4.7 Article

Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection

Journal

IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 21, Issue 5, Pages 1829-1846

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2020.3032434

Keywords

Synthetic aperture sonar; Surveillance; Switches; Bandwidth; Wireless fidelity; Analytical models

Funding

  1. NSF [CNS-1527696]
  2. ARO [W911NF-15-2-0102]

Ask authors/readers for more resources

Spectrum activity surveillance is crucial for DSA systems, improving spectrum efficiency and detecting malicious users, but implementing it is challenging. To address these challenges, a three-factor space is introduced, with a two-step solution proposed to tackle the SAS problem.
Spectrum activity surveillance (SAS) is essential to dynamic spectrum access (DSA)-enabled systems with a two-fold impact: it is a primitive mechanism to collect usage data for spectrum efficiency improvement; it is also a prime widget to collect misuse forensics of unauthorized or malicious users. While realizing SAS for DSA-enabled systems appears to be intuitive and trivial, it is, however, a challenging yet open problem. On one hand, a large-scale SAS function is costly to implement in practice; on the other hand, it is not clear how to characterize the efficacy and performance of monitor deployment strategies. To address such challenges, we introduce a three-factor space, composed of spectrum, time, and geographic region, over which the SAS problem is formulated by a two-step solution: 3D-tessellation for sweep (monitoring) coverage and graph walk for detecting spectrum culprits, that is, devices responsible for unauthorized spectrum occupancy. In particular, our system model transforms SAS from a globally collective activity to localized actions, and strategy objectives from qualitative attributes to quantitative measures. With this model, we design low-cost deterministic strategies for dedicated monitors, which outperform strategies found by genetic algorithms, and performance-guaranteed random strategies for crowd-source monitors, which can detect adversarial spectrum culprits in bounded time.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available