN
- China
- Prior art keywords
- channel
- channels
- access
- sensing
- secondary user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 106
- 238000001228 spectrum Methods 0.000 title claims abstract description 54
- 238000013179 statistical model Methods 0.000 title claims abstract description 27
- 241000282376 Panthera tigris Species 0.000 title abstract description 5
- 230000008447 perception Effects 0.000 claims abstract description 50
- 230000001149 cognitive effect Effects 0.000 claims abstract description 22
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 3
- 238000001514 detection method Methods 0.000 claims description 14
- 238000004220 aggregation Methods 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 4
- DDPMGIMJSRUULN-UHFFFAOYSA-N buphedrone Chemical compound CCC(NC)C(=O)C1=CC=CC=C1 DDPMGIMJSRUULN-UHFFFAOYSA-N 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 238000004088 simulation Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 238000013178 mathematical model Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 208000032370 Secondary transmission Diseases 0.000 description 1
- 230000019771 cognition Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/318—Received signal strength
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/336—Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model. The method comprises the following steps: firstly, modeling a channel sensing and accessing process by using a double-layer multi-arm tiger machine statistical model; then, analyzing the operation scene of the secondary user, and if the secondary user belongs to a cognitive network under a single master user station, performing spectrum opportunity access by adopting an isomorphic channel perception access method; and if the cognitive network belongs to the cognitive network under the multi-master user station, performing spectrum opportunity access by adopting a heterogeneous channel perception access method. The invention ensures the profit loss performance of O (lnt) in limited time, the profit loss of the O (lnt) expression algorithm is linearly changed along with the lnt curve, the statistical asymptotic validity is realized under the condition of enough time, and the high-efficiency data transmission can be completed on the premise of not causing harmful interference to authorized users.
Description
Technical Field
The invention relates to the technical field of wireless networks, in particular to a spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model.
Background
With the increasing scarcity of wireless spectrum resources, the problem of low utilization rate of the existing spectrum is obvious. As an effective means for alleviating the spectrum shortage problem, spectrum opportunity access becomes a research hotspot. The core idea of the opportunity access method is that the secondary user is allowed to transmit data by using the dynamically identified spectrum opportunity without influencing the normal work of the authorized user in the cognitive network. In order to accurately identify the opportunities, the secondary user has channel sensing capability, and can access the authorized channel opportunistically according to the sensing result, so that the spectrum utilization rate is improved. Most of the existing technical schemes are provided for the spectrum access problem under the condition that the spectrum statistical information is known, and the existing technical schemes are difficult to operate or poor in performance under the condition that the spectrum information is unknown.
Compared with the spectrum access research under the condition of known statistical information, the channel sensing access research under the condition of unknown statistical information is still in an initial stage, and the main challenge is that the sensing capability of a secondary user is limited, an optimal channel needs to be found for sensing under the condition of unknown statistical information, and the channel is accurately estimated on the basis of sensing observation data; after the channel is sensed in real time, the optimal frequency spectrum is dynamically selected for opportunistic access and data transmission based on the current observation data and historical data statistical information. In the conventional method, the idle probability information of the authorized spectrum is assumed to be known by the secondary user, and in each time slot, the secondary user always selects the optimal channel set for sensing and accesses all sensed idle channels. However, in an actual operation situation, especially in a mobile network or networking in an unknown regional environment, the statistical information of the licensed spectrum generally needs to be obtained through long-time measurement and data analysis, accurate information needs to pass through a channel sensing process for a sufficiently long time, and the statistical information is more difficult to obtain in an emergency condition or an enemy wireless environment. In order to fully detect the optimal channel set, the secondary user must sense the non-optimal channel for a sufficient number of times, accurately estimate channel statistical information by using sensing data, and distinguish the optimal authorized channel from the suboptimal authorized channel. Since the accurate acquisition of the channel information needs to go through a learning process with a certain duration, in the process, the secondary user erroneously perceives a non-optimal channel in each time slot or accesses the non-optimal channel, which causes data collision between the secondary user and the authorized user and causes loss of channel access revenue. Therefore, the efficient secondary user channel perception access method is designed by taking the optimal channel perception access income with known statistical information as a reference so as to realize the lowest income loss, is one of the unsolved problems, and has important significance for improving the network spectrum utilization rate.
The current main channel sensing access method has the following defects:
1) the actual environment adaptability is poor. Most of the existing methods are perception access methods under the condition that statistical information is known, and the existing methods cannot operate under the condition that the statistical information is unknown or the statistical information is difficult to obtain in time. The existing method considers that the number of sensing and access channels is the same, but in the practical situation, the receiving energy and the transmitting energy of a secondary user are greatly different, a plurality of channels need to be sensed under the condition that the power energy is limited, and partial high-quality channels are preferably accessed, and the traditional method does not consider the situation.
2) The method has large loss of income. The conventional channel sensing access method under the condition of unknown statistical information is mostly proposed based on the design of a classical multi-arm slot machine mathematical model, and aiming at the cognitive access under the condition of limited physical network or physical factors, a secondary user faces the limitation of power, energy or hardware, so that the sensing idle channel cannot be completely accessed.
Disclosure of Invention
The invention aims to provide a spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model, which is wide in application range and low in yield loss.
The technical solution for realizing the purpose of the invention is as follows: a spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model comprises the following steps:
and 4, performing spectrum opportunity access by adopting a heterogeneous channel perception access method.
Further, the channel sensing and accessing process is modeled by using the double-layer multi-arm slot machine statistical model in the step 1, and the channel sensing and accessing process specifically comprises the following steps:
the secondary user can sense a plurality of channels in each time slot and select part of the channels to perform opportunistic access; modeling a channel perception and access process through a double-layer multi-arm slot machine statistical model, wherein at least access yield loss in an O (lnt) relation with time t exists in any physically feasible method, and the O (lnt) represents that the yield loss of an algorithm linearly changes along with an lnt curve;
setting a cognitive network to have N authorized channels, wherein a master user accesses the channels according to time slots, and the idle probability of the master user channel meets theta1>θ2>…>θN;
In a single time slot, the secondary user can simultaneously sense M channels, M is less than N, and at most, K sensing idle channels are accessed, K is less than or equal to M, and the method is usedAndrespectively, the detection probability and the false alarm probability of channel i.
Further, the analysis of the secondary user operation scenario in step 2 is specifically as follows:
based on a statistical model of a double-layer multi-arm slot machine, the method aims at cognition under a single-master user station and a plurality of master user stationsTwo typical scenes of the network adopt two different methods of an isomorphic channel sensing method and a heterogeneous channel sensing method to sense channels respectively, under the condition of a single main user station, the energy of signals received on each main channel is similar and spectrum sensing parameters are the same within a certain distance range between a secondary user and a single main user, and the requirements are metUnder the condition of multiple main user stations, the distances between a secondary user and different main user stations are different, and the energy of received signals on each main channel is different, so that the situation belongs to the sensing situation of heterogeneous channels; for channel i, there are different perceptual parameters.
Further, the spectrum opportunity access is performed by using the homogeneous channel sensing access method in step 3, which specifically includes:
under the sensing scene of homogeneous channels, the sensing performance of the secondary user to all the primary user channels is the same, and the detection characteristic meets the detection probabilityAnd false alarm probability
At time slot T, the secondary user records T (T) ═ T (T)1(t),T2(t),...,TN(t)) and Y (t) ═ Y1(t),Y2(t),...,YN(T)), wherein Ti(t) represents the number of time slots when channel i has been sensed before time slot t, Yi(t) represents the number of time slots before time slot t where the perceived channel i is idle;
the isomorphic channel perception access method comprises the following specific steps:
step 3.1: initialization: by usingSensing all N main channels in each time slot, randomly selecting a sensing idle channel to access in each time slot, and updating Ti(t) and Yi(T) wherein Ti(t) and Yi(t) has the same meaning as above; whereinRepresents rounding up;
step 3.2: the process is cycled along with time:
step 3.2.1: at time slot t, for all grant channels i 1,2iIs estimated value ofAnd determining a set of perceptual channels M (t) comprising the largest M coefficientsA corresponding channel;
step 3.2.2: the channels of the secondary user perception set M (T) use the channel set I (T) representing perception idle, and the recorded data T is updated in sequencei(t) and Yi(t);
Step 3.2.3: if set I (t) is not empty, access channel setReturning to the step 3.2.1; otherwise, no channel is accessed.
