Dependence of optimal monitoring strategy on the application to be protected

Andrey Garnaev, Wade Trappe, Chun Ta Kung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Abstract

Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection probability of unlicensed access to spectrum resources depends on the application type. As a consequence, knowledge of the application type allows for the primary user to improve spectrum scanning. Given the juxtaposition between the thief's and scanner's objectives, and the underlying dependency between detection and application QoS requirements, we finally formulate an adversarial Bayesian game where the scanner's scanning takes into account statistical knowledge about applications used by the user. The equilibrium strategies of this game are found in closed form what allowed to find their interesting properties. In particular, it was shown that the equilibrium sneaking strategies for different types of user are bandwidth-sharing, and we demonstrate how information about the application the user prefers to sneak at can improve the monitoring strategy.

Original languageEnglish (US)
Title of host publication2012 IEEE Global Communications Conference, GLOBECOM 2012
Pages1054-1059
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE Global Communications Conference, GLOBECOM 2012 - Anaheim, CA, United States
Duration: Dec 3 2012Dec 7 2012

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2012 IEEE Global Communications Conference, GLOBECOM 2012
Country/TerritoryUnited States
CityAnaheim, CA
Period12/3/1212/7/12

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Dependence of optimal monitoring strategy on the application to be protected'. Together they form a unique fingerprint.

Cite this