2015
DOI: 10.1002/ett.2989
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement learning‐based clustering protocols for a self‐organising cognitive radio network

Abstract: This paper presents a methodology on how cognitive radio networks can form clusters by exploiting reinforcement learning-based principles. Each node repeatedly senses the received signal strength indicator beacons given off by other nodes in the network. This information can be used by the nodes to learn about its positioning significance within the network and whether to become cluster heads thus forming a cluster. Extensive simulation results are presented, and it is shown that on average, the clustering per… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Specifically, it maximizes the unused budget β unused i,t (see 6) and avoids being removed from the cluster by its clusterhead, which either increases or reduces its trust value. In this intelligent attack, the malicious SU i learns the operating environment by observing its current performance indicator D i t ∈ [0, 1], which is calculated using (5). The performance indicator D i t is uniformly partitioned into four sub-ranges as seen in (13), and so the state of each malicious SU can be represented as follows:…”
Section: A Attack Model Embedded In Each Malicious Sumentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, it maximizes the unused budget β unused i,t (see 6) and avoids being removed from the cluster by its clusterhead, which either increases or reduces its trust value. In this intelligent attack, the malicious SU i learns the operating environment by observing its current performance indicator D i t ∈ [0, 1], which is calculated using (5). The performance indicator D i t is uniformly partitioned into four sub-ranges as seen in (13), and so the state of each malicious SU can be represented as follows:…”
Section: A Attack Model Embedded In Each Malicious Sumentioning
confidence: 99%
“…Leveraging on clustering reduces the signaling overhead in the network, improves routing efficiency by having minimum nodes in the backbone network, reduces update on routing information cost, and eliminates the need to update the PUs' activities network wide [2], [3]. With these significant overhead reductions, the white spaces can be used to enhance network scalability [4], which implies efficient resource utilization [5], [6]. A network is considered scalable when the number of member nodes in a cluster increases or the number of clusters in the network decreases.…”
Section: Introductionmentioning
confidence: 99%