›› 2017, Vol. 32 ›› Issue (6): 1250-1264.doi: 10.1007/s11390-017-1798-8

Special Issue: Computer Networks and Distributed Computing

• Regular Paper • Previous Articles     Next Articles

A Reverse Auction Framework for Hybrid Access in Femtocell Network

Yan-Jiao Chen1, Member, IEEE, Xiao-Yan Yin2,*, Member, CCF, IEEE, Jin Zhang3, Member, IEEE   

  1. 1 State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan 430072, China;
    2 School of Information Science and Technology, Northwest University, Xi'an 710127, China;
    3 Department of Computer Science and Engineering, Southern University of Science and Technology Shenzhen 518055, China
  • Received:2016-09-13 Revised:2017-07-10 Online:2017-11-05 Published:2017-11-05
  • Contact: Xiao-Yan Yin E-mail:yinxy@nwu.edu.cn
  • About author:Yan-Jiao Chen received her B.E.degree in electronic engineering from Tsinghua University,Beijing,in 2010,and Ph.D.degree in computer science and engineering from Hong Kong University of Science and Technology,Hong Kong,in 2015.She is currently a professor in Wuhan University,Wuhan.
  • Supported by:

    This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61702380, 61202393, and 61701216, the CPSF (China Postdoctoral Science Foundation) under Grant No. 2012M521797, the International Cooperation Foundation of Shaanxi Province of China under Grant No. 2013KW01-02, the International Postdoctoral Exchange Fellowship Program 2013 under Grant No. 57 funded by the Office of China Postdoctoral Council, and Shenzhen Science, Technology and Innovation Commission Basic Research Project under Grant Nos. JCYJ 20160531190935987 and JCYJ 20160531191011045.

In the two-tier macro-femto heterogeneous network, hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However, the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper, we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap, we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism, which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming, we propose two alternative truthful mechanisms, namely, generalized secondprice and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.

[1] de la Roche G, Valcarce A, López-Pérez D, Zhang J. Access control mechanisms for femtocells. IEEE Communications Magazine, 2010, 48(1):33-39.

[2] Choi D, Monajemi P, Kang S, Villasenor J. Dealing with loud neighbors:The benefits and tradeoffs of adaptive femtocell access. In Proc. IEEE Global Telecommunications Conference, Nov. 31-Dec. 4, 2008, pp.2817-2821.

[3] Rial Valcarce A, López-Pérez D, de la Roche G, Zhang J. Limited access to OFDMA femtocells. In Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sept. 2009.

[4] Ahmed A U, Islam M T, Ismail M, Ghanbarisabagh M. Dynamic resource allocation in hybrid access femtocell network. The Scientific World Journal, 2014, 2014:Article ID 539720.

[5] Cheung W C, Quek T QS, Kountouris M. Throughput optimization, spectrum allocation, and access control in twotier femtocell networks. IEEE Journal on Selected Areas in Communications, 2012, 30(3):561-574.

[6] Ge X, Han T, Zhang Y, Mao G, Wang C X, Zhang J, Yang B, Pan S. Spectrum and energy efficiency evaluation of twotier femtocell networks with partially open channels. IEEE Transactions on Vehicular Technology, 2014, 63(3):1306-1319.

[7] Lin J S, Feng K T. Femtocell access strategies in heterogeneous networks using a game theoretical framework. IEEE Transactions on Wireless Communications, 2014, 13(3):1208-1221.

[8] Zhong Y, Zhang W. Multi-channel hybrid access femtocells:A stochastic geometric analysis. IEEE Transactions on Communications, 2013, 61(7):3016-3026.

[9] Chen Y, Zhang J, Zhang Q. Utility-aware refunding framework for hybrid access femtocell network. IEEE Transactions on Wireless Communications, 2012, 11(5):1688-1697.

[10] Shih Y Y, Pang A C, Tsai M H, Chai C H. A rewarding framework for network resource sharing in co-channel hybrid access femtocell networks. IEEE Transactions on Computers, 2015, 64(11):3079-3090.

[11] Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of FINANCE, 1961, 16(1):8-37.

[12] Clarke E H. Multipart pricing of public goods. Public Choice, 1971, 11(1):17-33.

[13] Groves T. Incentives in teams. Econometrica, 1973, 41(4):617-631.

[14] Kothari A, Parkes D C, Suri S. Approximatelystrategyproof and tractable multiunit auctions. Decision Support Systems, 2005, 39(1):105-121.

[15] Lehmann D, O?allaghan L, Shoham Y. Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM, 2002, 49(5):577-602.

[16] Krishna V. Auction Theory. Academic Press, 2009.

[17] Zhou X, Gandhi S, Suri S, Zheng H. eBay in the sky:Strategy-proof wireless spectrum auctions. In Proc. ACM International Conference on Mobile Computing and Networking, Sept. 2009, pp.2-13.

[18] Jia J, Zhang Q, Zhang Q, Liu M. Revenue generation for truthful spectrum auction in dynamic spectrum access. In Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing, May 2009.

[19] Chen L, Iellamo S, Coupechoux M, Godlewski P. An auction framework for spectrum allocation with interference constraint in cognitive radio networks. In Proc. IEEE International Conference on Computer Communications, Mar. 2010, pp.794-802.

[20] Zhou X, Zheng H. TRUST:A general framework for truthful double spectrum auctions. In Proc. IEEE International Conference on Computer Communications, Apr. 2009, pp.999-1007.

[21] Wu Y, Wang B, Liu K J R, Clancy T C. Collusion-resistant multi-winner spectrum auction for cognitive radio networks. In Proc. IEEE Global Communications Conference, Nov. 30-Dec. 4, 2008, pp.3112-3116.

[22] Wu Y, Wang B, Liu K J R, Clancy T C. A scalable collusion-resistant multi-winner cognitive spectrum auction game. IEEE Transactions on Communications, 2009, 57(12):3805-3816.

[23] Zhou X, Zheng H. Breaking bidder collusion in large-scale spectrum auctions. In Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing, Sept. 2010, pp.121-130.

[24] Nisan N, Roughgarden T, Tardos E, Vazirani V V. Algorithmic Game Theory. Cambridge:Cambridge University Press, 2007.

[25] Dietrich B, Vohra R V, Brick P (eds.). Mathematics of the Internet:E-Auction and Markets. Springer Science & Business Media, 2001.

[26] Cormen T H, Leiserson C E, Rivest R et al. Introduction to Algorithms. MIT Press, 2009.

[27] Dantzig G B. Linear Programming and Extensions. Princeton University Press, 1998.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] Li Minghui;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved