IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737533
|View full text |Cite
|
Sign up to set email alerts
|

TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band

Abstract: As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband Radio Service (CBRS), will be managed by a dynamic spectrum access system (SAS ) to enable seamless spectrum sharing between secondary users (SU s) and incumbent users. Despite its benefits, SAS 's design requirements, as set by FCC, present privacy risks … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 19 publications
0
16
0
2
Order By: Relevance
“…While AFC-like database systems have previously been used for enabling coexistence between incumbent and unlicensed devices [92], studies on the impact of Wi-Fi devices on the performance of fixed services operating in the 6 GHz bands have so far been inconclusive. The Fixed Wireless Communications Coalition estimates that if Wi-Fi devices are permitted to operate within the incumbent users' exclusion zone, fixed service links can fail entirely with 1.6% probability.…”
Section: Coexistence With Incumbent Technologies a Coexistence Inmentioning
confidence: 99%
“…While AFC-like database systems have previously been used for enabling coexistence between incumbent and unlicensed devices [92], studies on the impact of Wi-Fi devices on the performance of fixed services operating in the 6 GHz bands have so far been inconclusive. The Fixed Wireless Communications Coalition estimates that if Wi-Fi devices are permitted to operate within the incumbent users' exclusion zone, fixed service links can fail entirely with 1.6% probability.…”
Section: Coexistence With Incumbent Technologies a Coexistence Inmentioning
confidence: 99%
“…A digital-token-based spectrum access platform is proposed in [10] wherein a smart contract system is used by primary spectrum users as a trusted third-party service for advertising and leasing spectral tokens to secondary users. In [11], a hierarchical blockchain framework called TrustSAS is formulated to enable efficient and privacy-preserving spectrum sharing among secondary users. Local blockchain networks are established among secondary users for spectrum query aggregation and response distribution while a global blockchain is used for general policies and records keeping.…”
Section: Prospect Of Blockchain Solutions To Decentralized Sasmentioning
confidence: 99%
“…The PAL users are responsible for establishing local blockchain networks which help a central regulator reduce its workload in spectrum sharing coordination. In contrast to the decentralized SAS objective, these proposals generally assume absolute trust on either a third-party contract platform [10] or an authoritative SAS server [11], [12] and do not consider the security impact of malfunctioning or malicious SAS servers.…”
Section: Prospect Of Blockchain Solutions To Decentralized Sasmentioning
confidence: 99%
“…Based on the above, various spectrum access technologies such as Cognitive Radios (CRs) [6]- [8], Spectrum Access Systems (SAS) [9], [10], Licensed Shared Access (LSA) [11]- [17], etc., have been studied in literature. While CRs allow secondary users to access the spectrum of primary users in either underlay, overlay or interweave fashion, SAS and LSA are regularized evolutions of existing CRs.…”
Section: Introductionmentioning
confidence: 99%
“…Now, i) using the value of r k d g from (32), ii) using (3)- (6), iii) considering the fact that the covariance of independent and identically distributed (i.i.d.) random variables is zero [41], iv) by making the approximations κ U 1 and κ B 1, and v) ignoring the product terms β U (β B )κ B (κ U ), (33) can be written as (10) In a similar way by using (2), the covariance matrix of the total residual interference plus noise term for k u g -th UL user (i.e. Σ k u g ) can be derived as (11).…”
mentioning
confidence: 99%