Energy-Efficient and Trust-aware Cooperation in Cognitive Radio - - PowerPoint PPT Presentation

energy efficient and trust aware cooperation in cognitive
SMART_READER_LITE
LIVE PREVIEW

Energy-Efficient and Trust-aware Cooperation in Cognitive Radio - - PowerPoint PPT Presentation

Energy-Efficient and Trust-aware Cooperation in Cognitive Radio Networks Networks Ning Zhang Department of Electrical and Computer Engineering U i University of Waterloo i f W l 1 Outline Outline Introduction Introduction


slide-1
SLIDE 1

Energy-Efficient and Trust-aware Cooperation in Cognitive Radio Networks Networks

Ning Zhang Department of Electrical and Computer Engineering U i i f W l University of Waterloo

1

slide-2
SLIDE 2

Outline Outline

  • Introduction

Introduction

  • Related works
  • Motivation and objectives

Motivation and objectives

  • System model
  • Proposed scheme
  • Proposed scheme

– Trust values Stackelberg game – Stackelberg game

  • Numerical results
  • Conclusion and future work
  • Conclusion and future work

2

slide-3
SLIDE 3

Introduction Introduction

  • Cognitive radio network (CRN)

S i – Spectrum scarcity – Cognitive radio [1] primary users (PU) and secondary users (SU) – Spectrum holes

  • Shortcomings of Spectrum Sensing

( l i h f di h d i ) – Inaccurate (multipath fading, shadowing) – Energy consumption – Dynamic

  • Cooperation

– Cooperative sensing (Cooperation among SUs) p g ( p g ) – Cooperation between PU and SU

[1] S. Haykin, Cognitive radio: brain‐empowered wireless communications, IEEE Journal on Selected Areas in Communications 23 (2) (2005) 201–220.

3

slide-4
SLIDE 4

Related works Related works

  • In [2], the PU gives its licensed bandwidth for a fraction of the transmission

In [2], the PU gives its licensed bandwidth for a fraction of the transmission time to a subset of secondary transmitters in exchange for cooperation to increase its transmission rate.

  • Zhang et al. in [3] propose a novel cooperative cognitive radio framework,

where the PU selects some appropriate SUs as cooperative relays to increase its transmission rate and revenue. In return, an interval of time is gi en to the selected secondar rela s as a re ard given to the selected secondary relays as a reward.

  • Han et al. in [4] propose a two-phase cooperation scheme in CRN. The PU

transmits its signal in the first phase which is overheard by the SU Then transmits its signal in the first phase, which is overheard by the SU. Then the SU decodes and superimposes the PU’s signal with its own signal using a different power level to broadcast.

[2] O. Simeone. et al, “Spectrum leasing to cooperating secondary ad hoc networks,” Selected Areas in Communications, IEEE Journal on, 2008 4 [3] J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperative cognitive radio networks,” in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009. [4] Y. Han et al, “Cooperative decode-and-forward relaying for secondary spectrum access,” Wireless Communications,IEEE Transactions on, 2009.

slide-5
SLIDE 5

Motivation and objectives j

  • Security concerns:

All previous works assume that SUs are trustworthy and well behaved which All previous works assume that SUs are trustworthy and well-behaved, which may not be always true in reality. There may exist some dishonest users, even malicious ones in the system, corrupting or disrupting the normal operation of Cooperative CRN. p

  • Energy efficiency concerns:

Since the PU can transmit its data at any time, it may have an incentive to Since the PU can transmit its data at any time, it may have an incentive to cooperate for energy saving due to power limitation.

  • Motivation:

Motivation: We make an effort to guarantee and improve the performance of cooperation and SU selection, considering energy efficiency and security issues.

  • Objectives:

We try to answer the following questions: when to cooperate with whom to cooperate and how to cooperate ? when to cooperate, with whom to cooperate and how to cooperate ?

5

slide-6
SLIDE 6

System model I y

  • Primary network:

– PU communicates with the base station (BS) in TDMA mode. – The time slot duration for each PU’s transmission is T.

  • Secondary network:

– Ad hoc network Ad hoc network

  • Cooperation

– Three-phase cooperation and Amplify-and-Forward (AF)

6

(a) Primary transmission (b) Cooperative transmission (c) Secondary transmission

slide-7
SLIDE 7

System model II y

  • Assumptions:

Ch l d l d i d d l G i d – Channels are modeled as independent complex Gaussian random variables, constant within each slot, but generally varying over the slots. – A common control channel is assumed for exchanging information g g among PU, SU and BS. – There exist a trusted center keeping the trust values.

  • Security threats:

When a malicious SU is selected to cooperate with the PU it may – When a malicious SU is selected to cooperate with the PU, it may misbehave, e.g., it may drop PU’s data ,etc. – A dishonest SU may not obey the cooperation rule during the cooperative transmission to pursue more self-benefits. – Moreover, considering the mobility of SUs, the malicious or dishonest SUs may misbehave at one place then move to other places SUs may misbehave at one place then move to other places.

7

slide-8
SLIDE 8

System model III y

  • Notations

the channel gain between the PU and the BS; the channel gain between the PU and SUi; h h l i b SUi d h BS

pb

h

i ps

h

the channel gain between SUi and the BS; the channel gain between SUi and its corresponding receiver. transmit power of PU without cooperation

i sb

h

i s

h P

transmit power of PU without cooperation. transmit power of PU with cooperation. transmit power of SU in cooperative and secondary transmission 1

i s

P

c

P

d

P

the one-sided power spectral density of the independent additive white Gaussian noise at the both base station and secondary receivers.

N

1 This rule is enforced in order to ensure that the secondary users spend for cooperation at least the same power that they are willing to spend for their own transmission.

8

slide-9
SLIDE 9

Trust values

  • Bayesian framework to evaluate the SU’s behaviours

– Each SU will behave well with probability p, and misbehave with probability (1-p) – Posteriori probability estimate of the above binary events can be represented as beta distributions.

p ˆ

  • Trust computation model based on beta function

– let be the observed number of good behaviours.

v

– let be the observed number of misbehaviours.

) 1 ( ) 1 (

) ˆ 1 ( ˆ ) 1 ( ) 1 ( ) 2 ( ) , | ˆ (

 

          

l k

p p v v l k p f  

) 1 ( ) 1 (      v 

i

Tr

  • The trust value of SUi:

2 1 ) ˆ (     v p E  

Beta function of event after 7 observations of good behaviors and 1 observation of misbehaviors.

9

slide-10
SLIDE 10

Stackelberg game between PU and SU g g

  • As the PU is a licensed user and has a higher priority on using the spectrum

b d it h th i ht t d id th t ( i d P ) t band, it has the right to decide the parameters ( i, and Pc) so as to maximize its own utility in terms of energy efficiency.

  • The SU decides its transmission power, under the given (i , and Pc ) to

maximize the transmission rate without spending too much energy.

  • Stackelberg game :

Leader: PU i and Pc

Leader: PU i , and Pc Follower: SU transmission power

10

slide-11
SLIDE 11

Utility function of PU y

  • Primary user:

y

Without cooperation, the primary user’s direct transmission rate

) 1 ( log

2

h P W R

pb d

 

Through cooperation with SUi the achievable cooperative rate [5]

) 1 ( log

2

N W Rd   (1)

Through cooperation with SUi, the achievable cooperative rate

)] , ( 1 [ log 2

2 2 2 2 i sb i s i ps i c pb i c i i c

h P h P f N h P W a R    (2)

2 2 2 2 2 2

1 ) , ( N h P h P h P h P N h P h P f

i sb i s i ps i c i sb i s i ps i c i sb i s i ps i c

    

(2)

In order to maintain PU’s transmission rate:

d c

R R 

11

[5] J. Laneman, D. Tse, and G. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” Information Theory, IEEE Transactions on, 2004

slide-12
SLIDE 12

Utility function of PU y

  • Non-cooperative:

The PU uses to transmit for a period of . Energy consumption is

d

P

T

T P

d

  • Cooperative:

The PU cooperates with SUi , it uses to transmit for a period of . Th i i

i c

P

T a

i

2 T ai

The energy consumption is

  • The energy saving for the PU is the ratio between the amount of energy

reduction and the total power dissipation without cooperation:

2 T a P

i i c 

p p p

2 1 2 1 2

i i d i c i d i i c d i

a P P a T P T a P T P        

d i i c

P P  

  • denotes the ratio between and (power allocation coefficient )

, PU chooses cooperation with SUi PU doesn’t choose cooperation with SUi

i

i c

P

d

P

1 

i

 1  

, PU doesn t choose cooperation with SUi

  • Taking the trust value into consideration,

1 

i

) 1 (

i i i

a Tr U     Expected energy saving ) 2 1 (

i p

Tr U  

12

Expected energy saving

slide-13
SLIDE 13

Utility function of SU Utility function of SU

  • As a follower, SUi selects the transmission power to pursue a high utility,

being aware of the parameters of primary user .

) , (

i i

a 

  • The achievable rate for secondary transmission between and its

corresponding receiver is given by

i s

R

i

SU

) 1 ( log ) 1 ( ) , (

2 2

N h P W a a R

i s i s i i i i s

   

  • Moreover, the total cost is , where c is the cost of per unit

transmission energy .

T a P c

i i s

) 2 1 (  

2

T a P c N h P W a a U

i i s i s i s i i i i s

) 2 1 ( ) 1 ( log ) 1 ( ) , (

2 2

       

13

slide-14
SLIDE 14

The optimal strategy of PU

  • The PU decides whom it selects to cooperate with (the parameter i)

and how it cooperates with this SUi (time allocation coefficient and power allocation coefficient ) to maximize its utility.

i

a

i

  • The PU aims at solving the following optimization problem

a  ) 2 1 ( max

, , i i i i p a i

a Tr U

i i

  

) 1 ( log )] ( 1 [ log

2 2 2 2

h P W h P h P f h P W a

pb d i i i i pb i c i

   

t s

) 1 ( log )] , ( 1 [ log 2

2 2

N W h P h P f N

sb s ps c

   

. .t s

p i i i

S SU a      , 1 , 1 

i p a i i i

U b a i

i i 

, , * * *

max arg , , 

14

slide-15
SLIDE 15

The optimal strategy of SU p gy

Given , selects the transmission power to maximize its own utility,

i i

a  ,

i

SU

, p y, which can be formulated as the following optimization problem

i i

a  ,

i

SU

T a P c N h P W a a U

i i s i s i s i i i i s Pi

s

) 2 1 ( ) 1 ( log ) 1 ( ) , ( max

2 2

       

i max

P Pi

s 

 } , ) 1 ( min{

max 2

P N W a P

i i s

  

. .t s

} , 2 ln ) 2 1 ( {

max 2

h a c

i s i s

15

slide-16
SLIDE 16

Numerical results Numerical results

  • Simulation setting:

– Normalizing the distance between PU and BS, the SU is approximately placed at the distance from the PU and 1-d from the BS

) 1 (  d

placed at the distance from the PU and 1-d from the BS. – The channel gains can be calculated based on a simple path loss model.

) 1 , (  d

We choose the path loss coefficient to be 2.

16

slide-17
SLIDE 17

Numerical results

  • Fig 1 : (1) There is a cooperation range in which PU can transmit in

a smaller power than Pd through cooperation . (2) and turn to be optimal when reaches its maximum value.

  • Fig 2: (1) The optimal value

tend to increase with the distance d

a

* * 

a 

  • Fig 2: (1) The optimal value tend to increase with the distance d.

(2) A better channel gain between the SU and its corresponding receiver comes with a better energy saving of the PU and a wider

, a

gy g cooperation range

17 Fig 1 Fig 2

slide-18
SLIDE 18

Conclusion and future work

  • We have proposed a novel cooperative framework in CRN, considering

p p p , g energy efficiency of the PU and trustworthiness of SUs. f l h d f d i i ki S k lb

  • We formulate the procedure of decision making as a Stackelberg game.
  • The analysis of the game provides the PU with the best strategy for partner

The analysis of the game provides the PU with the best strategy for partner selection, spectrum access time allocation and transmission power determination.

  • Numerical results have demonstrated that with the proposed framework, the

PU can obtain high energy saving through the cooperation by selecting the g gy g g p y g most suitable SU.

18

slide-19
SLIDE 19

Conclusion and future work

  • Misbehavior detection

Misbehavior detection in a fading environment.

  • Different cooperative protocols

Decode-and-Forward cooperative mode Distributed beamformming or Space-Time coding

  • Signaling procedure

We have not considered the whole signaling procedure including signaling We have not considered the whole signaling procedure, including signaling exchange for the SU selection and evaluation.

  • Cooperation for physical layer security

19

slide-20
SLIDE 20

Thanks !!!

20