Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum

被引:2
作者
Fernando, Pramitha [1 ]
Dadallage, Keshawa [2 ]
Gamage, Tharindu [2 ]
Seneviratne, Chathura [2 ]
Braeken, An [3 ]
Madanayake, Arjuna [4 ]
Liyanage, Madhusanka [5 ]
机构
[1] Vrije Univ Brussel, Fac Engn, B-1050 Brussels, Belgium
[2] Univ Ruhuna, Dept Elect & Informat Engn, Galle 80000, Sri Lanka
[3] Vrije Univ Brussel, Ind Engn Dept, B-1050 Brussels, Belgium
[4] Florida Int Univ, Elect & Comp Engn Dept, Miami, FL 33199 USA
[5] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
基金
爱尔兰科学基金会;
关键词
Consensus protocol; Sensors; 6G mobile communication; Stakeholders; Regulators; Internet of Things; Consensus algorithm; Spectrum management; dynamic spectrum access; spectrum sensing; spectrum misuse; blockchain; consensus mechanism; elliptic curve cryptography; zero knowledge proof; MANAGEMENT; NETWORKS; SECURITY;
D O I
10.1109/TCCN.2023.3291366
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The exponential growth in connected devices with Internet-of-Things (IoT) and next-generation wireless networks requires more advanced and dynamic spectrum access mechanisms. Blockchain-based approaches to Dynamic Spectrum Access (DSA) seem efficient and robust due to their inherited characteristics such as decentralization, immutability, and transparency. However, conventional consensus mechanisms used in blockchain networks are expensive to be used due to the cost, processing, and energy constraints. Moreover, addressing spectrum violations (i.e., unauthorized access to the spectrum) is not well-discussed in most blockchain-based DSA systems in the literature. In this work, we propose a newly tailored energy-efficient consensus mechanism called "Distributed-Proof-of-Sense (DPoS)" that is specially designed to enable DSA and detect spectrum violations. The proposed consensus algorithm motivates blockchain miners to perform spectrum sensing, which leads to the collection of a full spectrum of sensing data. An elliptic curve cryptography-based zero-knowledge proof is used as the core of the proposed mechanism. We use MATLAB simulations to analyze the performance of the consensus mechanism and implement several consensus algorithms in a microprocessor to highlight the benefits of adopting the proposed system.
引用
收藏
页码:1110 / 1125
页数:16
相关论文
共 41 条
[1]  
Al-Shawabka A, 2020, IEEE INFOCOM SER, P646, DOI [10.1109/INFOCOM41043.2020.9155259, 10.1109/infocom41043.2020.9155259]
[2]  
Ariyarathna T, 2019, IEEE WCNC
[3]   A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions [J].
Arjoune, Youness ;
Kaabouch, Naima .
SENSORS, 2019, 19 (01)
[4]   Public key versus symmetric key cryptography in client-server authentication protocols [J].
Braeken, An .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) :103-114
[5]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[6]   A Multi-Blockchain Scheme for Distributed Spectrum Sharing in CBRS System [J].
Cheng, Zhiyang ;
Liang, Yifei ;
Zhao, Youping ;
Wang, Shuo ;
Sun, Chen .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2023, 9 (02) :266-280
[7]   Co-Primary Spectrum Sharing for Inter-Operator Device-to-Device Communication [J].
Cho, Byungjin ;
Koufos, Konstantinos ;
Jantti, Riku ;
Kim, Seong-Lyun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (01) :91-105
[8]   Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond [J].
Dai, Yueyue ;
Xu, Du ;
Maharjan, Sabita ;
Chen, Zhuang ;
He, Qian ;
Zhang, Yan .
IEEE NETWORK, 2019, 33 (03) :10-17
[9]   Information Propagation in the Bitcoin Network [J].
Decker, Christian ;
Wattenhofert, Roger .
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2013,
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208