Sie sind auf Seite 1von 19

110 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO.

2, JUNE 2016

An Overview of Dynamic Spectrum Sharing:


Ongoing Initiatives, Challenges, and a
Roadmap for Future Research
Sudeep Bhattarai, Jung-Min (Jerry) Park, Bo Gao, Member, IEEE, Kaigui Bian, and William Lehr

Abstract—We are in the midst of a major paradigm shift in how and for all uses accelerates. This includes legacy and new
we manage radio spectrum. This paradigm shift is necessitated users; communication and sensing applications; wide-area and
by the growth of wireless services of all types and the demand local-area networks; commercial and government users; etc.
pressure imposed on limited spectrum resources under legacy
management regimes. The shift is feasible because of advances in As the demand for spectrum continues to skyrocket, it will
radio and networking technologies that make it possible to share become increasingly difficult, if not impossible, to meet that
spectrum dynamically in all possible dimensions—i.e., across fre- demand through the legacy spectrum policy based on the
quencies, time, location, users, uses, and networks. Realizing the assignment of siloed, exclusive-use spectrum bands to par-
full potential of this shift to Dynamic Spectrum Sharing will ticular applications. For instance, according to Cisco, Global
require the co-evolution of wireless technologies, markets, and
regulatory policies; a process which is occurring on a global scale. mobile data traffic will increase nearly eightfold between 2015
This paper provides a current overview of major technological and 2020 [2]. Moreover, the legacy management regime is
and regulatory reforms that are leading the way toward a global inadequately flexible, making it difficult to transition spec-
paradigm shift to more flexible, dynamic, market-based ways to trum resources to new uses, users, and technologies as
manage and share radio spectrum resources. We focus on current market conditions shift further aggravating the artificial spec-
efforts to implement database-driven approaches for manag-
ing the shared co-existence of users with heterogeneous access trum scarcity associated with outmoded, legacy regulatory
and interference protection rights, and discuss open research frameworks.
challenges. What is needed is a paradigm shift toward a world in which
Index Terms—Dynamic spectrum sharing, dynamic spectrum spectrum is shared more intensively and flexibly—or equiva-
access, spectrum access system (SAS), spectrum regulatory policy, lently, dynamically—among all classes of users and uses. This
radio spectrum management. includes both Incumbent Users (IUs), or those with legacy
access rights to spectrum, and Secondary Users (SUs), or those
who are seeking access to additional spectrum. Realizing this
I. I NTRODUCTION paradigm shift requires the co-evolution of radio networks,
ADIO spectrum is not only a key enabler of tech- wireless markets and business models, and the regulatory rules
R nological innovations in wireless communications, but
it also plays an important role as an economic growth
and mechanisms—or, regimes—that govern how spectrum is
shared among all classes of IUs and SUs.
engine, as highlighted in the 2012 U.S. President’s Council Realizing that enabling Dynamic Shared Spectrum is one of
of Advisors on Science and Technology (PCAST) report, the key strategies for mitigating the artificial spectrum short-
“Realizing the full potential of government-held spectrum age problem, academia, the wireless industry, regulators, and
to spur economic growth” [1]. The impact of spectrum on other stakeholders in the U.S. and a number of other coun-
the national economy is expected to increase as the pro- tries have undertaken initiatives to break-down the legacy silos
liferation of wireless devices and applications of all types of exclusive-spectrum usage models and address the technical
and policy challenges in expanding spectrum sharing options.
Manuscript received February 1, 2016; revised June 23, 2016; accepted In this paper, we provide a comprehensive overview of the
July 8, 2016. Date of publication July 19, 2016; date of current version current status of significant regulatory initiatives underway
September 1, 2016. This work was partially sponsored by NSF through grants
1314598, 1265886, 1431244, and 1547241, and by the industry affiliates of the globally to facilitate the transition toward a regime of Dynamic
Broadband Wireless Access & Applications Center and the Wireless@Virginia Shared Spectrum, with a special focus on database-driven
Tech group. The associate editor coordinating the review of this paper and models, which have been shown to offer promise as a cost-
approving it for publication was M. Zorzi.
S. Bhattarai and J.-M. Park are with the Bradley Department of Electrical effective and reliable approach for managing sharing among
and Computer Engineering, Virginia Tech, Blacksburg, VA 24061-0131 USA multiple classes of users with heterogeneous access rights and
(e-mail: sbhattar@vt.edu). radio network technologies [3]–[6]. In Section II, we sum-
B. Gao is with the Institute of Computing Technology, Chinese Academy
of Sciences, Beijing 100190, China. marize some of the earlier literature on spectrum sharing and
K. Bian is with the Institute of Network Computing and Information clarify some of our terminology. We follow this in Section III
Systems, Peking University, Beijing 100871, China. with a summary of the ongoing spectrum reform efforts within
W. Lehr is with the Computer Science and Artificial Intelligence Laboratory,
Massachusetts Institute of Technology, Cambridge, MA 02139 USA. the U.S. and several other countries. In Section IV, we address,
Digital Object Identifier 10.1109/TCCN.2016.2592921 in general terms, a key concern of spectrum management—the
2332-7731 c 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 111

