Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels

verfasst von: Gaoning He, Mérouane Debbah, Eitan Altman

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A Bayesian game-theoretic model is developed to design and analyze the resource allocation problem in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq1_HTML.gif -user fading multiple access channels (MACs), where the users are assumed to selfishly maximize their average achievable rates with incomplete information about the fading channel gains. In such a game-theoretic study, the central question is whether a Bayesian equilibrium exists, and if so, whether the network operates efficiently at the equilibrium point. We prove that there exists exactly one Bayesian equilibrium in our game. Furthermore, we study the network sum-rate maximization problem by assuming that the users coordinate according to a symmetric strategy profile. This result also serves as an upper bound for the Bayesian equilibrium. Finally, simulation results are provided to show the network efficiency at the unique Bayesian equilibrium and to compare it with other strategies.

1. Introduction

The fading multiple access channel (MAC) is a basic wireless channel model that allows several transmitters connected to the same receiver to transmit over it and share its capacity. The capacity region of the fading MAC and the optimal resource allocation algorithms have been characterized and well studied in many pioneering works with different information assumptions [14]. However, in order to achieve the full capacity region, it usually requires a central computing resource (a scheduler with comprehensive knowledge of the network information) to globally allocate the system resources. This process is centralized, since it involves feedback and overhead communication whose load scales linearly with the number of transmitters in the network. In addition, with the fast evolution of wireless techniques, this centralized network infrastructure begins to expose its weakness in many aspects, for example, slow reconfiguration against varying environment, increased computational complexity, and so forth. This is especially crucial for femto-cell networks where it is quite difficult to centralize the information due to a limited capacity backhaul. Moreover, the high density of base stations would increase the cost of centralizing the information.
In recent years, increased research interest has been given to self-organizing wireless networks in which mobile devices allocate resources in a decentralized manner [5]. Tools from game theory [6] have been widely applied to study the resource allocation and power control problems in fading MAC [7], as well as many other types of channels, such as orthogonal frequency division multiplexing (OFDM) [8], multiple input and multiple output (MIMO) channels [9, 10], and interference channels [11]. Typically, the game-theoretic models used in these previous works assume that the knowledge, for example, channel state information (CSI), about other devices is available to all devices. However, this assumption is hardly met in practice. In practical wireless scenarios, mobile devices can have local information but can barely access to global information on the network status.
A static noncooperative game has been introduced in the context of the two-user fading MAC, known as "waterfilling game" [7]. By assuming that users compete with transmission rates as utility and transmit powers as moves, the authors show that there exists a unique Nash equilibrium [12] which corresponds to the maximum sum-rate point of the capacity region. This claim is somewhat surprising, since the Nash equilibrium is in general inefficient compared to the Pareto optimality. However, their results rely on the fact that both transmitters have complete knowledge of the CSI, and in particular, perfect CSI of all transmitters in the network. As we previously pointed out, this assumption is rarely realistic in practice.
Thus, this power allocation game needs to be reconstructed with some realistic assumptions made about the knowledge level of mobile devices. Under this consideration, it is of great interest to investigate scenarios in which devices have "incomplete information" about their components, for example, a device is aware of its own channel gain, but unaware of the channel gains of other devices. In game theory, a strategic game with incomplete information is called a "Bayesian game." Over the last ten years, Bayesian game-theoretic tools have been used to design distributed resource allocation strategies only in a few contexts, for example, CDMA networks [13, 14], multicarrier interference networks [15]. The primary motivation of this paper is therefore to investigate how Bayesian games can be applied to study the resource allocation problems in the fading MAC. In some sense, this study can help to design a self-organizing femto-cell network where different frequency bands or subcarriers are used for the femto-cell coverage, for example, different femto-cells operate on different frequency bands to avoid interference.
In this paper, we introduce a Bayesian game-theoretic model to design and analyze the resource allocation problem in a fading MAC, where users are assumed to selfishly maximize their ergodic capacity with incomplete information about the fading channel gains. In such a game-theoretic study, the central question is whether a Bayesian equilibrium exists, and if so, whether the network operates efficiently at the equilibrium point. We prove that there exists exactly one Bayesian equilibrium in our game. Furthermore, we study the network sum-rate maximization problem by assuming that all users coordinate to an optimization-based symmetric strategy. This centralized strategy is important when the fading processes for all users are relatively stationary and the global system structure is fixed for a long period of time. This result also serves as an upper bound for the unique Bayesian equilibrium.
The paper is organized in the following form: In Section 2, we introduce the system model and state important assumptions. In Section 3, the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq2_HTML.gif -user MAC is formulated as a static Bayesian game. In Section 4, we characterize the Bayesian equilibrium set. In Section 5, we give a special discussion on the optimal symmetric strategy. Some numerical results are provided to show the efficiency of the Bayesian equilibrium in Section 6. Finally, we close with some concluding remarks in Section 7.

2. System Model and Assumptions

2.1. System Model

We consider the uplink of a single-cell network where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq3_HTML.gif users are simultaneously sending information to one base station. This corresponds to a fading MAC, in which the users are the transmitters and the base station is the receiver. The signal received at the base station can be mathematically expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq4_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq5_HTML.gif are the input signal and fading channel gain of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq6_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq7_HTML.gif is a zero-mean white Gaussian noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq8_HTML.gif . The input signal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq9_HTML.gif can be further written as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq10_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq11_HTML.gif are the transmitted power and data of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq12_HTML.gif at time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq13_HTML.gif .
In this study, we consider the wireless transmission in fast fading environments, that is, the coherence time of the channel is small relative to the delay constraint of the application. When the receiver can perfectly track the channel but the transmitters have no such information, the codewords cannot be chosen as a function of the state of the channel but the decoding can make use of such information. When the fading process is assumed to be stationary and ergodic within the considered interval of signal transmission, the channel capacity in a fast fading channel corresponds to the notion of ergodic capacity, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq14_HTML.gif is a vector of channel gain variables. Note that in (3) we assume that the receiver applies a single-user decoding and there is not sophisticated successive decoding to be used. An intuitive understanding of this result can be obtained by viewing capacities in terms of time averages of mutual information [16]. Although the study of multiuser decoding is important, which may involve Stackelberg games, fairness concepts, and generalized Nash games, it is not provided in this study. The interested readers are referred to [17] for this topic.

2.2. Assumption of Finite Channel States

Before introducing our game model, we need to clarify a prior assumption for this section.
Assumption 1. We assume that each user's channel gain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq15_HTML.gif is i.i.d. from two discrete values: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq16_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq17_HTML.gif with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq18_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq19_HTML.gif , respectively. Without loss of generality, we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq20_HTML.gif .
On the one hand, our assumption is closely related to the way how feedback information is signalled to the transmitters. In order to get the channel information https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq21_HTML.gif at the transmitter side, the base station is required to feedback an estimate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq22_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq23_HTML.gif   at a given precision. Since in digital communications, any information is represented by a finite number of bits (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq24_HTML.gif bits), channels gains are mapped into a set that contains a finite number of states ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq25_HTML.gif states).
On the other hand, this is a necessary assumption for analytical tractability, since in principle the functional strategic form of a player can be quite complex with both actions and states being continuous (or infinite). To avoid this problem, in [15] the authors successfully modelled a multicarrier Gaussian interference channel as a Bayesian game with discrete (or finite) actions and continuous states. Inspired from [15], we also model the fading MAC as a Bayesian game under the assumption of continuous actions and discrete states.

3. Game Formulation

We model the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq26_HTML.gif -user fading MAC as a Bayesian game, in which users do not have complete information. In a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq27_HTML.gif -user MAC, to have "complete information" means that, at each time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq28_HTML.gif , the channel gain realizations https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq29_HTML.gif are known at all the transmitters, denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq30_HTML.gif . Any other condition corresponds to a situation of incomplete information. In this paper, the "incomplete information" particularly refers to a situation where each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq31_HTML.gif only knows its own channel gain realization https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq32_HTML.gif , but does not know the channel gains of other transmitters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq33_HTML.gif . We will denote by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq34_HTML.gif the channel gain variable of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq35_HTML.gif , whose distribution is assumed to be stationary and ergodic in this section.
In such a communication system, the natural object of each user is to maximize its ergodic capacity subject to an average power constraint, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq36_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq37_HTML.gif are transmit power strategy and average power constraint of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq38_HTML.gif , respectively. Under the assumption that each user has incomplete information about the channel gains, user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq39_HTML.gif 's strategy https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq40_HTML.gif is defined as a function of its own channel gain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq41_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq42_HTML.gif . Note that (4) implies that user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq43_HTML.gif should know at least the statistics of other users' channels.
For a given set of power strategies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq44_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq45_HTML.gif , the single-user maximization problem (4) is a convex optimization problem [18]. Via Lagrangian duality, the solution is given by the following equation:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ5_HTML.gif
(5)
where the dual variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq46_HTML.gif is chosen such that the power constraint in (4) is satisfied with equality. However, the solution of (5) depends on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq47_HTML.gif which user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq48_HTML.gif does not know, and the same holds for all other users. Thus, in order to obtain the optimal power allocation, each user must adjust its power level based on the guess of all other users' strategies. Now, given the following game model, each user is able to adjust its strategy according to the belief it has about the strategy of the other user.
The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq49_HTML.gif -player MAC Bayesian game can be completely characterized as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ6_HTML.gif
(6)
(i)
Player set: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq50_HTML.gif .
 
(ii)
Type set: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq51_HTML.gif (" https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq52_HTML.gif " stands for the Cartesian product) where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq53_HTML.gif . A player's type is defined as its channel gain, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq54_HTML.gif .
 
(iii)
Action set: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq55_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq56_HTML.gif . A player's action is defined as its transmit power, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq57_HTML.gif .
 
(iv)
Probability set: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq58_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq59_HTML.gif , we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq60_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq61_HTML.gif .
 
(v)
Payoff function set: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq62_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq63_HTML.gif is chosen as player https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq64_HTML.gif 's achievable rate
 
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ7_HTML.gif
(7)
In games of incomplete information, a player's type represents any kind of private information that is relevant to its decision making. In our context, the fading channel gain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq65_HTML.gif is naturally considered as the type of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq66_HTML.gif , since its decision (in terms of power) can only rely on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq67_HTML.gif . Note that this is a continuous game (a continuous game extends the notion of a discrete game (where players choose from a finite set of pure strategies), it allows players to choose a strategy from a continuous pure strategy set) with discrete states, since each player's action https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq68_HTML.gif can take any value satisfying the constraint https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq69_HTML.gif and the channel state https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq70_HTML.gif is finite https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq71_HTML.gif .

4. Bayesian Equilibrium

4.1. Definition of Bayesian Equilibrium

What we can expect from the outcome of a Bayesian game if every selfish and rational (rational player means a player chooses the best response given its information) participant starts to play the game? Generally speaking, the process of such players' behaviors usually results in a Bayesian equilibrium, which represents a common solution concept for Bayesian games. In many cases, it represents a "stable" result of learning and evolution of all participants. Therefore, it is important to characterize such an equilibrium point, since it concerns the performance prediction of a distributed system.
Now, let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq72_HTML.gif denote the strategy profile where all players play https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq73_HTML.gif except player https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq74_HTML.gif who plays https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq75_HTML.gif , we can then describe player https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq76_HTML.gif 's payoff as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ8_HTML.gif
(8)
Definition 2 (Bayesian equilibrium).
The strategy profile https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq77_HTML.gif is a (pure strategy) Bayesian equilibrium, if for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq78_HTML.gif , and for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq79_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq80_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ9_HTML.gif
(9)
where we define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq81_HTML.gif .
From this definition, it is clear that at the Bayesian equilibrium no player can benefit from changing its strategy while the other players keep theirs unchanged. Note that in a strategic-form game with complete information each player chooses a concrete action, whereas in a Bayesian game each player https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq82_HTML.gif faces the problem of choosing a set or collection of actions (power strategy https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq83_HTML.gif ), one for each type (channel gain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq84_HTML.gif ) it may encounter. It is also worth to mention that the action set of each player is independent of the type set, that is, the actions available to user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq85_HTML.gif are the same for all types.