Further, the spectrum opportunity access is performed by using the heterogeneous channel sensing access method in step 4, which specifically includes:
under the sensing scene of the homogeneous channel, the detection probability and the false alarm probability of the secondary user to different channels are different, and the secondary user can sense M channels in a single time slot, namely sensingAny one of a set of potential channels, the set of perceived channels being denoted asWhereinTo take a combination of M different channels from N different channels at a time,m is more than or equal to 0 and less than or equal to N, and the calculation formula isCollectionIn (1), let mij J 1,2, M denotes a set MiThe jth channel in the set if the secondary user perceives the set M at time slot tiUse ofIndicating a set of channels that are perceptually idle, using T before time slot Ti(t) denotes perception MiNumber of time slots of, Yi(T) denotes a set of channels that are perceived as idle, Ti,j(t), j ═ 1, 2.. M denotes perception MiAggregation and access channel mijNumber of time slots of, Yij(t) denotes perception MiAggregation and access channel mijIn time slots of the channel mij(ii) the accumulated revenue obtained; secondary user maintenance record Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t) a statistic;
the method for sensing and accessing the heterogeneous channel comprises the following specific steps:
step 4.1: initialization: for thePerforming sensing M continuously in successive time slotsiAnd access sensing M in each time slotiIdle channels not accessed at that time; this process is repeated until set MiEach channel in (1) is accessed at least one time; for each time slot, updating Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t),j=1,2,...,M;
Step 4.2: the process is cycled along with time:
step 4.2.1: at time slot t, calculating coefficientAnd selects a set of channelsPerception setA channel of interest;
step 4.2.2: if it is notComputing coefficients for a set of channels perceived as idle, non-space-time
Compared with the prior art, the invention has the remarkable advantages that: (1) establishing a double-layer multi-arm tiger machine statistical mathematical model, and providing a multi-channel sensing and partial access method under unknown information aiming at channel opportunity access; (2) the sensing access under the conditions of an imperfect channel and unknown channel statistical information can be realized, and the method has wide applicability; (3) aiming at two situations of isomorphic perception and heterogeneous perception, effective channel perception and access are achieved, and under the provided performance metric standard, O (lnt) revenue loss performance can be achieved under the conditions of limited time t and time asymptotic t → ∞.
Drawings
Fig. 1 is a diagram of a typical scenario of cognitive network spectrum access.
Fig. 2 is a flow chart of secondary user spectrum dynamic access.
Fig. 3 is a flow chart of the spectrum opportunity access method based on the double-layer multi-arm slot machine statistical model.
Fig. 4 is a schematic flow chart of isomorphic sensing spectrum access in the present invention.
Fig. 5 is a flowchart illustrating a heterogeneous sensing spectrum access according to the present invention.
Fig. 6 is a graph of r (t)/lnt performance of the homogeneous spectrum sensing access method in the embodiment of the present invention.
Fig. 7 is a graph of r (t)/lnt performance of the heterogeneous spectrum sensing access method according to the embodiment of the present invention.
Detailed Description
On the basis of a classical MABP statistical model, aiming at the multi-channel sensing and partial access process of a secondary user and the imperfect channel sensing condition, the invention provides a double-layer MABP statistical model to carry out statistical modeling on physical problems; on the basis of a double-layer MABP statistical model, aiming at an actual operation scene, a channel perception access opportunity method combining isomorphic channel perception and heterogeneous channel perception is provided, and the efficiency of the method is verified through theoretical analysis and simulation.
The following terms are explained for ease of understanding:
imperfect main channel perception: in a practical cognitive network, due to the limitation of the receiving signal-to-noise ratio of a primary user channel, the perception of a secondary user channel is usually imperfect, and channel identification errors can exist.
Opportunistic spectrum access: if the secondary user does not interfere with the primary user, the secondary user may identify the opportunistic spectrum and use it in the system.
Bi-MABP: a double-layer multi-arm tiger machine. Assuming there are multiple booms, selecting any one will generate random revenue; for the player, the instant profit generation process can be regarded as a black box and cannot be obtained by direct observation, and the statistical characteristics need to be obtained through learning and selection is made based on the statistical characteristics to ensure that the experimenter can obtain the highest profit.
And (3) detection probability: when the receiver input does have a signal, two decisions may be made due to interference background, etc.: "signal" or "no signal". When there is a signal, the probability of making a correct decision that "there is a signal" is called the detection probability.
False alarm probability: the probability that "no signal" is detected but "signal" is judged, or the probability that "signal" is judged as "no signal".
sample mean value: the mean is the sum of all data in a set of data divided by the number of the set of data, and the sample mean is the mean of the sample data in the population.
It is desired that: the probability of each possible outcome in the trial is multiplied by the sum of its outcomes, which reflects the magnitude of the average value of the random variable.
The combination is called, that is, M different elements (0. ltoreq. M. ltoreq.N) are taken out of N different elements at a time. The calculation formula is as follows:
a main user: users authorized to access the spectrum.
And (4) secondary users: and the users which can access the spectrum opportunity under the condition of the primary user are not influenced.
f (t) to O (lnt): denotes that f (t) there is a constant c such that for time t > t0There is a constant such that f (t). ltoreq.clnt.
The invention is described in further detail below with reference to the figures and the embodiments.
With reference to fig. 3, the spectrum opportunity access method based on the double-layer multi-arm slot machine statistical model of the present invention includes the following steps:
partial channel sensing scenarios for the secondary user to the grant channel include both homogeneous and heterogeneous channel sensing scenarios, as shown in fig. 1. The secondary user in each time slot can sense a plurality of channels and selects part of the channels to carry out opportunistic access; modeling a channel perception and access process through a double-layer MABP statistical model, and proving that at least access yield loss in an O (lnt) relation with time t exists in any physically feasible method;
setting N authorized channels in a cognitive network, and accessing a channel by a master user according to a time slot; the idle probability of the main user channel satisfies theta1>θ2>…>θN;
In a single time slot, the secondary user can simultaneously sense M channels, M is less than N, and at most, K sensing idle channels are accessed, K is less than or equal to M, and the method is used as shown in figure 1Andrespectively representing the detection probability and the false alarm probability of the channel i;
aiming at the problem, modeling is carried out by using a double-layer multi-arm slot machine problem, a player needs to select to pull the slot machine arms at the same time, and the income statistical information of the pulled arms is unknown; after the player selects to pull the horn each time, the corresponding income value which possibly has errors can be obtained; based on the observation information, the player needs to further decide to obtain the real benefit of part of the arms; to maximize the revenue from multiple trials, players need to design efficient information estimation and decision methods that minimize the loss compared to the revenue expectation given the statistical information.
on the basis of a double-layer multi-arm slot machine statistical model, a solution is provided for the problem that a channel opportunity is accessed to a corresponding specific double-layer multi-arm slot machine, a secondary user operation scene is analyzed, and two different channel perception design methods are designed for two typical scenes, namely a cognitive network under a single main user station and a plurality of main user stations, as shown in fig. 2, and the two different channel perception design methods comprise an isomorphic channel perception method and a heterogeneous channel perception method. Under the condition of a single main user station, the energy of the received signals on each main channel is similar and the spectrum sensing parameters are the same within a certain distance range between a secondary user and the single user, so that the requirements of meeting the requirements of the requirements on the energy of the received signals on the frequency spectrum sensing parameters are metUnder the condition of multiple main user stations, the distances between a secondary user and different user stations are different, and the energy of received signals on each main channel is different, so that the heterogeneous channel sensing condition is achieved. In particular, for a certain channel i, there are different perceptual parameters.