need to manage interference among heterogeneous users and In multiple ways, all of these initiatives represent progress
discuss how that challenge is changing as we move toward toward enabling Dynamic Spectrum Access (DSA). In the
more dynamic sharing models. In Section V, we discuss how engineering and technical standards literature, DSA is often
the challenge is being addressed in several important spec- used to refer to the “real-time adjustment of spectrum uti-
trum bands. In Section VI, we consider another important lization in response to changing circumstances and objec-
challenge confronting dynamic spectrum management—the tives” [28], and is usually assumed to be enabled by or
need to protect the confidentiality and security of spectrum coincident to the use of Cognitive Radio (CR) and/or Software
users in light of management frameworks that require shar- Defined Radio (SDR) capabilities or technologies. CR has
ing significant information about the location and usage of been defined as “an approach to wireless engineering wherein
spectrum resources. In Section VII, we identify some of the radio, radio network, or wireless system is endowed
the open research questions. Section VIII provides summary with awareness, reason, and agency to intelligently adapt
conclusions. operational aspects of the radio, radio network, or wireless
system” [29]. SDRs implement radio functionality in software
rather than hardware, thereby facilitating the adaptive func-
II. S PECTRUM ACCESS AND M ANAGEMENT R EGIMES tionality that characterizes CRs. In the full-blown scenario,
Spectrum resources are artificially scarce, in part, because CR-“smart” radio systems would collectively sense and ana-
static, legacy regulatory regimes inhibit the adoption of tech- lyze their local radio environment, negotiate optimal sharing
nologies and usage practices that would allow spectrum to arrangements, and then adapt their radio operating parame-
be shared more intensively. Policymakers have recognized ters (i.e., frequency, power, modulation, transmission timing,
for many years that legacy management regimes need to be direction of transmission, and other waveform characteristics)
reformed to allow greater scope for market-forces to direct to maximize shared use of local spectrum resources. The con-
how spectrum resources are used and to create incentives and cept of shared/dynamic spectrum access represented by this
opportunities for the commercialization of innovative and more vision is presented in Figure 1(a).
efficient radio technologies [7], [8]. Although significant progress has been made in develop-
The critical need for increasing commercial access ing CR, SDR, and other smart radio technologies, we are still
to shared spectrum was emphasized in the National far from being able to actually realize the full-blown scenario
Broadband Plan, [9] which was unveiled by the U.S. described above. Realizing this vision depends on the com-
Federal Communications Commission (FCC) in 2010. The mercial deployment of new radio technologies, the adoption
subsequent U.S. Presidential Memoranda—Unleashing the of new spectrum access regime, and regulatory reforms. In
Wireless Broadband Revolution [10] and Expanding America’s the past five years, a number of surveys have been published
