Privacy-Preserving Database Assisted Spectrum Access: A Socially-Aware Distributed Learning Approach

In this paper, we study a privacy-preserving spectrum sharing system to protect secondary users' location privacy while enhancing spectrum access. The location privacy of secondary users can be compromised by an external adversary via the received signal strength (RSS)-based localization technique. To mitigate such privacy threat, we employ a random power perturbation approach that allows each secondary user to judiciously obfuscate the RSS captured by the adversary. While it can protect users' location privacy, the power perturbation approach would inevitably degrade the system performance and bring challenges to the design of the spectrum allocation algorithm. In this work, we adopt a socially-aware database assisted spectrum access system and cast the spectrum allocation under users' power perturbation as a stochastic channel selection game played among the users. To tackle the challenge brought by the privacy protection, we develop a two time-scale distributed learning algorithm, which is shown to converge almost surely to a socially-aware ε-Nash equilibrium. The numerical results show that the higher the privacy protection level is, the more significant the degradation of the network throughput would be.

[1]  William H. Sandholm,et al.  ON THE GLOBAL CONVERGENCE OF STOCHASTIC FICTITIOUS PLAY , 2002 .

[2]  Ahmed Sultan,et al.  HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[3]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[4]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[5]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[6]  Sinan Gezici,et al.  A Survey on Wireless Position Estimation , 2008, Wirel. Pers. Commun..

[7]  Xu Chen,et al.  SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[8]  E. J. Collins,et al.  Convergent multiple-timescales reinforcement learning algorithms in normal form games , 2003 .

[9]  Xu Chen,et al.  A social group utility maximization framework with applications in database assisted spectrum access , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Zhu Han,et al.  Self-Organization in Small Cell Networks: A Reinforcement Learning Approach , 2013, IEEE Transactions on Wireless Communications.

[11]  Kaushik R. Chowdhury,et al.  Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping , 2010, Ad Hoc Networks.

[12]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[13]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .