Learning Wireless Networks' Topologies Using Asymmetric Granger Causality

by   Mihir Laghate, et al.

Sharing spectrum with a communicating incumbent user (IU) network requires avoiding interference to IU receivers. But since receivers are passive when in the receive mode and cannot be detected, the network topology can be used to predict the potential receivers of a currently active transmitter. For this purpose, this paper proposes a method to detect the directed links between IUs of time multiplexing communication networks from their transmission start and end times. It models the response mechanism of commonly used communication protocols using Granger causality: the probability of an IU starting a transmission after another IU's transmission ends increases if the former is a receiver of the latter. This paper proposes a non-parametric test statistic for detecting such behavior. To help differentiate between a response and the opportunistic access of available spectrum, the same test statistic is used to estimate the response time of each link. The causal structure of the response is studied through a discrete time Markov chain that abstracts the IUs' medium access protocol and focuses on the response time and response probability of 2 IUs. Through NS-3 simulations, it is shown that the proposed algorithm outperforms existing methods in accurately learning the topologies of infrastructure-based networks and that it can infer the directed data flow in ad hoc networks with finer time resolution than an existing method.


page 1

page 2

page 3

page 4


Sense-and-Predict: Harnessing Spatial Interference Correlation for Opportunistic Access in Cognitive Radio Networks

Cognitive radio (CR) is a key enabler realizing 5G networks to achieve h...

Medium Access Control protocol for Collaborative Spectrum Learning in Wireless Networks

In recent years there is a growing effort to provide learning algorithms...

On the Coverage of Cognitive mmWave Networks with Directional Sensing and Communication

Millimeter-waves' propagation characteristics create prospects for spati...

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security

Millimeter-wave (mmWave) communications are highly promising to improve ...

Levenberg-Marquardt Method Based Cooperative Source Localization in SIMO Molecular Communication via Diffusion Systems

Molecular communication underpins nano-scale communications in nanotechn...

Efficiency and detectability of random reactive jamming in carrier sense wireless networks

A natural basis for the detection of a wireless random reactive jammer (...

Please sign up or login with your details

Forgot password? Click here to reset