Fundamental Limits on Ex-Post Enforcement and Implications for Spectrum Rights

The combination of emerging new communication technologies, economic growth, and limited amounts of available spectrum necessitate dynamic tiered sharing. This paper builds on the “spectrum jails” paradigm—a model for light-handed ex-post enforcement. We consider the situation of sharing spectrum between a single primary (higher-tier) user and a single secondary (lower-tier) user. Analyzing this as a two-player game that could be played Stackelberg or simultaneous, we examine what kinds of primary and secondary rights can be credibly enforced. We show that the primary can trust that it will be protected from too much harmful interference and we show how the regulator can set the ex-post enforcement parameters to do this no matter which secondary user becomes capable of using the band. It is impossible to give a universal guarantee to all secondary users that the primary will never make false reports (“cry wolf”) against them. However, it is possible to show that “compatible” secondary users will trust that the primary user will not make false reports against them when the spectrum opportunity is sufficiently attractive for secondary users.

[1]  Nathan Isaacs Barrier Activities and the Courts: A Study in Anti-Competitive Law , 1941 .

[2]  Phil Weiser,et al.  Spectrum Policy Reform and the Next Frontier of Property Rights , 2008 .

[3]  Behnam Bahrak,et al.  Security and Enforcement in Spectrum Sharing , 2014, Proceedings of the IEEE.

[4]  A. D. Vany,et al.  A Property System for Market Allocation of the Electromagnetic Spectrum: A Legal-Economic-Engineering Study , 1969 .

[5]  Bo Gao,et al.  An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research , 2016, IEEE Transactions on Cognitive Communications and Networking.

[6]  T. Hazlett A LAW & ECONOMICS APPROACH TO SPECTRUM PROPERTY RIGHTS : A RESPONSE TO WEISER AND HATFIELD , 2008 .

[7]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[8]  Kaigui Bian,et al.  PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Anant Sahai,et al.  The need for a new model of trust in spectrum and the case for spectrum jails , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[10]  Anant Sahai,et al.  Fundamental limits on ex-post enforcement and implications for spectrum rights , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[11]  Martin B. H. Weiss,et al.  Ex-Post Enforcement in Cooperative Spectrum Sharing: A Case Study of the 1695-1710 MHz Band , 2015 .

[12]  E. Takáts,et al.  A Theory of “Crying Wolf”; The Economics of Money Laundering Enforcement , 2007 .

[13]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[14]  Kristen Woyach,et al.  Can We Incentivize Sensing in a Light-Handed Way? , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[15]  N. Luhmann,et al.  Trust: Making and Breaking Cooperative Relations , 1990 .

[16]  Anant Sahai,et al.  Commitment in regulatory spectrum games: Examining the first-player advantage , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[17]  Robert J. Aumann,et al.  Repeated Games with Incomplete Information , 1995 .

[18]  P. Ordeshook,et al.  Crime and Punishment: Are One-Shot, Two-Person Games Enough? , 1990, American Political Science Review.

[19]  Eli M. Noam,et al.  Spectrum Auctions: Yesterday's Heresy, Today's Orthodoxy, Tomorrow's Anachronism. Taking the Next Step to Open Spectrum Access* , 1998, The Journal of Law and Economics.

[20]  Kristen Ann Woyach,et al.  Building trust into light-handed regulations for cognitive radio , 2013 .

[21]  Anant Sahai,et al.  Should primaries be considered victims or police? , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.

[22]  Steven Shavell,et al.  The Economic Theory of Public Enforcement of Law , 1998 .

[23]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[24]  Richard A. Posner,et al.  An economic of theory of the criminal law , 1985 .

[25]  Kevin D. Werbach Supercommons: Toward a Unified Theory of Wireless Communication , 2003 .

[26]  Dusit Niyato,et al.  Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion , 2008, IEEE Journal on Selected Areas in Communications.

[27]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[28]  A. Sahai,et al.  Crime and Punishment for Cognitive Radios , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[29]  R. Coase,et al.  The Problem of Social Cost , 1960, The Journal of Law and Economics.

[30]  K. J. Ray Liu,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Sharing: A Game Theoretical Overview , 2007, IEEE Communications Magazine.

[31]  Anant Sahai,et al.  What is a Spectrum Hole and What Does it Take to Recognize One? , 2009, Proceedings of the IEEE.

[32]  Ronald H. Coase,et al.  The Federal Communications Commission , 1959, The Journal of Law and Economics.

[33]  Luciano Andreozzi Rewarding Policemen Increases Crime. Another Surprising Result from the Inspection Game , 2004 .

[34]  Martin B. H. Weiss,et al.  Enforcement in Dynamic Spectrum Access Systems , 2012 .

[35]  Kate Harrison,et al.  How Much White-Space Capacity Is There? , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[36]  George Atia,et al.  A technical framework for light- handed regulation of cognitive radios , 2009, IEEE Communications Magazine.

[37]  Paramvir Bahl,et al.  SenseLess: A database-driven white spaces network , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[38]  Kaigui Bian,et al.  PHY-layer authentication by introducing controlled inter symbol interference , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[39]  Andrea J. Goldsmith,et al.  Capacity limits of MIMO channels , 2003, IEEE J. Sel. Areas Commun..

[40]  Dale N. Hatfield,et al.  Toward Property Rights in Spectrum: The Difficult Policy Choices Ahead , 2006 .

[41]  Syed Ali Jafar,et al.  Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.

[42]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[43]  Yochai Benkler,et al.  Overcoming Agoraphobia: Building the Commons of the Digitally Networked Environment , 2002 .

[44]  George Tsebelis,et al.  Are Sanctions Effective? , 1990 .

[45]  Michael L. Honig,et al.  Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..

[46]  Kristen Woyach,et al.  Why the caged cognitive radio sings , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[47]  Mung Chiang,et al.  “See Something, Say Something” Crowdsourced Enforcement of Spectrum Policies , 2016, IEEE Transactions on Wireless Communications.

[48]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[49]  Anant Sahai,et al.  Seeing the bigger picture: Context-aware regulations , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.