Leadership in Wireless Innovation [11]—issued executive that describe the current status of enabling technologies such
mandates to implement policies to expand access to shared as CRs and SDRs [30], [31], -or provide a taxonomy of the
spectrum. Under the auspices of the White House, the various ways in which spectrum may be managed so as to
FCC and the National Telecommunications and Information enable more extensive spectrum sharing [32], [33]. One such
Administration (NTIA) are taking aggressive steps to realize example is illustrated in a figure reproduced from the METIS
the vision outlined in the Presidential Memoranda. In the U.S., project [34], a recently concluded European project that was
the recently completed Advanced Wireless Services (AWS)-3 focused on developing technologies for 5G (see Figure 1(b)).
auction [12], progress on enabling shared access to TV white Figure 1(b) lays out various regulatory rights regimes for
spaces [13], and ongoing progress in the FCC’s 3.5 GHz and managing spectrum access, ranging from exclusive licensed
5 GHz proceedings [14], [15] show promise in advancing spectrum (used by cellular operators and television broad-
this vision of increased spectrum sharing in multiple bands, casters) to unlicensed spectrum access (used by Wi-Fi and
including between commercial and federal government users. Bluetooth). In the exclusive licensed regime, a single oper-
Regulatory bodies in other countries have also put in motion ator manages how spectrum is shared among the spectrum
spectrum-related initiatives, and, in some cases, have estab- users; whereas in the unlicensed regime, sharing is uncoordi-
lished regulations with the aim of improving spectrum utiliza- nated. These two models represent points on a continuum of
tion efficiency through shared spectrum access. These efforts potential sharing regimes, wherein different tiers of users may
include the studies and initiatives undertaken by the United have different rights to access the spectrum and to protection
Kingdom’s Office of Communications (Ofcom) [16]–[18], from potential interference caused by other users. One shar-
Industry Canada [19], [20], Infocomm Development Authority ing model that has the features of both of the aforementioned
of Singapore (IDA) [21], [22], China’s IMT-20201 [23], Radio regimes is Licensed Shared Access (LSA). In LSA, an IU
Spectrum Policy Group in Europe [24]–[26], and the European with previously exclusive-usage rights tolerates shared access
Communications Office [27]. from a new SU, who is allowed to share pursuant to a frame-
work that ensures mutual protection from interference. Current
1 IMT-2020 (5G) Promotion Group was jointly established in February 2013 implementations of this framework rely on a database-driven
by three ministries of China based on the original IMT-Advanced Promotion mechanism to enforce the sharing arrangement [33].
Group. The members include the main operators, vendors, universities, and In these and other regulatory frameworks, DSA is more
research institutes in China. The Promotion Group is the major platform
to promote 5G technology research in China and to facilitate international than just a technical vision. It also encompasses a framework
communication and cooperation. for managing the spectrum access and usage rights, including
112 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

Fig. 1. Dynamic spectrum sharing and spectrum access schemes.

protection from interference and other management rights to detect the presence of high-power, high-site (TV transmit-
(e.g., the right to exclude or pre-empt other users, the right ters with large HAAT (height above average terrain)), and fixed
to sub-lease or transfer management of the spectrum; as well TV stations. The TVWS devices must register with a database
as obligations to obey operating rules). A full-featured DSA that dictates how and when they can access the spectrum. To
management regime will have technical, regulatory, and busi- obtain spectrum availability information from the database, a
ness/market mechanisms in place to enable spectrum resources TVWS device needs to submit a spectrum query to it that con-
to be dynamically reallocated and shared across users (e.g., tains its operational parameters (e.g., type of device, location,
government and commercial) and uses (e.g., sensing and com- etc.). Two IEEE standards, namely IEEE 802.22 and IEEE
munications) on a more fine-grained and granular basis along 802.11af, were developed to enable communications in the
any potential technical dimension (i.e., frequency, time, space, TVWS.
direction of transmission, etc.) and under a variety of differing 2) AWS-3 Band: In January 2015, the FCC completed
rights models (e.g., real-time spectrum markets, administered an auction of AWS-3 licenses in the 1695 − 1710 MHz,
sharing among multiple tiers of PU and SUs with changing 1755 − 1780 MHz, and 2155 − 2180 MHz bands (collectively
usage rights, etc.). In this paper, we use DSA more loosely called “AWS-3” bands) [12]. The incumbents of this band are
to refer to the full range of business, regulatory, and/or tech- federal systems, including the federal meteorological-satellite
nically enabled ways in which enhanced sharing models are (MetSat) systems. Cellular service providers will share this
being enabled. In so doing, we diverge from the technical liter- band with the incumbents based on manual coordination of
ature that restricts DSA to refer to spectrum usage paradigms protection zones to protect the federal systems [36].
that require or make use of CR or SDR technologies or capa- 3) 3.5 GHz Band: Per its recent Report and Order
bilities. As argued elsewhere, we need to evolve toward these and Second Further Notice of Proposed Rule Making
expanded sharing models, and in so doing, will enhance the (FNPRM) [14], the FCC has opened up the 3.5 GHz
likelihood that CR, SDR, and other advanced radio technolo- (3550 − −3700 MHz) band to SU access. This band will
gies will be commercialized successfully [35]. Our broader now be home to the new Citizens Broadband Radio Service
interpretation of what constitutes DSA is intended to highlight (CBRS). The entrant users will share the spectrum among
how the matrix of regulatory reforms and evolving sharing themselves and incumbents through a three-tiered access
concepts discussed in subsequent sections are contributing to model composed of the Incumbent Access (IA), Priority
the expansion of options and capabilities for sharing spectrum Access (PA) and General Authorized Access (GAA) tiers (see
more flexibly and dynamically. In the next section, we review Figure 2). The harmonious coexistence among the three tiers
some of the regulatory initiatives underway. of users is ensured through the employment of an automated
frequency assignment and control database mechanism known
as the Spectrum Access System (SAS). The FNPRM [14]
III. R ECENT S PECTRUM I NITIATIVES
also prescribes the use of a network of spectrum sensors,
A. Spectrum Initiatives in the U.S. called Environmental Sensing Capability (ESC), to detect the
1) TV Band: In September 2010, the FCC issued final rules presence of IUs and aid the SAS in assessing the spectrum
to allow low power unlicensed devices to operate on unused environment.
channels in the TV broadcast bands (often called the TV white IA users include authorized federal and grandfathered fixed
spaces (TVWS)) in the U.S. [13]. Concerned about the techni- satellite service users currently operating in the 3.5 GHz band.
cal capabilities of sensing and the risk of interference, the FCC These users will be protected from harmful interference from
mandated a database-driven approach, attesting to the chal- PA and GAA users. The PA tier consists of Priority Access
lenges of Cognitive Radio (CR) systems, even when employed Licensees (PALs) that will be assigned using a competitive
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 113

