Group-Query-as-a-Service for Secure Low-Latency Opportunistic RF Spectrum Access in Mobile Edge Computing Enabled Wireless Networks

For enhancing the utilization of radio frequency (RF) bands, dynamic spectrum access has been considered to be an emerging paradigm where unlicensed secondary users access the licensed RF spectrum opportunistically without causing harmful interference to licensed primary users. In order to access idle channels, secondary users are required either to sense channels or search the geolocation based spectrum database before starting their actual communications. Note that the database searching approach has been proven to be more effective than the channel sensing approach since the sensing based approach results in higher sensing uncertainties. When a large number of secondary users query the spectrum database for finding idle channels at the same time, the spectrum server could be overwhelmed that could result in (unintentional) Denial-of-Service attack. In this paper, we investigate group-query-as- aservice for searching idle channels in database driven dynamic spectrum access where selected secondary users (aka grid leaders who are selected based on the interactive trust levels, location and resources in their grids) query on behalf of the other secondary users (aka grid followers). In this approach, secondary users are associated with the contours created based on same idle channels with the help of spectrum sensors and mobile edge computing (MEC) servers at each base station. The performance of the proposed group-query-as-a-service is evaluated using numerical results obtained from Monte Carlo simulation. We found that the proposed approach results in less delay with increase edge hit rate and higher throughput than the individual query based approach.

[1]  Zhi Ding,et al.  Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Xing Zhang,et al.  A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.

[3]  Moses Garuba,et al.  Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).

[4]  Mahmoud Al-Ayyoub,et al.  The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[5]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Sachin Shetty,et al.  Geolocation-aware resource management in cloud computing-based cognitive radio networks , 2014, Int. J. Cloud Comput..

[7]  Soumyasree Bera,et al.  Design of Spectrum Sensing System , 2018 .

[8]  Khashayar Kotobi,et al.  Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.

[9]  Mahadev Satyanarayanan,et al.  Cloudlets: at the leading edge of mobile-cloud convergence , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[10]  Paramvir Bahl,et al.  SenseLess: A database-driven white spaces network , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[11]  Danda B. Rawat,et al.  nROAR: Near Real-Time Opportunistic Spectrum Access and Management in Cloud-Based Database-Driven Cognitive Radio Networks , 2017, IEEE Transactions on Network and Service Management.

[12]  Y. Navaneeth Krishnan,et al.  Fog computing — Network based cloud computing , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[13]  Atay Ozgovde,et al.  How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions , 2017, IEEE Communications Surveys & Tutorials.

[14]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[15]  Jun Liu A new lightweight key exchange protocol with provable security for securing cloud-assistec. Mobile communications , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).