【24h】

Dependence of optimal monitoring strategy on the application to be protected

机译:最佳监视策略对要保护的应用程序的依赖性

获取原文

摘要

Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection probability of unlicensed access to spectrum resources depends on the application type. As a consequence, knowledge of the application type allows for the primary user to improve spectrum scanning. Given the juxtaposition between the thief's and scanner's objectives, and the underlying dependency between detection and application QoS requirements, we finally formulate an adversarial Bayesian game where the scanner's scanning takes into account statistical knowledge about applications used by the user. The equilibrium strategies of this game are found in closed form what allowed to find their interesting properties. In particular, it was shown that the equilibrium sneaking strategies for different types of user are bandwidth-sharing, and we demonstrate how information about the application the user prefers to sneak at can improve the monitoring strategy.
机译:动态频谱访问是一种利用频谱中的机会进行通信的强大方法。应规范和监视对这些频谱机会的访问,以防止频谱资源未经许可被盗用,这些频谱资源最终属于主要用户。不幸的是,大多数致力于频谱扫描的文献都没有考虑频谱窃贼可能试图运行的总体应用程序。在本文中,我们证明了小偷的应用(特别是其QoS要求)在小偷应如何偷偷频谱方面起着至关重要的作用,因此,在频谱监控基础架构应如何扫描频谱以检测出小偷中起着至关重要的作用。频谱资源。当将带宽和延迟视为他关注的两个主要QoS参数时,我们研究了窃贼行为的差异。松散地说,这相当于偷偷下载文件而不是流视频,并且吸取的最终教训是,未经许可访问频谱资源的检测概率取决于应用程序类型。结果,对应用程序类型的了解使主要用户可以改善频谱扫描。考虑到窃贼和扫描器目标之间的并列,以及检测和应用程序QoS要求之间的潜在依存关系,我们最终制定了一个对抗性的贝叶斯游戏,其中扫描器的扫描考虑了有关用户使用的应用程序的统计知识。该游戏的均衡策略以封闭形式发现,可以找到其有趣的属性。特别是,它显示了针对不同类型用户的均衡潜行策略是带宽共享,并且我们演示了有关用户更喜欢潜行的应用程序的信息如何改善监视策略。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号