Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies

Sharing of radio spectrum between different types of wireless systems (e.g., different service providers) is the foundation for making more efficient usage of spectrum. Cognitive radio technologies have spurred the design of spectrum servers that coordinate the sharing of spectrum between different...

Full description

Bibliographic Details
Main Authors: Andrey Garnaev, Wade Trappe
Format: Article
Language:English
Published: MDPI AG 2017-07-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/19/7/363
_version_ 1828116055698964480
author Andrey Garnaev
Wade Trappe
author_facet Andrey Garnaev
Wade Trappe
author_sort Andrey Garnaev
collection DOAJ
description Sharing of radio spectrum between different types of wireless systems (e.g., different service providers) is the foundation for making more efficient usage of spectrum. Cognitive radio technologies have spurred the design of spectrum servers that coordinate the sharing of spectrum between different wireless systems. These servers receive information regarding the needs of each system, and then provide instructions back to each system regarding the spectrum bands they may use. This sharing of information is complicated by the fact that these systems are often in competition with each other: each system desires to use as much of the spectrum as possible to support its users, and each system could learn and harm the bands of the other system. Three problems arise in such a spectrum-sharing problem: (1) how to maintain reliable performance for each system-shared resource (licensed spectrum); (2) whether to believe the resource requests announced by each agent; and (3) if they do not believe, how much effort should be devoted to inspecting spectrum so as to prevent possible malicious activity. Since this problem can arise for a variety of wireless systems, we present an abstract formulation in which the agents or spectrum server introduces obfuscation in the resource assignment to maintain reliability. We derive a closed form expression for the expected damage that can arise from possible malicious activity, and using this formula we find a tradeoff between the amount of extra decoys that must be used in order to support higher communication fidelity against potential interference, and the cost of maintaining this reliability. Then, we examine a scenario where a smart adversary may also use obfuscation itself, and formulate the scenario as a signaling game, which can be solved by applying a classical iterative forward-induction algorithm. For an important particular case, the game is solved in a closed form, which gives conditions for deciding whether an agent can be trusted, or whether its request should be inspected and how intensely it should be inspected.
first_indexed 2024-04-11T12:51:01Z
format Article
id doaj.art-bc48d770642a4210a8b97310e77eb3f3
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T12:51:01Z
publishDate 2017-07-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-bc48d770642a4210a8b97310e77eb3f32022-12-22T04:23:13ZengMDPI AGEntropy1099-43002017-07-0119736310.3390/e19070363e19070363Competitive Sharing of Spectrum: Reservation Obfuscation and Verification StrategiesAndrey Garnaev0Wade Trappe1Wireless Information Network Laboratory (WINLAB), Rutgers University, North Brunswick, NJ 08901, USAWireless Information Network Laboratory (WINLAB), Rutgers University, North Brunswick, NJ 08901, USASharing of radio spectrum between different types of wireless systems (e.g., different service providers) is the foundation for making more efficient usage of spectrum. Cognitive radio technologies have spurred the design of spectrum servers that coordinate the sharing of spectrum between different wireless systems. These servers receive information regarding the needs of each system, and then provide instructions back to each system regarding the spectrum bands they may use. This sharing of information is complicated by the fact that these systems are often in competition with each other: each system desires to use as much of the spectrum as possible to support its users, and each system could learn and harm the bands of the other system. Three problems arise in such a spectrum-sharing problem: (1) how to maintain reliable performance for each system-shared resource (licensed spectrum); (2) whether to believe the resource requests announced by each agent; and (3) if they do not believe, how much effort should be devoted to inspecting spectrum so as to prevent possible malicious activity. Since this problem can arise for a variety of wireless systems, we present an abstract formulation in which the agents or spectrum server introduces obfuscation in the resource assignment to maintain reliability. We derive a closed form expression for the expected damage that can arise from possible malicious activity, and using this formula we find a tradeoff between the amount of extra decoys that must be used in order to support higher communication fidelity against potential interference, and the cost of maintaining this reliability. Then, we examine a scenario where a smart adversary may also use obfuscation itself, and formulate the scenario as a signaling game, which can be solved by applying a classical iterative forward-induction algorithm. For an important particular case, the game is solved in a closed form, which gives conditions for deciding whether an agent can be trusted, or whether its request should be inspected and how intensely it should be inspected.https://www.mdpi.com/1099-4300/19/7/363spectrum sharingsignaling gamesbayesian games
spellingShingle Andrey Garnaev
Wade Trappe
Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
Entropy
spectrum sharing
signaling games
bayesian games
title Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
title_full Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
title_fullStr Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
title_full_unstemmed Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
title_short Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
title_sort competitive sharing of spectrum reservation obfuscation and verification strategies
topic spectrum sharing
signaling games
bayesian games
url https://www.mdpi.com/1099-4300/19/7/363
work_keys_str_mv AT andreygarnaev competitivesharingofspectrumreservationobfuscationandverificationstrategies
AT wadetrappe competitivesharingofspectrumreservationobfuscationandverificationstrategies