Fundamental Limits on Ex-Post Enforcement and Implications for Spectrum Rights

被引:1
作者
Muthukumar, Vidya [1 ]
Sahai, Anant [1 ]
机构
[1] Univ Calif Berkeley, EECS, BLISS, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Wireless spectrum; radio spectrum management; cognitive radio; criminal law; law enforcement; spectrum regulation; enforcement game; coexistence; COGNITIVE RADIO NETWORKS; PHY-LAYER AUTHENTICATION; CRIME; PUNISHMENT; GAME;
D O I
10.1109/TCCN.2017.2747579
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The combination of emerging new communication technologies, economic growth, and limited amounts of available spectrum necessitate dynamic tiered sharing. This paper builds on the "spectrum jails" paradigm-a model for light-handed expost enforcement. We consider the situation of sharing spectrum between a single primary (higher-tier) user and a single secondary (lower-tier) user. Analyzing this as a two-player game that could be played Stackelberg or simultaneous, we examine what kinds of primary and secondary rights can be credibly enforced. We show that the primary can trust that it will be protected from too much harmful interference and we show how the regulator can set the ex-post enforcement parameters to do this no matter which secondary user becomes capable of using the band. It is impossible to give a universal guarantee to all secondary users that the primary will never make false reports ("cry wolf") against them. However, it is possible to show that "compatible" secondary users will trust that the primary user will not make false reports against them when the spectrum opportunity is sufficiently attractive for secondary users.
引用
收藏
页码:491 / 504
页数:14
相关论文
共 47 条
[31]   SenseLess: A Database-Driven White Spaces Network [J].
Murty, Rohan ;
Chandra, Ranveer ;
Moscibroda, Thomas ;
Bahl, Paramvir .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (02) :189-203
[32]  
Muthukumar V, 2017, IEEE INT SYMP INFO, P2498, DOI 10.1109/ISIT.2017.8006979
[33]   Competitive pricing for spectrum sharing in cognitive radio networks: Dynamic game, inefficiency of Nash equilibrium, and collusion [J].
Niyato, Dusit ;
Hossain, Ekram .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :192-202
[34]   Spectrum auctions: Yesterday's heresy, today's orthodoxy, tomorrow's anachronism. Taking the next step to open spectrum access [J].
Noam, E .
JOURNAL OF LAW & ECONOMICS, 1998, 41 (02) :765-790
[35]  
Polinsky AM, 1999, 6993 NBER
[36]   AN ECONOMIC-THEORY OF THE CRIMINAL-LAW [J].
POSNER, RA .
COLUMBIA LAW REVIEW, 1985, 85 (06) :1193-1231
[37]   A Technical Framework for Light-Handed Regulation of Cognitive Radios [J].
Sahai, Anant ;
Woyach, Kristen Ann ;
Atia, George ;
Saligrama, Venkatesh .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (03) :96-102
[38]  
Takats E., 2007, A Theory of Crying Wolf: The Economics on Money Laundering Enforcement
[39]   What is a Spectrum Hole and What Does it Take to Recognize One? [J].
Tandra, Rahul ;
Mishra, Shridhar Mubaraq ;
Sahai, Anant .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :824-848
[40]   Game theory for cognitive radio networks: An overview [J].
Wang, Beibei ;
Wu, Yongle ;
Liu, K. J. Ray .
COMPUTER NETWORKS, 2010, 54 (14) :2537-2561