You are on page 1of 14

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE/ACM TRANSACTIONS ON NETWORKING 1

Multicast in Multihop CRNs Under Uncertain


Spectrum Availability: A Network
Coding Approach
Yuben Qu, Chao Dong, Member, IEEE, Haipeng Dai, Fan Wu, Member, IEEE, Shaojie Tang, Member, IEEE,
Hai Wang, Senior Member, IEEE, and Chang Tian, Member, IEEE

Abstract— The benefits of network coding on multicast in Index Terms— Cognitive radio networks, multicast, network
traditional multihop wireless networks have already been coding, chance-constrained optimization, convex optimization.
extensively demonstrated in previous works. However, most
existing approaches cannot be directly applied to multihop I. I NTRODUCTION
cognitive radio networks (CRNs), given the unpredictable
primary user occupancy on licensed channels. Specifically, due to
the unpredictable occupancy, the channel’s available bandwidth
D UE to the pressing demand of efficient frequency
spectrum usage, cognitive radio networks (CRNs) [1]
have spurred a wide range of research interests and emerged
is time-varying and uncertain. Accordingly, the capacity of the
link using that channel is also uncertain, which can significantly as a promising technology to improve the spectrum utilization.
affect the network coding subgraph optimization and may In CRNs, with the proliferation of computationally powerful
result in severe throughput loss if not properly handled. In this wireless devices and compelling demand on diversified ser-
paper, we study the problem of network coding-based multicast vices, providing multicast services for secondary users (SUs),
in multihop CRNs while considering the uncertain spectrum especially in a multi-hop fashion, is urgently needed [2]–[5].
availability. To capture the uncertainty of spectrum availability,
we first formulate our problem as a chance-constrained program. Therefore, it is crucial to improve the performance of multicast
Given the computational intractability of the above-mentioned in multi-hop CRNs.
program, we then transform the original problem into a During the past decade, network coding [6] has been
tractable convex optimization problem, through appropriate proposed to improve the network resource utilization. By
Bernstein approximation with relaxation on link scheduling. combining multiple input packets into one packet algebraically
We further leverage Lagrangian relaxation-based optimization
techniques to propose an efficient distributed algorithm for the before forwarding, network coding is able to increase the
original problem. Extensive simulation results show that the multicast capacity [6]. The throughput benefits of network
proposed algorithm achieves higher multicast rates, compared coding on multicast in multi-hop wireless networks have been
with a state-of-the-art non-network coding algorithm in multihop well recognized in previous works, e.g., [7]–[14]. However,
CRNs, and a conservative robust network coding algorithm that almost all these works focus on traditional multi-hop wireless
treats the link capacity as a constant value in the optimization.
networks rather than multi-hop CRNs. Then, a question nat-
Manuscript received June 25, 2015; revised March 11, 2016, urally arises: whether network coding can still enhance the
October 22, 2016, and February 4, 2017; accepted February 7, 2017; approved multicast throughput in multi-hop CRNs or not?
by IEEE/ACM T RANSACTIONS ON N ETWORKING Editor D. Goeckel. This Indeed, most existing works on network coding-based multi-
work was supported in part by the State Key Development Program for
Basic Research of China (973 Project) under Grant 2014CB340303, in part cast cannot handle new challenges arising from CRNs, e.g., the
by the National NSF of China under Grant 61103224, Grant 61371124, uncertainty of spectrum availability. Particularly, in the opti-
Grant 61472445, Grant 61422208, and Grant 61272443, in part by the NSF mization of traditional wireless networks, the link capacity is
of Jiangsu Province under Grant BK2011118 and Grant BK20140076, in
part by the CCF-Intel Young Faculty Researcher Program, and in part by the usually assumed as a fixed value [7]–[9], [13], [14]. However,
CCF-Tencent Open Fund. (Corresponding author: Chao Dong.) in CRNs, due to unpredictable primary occupancy on licensed
Y. Qu is with the College of Communications Engineering, PLA Uni- channels, the availability of the channel (i.e., on/off) follows
versity of Science and Technology, Nanjing 210007, China, and also with
the Rocket Force University of Engineering, Xi’an 910025, China (e-mail: some probability distribution in the time domain, while the
quyuben@gmail.com). unoccupied bandwidth of an available channel is uncertain
C. Dong, H. Wang, and C. Tian are with the College of Communications in the frequency domain, in the sense that it is a random
Engineering, PLA University of Science and Technology, Nanjing
210007, China (e-mail: dch999@gmail.com; haiwang@ieee.org; tianchang variable satisfying some certain distribution [15]–[18]. That
126@126.com). is to say, the capacity of a link using that channel is also
H. Dai is with the Department of Computer Science and Technology, Nan- a random variable. The randomness of capacity invalidates
jing University, Nanjing 210023, China (e-mail: dhpphd2003@gmail.com).
F. Wu is with the Department of Computer Science and Engineer- all of the previous approaches on the optimization of coding
ing, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: subgraph, which is the core of network coding in multi-hop
fwu@cs.sjtu.edu.cn). networks [6]–[11]. Besides, simply replacing the uncertain
S. Tang is with the Naveen Jindal School of Management, University
of Texas at Dallas, Richardson, TX 75080 USA (e-mail: tangshaojie@ link capacity by its expected constant value is not preferable,
gmail.com). since the fruitful information of spectrum availability is not
This paper has supplementary downloadable material available at exploited, which can incur great performance degradation.
http://ieeexplore.ieee.org, provided by the authors. This consists of detailed
proofs of Theorems 1 and 2. In this paper, we study how to maximize the data rate of
Digital Object Identifier 10.1109/TNET.2017.2666788 a multicast session by intra-session network coding [9] in
1063-6692 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE/ACM TRANSACTIONS ON NETWORKING

multi-hop CRNs. To the best of our knowledge, this is the first state-of-the-art non-network coding algorithm in
work to study the problem of network coding-based multicast multi-hop CRNs, which achieves the promising benefit
in multi-hop CRNs, by taking into account the uncertainty of network coding in such scenarios. Moreover, our
of spectrum availability. Different from existing works, we decentralized algorithm outperforms the conservative
model the link capacity as a random variable instead of a fixed robust network coding algorithm without regard for
value, which captures the uncertainty of spectrum availability uncertain spectrum availability, in terms of multicast
in CRNs. To deal with the random variables in the constraints, rate.
we cast these constraints as chance constraints [19]–[21], The rest of this paper is organized as follows. Section II
i.e., candidate solutions are required to satisfy the random and Section III describe the network model and preliminaries,
constraints with a given probability. and problem formulation, respectively. In Section IV, we use
However, chance constraints are usually more difficult to Bernstein approximation to translate the chance constraints
tackle because these constraints are typically nonconvex and into tractable convex constraints. An efficient distributed algo-
sometimes difficult to be expressed in a closed form [19]. rithm is developed in Section V. VI extends our solution to the
Another challenge in our problem is that since the available multiple multicast flows case. We conduct performance evalu-
channels at different nodes could be different in multi-hop ation via extensive simulations in Section VII. In Section VIII,
CRNs, how to efficiently schedule the links under the channel we review the related work. Finally, Section IX concludes the
availability is also a critical concern. Note that the scheduling paper.
for SUs’ data transmission in multi-hop CRNs can be done II. N ETWORK M ODEL AND P RELIMINARIES
either in frequency domain or in time domain. In this work, In this section, we will first introduce the basic network
we focus on the scheduling in the frequency domain. model used in our work, then interpret the modeling of
To overcome the above challenges, we first employ uncertain spectrum availability in CRNs, and lastly, explain
Bernstein approximation techniques [19] to translate the the coding subgraph optimization in multi-hop CRNs.
aforementioned chance constraints into convex computable
constraints. Although Bernstein approximation has been A. System Model
applied in previous studies, the main novelty as well as We consider a multi-hop CRN, where N secondary
difficulty here is how to properly choose the approximation users (SUs)1 share C orthogonal channels that can be accessed
bounds according to our problem, to ensure both feasibility by SUs when they are not occupied by primary users (PUs).
and tractability in the transformation. Further, we encapsulate The set of nodes is denoted by N = {1, 2, . . . , N }, and the
the constraints of hyperarc-channel scheduling in a two- set of channels is denoted by C = {1, 2, . . . , C}. Each node
dimensional conflict graph (TDCG), and eventually obtain an is equipped with two radios: one is a half-duplex cognitive
optimization problem that can be solved by common convex radio (CR) that can switch among the channels for data
optimization approaches. Specifically, we decompose the transmissions, and the other is a half-duplex normal radio
overall problem into two relatively independent subproblems, working on a common control channel (CCC) for exchanging
i.e., a multiple-shortest-paths problem with channel control messages [5]. In this work, we assume that the location
availabilities constraints and a maximum-weighted-stable-set of all SU nodes is fixed and known.2 By exchanging the
problem on the TDCG, respectively. Then, we propose an geographical location information through CCC, the distance
efficient distributed algorithm for network coding-based between any two neighbor nodes can be calculated. With CR,
multicast in multi-hop CRNs, to simultaneously optimize the each node can identify the set of current available channels
flow rate and coding subgraph with channel selection. through existing spectrum sensing techniques [22], [23].
Our main contributions are summarized as follows: Following most previous works [3], [5], we suppose that
1) We for the first time study the problem of network the available channels at a SU may be different from those
coding-based multicast in multi-hop CRNs under uncer- at another one in the network, considering the geographical
tain spectrum availability, and formulate the problem as location differences of the SUs. Let Ci ⊆ C represent the set
a chance-constrained program. Specifically, we capture of available channels at SU i ∈ N , and CJ ⊆ C denote the
the uncertainty of link capacity in chance constraints, set of 
common available channels at a set of nodes J, i.e.,
and encapsulate both hyperarc scheduling and channel CJ = j∈J Cj . Following [3], [5], [18], we assume that the
selection into multiple hyperarc-channel tuples repre- channel availability at SUs is assumed quasistatic, i.e., the
sented by the TDCG. available channel set Ci varies with time but does not change
2) We transform the formulated chance-constrained pro- in a short period of time. In this work, we mainly consider
gram into a computationally tractable convex problem, the scheduling in frequency domain other than time domain,
through appropriate Bernstein approximation and relax- in terms of assigning frequency bands (channels). We note
ation of finding stable sets on the TDCG. We decom- that our assumption of an available channel c at SU i means
pose the convex problem into two separate subproblems that SU i can transmit and receive data on channel c without
by using Lagrangian relaxation, and then propose an causing interference to the licensed PU of channel c.
efficient distributed algorithm for network coding-based
1 SU and node will be used interchangeably in the rest of this paper.
multicast in multi-hop CRNs. 2 When the locations is not fixed but randomly moving, we can pursue the
3) Simulation results show that, the proposed decentralized approaches like stochastic geometry and random graph to model the network
algorithm achieves higher multicast rate than the as in many previous works [44], [45].
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 3

TABLE I exponential-like distribution that is not independent over time.


A L IST OF N OTATIONS However, this will not change the optimization framework
in our problem, since we study the multicast problem with
link scheduling in the frequency domain, given the channel
availabilities at SUs. According to the well known Shannon-
Hartley theorem, the capacity of a link has strong positive
relationship with the bandwidth of the channel it uses. Since
the channel bandwidth is random in CRNs, the link capacity
is also a random variable, which may pose great challenges
to the optimization of network performance.

C. Coding Subgraph Optimization in Multi-Hop CRNs


In this study, we consider intra-session network coding [9]
to improve the multicast performance of SUs. The core of
intra-session network coding is, to allow network nodes mix
(code) received data packets before data transmission, where
the coding is restricted in the same session only. Further,
we employ the probabilistic version of network coding in
our work, i.e., random linear network coding approach [7].
We leverage the broadcast nature for efficient multicast Specifically, each coded packet sent is a linear combination
in wireless multi-hop CRNs, i.e., a node can transmit data of the stored packets in a node with coefficients drawn
simultaneously to multiple nodes in its transmission range randomly from a sufficiently large finite field GF (2q ). And
by switching to the same available channel [5]. To illustrate any destination node can recover several data packets when
the broadcast relationship, following [11], [14], we model the receiving enough coded packets.
network by a hypergraph H = (N , A), where N is the set of However, how to optimize the packet injection rate at
nodes and A is the set of hyperarcs. A hyperarc is a pair (i, J) intermediate nodes including the source, which is so called
(at least one common channel available in node i and set J), the coding subgraph optimization, is the key issue in the
where i ∈ N is the start node, and J ⊂ N is the set of end problem of network coding-based multicast. Let ziJ (c) denote
nodes. Every hyperarc (i, J) represents a broadcast link from the average packet injection rate into hyperarc (i, J) through
node i to the nodes in the nonempty set J. channel c. The rate vector z = (ziJ (c))(i,J)∈A,c∈Ci Ì CJ is
For flow service, we assume that there is a multicast termed as the coding subgraph [8]. Following [8], we denote
connection of rate R with a source s ∈ N and sinks ziJK (c) the rate at which packets are received by precisely
D = {1, 2, . . . , D} ⊂ N . In this study, we only consider the the set of nodes K ⊆ J through hyperarc (i, J) on channel c.
scenario where all multicast sinks request the same informa- Worth noting that K can be J, if
tion, e.g., audio/video file downloads and software updates, there are no transmission
errors. Hence, we have ziJ (c) = K⊆J ziJK (c).
etc. This kind of application can be attributed to reliable For two different hyperarcs, they may utilize different
multicast. Since one of the key performance metrics of reliable available channels due to interference constraints, and thus the
multicast is throughput, in this work, we will focus on how coding subgraph is different at different channels. The choice
to maximize the multicast rate under multiple constraints. of ziJ (c) generally depends on a number of factors, one of
How to exploit network coding to enhance the performance which the aggregated link rate should be no more than the link
of multicast in CRNs in terms of more than rate is left for capacity. As stated previously, the link capacity is a random
future work. Thus, R can be defined as the total amount of variable in CRNs. This may change the pattern of the whole
data that are successfully delivered to all sinks per unit time. optimization framework on coding subgraph, which will be
Table I provides a list for the major notations used in this discussed in detail in next section.
paper.
D. Preliminaries on Bernstein Approximation
B. Modeling of Uncertain Spectrum Availability Bernstein approximation is originated from [43] and further
The uncertain spectrum availability of CRNs distinguishes significantly improved in [19]. It aims to transform a proba-
it from traditional (multichannel) networks. That is, in CRNs, bilistic (chance) constraint into a tractable convex constraint,
the available channels may be known at SUs, while the which guarantees that any feasible solution of the transformed
unoccupied bandwidth of an available channel is uncertain constraint is also feasible for the original constraint. Consider
in the frequency domain, due to the unpredictable bandwidth the following chance constraint:
 
occupancy of PUs [18]. To model this unique feature of CRNs,  k

following [18], let B c denote the unoccupied bandwidth of Pr f0 (x) + ξi fi (x) ≥ 1 − ε,


an available channel c ∈ C, where B c is a random variable i=1

satisfying some certain probability distribution. Notice that where x is a decision parameter vector, ε ∈ (0, 1) is a
based on [15]–[17], the availability of a channel follows an given tolerance, and {ξi }i=1,...,k are independent variables
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE/ACM TRANSACTIONS ON NETWORKING

with known probability distribution {Pi }i=1,...,k . Bernstein sink cannot exceed the corresponding injection rate restricted
approximation can be applied if the two following assumptions by the coding subgraph. The other is about the scheduling of
hold: hyperarcs, i.e., two hyperarcs cannot simultaneously transmit
1) {fi (x)} are affine in x for i = 1, . . . , k; if they conflict.
2) The distributions from Pi are commonly supported on 1) Link Capacity Constraint on the Coding Subgraph:
[−1, 1], i.e., for all i = 1, . . . , k, −1 ≤ ξi ≤ 1. We define biJK (c) as the ratio of the sum of any successful
Note that the final transformed constraint is determined by reception rate that relates to subset K ⊆ J, to the injection
both the probability distribution information of {ξi }i=1,...,k rate on hyperarc (i, J) through channel c, i.e.,
and the form of {fi (x)}. 
Ì
{S|S⊂J,S K=∅}
ziJS (c)
biJK (c) = . (3)
III. P ROBLEM F ORMULATION ziJ (c)
In this section, we formulate the problem of network coding- If channel c is lossless, we have biJK (c) = 1 for all nonempty
based multicast in multi-hop CRNs. The objective is to find K ⊆ J and biJ∅ (c) = 0. Then, for the link rate requirement on
the flow rates and coding subgraphs with channel selection, the coding subgraph [8], [11], i.e., the flow rate for any sink
with the consideration of uncertain spectrum availability, cannot exceed the rate determined by both coding subgraph
such that the multicast rate R is maximized. In general, we and channel quality, we have
should consider the following constraints: flow rate constraints, 
coding subgraph constraints, and link capacity constraints.
d
fiJj (c) ≤ ziJ (c)biJK (c). (4)
Note that with network coding, the routing issue has been j∈K
taken into account by the coding subgraph optimization as 2) Hyperarc Scheduling Constraint on the Coding
well as the flow balance and link capacity. We now specify Subgraph: Next, we deal with more complex scheduling
these constraints separately in detail. constraints on hyperarcs. According to [8], z should be
restricted with a convex subset. The core is to decide
A. Flow Rate Constraints
which sets of hyperarcs can transmit simultaneously without
A flow rate constraint requires that the amount of incoming conflict. However, this depends on the interference model
traffic rate equals to the amount of outgoing traffic at every of the network. In this study, we consider a more general
node in the network. We denote by fiJj d
(c) the data rate secondary interference model [11]. That is, since there is
for sink d from node i to node j ∈ J, when packets are only one radio for data transmission at each node, at a certain
actually transmitted on virtual wireless broadcast link (i, J), time, each node is constrained to receive from at most one
using channel c. To explicitly demonstrate the dependency of other sending node, and can only successfully receive if all
a broadcast link on a specific channel, we define other neighbors on the same channel are silent.
 One may just follow the similar approach in [8] and [11]
Tic = {j|dij ≤ rT , j = i, c ∈ Ci Cj }, (1)
using a conflict graph on the hypergraph only to capture the
where dij is the distance between node i and j, and rT is the conflict of hyperarcs. This kind of hyperarc conflict graph,
transmission range of node i. Tic is thus the set of nodes that however, cannot be directly applied mainly because the hyper-
node i can simultaneously transmit data to through channel arc conflict graph is insufficient in describing the extra conflict
c. Note that the difference between Tic and J in a hyperarc in competing for channels. Take a simple example. According
(i, J) is that the former clearly specifies the common available to the hyperarc conflict graph, hyperarc (i1 , J1 ) interferes
channel, while the latter does not. with hyperarc (i2 , J2 ). Actually, the two hyperarcs may not
According to the max-flow min-cut theorem in [6], there interfere, if they employ different channels. Using such a
exists a flow vector fiJjd
(c) for each sink d, which satisfies hyperarc conflict graph will definitely decrease the number
⎧ of simultaneously active links, which results in throughput
   ⎪
⎨R i=s degradation in the end.

fiJj (c) −
d
fjIi (c ) = −R i ∈ D
d In this work, inspired by [24], we develop a two-


⎩ dimensional conflict graph (TDCG) to describe the conflicts
J⊆Tic j∈J {j|I⊆Tjc ,i∈I} 0 otherwise,
over hyperarcs and channels jointly. Each vertex in the TDCG
(2)
represents a hyperarc-channel tuple, a basic resource point in
for all d ∈ D. The first and second parts in the left of (2) the multi-hop CRN. The TDCG is thus a graph that illustrates
correspond to the total outgoing rate and total incoming rate, the conflict relationships among the resource points in the
respectively. If node i is the source node, its outgoing rate is multi-hop CRN. A tuple w is defined in the format as follows:
R and incoming rate is 0. If i is one of the sinks, its outgoing
hyperarc-channel tuple: [(i, J), c],
rate is 0 and incoming rate is R. Otherwise, node i is an

intermediate node, and its outgoing rate should be equal to its where (i, J)∈ A and c ∈ Ci CJ . The tuple [(i, J), c] indicates
incoming rate. that the hyperarc (i, J) operates on channel c. Consider two
tuples w1 = [(i1 , J1 ), c1 ] and w2 = [(i2 , J2 ), c2 ]. We say that
B. Coding Subgraph Constraints w1 and w2 do not conflict if the following conditions hold:

Similar to [7]–[9], and [11], the constraints of coding i1 = i2 ; 2) i1 ∈ J2 ; 3) i2 ∈ J1 ; 4) J1 J2 = ∅; 5)
1) 
subgraph include two types. One is that the link rate for any J1 Tic22 = ∅ and J2 Tic11 = ∅ when c1 = c2 .
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 5

The above constraint not only captures the classical coding


subgraph requirements including the scheduling of hyperarcs,
but also restricts the channel selection of different hyperarcs.
Although link scheduling in CRNs has been studied in pre-
vious works, few study how to employ network coding to
improve the performance of multicast in multi-hop CRNs, by
Fig. 1. Example of a hypergraph.
scheduling the links with channel selection and determining
the packet forwarding rate. Furthermore, they seldom consider
the uncertainty of spectrum availability in CRNs, which will
be introduced in the next subsection.

C. Link Capacity Constraints


Since we consider wireless broadcasting nature, we should
take the capacity of a broadcast link rather than a point-
to-point link into consideration. We define the capacity of
a broadcast link as the minimum of the capacities of its
Fig. 2. TDCG corresponding to the hypergraph in Fig. 1.
component point-to-point links [14].
Definition 1: The TDCG of a hypergraph H with the channel Because the link capacity is significantly affected by the
availability (Ci )i∈N is an undirected graph G = (V, E), with channel selection, we define uij (c) as the 0-1 indicator repre-
V corresponding to the set of all hyperarc-channel tuples, and senting whether node i and j operate on channel c

an edge (w1 , w2 ) belongs to the edge set E if w1 and w2 1 if i transmits data to j on channel c
interfere, for all w1 , w2 ∈ V. uij (c) = (7)
Note that the above TDCG well captures different kinds of 0 otherwise,
interference in multi-hop CRNs, including the self-interference 
where c ∈ Ci Cj . We note that the value of uij (c) is
at the physical layer, the interference on the same channel determined by the aforementioned coding subgraph constraint.
from transmission and reception, and the interference in the Based on the channel selection, following [18], we can define
transmission range of a node, etc. the capacity of a link (i, j) on channel c, i.e., hij (c), which is
Given the TDCG, a stable (independent) set I is a set of given by
vertices belonging to V, any two of which are nonadjacent.
I includes the tuples that can be active simultaneously in the gij Q
hij (c) = uij (c)B log2 1 +
c
, (8)
network. If adding any one more vertex into a stable set I η
results in a non-stable set, I is a maximal stable set (MLSS). where gij is the power propagation gain between node i and
A maximum stable set (MMSS) is one that is not contained node j, Q is the power spectral density from the transmitter,3
in any other stable set. Similar to [11], we define πIv as the and η is the ambient Gaussian noise density. Note that we
incidence vector of I, which is given by further consider channel selection in the link capacity based

1 if node v ∈ I, upon [18]. And this definition takes into account many prac-
πI =
v
(5) tical issues in the physical layer, including channel fading,
0 otherwise.
interference, transmission range, channel selection and one of
Then, the stable set polytope of G, i.e., PSTAB (G), is thus the the most typical features of CRNs, the uncertainty of channel
convex hull of the incidence vectors of all MMSSs of G. available bandwidth. Accordingly, the capacity of a broadcast
We use a toy example to illustrate the notation. Consider the link (i, J) on channel c can be given by
hypergraph in Fig. 1 (the symbol next to each node denotes
hiJ (c)
the current available channels), and its corresponding TDCG  
in Fig. 2. Consider the channel availability, as shown in Fig. 2, gij Q
= min hij (c) = min uij (c)B log2 1 +
c
. (9)
V = {[(1, 2), 1], [(1, 3), 1], [(1, {2, 3}), 1], [(2, 5), 1], [(3, 5), 1], j∈J j∈J η
[(3, 4), 2], [(3, 5), 2], [(3, {4, 5}), 2]}, which describes all 
By defining uiJ (c)  j∈J uij (c), we further have
resource points in Fig. 1. From Fig. 2, for example, we

easily obtain that tuples [(1, 2), 1] and [(3, 4), 2] can be gij Q
scheduled at a slot, since the two corresponding vertices hiJ (c) = uiJ (c)B min log2 1 +
c
, J ⊆ Tic . (10)
j∈J η
are not adjacent. In this example, the stable set polytope is
thus the convex hull of the incidence vectors of the three When uiJ (c) = 0, we have hiJ (c) = 0. It should be noted
stable sets {[(1, 2), 1], [(3, 4), 2]}, {[(1, 2), 1], [(3, 5), 2]} and that (10) can handle the possible interference incurred by
{[(1, 2), 1], [(3, {4, 5}), 2]}. multiple parallel transmissions, since uiJ (c) in (10) has indi-
Finally, the constraints of scheduling on the coding subgraph cated the link-channel selection, which is determined by the
can be obtained as follows aforementioned TDCG. In other words, if we set uiJ (c) as 1,

z = (ziJ (c))(i,J)∈A,c∈C ∈ PSTAB (G). (6) 3 We here assume that all nodes use the same power for transmission.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE/ACM TRANSACTIONS ON NETWORKING

it means that there exists no interference among the broadcast to verify. Specifically, the feasible set of (12) can be either
link (i, J). convex or non-convex, which depends on the distribution
Intuitively, one may easily have the following constraints of hiJ (c) [19]. Typically, if [aT bT ]T has a symmetric
for the flow rate requirement, i.e., the aggregate data rates on logarithmically concave density, Pr{aT x < b} ≥ 1 −  is
each broadcast link (i, J) cannot exceed the link’s capacity on convex for  < 1/2 [19]. However, it is still unclear how
channel c [11], [14] to compute the closed form of the probability even if it is
 convex [19], making the problem intractable.
d
fiJj (c) ≤ hiJ (c), c ∈ Ci , , K ⊆ J ⊆ Tic . (11)
d∈D j∈K
IV. B ERNSTEIN A PPROXIMATION TO THE
However, the link capacity hiJ (c) in (11) is actually a C HANCE -C ONSTRAINED P ROGRAM
random variable and thus uncertain — not knowing what the
exact value is. The standard way to treat such uncertainty is In this section, we propose a conservative convex approx-
to pass from the uncertain constraint to its chance-constrained imation approach. Bernstein approximations are known as
version [19]–[21] an useful class of approximation techniques for chance con-
⎧ ⎫ straints [19]–[21]. However, it should be careful to choose the
⎨  ⎬ appropriate approximation form according to the characteristic
Pr d
fiJj (c) − hiJ (c) ≤ 0 ≥ 1 − εiJ (c), (12) of the link capacity constraints. And in the transformation,
⎩ ⎭
d∈D j∈K both the feasibility and tractability should be ensured. Specif-
where εiJ (c)∈ (0, 1)
is thecorresponding violation tolerance. ically, we should replace the chance constraints with a series
Define ε  i∈N c∈Ci J⊆T c εiJ (c). By setting ε 1, of constraints Υ, such that (i) any solution satisfies (12) when
i
we can guarantee that for all c ∈ Ci , J ⊆ Tic , K ⊆ J, it is feasible for Υ (safe approximation), and (ii) the con-
constraints like (11) hold with a high probability 1-ε.4 The straints in Υ are convex and efficiently computable (tractable
chance constraint based approach to modeling data uncertainty approximation). In the rest of this section, we describe the
in optimization theory was initially proposed in [33] and approximation approach in two steps, presented by Theorem 1
followed by a huge literature (please refer to [21] for the and Theorem 2, respectively. 
references therein). For simplicity, we define fiJj (c)  d∈D fiJj d
(c). Then,
(12) turns to be
⎧ ⎫
D. Network Coding-Based Multicast in Multi-Hop CRNs ⎨ ⎬
Putting the three types of constraints together, we have the Pr fiJj (c) − hiJ (c) ≤ 0 ≥ 1 − εiJ (c). (13)
⎩ ⎭
following chance-constrained program: j∈K

maximize R Enlightened by the Bernstein approximation [19], we con-


struct the following function
subject to (2), (4), (6), (12). ⎧ ⎫
⎨ ⎬
In the program, fiJjd
(c) ≥ 0 and ziJ (c) ≥ 0 are optimization Φ(f)  inf fiJj (c) + ρΩ(−ρ−1 ) − ρ log(εiJ (c)) ,
variables, corresponding to flow rate and coding subgraph, ρ>0 ⎩ ⎭
j∈K
respectively. Worth noting that, spectrum sensing and
(14)
dynamic spectrum access have been jointly incorporated with
network coding and routing in the program. Specifically, where f = (fiJj (c))j∈K ≥ 0 and Ω(y)  log E[exp(yhiJ (c))].
in the program, Ci , the set of available channels at node i, Here E[·] is excuted on the distribution information of hiJ (c).
is identified in advance through existing spectrum sensing For a given εiJ (c) > 0, consider the following inequality
techniques [22], [23]. uij (c) is the 0-1 indicator representing
whether node i and j operate on channel c, which contains Φ(f) ≤ 0. (15)
the dynamic spectrum access. The coding subgraph variable
We can prove that any solution f that is feasible for (15) is also
ziJ (c) and flow rate variable fiJjd
(c) jointly determine the
feasible for the chance constraint (13) through the following
routing issue in the network. The optimization of fiJjd
(c) and theorem.
ziJ (c) (which also determines uij (c)) is based on the channel Theorem 1: Define Φ(f) as in (14) and hiJ (c) is a ran-
availabilities {Ci }i∈N and other information. dom variable following a specific probability distribution.
The above optimization problem is intractable, owing to For a given εiJ (c) > 0, suppose that there exists f =
two main reasons. One is that the constraint in (6) requires (fiJj (c))j∈K ≥ 0, such that (15) holds. Then, f satisfies (13).
to find all MMSSs in a given TDCG. However, searching Proof:  Inspired by the Bernstein approximation [19], let
all MMSSs is NP-hard [11], [34], due to the combinatorial F (f, h) = j∈K fiJj (c) − hiJ (c), then (15) is equivalent to
difficulty encapsulated in PSTAB (G). The other, which is more
 
challenging, is the probabilistic constraint in (12), rendering inf ρE[exp(ρ−1 F (f, h))] − ρεiJ (c) ≤ 0.
ρ>0
the convexity of the feasible set defined by (12) difficult
4 Note
If Pr{F (f, h) > 0} ≤ E[exp(ρ−1 F (f, h))] holds and
that there exists a small risk that no solution is feasible for (12). If
this happens, we can enlarge the parameter ε and corresponding εiJ (c) to E[exp(ρ−1 F (f, h))] ≤ εiJ (c), then we can have (13). In fact,
obtain a feasible solution. the former equality can be obtained by the property of exp(·)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 7

and the latter one can be derived from (15). The detailed proof techniques. However, the new problem is still NP-hard in
is provided in Appendix A. general, owing to the aforementioned combinatorial difficulty
In light of Theorem 1, we can use a series of constraints in (6). Fortunately, enlightened by [11], after relaxing (6) of
 finding all MLSSs rather than MMSSs in the TDCG, we can
Υ : inf { d
fiJj (c) + ρ log E[exp(−ρ−1 hiJ (c))]
ρ>0 employ the dual decomposition method to obtain an efficient
d∈D j∈K
and decentralized solution.d
−ρ log(εiJ (c))} ≤ 0, i ∈ N , J ⊆ Tic , c ∈ Ci (16)
Let fijd (c)  J⊆T c fiJj (c), where ∀i ∈ N and j ∈ Tic ,
i
to replace (12) in the chance-constrained program, so that an with the clear understanding that fiJj d
(c) = 0 if j ∈ Tic .
optimal solution to the new problem is a feasible suboptimal Therefore, fijd (c) represents the flow rate
 of innovative packets
solution to the original problem. However, the closed form of on link (i, j) using channel c (c ∈ Ci Cj ) for sink d.
Υ is still hard to compute, owing to the uncertain expectation The optimization problem is converted into
value and the inf(·) function.
Next, we exploit some useful distribution features including maximize R
the support, unimodality, symmetry of the distribution, to subject to (2), (4), (6), and
 
obtain a computationally tractable approximation, which is fijd (c) ≤ ĥiJ (c), i ∈ N , K ⊆ Tic ,
presented by the following theorem. d∈D j∈K J⊆Tic
Theorem 2: Suppose that for a given εiJ (c) > 0, there (18)
exists f = (fiJj (c))j∈K ≥ 0 such that (15) holds, where Φ(f) 
is defined by (14). If the distribution of hiJ (c) has bounded where ĥiJ (c)  βiJ (c) − αiJ (c)ν − + αiJ (c)σ 2 log( εiJ1(c) ).
support [aiJ (c), biJ (c)], we then have

d
fiJj (c) ≤ βiJ (c) − αiJ (c)ν − A. Dual Decomposition and Subgradient Method
d∈D j∈K We form the dual problem by introducing the Lagrange
 multipliers for constraints in (4) and (18). By introducing dual
1
+ αiJ (c)σ 2 log( ), (17) variables λ  (λdiK (c)) ≥ 0, μ  (μiK (c)) ≥ 0 to relax
εiJ (c) (4) and (18) respectively, and moving them to the objective
which implies (13), where αiJ (c) = 12 (biJ (c) − aiJ (c)) = 0, function, we have
βiJ (c) = 12 (biJ (c) + aiJ (c)), and ν − , σ are the constants θ(λ, μ) = max L(R, f, z, λ, μ)
related to the probability distribution of hiJ (c). R,f,z

Proof: The proof mainly utilizes the following inequality subject to (R, f) ∈ QF (19)
2
Ω(y) ≤ max{ν − y, ν + y} + σ2 y 2 , where ν − , ν + ∈ [−1, 1] z ∈ PSTAB (G), (20)
and σ ≥ 0 are constants that depend on the given fami-
lies of probability distributions of y with bounded support where f = (fijd (c)) ≥ 0, z = (ziJ (c)) ≥ 0, and the flow
[−1, 1]. Since hiJ (c) may not be bounded in [-1, 1], e.g., polytope QF is defined by (2). The corresponding Lagrangian
hiJ (c) ∈ [aiJ (c), biJ (c)], we need to normalize hiJ (c) as is given by
follows: ζiJ (c)  hiJ (c)−β iJ (c)
, where αiJ (c)  12 (biJ (c) − λ, μ)
L(R, f, z,
αiJ (c)  
aiJ (c)) = 0 and βiJ (c)  12 (biJ (c)+aiJ (c)). And substituting = R+ λdiK (c)
ζiJ (c) in the inequality can derive the final approximation. The c
⎛ d∈D i∈N c∈Ci K⊆Ti ⎞
detailed proof is provided in Appendix B.  
The above approximation can be implemented in ×⎝ ziJ (c)biJK (c) − fijd (c)⎠
reality as follows. First, in practice, SUs learn the exact J⊆Tic
⎛ j∈K ⎞
probability distribution of hiJ (c) to determine the values    
of αiJ (c), βiJ (c), ν − , σ. In this study, we assume that SUs + μiK (c)⎝ ĥiJ (c)− fijd (c)⎠
can accurately obtain the probability distribution of B c by c c

the methods proposed in existing measurement data studies ⎛ i∈N c∈Ci K⊆Ti J⊆Ti d∈D j∈K

  
[15]–[17], [42] in advance. The estimation of the probability = ⎝R − λdiK (c) fijd (c)
distribution of B c can be seen as a warmup for the evaluation d∈D i∈N c∈Ci K⊆Tic j∈K
of the proposed algorithm in real world. Since we focus on ⎞
  
the long-duration application, the cost of this warmup will be − μiK (c) fijd (c)⎠
small, compared with the performance gain. The effect of the i∈N c∈Ci K⊆Ti d∈D j∈K c

estimation inaccuracy in the proposed algorithm will be stud- ⎛ ⎞


ied in the future. Second, after obtaining αiJ (c), βiJ (c), ν − , σ,   
+⎝ λdiK (c) ziJ (c)biJK (c)⎠
which can be exchanged between SUs by CCC, SUs substitute
d∈D i∈N c∈C K⊆Tic J⊆Tic
(12) by (17), and then solve the overall optimization problem.  i 
+ μiK (c) ĥiJ (c). (21)
V. D ECENTRALIZED A LGORITHM i∈N c∈Ci K⊆Tic J⊆Tic

We note that (17) is linear and thus convex, which may The first term in the above equation depends only on the
enable the whole problem to be solved by convex optimization flow rate variables fijd (c), while the second term relies solely
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE/ACM TRANSACTIONS ON NETWORKING


on the coding subgraph variables ziJ (c). Therefore, the dual where qijd
(c) = {K|K⊆Tic ,j∈K} (λiK (c) + μiK (c)). This
d

function can be computed by decomposing the optimization subproblem is a multiple-shortest-paths problem owing to the
problem into following subproblems: conservation constraints in the flow polytope QF . Addition-
θ(λ, μ) = max L(R, f, z, λ, μ) ally, the subproblem is similar to the subgraph optimization
{R,f,z} problem in [11], except that we should consider the channel
= θ1 (λ, μ) + θ2 (λ) + θ0 , (22) selection for every link under a given set of available channels.
Solving (28) is equivalent to searching for each sink d ∈ D,
where d
the shortest path with respect to the cost qij (c) from the source
θ1 (λ, μ) s to sink d, ensuring that there is at least a common channel
= max available for each link in the path. Moreover, to maximize (28),
(R,f)∈QF ,0≤R≤1
⎛ we need to increase R and make the right expression small.
   Nevertheless, R and f are coupled by QF . Fixing R, we should
× ⎝R − λdiK (c) fijd (c) minimize the cost:
d∈D i∈N c∈Ci K⊆Tic j∈K
⎞   
   min d
qij (c)fijd (c), (29)
fijd (c)⎠,
f
− μiK (c) (23) d∈D i∈N c∈Ci j∈Tic
i∈N c∈Ci K⊆Tic d∈D j∈K
for s to each d supporting end-to-end throughput R. (29) can
θ2 (λ) ⎛ be seen as a minimum-cost network problem without capacity
  constraints [11]. Consequently, it is sufficient for each of the
= max ⎝ λdiK (c)
z∈PSTAB (G) D parallel optimization problems to find a single minimum-
d∈D i∈N c∈Ci K⊆Tic
⎞ cost path from s to d with an available channel for each link.
 Since each of the flows in the minimum-cost path carries the
× ziJ (c)biJK (c)⎠, (24) total throughput R as there is only one active path from s to
J⊆Tic
   d and one channel for each link, (28) can be reformulated as
θ0 = μiK (c) ĥiJ (c). (25) ⎛ ⎞
i∈N c∈Ci K⊆Tic J⊆Tic  
max ⎝R(1 − d
qij (c))⎠, (30)
In the first subproblem, similar as in [11], we add a R,0≤R≤1
d∈D (i,j,c)∈Psd
redundant constraint on R (0 ≤ R ≤ 1), since by the
definitions of ziJ (c) and biJK (c), and constraint (4), the rate R where Psd denotes the collection of links (i, j) with channel c
cannot be larger than one. This constraint is to avoid handling (c ∈ Ci Cj ) in the minimum-cost path from s to d. If the sum
possibly unbounded solutions. Then, we have the following of costs in all paths from source s to all sinks is less than 1,
dual problem the maximum is 1 for R̂ and for those link flows fˆijd (c) with
(i, j, c) ∈ Psd . Otherwise, the maximum is zero by setting
minimize θ(λ, μ) both R and f to zero.
subject to λ ≥ 0, μ ≥ 0. To solve (30), we have to determine D shortest paths, which
Since θ(λ, μ) may not be differentiable, we apply the well- can be distributively solved by the asynchronous Bellman-Ford
known subgradient projection method to solve the above dual algorithm [35]. Since all qijd
(c) are greater than zero, there
problem. And the update rules are given by exist no cycles with negative costs and thus the shortest path
algorithms converge [35] in O(M N ) time, where M and N
λ[t + 1] = {λ[t] − η1 [t]Δ1 [t]}+ (26) are the number of arcs and nodes, respectively. In fact, in
μ[t + 1] = {μ[t] − η2 [t]Δ2 [t]}+ , (27) our problem, the time complexity is O(M N C), where C is
where {x}+  max(x, 0), η1 [t] and η2 [t] are the maximal number of available channels.
We now consider the second subproblem, which can be
corresponding
 appropriate stepsizes,
 and Δ1 [t] =
( J⊆T c ẑiJ (c)[t]b̂iJK (c) − fˆd (c)[t]), Δ2 [t] =
rewritten as
 i   j∈K ij ⎛ ⎞
( J⊆T c ĥiJ (c) − d∈D j∈K fˆijd (c)[t]). f̂[t] = (fˆijd (c)[t])  
i
and ẑ[t] = (ẑiJ (c)[t]) are the solutions of subproblems (23) ẑ = arg max ⎝ wiJ (c)ziJ (c)⎠, (31)
z∈PSTAB (G) i∈N c∈Ci J⊆Tic
and (24) respectively, at step t. And b̂iJK (c) can be locally
 
calculated by node i. We will solve these subproblems in a where weights wiJ (c) = d∈D K⊆Tic (λiK (c)biJK (c)).
d
decentralized way in Section V-B. The weight wiJ (c) of a node i is just a function of local
B. Flow Optimization and Scheduling Subproblem Solution variables λdiK (c) and biJK (c)), which enables us to design a
Rearranging (23) yields distributed scheduling algorithm. This is a standard maximum-
weight-stable-set (MWSS) problem in the scheduling litera-
(R̂, f̂) ture [36], which is NP-hard in general. A worth emphasizing
⎛ ⎛ ⎞⎞
   point is that the weight is not only related to the hyperarc
= arg max ⎝R− ⎝ d
qij (c)fijd (c)⎠⎠, but also the channel they choose. We have encapsulated both
(R,f)∈QF ,0≤R≤1 i∈N c∈Ci j∈Tic
d∈D the hyperarc and channel in a tuple in the proposed TDCG.
(28) To obtain an efficient solution, we relax the maximum weight
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 9

stable set constraint and instead search a maximal stable link (i, J), using channel c. Similar to (2), there exists a flow
set. The relaxed problem can be solved using the distributed vector xdfiJj (c) for each sink d ∈ Df , which satisfies
algorithm in [36]. The input of the algorithm is a weighted   df 

indirected graph and the output is a stable set with high weight. xiJj (c) − xdf
jIi (c )

Further, the output stable set is guaranteed to be maximal too. J⊆Tic j∈J {j|I⊆Tjc ,i∈I}
And the algorithm converges in just 2δ(G) steps, where δ(G) ⎧
⎨ Rf i = sf
is the stability number of the conflict graph G [36]. = −Rf i ∈ Df (33)
The sequence of f̂[t] and ẑ[t] iterated by subgradient ⎩
0 otherwise,
optimization methods might be infeasible [37]. To recover
the primal solution, we employ a classical primal recovery for all f ∈ F and d ∈ Df .
method [37], which averages the intermediate optimal values, 2) Coding Subgraph Constraints: The coding subgraph
i.e. constraints contain the restriction of coding subgraph on the
link rate and the conflict on the hyperarc scheduling. Note that
1 1  1
T T T
R∗ = R̂[t], f∗ = f̂[t], z∗ = ẑ[t]. (32) in the multiple flows case, the definitions of biJK (c), ziJ (c)
T t=1 T t=1 T t=1 and ziJS (c) are the same as in the single flow case. For the
This approach can converge to the primal optimal solution first constraint, similar to (4), the flow rate for any sink of a
a    flow should be no more than the rate restricted by the coding
for a stepsize b +c  t with a > 0, b ≥ 0 and c > 0 [37].

Since both the flow optimization subproblem and scheduling subgraph combined with channel quality. That is,
subproblem can be distributively solved, our proposed solu-  df
xiJj (c) ≤ ziJ (c)biJK (c), ∀d ∈ Df , f ∈ F. (34)
tion is also distributed. In the implementation, each node i j∈K
firstly initializes its variables, i.e., dual variables λ[0], μ[0],
flow rate variables fijd (c)[0] and coding subgraph variables For the second constraint of scheduling on the coding sub-
ziJ (c)[0]. Then, given λ[t] and μ[t], each node solves the two graph, it deals with the scheduling of hyperarcs with channels
subproblems to obtain the locally optimal flow rate fˆijd (c)[t] only, which has nothing to do with the flows and their
and injection rate ẑiJ (c)[t], and exchanges this information to rates. When there are multiple multicast flows, the con-
its corresponding neighbors by the CCC. Each node updates structed TDCG keeps unchanged. Accordingly, this constraint
the dual variables using (26) and (27), and repeats the afore- is exactly the same as (6).
mentioned process until the algorithm converges. 3) Link Capacity Constraints: In the multiple flows case,
the aggregate data rate on broadcast link (i, J) is the
VI. E XTENSION TO M ULTIPLE M ULTICAST F LOWS sum
 offlow  rate over all sinks in all data flows, i.e.,
df
f ∈F d∈D j∈K xiJj (c). The definition of link capacity
So far, we only focus on the single multicast flow case.
In this section, we introduce how to extend our theoretic hiJ (c) is same as (10). In a similar way, to deal with the
framework to the multiple multicast flows case. Generally, in uncertainty of link capacity, we employ chance constraints to
this case, the optimization problem turns into how to maximize model link capacity constraints in the following:
⎧ ⎫
the sum rates of all multicast flows subject to the three types ⎨   ⎬
of constraint similar as in the single multicast flow case. In the xdf
Pr iJj (c) − hiJ (c) ≤ ≥ 1 − εiJ (c), (35)
following, we will first present the problem formulation, and ⎩ ⎭
f ∈F d∈D j∈K
then briefly discuss how to extend the solution to the multiple
multicast flows case. where εiJ (c) ∈ (0, 1) is the corresponding violation tolerance.
Suppose there are F multicast flows in the network and Therefore, the problem of network coding-based multicast
denote the flow set as F = {1, . . . , F }. The f th multicast in multi-hop CRNs with multiple data flows can be mathemat-
flow is associated with a source sf ∈ N and sinks Df = ically formulated as
{1, . . . , Df } ⊂ N , for f ∈ F. Let Rf be the multicast rate 
maximize U (Rf )
of flow f ∈ F. Note that since we consider the intra-flow
f ∈F
network coding policy in this paper, the coding operation at
the intermediate nodes is executed in the same flow only. subject to (33), (34), (6), (35),
First of all, the objective function becomes f ∈F U (Rf ), where xdfiJj (c) ≥ 0 and ziJ (c) ≥ 0 are optimization variables,
where the utility function U (Rf ) is non-decreasing and corresponding to flow rate and coding subgraph, respectively.
strictly concave. With the properly chosen utility function, It is not difficult to see that the above problem shares a
maximizing the objective function can achieve the fairness very similar form with the chance-constrained program for a
among the flows [38]. Two classical examples of U (Rf ) single multicast flow defined in Section III-D, which can be
R1−γ
are wf log(1 + Rf ) and wf 1−γ f
, where wf is the weight solved by a similar approach, since the objective function is
associated with flow f , and 0 ≤ γ < 1. Next, we interpret convex. Specifically, via Bernstein approximation introduced
the three types of constraint one by one in details. in Section IV, we can first transform the chance constraint (35)
1) Flow Rate Constraints: Let xdfiJj (c) be the data rate for into a safe and tractable constraint. Then, the transformed
sink d ∈ Df (f ∈ F) from node i to node j ∈ J, when problem can be efficiently solved using a dual decomposition
packets are actually transmitted on virtual wireless broadcast and subgradient method similar as in Section V.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE/ACM TRANSACTIONS ON NETWORKING

VII. E VALUATION the distance of node i and node j, γ is an antenna related


In this section, we evaluate the performance of our proposed constant, and n is the path loss factor. We set γ and n to
solution by extensive simulations executed on Matlab. The be 1 and 4, respectively. The power spectral density from
main goal is to demonstrate the superior performance of the transmitter is Q = 1.6 × 105 η, where η is the ambient
our algorithm over existing approaches. We first introduce Gaussian noise density. The transmission range for a node
1 1

the objects of comparison in our evaluation, then explain the is thus rT = (γQ/η) n = (1.6 × 105 ) 4 = 20. To evaluate
explicit simulation parameters setting, and lastly present the the performance of our proposed algorithm under different
evaluation results for a single multicast flow and multiple channel qualities, we add a uniform artificial channel erasure
multicast flows. rate p in the erasure model, i.e., any successful reception is
dropped with probability p, where we change p from 0.05
A. Objects of Comparison to 0.25 in the simulations. We also suppose that the erasures
across different receivers are independent. For the tolerance
Our decentralized algorithm offers a feasible solution level, we set εiJ (c) = 0.01 for all i ∈ N , c ∈ Ci , J ⊂ Tic .
to the chance-constrained program. Firstly, to evaluate the For the channel setting, we assume that there are C = 5
gap between our algorithm and the optimal solution, we licensed channels that can be opportunistically used by SUs.
can remove constraint (12) in the program, whose solution The number of available channels at each node is randomly
forms an upper bound of the performance of our proposed selected from [1, C], and the exact set of available channels is
algorithm. Since the modified program is apparently a normal randomly constructed from the channel pool {1, 2, . . . , C}.
convex problem, we then solve it using the similar dual As to the probability distribution of the channel band-
decomposition and subgradient method and label the new width B c , its exact expression is determined by the cor-
solution as “Upper bound” in the figures. As is known to all, responding occupancy of PUs. Based on the measurement
there is no available network coding-based multicast algorithm study on spectrum utilization in [15], the distribution can be
for multi-hop CRNs in existing literatures. Therefore, we exponential. Accordingly, we first consider the exponential
employ the following algorithm to validate the use of the case, i.e., B c ∼ E(υ c ), where υ c ∈ (0, 3]. Note that different
chance-constrained program. channel c may have different distribution parameter υ c . In
Specifically, we incorporate an approach called as Robust our simulations, we randomly choose υ c from (0, 3] for each
network coding that simply substitutes the bandwidth B c to the channel c to simulate heterogeneous channels. Moreover, to
expectation value of B c in the link capacity hiJ (c). It should validate the effectiveness of our proposed algorithm, we also
be noted that this algorithm employs network coding in the conduct a similar simulation study on a normal bandwidth
multicast transmission but does not consider the uncertainty distribution, i.e., B c follows a normal distribution, B c ∼
of spectrum availability. Note that the robust network coding 2
N (μ , σ  ). In the simulations, μ and σ  are set as 2 and 1,
algorithm also employs a dual decomposition and subgradient respectively. Worth noting that the analysis and results can be
method similar as in our proposed decentralized algorithm. easily extended to any other distribution.
Besides, to show the benefits of network coding on multicast in As to the initialization of Lagrange multipliers in our
multi-hop CRNs, we implement the approach (labeled “Non- proposed algorithm and three other algorithms, we set the
network coding” in the figures) in [3] that studies multicast in initial values of λdiK (c) and μiK (c) to be different random
multi-hop CRNs without network coding. values chosen from (0, 0.1). Also, we run these algorithms
with the stepsizes chosen to be η1 [t] = 1t and η2 [t] = 1t . Due to
B. Setup the randomly deployment of both nodes and channels as well
For ease of scalability, the distance, rate, bandwidth and as the inherent spectrum scarce and limited transmission range
power are normalized with appropriate dimensions in our of nodes, there may exist disconnections between the source
simulation. We conduct simulations with a CRN over random and some destinations, which results in no feasible solution
network topologies, where nodes are randomly placed on for some specific data set. Therefore, in this study, we focus
a square region. We evaluate all algorithms in a network only on the data sets with feasible solutions, and present the
topology with 20 nodes on a 80 × 80 square. Specifically, corresponding results in the following subsection.
the location of each node is randomly chosen from the square
region with a uniform probability L1 , where L is the number C. Single Multicast Flow
of locations. We consider the leftmost node to always be 1) Exponential Distribution Case: We first present
the source s and two sets of sinks for the single multicast the simulation results of a single multicast flow with
flow case, i.e., the two rightmost nodes and the five rightmost two and five sinks, when the bandwidth B c follows
nodes, respectively. And for the multiple multicast flows case, exponential distribution, as illustrated in Fig. 3 and Fig. 4,
we suppose that there are three multicast flows (each with respectively. Fig. 3(a) shows the throughput performance of
three sinks). Under our interference model, the link-channel our decentralized algorithm over a multicast flow with two
interference and self-interference at the physical layer are sinks under Exponential distribution, compared to the upper
developed in our simulations after the above settings. bound, robust network coding algorithm and non-network
Following previous works [3], [18], the explicit settings coding algorithm, when the channel erasure rate p varies.
of each node are as follows. The power propagation gain According to the figure, firstly, our algorithm outperforms the
between node i and node j is gij = γd−n ij , where dij denotes non-network coding algorithm, no matter how the channel
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 11

Fig. 3. Maximum multicast rate as a function of channel erasure rate for Fig. 5. Maximum multicast rate as a function of channel erasure rate for
a single multicast flow with two sinks under Exponential distribution, i.e., a single multicast flow with two sinks under Normal distribution,
B c ∼ E(υc ), υc ∈ (0, 3]. (a) Performance comparison of four algorithms. i.e., B c ∼ N (2, 1). (a) Performance comparison of four algorithms.
(b) Performance ratio of our decentralized algorithm. (b) Performance ratio of our decentralized algorithm.

Fig. 6. Maximum multicast rate as a function of channel erasure rate for


Fig. 4. Maximum multicast rate as a function of channel erasure rate for
a single multicast flow with five sinks under Normal distribution,
a single multicast flow with five sinks under Exponential distribution, i.e.,
i.e., B c ∼ N (2, 1). (a) Performance comparison of four algorithms.
B c ∼ E(υc ), υc ∈ (0, 3]. (a) Performance comparison of four algorithms.
(b) Performance ratio of our decentralized algorithm.
(b) Performance ratio of our decentralized algorithm.

quality deteriorates. This is because with network coding, both


wireless broadcast nature and multipath benefits are effectively
exploited in multi-hop CRNs, while without network coding,
packets are transmitted for each sink on one single path only.
Further, we find that the performance of the robust network
coding algorithm is a little worse than the non-network coding
algorithm, due to the overly conservative constraints on link
capacity. And this shows the importance of considering Fig. 7. Sum of multicast rate as a function of channel erasure rate for
the uncertainty of spectrum availability. Moreover, from multiple multicast flows under Exponential distribution, i.e., B c ∼ E(υc ),
Fig. 3(b), our decentralized algorithm achieves a competitive υc ∈ (0, 3]. (a) Performance comparison of four algorithms. (b) Performance
performance compared with the upper bound. And the gain ratio of our decentralized algorithm.
of our decentralized algorithm over robust network coding
and 1.8182× maximum multicast rate over robust network
and non-network coding is up to 1.9412× and 1.6837×,
coding and non-network coding, respectively. Moreover, from
respectively. The above phenomena are similar when there are
Fig. 6, compared to the two sinks case, the performance gain
five sinks, as shown in Fig. 4. And we find that the gain of our
of our decentralized algorithm is higher, i.e., up to 3.368× over
proposed algorithm over both robust network coding and non-
non-network coding and 2.844× over robust network coding,
network coding is relatively stable, up to ∼1.91 and ∼2.11,
respectively. And as illustrated in Fig. 6(b), the “Over robust
respectively. The ratio of our proposed algorithm to the upper
network coding” curve and “Over non-network coding“ curve
bound in the five sinks case is steady at [0.73, 0.79]. This illus-
has a cross point when the channel erasure rate varies. This
trates that our algorithm is effective in a bigger set of sinks.
is because the multicast rates of the two algorithms are small
2) Normal Distribution Case: Fig. 5 and Fig. 6 show the
and unstable as shown in Fig. 6(a).
evaluation results of a single multicast flow with two and five
sinks under Normal distribution, respectively. Specifically, in
Fig. 5, we evaluate the performance of all algorithms under D. Multiple Multicast Flows
Normal distribution with two sinks, when the channel erasure Fig. 7 and Fig. 8 illustrate the performance of the proposed
rate p changes from 0.05 to 0.25. As shown in the figure, decentralized algorithm when there are three multiple flows
similar to Fig. 3, compared to the robust network coding in the network, under Exponential and Normal distribution,
algorithm and the non-network coding algorithm, our proposed respectively. From these figures, we can see that, compared
algorithm always achieves higher maximum multicast rates to both robust network coding and non-network coding, our
when the channel erasure rate varies. Similarly, the perfor- decentralized algorithm still achieves higher multicast rate
mance of the robust network coding algorithm is as low in both distributions. Moreover, according to Fig. 7(b) and
as that of non-network coding algorithm. And according to Fig. 8(b), we find that the performance gain of the proposed
Fig. 5(b), our decentralized algorithm achieves at most 2.5× algorithm in multiple multicast flows case is higher than that
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE/ACM TRANSACTIONS ON NETWORKING

schemes in multi-hop multichannel wireless ad hoc networks.


With opportunistic overhearing, Chieochan and Hossain [14]
proposed a suboptimal, auction-based solution for the overall
network throughput optimization with network coding in
MR-MC networks. Lin and Yang [29] studied the problem of
multirate multichannel multicast with intra-session network
coding. However, these studies for MR-MC networks are
not applicable to our problem. This is because in MR-MC
Fig. 8. Sum of multicast rate as a function of channel erasure rate for networks, the set of common available channels for every
multiple multicast flows under Normal distribution, i.e., B c ∼ N (2, 1). node in the network is assumed fixed and corresponding link
(a) Performance comparison of four algorithms. (b) Performance ratio of our
decentralized algorithm.
capacity is definite, which is impractical for CRNs.

B. Multicast in Multi-Hop CRNs


Since there are multiple channels in CRNs, the problem
of multicast in multi-hop CRNs always incorporates the
routing and channel assignment jointly [4], [25], [26].
Kim et al. [25] improved the scalability of the classical
routing protocol ODMRP [27] to support multicast
services in a cognitive radio ad hoc wireless network.
Fig. 9. Convergence of the distributed algorithm. (a) Single multicast flow. Almasaeid et al. [26] proposed an on-demand multicast
(b) Multiple multicast flows. routing algorithm for cognitive radio mesh networks. In [4],
a reactive joint channel allocation and multicast scheme is
in single multicast flow case. This is because under multiple proposed for a multi-hop CRN. Gao et al. [3] formulated
multicast flows, with network coding and careful consider- the problem of multicast in multi-hop CRNs as mixed
ation into the uncertain spectrum availability, our proposed linear program to minimize the required resources. Besides,
algorithm not only better uses the benefits of network coding Almasoud and Kamal [28] studied the robust multicasting in
over multi-path routing, but also fully utilizes the available the face of failures in CRNs, and proposed two algorithms
spectrums in CRNs. that provide robust multicasting in such scenarios. However,
none of the aforementioned works utilizes network coding to
E. Convergence pursue higher throughput performance.
In Fig. 9, we illustrate the convergence of the decentralized
C. The Utilization of Network Coding in CRNs
algorithm with a single multicast flow and multiple multicast
flows. Since the optimal value of the maximum multicast rate A large body of work has been carried out on exploiting the
(sum of multicast rate in the multiple multicast flows case), various possible benefits of network coding in CRNs from dif-
i.e., R∗ , cannot be efficiently obtained, we use instead the ferent angles recently. Using network coding as an assistance
improvement in the maximum multicast rate in each iteration, strategy, Almasaeid and Kamal [5] proposed an algorithm
i.e., R∗ = R∗ [t + 1] − R∗ [t]. From the figures, we note that to reduce the effect of the channel heterogeneity property
our algorithm achieves fast convergence in both cases, where on the multicast throughput in cognitive radio wireless mesh
R∗ quickly converges close to zero within ∼60 iterations. networks. Qu et al. [30] develops an efficient network coding
strategy for SUs to improve the broadcast throughput while
VIII. R ELATED W ORK considering the uncertain idle durations in CRNs. Note that
in [5] and [30], network coding is restricted in single hop,
In this section, we review the related work in the following which restricts its application in our problem. Network coding
three aspects: network coding-based multicast in MR-MC is viewed as a spectrum shaper to increase the spectrum avail-
networks, multicast in multi-hop CRNs, and the utilization of ability and predictability for SUs, through exploiting network
network coding in CRNs. coding on PUs only [31]. Shu et al. [32] proposed a network
coding-aware channel allocation and routing scheme for multi-
A. Network Coding-Based Multicast in MR-MC Networks hop CRNs. However, network coding is actually not utilized
Although how to utilize network coding to enhance in SUs’ data transmissions in [32]. Besides, Jin et al. [2]
multicast throughput in singleradio-singlechannel networks studied multicast scheduling with cooperation and network
has been extensively studied, the benefits of network coding in CRNs, where network coding is mainly used to
coding over multicast in multiradio-multichannel (MR-MC) reduce overhead and perform error control.
networks are also validated in recent works [12]–[14], [29].
Zhang and Li [12] showed that network coding can further D. Multi-Path Routing and Multiple
increase the capacity of multichannel mesh networks. Unicast in Multi-Hop CRNs
Su and Zhang [13] modeled the throughput gains of In essence, our work is a kind of multi-path routing in multi-
conventional network coding and analog network coding hop CRNs. In related studies, Beltagy et al. [39] proposed
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QU et al.: MULTICAST IN MULTIHOP CRNs UNDER UNCERTAIN SPECTRUM AVAILABILITY 13

a novel routes selection metric for multi-path routing in [8] D. S. Lun et al., “Minimum-cost multicast over coded packet networks,”
multi-hop CRNs, and validated the effectiveness of the new IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2608–2623, Jun. 2006.
[9] T. Ho and H. Viswanathan, “Dynamic algorithms for multicast with
metric in enhancing end-to-end throughput and increasing intra-session network coding,” IEEE Trans. Inf. Theory, vol. 55, no. 2,
connection reliability by extensive simulations. Shu et al. [41] pp. 797–815, Feb. 2009.
studied the problem of minimizing the end-to-end delay [10] A. Khreishah, I. M. Khalil, and J. Wu, “Distributed network coding-
based opportunistic routing for multicast,” in Proc. ACM MobiHoc,
with multi-path routing in multi-hop CRNs, and proposed 2012, pp. 115–124.
a channel allocation and rate allocation scheme with low [11] D. Traskov, M. Heindlmaier, M. Médard, and R. Koetter, “Scheduling
complexity based on graph coloring. Shi and Hou [40] for network-coded multicast,” IEEE/ACM Trans. Netw., vol. 20, no. 5,
pp. 1479–1488, Oct. 2012.
investigated how to maximize the data rate for several user [12] X. Zhang and B. Li, “On the benefits of network coding in multi-channel
communication sessions with multi-path routing in multi-hop wireless networks,” in Proc. IEEE SECON, Jun. 2008, pp. 341–349.
CRNs, and presented a distributed optimization algorithm that [13] H. Su and X. Zhang, “Modeling throughput gain of network coding in
multi-channel multi-radio wireless ad hoc networks,” IEEE J. Sel. Areas
increases the data rate iteratively for the sessions. Besides, Commun., vol. 27, no. 5, pp. 593–605, Jun. 2009.
considering the uncertain spectrum supply, Pan et al. [18] [14] S. Chieochan and E. Hossain, “Channel assignment for through-
studied the joint multi-path routing and frequency scheduling put optimization in multichannel multiradio wireless mesh networks
problem in multi-hop CRNs. However, compared to the above using network coding,” IEEE Trans. Mobile Comput., vol. 12, no. 1,
pp. 118–135, Jan. 2013.
studies, there are at least two differences from our work. [15] D. Chen, S. Yin, Q. Zhang, M. Liu, and S. Li, “Mining spectrum
First, we intend to employ network coding to pursue further usage data: A large-scale spectrum measurement study,” in Proc. ACM
performance improvement, while they do not use network MobiCom, 2009, pp. 13–24.
[16] M. Mehenry. (Jun. 2003). Spectrum White Space Measurements.
coding in the multi-path routing. When network coding is [Online]. Available: http://www.newamerica.net/Download_Docs/pdfs/
introduced, these studies cannot be applied since they do Doc_File_185_1.pdf
not consider the coding subgraph optimization, which is the [17] M. Wellens, J. Riihijärvi, and P. Mähönen, “Evaluation of adaptive mac-
layer sensing in realistic spectrum occupancy scenarios,” in Proc. IEEE
key issue of network coding-based multicast problems [8]. DySPAN, Apr. 2010, pp. 1–12.
Second, all the aforementioned works focus on the service of [18] M. Pan, C. Zhang, P. Li, and Y. Fang, “Spectrum harvesting and sharing
multiple unicast flows in multi-hop CRNs, which only fits for in multi-hop CRNs under uncertain spectrum supply,” IEEE J. Sel. Areas
Commun., vol. 30, no. 2, pp. 369–378, Feb. 2012.
the data transmission of point-to-point (unicast) other than [19] A. Nemirovski and A. Shapiro, “Convex approximations of chance
point-to-multipoint (multicast). constrained programs,” SIAM J. Optim., vol. 17, no. 4, pp. 969–996,
2006.
IX. C ONCLUSION [20] A. Ben-Tal and A. Nemirovski, “Selected topics in robust convex
optimization,” Math. Program., vol. 112, no. 1, pp. 125–158, 2008.
In this paper, we for the first time studied the network [21] A. Nemirovski, “On safe tractable approximations of chance con-
coding-based multicast problem in multi-hop CRNs, while straints,” Eur. J. Oper. Res., vol. 219, no. 3, pp. 707–718, 2012.
considering the uncertain spectrum availability. We formulated [22] G. Ganesan and Y. G. Li, “Cooperative spectrum sensing in cognitive
radio networks,” in Proc. IEEE DySpAN, Nov. 2005, pp. 137–143.
the overall problem as a chance-constrained program. We [23] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for
constructed a TDCG to encapsulate both hyperarc scheduling cognitive radio applications,” IEEE Commun. Surveys Tuts., vol. 11,
and channel selection into hyperarc-channel tuples. Though no. 1, pp. 116–130, 1st Quart., 2009.
[24] Y. Cheng, H. Li, and P.-J. Wan, “A theoretical framework for optimal
appropriate Bernstein approximation and relaxation of finding cooperative networking in multiradio multichannel wireless networks,”
stable sets in the TDCG, we proposed an efficient distributed IEEE Wireless Commun., vol. 19, no. 2, pp. 66–73, Apr. 2012.
algorithm for the original problem. Simulation results showed [25] W. Kim, S. Y. Oh, M. Gerla, and J.-S. Park, “COCAST: Multicast
mobile ad hoc networks using cognitive radio,” in Proc. IEEE MILCOM,
that our algorithm obtains higher multicast rates than the Oct. 2009, pp. 1–7.
non-network coding algorithm and the robust network coding [26] H. M. Almasaeid, T. H. Jawadwala, and A. E. Kamal, “On-demand
algorithm in CRNs. We also extend our theoretic framework multicast routing in cognitive radio mesh networks,” in Proc. IEEE
GLOBECOM, Dec. 2010, pp. 1–5.
to multiple multicast flows. [27] S.-J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol
in multihop wireless mobile networks,” Mobile Netw. Appl., vol. 7, no. 6,
R EFERENCES pp. 441–453, 2002.
[1] J. Mitola, III, “Cognitive radio: An integrated agent architecture for soft- [28] A. M. Almasoud and A. E. Kamal, “Robust provisioning of multi-
ware defined radio,” Ph.D. dissertation, Royal Inst. Technol., Stockholm, cast sessions in cognitive radio networks,” in Proc. IEEE IWCMC,
Sweden, 2000. Aug. 2014, pp. 417–422.
[2] J. Jin, H. Xu, and B. Li, “Multicast scheduling with cooperation and [29] K. C.-J. Lin and D.-N. Yang, “Multicast with intraflow network coding
network coding in cognitive radio networks,” in Proc. IEEE INFOCOM, in multirate multichannel wireless mesh networks,” IEEE Trans. Veh.
Mar. 2010, pp. 1–9. Technol., vol. 62, no. 8, pp. 3913–3927, Oct. 2013.
[3] C. Gao, Y. Shi, Y. T. Hou, H. D. Sherali, and H. Zhou, “Multicast [30] Y. Qu et al., “Towards near optimal network coding for secondary users
communications in multi-hop cognitive radio networks,” IEEE J. Sel. in cognitive radio networks,” in Proc. IEEE SECON, Jun./Jul. 2014,
Areas Commun., vol. 29, no. 4, pp. 784–793, Apr. 2011. pp. 522–530.
[4] Z. Shu, Y. Qian, Y. Yang, and H. Sharif, “Channel allocation and [31] A. Fanous, Y. E. Sagduyu, and A. Ephremides, “Reliable spectrum
multicast routing in cognitive radio networks,” in Proc. IEEE WCNC, sensing and opportunistic access in network-coded communications,”
Apr. 2013, pp. 1703–1708. IEEE J. Sel. Areas Commun., vol. 32, no. 3, pp. 400–410, Mar. 2014.
[5] H. M. Almasaeid and A. E. Kamal, “Exploiting multichannel diversity [32] Z. Shu, J. Zhou, Y. Yang, H. Sharif, and Y. Qian, “Network coding-
for cooperative multicast in cognitive radio mesh networks,” IEEE/ACM aware channel allocation and routing in cognitive radio networks,” in
Trans. Netw., vol. 22, no. 3, pp. 770–783, Jun. 2014. Proc. IEEE GLOBECOM, Dec. 2012, pp. 5590–5595.
[6] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network infor- [33] A. Charnes, W. W. Cooper, and G. H. Symonds, “Cost horizons and
mation flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, certainty equivalents: An approach to stochastic programming of heating
Jul. 2000. oil,” Manage. Sci., vol. 4, no. 3, pp. 235–263, 1958.
[7] T. Ho et al., “A random linear network coding approach to multicast,” [34] M. Garey and D. Johnson, Computers and Intractability: A Guide to the
IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006. Theory of NP-Completeness. San Francisco, CA, USA: Freeman, 1979.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

14 IEEE/ACM TRANSACTIONS ON NETWORKING

[35] D. P. Bertsekas and R. G. Gallager, Data Networks, 2nd ed. Fan Wu received the B.S. degree in computer
Upper Saddle River, NJ, USA: Prentice-Hall, 1992. science from Nanjing University in 2004, and the
[36] S. Basagni, “Finding a maximal weighted independent set in wireless Ph.D. degree in computer science and engineering
networks,” Telecommun. Syst., vol. 18, nos. 1–3, pp. 155–168, 2001. from the State University of New York at Buffalo
[37] T. Larsson, M. Patriksson, and A.-B. Strömberg, “Ergodic, primal in 2009. He has visited the University of Illinois at
convergence in dual subgradient schemes for convex programming,” Urbana–Champaign as a Post Doc Research Asso-
Math. Program., vol. 86, no. 2, pp. 283–312, 1999. ciate. He is currently an Associate Professor with the
[38] T. Bonald and L. Massoulié, “Impact of fairness on Internet perfor- Department of Computer Science and Engineering,
mance,” in Proc. ACM SIGMETRICS, 2001, pp. 82–91. Shanghai Jiao Tong University. His research interests
[39] I. Beltagy, M. Youssef, and M. El-Derini, “A new routing metric and include wireless networking and mobile computing,
protocol for multipath routing in cognitive networks,” in Proc. IEEE algorithmic network economics, and privacy preser-
WCNC, Mar. 2011, pp. 974–979. vation. He has authored over 70 peer-reviewed papers in leading technical
[40] Y. Shi and Y. T. Hou, “A distributed optimization algorithm for multi- journals and conference proceedings. He is a receipt of the China National
hop cognitive radio networks,” in Proc. IEEE INFOCOM, Apr. 2008, Natural Science Fund for Outstanding Young Scientists, the CCF-Intel Young
pp. 1966–1974. Faculty Researcher Program Award, the CCF-Tencent Rhinoceros bird Open
[41] Z. Shu, Y. Qian, and R. Q. Hu, “Delay based channel allocations in Fund, and the Pujiang Scholarship. He has served as the Chair of the
multi-hop cognitive radio networks,” in Proc. IEEE IWCMC, Aug. 2015, CCF YOCSEF Shanghai, on the Editorial Board of Computer Communi-
pp. 1475–1480. cations, and as a member of technical program committees of more than
[42] S. Geirhofer, L. Tong, and B. M. Sadler, “Dynamic spectrum access in 40 academic conferences.
WLAN channels: Empirical model and its stochastic analysis,” in Proc.
ACM TAPAS, 2006, pp. 271–275.
[43] J. Pintér, “Deterministic approximations of probability inequalities,”
Zeitschrift Oper. Res., vol. 33, no. 4, pp. 219–239, 1989.
[44] P. Wang, G. Mao, Z. Lin, X. Ge, and B. D. O. Anderson, “Network
coding based wireless broadcast with performance guarantee,” IEEE
Trans. Wireless Commun., vol. 14, no. 1, pp. 532–544, Jan. 2015. Shaojie Tang (S’09–M’14) received the B.S. degree
[45] H. Fukui, P. Popovski, and H. Yomo, “Physical layer network coding: in radio engineering from Southeast University,
An outage analysis in cellular network,” in Proc. 22nd Eur. Signal China, in 2006, and the Ph.D. degree from the
Process. Conf. (EUSIPCO), 2014, pp. 1133–1137. Department of Computer Science, Illinois Institute
of Technology, in 2012. He is currently an Assis-
tant Professor with the Naveen Jindal School of
Management, University of Texas at Dallas. His
main research interests focus on wireless networks
(including sensor networks and cognitive radio net-
Yuben Qu received the B.S. degree in mathematics
works), social networks, security and privacy, and
and applied mathematics from Nanjing University
game theory. He has served on the Editorial Board
in 2009, and the M.S. degree in communication
of the Journal of Distributed Sensor Networks. He also served as a TPC
and information systems and the Ph.D. degree in
Member of a number of conferences, such as the ACM MobiHoc, the IEEE
computer science and technology from the PLA Uni-
ICNP, and the IEEE SECON.
versity of Science and Technology in 2012 and 2016,
respectively. He is currently a Research Assistant
with the Rocket Force University of Engineering,
China. His research interests include D2D commu-
nication, crowdsensing, and network coding.

Hai Wang (SM’14) received the Ph.D. degree in


communications engineering from the PLA Univer-
sity of Science and Technology, China, in 1999.
He is currently a Professor with the College of
Chao Dong (M’06) received the Ph.D. degree in Communications Engineering, PLA University of
communication engineering from the PLA Univer- Science and Technology. His current research inter-
sity of Science and Technology, China, in 2007. ests include wireless network, cognitive network,
From 2008 to 2011, he held a post-doctoral position and network coding. He was the Publication Chair
with the Department of Computer Science and Tech- of Wireless Communications and Signal Processing
nology, Nanjing University, China. He is currently an 2011.
Associate Professor with the College of Communi-
cation Engineering, PLA University of Science and
Technology. His research interests include wireless
cognitive networks, software defined networks, and
network coding. He is a member of the IEICE.

Chang Tian received the B.S. degree in commu-


nication and information system and the M.S. and
Haipeng Dai received the B.S. degree from the Ph.D. degrees in computer science and engineering
Department of Electronic Engineering, Shanghai from the Institute of Communications Engineering,
Jiao Tong University, Shanghai, China, in 2010, and Nanjing, China, in 1984, 1989, and 2001, respec-
the Ph.D. degree from the Department of Com- tively. From 1995 to 1996, he was a Visiting Scholar
puter Science and Technology, Nanjing University, with the Università di Pisa of Italy. He is currently
Nanjing, China, in 2014. He is currently a Research a Professor with the PLA University of Science
Assistant with the Department of Computer Science and Technology, China. He has published widely
and Technology, Nanjing University, Nanjing, China. in the areas of distributed system, wireless ad hoc
His research interests are mainly in the areas of network, signal processing for communications, and
wireless sensor networks, wireless power transfer, information theory. His current research interests include wireless sensor
and smartphone. network and network coding.

You might also like