Primary Users' Operational Privacy Preservation via Data-Driven Optimization

Recently opened spectrum within 3550-3700 MHz provides more accessing opportunities to secondary users (SUs), while it also raises concerns on the operational privacy of primary users (PUs), especially for military and government. In this paper, we propose to study the tradeoff between PUs' temporal privacy and SUs' network performance using the data-driven approach. To preserve PUs' temporal operational privacy, we develop an obfuscation strategy for PUs, which allows PUs to intentionally add dummy signals to change the distribution of temporal spectrum availability, and confuse the adversary. While generating the dummy signals for privacy, the PUs have to consider the utility of SUs and try their best to satisfy SUs' uncertain traffic demands. Based on the historical data, we employ a data-driven risk-averse model to characterize the uncertainty of SUs' demands. With joint consideration of PUs' privacy and uncertain SUs' demands, we formulate the data-driven risk- averse stochastic optimization, and provide corresponding solutions. Through numerical simulations, we show that the proposed scheme is effective in preserving PUs' temporal operational privacy while offering good enough spectrum resources to satisfy SUs' traffic demands.

[1]  Riccardo Bettati,et al.  On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[2]  Giuseppe Carlo Calafiore,et al.  Ambiguous Risk Measures and Optimal Robust Portfolios , 2007, SIAM J. Optim..

[3]  Behnam Bahrak,et al.  Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[4]  Jeffrey Boksiner,et al.  Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[5]  T. Bonald Throughput Performance in Networks with Linear Capacity Contraints , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[6]  Diego Klabjan,et al.  Robust Stochastic Lot-Sizing by Means of Histograms , 2013 .

[7]  Weihua Zhuang,et al.  Performance bounds of energy detection with signal uncertainty in cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[9]  Yongpei Guan,et al.  Data-Driven Risk-Averse Two-Stage Stochastic Program with ζ-Structure Probability Metrics , 2015 .

[10]  Alexandre Proutière,et al.  Insensitive Bandwidth Sharing in Data Networks , 2003, Queueing Syst. Theory Appl..

[11]  J. Kiefer,et al.  Asymptotic Minimax Character of the Sample Distribution Function and of the Classical Multinomial Estimator , 1956 .

[12]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[13]  Visa Koivunen,et al.  Robust Nonparametric Cyclic Correlation-Based Spectrum Sensing for Cognitive Radio , 2010, IEEE Transactions on Signal Processing.

[14]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[15]  Xiaojiang Du,et al.  Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[16]  Konstantinos Psounis,et al.  Can the privacy of primary networks in shared spectrum be protected? , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[17]  Laurent Massoulié,et al.  A queueing analysis of max-min fairness, proportional fairness and balanced fairness , 2006, Queueing Syst. Theory Appl..