33
Spectrum Enforcement in a Spectrum Sharing World Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Laboratory Collaborations and discussions with: Victor Bahl (MSR) Vladimir Brik, Arunesh Mishra, Vivek Shrivastava (UW-Madison) Marco Gruteser, Sangho Oh (Rutgers), Edward Suh (Cornell) Jon Peha, Adrian Perrig (CMU)

Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Spectrum Enforcement in aSpectrum Sharing World

Suman BanerjeeWisconsin Wireless and NetworkinG Systems

(WiNGS) Laboratory

Collaborations and discussions with: Victor Bahl (MSR)Vladimir Brik, Arunesh Mishra, Vivek Shrivastava (UW-Madison)

Marco Gruteser, Sangho Oh (Rutgers), Edward Suh (Cornell)Jon Peha, Adrian Perrig (CMU)

Page 2: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Measurement studies

[Data from SharedSpectrum.com report]

ISM unlicensed band

Page 3: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Measurement studies

PCS band

[Data from SharedSpectrum.com report]

Page 4: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Measurement studies

UHF TV channels

[Data from SharedSpectrum.com report]

Page 5: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Measurement studies

UHF TV channels

[Data from SharedSpectrum.com report]

Dynamic spectrum sharing between primaries and secondaries

Page 6: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Dynamic spectrum sharing

• Regulatory bodies– Such as FCC, Ofcom

• Primary user– Owns the spectrum

(through a long-term lease)

• Secondary user– Need limited,

opportunistic, access to spectrum

• Spectrum brokers– Aggregates unused

spectrum and makes it available to secondary users

Page 7: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Design goals

• High utilizationTime

Page 8: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Design goalsTime

Unknown PHY/MAC modulations

• High utilization

• Flexible usage

Page 9: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Design goalsTime

Unknown PHY/MAC modulations

• High utilization

• Flexible usage

• Verifiable use

Illegal use

Page 10: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Design goals

• High utilization

• Flexible usage

• Verifiable use

• Certifiable X-ware

Page 11: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Requirements

• Violation detection should be– Fast

Build confidence among primary owners

– Accurate – Automated

Page 12: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Approach I• Secure spectrum rights management

– A Secure secondary license (slice)

Spectrumserver

Slicemanagement

Spectrum Monitoring Engine (SME)

Secondaryuser

machine

Defines boundaries of space, time, and frequency

Page 13: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Approach I• Secure spectrum rights management

– A Secure secondary license (slice)

Spectrumserver

Slicemanagement

Spectrum Monitoring Engine (SME)

Secondaryuser

machine

Various DRM-like issues: Slice resales, single use vs multi-use, slice revocation, etc.

Page 14: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Real-time spectrum management

Somebasic protocolmechanisms

• Secure spectrum rights management

Page 15: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Approach I• In-band spectrum enforcement

– Disable communication on violation

Spectrumserver

Slicemanagement

Sliceverification

Spectrum Monitoring Engine (SME)

Secondaryuser

machine

Hardware-based implementation of slice verification

Page 16: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

A power fence

Page 17: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

• In this example, implemented in software

Enforcing the power fence

Page 18: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Approach II

• Out-of-band spectrum violation detection– Radiometric identification (PARADIS)– Automated localization (RADAR, Horus, others)

Page 19: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Radiometric identification

• Utilize unforgeable characteristics of wireless RF front-end– Usually imperfections acquired during manufacturing

process

Page 20: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Errors do not inhibit decoding

Page 21: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Some examples

Others include: Frequency error, SYNC correlation, I/Q origin offset

Page 22: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Some examples

Others include: Frequency error, SYNC correlation, I/Q origin offset

Page 23: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Frame frequency error

Page 24: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Identification overview• Collect radiometric samples of permitted

transmitters

Page 25: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Identification overview• Collect radiometric samples of permitted

transmitters

• Build radiometric profiles (models)

Page 26: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Identification overview• Collect radiometric samples of permitted

transmitters

• Build radiometric profiles (models)

• Use profiles to classify incoming transmissions

Page 27: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Identification overview• Collect radiometric samples of permitted

transmitters

• Build radiometric profiles (models)

• Use profiles to classify incoming transmissions

• Currently implemented schemes– k-Nearest Neighbors (kNN)– Support Vector Machines (SVM)

Page 28: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Identification overview• Collect radiometric samples of permitted

transmitters

• Build radiometric profiles (models)

• Use profiles to classify incoming transmissions

• Currently implemented schemes– k-Nearest Neighbors (kNN)– Support Vector Machines (SVM)

Page 29: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Overall performance

SVMkNN

0.0034%3%-20%4138PARADIS

0%0%8%33%1030Hall et. al.

0%0%15%5%817Franklin et. al.

Equivalent performanceof PARADIS

Error reported

Trainingfraction

BinSize

NICpop.

Scheme

Experimented on ORBIT testbed with identical Atheros-based 802.11 NICs

Page 30: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

A more careful look

Page 31: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

A more careful look

Page 32: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

More results

• Designed against temperature changes

• Can deal with node mobility

• Can handle NIC aging

Page 33: Spectrum Enforcement in a Spectrum Sharing World Suman ...€¦ · Approach I • Secure spectrum rights management – A Secure secondary lice nse (slice) Spectrum server Slice management

Summary

• Spectrum enforcement may be a critical piece in facilitating dynamic spectrum sharing

• Needs planned hardware and software design

• Requires regulatory processes as well