under the sensing access scene of the homogeneous channel, the sensing performance of the secondary user to all the main user channels is the same, and the detection characteristic meets the detection probabilityAnd false alarm probabilityThe process flow is shown in FIG. 4;
at time slot T, the secondary user records T (T) ═ T (T)1(t),T2(t),...,TN(t)) and Y (t) ═ Y1(t),Y2(t),...,YN(T)), wherein Ti(t) represents the number of time slots when channel i has been sensed before time slot t, Yi(t) represents the number of time slots before time slot t where the perceived channel i is idle;
with reference to fig. 4, the isomorphic channel sensing access method specifically includes the following steps:
step 3.1: initialization: by usingSensing all N main channels by each time slot, randomly selecting a sensing idle channel to access each time slot, and updating T and Y; whereinRepresents rounding up;
step 3.2: the process is cycled along with time:
step 3.2.1: for all grant channels i 1, 2.. times.n, at time slot t, θ, which can be calculated according to the expectation of the sample mean valueiEstimated valueAnd determining a set of perceptual channels M (t) comprising the largest M coefficientsA corresponding channel;
step 3.2.2: the channels of the secondary user perception set M (t) use the channel set I (t) representing perception idle, and the recorded data T (t) and Y (t) are updated in sequence;
step 3.2.3: if set I (t) is not empty, access channel setReturning to the step 3.2.1; otherwise, no channel is accessed.
under the sensing scene of the homogeneous channel, the detection probability and the false alarm probability of the secondary user to different channels are different, and the secondary user can sense M channels in a single time slot, namely sensingAny one of a set of potential channels, the set of perceived channels being denoted asWhereinTaking out the combination of M different channels from N different channels each time, wherein M is more than or equal to 0 and less than or equal to N, and the calculation formula isCollectionIn (1), let mij J 1,2, M denotes a set MiThe jth channel in the set if the secondary user perceives the set M at time slot tiUse ofIndicating a set of channels that are perceptually idle, using T before time slot Ti(t) denotes perception MiNumber of time slots of, Yi(T) denotes a set of channels that are perceived as idle, Ti,j(t), j ═ 1, 2.. M denotes perception MiAggregation and access channel mijNumber of time slots of, Yij(t) denotes perception MiAggregation and access channel mijIn time slots of the channel mij(ii) the accumulated revenue obtained; secondary user maintenance record Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t) a statistic;
with reference to fig. 5, the specific steps of the heterogeneous channel aware access method are as follows:
step 4.1: initialization: for thePerforming sensing M continuously in successive time slotsiAnd access sensing M in each time slotiIdle channels not accessed at that time; this process is repeated until set MiEach channel in (1) is accessed at least one time; for each time slot, updating Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t),j=1,2,...,M;
Step 4.2: the process is cycled along with time:
step 4.2.1: at time slot t, calculating coefficientAnd selects a set of channelsPerception setA channel of interest;
step 4.2.2: if it is notComputing coefficients for a set of channels perceived as idle, non-space-time
The access method performance metrics are performed as follows:
under the condition that the statistical information is unknown, the access method has the profit loss. The expected revenue for the access method phi is given by the revenue loss metric equation as follows:
under the conditions of perfect channel sensing and full channel access sensing, because the secondary user is unknown about the channel information, the yield loss has a lower bound o (lnt), that is, any feasible method at least has the yield loss in a logarithmic relation with time. Compared with the perfect channel sensing situation, sensing the situation that the non-optimal channel is accessed in the idle channel possibly causes more profit loss, wherein the profit refers to the data volume successfully transmitted by the secondary user through the primary user spectrum access and is determined by the receiving end confirmation message. In practical situations, if the message is not received, the message collides with the transmission of the primary user who fails to detect, so that secondary transmission failure is caused, and the corresponding transmission gain is 0.
Through analysis, the secondary user performs dynamic sensing access of the primary user channel according to the method, and the loss of revenue R (t) before the time slot t meets the requirement of R (t) -O (lnt).
Example 1
In a specific embodiment of the invention, a scene of partial channel perception access of a secondary user is considered, statistical modeling is carried out on channel access, and the fact that the statistical information is unknown, the next user at least faces the profit loss in O (lnt) relation with time is analyzed, and with the performance as the target, a spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model is adopted for spectrum access. With reference to fig. 6 and 7, strict analysis and simulation prove that the yield loss of the proposed method satisfies the convergence performance of o (lnt) under the condition of finite time t and time asymptotic t → ∞.
