Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

A game-theoretic approach for opportunistic transmission scheme in cognitive radio networks with incomplete information

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Tan, X.J. ; Nat. Key Lab. of Sci. & Technol. on Commun., Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Liang Li ; Wei Guo

One of the key issues in cognitive transmission is for secondary users to dynamically acquire spare spectrum from the primary user and then select appropriate transmission schemes. The existing spectrum sharing scheme adopts a deterministic Cournot game to formulate this problem, of which the solution is Nash equilibrium. This formulation implicitly assumes that each secondary user is willing to fully exchange transmission parameters with all other users and hence knows the complete information of all others. However, this assumption may not be true in general. To remedy this, the present paper considers a more realistic assumption of incomplete information, i.e., each secondary user may choose to conceal its private information for achieving higher transmission benefit. Following this assumption, we adopt a probabilistic Cournot game to propose an opportunistic transmission scheme to maximize the transmission benefit of all secondary users. Bayesian equilibrium is considered as the solution of this game. Moreover, we rigorously prove that a secondary user can improve its expected transmission benefit by actively hiding its private transmission parameters and increasing the variance of its allocated spectrum.

Published in:

Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), 2011 Sixth International ICST Conference on

Date of Conference:

1-3 June 2011