4.2. Characterization of the Bayesian Equilibrium Set

It is well known that, in general, an equilibrium point does not necessarily exist [6]. Therefore, our primary interest in this paper is to investigate the existence and uniqueness of a Bayesian equilibrium in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq86_HTML.gif . We now state our main result.
Theorem 3.
There exists a unique Bayesian equilibrium in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq87_HTML.gif -user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq88_HTML.gif game https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq89_HTML.gif .
Proof.
It is easy to prove the existence part, since the strategy space https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq90_HTML.gif is convex, compact, and nonempty for each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq91_HTML.gif ; the payoff function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq92_HTML.gif is continuous in both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq93_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq94_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq95_HTML.gif is concave in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq96_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq97_HTML.gif [6].
In order to prove the uniqueness part, we should rely on a sufficient condition given in [19]: a non-cooperative game has a unique equilibrium, if the nonnegative weighted sum of the payoff functions is diagonally strictly concave. We firstly give the definition.
Definition 4 (diagonally strictly concave).
A weighted nonnegative sum function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq98_HTML.gif is called diagonally strictly concave for any vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq99_HTML.gif and fixed vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq100_HTML.gif , if for any two different vectors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq101_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq102_HTML.gif is called pseudogradient of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq103_HTML.gif , defined as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ11_HTML.gif
(11)
We start with the following lemma.
Lemma 5.
The weighted nonnegative sum of the average payoffs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq104_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq105_HTML.gif is diagonally strictly concave for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq106_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq107_HTML.gif is a positive scalar, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq108_HTML.gif is a vector whose every entry is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq109_HTML.gif .
Proof.
Write the weighted nonnegative sum of the average payoffs as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ12_HTML.gif
(12)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq110_HTML.gif is the transmit power vector and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq111_HTML.gif is a nonnegative vector assigning weights https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq112_HTML.gif to the average payoffs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq113_HTML.gif , respectively. Similar to (11), we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq114_HTML.gif be the pseudogradient of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq115_HTML.gif . Now, we define
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ13_HTML.gif
(13)
the transmit power of player https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq116_HTML.gif when its channel gain is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq117_HTML.gif . Since we have shown from the Lagrangian that, at the equilibrium, the power constraint is satisfied with equality, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq118_HTML.gif , we can write https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq119_HTML.gif , as the transmit power when its channel gain is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq120_HTML.gif . Therefore, it is easy to find that the average payoff https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq121_HTML.gif can be actually transformed into a weighted sum-log function as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq122_HTML.gif represents the index for different jointly probability events, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq123_HTML.gif represents the corresponding probability for event https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq124_HTML.gif that are related to the probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq125_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq126_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq127_HTML.gif represent some positive and nonzero real numbers that are related to the channel gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq128_HTML.gif . Note that the following conditions hold for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq129_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ15_HTML.gif
(15)
Now, we can write the pseudogradient https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq130_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ16_HTML.gif
(16)
where the function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq131_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ17_HTML.gif
(17)
To check the diagonally strictly concave condition (10), we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq132_HTML.gif be two different vectors satisfying the power constraint, and define
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq133_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq134_HTML.gif are defined as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ19_HTML.gif
(19)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq135_HTML.gif are assumed to be two different vectors, we must have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq136_HTML.gif . Now, we can draw a conclusion from the equation above: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq137_HTML.gif . This is because: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq138_HTML.gif the first part https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq139_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq140_HTML.gif , since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq141_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq142_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq143_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq144_HTML.gif the second part https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq145_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq146_HTML.gif , and there exists at least one nonzero term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq147_HTML.gif , due to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq148_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq149_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq150_HTML.gif . Therefore, the summation of all the products of the first and the second terms must be positive. From Definition 4, the sum-payoff function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq151_HTML.gif satisfies the condition of diagonally strictly concave. This completes the proof of this lemma.
Since our sum-payoff function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq152_HTML.gif given in (12) is diagonally strictly concave, the uniqueness of Bayesian equilibrium in our game https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq153_HTML.gif follows directly from [19, Theorem https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq154_HTML.gif ].

5. Optimal Symmetric Strategies

The Bayesian game-theoretic approach provides us a better understanding of the wireless resource competition existing in the fading MAC when every mobile device acts as a selfish and rational decision maker (this means a device always chooses the best response given its information). The advantage of this model is that it mathematically captures the behavior of selfish wireless entities in strategic situations, which can automatically lead to the convergence of system performance. The introduced Bayesian game-theoretic framework fits very well the concept of self-organizing networks, where the intelligence and decision making is distributed. Such a scheme has apparent benefits in terms of operational complexity and feedback load.
However, from the global system performance perspective, it is usually inefficient to give complete "freedom" to mobile devices and let them take decisions without any policy control over the network. It is very interesting to note that a similar situation happens in the market economy, where consumers can be modeled as players to complete for the market resources. In the famous literature The Wealth of Nations, Adam Smith (a Scottish moral philosopher, pioneer of political economy, and father of modern economics) expounded how rational self-interest and competition can lead to economic prosperity and well-being through macroeconomic adjustments. For example, all states today have some form of macroeconomic control over the market that removes the free and unrestricted direction of resources from consumers and prices such as tariffs and corporate subsidies.
In particular, wireless service providers would like to design an appropriate policy to efficiently manage the system resource so that the global network performance can be optimized or enhanced to a certain theoretical limit, for example, Shannon capacity or capacity region [20]. Apparently, a centralized scheduler with comprehensive knowledge of the network status can globally optimize the resource utility. However, this approach usually involves sophisticated optimization techniques and a feedback load that grows with the number of wireless devices in the network. Thus, the optimization-based centralized decision has to be frequently updated as long as the wireless environment varies, or the system structure changes, for example, a user joins or exits the network.
In this section, we consider that the channel statistics (fading processes) for all wireless devices are jointly stationary for a relatively long period of signal transmission, and the global system structure remains unchanged. In addition, we neglect the problem of computational complexity at the scheduler and the impact of feedback load to the useful data transmission rate. In this case, the network service provider would strictly prefer to use a centralized approach, that is, a scheduler assigns some globally optimal strategies to the wireless devices, guiding them how to react under all kinds of different situations. Based on the Bayesian game settings, we provide a special discussion on the optimal symmetric strategy design. Note that this result can be treated as a theoretical upperbound for the performance measurement of Bayesian equilibrium.
We now introduce a necessary assumption.
Assumption.
Mobile devices are designed to use the same power strategies, that is, they send the same power if their observations on the channel states are symmetric. In addition, we assume that the mobile devices have the same average power constraint, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq155_HTML.gif .

5.1. Two Channel States

For simplicity of our presentation, We first consider the scenario of two users with two channel states. In fact, the analysis of multiuser MAC can be extended in a similar way. According to Assumption 6, we define
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ20_HTML.gif
(20)
and we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq156_HTML.gif . Write user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq157_HTML.gif 's average payoff as (Without loss of generality, we consider user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq158_HTML.gif in the following context, since the problem is symmetric for user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq159_HTML.gif )
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ21_HTML.gif
(21)
Now, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq160_HTML.gif is transformed into a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq161_HTML.gif , write it as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq162_HTML.gif . To maximize the average achievable rate, user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq163_HTML.gif needs to solve the following optimization problem, as mentioned in (4)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ22_HTML.gif
(22)
Under Assumption 6, it can be shown that (due to the symmetric property) this single-user maximization problem is equivalent to the multiuser sum average rate maximization problem, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq164_HTML.gif , which is our object in this section.
But unfortunately, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq165_HTML.gif may not be a convex function [18], so the single-user problem may not be a convex optimization problem. It can be further verified that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq166_HTML.gif is convex under some special conditions, depending on all the parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq167_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq168_HTML.gif . Here, we will not discuss all the convex cases, but only focus on the high SNR regime (meaning that the noise can be omitted compared to the signal strength). In this case, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ23_HTML.gif
(23)
This function is strict convex. To be more precise, it is decreasing on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq169_HTML.gif and increasing on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq170_HTML.gif , and the solution is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ24_HTML.gif
(24)
Note that in this setting the choice of the optimal symmetric strategy is to concentrate the full available power on a single channel state. The selection of the channel state on which to transmit depends not only on the channel conditions but also on the probability of the channel states. This result implies that, in the high SNR regime, the optimal symmetric power strategy is to transmit information in an "opportunistic" way. For a better understanding of the "opportunistic" transmission, the interested reads are referred to [2].

5.2. Multiple Channel States

In this subsection, we discuss the extension to arbitrary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq171_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq172_HTML.gif ) channel states. Note that the result of this subsection can also be applied to the case of two channel states.
Assumption.
Each user's channel gain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq173_HTML.gif has https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq174_HTML.gif positive states, which are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq175_HTML.gif with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq176_HTML.gif , respectively (Without loss of generality, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq177_HTML.gif ), and we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq178_HTML.gif .
Based on Assumption 6, we define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq179_HTML.gif , as the transmit power when a user's channel gain is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq180_HTML.gif . As previously mentioned, our object in this part is to maximize the sum ergodic capacity of the system, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq181_HTML.gif . Under the symmetric assumption, this sum-ergodic-capacity maximization problem is equivalent to the following single-user maximization problem
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq182_HTML.gif is now defined as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq183_HTML.gif . This optimization problem is difficult, since the objective function is again nonconvex in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq184_HTML.gif . However, we can consider a relaxation of the optimization by introducing a lower bound [21]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ26_HTML.gif
(26)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq185_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq186_HTML.gif are chosen specified as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ27_HTML.gif
(27)
we say that the lower bound (26) is tight with equality at a chosen value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq187_HTML.gif .
Let us consider the lower bound (denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq188_HTML.gif ) by using the relaxation (26) to the objective function in  (25)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ28_HTML.gif
(28)
which is still nonconvex, and so it is not concave in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq189_HTML.gif . However, with a logarithmic change of the following variables and constants: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq190_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq191_HTML.gif , we can turn the geometric programming [18] associated with the objective function (28) into the following problem:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ29_HTML.gif
(29)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq192_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ30_HTML.gif
(30)
Now, it is easy to verify that the lower bound https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq193_HTML.gif is concave in the transformed set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq194_HTML.gif , since the log-sum-exp function is convex. The constraints of the optimization problem are such that Slater's condition is satisfied [18]. So, the Karush-Kuhn-Tucker (KKT) condition of the optimization is sufficient and necessary for the optimality. Given the following Lagrangian dual function (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq195_HTML.gif ):
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ31_HTML.gif
(31)
the KKT conditions are
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ32_HTML.gif
(32)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq196_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq197_HTML.gif is a dual variable associated with the power constraint in (29).
Define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq198_HTML.gif , the equivalent KKT conditions can be simply written as a quadratic equation
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ33_HTML.gif
(33)
where the parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq199_HTML.gif are expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ34_HTML.gif
(34)
Note that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq200_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq201_HTML.gif are functions of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq202_HTML.gif , we can write them as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq203_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq204_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq205_HTML.gif , the solution to the KKT conditions can only be one of the roots to the quadratic equation, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_Equ35_HTML.gif
(35)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq206_HTML.gif is chosen such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq207_HTML.gif . Thus, for some fixed value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq208_HTML.gif , we can directly apply (35) to maximize the lower bound https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq209_HTML.gif (28). Then, it is natural to improve the bound periodically. Based on the discussion above, we propose the following algorithm, namely Lower Bound Tightening (LBT) algorithm
The algorithm convergence can be easily proved, since the objective is monotonically increasing at each iteration. However, the global optimum is not always guaranteed, due to the nonconvex property.

6. Numerical Results

In this section, numerical results are presented to validate our theoretical claims. For Figures 1 and 2, the network parameters are chosen as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq210_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq211_HTML.gif .
First, we show the existence and uniqueness of Bayesian equilibrium in the scenario of two-user fading MAC. In Figure 1(a), we assume the channel gains are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq216_HTML.gif ; in Figure 1(b), we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq217_HTML.gif . On both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq218_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq219_HTML.gif axis, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq220_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq221_HTML.gif represent the power allocated by user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq222_HTML.gif and user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq223_HTML.gif when the channel gain is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq224_HTML.gif . The curves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq225_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq226_HTML.gif represent the best-response functions of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq227_HTML.gif and user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq228_HTML.gif , respectively. As expected, the Bayesian equilibrium is unique in both cases, that is, (0.6,0.6) and (0.5,0.5).
Second, we investigate the efficiency of Bayesian equilibrium from the viewpoint of global average network performance. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq229_HTML.gif axis, SNR is defined as the ratio between the power constraint https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq230_HTML.gif and the noise variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq231_HTML.gif . In Figure 2(a), again, we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq232_HTML.gif ; in Figure 2(b), we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq233_HTML.gif . The curve "Pareto" represents the Nash equilibrium in the waterfilling game, in which users have complete information. This gives the upper bound for our Bayesian equilibrium, since it is also the Pareto optimal solution [7]. The curve "Uniform" represents the time-domain uniform power allocation. Since this is the strategy when users have no information about the channel gains, it corresponds obviously to a lower bound. The curve "Symmetric" represents the optimal symmetric strategy presented in Section 5. This can be treated as a weaker upper bound (inferior to the Pareto optimality) for the Bayesian equilibrium. From the slopes of these curves, we can clearly observe the inefficiency of the Bayesian equilibrium, especially in the high SNR regime. This can be explained as follows: in our game https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq234_HTML.gif , users with incomplete information improve the global network performance (comparing to the scenario in which the users have no information), however, it does not improve the performance slope.
Finally, we show the convergence behavior of the lower bound tightening (LBT) algorithm. In Figure 3, we choose the parameters as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq235_HTML.gif . The sum capacity versus the SNR are plotted for five iterations. The upper bound is achieved by exhaustive search. As expected, one can easily observe the convergence behavior. In the low SNR regime, we can find that the algorithm converges to the local instead of the global maximum. However, we also find that the performance of the local optimum is improved while the SNR is increasing.

7. Conclusion

We presented a Bayesian game-theoretic framework for distributed resource allocation in fading MAC, where users are assumed to have only information about their own channel gains. By introducing the assumption of finite channel states, we successfully found a analytical way to characterize the Bayesian equilibrium set. First, we proved the existence and uniqueness. Second, the inefficiency was shown from numerical results. Furthermore, we analyzed the optimal symmetric power strategy based on the practical concerns of resource allocation design. Future extension is considered to improve the efficiency of Bayesian equilibrium through pricing or cooperative game-theoretic approaches.
Algorithm 1: Lower Bound Tightening (LBT).
Initialize   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq236_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq237_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq238_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq239_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq240_HTML.gif
repeat
  repeat
     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq241_HTML.gif
    for   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq242_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq243_HTML.gif   do
       update https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq244_HTML.gif using  (34)
       https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq245_HTML.gif
    end for
  until   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq246_HTML.gif
  for   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq247_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq248_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq249_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq250_HTML.gif   do
    https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq251_HTML.gif
  end for
   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F391684/MediaObjects/13638_2009_Article_1891_IEq252_HTML.gif
until converge
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Cheng RS, Verdú S: Gaussian multiaccess channels with ISI. Capacity region and multiuser water-filling. IEEE Transactions on Information Theory 1993, 39(3):773-785. 10.1109/18.256487MATHCrossRef Cheng RS, Verdú S: Gaussian multiaccess channels with ISI. Capacity region and multiuser water-filling. IEEE Transactions on Information Theory 1993, 39(3):773-785. 10.1109/18.256487MATHCrossRef
2.
Zurück zum Zitat Knopp R, Humblet PA: Information capacity and power control in single-cell multiuser communications. Proceedings of IEEE International Conference on Communications (ICC '95), June 1995, Seattle, Wash, USA 1: 331-335.CrossRef Knopp R, Humblet PA: Information capacity and power control in single-cell multiuser communications. Proceedings of IEEE International Conference on Communications (ICC '95), June 1995, Seattle, Wash, USA 1: 331-335.CrossRef
3.
Zurück zum Zitat Goldsmith AJ, Varaiya PP: Capacity of fading channels with channel side information. IEEE Transactions on Information Theory 1997, 43(6):1986-1992. 10.1109/18.641562MATHMathSciNetCrossRef Goldsmith AJ, Varaiya PP: Capacity of fading channels with channel side information. IEEE Transactions on Information Theory 1997, 43(6):1986-1992. 10.1109/18.641562MATHMathSciNetCrossRef
4.
Zurück zum Zitat Tse DNC, Hanly SV: Multiaccess fading channels—part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 1998, 44(7):2796-2815. 10.1109/18.737513MATHMathSciNetCrossRef Tse DNC, Hanly SV: Multiaccess fading channels—part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 1998, 44(7):2796-2815. 10.1109/18.737513MATHMathSciNetCrossRef
5.
Zurück zum Zitat Debbah M: Mobile flexible networks: the challenges ahead. Proceedings of the International Conference on Advanced Technologies for Communications (ATC '08), October 2008, Hanoi, Vietnam 3-7. Debbah M: Mobile flexible networks: the challenges ahead. Proceedings of the International Conference on Advanced Technologies for Communications (ATC '08), October 2008, Hanoi, Vietnam 3-7.
6.
Zurück zum Zitat Fudenberg D, Tirole J: Game Theory. MIT Press, Cambridge, Mass, USA; 1991. Fudenberg D, Tirole J: Game Theory. MIT Press, Cambridge, Mass, USA; 1991.
7.
Zurück zum Zitat Lai L, El Gamal H: The water-filling game in fading multiple-access channels. IEEE Transactions on Information Theory 2008, 54(5):2110-2122.MATHMathSciNetCrossRef Lai L, El Gamal H: The water-filling game in fading multiple-access channels. IEEE Transactions on Information Theory 2008, 54(5):2110-2122.MATHMathSciNetCrossRef
8.
Zurück zum Zitat He G, Beta S, Debbah M: Game-theoretic deployment design of small-cell OFDM networks. Proceedings of the 3rd ICST/ACM International Workshop on Game Theory in Communication Networks, October 2009 He G, Beta S, Debbah M: Game-theoretic deployment design of small-cell OFDM networks. Proceedings of the 3rd ICST/ACM International Workshop on Game Theory in Communication Networks, October 2009
9.
Zurück zum Zitat Lasaulce S, Debbah M, Altman E: Methodologies for analyzing equilibria in wireless games: a look at pure, mixed, and correlated equilibria. IEEE Signal Processing Magazine 2009, 26(5):41-52.CrossRef Lasaulce S, Debbah M, Altman E: Methodologies for analyzing equilibria in wireless games: a look at pure, mixed, and correlated equilibria. IEEE Signal Processing Magazine 2009, 26(5):41-52.CrossRef
10.
Zurück zum Zitat Belmega E-V, Lasaulce S, Debbah M: Power allocation games for mimo multiple access channels with coordination. IEEE Transactions on Wireless Communications 2009, 8(6):3182-3192.CrossRef Belmega E-V, Lasaulce S, Debbah M: Power allocation games for mimo multiple access channels with coordination. IEEE Transactions on Wireless Communications 2009, 8(6):3182-3192.CrossRef
11.
Zurück zum Zitat Altman E, Debbah M, Silva A: Game theoretic approach for routing in Dense ad-hoc networks. Proceedings of the Stochastic Networks Workshop, July 2007, Edinburg, UK Altman E, Debbah M, Silva A: Game theoretic approach for routing in Dense ad-hoc networks. Proceedings of the Stochastic Networks Workshop, July 2007, Edinburg, UK
12.
Zurück zum Zitat Nash JF: Equilibrium points in N-person games. Proceedings of the National Academy of Sciences of the United States Of America 1950, 36(1):48-49. 10.1073/pnas.36.1.48MATHMathSciNetCrossRef Nash JF: Equilibrium points in N-person games. Proceedings of the National Academy of Sciences of the United States Of America 1950, 36(1):48-49. 10.1073/pnas.36.1.48MATHMathSciNetCrossRef
13.
Zurück zum Zitat Heikkinen T: A minmax game of power control in a wireless network under incomplete information. Tech. Rep. 99-43, DIMACS, August 1999. Heikkinen T: A minmax game of power control in a wireless network under incomplete information. Tech. Rep. 99-43, DIMACS, August 1999.
14.
Zurück zum Zitat Jean CASt, Jabbari B: Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), 2004 5: 3496-3500. Jean CASt, Jabbari B: Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), 2004 5: 3496-3500.
16.
Zurück zum Zitat Gallager R: An inequality on the capacity region of multiaccess fading channels. In Communications and Cryptography: Two Sides of One Tapestry. Kluwer Academic Publishers, Boston, Mass, USA; 1994:129-139.CrossRef Gallager R: An inequality on the capacity region of multiaccess fading channels. In Communications and Cryptography: Two Sides of One Tapestry. Kluwer Academic Publishers, Boston, Mass, USA; 1994:129-139.CrossRef
17.
Zurück zum Zitat Altman E, Avrachenkov K, Cottatellucci L, Debbah M, He G, Suarez A: Operating point selection in multiple access rate regions. Proceedings of the 21st International Teletraffic Congress (ITC '09), June 2009, Paris, France Altman E, Avrachenkov K, Cottatellucci L, Debbah M, He G, Suarez A: Operating point selection in multiple access rate regions. Proceedings of the 21st International Teletraffic Congress (ITC '09), June 2009, Paris, France
18.
Zurück zum Zitat Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.MATHCrossRef Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.MATHCrossRef
19.
Zurück zum Zitat Rosen JB: Existence and uniqueness of equilibrium points for concave N-person games. Econometrica 1965, 33: 520-534. 10.2307/1911749MATHMathSciNetCrossRef Rosen JB: Existence and uniqueness of equilibrium points for concave N-person games. Econometrica 1965, 33: 520-534. 10.2307/1911749MATHMathSciNetCrossRef
20.
21.
Zurück zum Zitat Papandriopoulos J, Evans JS: Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks. Proceedings of IEEE International Conference on Communications (ICC '06), June 2006 7: 3270-3275. Papandriopoulos J, Evans JS: Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks. Proceedings of IEEE International Conference on Communications (ICC '06), June 2006 7: 3270-3275.
Metadaten
Titel
A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels
verfasst von
Gaoning He
Mérouane Debbah
Eitan Altman
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/391684

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe