Filters








292 Hits in 5.7 sec

Combinatorial Spectrum E-Auction for 5G Heterogeneous Networks: A Zether-Based Approach

Zijun Zhao, Zuobin Ying, Zhiming Cai, Jianfeng Ma, Ke Gu
2021 Security and Communication Networks  
Aiming at overcoming these obstacles above, we proposed a blockchain-based combinatorial spectrum e-auction framework.  ...  We provide the auction security by leveraging Σ -Bullets, a zero-knowledge proof mechanism.  ...  Recently, Chen et al. proposed SAFE, a general secure e-auction framework with privacy preservation [11] .  ... 
doi:10.1155/2021/1360560 fatcat:c6viefz3zncpjmqizwuitvzmtm

When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges [article]

Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
2021 arXiv   pre-print
We review the existing solutions for integrating blockchain and auction models, with some application-oriented taxonomies generated.  ...  Complementary features between blockchain and auction models trigger a great potential for research and innovation.  ...  As a result, market-driven spectrum auctions have emerged as promising solutions for spectrum allocation [103] .  ... 
arXiv:2110.12534v1 fatcat:tpy2cv7sz5dc3dpchnmrniab5e

A Secure and Fair Double Auction Framework for Cloud Virtual Machines

Ke Cheng, Wei Tong, LeLe Zheng, Jiaxuan Fu, Xutong Mu, Yulong Shen
2021 IEEE Access  
[28] first present an information-theoretically secure framework ITSEC for truthful spectrum auctions. The following work [10] has improved the efficiency of ITSEC.  ...  A. DOUBLE AUCTION FOR CLOUD VMS ALLOCATION We introduce an advanced scheme DAM for double cloud auction [1] .  ...  SC f t transfers to the winning seller costS j as a reward. 8: SC f t transfers to the auctioneer costB i − costS j as a reward.  ... 
doi:10.1109/access.2021.3089492 fatcat:i74un73gvrckneqo3hocgnyeim

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information  ...  This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks.  ...  The spectrum auction proposed in [138] guarantees that the PU's revenue is not too low. However, this approach is used only for the PU with a single channel.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
, coverage optimization, efficient task allocation, and security.  ...  This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT).  ...  Security protocols, e.g., the lightweight security protocol [250] , which guarantees the bid secrecy up until the opening phase is required. 4) Payment security: Payment process is crucial to stimulate  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe

Technical Issues on Cognitive Radio-Based Internet of Things Systems: A Survey

Faroq A. Awin, Yasser M. Alginahi, Esam Abdel-Raheem, Kemal Tepe
2019 IEEE Access  
INDEX TERMS Cognitive radio, spectrum sensing, IoT, MAC, spectrum accessing, spectrum sharing, spectrum management, security, data privacy, blockchain, machine learning.  ...  The benefits of CR systems would be to [4]: • relieve spectrum scarcity by broadcasting on unused spectrum and avoiding interference with primary licensee, VOLUME 7, 2019 This work is licensed under a  ...  Stackelberg game is adopted to model the interaction between the relays and the users to find the optimal power allocation, and auction-based power allocation algorithms can be used for resource allocation  ... 
doi:10.1109/access.2019.2929915 fatcat:orlccnbvpffqbkg45dtdl6iyau

A Survey on Spectrum Management for Unmanned Aerial Vehicles (UAVs)

Mohammed A. Jasim, Hazim Shakhatreh, Nazli Siasi, Ahmad Sawalmeh, Adel Aldalbahi, Ala Al-Fuqaha
2021 IEEE Access  
Existing surveys mostly focus on UAV applications, channel models, and security challenges, with a lack of studies on spectrum management in the context of UAV networks.  ...  Motivated by this observation, this article presents a comprehensive survey on spectrum management for UAV operations.  ...  Lightweight Link resiliency and redundancy along with restoration schemes for UAV networks present a key research area here.  ... 
doi:10.1109/access.2021.3138048 fatcat:2h5ls7ywo5g3bbz454gqatvkw4

PASTRAMI: Privacy-preserving, Auditable, Scalable Trustworthy Auctions for Multiple Items [article]

Michał Król, Alberto Sonnino, Argyrios Tasiopoulos, Ioannis Psaras, Etienne Rivière
2020 arXiv   pre-print
PASTRAMI uses threshold blind signatures and commitment schemes to provide strong privacy guarantees while making bidders accountable.  ...  It leverages the Ethereum blockchain for auditability, combining efficient off-chain computations with novel, on-chain proofs of misbehaviour.  ...  We present the design and evaluation of PAS-TRAMI, a framework for private, secure and efficient multiitem auctions.  ... 
arXiv:2004.06403v3 fatcat:saeyrp7hwzbv7kyqss4yxuf2lq

PASTRAMI

Michal Król, Alberto Sonnino, Argyrios Tasiopoulos, Ioannis Psaras, Etienne Rivière
2020 Proceedings of the 21st International Middleware Conference  
PASTRAMI uses threshold blind signatures and commitment schemes to provide strong privacy guarantees while making bidders accountable.  ...  It leverages the Ethereum blockchain for auditability, combining efficient off-chain computations with novel, on-chain proofs of misbehaviour.  ...  A Blind BLS signatures We recall the cryptographic construction of the blind BLS signature [9] used in our implementation. For the sake of  ... 
doi:10.1145/3423211.3425669 fatcat:bsdr5ngotjeozkqt4ze3hv6gpu

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Tang, Shaojie, +, TPDS Jan. 2014 2-11 A Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large- Scale Networks.  ...  Sun, W., +, TPDS Nov. 2014 3025-3035 Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-Scale Networks.  ...  on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Guest Editorial Special Issue on UAV Communications in 5G and Beyond Networks—Part II

Qingqing Wu, Jie Xu, Yong Zeng, Derrick Wing Kwan Ng, Naofal Al-Dhahir, Robert Schober, A. Lee Swindlehurst
2021 IEEE Journal on Selected Areas in Communications  
The article "Joint subchannel allocation and power control in licensed and unlicensed spectrum for multi-cell UAV-cellular network" considers the resource and interference management problem in a novel  ...  For the trajectory design subproblem, an auction-based algorithm is developed to compete for the computing resources of UAVs.  ... 
doi:10.1109/jsac.2021.3090897 fatcat:22i7u6tzevb6vgdrwflhzsv34u

A Trust-Centric Privacy-Preserving Blockchain for Dynamic Spectrum Management in IoT Networks [article]

Jingwei Ye, Xin Kang, Ying-Chang Liang, Sumei Sun
2021 arXiv   pre-print
Two smart contracts are designed to make the whole procedure (spectrum sensing, spectrum auction, and spectrum allocation) run automatically.  ...  In this paper, we propose a trust-centric privacy-preserving blockchain for dynamic spectrum access in IoT networks.  ...  Spectrum auction, as a common and fair way for spectrum allocation, is chosen to achieve that.  ... 
arXiv:2106.13958v1 fatcat:4jnsc4w6pjaftgzkrwop2vtmiu

PSPAB: Privacy-preserving average procurement bidding system with double-spending checking

Li Li, Jiayong Liu, Peng Jia, Rongfeng Zheng, He Debiao
2020 PLoS ONE  
To address this problem, we propose PSPAB, a lightweight, secure average procurement bidding system based on cryptographic tools, to provide full privacy for bids.  ...  ensuring strong privacy protection for the bids of suppliers.  ...  Furthermore, by using the Paillier cryptosystem and garbled circuits, two privacy-preserving and truthful double auctions for spectrum allocation were proposed in different application scenarios [9, 21  ... 
doi:10.1371/journal.pone.0240548 pmid:33119611 fatcat:7yefruhscbgnrd7p3rz3eqiyou

Blockchain for 5G and Beyond Networks: A State of the Art Survey [article]

Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne
2019 arXiv   pre-print
In this paper, we provide a state-of-art survey on the integration of blockchain with 5G networks and beyond.  ...  and security provision.  ...  For this purpose, authors use smart contracts in conjunction with virtual cryptocurrency to develop a coalitional spectrum sharing game for optimizing spectrum allocation.  ... 
arXiv:1912.05062v1 fatcat:ecitoeu5ijh6flblgm74fpvmz4

Seizing the Mobile Moment: Spectrum Allocation Policy for the Wireless Broadband Century

Charles Davidson, Michael Santorelli
2010 Social Science Research Network  
Purcell, Section 332 of the Communications Act of 1934: A Federal Regulatory Framework That Is "Hog Tight, Horse High, and Bull Strong, " 50 FED. COMM.  ...  With regard to spectrum, the FCC, in 1994, implemented a radical new allocation strategy: auctioning off portions of the airwaves instead of just giving them away."'  ...  Nearly all wireless carriers provide subscribers with a variety of options for using wireless data."'  ... 
doi:10.2139/ssrn.1562826 fatcat:4w733fb6zzapdam6raitvtt534
« Previous Showing results 1 — 15 out of 292 results