Dependence of optimal monitoring strategy on the application to be protected

Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection probability of unlicensed access to spectrum resources depends on the application type. As a consequence, knowledge of the application type allows for the primary user to improve spectrum scanning. Given the juxtaposition between the thief's and scanner's objectives, and the underlying dependency between detection and application QoS requirements, we finally formulate an adversarial Bayesian game where the scanner's scanning takes into account statistical knowledge about applications used by the user. The equilibrium strategies of this game are found in closed form what allowed to find their interesting properties. In particular, it was shown that the equilibrium sneaking strategies for different types of user are bandwidth-sharing, and we demonstrate how information about the application the user prefers to sneak at can improve the monitoring strategy.

[1]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[2]  Vladimir I. Kostylev,et al.  Energy detection of a signal with random amplitude , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[3]  Laurence B. Milstein,et al.  Adaptive narrow-band interference rejection in a DS spread-spectrum intercept receiver using transform domain signal processing techniques , 1989, IEEE Trans. Commun..

[4]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[5]  Anthony Ephremides,et al.  A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access , 2007, WiOpt.

[6]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[7]  Andrew J. Viterbi,et al.  On the capacity of a cellular CDMA system , 1991 .

[8]  Eitan Altman,et al.  A Bayesian jamming game in an OFDM wireless network , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[9]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[10]  Otilia Popescu,et al.  Strong Interference and Spectrum Warfare , 2004 .

[11]  H. Saarnisaari,et al.  Quantization and dynamic range effects on the energy detection , 2004, Proceedings of the 6th Nordic Signal Processing Symposium, 2004. NORSIG 2004..

[12]  David J. Goodman,et al.  Power control for wireless data , 1999, 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC'99) (Cat. No.99EX384).

[13]  Andrea J. Goldsmith,et al.  Competition in Wireless Systems via Bayesian Interference Games , 2007, ArXiv.

[14]  Eitan Altman,et al.  Jamming in wireless networks under uncertainty , 2009, WiOpt.

[15]  Sergio Verdu,et al.  Multiuser Detection , 1998 .

[16]  K. V. Cai,et al.  Energy detector performance in a noise fluctuating channel , 1989, IEEE Military Communications Conference, 'Bridging the Gap. Interoperability, Survivability, Security'.

[17]  Tan F. Wong,et al.  Optimal training sequence in MIMO systems with multiple interference sources , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[18]  Tsuhan Chen,et al.  Design, implementation and evaluation of an efficient opportunistic retransmission protocol , 2009, MobiCom '09.

[19]  R. M. Buehrer,et al.  Issues in the performance and covertness of UWB communications systems , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..

[20]  Robin Dillard Detectability of Spread-Spectrum Signals , 1979, IEEE Transactions on Aerospace and Electronic Systems.