Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment Arash Maskooki1 , Viktor Toldov1,2 , Laurent Clavier2,3 , Valeria Loscr´ı1 , Nathalie Mitton1 1 Inria; 2 Universite ´

´ ecom, ´ ´ ecom ´ Lille 1, IEMN UMR CNRS 8520, IRCICA USR CNRS 3380; 3 Institut Mines-Tel Tel Lille 1 [email protected],2 [email protected], 3 [email protected]

Machine learning approaches have been extensively applied in interference mitigation and cognitive radio devices. In this work, we model the spectrum selection process as a multi-arm bandit problem and apply Thompson sampling, a fast and efficient algorithm, to find the best channel in the shortest time interval. The learning algorithm will work on top of a network layer to efficiently route the event information to the sink.In this work we address the problem on two layers: channel decision layer and network layer. Channel decision layer formulates the channel selection as a multiarm bandit problem. Thomson sampling [2] is a classical solution in Bandit problems. We adapt Thompson sampling to our context and implement it in hardware in the channel selection layer. The network layer uses the results of this channel selection to route data on the specified channel. We formulate channel selection and exploration dilemma as a multi-arm bandit problem. Then, we describe an efficient and simple learning algorithm for the channel selection process. In a multi-arm bandit problem, an agent tries to obtain as much reward as possible by playing the most rewarding arm among N arms. However, each arm rewards randomly upon being played according to an unknown distribution. Hence, the objective is to minimize exploration to find the most rewarding arm. A policy A is an algorithm that defines the actions of the agent usually based on the previous observations. We assume n j to be the number of times jth arm has been played after n steps and µ j to be the expected reward of jth arm. In other words, channel j is found available in average µ j n j times in n j measurements. µ j is associated with the statistics of other networks. To keep track of the other networks statistics, an expiration time can be defined to trigger the search for a new channel. Another criterion to trigger the search for a new channel

is to define a threshold for the number of consecutive unsuccessful channels access after which the user will search for a new channel. Thompson sampling [2] is best understood in Bayasian context. Assume we observed S j , the observation vector, after accessing channel j, n j times. Assuming Bernoulli distribution for each access trial with parameter µ j , the parametric likelihood function for observation vector S j is as follows, p j (S j |µ j ) = µ j t j (1 − µ j )n j −t j ,

(1)

where t j is the number of successful transmissions on jth channel in n trials. Without loss of generality, we use Beta distribution as the prior for the distribution of parameter µ j . This is because Beta distribution is conjugate prior for the likelihood function in Equation (1) which simplifies the derivations [3]. Using Bayes rule we can write, Γ(α+β) p j (S j |µ j ) Γ(α)Γ(β) µ j α−1 (1 − µ j )β−1

p j (µ j |S j ) =

p j (S j )

,

(2)

where, Z ∞

Γ(α) =

xα−1 e−x dx

(3)

0

and α and β are the shape parameters of the Beta distribution; as we assume no prior information on µ j we initialize α = β = 1 which yields uniform distribution. Substituting (1) in (2) yields, p j (µ j |S j ) =

Γ(α+β) Γ(α)Γ(β)

p j (S j )

µ j t j +α−1 (1 − µ j )n j −t j +β−1 .

(4)

α0 = t j + α and β0 = n j − t j + β can re-write (4) as: 0

0

p j (µ j |S j ) = Cµ j α −1 (1 − µ j )β −1

(5)

Substituting the normalizing factor C we obtain, p j (µ j |S j ) = International Conference on Embedded Wireless Systems and Networks (EWSN) 2016 15–17 February, Graz, Austria © 2016 Copyright is held by the authors. Permission is granted for indexing in the ACM Digital Library ISBN: 978-0-9949886-0-7

0 Γ(α0 + β0 ) α0 −1 µj (1 − µ j )β −1 , Γ(α0 )Γ(β0 )

(6)

which is the beta distribution with parameters α0 and β0 , p j (µ j |S j ) = beta(α0 , β0 ).

(7)

Thompson sampling Channel selection algorithm is described in Algorithm 1.

285

Algorithm 1 Thompson Sampling Parameters:

K: total number of accessible channels j: channel index n: total number of channel access s j : current state of the channel j t j : number of successful transmissions so far x j : empirical mean of the channel j states, α: a priori (beta distribution) model parameter β: a priori (beta distribution) model parameter α0 : a posteriori (beta distribution) model parameter α0j = t j + α j

(8)

0

β : a posteriori (beta distribution) model parameter β0j = n j − t j + β j

1: 2: 3: 4: 5: 6: 7: 8:

(9)

TRANSMIT(): Packet transmission function Initialization: for all j do if channel j is busy then sj = 0 else sj = 1 end if update t j , n j , α0j and β0j end for

9: while True do 10: for all j do 11: sample r j ∼ beta(α0j , β0j ) 12: end for 13: m = arg max{r j } 14: if channel m is busy then 15: sm = 0 16: else 17: sm = 1 18: TRANSMIT() 19: end if 20: update t j , n j , α0j and β0j 21: end while

As there is no prior information about the channels, we set α = 1 and β = 1 which yields uniform distribution in [0, 1]. we implemented the in TelosB nodes to measure its performance in real-time. In our setup, we used 3 pairs of laptops occupying 3 orthogonal Wi-Fi channels, 1, 6 and 11 overlapping with standard 802.15.4 channels, 12, 17 and 22 respectively. The traffic was generated using ”Distributed Internet Traffic Generator” [1] in single flow mode with packet size 500 bytes which is the average packet size on the Internet [5]. Two TelosB nodes were programmed in Contiki operating system one with a learning algorithm and one as oracle fixed on the best channel. To generate samples of Beta distribution used in Thompson sampling algorithm we used ”GEN SEQUENCE” open-source library [4]. To monitor the availability rate of the channel we programmed one TelosB node as monitor which just sampled the channel. The availability rate obtained as the average number of samples the channel is detected available. The RSSI sensitivity of TelosB node was set to −40dbm. This relatively high threshold was set to suppress the RSSI received from other networks present in the building. With this sensitivity, the monitor node registers approximately 90% availability rate for the channels. The availability rate of channel 6 drops to approximately 40% when the traffic generator is activated at 2000pkt/sec and packet size of 500 bytes. The availability rate of the channel 1 drops to ap-

286

Figure 1: Relative throughput on three accessible channels using Empirical real-time test-bed.

prox. 60% when the traffic generator occupies the channel with 500pkt/sec. Channel 11 is left without traffic although the server and client were connected. The monitor shows approx. 90% availability on the channel. Note that the channel occupancy rate is affected by our traffic, other networks traffic and noise. However, it was roughly constant during the experiment at the given rates. We programmed two Telosb nodes; one as an oracle which always operated on the channel with the best availability rate. The other node was programmed with the implementation of a learning algorithm to find and use the best channel. In our results, we considered an available channel as a successful transmission. In reality, the packet transmission can be disrupted in the middle of the transmission and cause the transmission to fail. However, the collision will affect the throughput results of all algorithms including the oracle the same way. Hence the comparison results would not be affected. In each set of experiments, we performed 3 experiments where occupancy rate of the channels were permutated. We repeated each experiment 3 times. The relative throughput of each algorithm in each experiment is divided by the oracle performance of the best channel and then averaged over all the experiments for each algorithm. Figure 1 shows the performance of the algorithm. As seen in the figure, the learning algorithm finds the best channel and reaches about 99% of the throughput of the oracle in 0.8 seconds. Results show that Thompson sampling formulation achieves high average throughput as it spends less time on exploring the channels and converges to the best channel fast.

1

References

[1] A. Botta, A. Dainotti, and A. Pescap`e. A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks, 56(15):3531–3547, 2012. [2] O. Chapelle and L. Li. An empirical evaluation of thompson sampling. In Advances in neural information processing systems, pages 2249– 2257, 2011. [3] P. Diaconis, D. Ylvisaker, et al. Conjugate priors for exponential families. The Annals of statistics, 7(2):269–281, 1979. [4] K. Karplus. Online library. [5] K. Thompson, G. J. Miller, and R. Wilder. Wide-area internet traffic patterns and characteristics. Network, iEEE, 11(6):10–23, 1997.

Channel Exploration/Exploitation Based on a Thompson ... - EWSN

Systems and Networks (EWSN) 2016 ... operating system one with a learning algorithm and one as ... We programmed two Telosb nodes; one as an oracle.

152KB Sizes 4 Downloads 240 Views

Recommend Documents

An Adaptive Protocol Stack for High-Dependability based on ... - EWSN
In Wiselib 802.15.4, pack- ets are limited to 116Bytes and as a result, it may include a maximum of 37 neighbors. If we need to operate on a larger neighborhood we can use the Wiselib Fragmenting Radio and transmit beacons larger than a single messag

Side-channel attacks based on linear approximations
intermediate values by query (i.e. power trace) allowing to reduce data complexity ..... an implementation where countermeasures have been added against DPA but limited to ..... Des and differential power analysis (the ”duplication” method).

co-channel speech detection based on wavelet transform
Usable Speech Detection Using Linear Predictive Analysis –. A Model-Based Approach. Nithya Sundaram, Robert E. Yantorno, Brett Y. Smolenski and Ananth ...

Poster: Detection of Wormhole Attack on Wireless Sensor ... - EWSN
Poster: Detection of Wormhole Attack on Wireless Sensor ... wireless sensor nodes are duty-cycling, i.e. they will period- .... Cambridge Unversity Press, 2009.

IoT Meets Robotics - EWSN
emerging applications mixing robotics with the Internet of. Things. Keywords. IoT, Robotics, Cloud Computing. 1 Introduction. The recent years have seen wide interest and innovation in the field of Internet of Things (IoT), triggered by techno- logic

A. Channel Setting - GitHub
B. User ID setting. D. Sleeping Time Setting. E. Mode Setting. Memory Mode. Normal Mode. 8. 9. CHSET. 6. Data Count. 60 Seconds. 5 Minutes. Data Delete.

Demo: Eavesdropping on PolyPoint –Scaling High-Precision ... - EWSN
Systems and Networks (EWSN) 2016 ... teries and Bluetooth communication with a mobile phone. ... The demonstration will affix TriTags to mobile phones.

A NOVEL EVOLUTIONARY ALGORITHMS BASED ON NUMBER ...
Proceedings of the International Conference on Advanced Design and Manufacture. 8-10 January, 2006, Harbin, China. A NOVEL EVOLUTIONARY ...

A NOVEL EVOLUTIONARY ALGORITHMS BASED ON NUMBER ...
Fei Gao. Dep. of Mathematics, Wuhan University of Technology, 430070, P. R .China. E-mail: ... based on Number Theoretic Net for detecting global optimums of.

Cross-Channel Query Recommendation on ...
both researchers and industry companies while considering how to provide better mobile ... ring, MP3, short message, game, software etc. Here, we refer to ... query of “images of Andy Liu” (one famous star) in the MP3 channel, and. “songs of ..

/ CHANNEL(
May 1, 2009 - endpoints in a data network via a monitoring unit and a control unit. .... Nr. 21, (Oct. 1989), Cited on EP Search RepOIt for EP application.

/ CHANNEL(
May 1, 2009 - Huang, G M., et al., “A New Had Algorithm for Optimal Routing of. Hierarchically ... Kieser, H “Software fur eine digitale Vermittlungsanlage mit modularem ... egies between Lost-call-cleared and Reservation Traf?c”, Proceed.

Fractional Optimal Golomb Ruler Based WDM Channel ...
carrier channel and the operating bandwidth would not ... spaced channels, Journal of Lightwave Technology,. Vol. ... Transactions on Information Theory, Vol.

On Holmes-Thompson Area: HT Valuation Theory ...
ON HOLMES-THOMPSON AREA: HT VALUATION THEORY. UNDER MICROSCOPE. LOUIS YANG LIU. 1. Length and Related. The classic Crofton formula is. Length(γ) = 1. 4. ˆ ∞. 0. ˆ 2π. 0. #(γ ∩ l(r, θ))dθdr. (1.1) for any rectifiable curve in Euclidean plan

CESEL: Securing a Mote for 20 Years - EWSN
of modern system-on-a-chip (SoC) designs provides ample space for hardware ..... In Parallel and Distributed Processing Symposium, 2003. Proceedings.

Towards a Secure Key Generation and Storage Framework ... - EWSN
International Conference on Embedded Wireless ..... ported on this technology. Most of .... tional Conference on Advanced Video and Signal-Based Surveillance.

pdf-1835\the-thompson-submachinegun-notes-on-auto-ordnance ...
... more apps... Try one of the apps below to open or edit this item. pdf-1835\the-thompson-submachinegun-notes-on-auto-ordnance-by-james-f-bannan.pdf.

Big Thompson Watershed Coalition
Larimer County and the City of Loveland are undertaking an assessment of recreation and conservation opportunities along the Big Thompson. River, including ...

Big Thompson Watershed Coalition
erosion and sediment deposition, extensive damage to property and critical infrastructure, and loss of significant economic, riparian, aquatic, and scenic resources. Nearly all of the highly used federal, state, county, and city recreation facilities

On Explicit Holmes-Thompson Area Formula in ...
'S“ tF gF Álv—rez €—iv— —nd iF pern—ndeD grofton formul—s —nd qelf—nd tr—nsformsF e™™ept¡e pour pu˜li™—tion d—ns ƒele™t— w—them—ti™—D PIppF. 'T“ tF gF Álv—rez €—iv— —nd iF pern—ndeD groft

a new color image cryptosystem based on a ... - Semantic Scholar
is used to build a new digital chaotic cryptosystem. The characteristics of PWLCM are very suitable for the de- sign of encryption schemes. The implicit digital ...