With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum resources.Spectrum auctions came into being,which can effectively utilize spectrum resources....With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum resources.Spectrum auctions came into being,which can effectively utilize spectrum resources.Because of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be guaranteed.Most scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers.Researchers begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction rules.But these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this paper.Unlike traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions.In addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions.Finally,security analysis and performance evaluation of our protocol are discussed.展开更多
It is not more and more, easy to satisfy the important and growing spectrum demands in the context of the static conventional policy spectrum allocation. Therefore, to find a suitable solution to this problem, we are ...It is not more and more, easy to satisfy the important and growing spectrum demands in the context of the static conventional policy spectrum allocation. Therefore, to find a suitable solution to this problem, we are to days observing the apparition of flexible dynamic spectrum allocation methods. These methods that ought to improve more significantly the spectrum use have gained much interest. In fact, the digital dividend due to the change-over from the analog television to the digital terrestrial television must be efficiently used. So the Dynamic Spectrum Access (DSA) can potentially play a key role in shaping the future digital dividend use. In the DSA, two kinds of users or networks coexist on different channels. The first one, known as the primary user, accesses to a channel with high priority;and the second one, known as secondary user has a low priority. This paper presents a dynamic spectrum access protocol based on an auction framework. Our protocol is an interesting tool that allows the networks to bid and obtain on the available spectrum, the rights to be primary and secondary users according their valuations and traffic needs. Based on certain offers, our protocol selects primary and secondary users for each idle channel in order to realize the maximum economic for the regulator or social benefits. We deal with the case in which the offers of the networks are independent one another even if they will share the same channels. We design an algorithm in accordance with our dynamic spectrum access protocol. The algorithm is used here to find an optimal solution to the access allocation problem, specifically to digital dividend. Finally, the results in the numeric section, regarding the three suggested scenarios, show that the proposed dynamic spectrum access protocol is viable. The algorithm is able to eliminate all non-compliant bidders for the available spectrum sharing. We notice that the revenue or social benefits of the regulator is maximized when we have on each channel, one primary user and the maximum number of secondary users.展开更多
Cognitive radio(CR) technology is considered to be an effective solution to allocate spectrum resources,whereas the primary users of a network do not fully utilize available frequency bands.Spectrum auction framewor...Cognitive radio(CR) technology is considered to be an effective solution to allocate spectrum resources,whereas the primary users of a network do not fully utilize available frequency bands.Spectrum auction framework has been recognized as an effective way to achieve dynamic spectrum access.From the perspective of spectrum auction,multi-band multi-user auction provides a new challenge for spectrum management.This paper proposes an auction framework based on location information for multi-band multi-user spectrum allocation.The performance of the proposed framework is compared with that of traditional auction framework based on a binary interference model as a benchmark.Simulation results show that primary users will obtain more total system revenue by selling their idle frequency bands to secondary users and the spectrum utilization of the proposed framework is more effective and fairer.展开更多
With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spe...With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be ignored.Most existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum auction.However,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so on.In this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the auction.In order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of bidders.Public verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum values.Finally,the security analysis is given to propose several types of attacks that can be defended.Besides,theoretical analysis and simulation experiments of our protocol are also provided.展开更多
Spectrum auction is one of the most effective ways to achieve dynamic spectrum allocation in cognitive radio net-works,and it provides one effective way to manage the spectrum demands of IoT devices with limited resou...Spectrum auction is one of the most effective ways to achieve dynamic spectrum allocation in cognitive radio net-works,and it provides one effective way to manage the spectrum demands of IoT devices with limited resources.Most spectrum auctions focus on protecting bidder privacy and achieving excellent social efficiency,but few tackles the verification of auction results that are controlled by the auctioneer.In this paper,we propose a cloud-based framework for verifiable privacy-preserving spectrum auctions.Our framework adopts a modified AFGH re-encryption algorithm that achieves both bid privacy protection and auction results verification at the same time.The cloud server helps to compute auction results based on homomorphic encryption,and an auctioneer decrypts the encrypted data from the server to obtain auction results.Meanwhile,the property of re-encryption makes it possible for any bidder to verify the auction results without compromising other bidders’privacy.展开更多
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government.(MSIT)(2021R1A2B5B02087169)the National Natural Science Foundation of China(Nos.62072092,62072093+4 种基金U1708262)the China Postdoctoral Science Foundation(No.2019M653568)the Key Research and Development Project of Hebei Province(No.20310702D)the Natural Science Foundation of Hebei Province(No.F2020501013)the Fundamental Research Funds for the Central Universities(No.N2023020)。
文摘With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum resources.Spectrum auctions came into being,which can effectively utilize spectrum resources.Because of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be guaranteed.Most scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers.Researchers begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction rules.But these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this paper.Unlike traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions.In addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions.Finally,security analysis and performance evaluation of our protocol are discussed.
