Skip to main content
Erschienen in: Wireless Networks 4/2018

16.11.2016

A multi-state Q-learning based CSMA MAC protocol for wireless networks

verfasst von: Hossein Bayat-Yeganeh, Vahid Shah-Mansouri, Hamed Kebriaei

Erschienen in: Wireless Networks | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the shared nature of wireless channels, competition among the nodes to access media is inevitable. P-persistent carrier sense multiple access (CSMA) is a medium access control scheme widely used for resource allocation in wireless environments. The probability of transmission highly affects the throughput. We model the wireless nodes as agents in a network game. The strategy of an agent is defined as the probability of transmission. Agents don’t have a priori information about the network (e.g., number of nodes, other agents strategies) and learn their optimal strategy using the historical sensory information including the number of collisions or successful transmissions. In this paper, a multi-state reinforcement learning (RL) method is designed for this purpose. The main challenge in designing an RL agent is to define the states of the environment from agent’s perspective. For this purpose, in this paper, various state representations are proposed in a multi-state Q-learning model. This leads to different agents personalities ranging from cautious agents with risk aversion to aggressive risky agents. We also propose agents with combined personalities of cautiousness and aggressiveness. The performance of the proposed Q-learning agents with different state definitions in comparison with each other and also other benchmarking agents is examined via comprehensive simulation results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Felegyhazi, M., & Hubaux, J-P. (2006). Game theory in wireless networks: A tutorial, Technical report LCA-REPORT-2006-002, EPFL. Felegyhazi, M., & Hubaux, J-P. (2006). Game theory in wireless networks: A tutorial, Technical report LCA-REPORT-2006-002, EPFL.
2.
Zurück zum Zitat Alfano, G., Garetto, M., & Leonardi, E. (2013). New directions into the stochastic geometry analysis of dense CSMA networks. IEEE Transactions on Mobile Computing, 13(2), 324–336.CrossRef Alfano, G., Garetto, M., & Leonardi, E. (2013). New directions into the stochastic geometry analysis of dense CSMA networks. IEEE Transactions on Mobile Computing, 13(2), 324–336.CrossRef
3.
Zurück zum Zitat Busson, A., & Chelius, G. (2014). Capacity and interference modeling of CSMA/CA networks using SSI point processes. Telecommunication Systems, 57(1), 25–39.CrossRef Busson, A., & Chelius, G. (2014). Capacity and interference modeling of CSMA/CA networks using SSI point processes. Telecommunication Systems, 57(1), 25–39.CrossRef
4.
Zurück zum Zitat Cohen, K., Nedic, A., & Srikant, R. (2015). Distributed learning algorithms for spectrum sharing in spatial random access wireless networks. Available online: http://arxiv.org/abs/1507.05664. Cohen, K., Nedic, A., & Srikant, R. (2015). Distributed learning algorithms for spectrum sharing in spatial random access wireless networks. Available online: http://​arxiv.​org/​abs/​1507.​05664.​
5.
Zurück zum Zitat Chu, Yi, Kosunalp, S., Mitchell, P. D., Grace, D., & Clarke, Tim. (2015). Application of reinforcement learning to medium access control for wireless sensor networks. Engineering Applications of Artificial Intelligence, 46, 23–32.CrossRef Chu, Yi, Kosunalp, S., Mitchell, P. D., Grace, D., & Clarke, Tim. (2015). Application of reinforcement learning to medium access control for wireless sensor networks. Engineering Applications of Artificial Intelligence, 46, 23–32.CrossRef
6.
Zurück zum Zitat Du, Q., & Zhang, X. (2009). Game-theoretic approach for QoS-aware resource competition in wireless networks. In Proceedings of IEEE MILCOM. Du, Q., & Zhang, X. (2009). Game-theoretic approach for QoS-aware resource competition in wireless networks. In Proceedings of IEEE MILCOM.
7.
Zurück zum Zitat Wu, D., & Negi, R. (2003). Effective capacity: A wireless link model for support of quality of service. IEEE Transactions on Wireless Communications, 2(4), 630–643. Wu, D., & Negi, R. (2003). Effective capacity: A wireless link model for support of quality of service. IEEE Transactions on Wireless Communications, 2(4), 630–643.
8.
Zurück zum Zitat Chen, L., Low, S. H., & Doyle, J. C. (2010). Random access game and medium access control design. IEEE/ACM Transactions Networking, 18(4), 1303–1316.CrossRef Chen, L., Low, S. H., & Doyle, J. C. (2010). Random access game and medium access control design. IEEE/ACM Transactions Networking, 18(4), 1303–1316.CrossRef
9.
Zurück zum Zitat Cui, T., Chen, L., & Low, S. H. (2008). A Game-theoretic framework for medium access control. IEEE Transactions on Selected Areas in Communications, 26(7), 1116.CrossRef Cui, T., Chen, L., & Low, S. H. (2008). A Game-theoretic framework for medium access control. IEEE Transactions on Selected Areas in Communications, 26(7), 1116.CrossRef
10.
Zurück zum Zitat Cho, Y., Hwang, C-S., & Tobagi, F A. (2008). Design of robust random access protocols for wireless networks using game theoretic models. In Proceedings of IEEE INFOCOM, Phoenix, AZ. Cho, Y., Hwang, C-S., & Tobagi, F A. (2008). Design of robust random access protocols for wireless networks using game theoretic models. In Proceedings of IEEE INFOCOM, Phoenix, AZ.
11.
Zurück zum Zitat Tanenbaum, A. S. (2010). Computer networks (pp. 141–148). Eagle Cliffs, US: Prentice Hall. Tanenbaum, A. S. (2010). Computer networks (pp. 141–148). Eagle Cliffs, US: Prentice Hall.
12.
Zurück zum Zitat Ghazvini, M., Movahedinia, N., Jamshidi, K., & Moghim, N. (2013). Game theory applications in CSMA methods. IEEE Communications Surveys and Tutorials, 15(3), 1062–1087.CrossRef Ghazvini, M., Movahedinia, N., Jamshidi, K., & Moghim, N. (2013). Game theory applications in CSMA methods. IEEE Communications Surveys and Tutorials, 15(3), 1062–1087.CrossRef
13.
Zurück zum Zitat Akkarajitsakul, K., Hossain, E., Niyato, D., & Kim, D. (2012). Game theoretic approaches for multiple access in wireless networks: A survey. IEEE Communication Surveys and Tutorials, 13(3), 372–395.CrossRef Akkarajitsakul, K., Hossain, E., Niyato, D., & Kim, D. (2012). Game theoretic approaches for multiple access in wireless networks: A survey. IEEE Communication Surveys and Tutorials, 13(3), 372–395.CrossRef
14.
Zurück zum Zitat Zhang, Y., & Lazos, L. (2013) Countering selfish misbehavior in multi-channel MAC protocols. In Proceedings of IEEE Infocom. Zhang, Y., & Lazos, L. (2013) Countering selfish misbehavior in multi-channel MAC protocols. In Proceedings of IEEE Infocom.
15.
Zurück zum Zitat Huang, J. W., & Krishnamurthy, V. (2010). Transmission control in cognitive radio as a markovian dynamic game: Structural result on randomized threshold policies. IEEE Transactions on Communications, 58(1), 300–310.CrossRef Huang, J. W., & Krishnamurthy, V. (2010). Transmission control in cognitive radio as a markovian dynamic game: Structural result on randomized threshold policies. IEEE Transactions on Communications, 58(1), 300–310.CrossRef
16.
Zurück zum Zitat Huang, J. W., & Krishnamurthy, V. (2009). Game theoretic issues in cognitive radio systems. Journal of Communications, 4(10), 790–802. Huang, J. W., & Krishnamurthy, V. (2009). Game theoretic issues in cognitive radio systems. Journal of Communications, 4(10), 790–802.
17.
Zurück zum Zitat Wu, Y., Wang, B., & Liu, K.J.R. (2008). Repeated spectrum sharing game with self-enforcing truth-telling mechanism. In Proceedings of IEEE ICC (pp. 3583–3587). Wu, Y., Wang, B., & Liu, K.J.R. (2008). Repeated spectrum sharing game with self-enforcing truth-telling mechanism. In Proceedings of IEEE ICC (pp. 3583–3587).
18.
Zurück zum Zitat Inaltekin, H., & Wicker, S. (2006). The analysis of a game theoretic MAC protocol for wireless networks. In Proceedings of IEEE SECON (pp. 296–305). Inaltekin, H., & Wicker, S. (2006). The analysis of a game theoretic MAC protocol for wireless networks. In Proceedings of IEEE SECON (pp. 296–305).
19.
Zurück zum Zitat Cho, Y., & Tobagi, F. A. (2008). Cooperative and non-cooperative ALOHA games with channel capture. In Proceedings of IEEE GLOBCOM (pp. 1–6). Cho, Y., & Tobagi, F. A. (2008). Cooperative and non-cooperative ALOHA games with channel capture. In Proceedings of IEEE GLOBCOM (pp. 1–6).
20.
Zurück zum Zitat Cho, Y., Hwang, C. S., and Tobagi, F. A. (2008). Design of robust random access protocols for wireless networks using game theoretic models. In Proceedings IEEE INFOCOM (pp. 1750–1758). Cho, Y., Hwang, C. S., and Tobagi, F. A. (2008). Design of robust random access protocols for wireless networks using game theoretic models. In Proceedings IEEE INFOCOM (pp. 1750–1758).
21.
Zurück zum Zitat Tian, J. (2014). Game-theory model based on carrier sense multiple access protocol in wireless network. Journal of Networks, 9(6), 1603–1609.CrossRef Tian, J. (2014). Game-theory model based on carrier sense multiple access protocol in wireless network. Journal of Networks, 9(6), 1603–1609.CrossRef
22.
Zurück zum Zitat Nuggehalli, P., Sarkar, M., Kulkarni, K., Rao, R. R.(2008). A game-theoretic analysis of QoS in wireless MAC. In Proceedings IEEE INFOCOM (pp. 1903–1911). Nuggehalli, P., Sarkar, M., Kulkarni, K., Rao, R. R.(2008). A game-theoretic analysis of QoS in wireless MAC. In Proceedings IEEE INFOCOM (pp. 1903–1911).
23.
Zurück zum Zitat Wang, D., Comaniciu, C., Minn, H., & Al-Dhahir, N. (2008). A game-theoretic approach for exploiting multiuser diversity in cooperative slotted aloha. IEEE Transactions on Wireless Communications, 7(11), 4215–4225.CrossRef Wang, D., Comaniciu, C., Minn, H., & Al-Dhahir, N. (2008). A game-theoretic approach for exploiting multiuser diversity in cooperative slotted aloha. IEEE Transactions on Wireless Communications, 7(11), 4215–4225.CrossRef
24.
Zurück zum Zitat Tembine, H., Altaian, E., & El-Azouzi, R.(2007). Delayed evolutionary game dynamics applied to medium access control. In Proceedings of IEEE international conference on mobile adhoc and sensor systems. Tembine, H., Altaian, E., & El-Azouzi, R.(2007). Delayed evolutionary game dynamics applied to medium access control. In Proceedings of IEEE international conference on mobile adhoc and sensor systems.
25.
Zurück zum Zitat Ma, R. T. B., Misra, V., & Rubenstein, D. (2009). An analysis of generalized slotted-ALOHA protocols. IEEE/ACM Transactions on Networking, 17(3), 936–949.CrossRef Ma, R. T. B., Misra, V., & Rubenstein, D. (2009). An analysis of generalized slotted-ALOHA protocols. IEEE/ACM Transactions on Networking, 17(3), 936–949.CrossRef
26.
Zurück zum Zitat Zhang, G., Zhang, H., & Zhao, L. (2007). A novel MAC scheme for wireless LANs from the perspective of game theory. In Proceedings of IET conference on wireless, mobile and sensor networks. Zhang, G., Zhang, H., & Zhao, L. (2007). A novel MAC scheme for wireless LANs from the perspective of game theory. In Proceedings of IET conference on wireless, mobile and sensor networks.
27.
Zurück zum Zitat Chen, L., Low, S. H., & Doyle, J. C. (2007). Contention control: A game-theoretic approach. In Proceedings of 46th IEEE conference on decision and control. Chen, L., Low, S. H., & Doyle, J. C. (2007). Contention control: A game-theoretic approach. In Proceedings of 46th IEEE conference on decision and control.
28.
Zurück zum Zitat Felegyhazi, M., Cagalj, M., & Hubaux, J.-P. (2009). Efficient MAC in cognitive radio systems: A game-theoretic approach. IEEE Transactions on Wireless Communications, 8(4), 1984–1995.CrossRef Felegyhazi, M., Cagalj, M., & Hubaux, J.-P. (2009). Efficient MAC in cognitive radio systems: A game-theoretic approach. IEEE Transactions on Wireless Communications, 8(4), 1984–1995.CrossRef
29.
Zurück zum Zitat Felegyhazi, M. (2007). Noncooperative behavior in wireless networks, Ph.D. dissertation, EPFL, Switzerland. Felegyhazi, M. (2007). Noncooperative behavior in wireless networks, Ph.D. dissertation, EPFL, Switzerland.
30.
Zurück zum Zitat Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking, 14(6), 1167–1178.CrossRef Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking, 14(6), 1167–1178.CrossRef
31.
Zurück zum Zitat Li, H., Grace, D., & Mitchell, P.D. (2010). Collision reduction in cognitive radio using multichannel 1-persistent CSMA combined with reinforcement learning. In Proceedings of fifth international conference on cognitive radio oriented wireless network and communications, France. Li, H., Grace, D., & Mitchell, P.D. (2010). Collision reduction in cognitive radio using multichannel 1-persistent CSMA combined with reinforcement learning. In Proceedings of fifth international conference on cognitive radio oriented wireless network and communications, France.
32.
Zurück zum Zitat Bao, S., & Fujii, T. (2011). Q-learning based p-persistent CSMA MAC protocol for secondary user of cognitive radio networks. In IEEE Third international conference on intelligent networking and collaborative systems (INCoS). Bao, S., & Fujii, T. (2011). Q-learning based p-persistent CSMA MAC protocol for secondary user of cognitive radio networks. In IEEE Third international conference on intelligent networking and collaborative systems (INCoS).
33.
Zurück zum Zitat Shah, S M., Krishna C, A., & Sharma, V. (2016). Resource allocation in a MAC with and without security via game theoretic learning. InIEEE information theory and applicaitons (ITA) Workshop, CA: San Diego. Shah, S M., Krishna C, A., & Sharma, V. (2016). Resource allocation in a MAC with and without security via game theoretic learning. InIEEE information theory and applicaitons (ITA) Workshop, CA: San Diego.
34.
Zurück zum Zitat MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE communications magazine (pp. 126-131). MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE communications magazine (pp. 126-131).
35.
Zurück zum Zitat Watkins, C., & Dayan, P. (1992). Q-learning. Technical Note Machine learning, 8(3–4), 279–292.MATH Watkins, C., & Dayan, P. (1992). Q-learning. Technical Note Machine learning, 8(3–4), 279–292.MATH
36.
Zurück zum Zitat Sutton, Richard S., & Barto, Andrew G. (1998). Reinforcement learning: An introduction. Cambridge: MIT press. Sutton, Richard S., & Barto, Andrew G. (1998). Reinforcement learning: An introduction. Cambridge: MIT press.
37.
Zurück zum Zitat Darmona, E., & Waldeckb, R. (2005). Convergence of reinforcement learning to Nash equilibrium: A search-market experiment. Physica, 335, 119–130.MathSciNetCrossRef Darmona, E., & Waldeckb, R. (2005). Convergence of reinforcement learning to Nash equilibrium: A search-market experiment. Physica, 335, 119–130.MathSciNetCrossRef
38.
Zurück zum Zitat Szepesvári, C. (2010). Algorithms for reinforcement learning. Synthesis Lectures on Artificial Intelligence and Machine Learning, 4(1), 1–103.CrossRefMATH Szepesvári, C. (2010). Algorithms for reinforcement learning. Synthesis Lectures on Artificial Intelligence and Machine Learning, 4(1), 1–103.CrossRefMATH
Metadaten
Titel
A multi-state Q-learning based CSMA MAC protocol for wireless networks
verfasst von
Hossein Bayat-Yeganeh
Vahid Shah-Mansouri
Hamed Kebriaei
Publikationsdatum
16.11.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1402-0

Weitere Artikel der Ausgabe 4/2018

Wireless Networks 4/2018 Zur Ausgabe

Neuer Inhalt