Reinforcement Learning based Secondary User Transmissions in Cognitive Radio Networks

被引:0
|
作者
Arunthavanathan, Senthuran [1 ,2 ]
Kandeepan, Sithamparanathan [1 ,2 ]
Evans, Robin J. [2 ]
机构
[1] RMIT Univ, Sch Elect Engn, Melbourne, Vic, Australia
[2] Natl ICT Australia, Victoria Res Lab, Melbourne, Vic, Australia
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we address the decision making criteria of a secondary user (SU) for deciding whether to transmit or not upon performing spectrum sensing and detecting the presence of any primary user (PU) in the environment in a cognitive radio network (CRN). We propose a reinforcement learning (RL) based approach by a Markov process at the SU node and present novel analytical methods to analyze the performance of such approaches. In particular, we define the probability of interference P-i and the probability of wastage P-w, and compare these metrics with a RL based and a non-RL based approach for SU transmission. The simulations show the presence of a tradeoff in the two probability metrics P-w and P-i, based on the Markov process. The simulation results are compared in the form of the transmitter operating characteristics (ToC) curves. Using our approach, one could control the interference to the PU by trading off with the spectral wastage.
引用
收藏
页码:374 / 379
页数:6
相关论文
共 50 条
  • [1] Undetectable Primary User Transmissions in Cognitive Radio Networks
    Choi, Jae-Kark
    Yoo, Sang-Jo
    [J]. IEEE COMMUNICATIONS LETTERS, 2013, 17 (02) : 277 - 280
  • [2] Routing in Reinforcement Learning based Cognitive Radio Networks
    Patel, Jitisha R.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 591 - 596
  • [3] Reinforcement learning-based cooperative sensing in cognitive radio networks for primary user detection
    Prasad, K. Venkata Vara
    Rao, P. Trinatha
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (1-2) : 34 - 47
  • [4] Secondary User Access Control in Cognitive Radio Networks
    Wang, Huaxia
    Yao, Yu-Dong
    Zhang, Xin
    Li, Hongbin
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (11) : 2866 - 2873
  • [5] Bounds on Secondary User Connectivity in Cognitive Radio Networks
    Liu, Dong
    Liu, Erwu
    Ren, Yi
    Zhang, Zhengqing
    Wang, Rui
    Liu, Fuqiang
    [J]. IEEE COMMUNICATIONS LETTERS, 2015, 19 (04) : 617 - 620
  • [6] Secondary User Energy Consumption in Cognitive Radio Networks
    Orumwense, Efe F.
    Afullo, Thomas J.
    Srivastava, Viranjay M.
    [J]. PROCEEDINGS OF THE 2015 12TH IEEE AFRICON INTERNATIONAL CONFERENCE - GREEN INNOVATION FOR AFRICAN RENAISSANCE (AFRICON), 2015,
  • [7] Optimization of Secondary User Access in Cognitive Radio Networks
    Aulakh, Inderdeep Kaur
    Vig, Renu
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [8] Relay-Assisted Primary and Secondary Transmissions in Cognitive Radio Networks
    El Shafie, Ahmed
    Khattab, Tamer
    Salem, Ahmed Sultan
    [J]. IEEE ACCESS, 2016, 4 : 6386 - 6400
  • [9] CLUSTERING AND REINFORCEMENT-LEARNING-BASED ROUTING FOR COGNITIVE RADIO NETWORKS
    Saleem, Yasir
    Yau, Kok-Lim Alvin
    Mohamad, Hafizal
    Ramli, Nordin
    Rehmani, Mubashir Husain
    Ni, Qiang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (04) : 146 - 151
  • [10] FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active Transmissions
    Bansal, Tarun
    Chen, Bo
    Sinha, Prasun
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2517 - 2525