Spectrum sharing policy was introduced to utilize the spectrum properly and to overcome limitations in access to radio spectrum. In a broad sense, amounts to a reformation of rights relationships between the spectrum sharing entities. The stakeholders in the sharing arrangement include the (incumbent) Primary Users (PU) who hold the spectrum license, and the (entrant) Secondary User (s) who may use the spectrum temporarily or with rights that are subordinate to the license holders. A set of strategies and technologies are required to enforce rights in any management system and the timing of the enforcement action (ex-ante and ex-post) plays a significant role in such a management system. Ex-ante enforcement is measures are designed to prevent stakeholder rights from being violated. In most discussions, this focusses on ways of protecting a PU’s signal from harmful interference caused by an SU, while ex post mechanisms deal with addressing the consequences of interference after the fact. Practical enforcement schemes have ex-ante and ex-post enforcement that are coupled.The analysis performed in suggests that this approach is too narrow. The authors note that SUs have usage rights that deserve to be enforced as well, and that the collective action rights associated with spectrum sharing may require enforcement measures beyond interference. Collective action rights include the right to determine who may use spectrum (and when they may use it) and who may determine who is excluded. The emergent spectrum sharing systems use geolocation databases (e.g., TVWS databases and Spectrum Access Systems) to mediate spectrum access, so the enforcement of the collective action rights amounts to requiring transparency of decision making as well as audits of these systems.As we move to more intensive sharing of spectrum, the likelihood of events that are enforceable ex post increases, despite ex ante measures. The Enhancing Access to the Radio Spectrum (EARS) second workshop report recognized this and set the goal of lowering the costs by automating some of the ex-post enforcement steps. This paper will study the enforcement in Spectrum Access Systems (SAS) based spectrum sharing regimes. We focus in particular on the enforcement events that occur in the normal course of spectrum sharing; in doing so, we exclude treatment of “rogue” or “pirate” radios, and of interference due to equipment failures of devices and systems that are not participants in the sharing regime. These excluded events are important to address, but we hold that they require a distinct enforcement methodology that may not be amenable to automation under today’s technology.In our analysis, we consider two architectures for enforcement systems: a third party enforcer and a self-reporting approach. Third party enforcer approach, the enforcer must be trusted by all the entities of the system and must have authority to resolve enforcement violation events.We will examine how these two architecture apply in the enforcement of usage as well as collective action rights. A hypothetical scenario of using the recommended ex-ante enforcement (protection zones) and the involved entities will be used to analyze ex-post enforcement steps and the enforcer role in both architectures. This hypothetical scenario concerns about the behavior of the SUs is significant/of concern if SU-mobile devices transmit near PU-base station or if they are transmitting high power signals within the protection zone. These behaviors will cause harmful interference to the PU signal and data received by the PU will be lost. For the ex-post enforcement, we will follow the graduated response approach that had been suggested in.Examine the types of evidence that might be accessible from SASs in support of the ex post enforcement of usage rights. The role of the enforcer, in the ex-post enforcement, would be to detect, forensic, adjudicate, and control parties’ behaviors. Moreover, self-reporting approach, PU and SU would report their own activities to spectrum sharing enforcement authority (which could be SAS for this architecture) when they violated the spectrum sharing policy. Following the self-reporting approach, the detection and forensic roles will be deducted from the enforcer because parties report their violation act, in addition, reducing the risk of getting uncertain sanctions when violating the spectrum sharing policy. The paper will help the researchers develop feasible approaches to adjudication and will help policymakers the efficient enforcer role on the enforcement system could be. Although, the need to lower the cost of the ex-post enforcement by automating some of the steps, this paper will help on that matter too.
[1]
Profit-Driven Abuses of Virtual Currencies
,
2013
.
[2]
A. Sahai,et al.
Crime and Punishment for Cognitive Radios
,
2008,
2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[3]
Vitalik Buterin.
A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM
,
2015
.
[4]
David S. Evans,et al.
Economic Aspects of Bitcoin and Other Decentralized Public-Ledger Currency Platforms
,
2014
.
[5]
Liu Cui,et al.
Dimensions of cooperative spectrum sharing: Rights and enforcement
,
2014,
2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).
[6]
Paul J. M. Havinga,et al.
Survey of Electronic Payment Methods and Systems
,
1996
.
[7]
Matthew Ponsford,et al.
A Comparative Analysis of Bitcoin and Other Decentralised Virtual Currencies: Legal Regulation in the People's Republic of China, Canada, and the United States
,
2015
.
[8]
Melanie Swan,et al.
Blockchain: Blueprint for a New Economy
,
2015
.
[9]
Martin B. H. Weiss,et al.
Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing
,
2013
.
[10]
Adam Back,et al.
Hashcash - A Denial of Service Counter-Measure
,
2002
.
[11]
J.M. Chapin,et al.
Time-Limited Leases for Innovative Radios
,
2007,
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[12]
David Mazières.
The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus
,
2015
.
[13]
Sunny King,et al.
PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake
,
2012
.
[14]
Jeffrey H. Reed,et al.
Spectrum access system for the citizen broadband radio service
,
2015,
IEEE Communications Magazine.
[15]
Dominic Hobson,et al.
What is Bitcoin?
,
2013,
XRDS.
[16]
Andreas M. Antonopoulos,et al.
Mastering Bitcoin: Unlocking Digital Crypto-Currencies
,
2014
.
[17]
Primavera De Filippi,et al.
Decentralized Blockchain Technology and the Rise of Lex Cryptographia
,
2015
.
[18]
L. Jean Camp,et al.
Token and Notational Money in Electronic Commerce
,
1995,
USENIX Workshop on Electronic Commerce.
[19]
Juri Mattila,et al.
The Blockchain Phenomenon – The Disruptive Potential of Distributed Consensus Architectures
,
2016
.
[20]
Steven Shavell,et al.
The Optimal Structure of Law Enforcement
,
1993,
The Journal of Law and Economics.
[21]
P. Baran,et al.
On Distributed Communications Networks
,
1964
.
[22]
Anant Sahai,et al.
Potential collapse of whitespaces and the prospect for a universal power rule
,
2011,
2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[23]
Daniel Kraft,et al.
Difficulty control for blockchain-based consensus systems
,
2016,
Peer-to-Peer Netw. Appl..
[24]
Martin B. H. Weiss,et al.
Ex-Post Enforcement in Cooperative Spectrum Sharing: A Case Study of the 1695-1710 MHz Band
,
2015
.
[25]
Martin B. H. Weiss,et al.
Socio-technical considerations for Spectrum Access System (SAS) design
,
2015,
2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[26]
Ping Wah Wong,et al.
A public key watermark for image verification and authentication
,
1998,
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[27]
Martin B. H. Weiss,et al.
Ex-Post Enforcement in Spectrum Sharing
,
2014
.
[28]
Fergal Reid,et al.
An Analysis of Anonymity in the Bitcoin System
,
2011,
PASSAT 2011.
[29]
Harold Demsetz.
The Exchange and Enforcement of Property Rights
,
1964
.
[30]
Nick Szabo,et al.
Formalizing and Securing Relationships on Public Networks
,
1997,
First Monday.
[31]
Ingo Weber,et al.
New kids on the block: an analysis of modern blockchains
,
2016,
ArXiv.