Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
null (Ed.)Abstract The exploitation of radio-electric spectrum bands for wireless transmission purposes has some features of the commons: it is subject to congestion and conflict without rules governing its use. The Coasean approach is to assign private property rights to overcome the tragedy of the spectrum commons. The process of assigning these rights is still centralized, with governments assigning property rights through agencies such as the Federal Communications Commission and National Telecommunications and Information Administration in the USA. We consider the possibility of self-governance of the spectrum. We use insights from the study of common pool resources governance to analyze the emergence of property rights to spectrum in a ‘government-less’ environment in which norms, rules, and enforcement mechanisms are solely the product of the repeated interactions among participants in the network. Our case study considers the spectrum-sharing arrangement in the 1,695–1,710 MHz band. Using agent-based modeling (ABM), we show that self-governance of the spectrum can work and under what conditions it is likely to improve the efficiency of the allocation of property rights.more » « less
-
null (Ed.)n many countries, sharing has become a significant approach to problems of spectrum allocation and assignment. As this approach moves from concept to reality, it is reasonable to expect an increase in interference or usage conflict events between sharing parties. Scholars such as Coase, Demsetz, Stigler, and others have argued that appropriate enforcement is critical to successful contracts (such as spectrum sharing agreements) and Polinsky, Shavell, and others have analyzed enforcement mechanisms in general. While many ex-ante measures may be used, reducing the social costs of ex-ante enforcement means shifting the balance more toward ex-post measures. Ex post enforcement requires detection, data collection, and adjudication methods. At present, these methods are ad hoc (operating in a decentralized way between parties) or fairly costly (e.g., relying on the FCC Enforcement Bureau). The research presented in this paper is the culmination of an NSF-funded inquiry into how and what enforcement functions can be automated.more » « less
-
null (Ed.)Cooperative wireless networks, enabled by Cognitive Radios, facilitate mobile users to dynamically share access to spectrum. However, spectrum bands can be accessed illegitimately by malicious users. Therefore, the success of dynamic spectrum sharing relies on automated enforcement of spectrum policies. While the focus has been on ex ante spectrum enforcement, this work explores new approaches to address efficient ex post spectrum enforcement. The main objective of this work is to ensure maximum coverage of the area of enforcement and accurate detection of spectrum access violation. The first objective is achieved with the help of Lloyd's algorithm to divide the enforcement area into a set of uniformly sized coverage regions. The interference detection accuracy is achieved through crowdsourcing of the spectrum access monitoring to volunteers, based on their computational capabilities, location attributes and reputation. A simulation framework was developed in CSIM19 (C++ version) to analyze the performance of the proposed system over the entire area of enforcement. The results show that the proposed scheme ensures efficient coverage of all the channels and regions in the area of enforcement and a high average accuracy of detection.more » « less
-
In many countries, sharing has become a significant approach to problems of spectrum allocation and assignment. As this approach moves from concept to reality, it is reasonable to expect an increase in interference or usage conflict events between sharing parties. Scholars such as Coase, Demsetz, Stigler, and others have argued that appropriate enforcement is critical to successful contracts (such as spectrum sharing agreements) and Polinsky, Shavell, and others have analyzed enforcement mechanisms in general. While many ex-ante measures may be used, reducing the social costs of ex-ante enforcement means shifting the balance more toward ex-post measures. Ex post enforcement requires detection, data collection, and adjudication methods. At present, these methods are ad hoc (operating in a decentralized way between parties) or fairly costly (e.g., relying on the FCC Enforcement Bureau). The research presented in this paper is the culmination of an NSF-funded inquiry into how and what enforcement functions can be automated.more » « less
-
null (Ed.)The success of dynamic spectrum sharing in wireless networks depends on reliable automated enforcement of spectrum access policies. In this paper, a crowdsourced approach is used to select volunteers to detect spectrum misuse. Volunteer selection is based on multiple criteria, including their reputation, likelihood of being in a region and ability to effectively detect channel misuse. We formulate the volunteer selection problem as a stable matching problem, whereby, volunteers' monitoring preferences are matched to channels' attributes. Given a set of volunteers, the objective is to ensure maximum coverage of the spectrum enforcement area and accurate detection of spectrum access violation of all channels in the area. The two matching algorithms, Volunteer Matching (VM) and Reverse Volunteer Matching (RVM) are based on variants of the Gale-Shapley algorithm for stable matching. We also propose two Hybrid algorithms, HYBRID-VM and HYBRID-RVM that augment the matching algorithms with a Secretary-based algorithm to overcome the shortcomings of the individual vanilla algorithms. Simulation results show that volunteer selection by using HYBRID-VM gives better coverage of region (better by 19.2% when compared to threshold-based Secretary algorithm), better accuracy of detection and better volunteer happiness when compared to the other algorithms that are tested.more » « less