Next Article in Journal
A Comprehensive Analysis of the Validity and Reliability of the Perception Neuron Studio for Upper-Body Motion Capture
Next Article in Special Issue
Towards Developing a Robust Intrusion Detection Model Using Hadoop–Spark and Data Augmentation for IoT Networks
Previous Article in Journal
Multi-Fault Detection and Classification of Wind Turbines Using Stacking Classifier
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Usage Aware Dynamic Spectrum Access Scheme for Interweave Cognitive Radio Network by Exploiting Deep Reinforcement Learning

1
Graduate School of Science and Engineering, Ibaraki University, Mito 310-8512, Japan
2
IVIS Cooperation, Tokyo 113-0033, Japan
3
Faculty of Science and Technology, Nanzan University, Nagoya 466-0824, Japan
4
School of Computer Science, University of Science and Technology of China, Hefei 230052, China
5
Information Systems Architecture Research Division, National Institute of Informatics, Tokyo 101-8430, Japan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(18), 6949; https://doi.org/10.3390/s22186949
Submission received: 3 August 2022 / Revised: 31 August 2022 / Accepted: 8 September 2022 / Published: 14 September 2022
(This article belongs to the Special Issue Communication, Security, and Privacy in IoT)

Abstract

:
Future-generation wireless networks should accommodate surging growth in mobile data traffic and support an increasingly high density of wireless devices. Consequently, as the demand for spectrum continues to skyrocket, a severe shortage of spectrum resources for wireless networks will reach unprecedented levels of challenge in the near future. To deal with the emerging spectrum-shortage problem, dynamic spectrum access techniques have attracted a great deal of attention in both academia and industry. By exploiting the cognitive radio techniques, secondary users (SUs) are capable of accessing the underutilized spectrum holes of the primary users (PUs) to increase the whole system’s spectral efficiency with minimum interference violations. In this paper, we mathematically formulate the spectrum access problem for interweave cognitive radio networks, and propose a usage-aware deep reinforcement learning based scheme to solve it, which exploits the historical channel usage data to learn the time correlation and channel correlation of the PU channels. We evaluated the performance of the proposed approach by extensive simulations in both uncorrelated and correlated PU channel usage cases. The evaluation results validate the superiority of the proposed scheme in terms of channel access success probability and SU-PU interference probability, by comparing it with ideal results and existing methods.

1. Introduction

In the past decade, mobile data traffic has grown tremendously due to the increase of wireless communication terminals and spectrum-hungry applications. The monthly global data traffic reached 77 exabytes in 2022, i.e., a seven-fold increase over 2017, which is predicted to reach 131 exabytes per month by 2024. This blossoming traffic demand is driving the need for either improved spectrum efficiency in traditional sub-6 GHz frequency band or the utilization of additional spectrum in millimeter wave (mmWave) frequency bands. The wireless communication in mmWave band has a huge potential, however, its high blockage and scattering losses characteristics limit the mmWave band use cases. On the other hand, the spectrum resource below 6 GHz is comparatively easy to use for mobile communication systems. However, the frequency bands below 6 GHz are already almost fully allocated to various existing wireless systems in a static and exclusive way, e.g., TV broadcasting, video camera services, radar systems, fixed satellite systems, etc. In the current spectrum allocation paradigm, some primary systems have extremely low spectral utilization efficiency, since they have a large amount of unutilized or underutilized spectrum resources in both time and space domains [1]. To this end, dynamic spectrum access (DSA) which is empowered by interweave cognitive radio techniques, has been widely investigated [2,3,4,5], in which the secondary users (SUs) are allowed to access the abundant spectrum holes i.e., whitespaces, in the licensed spectrum bands that belong to the primary users (PUs).
Two kinds of DSA approaches have been extensively studied recently, i.e., database driven spectrum access approaches and opportunistic spectrum access approaches. In the database driven spectrum access approaches [6,7,8,9,10], the SU queries a spectrum database about the spectrum availability information before the channel access. The spectrum database could be either constructed by propagation models [6] or crowdsourced spectrum-sensing measurements [7,8,9,10]. The main concern in this kind of approach is the database’s accuracy and high maintaining/updating cost. In opportunistic spectrum access approaches [11,12,13,14,15,16,17,18], the SU senses or predicts the spectrum holes of PUs, and accesses them dynamically. Ideally, the PUs are oblivious of the presence of SUs, if the SUs do not cause any interference. This approach is cost-efficient but may suffer from severe interference if the sensing or predicting results are not accurate. The key issue for opportunistic spectrum access is to predict the PUs’ channel usage status, and thus let SU access a channel that most likely to be idle to minimize the interference ratio and maximize the system’s total spectral utilization ratio. To this end, neural network model based primary user activity prediction methods were proposed in [13,14,15], with the objective of reducing both the spectrum underutilization and interference violations. In [16], by assuming that the PUs’ channel occupancy pattern obeys an exponential ON-OFF time distribution, a predictive channel selection algorithm was proposed and implemented in a wireless test-bed. Without the assumption of channel usage patterns, model-free spectrum access methods have been extensively investigated by utilizing the learning algorithms, and the details of them will be introduced in Section 2. In our previous work [19], we investigated the dynamic channel access problem in a specific uncorrelated three-PUs scenario, and provided some preliminary results to validate the practicability of the proposed deep reinforcement learning based method. However, the method proposed in [19] is dedicated to a very specific case without formal formulation, and is hard to be extended to general channel access problem.
Based on the idea and preliminary results in [19], in this work, we consider a general dynamic channel access problem in a multiple-PU single-SU interweave cognitive radio network, by taking consideration both correlated and uncorrelated PU channel usage patterns. We mathematically formulate this problem to an optimization problem with the goal of maximizing the spectrum access success ratio and minimizing the interference violation ratio. We propose a novel usage-aware spectrum access scheme by exploiting deep reinforcement learning technique [20], in which the SU acts as an agent who could learn the optimal channel access policy by interacting with the wireless environment in a trial-and-error manner. Specifically, the proposed scheme exploits a deeper historical channel usage data of PUs by a compressed status representation method, and uses a usage-status-aware reward function to solve the reward sparsity problem. Moreover, to reduce the interference probability when the whitespace of PU is very limited, an additional no access option is provided to further reduce the interference ratio. We perform extensive simulations to evaluate the performance of the proposed scheme by using a new evaluation metric which is defined as the difference between the channel access success probability and the SU-PU interference probability. The evaluation results demonstrate that our proposed scheme constantly keeps a small gap between the ideal results and outperforms the existing methods significantly under different PU channel usage patterns.
The rest of the paper is organized as follows. Section 2 introduces the related works. Section 3 describes the system model and preliminaries of reinforcement learning and deep reinforcement learning techniques. Section 4 presents the proposed scheme in detail. Finally Section 5 provides the evaluation results, and Section 6 draws the conclusions.