Fig. 6 shows a simulation result of channel sensing access of the next user in an isomorphic channel sensing scenario, that is, a time-varying area curve of the loss-of-revenue performance, when the channel access number K is 2. Fig. 7 shows a simulation result of the K value for the next user channel sensing access in the heterogeneous channel sensing scenario. It can be seen that for homogeneous channel sensing and channel sensing access with independent and same distribution model, the normalized loss-of-revenue value increases when the number of access channels K increases from 1 to the number of sensing channels M. This is because the M optimal sensing channels selected by the method proposed by us and the method assisted by prior knowledge may be different in the partial channel sensing process, resulting in additional channel access revenue loss. If we choose to access more channels, i.e. the K value increases further, the channel selected by the proposed method may differ more from the optimal channel set selected by the prior-known-aided method, resulting in an increased normalized revenue loss value. Unlike the homogeneous sensing scenario, it can be seen from fig. 7 that the normalized revenue loss of channel sensing access under heterogeneous channel sensing decreases as the value of the access channel number K increases. This is because in this scenario we adopt a channel sensing access method based on a channel sensing set, and utilize feedback information of the channel access result.
In conclusion, the method provided by the invention researches the perception access problem under the conditions of imperfect channels and unknown channel statistical information, is closer to the application scene of real cognitive radio, and has wide applicability; providing a statistical model of the problem of the double-layer multi-arm slot machine, and modeling partial perception and selective access processes of secondary users to the authorized channel; the matching problem provides a method performance measurement standard under the condition of unknown statistical information; aiming at the two situations of isomorphic perception and heterogeneous perception, an effective channel perception and access method is provided, and under the provided performance metric standard, O (lnt) revenue loss performance can be realized under the conditions of limited time t and time asymptotic t → ∞.
Claims (2)
1. A spectrum opportunity access method based on a double-layer multi-arm slot machine statistical model is characterized by comprising the following steps:
step 1, modeling a channel sensing and accessing process by using a double-layer multi-arm slot machine statistical model;
step 2, analyzing the operation scene of the secondary user, and entering step 3 if the secondary user belongs to a cognitive network under a single main user station; if the cognitive network belongs to the cognitive network under the multi-master user station, entering the step 4;
step 3, adopting a isomorphic channel perception access method to carry out spectrum opportunity access;
step 4, performing spectrum opportunity access by adopting a heterogeneous channel perception access method;
the channel sensing and accessing process is modeled by using the double-layer multi-arm slot machine statistical model in the step 1, and the channel sensing and accessing process specifically comprises the following steps:
the secondary user can sense a plurality of channels in each time slot and select part of the channels to perform opportunistic access; modeling a channel perception and access process through a double-layer multi-arm slot machine statistical model, wherein at least access yield loss in an O (ln t) relation with time t exists in any physically feasible method, and the O (ln t) represents that the yield loss of an algorithm linearly changes along with an ln t curve;
setting a cognitive network to have N authorized channels, wherein a master user accesses the channels according to time slots, and the idle probability of the master user channel meets theta1>θ2>…>θN;
In a single time slot, the secondary user can simultaneously sense M channels, M is less than N, and at most, K sensing idle channels are accessed, K is less than or equal to M, and the method is usedAndrespectively representing the detection probability and the false alarm probability of the channel i;
the spectrum opportunity access is performed by adopting the isomorphic channel sensing access method in the step 3, which specifically comprises the following steps:
under the sensing scene of homogeneous channels, the sensing performance of the secondary user to all the primary user channels is the same, and the detection characteristic meets the detection probabilityAnd false alarm probability
