Data and spectrum trading policies in a trusted cognitive dynamic network architecture
Lorenzo, Beatriz; Shafigh, Alireza Shams; Liu, Jianqing; González-Castaño, Francisco J.; Fang, Yuguang (2018-05-21)
B. Lorenzo, A. S. Shafigh, J. Liu, F. J. González-Castaño and Y. Fang, "Data and Spectrum Trading Policies in a Trusted Cognitive Dynamic Network Architecture," in IEEE/ACM Transactions on Networking, vol. 26, no. 3, pp. 1502-1516, June 2018. doi: 10.1109/TNET.2018.2828460
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists,or reuse of any copyrighted component of this work in other works.
Future wireless networks will progressively displace service provisioning towards the edge to accommodate increasing growth in traffic. This paradigm shift calls for smart policies to efficiently share network resources and ensure service delivery. In this paper, we consider a cognitive dynamic network architecture (CDNA) where primary users (PUs) are rewarded for sharing their connectivities and acting as access points for secondary users (SUs). CDNA creates opportunities for capacity increase by network-wide harvesting of unused data plans and spectrum from different operators. Different policies for data and spectrum trading are presented based on centralized, hybrid, and distributed schemes involving primary operator (PO), secondary operator (SO), and their respective end users. In these schemes, PO and SO progressively delegate trading to their end users and adopt more flexible cooperation agreements to reduce computational time and track available resources dynamically. A novel matching-with-pricing algorithm is presented to enable self-organized SU-PU associations, channel allocation and pricing for data and spectrum with low computational complexity. Since connectivity is provided by the actual users, the success of the underlying collaborative market relies on the trustworthiness of the connections. A behavioral-based access control mechanism is developed to incentivize/penalize honest/dishonest behavior and create a trusted collaborative network. Numerical results show that the computational time of the hybrid scheme is one order of magnitude faster than the benchmark centralized scheme and that the matching algorithm reconfigures the network up to three orders of magnitude faster than in the centralized scheme.
- Avoin saatavuus