Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access

Dynamic spectrum access (DSA) is a promising platform to solve the spectrum shortage problem, in which auction based mechanisms have been extensively studied due to good spectrum allocation efficiency and fairness. Recently, Sybil attacks were introduced in DSA, and Sybil-proof spectrum auction mechanisms have been proposed, which guarantee that each single secondary user (SU) cannot obtain a higher utility under more than one fictitious identities. However, existing Sybil-poof spectrum auction mechanisms achieve only Sybil-proofness for SUs, but not for primary users (PUs), and simulations show that a cheating PU in those mechanisms can obtain a higher utility by Sybil attacks. In this paper, we propose TSUNAMI, the first Truthful and primary user Sybil-proof aUctioN mechAnisM for onlIne spectrum allocation. Specifically, we compute the opportunity cost of each SU and screen out cost-efficient SUs to participate in spectrum allocation. In addition, we present a bid-independent sorting method and a sequential matching approach to achieve primary user Sybil-proofness and 2-D truthfulness, which means that each SU or PU can gain her maximal utility by bidding with her true valuation of spectrum. We evaluate the performance and validate the desired properties of our proposed mechanism through extensive simulations.

[1]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[2]  Zhili Chen,et al.  True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions , 2012, IEEE Transactions on Wireless Communications.

[3]  Xia Zhou,et al.  eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.

[4]  Song Guo,et al.  Robust Large-Scale Spectrum Auctions against False-Name Bids , 2017, IEEE Trans. Mob. Comput..

[5]  Guihai Chen,et al.  Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks , 2015, IEEE/ACM Transactions on Networking.

[6]  Jian Lin,et al.  Sybil-proof incentive mechanisms for crowdsensing , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[7]  Yanjiao Chen,et al.  LOTUS: Location-aware online truthful double auction for dynamic spectrum access , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[8]  Xiaodong Lin LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Song Guo,et al.  eBay in the Clouds: False-Name-Proof Auctions for Cloud Resource Allocation , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[10]  Jian Tang,et al.  Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing , 2017, IEEE Journal on Selected Areas in Communications.

[11]  Dejun Yang,et al.  PROMISE: A framework for truthful and profit maximizing spectrum double auctions , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[12]  Song Guo,et al.  ALETHEIA: Robust Large-Scale Spectrum Auctions against False-name Bids , 2015, MobiHoc.

[13]  Lin Cai,et al.  Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks , 2009, IEEE Transactions on Wireless Communications.

[14]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[15]  Xiaohua Jia,et al.  THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply , 2017, IEEE Transactions on Mobile Computing.

[16]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[17]  Paul Klemperer,et al.  Auctions: Theory and Practice , 2004 .

[18]  Song Guo,et al.  DOTA: A Double Truthful Auction for spectrum allocation in dynamic spectrum access , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[19]  Shaojie Tang,et al.  Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks , 2011, IEEE Transactions on Computers.

[20]  Shamik Sengupta,et al.  Sustenance against RL-Based Sybil Attacks in Cognitive Radio Networks Using Dynamic Reputation System , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[21]  Xia Zhou,et al.  TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.