Figures
Abstract
The Internet of Things (IoT) has revolutionized the connectivity of physical devices, leading to an exponential increase in multimedia wireless traffic and creating substantial demand for radio spectrum. Given the inherent scarcity of available spectrum, Cognitive Radio (CR)-assisted IoT emerges as a promising solution to optimize spectrum utilization through cooperation between cognitive and IoT nodes. Unlicensed IoT nodes can opportunistically access licensed spectrum bands without causing interference to licensed users. However, energy constraints may lead to reduced cooperation from IoT nodes during the search for vacant channels, as they aim to conserve battery life. To address this issue, we propose a Punishment-reward-based Cooperative Sensing and Data Forwarding (PR-CSDF) approach for IoT data transmission. Our method involves two key steps: (1) distributing sensing tasks among IoT nodes and (2) enhancing cooperation through a reward and punishment strategy. Evaluation results demonstrate that both secondary users (SUs) and IoT nodes achieve significant utility gains with the proposed mechanism, providing strong incentives for cooperative behaviour.
Citation: Sangi AR, Li B, Anamalamudi S, Carie A (2024) Monitoring and enhancing the co-operation of IoT network rhrough scheduling function based punishment reward strategy. PLoS ONE 19(9): e0309123. https://doi.org/10.1371/journal.pone.0309123
Editor: Dhananjay Singh, Saint Louis University, UNITED STATES OF AMERICA
Received: March 13, 2024; Accepted: August 6, 2024; Published: September 19, 2024
Copyright: © 2024 Sangi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper and its Supporting information files.
Funding: This work is supported by Wenzhou-Kean University Internal (Faculty/Staff) Research Support Programs (IRSPC2023006).
Competing interests: NO authors have competing interests.
1 Introduction
The rapid advancements in wireless communication have set off new paradigms in wireless networking. Currently, the research community is focusing on 5G to provide mobile broadband services in wireless networks for providing internet connectivity from every electronic device to IoT nodes [1]. IoT, which is a key feature of the 5G wireless network that provides internet connectivity to physical devices, has been able to realize the requirements of a smart city. The smart city mission is to deploy IoT nodes in the interested regions like hospitals, transportation applications, security applications, and power grids for monitoring and collecting data as well as for efficient management [2]. The focus is on addressing the challenges posed by the massive amount of data generated by IoT devices [3]. The integrated communication and information technologies are used in managing the city as shown in Fig 1.
Nevertheless, the use of IoT technology in realizing smart cities comes along with a set of challenges. According to [4], the number of devices that will be connected to the internet by 2025 will be 75.44 billion worldwide. Because of it, there will be a huge increase in multimedia wireless traffic which leads to an increase in the demand for the required natural available spectrum that causes spectrum shortage. The primary reason for the spectrum scarcity is due to fixed static channel allocation strategy and increased demand for spectrum access in the latest wireless technologies [5]. To handle the spectrum scarcity problem, the existing spectrum bands (licensed and unlicensed) should be efficiently utilized. Cognitive radio-assisted wireless devices can access the licensed channel opportunistically to alleviate the existing spectrum scarcity problem by allowing unlicensed users to access the licensed channel [6]. In other words, when the licensed user is idle at a particular geographical location with respect to time then the cognitive user can access the channel without causing interference to the licensed primary user.
1.1 Motivation
In cognitive radio-assisted IoT networks, two important aspects have to consider: first is task allocation and the second is cooperation among cognitive IoT nodes. Cognitive nodes need to distribute the sensing task among the neighbouring sensing nodes for distributed communication. Numerous task allocation approaches have been studied in state-of-the-art traditional wireless networks [7]. However, the existing approaches cannot be directly applied to IoT networks due to constrained node resources and special wireless scenarios. The design of the task allocation approach for cognitive IoT is ongoing research [8]. Subsequently, how mutual cooperation can be achieved in between cognitive node and IoT nodes has to be explored to have interference-free communication. Recently, cooperation among the wireless nodes to exchange both the application data and spectrum-related information has been explored in [9]. In [10], the performance of the IoT network is being enhanced by allowing the primary user’s licensed channel access to an unlicensed user with the condition that the unlicensed user cooperates by acting as a relay for edge licensed nodes. Since the network adapters are more and more modifiable, it allows selfish nodes to tinker with the wireless interface and maximizes their own benefit. This leads to natural and important design issues like: how to deal with selfish nodes? and what if the majority of nodes are selfish? Thus, this paper works on two important issues namely 1. Nodes in Cognitive IoT need to distribute the sensing task among the neighbour sensing nodes with unknown nature and 2. To deal with the selfish nodes within the network.
1.2 Limitations in existing work
With respect to a task allocation, studies focus to select a group of nodes to complete a global application cooperatively by using genetic algorithm (GA) [11] or partial swarm optimization (PSO) [12]. Other models are proposed by modifying PSO, GA where the models suppose to know all the network parameters in advance. However, in a network with autonomous nodes whose behaviour is based on their current state, it is difficult to solve this requirement in a real-world IoT scenario.
State-of-the-art research has shown that selfish nodes seriously deter the performance of the network [13–15]. In general, there are three ways that have been used to deal with selfishness in ad-hoc networks in the literature a) precautions of selfish nodes [16]; b) detection of selfish nodes [17, 18]; c) avoidance of selfish nodes [19]. Each of these approaches has its own unique advantages and disadvantages. Lin et al. [20] proposed CONFIDANT algorithm which acquires reputation value and excludes network method to penalize non-cooperative nodes. In [21], security mechanisms have been implemented to stop nodes from tampering with vital information. Most of the existing research solves the selfishness issue in IoT nodes by using model-based data forwarding scenarios i.e., a node is considered to be selfish in case it does not forward data to the neighbour node. Otherwise, it is considered as the cooperating node. In [22], author addresses the limitations of IPv6 RPL in IoT networks’ extreme conditions and introduces Dynamic-RPL. With minimal changes to RPL, Dynamic-RPL ensures high network performance, adaptability to adverse conditions, and efficient topology management. Different from previous studies, in this work, we address the selfishness in IoT nodes by analyzing the node’s unwillingness to cooperate with the cognitive node in identifying the vacant licensed bands.
It is noteworthy that selfishness in cognitive radio-assisted IoT scenarios is different from selfishness in the traditional wireless network in terms of channel allocation. In a traditional network, when node acts selfishly, it can save its energy and prolong the battery lifetime. But in the case of selfishness in cognitive radio wireless networks, there can be an interference with primary users(PU) by not co-operating the data transmission in an opportunistic licensed channel [23]. Even though literature work addresses the issue of selfish nodes in a wireless network, little work has been done in terms of setting specific rules to regulate in terms of energy conservation and truthfulness. Thus, how to identify the selfish node activity which results in increasing the lifetime of IoT nodes will be addressed in this paper.
1.3 Proposed solution
From Fig 2, cognitive nodes are going to act as cluster heads for the IoT nodes. Cognitive nodes distribute the sensing task to the neighbour IoT nodes while the participating IoT nodes can contribute to the sensing licensed channel. To address task allocation and selfish node detection, this paper proposes a game theory-based cooperative model for IoT nodes to participate in sensing tasks initiated by cognitive nodes. Firstly, we use the auction model to assign tasks and assign a reward to IoT nodes. Subsequently, for enhancing cooperation, the cognitive node rewards selfless IoT nodes based on shapely value and punishes the selfish IoT nodes based on trust value. The key concepts of this paper are summarized as follows:
In this paper, we propose a cooperative-based model for users in fog and cloud computing to participate in tasks published by an application platform. In the formulation process, the participating users can contribute to the tasks, and the tasks will pay the users rewards. The reward to the users in this paper is defined to have a relationship with region density. The proposed idea is a two-step approach to deal with selfish nodes. In the first step, we use a prevention mechanism where the cognitive node scans the network frequently to discover the selfishness. In the second step, we use an avoidance mechanism that will promote cooperation among the IoT nodes using a reward and punishment strategy. Thus we are motivated to develop a mechanism for selfish nodes in the cognitive IoT network using a game-theoretic approach to improve the cooperation with constraints on energy. In this paper, we have two mechanisms namely 1) frequency of monitoring and 2) promotion of cooperation through punishment and reward [24]. The cooperative mechanism uses two partial and full monitoring to understand the behaviour of the nodes. The key concepts of this paper are summarized as follows:
- (1). The players of the game are IoT nodes that enable to choose in between two strategies. One is to cooperate with the cognitive node and the other is to defect. Cooperation and defection have an impact on the quality of the licensed channel in terms of throughput.
- (2). Auction mechanism is used by a cognitive node for the distribution of sensing tasks among the IoT nodes.
- (3). Monitoring the behaviour of nodes requires energy, thus monitoring nodes need to know optimal monitoring frequency to save energy and identify the nodes’ behaviour.
- (4). To promote cooperation in the network and reduce selfish nodes, the identification of selfish nodes is necessary. Partial and full monitoring is used to punish selfish nodes and reward cooperative nodes.
- (5). Proposed ‘Malicious node metrics’ to identify and reduce the occurrence of Malicious nodes.
The rest of the paper is organized as follows: Section 2 introduces the theoretical basis and specific process of the PR-CSDF mechanism. Section 3 provides the pseudocode of proposed algorithms in the paper. The performance of the proposed work is evaluated in Section 4 and Finally, Section 5 concludes the paper with outlines of our future work.
2 System model
2.1 Problem scenario
The network topology consists of the secondary network consisting of IoT nodes, cognitive nodes(CNs) co-existing with the primary network with primary users(PUs) as shown in Fig 2. Cognitive nodes are allowed to access the PU licensed channel when it is not used by primary users(overlay access) or with limited power without causing interference to the ongoing PU transmissions(underlay access). However, cognitive nodes need to sense the licensed channel to identify spectrum opportunities and avoid interference with PUs. Sometimes CN cannot detect the presence of primary transmitters due to hidden terminal problems. Thus, cooperative strategies are preferred for sensing primary user transmissions. Here, the CN node distributes the sensing tasks to the nearby IoT nodes and rewards them with the opportunity to transmit in a licensed channel. This reward is the motivation for IoT nodes, as unlicensed channels are not reliable for data transmissions and IoT nodes need to do multiple re-transmission. Thus, cooperation gives benefits to both cognitive nodes and IoT nodes, notation used are given in Table 1.
2.2 Overview of proposed solution
In Fig 3, to capture the interaction between CN and IoT nodes, we have used multi-auction where CN is the auctioneer and IoT nodes are bidders (2.4.2). The cognitive node which is auctioneer broadcasts the sensing task to the neighbouring IoT nodes. Rational IoT nodes which are bidders send the bid B = B1, B2, B3, B4, …., Bn, Bi denotes the amount of sensing time allocated to cognitive node. Every IoT node sends its bid values to obtain rewards from CN with the promise of its contribution. More specifically, the sensing time they are willing to offer. By analysing the payoff of CN and IoT nodes, the upper bound and lower bound of feasible bids are calculated by energy consumption in the licensed and unlicensed channels. In such a way, tasks will be assigned to selfless nodes in most cases. But, selfish IoT nodes in the network impact the system performance.
A game theory model based on the IoT node’s behaviors(i.e, selfish or selfless) and the corresponding payoff is built. Using this model, we understand that both reward and punishment strategies need to be applied. It provides the direction for the next modeling. Meanwhile, the optimal monitoring frequency formula is presented with the analysis process of the payoff matrix. This formula can help CN to avoid unnecessary energy consumption while dynamic frequency is employed in every round.
The cooperation process which includes reward and punishment mechanisms has three aspects. At First, indirect trust values will put forward to adjust the frequency. Secondly, nodes are rewarded with additional sensing using shapely values. In the end, over a period of time, CN analyzes the data sent by its own monitoring data, i.e., its direct trust value, and punishes the selfish IoT nodes. Trust value is a credit record for previous behaviors. CN decides whether or not to punish and which degree of punishment will be chosen by direct trust value and change the frequency value by indirect trust value. To deal with selfish IoT nodes, a reward and punishment strategy is applied. Here, CN monitors selfish IoT nodes using the optimal frequency formula in order to avoid unnecessary energy consumption. A game theory model based on the behaviors and the corresponding payoff is built to find the best strategy to deal with selfish IoT nodes. Both reward and punishment should be applied according to the analysis result. Furthermore, the optimal frequency formula is given in the meantime.
In the course of the system’s operation, it may be more likely to develop malicious nodes as the number of selfish nodes increase. The exert of malicious nodes identification will reduce the benefit to transform into malicious nodes, and thus, reduce the likelihood of the appearance of malicious nodes and affecting the system stability. Combination with cluster algorithm, similarity, and maximum clique makes it possible to quantify the clique phenomena and monitor them subsequently.
2.3 Game process
There are two ways to promote the cooperation between CN and IoT nodes: reward and punishment. It is obvious that cooperation cannot be achieved just with punishment and no reward. However, monitoring is required for selfish nodes, which is energy-consuming. Thus, the question arises whether CN needs to do monitoring or not.
Firstly, we focus on the behavior of cognitive nodes and IoT nodes. Since, the main objective is cooperation and energy saving, the following payoff matrix (Table 2) is constructed by the analysis of energy loss.
In signifies the income with no monitoring. Likewise, Ip, If signify that with partial and full monitoring respectively. P signifies that the punishment for IoT nodes. It’s shown in Table 3. Cfc signifies that the consumption of finding the channel. R signifies that the reward for the contribution of IoT nodes. Cf means that the consumption of forwarding data for IoT nodes. Cpm, Cfm mean that the consumption of partial monitoring and full monitoring, respectively. Igc means that the income of getting channels.
For each unit contribution, there is no difference between the defection portion of incomplete cooperation and defection itself. Similarly, they are the same between the cooperation portion of incomplete cooperation and cooperation itself. On this basis, in Table 2, we define “Defection” as complete non-cooperation, that is to say, those IoT nodes will make no sensing. Likewise, ‘Cooperation’ is defined as complete cooperation.
In addition, Partial monitoring refers to considering indirect trust value and Full monitoring refers to considering both direct trust value and indirect trust value. (Shown in section 2.5.1), Fig 4.
- (1). No monitoring (no reward and no punishment):
To analyse this topic concisely, we can simplify Tables 2 to 4.
Given the benefits of selfish behaviors, when CN does not monitor IoT nodes, the dominant strategy of IoT nodes will be “Defection”, and (no monitor, defection) is the nash equilibrium. This is harmful for the cognitive node and contrary to the rule of global benefit maximization. So we need to take precautionary measures to change this situation. The next issue is which strategy to choose, only motivation, only punishment, or both of them. - (2). With the only reward (no punishment):
In this item, simplifying Tables 2 to 5 first.
From the perspective of energy consumption, CN should not use more energy to reward than the required energy used to sense i.e., cognitive node needs to gain positive earnings. That is, R + Cf < Igc and Cfc > R.
Although the earnings from cooperation increase, the dominant strategy is still ‘Defection’. So motivation alone is not enough.
But, it doesn’t mean that stimulation is utterly useless. First, SNs have some data that they want to send out, which require more energy for transmission in an unlicensed channel. The real values of R are not the same for all SNs. Consumption is only a perspective, just more objective, and representative. Besides, this is a repeated game, in the real world, according to experiments in behavioural game theory, we can know that users tend to show their side of goodness when they assume that others are good-intended. Nodes will be inclined to choose cooperation overall.
Simulation is effective but not enough. Meanwhile, we should consider punishment. Because through this way, we can let the nash equilibrium closer to cooperation.
The above discussions provide insights in identifying selfish SNs by monitoring. - (3). With both reward and punishment:
In summary, using both punishment and motivation is more appropriate, like Table 2.
In this scenario, as the frequency of monitoring increases, the income of choosing to be selfish decreases. When the frequency reaches a number, the income of being selfish or selfless will be the same. Thus, being selfless is a dominant strategy, now the question is how often should cognitive nodes monitor.
We assume that there exists IoT nodes and a single cognitive node(CN) in the cognitive IoT network which is allowed to access the PU licensed channels with mutual cooperation. The licensed channel is separated into M sub-bands, unlicensed users (CN and SN) can access the vacant M sub-bands in the absence of the licensed user. For the cognitive node to access the licensed channel it needs to sense all the M bands in order to make the access decision. Due to limited battery power, IoT nodes and CNs try to conserve their energy. In the proposed model, the CN distributes sensing tasks to IoT nodes surrounding it and provides them with access to the licensed channel. In this network, we assume that number of IoT nodes is K which are divided into two groups. cooperators (Cg) help in sensing the licensed channel and defectors(Dg) do not help in sensing the licensed channel. The probability of false alarm PF is equal to all IoT nodes.
After one round, the cognitive node will count the contribution of every IoT node. Later, the cognitive node will use shapely values to calculate the assistance’s importance. In the next round, the cognitive node allocates redundant transmission time based on individual contribution. The node whose credit degree is lower than the threshold will be refused to cooperate.
2.3.1 The frequency of monitoring.
Monitoring behaviour of IoT nodes is energy-consuming. So the question is how often should we monitor?
Table 2 illustrates that partial monitoring can bring out some benefits, and based on Algorithm 4, we know the energy consumption of indirect trust value is extremely little. With indirect trust value, it can deter selfish behaviors and it is effective. When there is no mechanism to fill up the gap between twice Full monitoring then the frequency of Full monitoring would increase or taking other measures to reduce the number of selfish behaviors. In other words, it reduces the benefit of defection. But these two ways are more energy-intensive than Partial monitor. Therefore, Partial monitoring will run all the time and we will calculate the frequency of Full monitoring in order to save the node energy.
When the expectation of earnings from selfish and selfless behaviors are equal then IoT nodes will have no inclination to be selfish. This is because selfish behaviors will bring no extra earnings compared with selfless behaviors and there is a risk of being regarded as selfish nodes. When a node’s direct trust value (Shown in section 2.5.1) is lower than the threshold then it will be regarded as a selfish node and the cognitive node will refuse to cooperate with it. In this case, defection has become a weakly-dominated strategy.
Further, we decide to calculate frequency by considering no monitoring and full monitoring. Indirect threats are not always effective in the real world by the reason of incompletely rational. In order to achieve our goal mentioned before, thinking about the worst situation is proper. In this sense, the natural corollary is that we can use In to replace Ip and If, and now it’s the income of no sense.