At time slot T, the secondary user records T (T) ═ T (T)1(t),T2(t),...,TN(t)) and Y (t) ═ Y1(t),Y2(t),...,YN(T)), wherein Ti(t) represents the number of time slots when channel i has been sensed before time slot t, YiWhen (t) representsThe number of idle time slots of the perceived channel i before the slot t;
the isomorphic channel perception access method comprises the following specific steps:
step 3.1: initialization: by usingSensing all N main channels in each time slot, randomly selecting a sensing idle channel to access in each time slot, and updating Ti(t) and Yi(T) wherein Ti(t) and Yi(t) has the same meaning as above; whereinRepresents rounding up;
step 3.2: the process is cycled along with time:
step 3.2.1: at time slot t, for all grant channels i 1,2iIs estimated value ofAnd determining a set of perceptual channels M (t) comprising the largest M coefficientsA corresponding channel;
step 3.2.2: the channels of the secondary user perception set M (T) use the channel set I (T) representing perception idle, and the recorded data T is updated in sequencei(t) and Yi(t);
Step 3.2.3: if set I (t) is not empty, access channel setReturning to the step 3.2.1; otherwise, no channel is accessed;
the spectrum opportunity access is performed by adopting the heterogeneous channel sensing access method in the step 4, which specifically comprises the following steps:
under the isomorphic channel perception scene, the detection probability and the false alarm probability of the secondary user for different channels existIn contrast, a secondary user can perceive M channels in a single time slot, i.e., perceiveAny one of a set of potential channels, the set of perceived channels being denoted asWhereinTaking out the combination of M different channels from N different channels each time, wherein M is more than or equal to 0 and less than or equal to N, and the calculation formula isCollectionIn (1), let mijJ 1,2, M denotes a set MiThe jth channel in the set if the secondary user perceives the set M at time slot tiUse ofIndicating a set of channels that are perceptually idle, using T before time slot Ti(t) denotes perception MiNumber of time slots of, Yi(T) denotes a set of channels that are perceived as idle, Ti,j(t), j ═ 1, 2.. M denotes perception MiAggregation and access channel mijNumber of time slots of, Yij(t) denotes perception MiAggregation and access channel mijIn time slots of the channel mij(ii) the accumulated revenue obtained; secondary user maintenance record Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t) a statistic;
the method for sensing and accessing the heterogeneous channel comprises the following specific steps:
step 4.1: initialization: for thePerforming sensing M continuously in successive time slotsiAnd access sensing M in each time slotiIdle channels not accessed at that time; this process is repeated until set MiEach channel in (1) is accessed at least one time; for each time slot, updating Ti(t)、Yi(t)、Ti,j(t) and Yi,j(t),j=1,2,...,M;
Step 4.2: the process is cycled along with time:
step 4.2.1: at time slot t, calculating coefficientAnd selects a set of channelsPerception setA channel of interest;
step 4.2.2: if it is notComputing coefficients for a set of channels perceived as idle, non-space-time
2. The method for spectrum opportunity access based on the double-layer multi-arm slot machine statistical model of claim 1, wherein the analysis of the secondary user operation scenario in step 2 is as follows:
based on a double-layer multi-arm slot machine statistical model, aiming at two typical scenes of a cognitive network under a single-master user station and a multi-master user station, channel sensing is carried out by respectively adopting two different methods, namely an isomorphic channel sensing method and a heterogeneous channel sensing method, under the condition of the single-master user station, a secondary user and a single master user are within a certain distance range, the energy of received signals on each master channel is similar, frequency spectrum sensing parameters are the same, and the requirements of meeting the requirements of the requirement of similar received signal energy and same frequency spectrumUnder the condition of multiple main user stations, the distances between a secondary user and different main user stations are different, and the energy of received signals on each main channel is different, so that the situation belongs to the sensing situation of heterogeneous channels; for channel i, there are different perceptual parameters.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910581217.9A CN110351884B (en) | 2019-06-29 | 2019-06-29 | Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910581217.9A CN110351884B (en) | 2019-06-29 | 2019-06-29 | Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110351884A CN110351884A (en) | 2019-10-18 |
CN110351884B true CN110351884B (en) | 2020-08-28 |
Family
ID=68177459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910581217.9A Active CN110351884B (en) | 2019-06-29 | 2019-06-29 | Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110351884B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111313994B (en) * | 2019-12-30 | 2021-04-30 | 中国人民解放军军事科学院国防科技创新研究院 | Multi-user spectrum access method based on multi-arm gambling machine model under fairness principle |
CN113098641B (en) * | 2021-03-26 | 2022-09-09 | 天津(滨海)人工智能军民融合创新中心 | Opportunistic spectrum access method under energy limitation condition |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179675A (en) * | 2013-01-08 | 2013-06-26 | 中国人民解放军理工大学通信工程学院 | Epsilon-greed based online sequential perceiving and opportunity accessing method |
WO2017023074A1 (en) * | 2015-07-31 | 2017-02-09 | 주식회사 윌러스표준기술연구소 | Multi-carrier signal transmission method, device, and system |
CN108029138A (en) * | 2015-07-21 | 2018-05-11 | 法国国立应用科学学院 | Method for the chance access to frequency spectrum |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170278114A1 (en) * | 2016-03-24 | 2017-09-28 | Xerox Corporation | Adaptive collaborative filtering with extended kalman filters and multi-armed bandits |
-
2019
- 2019-06-29 CN CN201910581217.9A patent/CN110351884B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179675A (en) * | 2013-01-08 | 2013-06-26 | 中国人民解放军理工大学通信工程学院 | Epsilon-greed based online sequential perceiving and opportunity accessing method |
CN108029138A (en) * | 2015-07-21 | 2018-05-11 | 法国国立应用科学学院 | Method for the chance access to frequency spectrum |
WO2017023074A1 (en) * | 2015-07-31 | 2017-02-09 | 주식회사 윌러스표준기술연구소 | Multi-carrier signal transmission method, device, and system |
Non-Patent Citations (3)
Title |
---|
Joint Channel Selection and Power Control for NOMA: A Multi-Armed Bandit Approach;Mohamed Ali Adjif, Oussama Habachi, and Jean-Pierre Cances;《2019 Mathematical Tools for IoT Networks Modeling》;20190418;全文 * |
Multiple Armed Bandits Based Opportunistic Channel Access with Switching Cost in Block Fading Channel;Zhiqiang Qin,Weijun Liu, Yawu Jiang, Wenhui Li,Jingdi Zhou;《2015 International Conference on Wireless Conmunications &Signal Processing》;20151203;全文 * |
基于认知的短波宽带信道选择关键技术研究;秦志强;《中国优秀博士论文全文数据库》;20180615;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110351884A (en) | 2019-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8805428B2 (en) | Cooperative spectrum sensing in cognitive radio networks | |
KR101469659B1 (en) | Method for controlling random access for the efficient sensing of the cooperative spectrum in a cognitive radio-based frequency resource sharing system | |
CN110351884B (en) | Spectrum opportunity access method based on double-layer multi-arm tiger machine statistical model | |
EP3694149A1 (en) | Network quality determining method and apparatus, and storage medium | |
Yousefvand et al. | Maximizing network capacity of cognitive radio networks by capacity-aware spectrum allocation | |
CN110351886A (en) | Opportunistic spectrum access method based on sideband observation information multi-arm Slot Machine model | |
CN114205046B (en) | Communication perception integrated network interference coordination method and device | |
CN110649982B (en) | Double-threshold energy detection method based on secondary user node selection | |
CN111313994B (en) | Multi-user spectrum access method based on multi-arm gambling machine model under fairness principle | |
KR20110094983A (en) | Weighted-cooperative spectrum sensing scheme using markov model in cognitive radio systems | |
CN102394712B (en) | Joint optimization method of detection period and detection time in cognitive radio system | |
CN104394543A (en) | Joint frequency spectrum sensing method based on Adaboost algorithm | |
CN113472463A (en) | Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network | |
Zhang et al. | Machine learning based protocol classification in unlicensed 5 GHz bands | |
CN107509253B (en) | Channel frequency band access method and device | |
CN113395709B (en) | Service coverage analysis method facing user base station poisson distribution | |
CN114866171B (en) | Signal statistics method, device, computer equipment and storage medium | |
CN111294128B (en) | Opportunistic spectrum access method based on Markov channel model | |
CN113068247B (en) | Wireless access point power estimation method based on multilayer perceptron | |
Bezerra et al. | Hidden markov model spectrum predictor for poisson distributed traffic | |
Pu et al. | Primary user emulation detection algorithm based on distributed sensor networks | |
CN114285701B (en) | Method, system, equipment and terminal for identifying transmitting power of main user | |
Yi et al. | Secondary user monitoring in unslotted cognitive radio networks with unknown models | |
Li et al. | Research on adaptive energy detection technology based on correlation window | |
CN114285506B (en) | Hybrid two-stage multi-star cooperative spectrum sensing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |