A Game-Theoretic Approach for Energy-Efficient Contention-Based ...

0 downloads 0 Views 3MB Size Report
Feb 12, 2013 - Abstract—The purpose of this paper is to provide a novel energy- efficient perspective to the problem of contention-based synchro- nization in ...
1258

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

A Game-Theoretic Approach for Energy-Efficient Contention-Based Synchronization in OFDMA Systems Giacomo Bacci, Member, IEEE, Luca Sanguinetti, Member, IEEE, Marco Luise, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE

Abstract—The purpose of this paper is to provide a novel energyefficient perspective to the problem of contention-based synchronization in orthogonal frequency-division multiple-access communication systems. This is achieved by modeling the terminals and their corresponding receivers at the base station as economic and rational agents that engage in a noncooperative game. In the proposed game, each one trades off its available resources (transmit power and detection strategy) so as to selfishly maximize its own revenue (in terms of probability of correct detection) while saving as much energy as possible and satisfying quality-of-service requirements given in terms of probability of false alarm and timing estimation accuracy. The existence and uniqueness of the equilibrium of the game are studied. In particular, a necessary and sufficient condition on the system parameters is given for the equilibrium to exist. An iterative and distributed algorithm based on best-response dynamics (at the transmit side) and a practical parameter estimation (at the receive side) are proposed to achieve the equilibrium point. Numerical results are used to highlight the effectiveness of the proposed solution and to make comparisons with existing alternatives in terms of power consumption, synchronization time, and estimation accuracy. Index Terms—Best-response dynamic, contention-based synchronization, energy efficiency, game-theory, generalized Nash equilibrium, GLRT, IEEE 802.16, LTE-Advanced, OFDMA, power allocation.

I. INTRODUCTION A. Motivation

T

HE demand for high data rates in wireless communications has led to a strong interest in orthogonal frequency-division multiple-access (OFDMA) technologies

Manuscript received June 11, 2012; revised August 27, 2012 and November 13, 2012; accepted November 13, 2012. Date of publication December 03, 2012; date of current version February 12, 2013. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Samson Lasaulce. The research leading to these results has received funding from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement n. PIOF-GA-2011-302520 GRAND-CRU Game-theoretic Resource Allocation for wireless Networks based on Distributed and Cooperative Relaying Units. This work was presented in part at the Fiftieth Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, USA, October 2012. G. Bacci is with the Department of Information Engineering, University of Pisa, 56126 Pisa, Italy, and also with the Department of Electrical Engineering, Princeton University, Princeton, NJ 08544 USA (e-mail: giacomo.bacci@iet. unipi.it; [email protected]). L. Sanguinetti and M. Luise are with the Department of Information Engineering, University of Pisa, 56126 Pisa, Italy (e-mail: luca.sanguinetti@iet. unipi.it; [email protected]). H. V. Poor is with the Department of Electrical Engineering, Princeton University, Princeton, NJ, 08544 USA (e-mail: [email protected]). Digital Object Identifier 10.1109/TSP.2012.2231679

due to their advantages in terms of dynamic channel allocation, spectral efficiency and robustness to multipath distortions. For these reasons, OFDMA-based technologies have been adopted by the WiMAX alliance [1] and the Third-Generation Partnership Project (3GPP) [2] for efficient packet-based mobile broadband communications. To maintain orthogonality among subcarriers of different users and avoid the occurrence of multiple access interference (MAI), uplink signals arriving at the base station (BS) should be aligned to the local time and frequency references [3]. For this purpose, the WiMAX alliance specifies a network entry procedure called initial ranging (IR) by which subscribers can achieve uplink synchronization and power control [4]. A similar procedure called random access (RA) is specified by the 3GPP for the (advanced) long-term evolution (LTE) standard [5]. In their basic forms, the IR and RA functions are contention-based synchronization procedures developing through the following steps. Each terminal that intends to establish a communication link with the BS (also known as eNodeB) achieves downlink synchronization using a common control channel. The synchronization parameters estimated in the downlink are used by each terminal as references in the subsequent uplink phase, during which each terminal notifies its entry request by transmitting a randomly chosen code over a specified set of subcarriers.1 As a result of different positions within the radio coverage area, synchronization signals transmitted by different terminals arrive at the BS with different time delays and power levels. After identifying the active codes and their corresponding timing and power information, the BS broadcasts a response packet indicating which codes have been detected and giving instructions for timing and power adjustments. If a terminal does not receive any response message, after a specified time it performs another synchronization attempt using a higher power level. To minimize the probability of collision, the time between two successive attempts is typically randomized on the basis of some specified contention resolution methods. For instance, the approach adopted in WiMAX relies on the binary exponential backoff (BEB) algorithm [4]. From the above discussion, it follows that code identification as well as multiuser timing and power estimation are the main tasks of the BS in contention-based synchronization processes. These problems have received great attention in the last 1In WiMAX, the entry request of each terminal is generated from a binary phase-shift keying ranging code and is transmitted over groups of adjacent subcarriers arbitrarily positioned within the available spectrum. In LTE, it is obtained by applying different cyclic shifts to a Zadoff-Chu sequence [5] and it is transmitted over a single set of adjacent subcarriers.

1053-587X/$31.00 © 2012 IEEE

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

few years and some solutions are currently available (see for example [6]–[11]). All these works are focused on the detection and estimation problems mentioned above, under the assumption that the terminals deterministically increase their transmit powers upon successful synchronization. In this work, we look at the problem from a different perspective by focusing on the joint detection/estimation and power allocation issues. In particular, we derive a low-complexity and scalable procedure that allows each terminal and the BS to locally choose the transmit power and the detection strategy so as to obtain a good tradeoff between detection capabilities and power consumption. This is achieved by modeling the terminals and the BS as economic and rational agents that engage in a noncooperative game [12], [13] in which each one trades off its available resources (transmit power and detection strategy). The main goal of each terminal is to selfishly maximize its own revenue in terms of probability of being detected while saving as much energy as possible and satisfying quality of service (QoS) requirements given in terms of probability of false alarm and accuracy of its timing estimate.

B. Prior Work Game theory provides an analytical framework to study complex interactions among rational entities, and has attracted a significant interest by the wireless communication and signal processing communities in the last few years (see [14]–[16] and references therein). In particular, there exists a substantial literature on power control techniques based on noncooperative game theory [12]. Most of them are focused on the data transmission phase in wireless communications. Among the different formulations available in literature, particularly significant is the energy-efficient approach (see [17] and references therein), which is specifically tailored for a battery-powered mobile population as it aims at capturing the tradeoff between achieving a satisfactory error-rate and saving as much energy as possible. This framework, originally developed for voice traffic [18], has been extended to code-division multiple-access (CDMA) systems [19], [20], multicarrier networks [21], ultrawideband systems [22], and ad-hoc networks [23]. Energy-efficient resource allocation schemes for multicell OFDMA-based networks based on noncooperative game theory have been recently investigated in [24]–[27]. As mentioned before, the focus of the aforementioned works is on the data transmission phase, in which the terminals are already synchronized to the BS references. In this work, we investigate the network association phase, in which the terminals notify the BS of their entries through the procedure summarized in Section I.A. To the best of our knowledge, energy efficiency during this stage has been investigated only in [28], [29] for a CDMA wireless network in a flat-fading scenario, and extended in [30] to include a frequency-selective channel. In this work, we use a similar approach to improve the energy efficiency of contention-based synchronization procedures for wideband OFDMA single-cell systems. Although we adopt a similar optimization criterion, notable differences with respect to [28]–[30] can be highlighted: i) the detection strategy is included in the optimization problem, and not just the detection threshold given a particular code detection technique; ii) the

1259

parameter estimation accuracy is included in the game, given the particular requirements of OFDMA synchronization; and iii) in [28]–[30], simulations are conducted using the average performance of the detectors, including average auto- and cross-correlation properties of the spreading codes and perfect channel state information (CSI); in this paper, the simulation platform contains more physical-layer details, and all the results are obtained using random channel realizations (based on frequency-selective models), system parameters specified by existing standards (including spreading codes), and estimated parameters fed back by the BS (thus including the impact of imperfect CSI and estimation errors on the resource allocation performance). C. Contributions The main contributions of this paper are as follows. • A novel perspective on contention-based synchronization in OFDMA-based systems is provided. This is achieved by modeling the network elements as economic and rational agents that trade off transmit powers and detection strategies so as to selfishly maximize the probability of correct synchronization using an energy-efficient approach and satisfying given QoS requirements. • A game-theoretic framework is used: i) to identify optimization criteria for system design; ii) to derive a low-complexity and scalable procedure that allows each terminal to regulate its power in a distributed manner on the basis of its estimated signal-to-interference-plus-noise ratio (SINR) at the BS; and iii) to derive a low-complexity detection/estimation scheme allowing the BS to detect the selected codes and to estimate the associated synchronization parameters, without any prior information on the terminals currently in the network association stage. • Numerical results are used to highlight the effectiveness of the proposed solution with respect to existing alternatives based on a deterministic increase of the transmit power (with or without contention resolution methods). It turns out that the proposed solution allows each terminal to be detected with a limited amount of power in a shorter time interval while providing better timing and power estimation accuracy. D. Organization The remainder of the paper is structured as follows.2 Section II describes the system model, whereas Section III formulates the problem and uses the analytical tools of game theory to investigate its solution. Section IV presents an iterative and distributed algorithm to reach the equilibrium point, whereas Section V reports some simulation results and comparisons with alternatives. Conclusions are drawn in Section VI. 2The following notation is used throughout the paper. Matrices and vectors and are the identity matrix and the are denoted by boldface letters. all-zero vector, whereas denotes an diagonal matrix with entries along its main diagonal. We use and for expectation, transposition and Hermitian transposition, resp., for the Euclidean norm of the enclosed vector, and to round to the nearest integer towards zero.

1260

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

II. SYSTEM AND SIGNAL MODEL A. System Model We consider an OFDMA-based transmission technology emsubcarriers with frequency spacing . To avoid ploying aliasing problems at the receiver, null subcarriers are placed at both edges of the signal spectrum. The available subcarriers are split into a synchronization subchannel, used for the network association, and several data subchannels, used for data transfer. The former is employed by synchronization terminals (STs) that must complete their synchronization procedure, while the latter are assigned to data terminals (DTs) that entered the network at an earlier stage and have already achieved synchronization. Following [4], the synchronization subchannel is further divided into subbands and a given subband comprises a set of adjacent subcarriers, which is called a tile. We denote the index of the th subcarrier within the th tile by and call the set collecting the subcarrier indices of the th tile. The only constraint in the selection of the is that the tiles must be disjoint, which amounts to indices saying that for . We denote by the number of simultaneously active STs and assume that each ST notifies its entry request by transmitting a synchronization code of length , which is randomly chosen from a specified set . For simplicity, we assume that different STs choose different denoting the set collecting the codes, with indices of the selected codes. This assumption is reasonable in practical systems, since is usually much smaller than the code set cardinality . We assume that DTs have been successfully synchronized to the BS and do not generate interference over the received synchronization channel. On the other hand, the signals transmitted by the STs are not aligned, both in frequency and time domains. Let us denote the carrier frequency offset (CFO) (normalized to the subcarrier spacing ) and the timing error (normalized to the sampling period ) of the th ST by and , respectively. As explained in [31], CFOs are only induced by Doppler shifts and/or downlink estimation errors. We consider low mobility applications and assume that frequency estimation errors in the downlink are within 2% of as specified in [4]. Under such hypotheses, the impact of CFOs on the synchronization process can reasonably be neglected. On the contrary, timing errors cannot be neglected, as they are related to the different (unknown) positions occupied by the users within the cell, and their maximum value corresponds to the round trip propagation delay for a user located at the cell boundary [31], where is the cell radius and is the speed of light. A simple way to counteract the effects of timing errors would be the use of a sufficiently long cyclic prefix (CP) composed by sampling intervals, with being the maximum expected path delay. In this case, timing errors would not produce any interblock interference (IBI), and would appear only as phase shifts at the output of the receiver discrete Fourier transform (DFT) unit. Unfortunately, this solution is not suited for the data section of the frame as it leads to an intolerably large overhead. This implies that a successful synchronization procedure calls not only for identifying the transmitted codes actually buried in the received signal, but also for

providing accurate timing estimates during the synchronization process in order to avoid IBI during the subsequent data transmissions. B. Signal Model To model the received signal, we assume that the channel response experienced by the th ST over the th tile is nearly flat over each tile and independent across tiles (with an amplitude that depends on both large-scale and small-scale fading effects). The validity and impact of this assumption on the system performance will be discussed in detail in Section V.B by means of numerical results obtained with standard channel models. Denoting by the vector collecting the DFT outputs over the th tile , we may write (1) is ST ’s transmit power, and denotes its where channel frequency response within the th tile. In addition, is additive white Gaussian noise with zero mean and covariance matrix , the vector (2) accounts

for

the

phase

shifts

within

a

tile, and , with being the code randomly

chosen by the th ST. For simplicity, in this paper we focus on single-user strategies that operate individually for each . More , we assume the BS to precisely, for each decide in favor of one of the two following hypotheses:3 the code is not present in the observation vector is present in . Although suboptimal, this approach has the advantage of allowing a simple formulation of the detection problem as a composite binary hypothesis test: (3) (4) , and accounts for where the contribution of MAI plus thermal noise. To statistically describe the distribution of , we assume that and in (4) are unknown deterministic parameters, and we model the entries of as independent Gaussian random variables with zero means and (unknown) powers (5) 3As better detailed in Section IV, during contention-based synchronization, detectors, one for each possible , since it does the BS must allocate not know a-priori which codes are selected by the STs. Note that the code constitutes the only temporary means of identification between the th ST and the BS, that will be also used by the BS (on a broadcast downlink channel) to provide feedback to the th ST (e.g., outcome of the test, and estimated parameters, such as the timing offset).

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

where

1261

is terminal ’s received power at the BS, and (6)

is ST ’s average channel power gain across the tiles. For later convenience, the probability density functions of under the hypotheses and are defined as:

(7)

(8)

III. ENERGY-EFFICIENT SYSTEM DESIGN A. Problem Formulation As mentioned in the introduction, the goal of this work is to make each ST locally and selfishly choose its transmit power so as to maximize its own utility, paired with an optimal detection strategy at the BS. Although OFDMA-based 4G candidate technologies, such as IEEE 802.16m [32] and 3GPP LTE [5] standards, allow for cooperation among terminals in the network, the contention-based synchronization is the very first active operation performed by a mobile terminal (after listening to broadcast channels on the downlink) to get successful association to the network. In this phase, it is thus reasonable to assume selfish behavior by the STs, which aim at achieving a good tradeoff between detection capabilities and power consumption. In other words, the utility function to be maximized must be defined so as to guarantee an energy efficient management of the available resources. This tradeoff can be quantified by defining the utility function of the th ST as the ratio of the probability of correct code detection to the transmitted energy per OFDMA symbol , with being the duration of the cyclically extended OFDMA block. This yields (9) where is the vector containing the transmit is the detection strategy adopted at powers of all STs, and the BS to detect (the code selected by the th ST). We have explicitly introduced the dependence of on in but also with affects (9) to emphasize that not only the detection probability of ST . Thus, the maximization of with respect to cannot be performed by means of a unilateral optimization, but rather requires a multidimensional one. The physical interpretation of , which has units of J , can be captured using the finite-state machine of Fig. 1, where the two possible states of a terminal in the network are sketched: the synchronization state, during which a terminal acts as an ST, and the data transmission state, in which it acts as a

Fig. 1. Finite-state machine describing the terminal operational status.

DT. The probability that the synchronization procedure is successfully completed is , and thus the average time spent by an ST in the first state is . As a conserepresents the expected energy consumed quence, by the th ST when transmitting at power .4 To proceed further, we observe that the detection strategy may lead to a wrong detection of the th code in the two following cases: i) the code is detected even though it is not present in the observation vector ; or, ii) the code is detected with an inaccurate timing estimation when it is actually present. The former situation gives rise to a false alarm event, and it can be handled imposing an upper bound on the . On the other hand, probability of its occurrence the latter case may be particularly harmful in OFDMA systems, as it may give rise to a significant IBI during the data transmission phase. A possible solution to circumvent this situation is to make the th ST regulate its power while satisfying a constraint on the mean-square-error (MSE) of its timing estimation error, defined as , where is the timing offset estimate of at the BS. Based on the above considerations, we can formulate our optimization problem in terms of optimal transmit power (at the ST side) and of optimal detection strategy (at the BS side) as follows:5

(10) STs attempting to achieve successful for all synchronization, where: is ST ’s transmit power denoting the maximum transmit power (to be set set, with large enough to allow STs located at the cell boundaries to correctly achieve successful synchronization); is the single-user and are the network QoS detection strategy set; and requirements in terms of maximum probability of false alarm and maximum MSE of the timing estimation error, respectively. Note that the problem in (10) cannot be solved in a centralized fashion by the BS as it actually does not know which STs are transmitting (this is indeed one of the outcomes of the synchronization process). This means that each ST must solve (10) in a decentralized way in order to compute its optimal . Furthermore, (10) cannot be decoupled into subproblems, as depends not only on , but also on all other STs’ 4Although other metrics (based for instance on a global-performance criterion and possibly coordinated by the service provider) can be used, we find the proposed metric a physically sound one to properly capture the description of the problem and to measure how efficient a resource allocation strategy is. 5Strictly speaking, the solution to this problem is not necessarily unique, as operator provides a whole set of values as its output. The equality the stands for all possible values that provide the maximum of the utility function.

1262

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

transmit powers . Otherwise stated, any action taken by a user affects the performance of all others. This makes the problem naturally fall within the scope of noncooperative game theory [12]. In this respect, the problem in (10) can be restated as a noncooperative game with complete information [12] defined as in which: is the player set, where player corresponds to the pair composed by the ST using code , and its receiver at the BS; denotes the strategy set for which the constraints in (10) are satisfied; and is player ’s payoff function defined as in (9). By restating (10) as game , in the next subsections we will use the analytical tools of game theory to investigate its solution.

In other words, meeting the constraint on the MSE means restricting ST ’s power strategy set to the subset (19) which depends on the opponents’ strategies . Since not only the utility but also the strategy set depends on , the game belongs to the category of generalized Nash games [13]. For such games, the most widely used solution is the generalized Nash equilibrium (GNE) [12], [13], defined as a set of strategies such that no player can unilaterally improve its own utility. Formally, a vector , with , is a GNE of if for any

B. Optimal Detection Strategy (at the BS Side)

(20)

To satisfy the constraint on the MSE in (10), let us focus on the properties of a generic timing estimator . In general, takes the form [33] (11) where

and are the bias and the variance of the timing estimate , respectively. The bias term can be generally measured through extensive simulations, whereas finding is usually a challenging task. To circumvent this problem, we assume that is well approximated by its Cramér-Rao [33] and rewrite (11) as bound (CRB) (12) from which it follows that the inequality constraint in (10) can be reasonably replaced by (13) In Appendix A, we show that (14) where

is the SINR of the th ST at the BS, given by (15)

and for all strategies , with . In this work, we focus only on pure (i.e., deterministic) strategies6 and study the existence and uniqueness of the corresponding GNEs. Using the considerations above and taking into account that the strategy only impacts on the numerator of (9), the optimization problem in (10) can be reformulated as for all transmit powers such that

(21) from which the optimal detection strategy is easily identified as the solution of the inner maximization. Under the assumption of single-user detection introduced in Section II, the utility function in (9) is independent of the others’ strategies with . can be found This means that the optimal detection strategy using standard optimization techniques. In particular, the solution can be obtained using the Neyman-Pearson theorem and is given by [33] (22) where and are defined as in (7) and is such that (8), and the threshold (23)

Letting (16) the constraint

in (13) is satisfied provided that

and As follows from (7) and (8), computing in (22) requires knowledge of the unknown pa, and . Then, we approximate the likelihood rameters ratio test (LRT) in (22) with the generalized LRT (GLRT) given by (see Appendix B) [33]

(17) (24) with

given by (18)

6This choice is motivated by the fact that there exist no mixed (i.e., statistical) strategies that are more efficient (in the Pareto sense [12]) than any pure (i.e., degenerated mixed) one, assuming such exists.

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

where

with

and (25)

is the maximum likelihood (ML) estimate of in which obtained as (26) with being a tentative value for we obtain

. From (24), following [34] (27)

where (28) is the incomplete beta function [35]. The above result indicates that, for a given pair , the probability of false alarm is a function of the threshold only. The latter must be chosen is satisfied. such that the identity Note that, unlike [28]–[30], the probability of false alarm (27) does not depend on the transmit power . As better detailed in Section IV, this is of significant relevance for practical implementation purposes as the BS can dispense with any prior information on the active codes. C. Optimal Transmit Power (at the ST Side) Substituting the above results into (21) leads to the problem (29) on for nowhere we have omitted the dependence of tational simplicity. To solve (29), we first need to evaluate the probability of correct detection . For this purpose, we recall from Section II that the channel coefficients can be modeled as independent complex Gaussian random variables with zero means and variances given by . Under these assumptions, we have that [34] (30) where

1263

being the solution of (33)

The game admits a unique pure-strategy GNE if and only if in (32) is such that (34) Proof: The proof of existence and uniqueness of in (29) follows the same steps described in [28] and proceeds according to the following line of reasoning. First, the probability of correct code detection (30) is proven to be eventually a concave function of . Then, the existence is proven as in [13] and [36]–[39], whereas the arguments illustrated in [40] are used to prove the uniqueness. Next, we observe that the detection strategy based on the GLRT (22) maximizes for a given probability of false alarm irrespectively of all transmit powers. This easily follows from (21) where it is shown that each player can always choose . Hence, all the properties of the solution of (29) apply to as well. This means the optimal action at the GNE is given by with (selected by the th ST) given by (24) (selected by the detector for code at the and BS). Although related to a different application scenario, the results shown in Proposition 1 have a mathematical structure which is similar to those obtained by other relevant works in the field of game-theoretic energy efficiency (see for example [19], [20], [22], and [41]). Unlike previous works, Proposition 1 establishes a necessary and sufficient condition for the GNE to exist. This condition is not present in the aforementioned works and stems from the constrained formulation (10), which makes the game a generalized one (such as that investigated in [28]). As seen, the condition (34) is not always met, as it depends on the number of STs, the tile size , and the QoS and (through ). It is worth observing constraints that, if (34) is not fulfilled, it may happen that the set of power strategies of some users may be empty. In this case, such users will not be able to reach the equilibrium with a resulting degradation of the system performance (see Section V.B for some numerical examples). On the other hand, when (34) is fulfilled the following result holds true. Corollary 1: If the condition (34) is satisfied, at the GNE the th ST would end up transmitting at

is defined as (31)

(35)

with being the SINR of the th ST, defined as in (15). From (16), it follows that there exists a one-to-one correspondence between and for a given vector . This means that the can be equivalently probability of correct detection replaced with , which is a function of rather than of . To proceed further, we introduce the following proposition. Proposition 1: Define

(36)

(32)

Proof: The above result can be derived using the mathematical arguments developed in [28]. It is worth observing that neither (35) nor (36) give a practical method to enforce that each ST noncooperatively (i.e., distributely) reaches the GNE. This easily follows by observing that (35) requires knowledge of whereas (36) depends

1264

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

on and . All these parameters are unknown at the STs and cannot be directly estimated. To overcome this problem, in the next section we show how to exploit the GNE analysis provided so far to derive a practical power control algorithm. IV. IMPLEMENTATION To derive a practical algorithm to reach the GNE of in a distributed fashion, we start by assuming that the STs with indices have already chosen their optimal transmit powers. This amounts to saying that . Then, from (15) we have (37) from which using (35) yields (38) for a given requires We see that the computation of knowledge of only, but this information is not available at the th ST. A possible solution is performing the estimation at back to the ST through a the BS and feeding the estimate of reliable reverse link. An estimate of is obtained as [11] (see Appendix B for further details): (39) Since the BS does not have any a-priori knowledge of which codes are currently active, it must estimate the received SINR for all possible codes . The estimated SINRs are then fed back to the STs together with the corresponding code indices. The STs finding their code information in the response message will update the transmit power according to (38) after replacing with . Based on the above considerations, an iterative and distributed algorithm can be derived to let each active user reach the GNE of the proposed game . In the sequel, this scheme is referred to as best-response synchronization algorithm (BRSA), as it is based on best-response dynamics [40] operating as follows. a. Initialization of the game: a1) each active ST computes the SINR level at the equilibrium using (32), in , and are assumed which to be common knowledge across the network; a2) each active ST initializes the to a predetermined value; transmit power a3) each active ST sets ; and a4) the BS sets the optimal detection threshold based on by numerically inverting (27). b. GLRT algorithm: at each step of the algorithm, for each code , the BS ; b1) applies (26) to obtain b2) decides on or according to (24); b3) estimates the received using (39); b4) feeds back the results of the GLRT test and the SINR on the return broadcast channel. c. Best-response algorithm: at each step of the algorithm, each ST

c1) receives the SINR estimated by the BS, and the result of the code detection test (24) based on current estimated parameters; c2) if the GLRT for code is verified and , exits the game, otherwise goes to the next step; c3) adjusts the transmit power according to (40) c4) updates . Note that both the GLRT algorithm (performed by the BS for each available code ) and the best-response power update (implemented by each active ST) follow directly from the solution of the optimization problem (10). A close inspection of steps c1-c4 reveals that the BRSA requires each ST to know only its estimated SINR and the GLRT outcome. This means that it can be performed in a fully decentralized manner, in which the number of STs and the transmit power levels change across time. It is worth emphasizing that the convergence of BRSA to the GNE is ensured for any initial power by the theoretical analysis presented in [40] as long as condition (34) is fulfilled. This result holds true because the relationship (35) describing the best-reponse dynamics possesses the properties of a standard function [40]. Observe that, although in general the properties of uniqueness of the game equilibrium and of the convergence of iterative algorithms approaching it are not necessarily related, in this specific formulation the property of the standard function ensures both GNE uniqueness and BRSA convergence. Note that, in step c1, the ST can extract the relevant details in the downlink broadcast channel using , that serves as a temporary identifier between it and the BS. When the th ST exits the game or, equivalently, when hypothesis is verified, the BS will broadcast the estimated timing offset and the estimated received power. The ST will make use of both to adjust its time scale and transmit power in order to access the subsequent data transmission phase with the minimum impact in terms of IBI [11]. The exit condition on in step c2 is introduced to guarantee a sufficient accuracy of the timing estimation as indicated by the constraint , whereas in step c3 is considered to make sure that the constraints on the maximum transmit powers are met at every step of the BRSA. V. NUMERICAL RESULTS The performance of the BRSA is now investigated by means of numerical results. The simulation parameters are reported below and are chosen in compliance with the IEEE 802.16 family of standards [4]. All numerical results are obtained by averaging 20,000 independent network realizations. A. Simulation Parameters The DFT size is , and the sampling period is ns, corresponding to a subcarrier spacing of kHz. There are unmodulated subcarriers for both the releft and the right guard bands. Out of the maining subcarriers, are reserved for synchronization. The tiles composed of a set of adjacent subcarriers are randomly positioned within the available bandwidth so as to

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

effectively exploit the frequency diversity offered by the multipath channel. We assume that a single OFDMA synchronization symbol is present within a frame, and that the frame duration is equal to ms. The synchronization codes are chosen from a set composed of binary phase shift keying signafor ) generated tures (i.e., as specified in [4]. We consider a cell radius 3 km, corresponding to a maximum normalized propagation delay . Path gains are modeled as statistically independent and circularly symmetric Gaussian random variables with zero means and power delay profile specified by the 6-tap ITU modified vehicular-A channel model [42]. In these circumstances, the maximum channel impulse response has a time span of samples, and the coherence bandwidth of the kHz. The average channel is approximately given by channel power is normalized with respect to a distance , and a path loss exponent is used. The CP length during the data transmission phase is chosen equal to . This means that the maximum timing estimation error that does not to give rise to IBI during the frame data section is . Hence, the constraint on the maximum MSE translates into . Extensive simulations (not reported here due to space limitations) indicate that the estimate obtained as in (26) is Gaussian-distributed with a bias , where is the delay spread of the channel [43]. Although the channel parameter is generally unknown, it can be roughly upper bounded by . Therefore, combining this result with (13), . In addition, the . maximum probability of false alarm is set to The DTs are supposed to be perfectly aligned with the BS references, whereas the number of STs is fixed at . Without loss of generality, we concentrate on the first ST and assess the performance of the BRSA when its distance from the BS is kept constant, while all other STs with indices are located at random distances uniformly distributed in the range between and . The maximum normalized transmit powers are assumed to be the same for all STs and equal to dB. On the other hand, two different scenarios are envisaged for the initial normalized powers : i) the minimum power (MP) scenario (shown using upper triis fixed to dB by all angular markers), in which STs; and ii) the single-user (SU) scenario (reported with circular markers), in which is chosen equal to , rep. The latter case resenting the optimal power level when minimizes the convergence time of the best-response algorithm [44] and it is used in the sequel as a benchmark for the minimum synchronization time required by the BRSA. Note that, in the SU scenario, knowledge of the average channel gain is required at the th ST. This information can be easily obtained in time division duplexing systems, whereas it calls for additional complexity in systems operating according to a frequency division duplexing mode. B. Network Design Criteria In this subsection, we exploit the theoretical analysis provided in Section III-C to derive some criteria for the network

1265

Fig. 2. Average normalized power consumption as a function of and ).

Fig. 3. Average synchronization time as a function of and ).

(

(

system design, and make use of the simulation results to illustrate the major findings. We begin by assessing the impact of and on the performance of the BRSA. For this purpose, in Fig. 2 we assume and report the average normalized power expenditure , required by ST 1 from the time it accesses the network until it successfully completes the synchronization procedure, as a function of the number of tiles . Similarly, Fig. 3 shows the average time needed to complete a successful synchronization, obtained by scaling the average number of steps required by the BRSA by . The results of Figs. 2 and 3 indicate that, in both the MP and the SU scenarios, the best performance is achieved for . This is motivated by the following reason. On one hand, the larger the tile size , the larger the processing gain yielded by the spreading code, as is apparent from (15). On the other hand, the smaller , the more accurate the matching between the selectivity of the channel in the frequency domain and the flat-fading assumption adopted in

1266

Fig. 4. Optimal SINR at the GNE as a function of and ).

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

Fig. 5. Average MSE of the timing estimate as a function of and ).

(

Section II to derive the GLRT. The best choice to meet these two conflicting requirements is to choose according to the coherence bandwidth of the channel. In the network under investigation, this amounts to setting and , which is in accordance with the results of Figs. 2 and is not an integer, the optimal choice is to 3. If select the closest acceptable value for . In the case the code length is a prime number, as considered for LTE-compliant and systems [5], the best approach is to set , thus partially sacrificing some synchronization subcarriers, with a tolerable loss on the code cross-correlation performance [11]. The results of Figs. 2 and 3 show a large performance degradation for . This can be explained using the results of Section III.C. For the reader’s convenience, Fig. 4 reports the numerical values of the optimal SINR at the GNE (star markers) as a function of . The SINR levels and are also shown, using dashed and dash-dotted curves, respectively. By inverting (34), it follows that the maximum number of STs that can be simultaneously accommodated in the cell to guarantee the existence and uniqueness of the GNE of is (41) the maxIn the investigated network, we have that for should be smaller than 5. Since we imum number of STs assume , it follows that the condition (34) is not met for . This means that resources are not sufficient to accomSTs while meeting the QoS requirements. modate all the This makes the power consumption as well as the average synchronization time increase, although with a graceful behavior for . The sudden increase in the resources consumed by the pair can be again interpreted using the theoretical analysis of Section III-C, in a twofold manner. On one side, when . On the other side, for . Since at the GNE lies on the global maximum of the unconstrained utility function (i.e., that without the constraint on the MSE) if and only if (as follows from the

(

proof of Proposition 1, not reported for the sake of brevity), it is always preferable to have to ensure a better energy-efficient exploitation of the available resources. To complete the simulation analysis, we assess the accuracy of the timing estimator in (26) once the synchronization process is successfully completed. For this purpose, Fig. 5 illustrates the MSE of the timing estimate for different values of . From the simulation results, we can see that the QoS requirement is largely satisfied by all considered values of . In particular, we note that the best estimation accuracy is again obtained for and for both MP and SU scenarios. C. Performance Assessment Based on the results of Section V-B, in all subsequent simulations we choose and , from which, using (18) and recalling that and , we get dB. From (27), we have that when . Moreover, the optimal SINR turns out to be dB, from which, using (30) and (31), we . get The BRSA is compared with two alternative solutions relying on a deterministic increase of the transmit power. The first one is referred to as the deterministic synchronization algorithm (DSA), whereas the second one is called the BEB-DSA [4]. Both differ from the BRSA in the transmit power update (step c3) only, as follows: if the selected code is not successfully detected, the th ST updates its transmit power according to (42) where is a design parameter common to all STs. For the DSA, , whereas for BEB-DSA is an integer number , with being the randomly chosen in the interval current value of ST ’s backoff window. The parameter of BEB-DSA is referred to as the backoff counter and indicates how many OFDMA synchronization symbols the th ST must

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

Fig. 6. Average normalized power consumption as a function of the normalized ( and ). distance

Fig. 7. Average synchronization time as a function of the normalized distance ( and ).

wait before re-transmitting using . During the first synchronization attempt, the backoff window size is set to and it is doubled after each unsuccessful attempt. After successive unsuccessful attempts, is reset to its . In all subsequent simulations, we assume initial value dB, , and . Similarly to the BRSA, we assume that the maximum normalized transmit powers for both schemes are the same for all STs and such that dB. The initial powers are chosen equal to , with dB. and as functions of , Figs. 6 and 7 show i.e., the normalized distance from the BS of the ST of interest, using lower triangular and square markers to report the results of the DSA and BEB-DSA, respectively. As seen, the BRSA provides better results in terms of both energy efficiency and . As expected, the fairness for all investigated values of SU initialization requires the minimum average time for a successful synchronization, whereas the MP initialization guarantees the minimum amount of power expenditure. The BEB-DSA

1267

requires roughly the same power consumption as the BRSA, but at the expense of an increased average time per acquisition. The DSA is faster than the BEB-DSA, but requires a significant amount of battery drain. On the contrary, BRSA maintains the average acquisition time limited up to the maximum of about two frames for any BS-terminal distance in the SU initialization case, and less than five frames in the MP initialization case for the far users, and requires a limited amount of power expenditure (around 5 dB above the noise power for the far users in both initialization schemes). Therefore, the BRSA outperforms the DSA both in terms of power expenditure and of time needed for successful synchronization, at the expense of an increased amount of feedback information from the BS. Currently, IEEE 802.16m [32] and 3GPP LTE [5] standards provide feedback for every detected code (in terms of corrections to be applied both to timing offsets and to transmit powers). In the proposed method, we only require the BS to broadcast the outcome of the GLRT (1 bit), and the received SINR for each code in . Since the number of codes is usually on the order of tens to hundreds, the amount of extra resources needed on the downlink channel is limited, also considering that preliminary experimental results (not reported for the sake of brevity) show that introducing a 1-byte SINR quantization does not significantly affect the numerical performance. We now observe that the analysis presented in Section III is valid under the hypothesis of a sufficiently large power constraint that allows far users to reach the optimal SINR even in the presence of a bad channel realization. To properly set this parameter, consider an SU scenario in which the single ST is placed at . To meet , we just need the channel power gain (averaged across the tiles as in (6)) to be higher than . Since the channel powers are normalized with respect to , in the considered scenario it is sufficient that be higher than dB. Since the average value of is dB, the probability of not meeting is negligible. When considering , it might happen (with a low probability considering that channel power gains are averaged across tiles than span across a bandwidth ), that some near STs show , thereby preventing ST from meeting . However, this situation usually occurs only for a short time interval since “strong” users are synchronized very fast, and the new incoming users (randomly placed in the cell) are likely not to be “strong” again. This allows the “weak” ST to eventually achieve and enter the network (although after a longer time interval). To support this observation, note that throughout our experiments channel realizations (obtained by averaging at least per simulation point) we never encountered a situation in which an ST was not able to achieve . Finally, observe that the design of plays a more important role for BEB-DSA and DSA rather than BRSA. While increasing does not substantially affect the performance of BRSA, a large degradation is observed for both BEB-DSA and DSA. This is because, for a given incremental power step, increasing forces STs to remain in the collision phase for a longer time interval before resetting their powers to . For the sake of completeness, in Figs. 8 and 9 we compare the estimation accuracy of the investigated solutions in terms of and the normalized variance of the (unbiased) power

1268

Fig. 8. Average MSE of the timing estimate as a function of the normalized ( and ). distance

Fig. 9. Average normalized variance of the power estimate as a function of the ( and normalized distance ).

estimate, given by , as func. The normalized CRB of the received power, detions of fined as with given in Appendix A, is also reported for comparison. As before, the BRSA represents the best allocation scheme, whereas the DSA and BEB-DSA exhibit a significant loss for values of larger than 0.6. Finally, Figs. 10 and 11 show and for the invesof STs ranges from 2 to tigated solutions when the number . The user of interest is placed at distance . Comparisons are similar to the ones shown above and lead to similar conclusions: the proposed BRSA is particularly suitable for a bursty-traffic scenario, with messages composed of a small number of packets, and in which users are required to be synchronized in a limited amount of time. This makes it particularly suited for applications in which a refinement of the synchronization parameters is periodically required. Nowadays, the

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

Fig. 10. Average normalized power consumption as a function of number of STs ( and ).

Fig. 11. Average synchronization time as a function of number and ).

of STs (

common procedure adopted by current standards for synchronization refinement is known as periodic ranging [5], [32]. The latter is a process by which any mobile terminal periodically adjusts its transmission parameters in order to stay synchronized with the BS even during its idle states, thereby reducing the transmission latency but at the same time the battery life. Since the proposed solution enables a fast initial synchronization with low power consumption (especially when far terminals are considered), it can be used for reducing the frequency of periodic ranging procedures, thereby further increasing the energy efficiency of the mobile terminals. VI. CONCLUSION In this work, we have proposed a game-theoretic approach to derive an energy-efficient solution for contention-based synchronization in OFDMA-based systems. A noncooperative game has been formulated in which each terminal and the

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

base station are allowed to locally and selfishly choose the transmit power as well as the detection strategy to maximize the probability of correct terminal synchronization while saving as much energy as possible. This is achieved by controlling the performance of the network in terms of probability of false alarm and estimation accuracy of the timing errors. We have shown that the proposed game admits a unique generalized Nash equilibrium under some mild conditions on the system parameters. An iterative algorithm based on best-response dynamics has been derived to let each user achieve the equilibrium point in a distributed manner, using the unknown parameters estimated at the BS (through a low-complexity method that follows from the resource allocation optimization problem). Numerical results based on realistic network parameters and widely agreed-upon channel models have shown that the proposed solution outperforms deterministic-increase approaches (both with and without contention resolution methods) in terms of average transmit power and synchronization time as well as in terms of accuracy of the parameter estimation. This is achieved at the expense of an increased amount of feedback information from the BS. Further work is needed to assess the impact of quantized levels for both the signal-to-interference-plus-noise ratios and the transmit powers, with the former particularly important to significantly reduce the amount of feedback required across the network. It is worth observing that the approach developed in this work can also be expedient to optimize the performance and the efficiency of other radio networks. As an example, in [45] a similar formulation for the utility function is used to investigate the tradeoff between detection capabilities and power consumption for a distributed radar sensor network.

1269

with (47) and

From (46), it follows that

(48) and defining [33]

Using (47), recalling that , we get (14). From

(49) where (50) is the gradient of with respect to (50) into (49) yields

. Substituting (46) and

(51)

APPENDIX B Maximizing

in (7) with respect to

produces (52)

from which it follows that (53)

APPENDIX A In this Appendix, we compute the CRBs for the joint estimation of and . Let us define the set of unknown paand denoting the real and the rameters, with imaginary parts of vector , respectively. Using the above definitions and the pdfs given in (7)–(8), the Fisher information matrix is found to be [33] (43)

in (8) with respect Looking for the maximum of to while keeping and fixed yields (26), where takes the form (25). Maximizing with respect to using as in (26) leads to (54) with

. Substituting this result back into and maximizing with respect to yields (55)

where

from which we get (44)

(56)

and (45) The inverse of

is equal to

Substituting (53) and (56) into (22) yields (57)

(46)

which can be equivalently rewritten as in (24) with . Using the invariance property of the ML estimator, it follows that the estimate of the received power

1270

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 5, MARCH 1, 2013

can be obtained as using (25) and (54), as

or, equivalently, (58)

It is worth observing that, if the timing offset is perfectly estimated (i.e., ), then (59) and (60) From (59) and (60), it follows that and are biased estimates of and , respectively. Using (59), we can see that takes the form . an unbiased estimate of Recalling (55), (61) is found to From the above results, an unbiased estimate of , from which, using (61), we obtain be (62) Combining (61) and (62) with (15), the estimated SINR (39) easily follows.

in

REFERENCES [1] S. Ahmadi, “An overview of next-generation mobile WiMAX technology,” IEEE Commun. Mag., vol. 47, no. 6, pp. 84–98, Jun. 2009. [2] A. Ghosh, R. Ratasuk, B. Mondal, N. Mangalvedhe, and T. Thomas, “LTE-advanced: Next-generation wireless broadband technology,” IEEE Wireless Commun., vol. 17, no. 3, pp. 10–22, Jun. 2010. [3] M. Morelli, C.-C. J. Kuo, and M.-O. Pun, “Synchronization techniques for orthogonal frequency-division multiple-access (OFDMA): A tutorial review,” Proc. IEEE, vol. 95, no. 7, pp. 1394–1427, Jul. 2007. [4] “IEEE 802.16m System Description Document (SDD),” IEEE 802.16 Broadband Wireless Access Working Group, Tech. Rep. IEEE 802. 16m-09/0034r2, 2009. [5] “LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 10),” 3GPP Technical Specification Group, Tech. Rep. 3GPP TS 36.211 v. 10.4.0, 2011. [6] X. Fu, Y. Li, and H. Minn, “A new ranging method for OFDMA systems,” IEEE Trans. Commun., vol. 6, no. 2, pp. 659–669, Feb. 2007. [7] L. Sanguinetti, M. Morelli, and H. V. Poor, “An ESPRIT-based approach for initial ranging in OFDMA systems,” IEEE Trans. Commun., vol. 57, no. 11, pp. 3225–3229, Nov. 2009. [8] M. Ruan, M. Reed, and Z. Shi, “Successive multiuser detection and interference cancelation for contention based OFDMA ranging channel,” IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 481–487, Feb. 2010. [9] J. Zeng and H. Minn, “A novel OFDMA ranging method exploiting multiuser diversity,” IEEE Trans. Commun., vol. 58, no. 3, pp. 945–955, Mar. 2010. [10] L. Sanguinetti and M. Morelli, “An initial ranging scheme for IEEE 802.16-based OFDMA systems,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3204–3215, Sep. 2012. [11] L. Sanguinetti, M. Morelli, and L. Marchetti, “A random access algorithm for LTE systems,” Trans. Emerging Telecommun. Technol., vol. 24, no. 1, pp. 49–58, Jan. 2013. [12] D. Fudenberg and J. Tirole, Game Theory. Cambridge, MA, USA: MIT Press, 1991. [13] F. Facchinei and C. Kanzow, “Generalized Nash equilibrium problems,” Quart. J. Oper. Res., vol. 5, no. 3, pp. 173–210, Sep. 2007. [14] E. A. Jorswieck, E. G. Larsson, M. Luise, and H. V. Poor, “Game theory in signal processing and communications,” IEEE Signal Process. Mag., vol. 26, no. 5, p. 17, Sep. 2009, 132.

[15] E. A. Jorswieck, E. G. Larsson, M. Luise, H. V. Poor, and A. Leshem, “Game theory in wireless communications,” IEEE J. Sel. Topics Signal Process, vol. 6, no. 2, pp. 73–75, Apr. 2012. [16] A. Attar, T. Başar, M. Debbah, H. V. Poor, and Q. Zhao, “Introduction to the issue on game theory in signal processing,” IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 1–3, Jan. 2012. [17] E. Belmega, S. Lasaulce, and M. Debbah, “A survey on energy-efficient communications,” presented at the IEEE Symp. Personal, Indoor, Mobile Radio Commun. (PIMRC), Istanbul, Turkey, Sep. 2010. [18] H. Ji and C.-Y. Huang, “Non-cooperative uplink power control in cellular radio systems,” Wireless Netw., vol. 41, no. 3, pp. 233–240, Mar. 1998. [19] D. Famolari, N. B. Mandayam, D. J. Goodman, and V. Shah, “A new framework for power control in wireless data networks: Games, utility and pricing,” in Wireless Multimedia Network Technologies, R. Ganesh, K. Pahlavan, and Z. Zvonar, Eds. Boston, MA, USA: Kluwer Academic, 1999, pp. 289–310. [20] D. J. Goodman and N. B. Mandayam, “Network assisted power control for wireless data,” in Proc. IEEE Veh. Technol. Conf. (VTC), Rhodes, Greece, May 2001, pp. 1022–1026. [21] F. Meshkati, M. Chiang, H. V. Poor, and S. C. Schwartz, “A game-theoretic approach to energy-efficient power control in multicarrier CDMA systems,” IEEE J. Sel. Areas Commun., vol. 24, no. 6, pp. 1115–1129, Jun. 2006. [22] G. Bacci, M. Luise, H. V. Poor, and A. M. Tulino, “Energy-efficient power control in impulse radio UWB wireless networks,” IEEE J. Sel. Topics Signal Process, vol. 1, no. 3, pp. 508–520, Oct. 2007. [23] O. Ileri, S.-C. Mau, and N. B. Mandayam, “Pricing for enabling forwarding in self-configuring ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 151–162, Jan. 2005. [24] Z. Han, Z. Ji, and K. Liu, “Non-cooperative resource competition game by virtual referee in multicell OFDMA systems,” IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1079–1090, Aug. 2007. [25] G. Miao, N. Himayat, G. Li, and S. Talwar, “Distributed interference-aware energy-efficient power optimization,” IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1323–1333, Apr. 2011. [26] S. Buzzi, G. Colavolpe, D. Saturnino, and A. Zappone, “Potential games for energy-efficient power control and subcarrier allocation in uplink multicell OFDMA systems,” IEEE J. Sel. Topics Signal Process., vol. 6, no. 2, pp. 89–103, Apr. 2012. [27] G. Bacci, A. Bulzomato, and M. Luise, “Uplink power control and subcarrier assignment for an OFDMA multicellular network based on game theory,” presented at the Int. Conf. Perf. Eval. Method. Tools (ValueTools), Paris, France, May 2011. [28] G. Bacci and M. Luise, “A game-theoretic perspective on code synchronization for CDMA wireless systems,” IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 107–118, Jan. 2012. [29] G. Bacci and M. Luise, “A pre-Bayesian game for CDMA power control during network association,” IEEE J. Sel. Topics Signal Process., vol. 6, no. 2, pp. 76–88, Apr. 2012. [30] G. Bacci, “Energy-efficient power control for CDMA code acquisition over frequency-selective channels,” IEEE Commun. Lett., vol. 16, no. 3, pp. 364–367, Mar. 2012. [31] M. Morelli, “Timing and frequency synchronization for the uplink of an OFDMA system,” IEEE Trans. Commun., vol. 52, no. 2, pp. 296–306, Feb. 2004. [32] “IEEE Standard for Local and Metropolitan Area Networks—Part 16: Air Interface for Broadband Wireless Access Systems—Amendment 3: Advanced Air Interface,” IEEE 802.16 Broadband Wireless Access Working Group, Tech. Rep. IEEE 802.16m-2011, 2011. [33] H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. New York, NY, USA: Springer, 1994. [34] P. Lombardo and D. Pastina, “Multiband coherent radar detection against compound-Gaussian clutter,” IEEE Trans. Aerosp. Electron. Syst., vol. 35, no. 4, pp. 1266–1282, Oct. 1999. [35] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions. New York, NY, USA: Dover, 1965. [36] D. Debreu, “A social equilibrium existence theorem,” in Proc. Nat. Acad. Sci., 1952, vol. 38, pp. 886–893. [37] I. L. Glicksberg, “A further generalization of the Kakutani fixed point theorem with application to Nash equilibrium points,” in Proc. Nat. Acad. Sci., 1952, vol. 38, pp. 170–174. [38] K. Fan, “Fixed point and minimax theorems in locally convex topological linear spaces,” in Proc. Nat. Acad. Sci., 1952, vol. 38, pp. 121–126.

BACCI et al.: A GAME-THEORETIC APPROACH FOR ENERGY-EFFICIENT CONTENTION-BASED SYNCHRONIZATION IN OFDMA

[39] K. Arrow and G. Debreu, “Existence of an equilibrium for a competitive economy,” Econometrica, vol. 22, no. 3, pp. 265–290, July 1954. [40] R. D. Yates, “A framework for uplink power control in cellular radio systems,” IEEE J. Sel. Areas Commun., vol. 13, no. 9, pp. 1341–1347, Sept. 1995. [41] F. Meshkati, A. J. Goldsmith, H. V. Poor, and S. C. Schwartz, “A gametheoretic approach to energy-efficient modulation in CDMA networks with delay QoS constraints,” IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1069–1078, Aug. 2007. [42] Guidelines for Evaluation of Radio Transmission Technology for IMT2000, Recommendation ITU-R M.1225, 1997. [43] M. Morelli, L. Sanguinetti, and H. V. Poor, “A robust ranging scheme for OFDMA-based networks,” IEEE Trans. Commun., vol. 57, no. 8, pp. 2441–2452, Aug. 2009. [44] G. Bacci, “Distributed power control techniques based on game theory for wideband wireless networks,” Ph.D. dissertation, Univ. of Pisa, Pisa, Italy, 2008. [45] G. Bacci, L. Sanguinetti, M. S. Greco, and M. Luise, “A game-theoretic approach for energy-efficient detection in radar sensor networks,” presented at the IEEE Sensor Array Multich. Signal Process. Workshop (SAM), Hoboken, NJ, Jun. 2012.

Giacomo Bacci (S’07–M’09) received the B.E. and the M.E. degrees in telecommunications engineering and the Ph.D. degree in information engineering from the University of Pisa, Pisa, Italy, in 2002, 2004, and 2008, respectively. Since 2005, he has been with the Department of Information Engineering at the University of Pisa, where he is currently a Postdoctoral Research Fellow. In 2006–2007, he was a visiting student research collaborator at the Department of Electrical Engineering at Princeton University, Princeton, NJ, USA. In 2008, he joined Wiser srl, Livorno, Italy, as a software engineer. From May 2012 to April 2013, he was also enrolled as a Visiting Postdoctoral Research Associate at the Department of Electrical Engineering, Princeton University. His research interests are in the areas of digital communications, signal processing, and estimation theory. His current research topics focus on resource allocation for multiple-access and relay-based wireless networks, time delay estimation for satellite positioning systems and wireless communications, and channel coding for IMT-advanced technologies. Dr. Bacci is the recipient of the FP7 Marie Curie International Outgoing Fellowships for career development (IOF) 2011 GRAND-CRU Game-Theoretic Resource Allocation for wireless Networks Based on Distributed and Cooperative Relaying Units. Luca Sanguinetti (S’04–M’06) received the Laurea Telecommunications Engineer degree (cum laude) and the Ph.D. degree in information engineering from the University of Pisa, Pisa, Italy, in 2002 and 2005, respectively. Since 2005 he has been with the Department of Information Engineering of the University of Pisa. In 2004, he was a visiting Ph.D. student at the German Aerospace Center (DLR), Oberpfaffenhofen, Germany. During the period June 2007 to June 2008, he was a Postdoctoral Associate in the Department of Electrical Engineering at Princeton University, Princeton, NJ, USA. During the period June 2010 to September 2010, he was selected

1271

for a research assistantship at the Technische Universitat München. He is currently an Assistant Professor at the Department of Information Engineering of the University of Pisa. His expertise and general interests span the areas of communications and signal processing, estimation, and detection theory. Dr. Sanguinetti is currently serving as an Associate Editor for the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS. Marco Luise (M’85–SM’94–F’12) received the M.E. and Ph.D. degrees in electronic engineering from the University of Pisa, Pisa, Italy, in 1984 and 1989, respectively. He was formerly a Research Fellow of the European Space Agency (ESA) at ESTEC Noordwijk, The Netherlands, a Researcher of the Italian National Research Council (CNR), at the Centro Studio Metodi Dispositivi Radiotrasmissioni (CSMDR), Pisa, Italy, and an Associate Professor at the Department of Information Engineering of the University of Pisa, where he is currently a Full Professor of telecommunications. His main research interests lie in the broad area of communication theory, with particular emphasis on wireless communications, mobile and satellite communications, positioning systems, and software-defined radios. Prof. Luise served as an Editor of the IEEE TRANSACTIONS ON COMMUNICATIONS and of the European Transactions on Telecommunications. He was the founder and first Co-Editor-in-Chief of the International Journal of Navigation and Observation and is currently an Associate Editor of the Journal of Communications and Networks. Recently, he was the General Chairman of EUSIPCO 2006, the General Co-Chair of European Wireless 2010, and will be the General Co-Chair of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2014. H. Vincent Poor (S’72–M’77–SM’82–F’87) received the Ph.D. degree in electrical engineering and computer science (EECS) from Princeton University, Princeton, NJ, USA, in 1977. From 1977 until 1990, he was on the faculty of the University of Illinois at Urbana-Champaign. Since 1990, he has been on the faculty at Princeton, where he is the Michael Henry Strater University Professor of Electrical Engineering and Dean of the School of Engineering and Applied Science. His research interests are in the areas of stochastic analysis, statistical signal processing, and information theory, and their applications in wireless networks and related fields such as social networks and smart grid. Among his publications in these areas are the recent books Classical, Semi-classical and Quantum Noise (Springer, 2012) and Smart Grid Communications and Networking (Cambridge Univ. Press, 2012). Dr. Poor is a member of the National Academy of Engineering and the National Academy of Sciences, a Fellow of the American Academy of Arts and Sciences, and an International Fellow of the Royal Academy of Engineering (U.K.). He is also a Fellow of the Institute of Mathematical Statistics, the Acoustical Society of America, and other organizations. In 1990, he served as President of the IEEE Information Theory Society, and from 2004 to 2007, he served as the Editor-in-Chief of the IEEE TRANSACTIONS ON INFORMATION THEORY. He received a Guggenheim Fellowship in 2002 and the IEEE Education Medal in 2005. Recent recognition of his work includes the 2010 IET Ambrose Fleming Medal, the 2011 IEEE Eric E. Sumner Award, the 2011 Society Award of the IEEE Signal Processing Society, and honorary doctorates from Aalborg University, the Hong Kong University of Science and Technology, and the University of Edinburgh.

Suggest Documents