Trading Utility for Privacy in Shared Spectrum Access Systems

In an effort to meet growing demands on the radio frequency spectrum, regulators are exploring methods to enable band sharing among a diverse set of user devices. Proposed spectrum access systems would dynamically assign spectrum resources to users, maintaining databases of spectrum use information....

Full description

Saved in:
Bibliographic Details
Published inIEEE/ACM transactions on networking Vol. 26; no. 1; pp. 259 - 273
Main Authors Clark, Matthew A., Psounis, Konstantinos
Format Journal Article
LanguageEnglish
Published New York IEEE 01.02.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In an effort to meet growing demands on the radio frequency spectrum, regulators are exploring methods to enable band sharing among a diverse set of user devices. Proposed spectrum access systems would dynamically assign spectrum resources to users, maintaining databases of spectrum use information. While these systems are anticipated to increase the efficiency of spectrum sharing, incumbent users have raised concerns about exposing details of their operations and have questioned whether their privacy can be protected. In this paper, we explore whether primary users can retain a critical level of privacy in a spectrum access system setting, where they must reveal some information to enable dynamic access to the spectrum by other users. Under a variety of operational scenarios and user models, we examine adversary techniques to exploit the spectrum access system and obfuscation strategies to protect user privacy. We develop analytical methods to quantify the resulting privacy and validate our results through simulation. To the best of our knowledge, this is the first paper that considers inference attacks on primary users in the setting of a highly dynamic spectrum access system. Privacy analysis of this kind will help to enable the adoption of shared spectrum access systems by allowing incumbent users to quantify and mitigate risks to their privacy.
ISSN:1063-6692
1558-2566
DOI:10.1109/TNET.2017.2778260