2. Related Work

The underutilization of sub-6GHz frequency bands caused by current spectrum allocation policy has stimulated a flurry of research activities in opportunistic spectrum access. Besides the conventional dynamic programming [21] and game theory [22] based channel access approaches, model-free learning-based approaches are widely addressed. These researches intend to keep track of PUs’ channel usage status, and let SU either sense the most likely idle channel to avoid interference or access the most likely channel in a best-effort way with acceptable interference ratio. Specifically, reinforcement learning based opportunistic spectrum access methods have been employed recently, which formulates the channel access problem as a Markov Decision Process (MDP). An optimal policy is derived to maximize the number of time slots with successfully secondarily used while constraining the interference caused to the PUs. In [23], the channel access problem was formulated as a multi-arm restless bandit process by assuming the system transition is known a priori, and a myopic spectrum access policy was proposed, which designs a sensing policy for channel selection to maximize the average reward. In [24], a restless Multi-armed bandit (MAB) based approach [24] was investigated for homogeneous channel scenarios without the requirements of system transition statistics. In [25], the spectrum sensing order problem in the scenario with idle spectrum across multiple network service providers was investigated, in which a discounted Thompson sampling method was proposed to address the formulated optimization task. In [26,27,28,29], with the assumption that the observable full system states, reinforcement learning based dynamic spectrum access approaches were proposed. In [30], a deep reinforcement learning-based dynamic multi-channel access method was firstly proposed, which takes into consideration the partial observability. In [31], a deep actor-critic reinforcement learning method was proposed for spectrum sensing problem for both single user case and multiple users case. Furthermore, a deep reinforcement learning based distributed dynamic spectrum access scheme for multiple SUs was investigated in [32], which uses a local observation indicating whether its packet was successfully delivered or not as a reward. However, this work assumed that the channel utilizations for PUs are invariant. A deep recurrent Q-network-based dynamic spectrum access method for a scenario with multiple independent channels and multiple heterogeneous PUs was proposed in [33]. Aside from the aforementioned methods that focused on fixed time slot channel sensing, spectrum sensing with adaptive time slot structure have also been studied. In [34], the authors deduced the structure of optimal sensing interval policy for channels with hyper-exponential distribution OFF times through Markov decision process, and used dynamic programming framework to derive sub-optimal sensing interval policies. In [35], the authors addressed the problems of which channel to sense and how often to sense. Specifically, a reinforcement learning based channel selection method and a Bayesian skip sensing duration method were proposed. In [36], the authors considered the tradeoff between sensing and transmission, and proposed a deep reinforcement learning based spectrum sensing strategy with the goal of maximizing the expected achievable throughput of SU. In [37], a reservoir computing-based distributed spectrum access approach was proposed, which takes into consideration the spectrum sensing errors.

3. System Model and Preliminaries

3.1. System Model

In this paper, we consider a conventional dynamic channel access model for the interweave cognitive radio network, where N PUs use N respective channels and a single SU tries to opportunistically access the whitespace of PUs for secondary use in a slot-by-slot manner. The PU channel usages could be either correlated or uncorrelated. In each time slot, the usage status of PU is represented by “−1” when it is busy and “1” when it is idle. The PU usage patterns can be characterized by two metrics, duty cycle (DC) and complexity [38]. DC indicates the activity level of PU, which is defined as the time ratio of its presence. Therefore, a high DC means less whitespace is available for secondary use. Complexity is an index showing the degree of irregularity in the channel usage by measuring the rate of production of new patterns. The complexity could be measured by the entropy rate given by Equation (1), which is defined as the expected value of the amount of information that increases when one random variable is added to the random variable sequence.
h = i j δ i p i j log p i j .
In the context of this paper, p i j denotes the channel status transition rate, which includes p 00 , p 01 , p 10 , p 11 . δ 1 represents the DC of PU’s channel usage, and δ 0 = 1 δ 1 . The usage pattern of PU with large entropy rate indicates that it has high complexity and thus is hard to predict.
The SU tries to predict all N channels usage status on the next time slot, and either access a channel that is most likely to be idle or retrain from channel accessing. If the channel that SU accessed is idle, the spectrum access succeeds and there has no interference between SU and PU. Otherwise, the spectrum access fails and SU-PU interference occurs. In this case, the SU must refrain from the channel accessing. Obviously, accurate channel usage prediction for the next time slot is the key to maximize the spectral utilization ratio and minimize the interference probability.

3.2. Preliminaries

3.2.1. Reinforcement Learning

Q-Learning [39] is a representative reinforcement learning algorithm that learns the optimal policy in an interactive environment by trial and error. By assuming discrete time, in time slot k, the agent observes the state s k of the environment, and takes an action a k based on a policy π . Upon the action being taken, the state moves from s k to s k + 1 , and the agent obtains a reward/cost r k that indicates the benefit/loss by taking a k at s k . The optimal action policy π * is computed by maximizing/minimizing the expectation of the future cumulative discounted reward/cost. In Q-learning, a Q-function is defined to represent the expected future cumulative discounted reward for action a k under state s k . The values of the Q-function, i.e., Q-value, are stored in a Q-table, whose size is the number of states times the number of actions. The Q-value in time slot k is updated by Equation (2).
Q ( s k , a k ) = Q ( s k , a k ) + α r k + γ min a k + 1 Q ( s k + 1 , a k + 1 ) Q ( s k , a k ) ,
where Q ( s k , a k ) is the Q-value after update, Q ( s k , a k ) is the current Q-value, α is the learning rate which is in range 0 α 1 , r k is the cost, γ is the discount factor which is in range 0 γ 1 , and min a k + 1 Q ( s k + 1 , a k + 1 ) represents the minimum Q-value for the actions that the agent can select at next time slot k + 1 under the new state s k + 1 . Notice that in Equation (2), minimum Q-value is used, since r k is a cost instead of a reward, i.e., smaller Q-value is more desirable.

3.2.2. Deep Reinforcement Learning

When the spaces of state s k and action a k increase, the Q-table based classic Q-learning method may fail due to the so-called the curse of dimensionality problem, i.e., many state-action pairs are rarely visited and the storage of the table becomes impractical. To solve this problem, Deep Q-Network (DQN) [20] has been proposed, which approximates the Q-table by a neural network. By introducing a weight θ k of the DQN, the task of finding the best Q-function is transformed to search the best weight θ k . Therefore, the update of the Q-value is represented by Equation (3).
Q ( s k , a k , θ k ) = Q ( s k , a k , θ k ) + α ( 1 γ ) r k + γ min a k + 1 Q ( s k + 1 , a k + 1 , θ k ˜ ) Q ( s k , a k , θ k + 1 ) .
A replay memory is used to store the latest U state-action-cost tuples, such as φ = { m ( k U + 1 ) , , m k } , where m k = { s k , a k , r k , s ( k + 1 ) } . A mini-batch φ ˜ φ is sampled from the replay memory instead of the most recent experience to calculate the loss function, which is defined as the difference between a target Q value and the current Q value. The weight θ k of the neural network is updated by the gradient descent method. To make the training more stable, a target Q-network is used to back-propagate through and train the main Q-network. The loss function and the gradient are given by Equations (4) and (5), respectively. By utilizing DQN, the agent could learn the optimal Q-value for a state-action pair in a semi-online fashion.
L ( θ k + 1 ) = E { s k , a k , r k , s k + 1 } φ ˜ [ ( ( 1 γ ) r k + γ Q ( s k + 1 , arg min a k + 1 Q ( s k + 1 , a k + 1 , θ k ˜ ) , θ k ) Q ( s k , q k , θ k + 1 ) ) 2 ] ,
θ k + 1 L ( θ k + 1 ) = E { s k , a k , r k , s k + 1 } φ ˜ [ ( ( 1 γ ) r k + γ Q ( s k + 1 , arg min a k + 1 Q ( s k + 1 , a k + 1 , θ k ˜ ) , θ k ) Q ( s k , a k , θ k + 1 ) ) θ k + 1 Q ( s k , a k , θ k + 1 ) ] .

4. Proposed Deep Reinforcement Learning Based Usage Aware Spectrum Access Scheme

In this section, we firstly mathematically formulate the dynamic spectrum access problem in a interweave cognitive radio network with multiple-PU and single-SU. Then, we propose a deep reinforcement learning based usage aware spectrum access scheme to let the SU predict the channel usage at next time slot and access the most likely idle channel. The goal of the proposal is to maximize the system spectral utilization efficiency and minimize the SU-PU interference violations.

4.1. Problem Formulation

In this paper, we consider a typical spectrum access model with K PUs and single SU. The time is discretized into time slots, and the idle or busy status of PU does not change during one time slot. The status of total K PUs’ channels at time slot t is denoted by s t = [ s 1 t , s 2 t , , s K t ] , where s k t = 1 if the k-th PU’s channel is idle at time slot t, and s k t = 1 if it is busy. At time slot t, SU determines whether accessing the channel or not and which channel to access if so. A channel access indicator at time slot t is represented by a t = [ a 1 t , a 2 t , , a K t ] , where a k t = 1 if SU accesses the k-th channel at next time slot and a k t = 0 otherwise. Notice that k = 1 K a k t 1 , which indicates that SU can at most access one channel at a time. Accessing an idle channel leads to a success spectrum reuse, and accessing a busy channel results in interference and thus the SU must refrain from accessing.
The SU aims at finding a series of optimal channel access policy in total time slots T, so as to maximize the number of time slots that have been successfully accessed and minimize the number of time slots in which the interference occurred. The problem could be formulated as follows.
max a 1 , a 2 , , a T t = 1 T ( s t ) T a t , s . t . k = 1 K a k t 1 , a k t { 0 , 1 }
where the constraint indicates that the SU could at most access one channel for each time slot t. For each time slot t, the value of the objective function in Equation (6) has three possible cases, i.e., 1 when SU accesses an idle channel, 0 when SU refrains from channel access, and 1 when SU accesses a busy channel.

4.2. Existing Q-Learning and DQN Based Spectrum Access Methods

Before presenting the proposed scheme, we briefly introduce the basic idea of the existing Q-learning and DQN based spectrum access methods. The Q-Learning based spectrum access method uses the channel usage status at current time slot t of different PUs as the states for learning. An illustrative example with 3 PUs is shown in Figure 1a. If at time slot t, the status of channels # 1 , # 2 , # 3 are busy, busy and idle, respectively, the states will be recorded by vector [ 1 , 1 , 1 ] . The action will be the index of the channel that SU intends to access at next time slot t + 1 . For instance, a t = [ 0 , 0 , 1 ] indicates that SU will access channel # 3 at next time slot. If the channel that SU intends to access at time slot t + 1 is idle, the spectrum secondary use succeeds and the system’s total spectral utilization ratio improves. Otherwise, if the channel that SU accesses at time slot t + 1 is busy, the channel access fails since the interference occurs. The cost value is defined as 0 if the channel access succeeds, or 1 otherwise.
In the DQN based spectrum access method, the historical channel usage status is used as the states for learning. The original Q-table based learning method cannot exploit the historical data, since it leads to a tremendous increase of the state-action space. For instance, in the same scenario that the number of PUs is 3, if the past channel usage status back to time slot t 4 is applied, the number of states will increase rapidly from 2 × 2 × 2 = 8 to ( 2 × 2 × 2 ) 5 = 32,768 . Hopefully, the DQN algorithm approximates the Q-table by neural network, and thus is capable of dealing with complicated scenario with huge state-action space.
We briefly explain the DQN based spectrum access method by using the same PU = 3 example. Instead of only using the current time slot t’s status, the historical channel usage status back to time slot t 4 is applied. For the example channel usage history that given in Figure 1b, the state matrix can be represented as [ 1 , 1 , 1 ; 1 , 1 , 1 ; 1 , 1 , 1 ; 1 , 1 , 1 ; 1 , 1 , 1 ] . Here, the first row records 1 , 1 , 1 represent the usage status for channels # 1 , # 2 , # 3 at time slot t 4 , the second row records 1 , 1 , 1 represent the usage status for channels # 1 , # 2 , # 3 at time slot t 3 , and so on. Action set and cost value are similarly defined as that in the Q-learning based spectrum access method described above. Specifically, the action set has three possible actions since there are three channels and, the cost value is set to 0 when the channel access succeeds, and the cost is set to 1 when the channel access fails.

4.3. Proposed Usage Aware Spectrum Access Scheme

In this subsection, we present a novel deep reinforcement learning based usage aware spectrum access scheme. To improve the training performance, a double Q-network architecture is applied, in which one is used to determine the action and another is used to evaluate the action. Furthermore, a replay memory is utilized, and the agent randomly gathers a mini-batch from the replay memory, and uses it to update the neural network to approximate the Q-value function. The proposed scheme improves the previous existing methods in three aspects: compressed states representation, additional action and status aware cost functions.

4.3.1. Compressed States Representation

In the existing Q-learning and DQN based spectrum access methods, the state vector and matrix directly record the current and historical PU channel usage status. Specifically, 1 or 1 represents a specific channel for a specific time slot is idle or busy, respectively. In this paper, in order to exploit a deeper historical PU usage status with a same state matrix size, we propose a compressed state representation method, in which the number of continuous channel status and the current channel status are recorded. To facilitate better understanding, Figure 2 shows an example of how the proposed compressed states represents the current and historical channel usages in a three-PU-channels scenario. The compressed state is a matrix, in which each column records the channel usage information of a specific channel. The last row, i.e., “101” in the example, represents the latest channel usage status for three channels, i.e., s 1 t , s 2 t , s 3 t . Notice that “−1” which denotes busy is changed to “0” in the state matrix to let all the elements in the state matrix non-negative, and the remaining rows record the number of consecutive “−1” (busy) and “1” (idle) alternately for different channels. For instance, the usage status for channel # 1 at time slots t 3 , t 2 , t 1 , t , i.e., s 1 t 3 , s 1 t 2 , s 1 t 1 , s 1 t , are recorded as 4 in the compressed state matrix. The total size of the compressed states matrix is fixed, therefore, once the channel status is switched twice, the oldest information on the first and second rows is deleted, and the records following behind will be shifted forward. By using the proposed compressed states representation, more information regarding the historical channel usages could be recorded by the same size of state matrix.

4.3.2. Additional Action

In the existing methods, the SU must take an action to choose and access a channel at the next time slot. However, in the scenario that the DCs of all the PU channel usages are high, the available whitespace is limited and thus interference between SU and PU is extremely hard to avoid. To this end, we add an additional “no access” action to the action set. Specifically, a k t = 0 indicates that the SU refrains from accessing channel k at the next time slot, therefore | a t | = 0 denotes that the SU does not access any channel at next time slot.

4.3.3. Status Aware Cost Function

In the existing Q-learning and DQN based spectrum access methods, the cost is set to either “0” or “1” depending on the channel access is successful or not. This cost setting has two problems. The first one is that the sparse cost value setting has a negative impact on the learning process and may result in an unstable learning result. The second one is that the cost setting has not taken into consideration the no access case. To this end, in the proposed scheme, the cost functions are delicately designed, which has several discrete values based on the PU channel usage status and SU’s actions. The cost value is assigned based on the state-action pair’s “inappropriate level”. The basic idea is that, the most appropriate one is assigned to a cost value equals to 0, and the most inappropriate one is assigned to a cost value equals to 1. Specifically, the cost value calculation for all the possible state-action pairs is defined in Equation (7), which is related to the PU channel usage status and SU’s corresponding actions. For instance, choosing no access action when all the channels are idle is more inappropriate compared with that when only one channel is idle.
C t = N δ N , | a t | = 0 N δ 2 ( N 1 ) + 0.5 , a k t = 1 & s k t = 1 0 , a k t = 1 & s k t = 1
Here, N δ and N denote the numbers of idle channels and total channels, respectively. N δ could be easily derived by measuring the total received power. Notice that N δ is required only when the SU does not access the channel or it has to refrain from accessing due to interference occurring. Specifically, if SU chooses the no access action, the cost value will increase in proportion to the number of idle channels. If SU chooses to access the channel k, and unfortunately interference occurs, the cost will proportionally increase with the number of idle channels in the range 0.5 , 1 . Finally, if SU chooses to access the channel k, and channel k is idle, then the cost will be 0. A flowchart to illustrate the proposed status aware cost function design is given by Figure 3.

5. Simulation Results

5.1. Simulation Settings

In the simulation, we considered a typical interweave cognitive radio network with multiple PUs and single SU. Regarding the PU channels, both the traditional correlated channels and extremely challenging uncorrelated channels are considered. Various DCs and complexities for the PU channel usages are adopted. The DC varies in range [ 0.1 , 0.9 ] . For each DC, nine patterns of data with different complexities are used, and the complexity is measured by entropy rate that given by Equation (1). The entropy rates for each DC are shown in Table 1. From pattern η 1 to pattern η 9 , the complexities gradually increase. An example of the PU channel usages for DC = 0.5 with pattern η 1 and pattern η 9 are illustrated in Figure 4. It is obvious that the channel usage pattern η 1 with low complexity is much easier to predict compared with pattern η 9 .
To validate the performance of the proposed scheme, we compare it with the ideal results, random channel access method, Q-learning based method [26], and DQN based method [30]. The ideal result is obtained by assuming that the SU has the perfect knowledge of all PUs’ channel usage status at all future time slots, which provides an upperbound for the performance evaluation. The random channel access method is a baseline method, in which the SU randomly picks a channel and accesses it at the next time slot. The Q-learning and DQN learning based methods are introduced in Section 4.2. The proposed scheme’s major parameters are summarized in Table 2. We use Matlab [40] to generate the channel usage time series with different DCs and complexities, and Python [41] to derive the ideal result and realize the proposed scheme, the DQN-based method, the Q-learning based method and the random channel access method.
In this paper, we aim at maximizing the SU’s channel access success probability and minimizing the SU-PU interference probability simultaneously. Therefore, we define a new evaluation metric, i.e., P s P i , which is the channel access success probability P s , minus the SU-PU interference probability P i . The range of the evaluation metric P s P i will be from −1 to 1. In real applications, PU will inform the interfering SU to refrain from transmitting once the interference is occurred.

5.2. Evaluation Results for Correlated Channel Usages

First, we validate the proposed method in correlated channel usages cases. In this setting, 10 PU channels are evenly divided into two groups, i.e., G 1 with five channels and G 2 with five channels. In each group, the channels’ idle and busy states changes with the same pattern. To keep the total DC as 0.5, we consider three kinds of combination for G 1 and G 2 , specifically DC( G 1 ) = 0.1 and DC( G 2 ) = 0.9; DC( G 1 ) = 0.3 and DC( G 2 ) = 0.7; DC( G 1 ) = 0.5 and DC( G 2 ) = 0.5.
First, Figure 5a illustrates the results of P s P i for different DC combinations. It is obvious that the ideal results are always 1, since the channel access success probability is 100 % and the SU-PU interference probability is 0 % . The random channel access method could only achieve P s P i = 0 , since its channel access success probability and SU-PU interference probability are both 50 % . For the proposed method, it could achieve almost the same performance as the ideal results for all three duty cycle combinations, which indicates that both the time correlation and channel correlation of the PU channels are well learned. On the other hand, the performance of two existing methods, i.e., the Q-learning based method and the DQN-based method, varies from 0.31 to 0.82 at different duty cycle combinations, and the DQN-based methods performs slightly better than Q-learning based method.
Next, Figure 5b–d shows the results of P s P i at different DC combinations with varying complexities. Firstly as expected, the performance of the ideal results and random channel access method keeps constant regardless of the complexities. Moreover, it is clear that the performance of the proposed method also does not change with PU channel usage complexities, which achieves almost similar results with ideal results at all complexities. However, it is obvious that the two existing methods’ performance degrades as the PU channel usage complexity increases, especially for the DC( G 1 ) = 0.5 and DC( G 2 ) = 0.5 case, and the DQN-based method achieves more stable performance compared with Q-leaning based method. We can observe that the Q-learning based method fails to predict the channel state completely at some scenarios, e.g., η 3 , η 5 , η 7 and η 8 when DC( G 1 ) = 0.5 and DC( G 2 ) = 0.5.

5.3. Evaluation Results for Uncorrelated Channel Usages

Next, we compare the performance of different methods in an uncorrelated channel usage scenario. First, we show the performance in terms of P s P i in a 3 PU channel scenario in Figure 6. Figure 6a shows the results of P s P i varying with DC from 0.1 to 0.9 . As expected, when the DC of the PUs increases, it becomes more difficult for the SU to access the channel successfully without interference violation for all the channel access methods. Even for the ideal results, the P s P i decreases from 1 to 0.26 when the DC increases from 0.1 to 0.9. For the random channel access method, the performance linearly degrades from 0.8 to −0.8 when the DC increases from 0.1 to 0.9. Regarding the two existing methods, they could only achieve limited improvements compared with random channel access scheme, and the DQN-based scheme performs constantly better than the Q-learning method, since historical channel usage status is utilized. Besides the ideal results, it is obvious that the proposed scheme performs the best, which keeps a small performance gap to the ideal results. The gap becomes larger when the DC increases, since the whitespace is extremely limited for the cases that DC is 0.7 and 0.9. However, the proposed scheme still significantly outperforms the two existing methods at all DC values. When the DC is low, i.e., 0.1 and 0.3, we consider that the improvements mainly come from two aspects. One is the proposed compressed states representation scheme which results in learning with deeper historical channel usage status. Another is the proposed usage aware cost function design which reduces the cost value’s sparsity. When the DC is high, i.e., 0.5, 0.7 and 0.9, we can confirm that the proposed scheme has a further performance improvements compared to the existing methods. Aside from the two previously mentioned aspects, we consider the reason is that the additional “no access” action provides SU a new option to avoid interference by refraining from channel access.
Figure 6b–f show the results of P s P i at different DC by varying the complexities of the PU channel usage patterns. As expected, the ideal results and the performance of random channel access method keep constant regardless of the complexities. On the other hand, the performance of the two existing methods degrades as the PU’s channel usage complexity increases. This performance variation becomes large when the DC increases. For the high DC and high complexity cases, i.e., η 7 η 9 when D C = 0.7 and η 5 η 9 when D C = 0.9 , their performance degrades to the same level as the random channel access method, which indicates that the learning has failed and the prediction results are not helpful. It is confirmed that the proposed scheme keeps a constant gap to the ideal results at all DCs for all the patterns with different complexities. The performance of the proposed scheme is not affected by the complexities. It performs well even in very challenging scenarios with high DC and high complexity.
Finally, we present the performance evaluation results for a very challenging 10 uncorrelated PU channel scenario in Figure 7. Figure 7a shows the results of P s P i with varying DC from 0.1 to 0.9. Compared with the results for three PU channels scenario that is illustrated in Figure 6a, the performance of the proposed scheme degrades considerably, since the environment becomes extremely complicated and thus the state-action space increases exponentially. Specifically, the proposed scheme’s P s P i can only achieve approximately 0 when the DC is 0.7 or 0.9, which means that it is hard for the SU to predict the whitespace and it prefers no access action to avoid interference. The performance of the Q-learning based method is almost the same as the random access method, which means it cannot deal with such complicated scenario. Figure 7b–f show the results of P s P i at different DC by varying the complexities of the PU channel usage patterns. When the DC of PUs is 0.1 , all the methods show the similar performance regardless of the complexities. For the cases that DCs of PU are 0.3 and 0.5 , the proposed scheme can achieve comparatively satisfied performance compared with other schemes in all patters. The DQN-based method performs well in low complexity patterns, however, its performance degrades a lot when the complexity increases. Finally, when the DCs of PU are 0.7 and 0.9 , accessing the channel without interference becomes extremely challenging. The learning results of the proposed method suggests the SU chooses no access action to avoid interference. Furthermore the Q-learning based and DQN-based methods have a great number of interference especially when the complexity is high.

6. Conclusions

In this paper, we proposed a novel deep reinforcement learning based usage aware spectrum access scheme for a typical multiple PUs and single SU cognitive radio network. Specifically, the proposed scheme consists of three key techniques which are compressed state representation, additional action option and status aware cost function design. By learning both the time and channel correlations of the PU channels, the proposed scheme is capable of reducing the spectrum underutilization and interference violations. We performed extensive simulations by considering both uncorrelated and correlated channel scenarios, and compared the performance of the proposed scheme with existing schemes and ideal results. The evaluation results showed that when PU = 3, the proposed scheme keeps a constant small performance gap between the ideal results, and significantly outperforms the existing methods especially at high PUs’ DC and complexity cases, e.g., a 3.28 times performance improvement over existing two schemes when DC = 0.9. However, regarding the results when PU = 10, the performance of the proposed scheme degrades significantly. In the worst case, i.e., when DC = 0.7, only a 1.22 times performance improvement over DQN-based method is obtained. For the future research, we plan to improve the performance of the proposed method in complicated scenarios by using deeper neural networks, and extend the proposed approach to combined channel access scenario and evaluate it by using real data traffic traces.

Author Contributions

Conceptualization, X.W., M.U. and Y.J.; methodology, X.W., M.U. and H.Z.; simulation, X.W. and Y.T.; validation, X.W. and Y.T.; formal analysis, H.Z.; investigation, X.W., M.U. and Y.J.; writing–original draft preparation, X.W. and Y.T.; writing–review and editing, X.W. and H.Z.; supervision, M.U.; funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by JSPS (Japan Society for the Promotion of Science) Grant-in-Aid for Scientific Research(C) (20K11764), and ROIS NII Open Collaborative Research 2022-22FA01.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yin, S.; Chen, D.; Zhang, Q.; Liu, M.; Li, S. Mining spectrum usage data: A large-scale spectrum measurement study. IEEE Trans. Mob. Comput. 2012, 11, 1033–1046. [Google Scholar] [CrossRef]
  2. Wang, X.; Ji, Y.; Zhou, H.; Li, J. Auction based frameworks for secure communications in static and dynamic cognitive radio networks. IEee Trans. Veh. Technol. 2017, 66, 2658–2673. [Google Scholar] [CrossRef]
  3. Wang, X.; Umehira, M.; Han, B.; Zhou, H.; Li, P.; Wu, C. An Efficient privacy preserving spectrum sharing framework for internet of things. IEEE Access 2020, 8, 34675–34685. [Google Scholar] [CrossRef]
  4. Bhattarai, S.; Park, J.-M.; Lehr, W. Dynamic exclusion zones for protecting primary users in database-driven spectrum sharing. IEEE/ACM Trans. Netw. 2020, 28, 1506–1519. [Google Scholar] [CrossRef]
  5. Barb, G.; Alexa, F.; Otesteanu, M. Dynamic spectrum sharing for future LTE-NR networks. Sensors 2021, 21, 4215. [Google Scholar] [CrossRef]
  6. Mueck, M.D.; Srikanteswara, S.; Badi, B. Spectrum Sharing: Licensed Shared Access (lsa) and Spectrum Access System (sas). Available online: http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/spectrum-sharing-lsasas-paper.pdf (accessed on 1 October 2021).
  7. Chakraborty, A.; Das, S.R. Measurement-augmented spectrum databases for white space spectrum. In Proceedings of the ACM CoNEXT, Sydney, NSW, Australia, 2–5 December 2014; pp. 67–74. [Google Scholar]
  8. Akimoto, M.; Wang, X.; Umehira, M.; Ji, Y. Crowdsourced Radio environment mapping by exploiting machine learning. In Proceedings of the 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC), Lisbon, Portugal, 24–27 November 2019; pp. 1–6. [Google Scholar] [CrossRef]
  9. Wang, X.; Umehira, M.; Han, B.; Li, P.; Gu, Y.; Wu, C. Online incentive mechanism for crowdsourced radio environment map construction. In Proceedings of the IEEE International Conference on Communications (IEEE ICC 2019), Shanghai, China, 20–24 May 2019. [Google Scholar]
  10. Wang, X.; Umehira, M.; Akimoto, M.; Han, B.; Zhou, H. Green spectrum sharing framework in B5G era by exploiting crowdsensing. IEEE Trans. On Green Commun. Networking 2022. Early Access. [Google Scholar] [CrossRef]
  11. Li, H. Multiagent q-learning for aloha-like spectrum access in cognitive radio systems. J. Wirel. Com. Netw. 2010, 2010, 876216. [Google Scholar] [CrossRef]
  12. Macaluso, I.; Forde, T.K.; DaSilva, L.; Doyle, L. Impact of cognitive radio: Recognition and informed exploitation of grey spectrum opportunities. IEEE Veh. Technol. Mag. 2012, 7, 85–90. [Google Scholar] [CrossRef]
  13. Roy, D.; Mukherjee, T.; Chatterjee, M.; Pasiliao, E. Primary user activity prediction in DSA networks using recurrent structures. In Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Newark, NJ, USA, 11–14 November 2019; pp. 1–10. [Google Scholar] [CrossRef]
  14. Yu, L.; Guo, Y.; Wang, Q.; Luo, C.; Li, M.; Liao, W.; Li, P. Spectrum availability prediction for cognitive radio communications: A DCG approach. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 476–485. [Google Scholar] [CrossRef]
  15. Mosavat-Jahromi, H.; Li, Y.; Cai, L.; Pan, J. Prediction and Modeling of spectrum occupancy for dynamic spectrum access systems. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 715–728. [Google Scholar] [CrossRef]
  16. Sengottuvelan, S.; Ansari, J.; Mähönen, P.; Venkatesh, T.G.; Petrova, M. Channel Selection algorithm for cognitive radio networks with heavy-tailed idle times. IEEE Trans. Mob. Comput. 2017, 16, 1258–1271. [Google Scholar] [CrossRef]
  17. Kishimoto, Y.; Wang, X.; Umehira, M. Reinforcement learning for joint channel/subframe selection of LTE in the unlicensed spectrum. Wirel. Commun. Mob. Comput. 2021, 2021, 15. [Google Scholar] [CrossRef]
  18. Amrallah, A.; Mohamed, E.M.; Tran, G.K.; Sakaguchi, K. Enhanced dynamic spectrum access in UAV wireless networks for post-disaster area surveillance system: A Multi-player multi-armed bandit approach. Sensors 2021, 21, 7855. [Google Scholar] [CrossRef]
  19. Teraki, Y.; Wang, X.; Umehira, M.; Ji, Y. Deep reinforcement learning based usage aware spectrum access scheme. In Proceedings of the 24th International Symposium on Wireless Personal Multimedia Communications (WPMC), Okayama, Japan, 12–16 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
  20. Mnih, V.; Kavukcuoglu, K.; Silver, D.; Rusu, A.A.; Veness, J.; Bellemare, M.G.; Graves, A.; Riedmiller, M.; Fidjel, A.K.; Ostrovski, G.; et al. Human-level control through deep reinforcement learning. Nature 2015, 518, 529–533. [Google Scholar] [CrossRef]
  21. Jiang, H.; Lai, L.; Fan, R.; Poor, H.V. Optimal selection of channel sensing order in cognitive radio. IEEE Trans. Wirel. Commun. 2009, 8, 297–307. [Google Scholar] [CrossRef]
  22. Khan, Z.; Lehtomäki, J.J.; DaSilva, L.A.; Hossain, E.; Latva-Aho, M. Opportunistic channel selection by cognitive wireless nodes under imperfect observations and limited memory: A repeated game model. IEEE Trans. Mob. Comput. 2016, 15, 173–187. [Google Scholar] [CrossRef]
  23. Zhao, Q.; Krishnamachari, B.; Liu, K. On myopic sensing for multi-channel opportunistic access: Structure, optimality, and performance. IEEE Trans. Wirel. Commun. 2008, 7, 5431–5440. [Google Scholar] [CrossRef] [Green Version]
  24. Dai, W.; Gai, Y.; Krishnamachari, B. Online learning for multi-channel opportunistic access over unknown markovian channels. In Proceedings of the IEEE SECON, Singapore, 1–3 July 2014. [Google Scholar]
  25. Zhou, M.; Wang, T.; Wang, S. Spectrum Sensing across multiple service providers: A discounted thompson sampling method. IEEE Commun. Lett. 2019, 23, 2402–2406. [Google Scholar] [CrossRef]
  26. Venkatraman, P.; Hamdaoui, B.; Guizani, M. Opportunistic bandwidth sharing through reinforcement learning. IEEE Trans. Veh. Technol. 2010, 59, 3148–3153. [Google Scholar] [CrossRef]
  27. Syed, A.R.; Yau, K.L.A.; Mohamad, H.; Ramli, N.; Hashim, W. Channel selection in multi-hop cognitive radio network using reinforcement learning: An experimental study. In Proceedings of the ICFCNA, Kuala Lumpur, Malaysia, 3–5 November 2014. [Google Scholar]
  28. Nguyen, H.Q.; Nguyen, B.T.; Dong, T.Q.; Ngo, D.T.; Nguyen, T.A. Deep q-learning with multiband sensing for dynamic spectrum access. In Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Seoul, Korea, 22–25 October 2018; pp. 1–5. [Google Scholar] [CrossRef]
  29. Liu, X.; Sun, C.; Yu, W.; Zhou, M. Reinforcement-Learning-based dynamic spectrum access for software-defined cognitive industrial internet of things. IEEE Trans. Ind. Inform. 2022, 18, 4244–4253. [Google Scholar] [CrossRef]
  30. Wang, S.; Liu, H.; Gomes, P.H.; Krishnamachari, B. Deep Reinforcement learning for dynamic multichannel access in wireless networks. IEEE Trans. Cogn. Commun. Netw. 2018, 4, 257–265. [Google Scholar] [CrossRef]
  31. Zhong, C.; Lu, Z.; Gursoy, M.C.; Velipasalar, S. A deep actor-critic reinforcement learning framework for dynamic multichannel access. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 1125–1139. [Google Scholar] [CrossRef]
  32. Naparstek, O.; Cohen, K. Deep multi-user reinforcement learning for distributed dynamic spectrum access. IEEE Trans. Wirel. Commun. 2019, 18, 310–323. [Google Scholar] [CrossRef]
  33. Xu, Y.; Yu, J.; Buehrer, R.M. The Application of deep reinforcement learning to distributed spectrum access in dynamic heterogeneous environments with partial observations. IEEE Trans. Wirel. Commun. 2020, 19, 4494–4506. [Google Scholar] [CrossRef]
  34. Senthilmurugan, S.; Venkatesh, T.G. Optimal channel sensing strategy for cognitive radio networks with heavy-tailed idle times. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 26–36. [Google Scholar] [CrossRef]
  35. Raj, V.; Dias, I.; Tholeti, T.; Kalyani, S. Spectrum Access in cognitive radio using a two-stage reinforcement learning approach. IEEE J. Sel. Top. Signal Process. 2018, 12, 20–34. [Google Scholar] [CrossRef] [Green Version]
  36. Sheng, X.; Wang, S. Sensing-Transmission tradeoff for multimedia transmission in cognitive radio networks. In Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  37. Chang, H.-H.; Song, H.; Yi, Y.; Zhang, J.; He, H.; Liu, L. Distributive dynamic spectrum access through deep reinforcement learning: A reservoir computing-based approach. IEEE Internet Things J. 2019, 6, 1938–1948. [Google Scholar] [CrossRef]
  38. Macaluso, I.; Finn, D.; Ozgul, B.; DaSilva, L.A. Complexity of Spectrum activity and benefits of reinforcement learning for dynamic channel selection. IEEE J. Sel. Areas Commun. 2013, 31, 2237–2248. [Google Scholar] [CrossRef]
  39. Watkins, C.J.C.H.; Dayan, P. Q-learning. In Machine Learning; Springer: Berlin/Heidelberg, Germany, 1992; pp. 279–292. [Google Scholar]
  40. MATLAB and Statistics Toolbox Release 2021b; The MathWorks, Inc.: Natick, MA, USA, 2021.
  41. Python Software Foundation. Python Language Reference, Version 2.7. Available online: http://www.python.org (accessed on 1 August 2022).
Figure 1. An illustration of the state definitions for the existing methods. (a) Q-learning based spectrum access method. (b) DQN based spectrum access method.
Figure 1. An illustration of the state definitions for the existing methods. (a) Q-learning based spectrum access method. (b) DQN based spectrum access method.
Sensors 22 06949 g001
Figure 2. An illustration of the proposed compressed states representation.
Figure 2. An illustration of the proposed compressed states representation.
Sensors 22 06949 g002
Figure 3. An flowchart of the proposed status aware cost function.
Figure 3. An flowchart of the proposed status aware cost function.
Sensors 22 06949 g003
Figure 4. A channel usage example for 3 PU channels (DC = 0.5). (a) Pattern η 1 . (b) Pattern η 9 .
Figure 4. A channel usage example for 3 PU channels (DC = 0.5). (a) Pattern η 1 . (b) Pattern η 9 .
Sensors 22 06949 g004
Figure 5. P s P i for correlated PU channels (No. of PU = 10). (a) Different DCs for groups G 1 and G 2 . (b) Different patterns when DC( G 1 ) = 0.1 and DC( G 2 ) = 0.9. (c) Different patterns when DC( G 1 ) = 0.3 and DC( G 2 ) = 0.7. (d) Different patterns when DC( G 1 ) = 0.5 and DC( G 2 ) = 0.5.
Figure 5. P s P i for correlated PU channels (No. of PU = 10). (a) Different DCs for groups G 1 and G 2 . (b) Different patterns when DC( G 1 ) = 0.1 and DC( G 2 ) = 0.9. (c) Different patterns when DC( G 1 ) = 0.3 and DC( G 2 ) = 0.7. (d) Different patterns when DC( G 1 ) = 0.5 and DC( G 2 ) = 0.5.
Sensors 22 06949 g005
Figure 6. P s P i for uncorrelated PU channels (No. of PU = 3). (a) Varying DCs. (b) Different patterns when DC = 0.1. (c) Different patterns when DC = 0.3. (d) [Different patterns when DC = 0.5. (e) Different patterns when DC = 0.7. (f) Different patterns when DC = 0.9.
Figure 6. P s P i for uncorrelated PU channels (No. of PU = 3). (a) Varying DCs. (b) Different patterns when DC = 0.1. (c) Different patterns when DC = 0.3. (d) [Different patterns when DC = 0.5. (e) Different patterns when DC = 0.7. (f) Different patterns when DC = 0.9.
Sensors 22 06949 g006aSensors 22 06949 g006b
Figure 7. P s P i for uncorrelated PU channels (No. of PU=3). (a) Varying DCs. (b) Different patterns when DC = 0.1. (c) Different patterns when DC = 0.3. (d) Different patterns when DC = 0.5. (e) Different patterns when DC = 0.7. (f) Different patterns when DC = 0.9.
Figure 7. P s P i for uncorrelated PU channels (No. of PU=3). (a) Varying DCs. (b) Different patterns when DC = 0.1. (c) Different patterns when DC = 0.3. (d) Different patterns when DC = 0.5. (e) Different patterns when DC = 0.7. (f) Different patterns when DC = 0.9.
Sensors 22 06949 g007aSensors 22 06949 g007b
Table 1. Entropy rates for different patterns at each DC.
Table 1. Entropy rates for different patterns at each DC.
DC0.10.30.50.70.9
η 1 0.12610.31950.46890.31950.1261
η 2 0.21040.51190.46900.51190.2105
η 3 0.27770.65190.72190.65190.2777
η 4 0.33300.75390.72190.75390.3330
η 5 0.37880.81410.88130.82470.3788
η 6 0.41520.82470.88130.81410.4152
η 7 0.41520.86590.97100.86590.4431
η 8 0.44310.86690.97100.86690.4617
η 9 0.46170.88131.00000.88130.4690
Table 2. Main parameters for the proposed method.
Table 2. Main parameters for the proposed method.
ParametersValue
Number of PUs3, 10
Total time slots110,000
Evaluation time slots10,000
Mini-batch size2500
Replay memory size125,000
Exploration rate1 → 0.001
Learning rate0.00009
Discount factor0.1
Number of hidden layers1
Number of neurons512
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, X.; Teraki, Y.; Umehira, M.; Zhou, H.; Ji, Y. A Usage Aware Dynamic Spectrum Access Scheme for Interweave Cognitive Radio Network by Exploiting Deep Reinforcement Learning. Sensors 2022, 22, 6949. https://doi.org/10.3390/s22186949

AMA Style

Wang X, Teraki Y, Umehira M, Zhou H, Ji Y. A Usage Aware Dynamic Spectrum Access Scheme for Interweave Cognitive Radio Network by Exploiting Deep Reinforcement Learning. Sensors. 2022; 22(18):6949. https://doi.org/10.3390/s22186949

Chicago/Turabian Style

Wang, Xiaoyan, Yuto Teraki, Masahiro Umehira, Hao Zhou, and Yusheng Ji. 2022. "A Usage Aware Dynamic Spectrum Access Scheme for Interweave Cognitive Radio Network by Exploiting Deep Reinforcement Learning" Sensors 22, no. 18: 6949. https://doi.org/10.3390/s22186949

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop