Return to search

Primary User Obfuscation in an Incumbent Informed Spectrum Access System

With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance. / Master of Science / With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.

Identiferoai:union.ndltd.org:VTETD/oai:vtechworks.lib.vt.edu:10919/104015
Date24 June 2021
CreatorsMakin, Cameron
ContributorsElectrical Engineering, Dietrich, Carl B., Dhillon, Harpreet Singh, Liu, Lingjia
PublisherVirginia Tech
Source SetsVirginia Tech Theses and Dissertation
Detected LanguageEnglish
TypeThesis
FormatETD, application/pdf
RightsIn Copyright, http://rightsstatements.org/vocab/InC/1.0/

Page generated in 0.0014 seconds