skip to main content


Search for: All records

Creators/Authors contains: "Berry, Randall A."

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Security is a critical concern in shared spectrum environments. In additional to degrading service, attacks can influence the market interactions between competing service providers (SPs). This paper investigates these interactions by considering two SPs engaged in Cournot competition while utilizing both proprietary and shared spectrum, with shared spectrum available in either licensed or open-access forms. Additionally, we assume the presence of an attacker whose objective is to deny service to one or more of the shared bands for a fraction of the time, consequently reducing the overall total revenue. We analyze the optimal forms of attacks under different attacker objectives and their repercussions on the resulting market equilibrium. Utilizing these analyses, we compare the impacts of various spectrum sharing approaches (licensed and open access) and differing amounts of spectrum holdings of the two providers. 
    more » « less
    Free, publicly-accessible full text available August 24, 2024
  2. In this paper, we study a fresh data acquisition problem to acquire fresh data and optimize the age-related performance when strategic data sources have private market information. We consider an information update system in which a destination acquires, and pays for, fresh data updates from a source. The destination incurs an age-related cost, modeled as a general increasing function of the age-of-information (AoI). The source is strategic and incurs a sampling cost, which is its private information and may not be truthfully reported to the destination. To this end, we design an optimal (economic) mechanism for timely information acquisition by generalizing Myerson's seminal work. The goal is to minimize the sum of the destination's age-related cost and its payment to the source, while ensuring that the source truthfully reports its private information and will voluntarily participate in the mechanism. Our results show that, under some distributions of the source's cost, our proposed optimal mechanism can lead to an unbounded benefit, compared against a benchmark that naively trusts the source's report and thus incentivizes its maximal over-reporting. 
    more » « less
  3. Mobile Virtual Network Operators (MVNOs) are an increasingly growing segment of the market for wireless services. MVNOs do not own their own network infrastructure and so must cooperate with existing Mobile Network Operators (MNOs) to gain access to the network infrastructure needed to enter this market. Cooperating with an MVNO is a non-trivial decision for an MNO in part because the MVNO may then become a potential competitor for customers. One motive for entering into such an arrangement is that the MVNO receives an added value from serving customers beyond what it earns from charging them for wireless service. We study a game theoretic model for the cooperation and competition between an MNO and such an added value MVNO based on models for price competition with congestible resources. Our model captures two different dimensions of how an MNO may cooperate. The first dimension is the payment scheme between the MNO and the MVNO. The second dimension is the access priority that the MNO chooses to offer to the MVNO's customers. We characterize the pros and cons of different cooperation modes and analyze the optimal cooperation mode under different conditions. 
    more » « less
  4. LTE-U is an extension of the Long Term Evolution (LTE) standard for operation in unlicensed spectrum. LTE-U differs from WiFi, the predominant technology used in unlicensed spectrum in that it utilizes a duty cycle mode for accessing the spectrum and allows for a more seamless integration with LTE deployments in licensed spectrum. There have been a number of technical studies on the co-existence of LTE-U and WiFi in unlicensed spectrum In this paper, we instead investigate the impact of such a technology from an economic perspective. We consider a model in which an incumbent service provider (SP) deploys a duty cycle-based technology like LTE-U in an unlicensed band along with operating in a licensed band and competes with one or more entrants that only operate in the unlicensed band using a different technology like WiFi. We characterize the impact of a technology like LTE-U on the market outcome and show that the welfare impacts of this technology are subtle, depending in part on the amount of unlicensed spectrum and number of entrants. We also investigate the impact of the duty cycle and the portion of unlicensed spectrum used by the technology. 
    more » « less
  5. Conventionally, mobile network operators charge users for data plan subscriptions. To create new revenue streams, some operators now also incentivize users to watch ads with data rewards and collect payments from advertisers. In this work, we study two such rewarding schemes: a Subscription-Aware Rewarding (SAR) scheme and a Subscription-Unaware Rewarding (SUR) scheme. Under the SAR scheme, only the subscribers of the operators' existing data plans are eligible for the rewards; under the SUR scheme, all users are eligible for the rewards (e.g., the users who do not subscribe to the data plans can still get SIM cards and receive data rewards by watching ads). We model the interactions among a capacity-constrained operator, users, and advertisers by a two-stage Stackelberg game, and characterize their equilibrium strategies under both the SAR and SUR schemes. We show that the SAR scheme can lead to more subscriptions and a higher operator revenue from the data market, while the SUR scheme can lead to better ad viewership and a higher operator revenue from the ad market. We provide some counter-intuitive insights for the design of data rewards. For example, the operator's optimal choice between the two schemes is sensitive to the users' data consumption utility function. When each user has a logarithmic utility function, the operator should apply the SUR scheme (i.e., reward both subscribers and nonsubscribers) if and only if it has a small network capacity. 
    more » « less
  6. We analyze the prioritized sharing between an added value Mobile Virtual Network Operator (MVNO) and multiple Mobile Network Operators (MNOs). An added value MVNO is one which earns added revenue from wireless users in addition to the revenue it directly collects for providing them wireless service. To offer service, an MVNO needs to contract with one or more MNOs to utilize their networks. Agreeing on such a contract requires the MNOs to consider the impact on their revenue from allowing the MVNO to enter the market as well as the possibility that other MNOs will cooperate. To further protect their customers, the MNOs may prioritize their direct customers over those of the MVNO. We establish a multi-stage game to analyze the equilibrium decisions of the MVNO, MNOs, and users in such a setting. In particular, we characterize the condition under which the MVNO can collaborate with the MNOs. The results show that the MVNO tends to cooperate with the MNOs when the band resources are limited and the added value is significant. When there is significant difference in band resources among the MNOs, the MVNO first considers cooperating with the MNO with a smaller band. We also consider the case when the users also have access to unlicensed spectrum. 
    more » « less
  7. By not requiring expensive licenses, unlicensed spectrum lowers the barriers for firms to offer wireless services. However, incumbent firms may still try to erect other entry barriers. For example, recent work has highlighted how customer contracts may be used as one such barrier by penalizing customers for switching to a new entrant. However, this work did not account for another potential benefit of unlicensed spectrum, having access to this open resource may incentivize entrants to invest in new and potentially better technology. This paper studies the interaction of contracts and the incentives of firms to invest in developing new technology. We use a game theoretic model to study this and characterize the effect of contracts on economic welfare. The role of subsidies or taxes by a social planner is also considered. 
    more » « less
  8. Unlicensed spectrum has been viewed as a way to increase competition in wireless access and promote innovation in new technologies and business models. However, several recent papers have shown that the openness of such spectrum can also lead to it becoming over congested when used by competing wireless service providers (SPs). This in turn can result in the SPs making no profit and may deter them from entering the market. However, this prior work assumes that unlicensed access is a separate service from any service offered using licensed spectrum. Here, we instead consider the more common case were service providers bundle both licensed and unlicensed spectrum as a single service and offer this with a single price. We analyze a model for such a market and show that in this case SPs are able to gain higher profit than the case without bundling. It is also possible to get higher social welfare with bundling. Moreover, we explore the case where SPs are allowed to manage the customers' average percentage of time they receive service on unlicensed spectrum and characterize the social welfare gap between the profit maximizing and social welfare maximizing setting. 
    more » « less