As stated previously, it’s feasible to make Partial monitoring in every time slot. Thus, when we consider the frequency of monitoring, it should be replaced with Full monitoring with the following payoff matrix Table 6 consideration.
In order to make nodes selfless, we should make it impossible to profit by choosing to be selfish. When the income that was obtained by the node to be selfish or selfless are equal then the IoT nodes have no incentive to be selfish. In this sense, their expectations are equal.
Follow the above train of thought, we suppose that the possibility of Full monitoring is P, then the possibility of No monitoring is 1 − P.
(1)
On the basis of previous discussion, we also know:
Therefore, Eq (1) always has a solution, and only one solution.
The optimal frequency theoretically is .
According to Table 3, P is regarded as 3Cfc, and R will be calculated based on the contribution of last round and extra reward (Section 2.5.2). Moreover, an extra reward can be preset or changed dynamically depending on the situation. These assumptions correspond with real-world scenarios.
2.4 Assign sensing tasks
In a IoT network with selfish nodes, when the sensing task gets allocated to the nodes without considering their nature then the tasks assigned for selfish nodes will not be accomplished. Thus, tasks need to be assigned to nodes considering their nature where the auction mechanism meets this requirement.
2.4.1 Behaviors and results of CN and IoT nodes.
In the auction mechanism, CN broadcasts the information of assigning tasks and IoT nodes to choose and accept tasks according to their own situation i.e., nature. Generally, selfless SNs tend to accept more tasks.
2.4.2 Auction model for assigning sense tasks.
A set of tasks to be assigned is represented as A = A1, A2……Am with m = 1, 2…… The task which is an auction item is actually reward converted from a basic resource necessity for running tasks. IoT nodes will bid on the resource of running tasks, generally the sensing time, which also means the minimum contribution required of bidders(IoT nodes) in one round. And B = B1, B2……Bn with n = 1, 2….. denotes the bids of IoT nodes. At the same time, IoT nodes have different private values for the same auction item. Due to divergent channel quality, various demand of forwarding, its own residual energy and something else, there is different degrees of importance attached by IoT nodes. V = V1, V2……Vn with n = 1, 2….. is used to express this diversity. Hence, the bids mainly depend on their own private values.
Firstly, we consider using an auction game to assign the task of sensing channel. Here, the bid represents the minimum contribution standard of a node. See Table 7 for the details. The Frame format of cognitive nodes auction can be seen in Fig 5. We propose a co-operation promotion mechanism, where each frame is divided into fixed time intervals. At time Tauc, cognitive node (CN) conducts auction in multiple direction. The IoT nodes that receive the auction request bid using cost formulation, i.e, based on the energy level, wastage of energy in unlicensed transmission due to high interference. At the second part of the Time frame Ts, the cooperating IoT nodes perform PU spectrum sensing. Next, during time Tr the cooperating IoT nodes send data to CN, where CN fuses the data received from the IoT nodes and makes a decision on the channel. When the channel is available, CN transmits its own data during time Tcr. While IoT node data is in time TSN, which is the reward for the cooperation.
Both CN and IoT nodes desire to reduce energy consumption. Comparing with the sensing channel by CN itself, it will not consume more required energy to reward in the auction stage. In this sense, CN will be motivated to hold an auction only when it can save its energy after this stage. Further, CN will not accept the bids which are lower than the required energy that CN senses channel by its own self. This is the lower bound of bids for every SN. Similarly, IoT nodes also hope that they can cost less energy than forwarding in unlicensed channels. We assume that the bids of IoT nodes obey Normal Distribution subjected to [El, Eul] whereas El, Eul represent the energy cost in licensed or unlicensed channel (Section 2.4.3).
For the discussion of Section 2.4.4-Lemma2, we decide to add reserve price in the early stage and call it off in the later.
2.4.3 Energy consumption analysis.
The consumption of one transmission is as follows:
(2)
d is distance. L is the number of bits. Etx is the transmit energy consumed per bit. ϵfs refers to free-space power loss and ϵmp refers to multi-path fading channel.
In our case, Etx, ϵfs, ϵmp, and d are constants.
Given the possibility of transmitting unsuccessfully, the total energy consumption for one transmission is equal to “the energy consumption of one transmission ⋅ (re-transmitting number + 1)”.
Here, Etotal = ETX ⋅ (m + 1). m is different for forwarding package in licensed channel and unlicensed channel.
The probability of re-transmitting in the licensed channel is 30%. Therefore, the number of re-transmissions ml is looked upon as (also equal to
.
The probability of re-transmitting in the licensed channel is given by the following formula ([25]):
ml represents the number of re-transmissions. Po shows the probability of re-transmission timeout. Another aspect of forwarding is transmitting in the unlicensed channel. The transmissions formula for unlicensed channel is as follow ([26]):
(3)
m is the attempts. α is the path loss exponent. λ represents the network density. ϵ represents the maximum acceptable error rate. The channel quality of licensed channels should be higher than that of unlicensed channels. Namely, the expected number of re-transmission in an unlicensed channel is supposed to be larger than the licensed channel. Therefore, mul > 0.43 always stand up. In summary, the total consumption is
(4)
2.4.4 The lemma of auction model.
Lemma 1. All bidders will bid on their ideas without cheating.
Lemma 2. At first, it is beneficial for the cognitive node to set a reserve price. But if the energy of IoT nodes is low and some IoT nodes may choose to be out of this auction, the cognitive node should call reserve price off
Proof: The basic settings are shown in Table 7. The basic assumptions are shown in the following.
- (1). Private price: All IoT nodes have its private value, this value isn’t affected by other nodes value and it is unknown to other nodes.
- (2). Independence of variables:Point distribution function of v1, v2…vk is:
- (3). For ∀i, j, F(vi) = F(vj)
- (4). All IoT nodes are risk-neutral
- (5). Variation: SNs decide its bid value without the influence from other tnode’s and the bid is continuous variables, so there is very little chance of tied bids.
- (6). Tie Situation: when two or more nodes offer the same bids, the auction item will be randomly assigned to a node.
Moreover, to some extent, IoT nodes are risk-averse. In another way, multi-auctions will make IoT nodes that do not get any auction item anxious. Due to that, a node which is risk-averse will offer a higher bid than that which is risk-neutral. Hence, this is better for the cognitive node. Thus, we can think of risk-averse SNs as risk-neutral with no negative impact on CN.
In this model, the expected income of IoT node i is
(5)
b(2) means the second highest bid. And as mentioned before, for this model, the best strategy is fi(vi) = bi = vi. So Eq 5
Given if a IoT nodes’ private price is a, it can’t offer a price lower than a, so let fi(a) = a.
For briefness, assuming bi ∈ [0, 1]. This is because that any interval can be generalized by (In our paper, we use ).
Support that the best reserve price has been worked out. Its result is the solution of
(6)
R represents the reserve price. v0 signifies the private value of the cognitive node.
So the next question is: What’s the value of v0?
Sensing nodes need to forward their data with the cognitive node’s help while the cognitive node is looking forward to saving energy through the perception of IoT nodes. Because of the cognitive node’s monopoly position in the aspect of forwarding data, the cost of channel sensing must be more than or equal to the energy for the data that need forward by the cognitive node. Meanwhile, it is reasonable to assume that all IoT nodes always have data to forward, so such a transaction will always exist.
The following conclusions can be drawn from the above: for IoT nodes, it bids should be more than and equal to the energy used to forward(their value on the interval [a, b]). For the cognitive node, its reserve is equal to the cost used to help IoT nodes. In other words, it’s a. At the same time, we assume a is 0. It is possible to state that the conclusion is:
This moment, the expected payment of IoT node is
The expected income of cognitive node is
Lemma 3. Because participating in the auction will consume energy, some IoT nodes will not choose to take part in the auction if they think the reserve price is high and they can’t win. So when there are n IoT nodes participate in this auction, then the expectation is (7)
In the light of the formula (7), we can know that the more nodes join, the more income the cognitive node can gain. But cancelling the reserve price will lose some benefits. So the question is changed to, “Is the lost income by cancelling the reserve price more than benefit from more nodes participating”. Consider an extreme case, is it still worth if only one more node participates? means the expectation which don’t involve reserve price.
(8)
For k ≥ 1, formula (5) is always true. And is monotone increasing, so as long as eliminating the reserve price makes the auction more crowded its justifiable.
2.5 Cooperation mechanism
To improve cooperation and robustness, the core issue is with selfish nodes. First, CN should choose which strategies need to be selected. Thus, we proposed mechanisms for strategies selected separately can be seen in Fig 6. Later, the case that majority of nodes are selfish is considered final.
2.5.1 Trust value.
Before diving into the frequency of monitoring, quantitative analysis for cooperation need to be solved, That is, the rewards and punishments process and rules. We can calculate and analyse the payoffs in various cases where monitor mechanisms and risks are clearly stated.
In this section, we describe the proposed method, which deals with the challenge that, most of the IoT nodes only provide information about a few channels.
- (1). Direct trust value:
In every round, the cognitive node decides to monitor at the frequency which has been calculated at the end of the last round by 2.3.1. In round 1, the cognitive node monitors all IoT nodes.
When the cognitive node finds nodes as selfish behavior, then the IoT node’s direct trust value will be reduced by 1. Otherwise, the value will be increased by 1.We program multi-threshold in order to make the system more fair and rational. (have reduced similarity)
- (2). Indirect trust value:
Sense nodes have their interactions, so they have their own comments on other nodes. To make our model fair, we should consider these comments. In our paper, it is called ‘indirect trust value’(9)
We assume that the amount of successful cooperation is Nc. On the contrary, the amount of selfish behaviors is Nd. Proij indicates the probability of being trusted.
In this scenario, as selfish behavior happens, the Pro reduces. It means, thealso reduces.
In addition, using Eq (9) is propitious to prompt interactions among IoT nodes because the number of interactions is a key parameter in the calculation of indirect trust value.
And assumingThis matrix is convergent. (With the continuous implementation of our system, the behaviors will tend to be selfish. It will cause smaller standard deviation and accelerate convergence rate.) Assuming the convergence matrix is following:
(10) It’s a sparse matrix. So we plan to smooth it first. Therefore, we change (10) into
I is the identity matrix.
The percent of nodei points that the location ofin all direct trust values when they are from smallest to largest. Because a node with higher
is less possible to choose selfish behaviors, the lower weight (Table 8) is given to them.
2.5.2 Reward(Shapely).
Apart from the sensing task assigned in the auction slot, SNs are capable to do additional sensing provided they get a satisfactory reward. This is the result, CN wants to achieve(SNs can be motivated to sense channel by reward). Besides, the conclusion of Section 2.3 has universality. Given that the punishment mechanism is applied throughout all time slots, the reward for extra contribution is necessary.
We suppose that the number of participators is I = {1, 2, 3……n}, s is a subset of I, l(s) is the reward for this subset, φi(l) is the reward of i, φ(l) = (φ1(l), φ2(l)……φn(l)) is the total lucre, |s| means the cardinal number of s.
It’s obvious that l(∅) = 0 and l(s1 ⋃ s2) ≥ l(s1) + l(s2). When a model can meet the following four axioms, it must have a unique solution of Shapely value.
Axiom1: Assuming π is a permutation of I, s = {1, 2……i}, πs = {π1, π2……πi}, we can draw a conclusion that φπs(πl) = φs(l) must be accurate. Say in other words, the lucre of a participator isn’t related to its rank.
Axiom3: for Si = {sj|i ∈ sj, sj ⊂ I}. If ∀sj, l(sj\i) = l(sj) ⇒ φi(l) = 0
Axiom4: φ(l1) + φ(l2) = φ(l1 + l2) The reward will be figured out by formula(11).
(11)
After each round, the CN uses the ‘Shapely value’ to assign a reward for each node based on its contribution. Subsequently, within the next round, each SN can get access to forwarding data in the licensed channel and limit the total data volume to no more than overall the reward obtains from auctions and shapely value phase.
The final value of the contribution is calculated by x1.5. x is sensing time that a certain SN devotes for CN(The setting of ‘1.5’ makes the marginal utility of making one more unit sensing increases).
Although this model with such an assumption can be replaced in another way, it’s still worth using it to provide a framework and cost less energy with simple assumptions.
Additionally, to balance the consumption of the whole network, it is necessary to consider the remaining energy of every node and give them weight based on it. Because our purpose is balance, scilicet, lets each node contribute the same amount of energy as much as possible. On the basis of Section 2.5.2, We set
2.5.3 Punish for selfish IoT nodes.
The specific measures are shown in Table 3. And MP(Monitoring and punishing process) process is presented as follows:
- (1). Sensing nodes do bidding in the auction and sensing for CN and send results.
- (2). Bad IoT nodes send wrong results to CN(other nodes can observe this information) to save energy.
- (3). When neighbors observe this information they store it in their database as correct information or wrong information.
- (4). Neighbor nodes send their data and information about its neighbors to CN.
- (5). CN analyzes this information over a period of time to find selfish behaviors and punish those SNs.
In our paper, there are two trust value models to evaluate the character of IoT nodes and decide how to deal with them. Direct trust value is gained by the cognitive node and used to give weight to the frequency we identified before. Indirect trust value is from the interactions of IoT nodes and the role in analyzing the character of IoT nodes.
At the same time, if the direct trust value is lower than the threshold that we predetermined then the cognitive node will refuse to cooperate.
2.6 Identify malicious nodes
The reliability of indirect trust value will decrease with the increase in the number of selfish SNs and these SNs are more likely to form cliques and cheat CN together. Meanwhile, the absence of a mechanism to regulate such cases will reduce the robustness of the system.
In this paper, we define “malicious node” as a IoT node that provides false indirect trust value to cognitive, that is, giving members of its clique high values but low values to others deliberately.
In the context of such a scenario, selfish nodes will be given low indirect trust values by other IoT nodes and the frequency of monitoring from cognitive will increase. But if there is no strategy to identify fake values and punish providers, selfish nodes are tilting toward to form a clique and be malicious nodes.
Accordingly, it’s indispensable to build a model to prevent IoT nodes from being malicious nodes. To this end, we design the following method:
- (1). Clustering indirect trust values:
First, K–meansClusteringalgorithm will be used to classify them into two groups: highvaluegroup and lowvaluegroup. Then, the initial point is set between 0.05 and 0.95.
In contrast to other clustering algorithms, it costs lower energy and it’s faster by reason of simplicity. It’s not wealthy to achieve a better clustering with much more energy consumption. The main weakness with this algorithm is following:
- In general, people don’t know clearly how many initial points we should cluster.
- It’s difficult to learn which point should be confirmed at the beginning.
- It’s an input-sensitive algorithm for outliers, noises, isolated points, and so on.
- (2). Quantify and analyze:
In the beginning, we quantify the relationship between IoT nodes and these two groups by the following function.Due to the aforementioned feature of malicious nodes, the IoT nodes in the same clique will have the same indirect trust value table. In this context, we can analyze through calculating the similarity of the value table among these nodes. ‘Cosine Similarity’ is an attempt to account for the similarity between two vectors.
- (3). Clique partition:
Thirdly, regarding all nodes as points in a graph and creating connections lines between two points if their similarity is more than 90%. Thus, it’s easy to find the cliques in this graph, and the cognitive node will choose a node in every clique, with members nodes larger than 5 randomly, to judge whether it’s a malicious node. If so, the cognitive node will monitor all nodes in this clique. Otherwise, the cognitive node will stop monitoring.
When the number of members in a clique is smaller than 5, we need not care about it. It is possible that there are a few selfless neighbor nodes and they communicate with similar SNs. As a result, those neighbor SNs have similar behaviors, trust values, and so forth although they are willing to cooperate with CN.
3 Algorithm
3.1 Auction
Algorithm 1 The Second Price Saled Auction
Require: the bid of IoT nodes
Ensure: the price (forward data amount)
1: while the beginning of every round do
2: Cognitive node calculates its budget for the arriving task which will be treated as auction items and reserve nodes.
3: The auctioneer invites the public bidding, broadcasts starting price for auction items.
4: Sense nodes compare it with remain energy to decide whether to participate or not and calculate the cost of unlicensed channel based on our proposed cost formulation.
5: The seller sets the bid value.
6: if If at least one bid is higher than reserve price then
7: The winner would be the seller with the highest bid value and pay with the second-lowest bid.
8: The auctioneer allocates the task to the winner.
9: else
10: CN will give up this cooperation.
11: end if
12: Then the node winners fuse data followed by CN and SN data transmission.
13: CN rewards these SNs with transmission time.
14: end while
3.2 Shapely value
Algorithm 2 shapely value
Require: the contribution of IoT nodes in once round and the remaining energy
Ensure: the end of every round
1: while the reward for IoT nodes do
2:
3:
4: l(i)′ = l(i)w(i)
5:
6: △φ(1)(l) = φ(1)(l) * l(i) * α (0 < α < 1)
7: φ(1)(l)′ = φ(1)(l) + △φ(1)(l)
8: end while
return φ(1)(l)′
3.3 Direct trust
Algorithm 3 direct trust value
Require: behavior of nodeij, fre
Ensure: punishment
1: i = 1:n
2: j = 1:n
3: syms ,
4:
5:
6: for cognitive nodes decide to do full monitor do
7: if find selfless behvior then
8:
9: else
10:
11: end if
12: update direct trust values table
13: if then
14: no punishment
15: else if then
16: give a timeout for three sensing rounds
17: else if then
18: give a timeout for three sensing rounds
19: de-allocate 50% of the assigned resources to the misbehaving node
20: else if then
21: de-allocate all resources and disconnect this node
22: else
23: mark the node as an undesirable node
24: de-allocate all resources and disconnect this node
25: end if
26: end for
27: while condition do
28: …
29: end while
return e
3.4 Indirect trust
Algorithm 4 indirect trust value
Require: the interaction among IoT nodes, α
Ensure: tin and wij
1: i = 1:n
2: j = 1:n
3: α = 0.05
4: syms ,
, Proij, tinij,
,
,
5:
6:
7:
8: for interaction happens do
9: if another node is trusted then
10:
11: else
12:
13: end if
14: end for
15:
16:
17:
18: sum = sum(matrix, 2)
19: For i = 1:n
20: For j = 1:n
21: a(ij) = a(ij) / sum(i)
22: End
23: End
24: tall′ = α * I + (1 − α) * tall
25: n = 2
26: while matrix′! = matrixn do
27: tall′ = tall′ * (α * I + (1 − α) * tall)
28: n = n + 1
29: end while
30: Sort
return tin, wij
3.5 Malicious
Algorithm 5 identify malicious node
Require: tables from IoT nodes
Ensure: clique
1: for each IoT node ∈ all nodes C do
2: si ← ei ∈ E(random)
3: end for
4: for each ei ∈ E do
5: l(ei) ← argminDistance(ei, cj), j ∈ 1,2…k
6: end for
7: changed ← false
8: iter ← 0
9: while until changed true and iter < Mazlters do
10: for each si ∈ S do
11: UpdateCluster(ci)
12: end for
13: for each ei ∈ E do
14: minDist ← argminDistance(ei, cj), j ∈ 1,2…k
15: if m theninDist l(ci)
16: l(ei) ← minDist
17: end if
18: changed ← true
19: end for
20: iter++
21: end while
22: give all nodes by 0/1
23: calculate Similarityi,j =
24: k = 2
25: while k do ≤ 5
26: group all IoT nodes in pairs
27: merge k-cliques into (k+1)-cliques
28: remove duplicates
29: print all 5-cliques and monitor them
30: end while
return result
4 Simulation setup and performance analysis
In this section, we test the PR-CSDF mechanism. We consider a cognitive radio network with one CR (SU) and multiple IoT nodes.
- The packet arrival rate λ is set to 0.1 packet/ms, and the packet is length is 1000 bytes with the deadline of 40 ms. The bandwidth of the channel is assumed to be 1 MHz, the CR uses 2mW of transmit power.
- Next, the frame size of sensing is 100 ms. Each time frame is divided into 10-time slots, where slots are used for sensing.
- In the first slot, an auction is conducted for the distribution of sensing tasks, in the second slot, sensing is performed by IoT nodes, in the third slot, IoT nodes send sensing reports, followed by CR and SN transmissions.
- After the computation, the value of reserved prices is set between 0.2 and 0.82. We initially start with 0.2 and increases with the step size of 0.005.
Simulation Environment: The experiments were conducted in a simulated environment replicating a cognitive radio-assisted IoT network scenario. Parameters such as network size, node distribution, and communication protocols were defined to mimic real-world IoT deployments. Implementation of PR-CSDF: The PR-CSDF approach, comprising the distribution of sensing tasks among IoT nodes and the cooperation enhancement through punishment-reward strategies, was implemented in the simulation environment.
Task Distribution: The cognitive node acted as an auctioneer, broadcasting sensing tasks to neighboring IoT nodes. Rational IoT nodes, acting as bidders, sent bids indicating the amount of sensing time they were willing to offer in exchange for rewards from the cognitive node.
Payoff Analysis: The payoff of both the cognitive node and IoT nodes was analyzed to determine the upper and lower bounds of feasible bids based on energy consumption considerations in licensed and unlicensed channels.
Game Theory Model: A game theory model was developed to capture IoT node behaviors (selfish or selfless) and their corresponding payoffs. This model guided the application of reward and punishment strategies to incentivize cooperation among IoT nodes.
Optimal Monitoring Frequency: An optimal monitoring frequency formula was presented to guide the cognitive node in efficient energy utilization while dynamically adjusting monitoring frequencies in each round.
Cooperation Mechanism: The cooperation process, including reward and punishment mechanisms, was implemented. Indirect trust values, additional sensing rewards, and punishment for selfish IoT nodes were integrated into the mechanism to promote cooperation and deter selfish behaviors.
In Fig 7, the rate of packet delay is plotted against the number of IoT nodes for the first-price and second-price auction. Both, the auction schemes perform comparatively well than individual sensing. It is observed that the delay for traditional sensing is higher compared to both the second and first price auctions. This can be justified by the auction mechanism’s ability to efficiently allocate sensing tasks among IoT nodes, leading to a more optimized and coordinated sensing process. The auction mechanism ensures that tasks are assigned based on bids, which can result in a more streamlined and timely execution of sensing activities compared to traditional methods where tasks may not be allocated as efficiently.
The impact of the auction mechanism on the IoT node is seen the Fig 8 where the throughput of the IoT node is plotted against the number of IoT nodes. It is shown that the second price auction performs better than traditional sensing in terms of throughput for IoT nodes. This improvement can be attributed to the auction mechanism’s ability to incentivize IoT nodes to bid strategically based on their energy levels and packet deadlines. By adjusting their bid values accordingly, IoT nodes can optimize their participation in the sensing process, leading to improved throughput compared to traditional sensing methods where such optimization may not be possible.
4.1 Pre-analysis: Choice of specific auction mechanism
Relying on existing knowledge, a special optimal auction mechanism of the multi-item auction is still complex work. It is unnecessary for us and the cognitive node to find it. Furthermore, for the following reasons, we decide to use ‘The Second Price Sealed Auction’.
- The cognitive node need not take on risk from speculators.
- This model can effectively allocate resources regardless of whether the probability distribution density function of each node is the same.
- It can be an incentive to bid on its true valuation. And ease the thinking burden of sense nodes.
- Expected return in this model is larger than the ‘first-price sealed auction’.
Meanwhile, sense nodes can communicate with each other, so we need to prevent them from cooperating. This auction model can avoid bidding rings to some extent. Then we can consider every node to decide its bid independently.
The main disadvantage is that this model doesn’t maximize the income of the cognitive node. For example, if there are two bidders, one offers 100$, the other offers 1$, this model will cause the cognitive node to lose heavily.
But it doesn’t matter. Because in general, there are about 100 sense nodes every cognitive node has so that this scenario is extremely rare. And as one might say, on account of the dominant position of the cognitive node in the forwarding aspect, and also because sense nodes always need to forward data by cognitive, sense nodes are unlikely to have a lower evaluation and don’t want to miss any choice to get the cognitive node’s help. Besides, we can set a reserve price to avoid this situation (2.4.2).
So to sum up, Multiple ‘The Second Price Sealed Auction’ is a feasible choice.
4.2 Simulation and analysis
In Figs 9 and 10, we study the performance of the CR using the first and second-price auctions. The performance enhancement, in this case, is the accurate out-of-band sensing by the IoT node. As explained in ([27]), the revenue generated by any auction is the same when the number of bidders exceeds 6. The proposed scheme enhances the performance through more reliable out-of-band sensing, reducing packet loss. The second price auction outperforms the first-price auction and in-band sensing. IoT nodes check their energy level and packet deadline and correspondingly adjust their bid value. The second price auction outperforms the first-price auction in these scenarios due to its ability to encourage IoT nodes to consider their energy levels and packet deadlines when placing bids. This consideration leads to more efficient resource utilization and task allocation, resulting in improved performance metrics such as reduced delay and enhanced throughput compared to traditional methods.
5 Conclusion
In this paper, a Punishment-Reward Strategy-based Cooperative approach for IoT Data Forwarding called PR-CSDF has been proposed. PR-CSDF consists of two parts: 1) Distribution of sensing task among the IoT nodes, 2) Enhancing the cooperation through reward and punishment strategy. Furthermore, we used the auction model to distribute the sensing task among the IoT nodes and to promote cooperation through the reward of licensed transmissions. Later, we used the optimal frequency of monitoring parameter to identify selfish and malicious nodes using DT and IDT. Finally, extensive simulations are conducted to show the benefits of PR-CSDF. Simulation results show that the PR-CSDF helps IoT nodes to effectively use their energy for sensing and data forwarding by reducing multiple re-transmissions through unlicensed channels.
The study showcases significant utility gains achieved by both secondary users and IoT nodes through the implementation of this strategy. By effectively optimizing cooperation, task allocation, and resource utilization via the punishment-reward mechanism, the approach not only enhances data forwarding efficiency but also improves energy efficiency within IoT networks. These results underscore the tangible benefits of integrating IoT technology with cooperative strategies in operations management, particularly in the context of smart city applications, where maximizing performance and resource efficiency are paramount for operational success.
References
- 1. Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. Journal of Industrial Information Integration. 2018;10:1–9.
- 2. Rashid B, Rehmani MH. Applications of wireless sensor networks for urban areas: A survey. Journal of network and computer applications. 2016;60:192–219.
- 3. Elhanashi A, Dini P, Saponara S, Zheng Q. Integration of Deep Learning into the IoT: A Survey of Techniques and Challenges for Real-World Applications. Electronics. 2023;12(24):4925.
- 4.
Statista I. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Statista. 2018;.
- 5. Nallagonda S, Bhowmick A, Prasad B. Throughput performance of cooperative spectrum sensing network with improved energy detectors and SC diversity over fading channels. Wireless Networks. 2021;27(6):4039–4050.
- 6. Ahmad WSHMW, Radzi NAM, Samidi FS, Ismail A, Abdullah F, Jamaludin MZ, et al. 5G Technology: Towards Dynamic Spectrum Sharing Using Cognitive Radio Networks. IEEE Access. 2020;8:14460–14488.
- 7. Nallagonda S. Spectrum sensing performance of wireless cognitive radio sensor network with hard-decision fusion over generalized α- μ fading channels. International Journal of Communication Systems. 2023;36(10):e5498.
- 8. Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. IEEE Access. 2020;8:23022–23040.
- 9. Khan AA, Rehmani MH, Rachedi A. Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE wireless communications. 2017;24(3):17–25.
- 10. Simeone O, Stanojev I, Savazzi S, Bar-Ness Y, Spagnolini U, Pickholtz RL. Spectrum Leasing to Cooperating Secondary Ad Hoc Networks. Selected Areas in Communications IEEE Journal on. 2008;26(1):203–213.
- 11.
Yu W, Huang Y, Garcia-Ortiz A. Energy-Aware Task Allocation in WSNs. In: Mission-Oriented Sensor Networks and Systems: Art and Science. Springer; 2019. p. 193–226.
- 12. Yang J, Zhang H, Ling Y, Pan C, Sun W. Task allocation for wireless sensor network using modified binary particle swarm optimization. IEEE Sensors Journal. 2013;14(3):882–892.
- 13.
Nimje C, Junghare P. A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE; 2017. p. 1–5.
- 14. Hasani H, Babaie S. Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications. 2019;31(10):6079–6090.
- 15. Shan A, Fan X, Wu C, Zhang X. Quantitative Study on Impact of Static/Dynamic Selfishness on Network Performance in VANETs. IEEE Access. 2021;9:13186–13197.
- 16.
Jain S, Verma A. Bubble Rap Incentive Scheme for Prevention of Node Selfishness in Delay-Tolerant Networks. In: Smart Innovations in Communication and Computational Sciences. Springer; 2019. p. 289–303.
- 17. Kumar S, Dutta K. Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks. Wireless Personal Communications. 2018;101(4):2029–2052.
- 18. Fihri WF, Ghazi HE, Majd BAE, Bouanani FE. A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio. IEEE Access. 2020;8:227349–227359.
- 19. Kerrache CA, Lakas A, Lagraa N, Barka E. UAV-assisted technique for the detection of malicious and selfish nodes in VANETs. Vehicular Communications. 2018;11:1–11.
- 20. Lin HT, Lin YY, Yan WS, Wu JY. Reputation auction games for cooperative communications over green wireless networks. Computer Communications. 2019;134:126–137.
- 21. Yeole A, Kalbande D, Sharma A. Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange. Procedia Computer Science. 2019;152:212–221.
- 22. Alsukayti IS. Dynamic-RPL: Enhancing RPL-Based IoT Networks with Effective Support of Dynamic Topology Management. Electronics. 2023;12(18):3834.
- 23. Nallagonda S. Energy-efficiency performance of wireless cognitive radio sensor network with hard-decision fusion over generalized α-μ fading channels. Wireless Networks. 2023;29(6):2759–2771.
- 24. Umar MM, Khan S, Ahmad R, Singh D. Game Theoretic Reward Based Adaptive Data Communication in Wireless Sensor Networks. IEEE Access. 2018;6:28073–28084.
- 25.
Poojary S, Agrawal A, Gupta B, Bura A, Sharma V. Throughput of TCP over Cognitive Radio Channels. In: 2015 IEEE Global Communications Conference (GLOBECOM). IEEE; 2015. p. 1–7.
- 26.
Ramezanipour I, Alves H, Nardelli P, Pouttu A. Energy Efficiency of an Unlicensed Wireless Network in the Presence of Retransmissions. 2018;.
- 27.
Kloeck C, Jaekel H, Jondral FK. Dynamic and local combined pricing, allocation and billing system with cognitive radios. In: IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks; 2005. p. 73–81.