skip to main content


This content will become publicly available on May 14, 2025

Title: Pri-Share: Enabling Inter-SAS Privacy Protection via Secure Multi-Party Spectrum Allocation
Dynamic spectrum sharing has emerged as a promising solution to address the spectrum scarcity challenge. Currently, the FCC has designated several Spectrum Access Systems (SAS) administrators to deploy their SAS that coordinates the usage of the certificated shared band(s) such as the 3.55-3.7 GHz CBRS band. The SAS ensures that the incumbent’s access to the shared band is guaranteed while also granting commercial users access rights when the incumbents are not present. However, explicitly sharing the spectrum band(s) information among participants raises privacy concerns. Certain participants, such as curious SAS administrators, have the ability to deduce the confidential operational patterns of the incumbents through the Environmental Sensing Capability (ESC) or Incumbent Informing Capability (IIC) notifications. Additionally, a curious SAS administrator may obtain the client’s operational information of other SAS administrators throughout the process of inter-SAS coordination. We propose Pri-Share, a novel privacy-preserving spectrum sharing paradigm that tailors the threshold-based private set union (PSU) and homomorphic encryption (HE) techniques to address the aforementioned privacy problems. Specifically, it enables all parties to jointly compute a unified spectrum allocation plan to resolve the potential conflicts between different parties while safeguarding the confidentiality of each stakeholder’s spectrum requirements and usage. Pri-Share also ensures that while a curious participant might ascertain the usage of a particular spectrum band, they are unable to deduce the precise identity of the party utilizing it. Besides, Pri-Share adheres to the key spectrum allocation regulations outlined by FCC (part 96), such as assurance of access rights for various priority levels. Our implementation result shows that Pri-Share can be achieved with notable computational and communication efficiency,  more » « less
Award ID(s):
2331936 2332675 2312447 2247560 1916902 2154929
NSF-PAR ID:
10520578
Author(s) / Creator(s):
; ; ; ; ;
Publisher / Repository:
IEEE
Date Published:
Format(s):
Medium: X
Location:
Arlington, VA
Sponsoring Org:
National Science Foundation
More Like this
  1. To facilitate dynamic spectrum sharing, the FCC has designated certified SAS administrators to implement their own spectrum access systems (SASs) that manage the shared spectrum usage in the novel CBRS band. As a premise, different SAS servers must conduct periodic inter-SAS coordination to synchronize service states and avoid allocation conflicts. However, SAS servers may inevitably stop service for regular upgrades, crash down, or even perform maliciously that deviate from the normal routines, posing a fundamental operation security problem — the system shall be robust against these faults to guarantee secure and efficient spectrum sharing service. Unfortunately, the incumbent inter-SAS coordination mechanism, CPAS, is prone to SAS failures and does not support real-time allocation. Recent proposals that rely on blockchain smart contracts or state machine replication mechanisms to realize fault-tolerant inter-SAS coordination require all SASs to follow a unified allocation algorithm. They however face performance bottlenecks and cannot accommodate the current fact that different SASs hold their own proprietary allocation algorithms. In this work, we propose TriSAS—a novel inter-SAS coordination mechanism to facilitate secure, efficient, and dependable spectrum allocation that is fully compatible with the existing SAS infrastructure. TriSAS decomposes the coordination process into two phases including input synchronization and decision finalization. The firstphase ensures participants share a common input set while the second one fulfills a fair and verifiable spectrum allocation selec- tion, which is generated efficiently via SAS proposers’ proprietary allocation algorithms and evaluated by a customized designed allocation evaluation algorithm (AEA), in the face of no more than one-third of malicious participants. We implemented a prototype of TriSAS on the AWS cloud computing platform and evaluated its throughput and latency performance. The results show that TriSAS achieves high transaction throughput and low latency under various practical settings. 
    more » « less
  2. As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband Radio Service (CBRS), will be managed by a dynamic spectrum access system (SAS) to enable seamless spectrum sharing between secondary users (SU s) and incumbent users. Despite its benefits, SAS’s design requirements, as set by FCC, present privacy risks to SU s, merely because SU s are required to share sensitive operational information (e.g., location, identity, spectrum usage) with SAS to be able to learn about spectrum availability in their vicinity. In this paper, we propose TrustSAS, a trustworthy framework for SAS that synergizes state-of-the-art cryptographic techniques with blockchain technology in an innovative way to address these privacy issues while complying with FCC’s regulatory design requirements. We analyze the security of our framework and evaluate its performance through analysis, simulation and experimentation. We show that TrustSAS can offer high security guarantees with reasonable overhead, making it an ideal solution for addressing SU s’ privacy issues in an operational SAS environment. 
    more » « less
  3. Database driven dynamic spectrum sharing is one of the most promising dynamic spectrum access (DSA) solution to address the spectrum scarcity issue. In such a database driven DSA system, the centralized spectrum management infrastructure, called spectrum access system (SAS), makes its spectrum allocation decisions to secondary users (SUs) according to sensitive operational data of incumbent users (IUs). Since both SAS and SUs are not necessarily fully trusted, privacy protection against untrusted SAS and SUs become critical for IUs that have high operational privacy requirements. To address this problem, many IU privacy preserving solutions emerge recently. However, there is a lack of understanding and comparison of capability in protecting IU operational privacy under these existing approaches. In this paper, thus, we fill in the void by providing a comparative study that investigates existing solutions and explores several existing metrics to evaluate the strength of privacy protection. Moreover, we propose two general metrics to evaluate privacy preserving level and evaluate existing works with them. 
    more » « less
  4. The recent framework for tiered spectrum sharing in the 3.5 GHz band establishes rules in which multiple firms called Environment Sensing Capability operators (ESCs) may measure spectrum occupancy and sell these measurements to other firms to help facilitate spectrum access. Motived by this we consider a scenario in which two spectrum access firms (SAs) seeks to access a shared band of spectrum and must in turn purchase spectrum measurements from one of two ESCs. Given the measurements they purchase, the SA firms then compete on price to serve customers in a shared band of spectrum. We study how differences in the quality and price of the spectrum measurements impact the resulting market equilibrium between the SAs and find that having different qualities of measurements available to different SAs can lead to better economic welfare. 
    more » « less
  5. null (Ed.)
    The Citizens Broadband Radio Service (CBRS) recently adopted in the U.S. enables commercial users to share spectrum with incumbent federal users. This sharing can be assisted by Environmental Sensing Capability operators (ESCs), that monitor the spectrum occupancy to determine when the use of the spectrum will not harm incumbents. An important aspect of the CBRS is that it enables two tiers of spectrum access by commercial users. The higher tier corresponds to a spectrum access (SA) firm that purchases a priority access license (PAL) in a competitive auction. The PAL holder obtains dedicated licensed access to a portion of the spectrum when the incumbent is not present. The lower tier, referred to as generalized Authorized Access (GAA), does not request a PAL and is similar to unlicensed access, in which multiple firms share a portion of the spectrum. Entry and investment in such a market introduces a number of new dimensions. Should an entrant bid for a PAL? How does the availability of a PAL impact their investment decisions? We develop a game-theoretic model to study these issues in which entrant SAs may bid in a PAL auction and decide on their investment levels and then compete downstream for customers. 
    more » « less