Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations

We consider two games played between a spectrum manager and an adversary. The manager attempts to allocate spectrum to primary DoD wireless users and secondary non-DoD users by means of a dynamically updated database. The adversary attempts to detect the presence of DoD users within a cell by querying the database. To prevent this, the manager may add false allocation entries into the database at the cost of possibly excluding legitimate secondary users. We calculate the Nash equilibria of these games and show that they can be surprisingly favorable to the DoD and the secondary network. The manager can ensure that the enemy derives no utility from the database without excluding many secondary users on average.