skip to main content


Title: Regulation When Platforms Are Layered
In previous papers, Lehr and Sicker (2018a,b) argued that the changing character of our telecommunications infrastructure called for a new regulatory approach, with a new Communications Act to define the duties and authorities of a reconceptualized FCC (what we call newFCC in this paper). Today's Internet ecosystem is comprised of multiple digital network platforms organized into a multi-layer architecture. Lower layer IP platforms provided by access and backbone ISPs collectively support the Internet, on which complementors can build higher-layer platforms, such as the platforms provided by powerful firms such as Google, Microsoft, Amazon, Facebook and Apple. These firms control and operate multiple platforms within the larger Internet ecosystem. When dominant platform providers pursue multi-platform strategies in an effort to capture or control a market, such strategies confound current methods for defining markets and assessing market power. This paper draws on the layered platform nature of the Internet ecosystem, as described in Claffy and Clark (2014), to illustrate how this layered character of today’s Internet ecosystem calls for new regulatory authority. This paper draws on the layered platform model to scope the duties for an agency (or agencies) with sector-specific expertise.  more » « less
Award ID(s):
1724853
NSF-PAR ID:
10186686
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Telecommunications Policy Research Conference (TPRC)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The Internet of Things (IoT) is an emerging technology that aims to connect our environment to the internet in the same way that personal computers connected people. As this technology progresses, the IoT paradigm becomes more prevalent in our everyday lives. The nature of IoT applications necessitates devices that are low-cost, power-sensitive, integrated, unobtrusive, and interoperable with existing cloud platforms and services, for example, Amazon AWS IoT, IBM Watson IoT. As a result, these devices are often small in size, with just enough computing power needed for their specific tasks. These resource-constrained devices are often unable to implement traditional network security measures and represent a vulnerability to network attackers as a result. Few frameworks are positioned to handle the influx of this new technology and the security concerns associated with it. Current solutions fail to provide a comprehensive and multi-layer solution to these inherent IoT security vulnerabilities. This paper presents a layered approach to IoT testbed that aims to bridge multiple connection standards and cloud platforms. To solve challenges surrounding this multi-layer IoT testbed, we propose a mesh inside a mesh IoT network architecture. Our designed "edge router" incorporates two mesh networks together and performs seamlessly transmission of multi-standard packets. The proposed IoT testbed interoperates with existing multi-standards (Wi-Fi, 6LoWPAN) and segments of networks, and provides both Internet and resilient sensor coverage to the cloud platform. To ensure confidentiality and authentication of IoT devices when interoperating with multiple service platforms, we propose optimized cryptographic techniques and software frameworks for IoT devices. We propose to extend and modify the existing open-source IDS platforms such as Snort to support IoT platforms and environments. We validate the efficacy of the proposed system by evaluating its performance and effect on key system resources. The work within this testbed design and implementation provides a solid foundation for further IoT system development. 
    more » « less
  2. null (Ed.)
    Service liability interconnections among networked IT and IoT-driven service organizations create potential channels for cascading service disruptions due to modern cybercrimes such as DDoS, APT, and ransomware attacks. These attacks are known to inflict cascading catastrophic service disruptions worth billions of dollars across organizations and critical infrastructure around the globe. Cyber-insurance is a risk management mechanism that is gaining increasing industry popularity to cover client (organization) risks after a cyber-attack. However, there is a certain likelihood that the nature of a successful attack is of such magnitude that an organizational client’s insurance provider is not able to cover the multi-party aggregate losses incurred upon itself by its clients and their descendants in the supply chain, thereby needing to re-insure itself via other cyber-insurance firms. To this end, one question worth investigating in the first place is whether an ecosystem comprising a set of profit-minded cyber-insurance companies, each capable of providing re-insurance services for a service-networked IT environment, is economically feasible to cover the aggregate cyber-losses arising due to a cyber-attack. Our study focuses on an empirically interesting case of extreme heavy tailed cyber-risk distributions that might be presenting themselves to cyber-insurance firms in the modern Internet age in the form of catastrophic service disruptions, and could be a possible standard risk distribution to deal with in the near IoT age. Surprisingly, as a negative result for society in the event of such catastrophes, we prove via a game-theoretic analysis that it may not be economically incentive compatible , even under i.i.d. statistical conditions on catastrophic cyber-risk distributions, for limited liability-taking risk-averse cyber-insurance companies to offer cyber re-insurance solutions despite the existence of large enough market capacity to achieve full cyber-risk sharing. However, our analysis theoretically endorses the popular opinion that spreading i.i.d. cyber-risks that are not catastrophic is an effective practice for aggregate cyber-risk managers, a result established theoretically and empirically in the past. A failure to achieve a working re-insurance market in critically demanding situations after catastrophic cyber-risk events strongly calls for centralized government regulatory action/intervention to promote risk sharing through re-insurance activities for the benefit of service-networked societies in the IoT age. 
    more » « less
  3. Abstract Research Summary

    This study examines whether “unblocking” competition through antitrust intervention against a dominant platform can spur complementor innovation in platform ecosystems. Using a novel dataset on enterprise infrastructure software and a difference‐in‐differences design, we examine the relation between the U.S. antitrust intervention against Microsoft (dominant enterprise platform) and subsequent innovation and profitability of infrastructure applications firms (complementors). The data show that innovation among complementors—particularly ones with low market share—soared when the competitive pressure on the dominant platform amplified. However, the profitability of these complementors dropped. Our results contribute to understanding links between competition and innovation in platform ecosystems, as well as the opportunities and threats related to dominant platforms in those ecosystems.

    Managerial Summary

    Complementors (apps, services) that are owned by their platforms often have an unfair advantage. Antitrust action challenges the power of such dual platform‐complementors, reasoning that unfair advantage blocks fair competition, and, in turn, reduces firms' incentives to innovate and thus limits consumer choice. We examine whether reducing anticompetitive barriers and platform‐complementors' power revitalizes the platform ecosystem. Using a landmark antitrust case, we find mixed results: while complementors do innovate more, their profits go down. In particular, the low‐share complementors that bring in the most innovation are also the ones that lose the most financially, suggesting that they may have over‐relied on the platform for key assets. To develop a healthy ecosystem in the long run, platform owners may want to resist the temptation to keep complementors weak and instead help support their development to stand on their own.

     
    more » « less
  4. Fernanda Kastensmidt Ricardo Reis Aida Todri-Sanial Hai (Ed.)
    The scope of Smart electronics and its increasing market worldwide has made cybersecurity an important challenge. The Security-by-Design (SbD) principle, an emerging cybersecurity area, focuses on building security/privacy-enabled primitives at the design stage of an electronic system. This paper proposes a novel Physical Unclonable Function (PUF) based Trusted Platform Module (TPM) for SbD primitive. The proposed SbD primitive works by performing secure verification of the PUF key using TPM’s Encryption and Decryption engine. The securely verified PUF Key is then bound to TPM using Platform Configuration Registers (PCR). PCRs in TPM facilitate a secure boot process and effective access control to TPM’s NonVolatile memory through an enhanced authorization policy. By binding PUF with PCR in TPM, a novel PUF-based access control policy can be defined, bringing in a new security ecosystem for the emerging Internet-of-Everything era. The proposed SbD approach has been experimentally validated by successfully integrating various PUF topologies with Hardware TPM. 
    more » « less
  5. Augmented reality (AR), which overlays virtual content on top of the user’s perception of the real world, has now begun to enter the consumer market. Besides smartphone platforms, early-stage head-mounted displays such as the Microsoft HoloLens are under active development. Many compelling uses of these technologies are multi-user: e.g., inperson collaborative tools, multiplayer gaming, and telepresence. While prior work on AR security and privacy has studied potential risks from AR applications, new risks will also arise among multiple human users. In this work, we explore the challenges that arise in designing secure and private content sharing for multi-user AR. We analyze representative application case studies and systematize design goals for security and functionality that a multi-user AR platform should support. We design an AR content sharing control module that achieves these goals and build a prototype implementation (ShareAR) for the HoloLens. This work builds foundations for secure and private multi-user AR interactions. 
    more » « less