文摘It is not more and more, easy to satisfy the important and growing spectrum demands in the context of the static conventional policy spectrum allocation. Therefore, to find a suitable solution to this problem, we are to days observing the apparition of flexible dynamic spectrum allocation methods. These methods that ought to improve more significantly the spectrum use have gained much interest. In fact, the digital dividend due to the change-over from the analog television to the digital terrestrial television must be efficiently used. So the Dynamic Spectrum Access (DSA) can potentially play a key role in shaping the future digital dividend use. In the DSA, two kinds of users or networks coexist on different channels. The first one, known as the primary user, accesses to a channel with high priority;and the second one, known as secondary user has a low priority. This paper presents a dynamic spectrum access protocol based on an auction framework. Our protocol is an interesting tool that allows the networks to bid and obtain on the available spectrum, the rights to be primary and secondary users according their valuations and traffic needs. Based on certain offers, our protocol selects primary and secondary users for each idle channel in order to realize the maximum economic for the regulator or social benefits. We deal with the case in which the offers of the networks are independent one another even if they will share the same channels. We design an algorithm in accordance with our dynamic spectrum access protocol. The algorithm is used here to find an optimal solution to the access allocation problem, specifically to digital dividend. Finally, the results in the numeric section, regarding the three suggested scenarios, show that the proposed dynamic spectrum access protocol is viable. The algorithm is able to eliminate all non-compliant bidders for the available spectrum sharing. We notice that the revenue or social benefits of the regulator is maximized when we have on each channel, one primary user and the maximum number of secondary users.
基金supported by the Beijing Natural Science Foundation of China (4102050)
文摘Cognitive radio(CR) technology is considered to be an effective solution to allocate spectrum resources,whereas the primary users of a network do not fully utilize available frequency bands.Spectrum auction framework has been recognized as an effective way to achieve dynamic spectrum access.From the perspective of spectrum auction,multi-band multi-user auction provides a new challenge for spectrum management.This paper proposes an auction framework based on location information for multi-band multi-user spectrum allocation.The performance of the proposed framework is compared with that of traditional auction framework based on a binary interference model as a benchmark.Simulation results show that primary users will obtain more total system revenue by selling their idle frequency bands to secondary users and the spectrum utilization of the proposed framework is more effective and fairer.
基金This work was supported by the National Natural Science Foundation of China(Nos.61601107,U1708262 and 61872449)China Postdoctoral Science Foundation(No.2019M653568)The Fundamental Research Funds for the Central Universities(No.Nl 72304023).
文摘With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be ignored.Most existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum auction.However,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so on.In this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the auction.In order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of bidders.Public verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum values.Finally,the security analysis is given to propose several types of attacks that can be defended.Besides,theoretical analysis and simulation experiments of our protocol are also provided.
基金partially supported by the National Natural Science Foundation of the China under grant 61,571,049 and 62072065the Fundamental Research Funds for the Central Universities(2021CD-JKYJH031)the Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing under grant cx20200004.
文摘Spectrum auction is one of the most effective ways to achieve dynamic spectrum allocation in cognitive radio net-works,and it provides one effective way to manage the spectrum demands of IoT devices with limited resources.Most spectrum auctions focus on protecting bidder privacy and achieving excellent social efficiency,but few tackles the verification of auction results that are controlled by the auctioneer.In this paper,we propose a cloud-based framework for verifiable privacy-preserving spectrum auctions.Our framework adopts a modified AFGH re-encryption algorithm that achieves both bid privacy protection and auction results verification at the same time.The cloud server helps to compute auction results based on homomorphic encryption,and an auctioneer decrypts the encrypted data from the server to obtain auction results.Meanwhile,the property of re-encryption makes it possible for any bidder to verify the auction results without compromising other bidders’privacy.