spectrum sharing among rapidly deployable small cells: a

15
1 Spectrum Sharing among Rapidly Deployable Small Cells: A Hybrid Multi-Agent Approach Bo Gao, Member, IEEE, Lingyun Lu, Ke Xiong, Member, IEEE, Jung-Min “Jerry” Park, Fellow, IEEE, Yaling Yang, Member, IEEE, and Yuwei Wang Abstract—On-demand deployment of small cells plays a key role in augmenting macro-cell coverage for outdoor hotspots, where user devices are brought together and intensively upload self-generated data. In this paper, we study spectrum sharing among rapidly deployable small cells in the uplink, even without a priori global knowledge. We propose a hybrid multi-agent approach, which allows a leading macro-cell base station (MBS) and multiple following small base stations (SBSs) to take part in a user-centric, online joint optimization of small cell deployment and uplink resource allocation. Specifically, we propose a cen- tralized mechanism for the MBS to solve the first subproblem of small cell deployment stage by stage, based on an adversarial bandit model. Furthermore, we propose a distributed mechanism for the group of SBSs to collectively solve the second subproblem of uplink resource allocation stage by stage, based on a stochastic game model. We prove that our approach is guaranteed to produce a joint strategy, which is built upon a mixed strategy with bounded regret on the first tier and an equilibrium solution on the second tier. Our approach is validated by simulations on the aspects of convergence behavior, strategy correctness, power consumption, and spectral efficiency. Index Terms—Mobile communication systems, distributed net- works, algorithm/protocol design and analysis. I. I NTRODUCTION In the era of 5G mobile communications and Internet of Things (IoT), each macro-cell can be densely overlaid with small cells, so that mobile users or connected things are served by a heterogeneous network (HetNet) [1, 2]. It is straightforward to deploy small cells for indoor hotspots such as homes or offices, but usually not for outdoor hotspots to support, e.g., public gatherings or sporting events. As the use of wireless devices outdoors is becoming a daily necessity, it has received a growing interest in augmenting macro-cell coverage for target spots that are wide-open yet short-lived [3, 4]. A further improvement of outdoor coverage is necessary when user devices are brought together in a short time and cause a burst increase in macro-cell traffic, thus leading to a supply-demand mismatch. It commonly occurs that lots of user devices are temporarily gathered for broadband or IoT services. However, it can be very costly or even impossible B. Gao and K. Xiong are with the School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China. E-mail: {bogao, kxiong}@bjtu.edu.cn. L. Lu is with the School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China. E-mail: [email protected]. J. Park and Y. Yang are with the Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA 24061, USA. E-mail: {jungmin, yyang8}@vt.edu. Y. Wang is with the Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China. E-mail: [email protected]. to fully and persistently cover an outdoor hotspot with small cells. Recent efforts have been made to find solutions towards fast, cost-effective, and on-demand deployment of small cells outdoors. A promising innovation is to mount small base stations (SBSs) on movable and controllable platforms, such as unmanned aerial vehicles (UAVs) or unmanned ground vehi- cles (UGVs) [5, 6, 7, 8]. Under vehicular mobility, UAV/UGV- mounted small cells are rapidly deployable in case macro- cell base stations (MBSs) are overloaded, or even damaged or destroyed. Lately, research groups from Google, Facebook, Nokia, and academic institutions have made progress in pro- totyping UAV/UGV-mounted small cells [9]. The notion of rapidly deployable small cells has now become feasible. In this paper, we focus on spectrum sharing among rapidly deployable small cells particularly for outdoor coverage in the uplink, which is emphasized when user devices intensively upload their self-generated data [3, 5, 6, 7]. A large volume of uplink traffic can be locally generated in an outdoor hotspot due to the proliferation of sensing-capable devices. For example, a typical downlink-to-uplink ratio of mobile devices is 10:1, but it can become 1:3 during mass events along with a tenfold increase in uplink traffic [3]. This is because of the uploading of pictures and videos to social media. Likewise, collecting raw data from sensor nodes or IoT devices can lead to very heavy uplink traffic [5, 6]. To handle intensive uploading of user/machine-generated data, limited wireless spectrum has to be shared and reused by small cells efficiently and effectively. Therefore, organizing a two- tier HetNet outdoors necessitates inter-cell spectrum sharing, and we mainly focus on co-tier spectrum sharing among small cells. This is different from a typical scenario in that network performance is valued more in the uplink than in the downlink. However, we have to address the following challenges. First, our approach has to jointly optimize small cell deployment and uplink resource allocation. In addition to the 3D placement of movable small cells to cover an outdoor hotspot, it is also necessary to study the establishment of uplink transmissions to meet user needs. Specifically, the problem of inter-cell spectrum sharing involves decision making on four aspects, including small cell placement (SCP), user-cell association (U- CA), channel resource allocation (CRA), and transmit power control (TPC). Second, our approach has to be responsive to initially unknown and varying demands of user devices for uplink transmissions. It is common in an outdoor hotspot that movable small cells can only selectively fulfill a part of user demands for a limited period of time, but the distribution of user demands is not known a priori and is even ever-changing.

Upload: others

Post on 11-Apr-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Spectrum Sharing among Rapidly Deployable Small Cells: A

1

Spectrum Sharing among Rapidly Deployable Small Cells:A Hybrid Multi-Agent Approach

Bo Gao, Member, IEEE, Lingyun Lu, Ke Xiong, Member, IEEE,Jung-Min “Jerry” Park, Fellow, IEEE, Yaling Yang, Member, IEEE, and Yuwei Wang

Abstract—On-demand deployment of small cells plays a keyrole in augmenting macro-cell coverage for outdoor hotspots,where user devices are brought together and intensively uploadself-generated data. In this paper, we study spectrum sharingamong rapidly deployable small cells in the uplink, even withouta priori global knowledge. We propose a hybrid multi-agentapproach, which allows a leading macro-cell base station (MBS)and multiple following small base stations (SBSs) to take part ina user-centric, online joint optimization of small cell deploymentand uplink resource allocation. Specifically, we propose a cen-tralized mechanism for the MBS to solve the first subproblemof small cell deployment stage by stage, based on an adversarialbandit model. Furthermore, we propose a distributed mechanismfor the group of SBSs to collectively solve the second subproblemof uplink resource allocation stage by stage, based on a stochasticgame model. We prove that our approach is guaranteed toproduce a joint strategy, which is built upon a mixed strategywith bounded regret on the first tier and an equilibrium solutionon the second tier. Our approach is validated by simulations onthe aspects of convergence behavior, strategy correctness, powerconsumption, and spectral efficiency.

Index Terms—Mobile communication systems, distributed net-works, algorithm/protocol design and analysis.

I. INTRODUCTION

In the era of 5G mobile communications and Internet ofThings (IoT), each macro-cell can be densely overlaid withsmall cells, so that mobile users or connected things areserved by a heterogeneous network (HetNet) [1, 2]. It isstraightforward to deploy small cells for indoor hotspots suchas homes or offices, but usually not for outdoor hotspots tosupport, e.g., public gatherings or sporting events. As the useof wireless devices outdoors is becoming a daily necessity,it has received a growing interest in augmenting macro-cellcoverage for target spots that are wide-open yet short-lived[3, 4]. A further improvement of outdoor coverage is necessarywhen user devices are brought together in a short time andcause a burst increase in macro-cell traffic, thus leading toa supply-demand mismatch. It commonly occurs that lots ofuser devices are temporarily gathered for broadband or IoTservices. However, it can be very costly or even impossible

B. Gao and K. Xiong are with the School of Computer and InformationTechnology, Beijing Jiaotong University, Beijing 100044, China. E-mail:{bogao, kxiong}@bjtu.edu.cn.

L. Lu is with the School of Software Engineering, Beijing JiaotongUniversity, Beijing 100044, China. E-mail: [email protected].

J. Park and Y. Yang are with the Bradley Department of Electrical andComputer Engineering, Virginia Tech, Blacksburg, VA 24061, USA. E-mail:{jungmin, yyang8}@vt.edu.

Y. Wang is with the Institute of Computing Technology, Chinese Academyof Sciences, Beijing 100190, China. E-mail: [email protected].

to fully and persistently cover an outdoor hotspot with smallcells.

Recent efforts have been made to find solutions towardsfast, cost-effective, and on-demand deployment of small cellsoutdoors. A promising innovation is to mount small basestations (SBSs) on movable and controllable platforms, such asunmanned aerial vehicles (UAVs) or unmanned ground vehi-cles (UGVs) [5, 6, 7, 8]. Under vehicular mobility, UAV/UGV-mounted small cells are rapidly deployable in case macro-cell base stations (MBSs) are overloaded, or even damagedor destroyed. Lately, research groups from Google, Facebook,Nokia, and academic institutions have made progress in pro-totyping UAV/UGV-mounted small cells [9]. The notion ofrapidly deployable small cells has now become feasible.

In this paper, we focus on spectrum sharing among rapidlydeployable small cells particularly for outdoor coverage in theuplink, which is emphasized when user devices intensivelyupload their self-generated data [3, 5, 6, 7]. A large volumeof uplink traffic can be locally generated in an outdoorhotspot due to the proliferation of sensing-capable devices.For example, a typical downlink-to-uplink ratio of mobiledevices is 10:1, but it can become 1:3 during mass eventsalong with a tenfold increase in uplink traffic [3]. This isbecause of the uploading of pictures and videos to socialmedia. Likewise, collecting raw data from sensor nodes orIoT devices can lead to very heavy uplink traffic [5, 6]. Tohandle intensive uploading of user/machine-generated data,limited wireless spectrum has to be shared and reused by smallcells efficiently and effectively. Therefore, organizing a two-tier HetNet outdoors necessitates inter-cell spectrum sharing,and we mainly focus on co-tier spectrum sharing among smallcells. This is different from a typical scenario in that networkperformance is valued more in the uplink than in the downlink.

However, we have to address the following challenges. First,our approach has to jointly optimize small cell deployment anduplink resource allocation. In addition to the 3D placement ofmovable small cells to cover an outdoor hotspot, it is alsonecessary to study the establishment of uplink transmissionsto meet user needs. Specifically, the problem of inter-cellspectrum sharing involves decision making on four aspects,including small cell placement (SCP), user-cell association (U-CA), channel resource allocation (CRA), and transmit powercontrol (TPC). Second, our approach has to be responsive toinitially unknown and varying demands of user devices foruplink transmissions. It is common in an outdoor hotspot thatmovable small cells can only selectively fulfill a part of userdemands for a limited period of time, but the distribution ofuser demands is not known a priori and is even ever-changing.

Page 2: Spectrum Sharing among Rapidly Deployable Small Cells: A

2

Thus, the joint optimization problem has to be solved in auser-centric, online manner. Third, our approach has to beapplicable to a resource-constrained cellular system. Althoughthe base stations in two tiers of a HetNet can work as decision-making entities, the user-centric, online joint optimization tobe performed can be too complex for either a MBS or a SBS.Any entity can suffer from limited computing, energy, andstorage resources. Besides, it is already hard to derive a real-time solution to such a complex problem even given sufficientresources.

In this paper, we overcome the above challenges and makethe contributions as follows.• We propose a hybrid multi-agent approach, which operates

with two tiers of sequential decision making under useruncertainty. It allows a leading MBS and multiple followingSBSs to take part in a multi-stage joint optimization of smallcell deployment and uplink resource allocation.

• We propose a centralized mechanism for the MBS to solvethe subproblem of small cell deployment (including SCPand UCA) stage by stage, based on an adversarial banditmodel. The MBS refines its strategy and updates userknowledge through reinforcement learning.

• We propose a distributed mechanism for the group of SBSsto collectively solve the subproblem of uplink resourceallocation (including CRA and TPC) stage by stage, basedon a stochastic game model. Under the guidance of theMBS, all the SBSs refine their strategies through multi-agentreinforcement learning.

• We prove that our approach produces a joint strategy, whichis built upon a mixed strategy with bounded regret on thefirst tier and an equilibrium solution on the second tier.Our approach is further validated by simulations on theaspects of convergence behavior, strategy correctness, powerconsumption, and spectral efficiency.The remainder of this paper is organized as follows. Related

work is discussed in section II. System model is presented insection III, where the original problem is formulated assumingcentralized control. Based on problem decoupling, our hybridmulti-agent approach is outlined in section IV, and is furtherelaborated in sections V and VI. Performance evaluation isconducted in section VII. Finally, our conclusion is summa-rized in section VIII.

II. RELATED WORK

Ever since the advent of rapidly deployable solutions, therehave been recent studies that investigate the placement ofeither a single or multiple UAV/UGV-mounted small cells. Itis assumed that each mobile platform hovers or remains stillin one spot for the optimal small cell coverage. For single-cell scenarios, on the one hand, the altitude [10, 11, 12] ortarget position [13, 14, 15] of a SBS is determined based oncertain user demands. As for multi-cell scenarios, on the otherhand, the target positions of SBSs are determined either whensmall cells occupy separate spectrum segments [16, 17, 18]or when small cells (and sometimes macro-cells) share samespectrum band so that co-tier (and cross-tier) interference isnot negligible [19, 20, 21, 22, 23]. However, none of the above

has paid attention to spectrum sharing among small cells inthe uplink, which is particularly emphasized for uploading-intensive outdoor hotspots.

There have been other studies that focus on regulating themovement of either a single or multiple UAV/UGV-mountedsmall cells. It is then assumed that each mobile platform keepsmoving constantly for the optimal small cell coverage alonga trajectory. For single-cell scenarios, on the one hand, themoving trajectory of a SBS is determined to comply withcertain user demands [24, 25, 26, 27, 28]. As for multi-cellscenarios, on the other hand, the moving trajectories of SBSsare determined either when small cells do not share samespectrum band [29] or when small cells coexist thus co-tierinterference affects decision-making processes [30, 31, 32, 33].However, these literatures study spectrum sharing among smallcells only in the downlink as well. Moreover, existing workhas to assume perfect global knowledge to optimize spectrumsharing under the mobility of small cells, but in fact, a prioriuser knowledge is difficult to obtain for transient outdoorhotspots.

One latest trend is to characterize or predict user demandsbefore carrying out on-demand deployment of UAV/UGV-mounted small cells. It is assumed in this case that userdemands are ever-changing and are not known a priori. Ac-cording to the estimation of user patterns through machinelearning, multiple SBSs can be appropriately placed eitherwhen small cells do not share same spectrum band [34, 35, 36]or when small cells coexist [37]. However, none of the abovecan handle our particular challenges, i.e., user-centric, onlinejoint optimization in support of spectrum sharing among smallcells in the uplink.

III. SYSTEM MODEL

In this section, we describe the system model that underpinsour hybrid multi-agent approach.

A. Basic Assumptions

During the lifetime of an outdoor hotspot, user devices aretemporarily brought together and settled down for broadbandor IoT services. They are eager to upload locally generateddata. We consider common wireless devices in this scenario,e.g., event spectators’ mobile devices or regular sensor nodes,whose locations and demands are slowly changing. The area ofinterest is covered by a two-tier HetNet, which consists of onefixed macro-cell and multiple UAV/UGV-mounted (hovering)small cells. An example of such a cellular system is illustratedin Fig. 1.

The establishment of data transmissions in the uplink relieson the allocation of certain dedicated portions of wirelessspectrum. We assume that the first tier of macro-cell andthe second tier of small cells operate on different spectrumbands to avoid cross-tier mutual interference. This is consistentwith the regulation of 5G spectrum, in which macro-cellsand small cells utilize lower and higher frequency bands,respectively [38]. Then, our primary focus can be on the tierof small cells. We assume that all the small cells operate onthe same spectrum band, so that inter-cell spectrum sharing

Page 3: Spectrum Sharing among Rapidly Deployable Small Cells: A

3

Local decisions on CRA and TPC

Uplink data

Uplink interference

MBS

SBS

Fig. 1. Basic idea of the hybrid multi-agent approach for spectrum sharingamong rapidly deployable small cells in the uplink.

is necessary to accommodate a large volume of uplink traffic.To enable an uplink transmission, each user device can beassociated with a certain home small cell and can occupy acertain fraction of shared spectrum by generating a certainlevel of transmit power. Isotropic antennas of user devicesare assumed, which generate the worst-case co-tier mutualinterference. In general, the problem of spectrum sharinginvolves small cell deployment and uplink resource allocation.More specifically, it involves small cell placement (SCP), user-cell association (UCA), channel resource allocation (CRA),and transmit power control (TPC).

The cellular system aims to mitigate mutual interferenceamong rapidly deployable small cells in the uplink. We assumethat user demands for uplink transmissions are not known apriori due to the temporary nature of outdoor applications.Therefore, such a situation calls for the use of sequentialdecision making under user uncertainty. The outdoor hotspotlasts only for a finite time horizon, which can further bedivided into short stages or time periods. Then, a joint op-timization problem needs to be solved sequentially in a multi-stage manner. As user knowledge is updated stage by stage,the four aspects related to spectrum sharing, i.e., SCP, UCA,CRA, TPC, should be jointly optimized. We initially assumethat the above operations are fully under control of the MBS,and this assumption will be relaxed in the next section.

B. Problem Formulation

Now we formulate the joint optimization problem per stageif given user knowledge. Our mathematical notation is sum-marized in Table I.

Suppose that within the macro-cell, there are a set of smallcells, say M = {1, 2, . . . ,M}, to be deployed and a set of userdevices, say N = {1, 2, . . . , N}, to be served. Furthermore,there are a set of available channels, say K = {1, 2, . . . ,K},to be shared by small cells. Enabling M to serve N by sharingK involves the issues of SCP, UCA, CRA, TPC. Hence, theMBS has to determine four sets of decision variables in everystage t = 1, 2, . . . , T for a time horizon T .

• First for SCP, the coordinates of a SBS are selected froma 3D location space, say L ⊂ R3. To always keep upwith ever-changing user needs, the MBS dynamically placeseach SBS m ∈ M at a certain location point l

(m)t =

(x(m)t , y

(m)t , z

(m)t ) ∈ L. Thus, let the first variable set be

Lt = {l(m)t |m ∈ M}.

TABLE ISUMMARY OF MATHEMATICAL NOTATION.

M set of small cellsN set of user devicesK set of available channelsT time span of outdoor hotspotl(m)t location point of SBS m

a(m,n)t association of user n with SBS m

b(m,n,k)t allocation of channel k to user np(m,n,k)t transmit power of user n on channel k

Ut weighted sum of power consumptionλ(n)t demand of user n

w(m,n)t weight of user n

H(n,m)t propagation gain from user n to SBS m

γ(n) SINR requirement of user nI(m,k)t interference power at SBS m on channel kδ(n) capacity requirement of user nRt(·) feedback cost for the MBS’s actionπ mixed strategy of the MBSGπ/Gπ expected/pseudo- regret under strategy πη control factor in Algorithm 1J size of action space for UCAR

(m)t (·, ·) feedback cost for SBS m’s action

θ(m) pure strategy of SBS m

G{θ(m),·} discounted cost under strategy θ(m)

φ(m) price factor in Algorithm 2

• Second for UCA, each user can be associated with onenearby SBS as its home base station. The MBS determinesa binary indicator, a(m,n)

t ∈ A = {0, 1}, for each pair ofSBS m ∈ M and user n ∈ N , which is equal to 1 (or 0)when user n is (or is not) associated with SBS m. Thus, letthe second variable set be At = {a(m,n)

t |m ∈ M, n ∈ N},and the set of user devices being associated with each SBSm ∈ M be N (m)

t = {n | a(m,n)t = 1 for n ∈ N}.

• Third for CRA, all the small cells share the same channelset, i.e., K, so co-channel uplink transmissions may inter-fere with each other. The MBS determines another binaryindicator, b(m,n,k)

t ∈ B = {0, 1}, for each combination ofSBS m ∈ M, user n ∈ N (m)

t , and channel k ∈ K, whichis equal to 1 (or 0) when channel k is (or is not) allocatedto user n being associated with SBS m. Thus, let the thirdvariable set be Bt = {b(m,n,k)

t |m ∈ M, n ∈ N (m)t , k ∈ K}

or B(m)t = {b(m,n,k)

t |n ∈ N (m)t , k ∈ K} for each SBS

m ∈ M, and the set of available channels being allocatedto each pair of SBS m ∈ M and user n ∈ N (m)

t beK(m,n)

t = {k | b(m,n,k)t = 1 for k ∈ K}.

• Fourth for TPC, the transmit power of each user device isadjustable within a power space, say P ⊂ R+. To supportspectrum reuse in the uplink, for each combination of SBSm ∈ M, user n ∈ N (m)

t , and channel k ∈ K(m,n)t , the

MBS makes user n being served by SBS m transmit dataon channel k with a certain power level p(m,n,k)

t ∈ P . Thus,let the fourth variable set be Pt = {p(m,n,k)

t |m ∈ M, n ∈N (m)

t , k ∈ K(m,n)t } or P

(m)t = {p(m,n,k)

t |n ∈ N (m)t , k ∈

K(m,n)t } for each SBS m ∈ M.

In general, small cell deployment involves SCP and UCA,

Page 4: Spectrum Sharing among Rapidly Deployable Small Cells: A

4

while uplink resource allocation involves CRA and TPC.

For each stage t = 1, 2, . . . , T , the four sets of decisionvariables are determined to optimize the objective of spectrumsharing among movable small cells in the uplink. Becauseeach user device generates not only transmit power, but alsointerference power in the eyes of others, it is reasonable tominimize user devices’ power consumption (transmit powerlevels) in every small cell. The benefits are twofold: transmitpower saving and mutual interference mitigation. Then, foreach SBS m ∈ M, the objective function to be minimizedcan be defined by

U(m)t =

∑n∈N (m)

t

λ(n)t w

(m,n)t

∑k∈K(m,n)

t

p(m,n,k)t , (1)

where each λ(n)t denotes user n’s demand (i.e., probability)

for channel access, which is assumed to be uncertain andhas to be learnt stage by stage; each w

(m,n)t denotes user

n’s weight (or priority) for resource allocation, if n ∈ N (m)t ,

which characterizes the impact of the user’s transmit power onspectrum sharing. To estimate user demand λ

(n)t , or user n’s

probability of uplink transmissions in stage t, traffic patternsof user n over past stages can be utilized to compute usern’s frequency of uplink transmissions by stage t. To defineuser weight w(m,n)

t , interference potentials of user n can beevaluated. Some cell-edge users may generate stronger levelsof interference power to others, so they should be prioritized toemit lower levels of transmit power. To achieve soft frequencyreuse in the uplink [39], one possible definition of w(m,n)

t , foreach pair of SBS m ∈ M and user n ∈ N (m)

t , can be

w(m,n)t =

∑m′∈M,m′ =m

H(n,m′)t

H(n,m)t

, (2)

where each H(n,m)t denotes propagation gain in the uplink

from user n to SBS m. If assuming the basic ground-to-airpath loss model [34], to be discussed later, this definition ofuser weights can be distance-dependent and can be helpfulto optimize transmission/interference distances while placingsmall cells. In the weighted sum of transmit power levels asin (1) and (2), the values of N (m)

t and w(m,n)t for m ∈ M,

n ∈ N (m)t are related to SCP and UCA, while the values of

K(m,n)t and p

(m,n,k)t for m ∈ M, n ∈ N (m)

t , k ∈ K(m,n)t are

related to CRA and TPC.

There are a number of constraints for the minimization ofobjective function. First, each user should be associated withno more than one small cell in a certain stage. Note that eachsmall cell can still accommodate multiple users at a time. Thus,UCA needs to satisfy∑

m∈Ma(m,n)t ≤ 1, for n ∈ N . (3)

Second, within a certain small cell, each channel should beallocated to no more than one user in a certain stage, to avoidintra-cell interference in the uplink. Note that each user canstill take multiple channels at a time, and each channel canstill be shared among multiple users in different cells. Thus,

CRA needs to satisfy∑n∈N (m)

t

b(m,n,k)t ≤ 1, for m ∈ M, k ∈ K. (4)

Third, for a certain user in a certain small cell, transmit powerover each channel being taken should ensure required signal-to-interference-plus-noise ratio (SINR). Thus, TPC needs tosatisfy

p(m,n,k)t H

(n,m)t

I(m,k)t + Z

(k)0

≥ γ(n),

for m ∈ M, n ∈ N (m)t , k ∈ K(m,n)

t ,

(5)

where each γ(n) denotes user n’s requirement of SINR forsuccessful uplink transmissions; each I

(m,k)t denotes aggregate

interference power on channel k locally observed at SBSm in stage t, which is generated from co-channel users inneighboring cells; each Z

(k)0 denotes average noise power on

channel k. Fourth, when CRA and TPC are jointly considered,each user within a certain small cell should take sufficientnumber of channels to achieve required aggregate capacity(per unit bandwidth). Thus, CRA and TPC need to satisfy∑

k∈K(m,n)t

log

(1 +

p(m,n,k)t H

(n,m)t

I(m,k)t + Z

(k)0

)≥ δ(n),

for m ∈ M, n ∈ N (m)t ,

(6)

where each δ(n) denotes user n’s requirement of capacity forsatisfactory uplink transmissions, which can be collected asuser n requests channel access for an application.

In summary, the problem per stage for t = 1, 2, . . . , T thatcorresponds to each stage of the joint optimization of smallcell deployment and uplink resource allocation is defined as

P0: find: Lt, At, Bt, Pt;minimize: Ut =

∑m∈M

U(m)t ;

s.t.: (3), (4), (5), (6).

The formulated problem is a mixed-integer non-linear program(MINLP), which is NP-hard in general [39]. There are foursets of decision variables to determine, so the solution spacecan be prohibitively large. The problem per stage is complex tosolve even assuming perfect global knowledge. Furthermore,it is especially challenging to keep refining the solution tothis problem stage by stage under user uncertainty. Insteadof solving it in a centralized way, we can decouple its twosubproblems—small cell deployment and uplink resource al-location, and let both tiers of macro- and small cells alternatelycontribute to problem solving.

IV. HYBRID MULTI-AGENT APPROACH

In this section, we introduce the basic idea of our solutionapproach, and its two tiers of decision making will be elabo-rated in the next two sections.

To make the original problem tractable, we propose a hybridmulti-agent approach that follows a principal-agent model[40], in which the MBS (as principal) learns user demandsfrom past stages and guides the SBSs (as agents) to take

Page 5: Spectrum Sharing among Rapidly Deployable Small Cells: A

5

their part of responsibility for problem solving. Specifically,our approach takes advantage of both the MBS’s capabilityof online learning and each SBS’s potential of autonomousgovernance. Once small cell deployment and uplink resourceallocation are decoupled, the first-tier MBS and the second-tier SBSs can undertake these two subproblems, respectively.On the one hand, the MBS should be in charge of the firstsubproblem. It is important to solve SCP and UCA based ona global picture of all small cells. On the other hand, given asolution to small cell deployment, each SBS can be responsiblefor its own part of the second subproblem. Within each smallcell, it is possible to solve CRA and TPC only based on localknowledge of other small cells [39].

Our proposed approach operates with two tiers of sequentialdecision making under user uncertainty, requiring the leadingMBS and the following SBSs to act alternately and evolve inresponse to each other. In absence of a priori user knowledge,reinforcement-learning-based models can be useful. On thefirst tier, the MBS interacts with its environment (includingthe SBSs), and refines its global decision according to theenvironment’s feedback rewards. Similarly on the second tier,each SBS interacts with its environment (including the MBS),and refines its local decision according to the environment’sstate changes. The basic idea of our approach is illustrated inFig. 1. More specifically, according to the decision feedbacksin past stages, the MBS refines its strategy for (multi-cell)SCP and UCA to optimize the global objective. Meanwhile,the MBS updates user knowledge through stage-by-stage rein-forcement learning. We consider an adversarial bandit modelto derive a mixed strategy that allows online exploration andexploitation. In response, each SBS adapts its strategy for(single-cell) CRA and TPC to optimize its local utility, acomponent of the global objective. Under the guidance of theMBS, all the SBSs participate in spectrum sharing throughstage-by-stage multi-agent reinforcement learning. Because ofthe conflict of interest among coexisting small cells, we framea stochastic game model to obtain an equilibrium solution.Generally in our hybrid approach, the first-tier MBS makesa sequence of coarse-grained global decisions and leads thegroup of all the second-tier SBSs, each of which makes asequence of fine-grained local decisions. As a result, all theentities make their own contributions to solving the originalproblem. Our approach can be responsive to initially unknownand varying demands of user devices, and can be applicable toa resource-constrained cellular system, despite a modest lossof optimality.

V. SMALL CELL DEPLOYMENT

In this section, we focus on the refinement of the MBS’sstrategy for SCP and UCA. If considering the SBSs as partof the environment, the MBS can learn user demands andrefine small cell deployment every time receiving a decisionfeedback from such an environment. The feedback for aMBS’s decision is actually concluded by its subsequent SBSs’decisions thus is non-stochastic. Then, solving the subproblemof small cell deployment stage by stage can be viewed asplaying with an adversarial or non-stochastic bandit [41].

In this model, one “arm” corresponds to one of the MBS’spossible actions, but its reward distribution depends on theSBSs’ responding actions and is thus not specifically known.After certain stages of trying (i.e., pulling arms), learning (i.e.,updating reward beliefs), and adapting, the best global strategyof the MBS is attainable, which is capable of addressing theexploration-exploitation trade-off.

A. Adversarial Bandit

For a finite time horizon, i.e., for t = 1, 2, . . . , T , theMBS makes sequential decisions on small cell deploymentby dealing with an adversarial bandit problem, which can bedefined by a 2-tuple < LM ×AM×N , R·(·) >: LM ×AM×N

is a set of possible actions for the MBS, who takes an action(Lt, At) ∈ LM ×AM×N in stage t; Rt(Lt, At) is a feedbackreward/cost for the MBS, which evaluates the applied action(Lt, At) in stage t.

In each stage t, the MBS selects an action (Lt, At) =(Lj , Aj) from a probability distribution πt over LM ×AM×N = {(Lj , Aj) | j = 1, 2, . . . , |LM ×AM×N |}, in whicheach possible action (Lj , Aj) is assigned with a probabilityπt(L

j , Aj). It is required to ensure that∑

j πt(Lj , Aj) = 1.

The reward/cost function Rt needs to be defined to favor thestrategy πt that minimizes the objective Ut in the problem P0

on average. Hence, we can have

Rt(Lt, At) = Ut(Lt, At, B∗t , P

∗t ), (7)

which is an evaluation of not only the MBS’s applied action(Lt, At) but also the SBSs’ best joint action (B∗

t , P∗t ) in

response (hidden by the environment for the MBS). In thisway, minimizing the reward or actually the cost for spectrumsharing is equivalent to optimizing the global objective.

In the finite time horizon, a mixed strategy of the MBS, sayπ = {πt | t = 1, 2, . . . , T}, is able to generate a sequence ofapplied actions (L1, A1), . . . , (LT , AT ). Comparing those π-chosen actions with the cost-minimizing one, the optimality ofπ is evaluated with respect to the criterion of either expectedregret Gπ or pseudo-regret Gπ , which can be defined by

Gπ = E

[T∑

t=1

Rt(Lt, At)−minj

T∑t=1

Rt(Lj , Aj)

], (8)

Gπ = E

[T∑

t=1

Rt(Lt, At)

]−min

jE

[T∑

t=1

Rt(Lj , Aj)

]. (9)

The final goal of the MBS is to derive a mixed strategy π∗

for small cell deployment such that

π∗ = argminπ

Gπ or argminπ

Gπ, (10)

supposing the best responses of the SBSs behind the environ-ment for uplink resource allocation.

B. Subproblem Solution

It is still challenging to solve the adversarial bandit problemdue to the huge size of the MBS’s action space LM ×AM×N .Fortunately, the two issues of SCP and UCA for small celldeployment can further be decoupled. Particularly, the MBS

Page 6: Spectrum Sharing among Rapidly Deployable Small Cells: A

6

takes a primary action At ∈ AM×N for UCA in every staget, i.e., to group N users into M clusters and associate eachuser cluster with a small cell. Based on At, the MBS takes asecondary action Lt ∈ LM for SCP, i.e., to place each smallcell above its associated user cluster. It is beneficial to addressUCA before SCP (and subsequent CRA and TPC), because theinvolvement of binary variables for UCA gives a finite numberof possible actions (arms) for the MBS’s sequential decisionmaking. Furthermore, each possible action At leads the othersubsequent decisions within a stage, and can be evaluatedby a feedback cost Rt(At). Then, the action space can bedownsized to AM×N .

Before getting to find the optimal strategy or action of At

for UCA in stage t, we put initial focus on deriving the optimalaction of Lt for SCP assuming that At is given. Note that whilehandling the issue of SCP, the MBS does not directly managethe subsequent issues of CRA and TPC, which have becomelocal to the SBSs after problem decoupling. In the phase ofSCP without knowing next decisions on CRA and TPC, theMBS has to coarsely optimize the coverage of every smallcell, i.e., to optimize a part of the objective function in (1),and help the SBSs further optimize the other part of it. Theidea here is that the transmission and interference distancesin the uplink can be minimized and maximized, respectively,through the optimal placement of small cells. This can be anindirect way of improving soft frequency reuse in the uplink.Thus for SCP, the objective function in (1) is truncated to

V(m)t =

∑n∈N (m)

t

λ(n)t w

(m,n)t , (11)

in which the values of λ(n)t for n ∈ N can be estimated

stage by stage; the values of N (m)t and w

(m,n)t for m ∈ M,

n ∈ N (m)t are determined by At and Lt, respectively.

The optimization of transmission/interference distances canbe achieved by properly defining w

(m,n)t for each pair of

SBS m and user n. If assuming the basic ground-to-air pathloss model [34], each value of propagation gain H

(n,m)t in

(2) is still inversely proportional to the Euclidean distanced(m,n)t = ||l(m)

t −l(n)|| (to the power of path loss exponent α),between SBS m at l(m)

t ∈ L and user n at l(n) ∈ L. Then, eachuser weight can become a ratio of transmission/interferencedistances. Alternatively, each user weight can be directlydefined like this, instead of following (2). Hence, we canrewrite the above V

(m)t as

V(m)t =

∑n∈N (m)

t

λ(n)t (d

(m,n)t )α

∑m′∈M,m′ =m

(d(m′,n)t )−α. (12)

Then, according to the original problem P0 of joint optimiza-tion, the subsubproblem of SCP per stage can be defined as

PSCP : given: At;find: Lt;

minimize: Vt =∑

m∈M

V(m)t ;

s.t.: l(m)t ∈ L(m) for m ∈ M.

Each SBS m only searches a location space L(m) ⊂ L that is

50 60 70 80 90 100 110 120 130 140 15050

60

70

80

90

100

110

120

130

140

150

Fig. 2. An example of Vt as a function of (x(m)t , y

(m)t ) (in meters).

local to its associated users N (m)t . According to optimization

theory, we can show that such a subsubproblem is directlysolvable.

Lemma 1. Given that in each stage t = 1, 2, . . . , T , the valuesof N (m)

t for m ∈ M are fixed by a certain At, and thevalues of w

(m,n)t for m ∈ M, n ∈ N (m)

t are defined by(2), and each L(m) for m ∈ M is closed and convex, thenthere exists the optimal solution L∗

t to PSCP .Proof. The distance d

(m,n)t between any SBS m ∈ M and any

user n ∈ N only appears once in Vt. Specifically, if usern is associated with SBS m, their distance is consideredas a transmission distance in the part of (d

(m,n)t )α; if

not, it is considered as an interference distance in thepart of (d

(m′,n)t )−α. We can see that the minimization of

Vt for SCP contributes to the maximization of inter-cellinterference distances as well as the minimization of intra-cell transmission distances. If considering Vt as a functionof any l

(m)t = (x

(m)t , y

(m)t , z

(m)t ) ∈ L(m), the objective

function becomes the following form:

Vt =∑

n∈N (m)t

κ(n)t (d

(m,n)t )α+

∑n ∈N (m)

t

κ(n)t (d

(m,n)t )−α+κt, (13)

where each κ(n)t or κt is a positive constant. The first part is

to minimize transmission distances in cell m, and the secondpart is to maximize interference distances from the othercells. In a small enough search space L(m), the minimizationof Vt is dominated by the minimization of the first part,which is a convex function of l

(m)t . A typical contour plot

of Vt with respect to (x(m)t , y

(m)t ) (z(m)

t = 10 [32]) isillustrated in Fig. 2, when associated users n ∈ N (m)

t aregenerated near this region’s center and interfering usersn ∈ N (m)

t are distributed outside the local search space.Hence, any SBS m can find its own optimal l

∗(m)t that

helps minimize Vt while temporarily fixing the other SBSs.Through alternating minimization, the optimal solution L∗

t

that minimizes Vt is achievable for a given At. �Existing non-linear optimization solvers, such as “fmincon”

in MATLAB, can be applied to optimize SCP subject to UCA.For the reason that L∗

t (and subsequent (B∗t , P

∗t ) for CRA

and TPC) always follows At, the MBS’s sequential decision

Page 7: Spectrum Sharing among Rapidly Deployable Small Cells: A

7

making can only involve finding At stage by stage. To makesuch decisions, the subsubproblem of UCA per stage can bedefined as

PUCA: find: At;minimize: Ut =

∑m∈M

U(m)t ;

s.t.: (3).

This subsubproblem is the one to be addressed as an adversari-al bandit problem, in which the MBS’s action space is revisedto AM×N . Because multiple users close to each other willprobably be associated with the same small cell nearby, theseusers can be tied together for UCA and the action space canfurther be replaced with a (small) subset of it. Alternatively,the action space can be constructed based on the possibilitiesof grouping N users into M clusters.

Consider a finite action space for UCA, say AJ = {Aj | j =1, 2, . . . , J} ⊆ AM×N . In each stage t, the MBS selects anaction At = Aj from a probability distribution πt over AJ , inwhich each possible action Aj is assigned with a probabilityπt(A

j). It is also required to ensure that∑

j πt(Aj) = 1. In

bandit theory, the strategy πt can be updated by applying theexponential-weight algorithm [42]. Specifically, if the MBSobserves a cost Rt(At) after taking At, let

ωt+1(Aj) =

{ωt(A

j) exp(−η Rt(Aj)

πt(Aj) ) if At = Aj ;

ωt(Aj) otherwise,

(14)

where η is a control factor, which will be discussed later;each ωt+1(A

j) denotes action Aj’s weight for probabilisticselection in stage t+ 1, and is then normalized to

πt+1(Aj) =

ωt+1(Aj)∑J

j=1 ωt+1(Aj). (15)

In this way, the strategy πt+1 to be utilized in stage t+1 can bederived based on only the currently observed cost Rt(At) bythe end of stage t. Generally speaking, if the applied actionAt = Aj returns a higher cost Rt(A

j), then this action Aj

will be less preferred in the future and will be assigned with alower probability πt+1(A

j). The main steps are summarizedin Algorithm 1. In the finite time horizon, we are able to showthat this algorithm provides regret guarantees for UCA, but itis still heuristic due to the involvement of user uncertainty.

Theorem 1. Given that in a period of T stages, the MBS runsAlgorithm 1 to refine the probability distributions πt overAJ for t = 1, 2, . . . , T , and generates a sequence of appliedactions A∗

1, . . . , A∗T accordingly, then there exists an upper

bound on expected regret Gπ or pseudo-regret Gπ in thefinite-horizon adversarial bandit defined by PUCA.

Proof. It has been proven in [43] that the pseudo-regretachieved by the exponential-weight algorithm is upperbounded, and Gπ ≤

√2TJ lnJ holds for a certain setting of

control factor η in (14). Moreover, the environment respondsto the MBS’s current action A∗

t with a cost Rt(A∗t ), which

does not depend on the MBS’s past actions A∗1, . . . , A

∗t−1,

so the environment is oblivious. In this case, the pseudo-regret equals to the expected regret, which is thus also upperbounded, and Gπ ≤

√2TJ lnJ also holds. �

Algorithm 1 Small cell deployment at the MBS1: for t = 1, 2, . . . , T do2: if t == 1 then3: for j = 1, 2, . . . , J do4: initialize ωt(A

j) = 1 and πt(Aj) = 1

J5: end for6: end if7: select A∗

t = Aj from πt probabilistically8: obtain L∗

t according to A∗t via an optimization solver

9: send (L∗t , A

∗t ) to the SBSs, and wait for their respond-

ing actions for uplink resource allocation10: receive (B∗

t , P∗t ) from the SBSs, which can be obtained

according to (L∗t , A

∗t ) via locally running Algorithm 2

11: compute Rt(A∗t = Aj) according to (L∗

t , A∗t , B

∗t , P

∗t )

12: if t < T then13: for j = 1, 2, . . . , J do14: update ωt+1(A

j) and πt+1(Aj) via (14) and (15)

15: end for16: end if17: end for

In summary, the first subproblem can be solved by runningAlgorithm 1 at the MBS, which interacts with Algorithm 2locally run at each SBS, to be discussed in the next section.The output of Algorithm 1 includes the MBS’s strategy for(optimal) SCP and (heuristic) UCA along with a sequence ofcorresponding actions.

VI. UPLINK RESOURCE ALLOCATION

In this section, we study the refinement of each SBS’slocal strategy for CRA and TPC under the guidance of theMBS. If considering the MBS as part of the environment,each SBS makes a contribution to uplink resource allocationevery time receiving a solution to small cell deployment fromsuch an environment. Because of potential mutual interferenceamong coexisting small cells, solving the subproblem of uplinkresource allocation stage by stage can be viewed as playingwith a stochastic or Markov game [40, 44]. In this model,each SBS acts as a “player” on behalf of its entire smallcell and may compete with others for spectrum sharing. TheMBS’s current action can be viewed as a system state thatguides the SBSs’ responding actions, which in return triggerthe transition to a new state (determined by the MBS’s nextaction). After certain stages of refinement, the local strategiesof all the SBSs are expected to constitute an equilibrium inthe stochastic game for uplink resource allocation.

A. Stochastic Game

For a finite time horizon, i.e., for t = 1, 2, . . . , T , thegroup of all the SBSs makes sequential joint decisions onuplink resource allocation by being involved in a stochas-tic game problem, which can be defined by a 5-tuple <M,LM × AM×N ,BN×K × PN×K , Q·(·, ·, ·), R·

·(·, ·) >: Mis a set of game players, and each SBS m ∈ M playsfor its own small cell; LM × AM×N is a set of systemstates, and the leading action (L∗

t , A∗t ) ∈ LM ×AM×N gives

Page 8: Spectrum Sharing among Rapidly Deployable Small Cells: A

8

the state in stage t; BN×K × PN×K is a set of possibleactions for each SBS m, who takes an action (B

(m)t , P

(m)t ) ∈

BN×K × PN×K in stage t, and equivalently the group ofSBSs takes a joint action (Bt, Pt) ∈ BM×N×K × PM×N×K

in stage t; Qt((L∗t , A

∗t ), (Bt, Pt), (L

∗t+1, A

∗t+1)) is a state

transition probability, which characterizes the likelihood thatthe state moves from (L∗

t , A∗t ) in stage t to (L∗

t+1, A∗t+1) in

stage t + 1 under the joint action (Bt, Pt) taken in stage t;R

(m)t ((L∗

t , A∗t ), (Bt, Pt)) is a feedback payoff/cost for each

SBS m, which evaluates the applied action (B(m)t , P

(m)t )

taken at the state (L∗t , A

∗t ) in stage t.

In each stage t, each SBS m observes the state (L∗t , A

∗t )

and takes an action (B(m)t , P

(m)t ). The resulting joint action

(Bt, Pt) triggers the move to stage t+1 and the transition tostate (L∗

t+1, A∗t+1). The function Qt can be estimated based

on the MBS’s mixed strategy. Let each

Qt((L∗t , A

∗t ), (Bt, Pt), (L

∗t+1, A

∗t+1))

= Pr{(L∗t+1, A

∗t+1)|(L∗

t , A∗t ), (Bt, Pt)}

= Pr{A∗t+1|(L∗

t , A∗t ), (Bt, Pt)} · Pr{L∗

t+1|A∗t+1},

(16)

where the probability Pr{A∗t+1|(L∗

t , A∗t ), (Bt, Pt)} is given by

πt+1 for UCA, and the probability Pr{L∗t+1|A∗

t+1} dependson how the non-linear optimization for SCP is solved andcan be estimated empirically if L∗

t+1 is not unique to A∗t+1.

The payoff/cost function R(m)t for each SBS m should be

consistent with the reward/cost function Rt for the MBS andbe a component of the global objective. Hence, let each

R(m)t ((L∗

t , A∗t ), (Bt, Pt)) = U

(m)t (L∗

t, A∗t, B

(m)t , P

(m)t ), (17)

which is a measure of SBS m’s applied action (B(m)t , P

(m)t )

in response to the MBS’s leading action (L∗t , A

∗t ).

In the finite time horizon, a pure strategy of each SBS m,say θ(m) = {θ(m)

t | t = 1, 2, . . . , T}, needs to be refined,in which let each θ

(m)t (L∗

t , A∗t ) = (B

(m)t , P

(m)t ). Given the

joint strategy of all the SBSs except SBS m, say θ(−m), theoptimality of θ(m) can be evaluated with respect to expectedtotal discounted payoff/cost, which is defined by

G{θ(m),θ(−m)} = E

[T∑

t=1

βt−1R(m)t (, (Bt, Pt))

], (18)

where β ∈ (0, 1) is a discount factor used to put more focus onmore recent stages. The goal of SBS m is to derive a greedystrategy θ∗(m) for (local) uplink resource allocation such that

θ∗(m) = argminθ(m)

G{θ(m),θ(−m)}. (19)

More importantly, the set of all the SBSs’ greedy strategies,θ∗ = {θ∗(m) |m ∈ M}, should be able to establish anequilibrium in the stochastic game.

B. Subproblem Solution

It is still challenging to guarantee that the SBSs can agree ona common set of greedy strategies as an equilibrium solutionto the stochastic game problem. Due to the involvement ofbinary variables for CRA like those for UCA, the two issuesof CRA and TPC for uplink resource allocation can further be

decoupled as well. Particularly, each SBS m takes a primaryaction B

(m)t ∈ BN×K for CRA in every stage t. Based

on the resulting Bt, each SBS m takes a secondary actionP

(m)t ∈ PN×K for TPC. Hence, each stage game that is a non-

cooperative game to be played repeatedly can be decoupledinto two subgames, for CRA and TPC respectively.

We first study one stage game in t. Before getting to find theequilibrium solution of Bt to the subgame for CRA in stage t,we initially focus on deriving the optimal joint solution of Pt

to the subgame for TPC assuming that Bt is given. Accordingto the original problem P0, the subsubproblem of TPC perstage to be locally solved by each SBS m can be defined as

PTPC : given: L∗t , A∗

t , Bt, P(−m)t ;

find: P(m)t ;

minimize: U(m)t ;

s.t.: (5), (6).

Each SBS m may solve this subsubproblem multiple timesbefore its P

(m)t and others’ P

(−m)t establish an equilibrium.

According to the fixed point theorem in game theory [39],we can show that the subgame problem defined by such asubsubproblem is uniquely solvable.

Lemma 2. Given that in each stage t = 1, 2, . . . , T , the valuesof N (m)

t for m ∈ M and w(m,n)t for m ∈ M, n ∈ N (m)

t

are determined by (L∗t , A

∗t ), and the values of K(m,n)

t form ∈ M, n ∈ N (m)

t are fixed by a certain Bt, and Pis closed and convex, then there exists the (unique) Nashequilibrium P ∗

t in the subgame defined by PTPC .Proof. The global objective is the weighted sum of transmit

power levels. If every user lowers down its transmit power(also interference power to others) on each channel, all theco-channel users would experience the minimum levels ofinterference power and finally achieve their minimum levelsof transmit power when the equalities in (5) hold for basicSINR guarantees. According to [39], the resulting set ofall users’ minimum power levels gives the optimal jointsolution P ∗

t , in which each P∗(m)t solves PTPC for one SBS

m. Furthermore, the solution P ∗t to the system of equations

from (5) is shown to be unique. Following the same logicas the proof for Theorem 1 in [39], we can prove that thefixed point theorem holds for the subgame for TPC. Hence,the Nash equilibrium can be established by the unique P ∗

t

for a given Bt. �Some existing distributed algorithms can optimize TPC

subject to CRA, such as iterative water-filling algorithm.Because P ∗

t always follows Bt, we now focus on the subgamefor CRA. Each SBS m locally solves the subsubproblem ofCRA per stage, which can be defined as

PCRA: given: L∗t , A∗

t , B(−m)t ;

find: B(m)t ;

minimize: U(m)t ;

s.t.: (4), (5), (6).

Each SBS m may solve this subsubproblem multiple times be-fore its B

(m)t and others’ B(−m)

t are commonly agreed upon.If the subgame problem defined by such a subsubproblem can

Page 9: Spectrum Sharing among Rapidly Deployable Small Cells: A

9

be solved in a distributed manner, we can show that the stagegame in t converges to a Nash equilibrium.

In each stage t, each SBS m should locally make a binarydecision b

(m,n,k)t for each pair of user n ∈ N (m)

t and channelk ∈ K. The greedy SBSs may not reach a commonly agreedsolution of Bt due to potential mutual interference. Evenwithout timely coordination among the SBSs, however, wecan still guarantee the convergence of the subgame for CRAthrough a distributed algorithm for uplink spectrum reuse[39]. Specifically in each small cell m, channel allocationfor each user n depends on its weight w(m,n)

t . According tothe definition of user weights in (2), the users with largerweights are either more likely to cause interference to othersor more vulnerable to interference from others. Hence, suchusers should be prioritized to get high-quality channels. Forchannel quality evaluation, each SBS m can locally observethe aggregate interference power I(m,k)

t on each channel k, sothe good channels can be dedicated ones or shared ones withlow interference levels. Then based on both user weights andinterference measurements, each SBS can take its associatedusers in turns, each of which should be allocated with certainchannels subject to the constraints (4), (5), (6). Every userneeds to emit sufficiently high (but not so high) level oftransmit power on each taken channel for acceptable SINR,and also needs to get sufficient number of channels for desiredaggregate capacity. Given that the equalities in (5) hold afterthe adaptation of power levels, then to further ensure (6), thenumber of channels to be allocated to each user n ∈ N canbe computed by

K(n) =

⌈δ(n)

log(1 + γ(n))

⌉. (20)

As summarized in Algorithm 2, each SBS m obtains a solutionof B(m)

t heuristically, and may further refine it in response tothe joint solution of B(−m)

t from other SBSs.To guarantee the convergence of the subgame for CRA, we

rewrite each local objective U(m)t by adding a cost function

C(m)t = φ(m)I

(m)t = φ(m)

∑k∈K

I(m,k)t , (21)

where φ(m) is a positive price factor used to “punish” SBS m

if its strategy B(m)t does not contribute to the desired equilib-

rium. More details are described in Algorithm 2. According tothe Lyapunov’s direct stability theorem in non-linear controltheory [40, 45], we can show that the convergence of thestage game in t for CRA and TPC to an equilibrium can beguaranteed.

Lemma 3. Given that in each stage t = 1, 2, . . . , T , all theSBSs run Algorithm 2 independently to act in response to(L∗

t , A∗t ), then there exists a Nash equilibrium (B∗

t , P∗t ) in

the stage game defined by PCRA and PTPC .Proof. The adaptation of price factor in Algorithm 2 makesφ(m) be non-decreasing and U

(m)0 be decreasing. Once φ(m)

has been increased to always make U (m) ≥ U(m)0 hold, SBS

m no longer changes its strategy B∗(m)t in the subgame for

CRA, which then gives the minimum U∗(m)0 . Once all the

SBSs give up acting in the subgame for CRA, a certain

Algorithm 2 Uplink resource allocation at each SBS m

1: for t = 1, 2, . . . , T do2: wait for the leading action for small cell deployment3: receive (L∗

t , A∗t ) from the MBS, which can be obtained

via running Algorithm 14: initialize B

(m)t to a certain solution and φ(m) to a

positive constant φ(m)0 , and play the subgame for CRA

5: repeat6: wait for the next turn to refine B

(m)t , while others

are taking turns to refine B(−m)t

7: obtain P(m)t according to the current B

(m)t in the

subgame for TPC, and measure I(m,k)t for k ∈ K

8: compute R(m)t acc.to the current (L∗

t, A∗t, B

(m)t , P

(m)t )

9: set U(m)0 = R

(m)t , I

(m)0 =

∑k∈K I

(m,k)t , U

(m)0 =

U(m)0 +φ

(m)0 I

(m)0 accordingly, and set B(m)

0 = B(m)t

10: sort the sequence of users n ∈ N (m)t by their values

of w(m,n)t in descending order, and let the sorted

sequence of users be N = {n1, n2, . . . , nN(m)t

}11: reset B(m)

t = 0, and measure I(m,k)t for k ∈ K

12: sort the sequence of channels k ∈ K by their valuesof I

(m,k)t in ascending order, and let the sorted

sequence of channels be K = {k1, k2, . . . , kK}13: for i = 1, 2, . . . , N

(m)t do

14: for j = 1, 2, . . . ,K do15: if

∑N(m)t

i′=1 b(m,ni′ ,kj)t == 0 then

16: set b(m,ni,kj)t = 1, . . . , b

(m,ni,kj+K(n)−1)t = 1

17: end if18: end for19: end for20: obtain P

(m)t according to the updated B

(m)t in the

subgame for TPC, and measure I(m,k)t for k ∈ K

21: compute R(m)t acc. to the updated (L∗

t,A∗t,B

(m)t ,P

(m)t )

22: set U (m) = R(m)t , I(m) =

∑k∈K I

(m,k)t , U (m) =

U (m) + φ(m)I(m) accordingly23: if U (m) ≥ U

(m)0 then

24: set B(m)t = B

(m)0 (give up this updated B

(m)t )

25: end if26: if !(U (m) ≤ U

(m)0 && I(m) ≤ I

(m)0 ) then

27: increase φ(m) by a positive constant φ(m)c

28: end if29: until the end of stage t30: end for

common B∗t is agreed upon. After that, the unique P ∗

t

is obtained in the subgame for TPC under the fixed B∗t .

Following the same logic as the proof for Theorem 2 in[39], we can prove that the converged solution (B∗

t , P∗t ) is

a critical point and∑

m∈M(U(m)0 − U

∗(m)0 ) is a Lyapunov

function, so the Lyapunov’s direct stability theorem holdsfor the stage game. Therefore, a Nash equilibrium can beestablished by the stable (B∗

t , P∗t ) for a given (L∗

t , A∗t ). �

After the analysis of one stage game in t, we study themulti-stage stochastic game that includes a sequence of suchstage games for t = 1, 2, . . . , T . In the finite time horizon, we

Page 10: Spectrum Sharing among Rapidly Deployable Small Cells: A

10

0200

2

4

150 200

6

8

150100

10

100

12

50 500 0

Fig. 3. An example of simulation scenario (in meters): triangles representUAV-mounted SBSs; circles and squares represent user devices; and colorsrepresent user-cell associations.

are able to prove the existence of an equilibrium solution.

Theorem 2. Given that in a period of T stages, the MBS runsAlgorithm 1 to control the state transitions from (L∗

t , A∗t ) to

(L∗t+1, A

∗t+1) for t = 1, 2, . . . , T − 1, and all the SBSs run

Algorithm 2 independently to generate a sequence of Nashequilibria (B∗

1 , P∗1 ), . . . , (B

∗T , P

∗T ) accordingly, then there

exists a Markov-perfect equilibrium θ∗ in the finite-horizonstochastic game defined by PCRA and PTPC .

Proof. According to game theory, a finite-horizon multi-stagegame always has a subgame-perfect equilibrium as long aseach of its stage games has a Nash equilibrium. Therefore,a Markov-perfect equilibrium θ∗, i.e., a subgame-perfectequilibrium in Markov strategies, can be established by(B∗

1 , P∗1 ), . . . , (B

∗T , P

∗T ) in this stochastic game [40]. �

In summary, the second subproblem can be solved byrunning Algorithm 2 locally at each SBS, which interacts withAlgorithm 1 run at the MBS. The output of Algorithm 2 is theSBS’s local strategy for (heuristic) CRA and (optimal) TPCas part of an equilibrium solution.

VII. PERFORMANCE EVALUATION

In this section, we evaluate our hybrid multi-agent approachby simulations in MATLAB. Specifically, we consider anoutdoor hotspot with the size of 200 × 200 in meters, inwhich M UAV-mounted small cells are deployed to serveN randomly distributed user devices by sharing K availablechannels. An example of it is shown in Fig. 3, where M = 5and N = 40. In each stage t = 1, 2, . . . , T , each user n ∈ Ntransmits uplink data with a constant yet hidden probabilityλ(n), which can be estimated based on user n’s frequency ofuplink transmissions by stage t. In Algorithm 1, the actionspace for UCA, AJ , should not be too large due to theonline feature of our approach. To get a tractable value ofJ , for example in Fig. 3, the potentially “inner” users fora cell (circles with the same color) can be associated withthe same SBS, and each of the potentially “edge” users forany cell (squares with changeable colors) can be associatedwith one of the nearest SBSs. Using such a heuristic, wecan make J = 256 for this example with a modest loss of

0 250 500 750 1000 1250 1500Stage

1

2

3

4

5

6

7

8

9

10

11

12

Exp

ecte

d C

ost (

in w

atts

)

×10-7

K = 22K = 24K = 26K = 28

Fig. 4. Convergence behavior of our approach (T = 2500, η0 = 1× 108).

0 250 500 750 1000 1250 1500 1750 2000Stage

2

3

4

5

6

7

8

Exp

ecte

d C

ost (

in w

atts

)

×10-7

eta_0 = 2.5e+07eta_0 = 5.0e+07eta_0 = 1.0e+08

Fig. 5. Impact of η on convergence behavior (T = 2500, K = 24).

optimality. For each SBS m ∈ M, its local search spacefor SCP, L(m) ⊂ L, is limited to a convex 3D space aboveits associated user cluster N (m)

t on the ground, and is lowerbounded by the minimum altitude of 10 meters [32]. We setthe control factor η = η0

√2 ln JTJ in Algorithm 1 [43], where

η0 is a scale factor for Rt in (14). In Algorithm 2, the searchspace for TPC, P , is a convex space that is upper boundedby the maximum transmit power of 23 dBm. We set otherparameters in Algorithm 2 as follows: the threshold of SINRfor each user n, γ(n) = 15 dB; the number of channels foreach user n, K(n) = 1; the path loss exponent α = 3; theaverage noise power on each channel k, Z(k)

0 = −104 dBm;the price factor φ

(m)0 = φ

(m)c = 1. Now we evaluate our

approach on four aspects.

A. Convergence Behavior

Our approach involves two tiers of decision-making entities,so Algorithms 1 and 2 need to coordinate efficiently andconverge eventually to a final joint strategy. To clearly showconvergence behavior, we can keep track of the objectivevalue achieved by our approach. In each stage t, a leadingaction At = Aj is chosen from a probability distributionπt over AJ , and a feedback cost Rt = Ut is receivedthereafter. Hence, we can compute the expected cost value,say Ut =

∑j U

∗T (A

j)πt(Aj), where each U∗

T (Aj) records the

Page 11: Spectrum Sharing among Rapidly Deployable Small Cells: A

11

0 500 1000 1500 2000 2500 3000Stage

0

0.5

1

1.5

2E

xpec

ted

Cos

t (in

wat

ts)

×10-6

Pattern #1Pattern #2Pattern #3Pattern #4

Fig. 6. Convergence behavior of our approach under user mobility (T =3000, K = 28, η0 = 1× 108).

minimum cost for a possible action Aj ∈ AJ by stage T .Given a sufficiently large value of T , the typical changingprocess of Ut is exemplified in Fig. 4. We set T = 2500,but our approach runs fast in each stage thanks to its lowcomplexity. We can see that as user knowledge is accumulatedafter an initial evaluation of all possible actions, the refinementof πt gradually stabilizes Ut given a value of K. Despiteminor probabilistic fluctuations, our approach can steadilyconverge to a certain level of objective value. The onlinecapability of our approach allows it to be terminated anytime.Furthermore, we adjust the value of η or η0 to analyze itsimpact on convergence progress, which is shown in Fig. 5.We can see that a larger η gives a faster convergence process,while a smaller η gives a slower convergence process. In thefollowing, we set η0 = 1 × 108. Overall, it is suggested thatthe convergence behavior of our approach is satisfactory.

Even though common wireless devices in an outdoorhotspot, e.g., event spectators’ mobile devices or regular sensornodes, do not change their locations significantly while beingserved, we still evaluate the impact of low-level user mobilityon the convergence of our approach. A random waypointmodel is used to generate user mobility patterns. Each useroccasionally moves towards a random destination with arandom walking-level speed from 0 to 3 meters/stage. Thepause time of a user is randomly chosen from 300 to 500stages. Like above, the convergence process in terms of Ut

is exemplified in Fig. 6. We can see that while the actionspace for UCA keeps temporarily unchanged, our approachconverges as usual despite small user movements in nearlyevery stage. Once the action space has to change, our approachneeds to redo its strategy refinement. Here the best actions inthe past are recorded, so that they can be assigned with highselection probabilities (if still in the action space) to acceleratethe convergence process. Therefore, our approach can supporta certain level of user mobility.

B. Strategy Correctness

Our approach is driven by the MBS’s sequential decisionmaking under user uncertainty. To verify the correctness ofprobabilistic action taking at the MBS, we can find out thecorrelation between each action’s selection probability and

0 32 64 96 128 160 192 224 256Action

00.5

11.5

22.5

3

Min

imum

Cos

t (in

wat

ts)

×10-6

00.20.40.60.81

Sel

ectio

n P

roba

bilit

y

0 32 64 96 128 160 192 224 256Action

0

0.5

1

1.5

2×10-6

00.20.40.60.81

Fig. 7. Strategy correctness of our approach (t = 800): (a) K = 22 (top);(b) K = 28 (bottom).

0 32 64 96 128 160 192 224 256Action

00.5

11.5

22.5

3

Min

imum

Cos

t (in

wat

ts)

×10-6

0

0.2

0.4

0.6

Sel

ectio

n P

roba

bilit

y

0 32 64 96 128 160 192 224 256Action

00.5

11.5

22.5

3×10-6

00.20.40.60.81

Fig. 8. Impact of t on strategy correctness (K = 24): (a) t = 400 (top);(b) t = 800 (bottom).

its feedback cost. For each possible action Aj ∈ AJ , wecan obtain its selection probability πt(A

j) and its currentminimum cost U∗

t (Aj) in a certain stage t. The distribution

of πt and that of U∗t can be illustrated together as in Fig. 7.

We can see that the high-probability actions match exactlywith the low-cost ones given a value of K, and the selectionprobability peaks at the least costly action if t is large enough.The best action stands out more easily for a smaller K inFig. 7a, since there are more alternative options available fora larger K in Fig. 7b. Note that when K is fairly small, notall the possible actions ensure a feasible solution to our jointoptimization problem due to overcrowding in shared spectrum.If an infeasible action is taken, our approach returns a hugecost that exceeds the normal range, as in Fig. 7a, so that thisaction will no longer be considered in the following stages.Furthermore, the refinement of πt with t is explained in Fig. 8.We can see that a few “good” actions in Fig. 8a are eventuallynarrowed down to the “best” one in Fig. 8b. This indeed helpsour approach converge to a final joint strategy. Therefore,the strategy correctness of our approach can be guaranteed,especially after a sufficient number of stages.

C. Power Consumption

Our approach aims to minimize the weighted sum of allusers’ power consumption (transmit power levels). To evaluate

Page 12: Spectrum Sharing among Rapidly Deployable Small Cells: A

12

1 1.5 2 2.5 3 3.5Cost Ratio

00.20.40.60.8

1E

CD

F

CentralizedHybrid

1 1.5 2 2.5Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

1 1.25 1.5 1.75 2Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

1 1.25 1.5 1.75 2Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

Fig. 9. Power consumption of our approach (t0 = 1000, τ = 1500): (a)K = 22 (top-left); (b) K = 24 (top-right); (c) K = 26 (bottom-left); (d)K = 28 (bottom-right).

1 1.5 2 2.5 3 3.5Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

1 1.5 2 2.5 3 3.5Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

1 1.5 2 2.5 3Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

1 1.5 2 2.5 3Cost Ratio

00.20.40.60.8

1

EC

DF

CentralizedHybrid

Fig. 10. Impact of t0 on ECDF of power consumption (K = 24, τ = 300):(a) t0 = 300 (top-left); (b) t0 = 600 (top-right); (c) t0 = 900 (bottom-left);(d) t0 = 1200 (bottom-right).

the gain in transmit power saving, we compare our hybridmulti-agent approach with a fully centralized counterpart. Thisbenchmark approach operates with perfect global knowledge,including hidden user demands, and centrally manages allthe issues of SCP, UCA, CRA, TPC. Hence, it derives theoptimal solution to our joint optimization problem iteratively,instead of operating in a multi-stage manner. Due to theintractability of the original problem, this centralized approachstill follows our logic of problem decoupling. It addressesthe two subproblems through a clustering-based revision ofAlgorithm 1 [16, 34] and a cooperative-game-based revisionof Algorithm 2, respectively. After a number of randomruns, we can work out the empirical cumulative distributionfunction (ECDF) of the ratio of the hybrid’s objective val-ues Ut for t = t0, . . . , t0 + τ to the centralized’s optimalobjective value U∗, as shown in Fig. 9. We can see thatour hybrid approach achieves nearly as good performanceas the centralized counterpart most of the time, even thoughour approach makes decisions probabilistically. Moreover, ourapproach allows online decision making without a priori globalknowledge and supports computational workload offloading.Furthermore, the refinement of πt for t = t0, . . . , t0 + τ hasits impact on the ECDF of Ut, which is shown in Fig. 10. We

TABLE IISPECTRAL EFFICIENCY OF OUR APPROACH.

N = 20 N = 40 N = 60 N = 80M = 5 9.8 19.4 28.6 37.3M = 7 9.3 18.3 27.0 35.1

can see that as our hybrid approach evolves with richer userknowledge and wiser action taking, its performance gap withthe centralized counterpart becomes narrower. Therefore, ourapproach can operate efficiently and effectively with a modestloss of optimality in power consumption.

D. Spectral Efficiency

Our approach minimizes the users’ levels of interferencepower as well as their levels of transmit power, so it is expectedto bring a further advantage in spectrum sharing in the uplink.To evaluate the gain in mutual interference mitigation whileenabling spectrum reuse among co-located small cells, we canexamine the feasibility of accommodating all the users underlimited spectrum availability. If K is too small, as mentionedabove, it is likely that none of the possible actions achieves afeasible solution to our joint optimization problem. Hence, wecan find out the minimum K, say K∗, that ensures at least onefeasible solution. After multiple runs for a combination of Mand N , the average value of K∗ is computed and is presentedin Table II. Here we assume that each user takes one channelat a time. We can see that our approach supports the sharingof one channel among more than two users on average, i.e.,NK∗ > 2, so such spectral efficiency is as good as that in [39].Generally, a smaller K∗ can be achieved for a certain N ifgiven a larger M thanks to greater spectrum reuse. In fact, themobility of small cells can bring extra benefits to spectrumsharing, such as keeping inter-cell interference distances longenough and making intra-cell transmission distances as shortas possible. The deployment of stationary small cells, however,can only be viewed as a feasible solution and cannot befurther optimized. Therefore, the spectral efficiency of ourapproach can be favorable while jointly optimizing small celldeployment and uplink resource allocation.

E. Implementation Considerations

For practical applications, our approach should be im-plemented in a plug-and-play fashion. As user devices aretemporarily gathered outdoors, the MBS’s global decisionshave to rely on minimum priori user knowledge. Serving asa prerequisite for on-demand deployment of small cells, userdemands need to be learnt first and are generalized here forregular uplink transmissions. If data usage patterns of userdevices can be obtained in detail, small cell services can befurther customized, such as collecting different types of datain different ways. In addition, user locations need to be knownto enable on-demand, location-based services. As each smallcell moves to cover its target spot, the SBS’s local decisions donot have to require timely inter-cell coordination. To supportsoft frequency reuse in the uplink, user weights can be de-fined based on transmission/interference distances (instead of

Page 13: Spectrum Sharing among Rapidly Deployable Small Cells: A

13

propagation gains), and channel quality can be evaluated onlybased on local interference measurements. Once such systemknowledge has been gradually accumulated, our approach canadapt its global and local strategies accordingly.

Even if given perfect global knowledge, a hybrid approachshould still be preferred to a completely centralized approach,in consideration of the need for online decision making. Mostoutdoor hotspots only last for several hours, so the optimal butcomputationally infeasible solution is not useful. Instead, ourapproach adopts some heuristics. The complexity of Algorithm1 is mainly determined by that of centralized optimization forSCP (Lemma 1), which can be approximated as alternatingminimization of intra-cell transmission distances. This resultsin multiple tractable iterations. Given user clusters for UCA,this approximation can be achieved by initially placing eachSBS above, e.g., the centroid of its associated user cluster. Thecomplexity of Algorithm 2 is mainly contributed by that ofsorting operations for CRA and that of distributed optimizationfor TPC (Lemma 2). These do not involve sophisticatedcomputations. If there are too many users making the systemoverly complex, the most demanding ones can be selected toenjoy small cell services while the other ones still receivemacro-cell services. As a result, the original problem can beheuristically solved in each stage. The duration of a stageshould be short to help capture user dynamics and take promptactions, while it should not be too short to give sufficient set-up time. Although small cells can hover or remain still to offerreliable outdoor coverage, they may change their hoveringpoints during convergence process. Long-distance movementof a SBS can be avoided by restricting its candidate userclusters for UCA within a certain vicinity. Ideally, each stagecan take two or three seconds, which allow small cells to berapidly deployable in a few minutes and enable a typical UAVto move at least ten meters. In summary, our approach can beimplemented in practical situations.

VIII. CONCLUSION

In this paper, we focus on spectrum sharing among rapidlydeployable small cells in the uplink, which is emphasized foruploading-intensive outdoor hotspots. This requires to dealwith a user-centric, online joint optimization of small celldeployment and uplink resource allocation, and requires alow-complexity solution. We have proposed a hybrid multi-agent approach, which operates with two tiers of sequentialdecision making under user uncertainty. The leading MBS runsAlgorithm 1 to derive a mixed strategy for SCP and UCA,based on which the following SBSs run Algorithm 2 inde-pendently to construct an equilibrium solution for CRA andTPC. We have proved that the convergence of our approachto a joint strategy is guaranteed for each stage and for a finitetime horizon. Our approach is further validated by simulationson the aspects of convergence behavior, strategy correctness,power consumption, and spectral efficiency. We have shownthat our hybrid approach achieves nearly as good performanceas its centralized counterpart, but our approach is advantageousin that it allows online decision making without a priori globalknowledge and supports computational workload offloading.

ACKNOWLEDGMENTS

This work was partially sponsored by the FundamentalResearch Funds for the Central Universities (Grant No: 2017R-C022), the National Natural Science Foundation of China (NS-FC) (Grant No: 61872028, 61502457, 61732017), the BeijingIntelligent Logistics System Collaborative Innovation Cen-ter (Grant No: BILSCIC-2018KF-10), the National ScienceFoundation (NSF) (Grant No: 1547241, 1547366, 1563832,1642928, 1822173, 1824494), and the industry affiliates of theBroadband Wireless Access & Applications Center (BWAC).

REFERENCES

[1] N. Bhushan, J. Li, D. Malladi, R. Gilmore, D. Bren-ner, A. Damnjanovic, R. Sukhavasi, C. Patel, andS. Geirhofer. Network densification: The dominant themefor wireless evolution into 5g. IEEE CommunicationsMagazine, 52(2):82–89, Feb. 2014.

[2] A. G. Gotsis, S. Stefanatos, and A. Alexiou. Ultradensenetworks: The new wireless frontier for enabling 5gaccess. IEEE Vehicular Technology Magazine, 11(2):71–78, Jun. 2016.

[3] Nokia. Mass event optimization: Hotspot lte capacitywith evolution to 5g. Nokia White Paper, Product Code:C401-012004-WP-201606-1-EN, Jun. 2016.

[4] Ericsson. 5g systems: Enabling the transformation ofindustry and society. Ericsson White Paper, UEN 28423-3251 rev B, Jan. 2017.

[5] Y. Zeng, R. Zhang, and T. J. Lim. Wireless communica-tions with unmanned aerial vehicles: Opportunities andchallenges. IEEE Communications Magazine, 54(5):36–42, May 2016.

[6] S. Hayat, E. Yanmaz, and R. Muzaffar. Survey onunmanned aerial vehicle networks for civil applications:A communications viewpoint. IEEE Communication-s Surveys & Tutorials, 18(4):2624–2661, Fourthquarter2016.

[7] R. I. Bor-Yaliniz and H. Yanikomeroglu. The newfrontier in ran heterogeneity: Multi-tier drone-cells. IEEECommunications Magazine, 54(11):48–55, Nov. 2016.

[8] A. Otto, N. Agatz, J. Campbell, B. Golden, and E. Pesch.Optimization approaches for civil applications of un-manned aerial vehicles (uavs) or aerial drones: A survey.Wiley Networks, pages 1–48, Mar. 2018.

[9] S. Chandrasekharan, K. Gomez, A. Al-Hourani, S. Kan-deepan, T. Rasheed, L. Goratti, L. Reynaud, D. Grace,I. Bucaille, T. Wirth, and S. Allsopp. Designing and im-plementing future aerial communication networks. IEEECommunications Magazine, 54(5):26–34, May 2016.

[10] A. Al-Hourani, S. Kandeepan, and S. Lardner. Optimallap altitude for maximum coverage. IEEE WirelessCommunications Letters, 3(6):569–572, Dec. 2014.

[11] X. Zhou, J. Guo, S. Durrani, and H. Yanikomeroglu.Uplink coverage performance of an underlay drone cellfor temporary events. In Proc. IEEE ICC Workshops,May 2018.

[12] X. Zhou, S. Durrani, J. Guo, and H. Yanikomeroglu.Underlay drone cell for temporary events: Impact of

Page 14: Spectrum Sharing among Rapidly Deployable Small Cells: A

14

drone height and aerial channel environments. IEEEInternet of Things Journal, 6(2):1704–1718, Apr. 2019.

[13] R. I. Bor-Yaliniz, A. El-Keyi, and H. Yanikomeroglu.Efficient 3-d placement of an aerial base station in nextgeneration cellular networks. In Proc. IEEE ICC, May2016.

[14] M. Alzenad, A. El-Keyi, F. Lagum, andH. Yanikomeroglu. 3-d placement of an unmannedaerial vehicle base station (uav-bs) for energy-efficientmaximal coverage. IEEE Wireless CommunicationsLetters, 6(4):434–437, Aug. 2017.

[15] M. Alzenad, A. El-Keyi, and H. Yanikomeroglu. 3-dplacement of an unmanned aerial vehicle base station formaximum coverage of users with different qos require-ments. IEEE Wireless Communications Letters, 7(1):38–41, Feb. 2018.

[16] B. Galkin, J. Kibilda, and L. A. DaSilva. Deployment ofuav-mounted access points according to spatial user lo-cations in two-tier cellular networks. In Proc. IFIP/IEEEWireless Days, Mar. 2016.

[17] J. Lyu, Y. Zeng, R. Zhang, and T. J. Lim. Placementoptimization of uav-mounted mobile base stations. IEEECommunications Letters, 21(3):604–607, Mar. 2017.

[18] S. Sharafeddine and R. Islambouli. On-demand deploy-ment of multiple aerial base stations for traffic offloadingand network recovery. Elsevier Computer Networks,156:52–61, Jun. 2019.

[19] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah.Drone small cells in the clouds: Design, deployment andperformance analysis. In Proc. IEEE GLOBECOM, Dec.2015.

[20] E. Kalantari, H. Yanikomeroglu, and A. Yongacoglu. Onthe number and 3d placement of drone base stations inwireless cellular networks. In Proc. IEEE VTC-Fall, Sept.2016.

[21] C. Zhang and W. Zhang. Spectrum sharing for dronenetworks. IEEE Journal on Selected Areas in Communi-cations, 35(1):136–144, Jan. 2017.

[22] A. Kumbhar, I. Guvenc, S. Singh, and A. Tuncer. Ex-ploiting lte-advanced hetnets and feicic for uav-assistedpublic safety communications. IEEE Access, 6:783–796,Dec. 2017.

[23] Z. Hu, Z. Zheng, L. Song, T. Wang, and X. Li. Uavoffloading: Spectrum trading contract design for uav-assisted cellular networks. IEEE Transactions on Wire-less Communications, 17(9):6093–6107, Sept. 2018.

[24] Y. Zeng and R. Zhang. Energy-efficient uav communica-tion with trajectory optimization. IEEE Transactions onWireless Communications, 16(6):3747–3760, Jun. 2017.

[25] J. Lyu, Y. Zeng, and R. Zhang. Uav-aided offloadingfor cellular hotspot. IEEE Transactions on WirelessCommunications, 17(6):3988–4001, Jun. 2018.

[26] H. He, S. Zhang, Y. Zeng, and R. Zhang. Joint alti-tude and beamwidth optimization for uav-enabled mul-tiuser communications. IEEE Communications Letters,22(2):344–347, Feb. 2018.

[27] S. Jeong, O. Simeone, and J. Kang. Mobile edgecomputing via a uav-mounted cloudlet: Optimization of

bit allocation and path planning. IEEE Transactions onVehicular Technology, 67(3):2049–2063, Mar. 2018.

[28] D. Ebrahimi, S. Sharafeddine, P. Ho, and C. Assi. Uav-aided projection-based compressive data gathering inwireless sensor networks. IEEE Internet of ThingsJournal, 6(2):1893–1905, Apr. 2019.

[29] M. Samir, S. Sharafeddine, C. Assi, T. M. Nguyen, andA. Ghrayeb. Trajectory planning and resource allocationof multiple uavs for data delivery in vehicular networks.IEEE Networking Letters, May 2019.

[30] S. Chou, Y. Yu, and A. Pang. Mobile small celldeployment for service time maximization over next-generation cellular networks. IEEE Transactions onVehicular Technology, 66(6):5398–5408, Jun. 2017.

[31] S. Chou, Y. Yu, A. Pang, and T. Lin. Energy-aware 3daerial small-cell deployment over next generation cellularnetworks. In Proc. IEEE VTC-Spring, Jun. 2018.

[32] A. Fotouhi, M. Ding, and M. Hassan. Dronecells:Improving 5g spectral efficiency using drone-mountedflying base stations. arXiv preprint arXiv:1707.02041,2017.

[33] Q. Wu, Y. Zeng, and R. Zhang. Joint trajectory andcommunication design for multi-uav enabled wirelessnetworks. IEEE Transactions on Wireless Communica-tions, 17(3):2109–2121, Mar. 2018.

[34] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah.Mobile internet of things: Can uavs provide an energy-efficient mobile architecture? In Proc. IEEE GLOBE-COM, Dec. 2016.

[35] P. Yang, X. Cao, C. Yin, Z. Xiao, X. Xi, andD. Wu. Proactive drone-cell deployment: Overloadrelief for a cellular network under flash crowd traffic.IEEE Transactions on Intelligent Transportation Systems,18(10):2877–2892, Oct. 2017.

[36] Q. Zhang, M. Mozaffari, W. Saad, M. Bennis, andM. Debbah. Machine learning for predictive on-demanddeployment of uavs for wireless communications. InProc. IEEE GLOBECOM, Dec. 2018.

[37] M. Chen, M. Mozaffari, W. Saad, C. Yin, M. Debbah, andC. S. Hong. Caching in the sky: Proactive deploymentof cache-enabled unmanned aerial vehicles for optimizedquality-of-experience. IEEE Journal on Selected Areasin Communications, 35(5):1046–1061, May 2017.

[38] A. Morgado, K. M. S. Huq, S. Mumtaz, and J. Rodriguez.A survey of 5g technologies: Regulatory, standardizationand industrial perspectives. Elsevier Digital Communi-cations and Networks, 4(2):87–97, Apr. 2018.

[39] B. Gao, J. Park, and Y. Yang. Uplink soft frequencyreuse for self-coexistence of cognitive radio networks.IEEE Transactions on Mobile Computing, 13(6):1366–1378, Jun. 2014.

[40] B. Gao, S. Bhattarai, J. Park, Y. Yang, M. Liu, K. Zeng,and Y. Dou. Incentivizing spectrum sensing in database-driven dynamic spectrum sharing. In Proc. IEEE INFO-COM’16, Apr. 2016.

[41] S. Maghsudi and E. Hossain. Multi-armed bandits withapplication to 5g small cells. IEEE Wireless Communi-cations, 23(3):64–73, Jun. 2016.

Page 15: Spectrum Sharing among Rapidly Deployable Small Cells: A

15

[42] P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire.The nonstochastic multiarmed bandit problem. SIAMJournal on Computing, 32(1):48–77, 2002.

[43] S. Bubeck and N. Cesa-Bianchi. Regret analysis of s-tochastic and nonstochastic multi-armed bandit problems.Foundations and Trends in Machine Learning, 5(1):1–22,Dec. 2012.

[44] E. Maskin and J. Tirole. Markov perfect equilibrium:I. observable actions. Journal of Economic Theory,100(2):191–219, Oct. 2001.

[45] B. Gao, Y. Yang, and J. Park. A credit-token-basedspectrum etiquette framework for coexistence of het-erogeneous cognitive radio networks. In Proc. IEEEINFOCOM’14, Apr. 2014.

Bo Gao received his Ph.D. degree in computerengineering from Virginia Tech, Blacksburg, USA in2014. He was an Assistant Professor in the Instituteof Computing Technology at Chinese Academy ofSciences, Beijing, China from 2014 to 2017. He wasa Visiting Researcher in the School of Computingand Communications at Lancaster University, Lan-caster, UK from 2018 to 2019. He is currently anAssociate Professor in the School of Computer andInformation Technology at Beijing Jiaotong Univer-sity, Beijing, China. He has directed a number of

research projects sponsored by the National Natural Science Foundation ofChina (NSFC) or other funding agencies. He is a member of IEEE and ACM.His research interests include wireless networking, dynamic spectrum sharing,mobile edge computing, and multi-agent systems.

Lingyun Lu is currently an Associate Professorin the School of Software Engineering at BeijingJiaotong University, Beijing, China. She receivedher Ph.D. degree in computer science and was anAssociate Professor in the School of Computer andInformation Technology at Beijing Jiaotong Univer-sity, Beijing, China. She has led or participated ina number of research projects funded through gov-ernment or industry sponsors, including the NationalNatural Science Foundation of China (NSFC). Hercurrent research interests include cross-layer net-

work optimization, heterogeneous networks, and multi-user signal processing.

Ke Xiong received his B.S. and Ph.D. degrees incomputer science from Beijing Jiaotong University,Beijing, China in 2004 and 2010, respectively. Hewas a Postdoctoral Research Fellow at TsinghuaUniversity, Beijing, China from 2010 to 2013, and aVisiting Scholar at University of Maryland, CollegePark, USA from 2015 to 2016. He is currently a Pro-fessor in the School of Computer and InformationTechnology at Beijing Jiaotong University, Beijing,China. He has published more than 120 academicpapers in referred journals and conferences. He has

served on the editorial boards of a number of international journals. He isa member of IEEE and China Computer Federation (CCF), and a seniormember of Chinese Institute of Electronics (CIE). His current researchinterests include wireless cooperative networks, wireless powered networks,and network information theory.

Jung-Min “Jerry” Park received his Ph.D. degreein electrical and computer engineering from PurdueUniversity in 2003. He is currently a Professor in theDepartment of Electrical and Computer Engineeringat Virginia Tech and the Site Director of an NSFIndustry-University Cooperative Research Center (I-UCRC) called Broadband Wireless Access & Appli-cations Center (BWAC). Park served as an ExecutiveCommittee Member of the U.S. National SpectrumConsortium (NSC) from 2016 to 2018. NSC is alarge consortium of wireless industry stakeholders

and universities collaborating with multiple U.S. federal government agenciesthrough a $1.25 billion agreement to support the development of advancedspectrum access technologies. Park’s research interests include dynamicspectrum sharing, emerging wireless technologies, including IoT and V2X,wireless security and privacy, and applied cryptography. Current or recentresearch sponsors include the National Science Foundation (NSF), NationalInstitutes of Health (NIH), Defense Advanced Research Projects Agency(DARPA), Army Research Office (ARO), Office of Naval Research (ONR),and several industry sponsors. Park is a recipient of a 2017 Virginia TechCollege of Engineering Dean’s Award for Research Excellence, a 2015 CiscoFaculty Research Award, a 2014 Virginia Tech College of Engineering FacultyFellow Award, a 2008 NSF Faculty Early Career Development (CAREER)Award, a 2008 Hoeber Excellence in Research Award, and a 1998 AT&TLeadership Award. He is currently serving on the editorial boards of a numberof IEEE journals, and is actively involved in the organization of a numberof flagship conferences. Park is currently serving as the Steering CommitteeChair of the IEEE International Symposium on Dynamic Spectrum AccessNetworks (DySPAN). He is an IEEE Fellow for his contributions to dynamicspectrum sharing, cognitive radio networks, and security issues.

Yaling Yang is currently a Professor in the BradleyDepartment of Electrical and Computer Engineer-ing at Virginia Tech. She received her doctoratein computer science in the summer of 2006 fromthe University of Illinois at Urbana-Champaign.She has concentrated her research on the design,modeling and analysis of networking systems andsecurity systems. She has been named the facultyfellow of Virginia Tech’s College of Engineeringin 2016 and is a recipient of NSF Faculty EarlyCareer Award. She has been the principle investi-

gator of nine NSF-funded projects. Her research website can be found athttp://www.faculty.ece.vt.edu/yyang8/.

Yuwei Wang is currently a Senior Engineer (equiva-lent to Associate Professor) in the Institute of Com-puting Technology at Chinese Academy of Sciences,Beijing, China. He received his Ph.D. degree in com-puter science from University of Chinese Academyof Sciences, Beijing, China and his M.S. degree inelectrical engineering from Beijing Institute of Tech-nology, Beijing, China. His current research interestsinclude next-generation network architecture, mobileedge computing, and cloud computing.