process of creating a new set of rules for this band which


would be ultimately referred to as the U-NII-4 band. For
more details of activities surrounding U-NII-4 band, specif-
ically sharing between 802.11 and DSRC, readers are referred
to [39].
In the ongoing proceedings for the 5 GHz band, there
is a growing contention between unlicensed LTE (includ-
ing License Assisted Access (LAA) and LTE-Unlicensed
(LTE-U)) and Wi-Fi stakeholders for access to the band.
Several industry entities, mainly Wi-Fi stakeholders, have
raised concerns over the introduction of LTE-U/LAA in the
unlicensed bands. Because of the ongoing, sometimes con-
Fig. 2. Three-tiered access model of the CBRS band. tentious, debate between the LTE and Wi-Fi communities
regarding the coexistence of the two technologies, the FCC,
in May 2015, formally sought comments on a range of topics
bidding process within the 3550 − 3650 MHz portion of the related to the LTE-U/LAA technologies [40]. More recently,
band. Each PAL is defined as a non-renewable authorization to in August 2015, the LTE-U and Wi-Fi stakeholders held a
use a 10 MHz channel in a single census tract for up to three- meeting to discuss these coexistence issues [41]. We will pro-
years. At maximum, a total of seven PALs may be assigned in vide more details on the coexistence issues between Wi-Fi and
any given census tract with up to four PALs going to any single unlicensed LTE in Section V.
applicant. Applicants may acquire up to two-consecutive PAL 5) Millimeter Wave Bands: In August of 2013, the FCC
terms in any given license area during the first auction. The changed its rules in the 57 − 64 GHz band, commonly known
GAA tier is licensed-by-rule to enable open, flexible access to as the 60 GHz band, to improve the use of unlicensed spectrum
the band for the widest possible group of potential users. GAA for high-capacity, short-range outdoor backhaul, especially for
users are permitted to use any portion of the 3550−3700 MHz small cells [42]. The 60 GHz band is allocated on a co-
band not assigned to a higher tier user and may also operate primary basis to the federal mobile, fixed, inter-satellite and
opportunistically on unused PA channels. radio-location services; and to non-federal fixed, mobile and
The envisioned SAS for the U.S. 3.5 GHz-based CBRS band radio-location services. Under Part 18 of the new rules, indus-
supports coexistence among heterogeneous wireless access trial, scientific and medical (ISM) equipment may also operate
technologies, specifically PAL and GAA users, in a centralized in the 60 GHz band at 61.25 GHz ±250 MHz.
fashion. It maintains a registry of all coexisting devices in the On October 16, 2003, the FCC adopted a Report and
band along with their geo-operational status. SAS acts as a Order [43] establishing service rules to promote non-federal
highly automated spectrum access coordinator that facilitates development and use of the millimeter wave spectrum in the
coexistence among heterogeneous devices across the band and 71 − 76 GHz, 81 − 86 GHz and 92 − 95 GHz bands, which
prevents interference events by enforcing the band’s usage pol- are allocated to non-federal government and federal govern-
icy. It protects higher tier users from interference from lower ment users on a co-primary basis. Specifically, the Report
tier users, while simultaneously seeking to ensure maximal and Order permits the issuance of an unlimited number of
spectrum availability for lower tier PAL and GAA users and non-exclusive, nationwide licenses to non-federal government
their harmonious coexistence [14]. The SAS architecture will entities for all 12.9 GHz of spectrum. It did not require prior
be designed based on the specific use-case scenario of the coordination among non-federal government licensees assert-
3.5 GHz band to support a harmonious coexistence among ing that interference is unlikely due to the “pencil-beam”
heterogeneous wireless access technologies of similar/different nature of the transmissions in this service. However, realiz-
spectrum access hierarchy. ing that this scheme will delay and perhaps hinder industry
4) 5 GHz Band: In 2013, the FCC, in its Notice of Proposed efforts to use the 70/80 GHz band as anticipated, the FCC, on
Rule Making (NPRM), announced that it intends to mod- March 3, 2005, issued Memorandum Opinion and Order [44]
ify rules that govern the operation of Unlicensed National and changed the original decision. The new rules require non-
Information Infrastructure (U-NII) devices and make available federal government users to finish all interference analyses
an additional 195 MHz of spectrum in the 5 GHz band [37]. prior to equipment installation. Furthermore, the FCC recently
The NPRM prescribed sharing the Intelligent Transportation issued an NPRM for seeking comments on authorizing mobile
System (ITS) band (5.85−5.925 GHz) with unlicensed devices operations in the 28 GHz, 37 GHz, 39 GHz, and 64 − 71 GHz
and allow the latter (specifically 802.11ac/802.11ax systems) bands [45].
to have access to more wideband channels (80 MHz and As summarized above, the NTIA and the FCC have
160 MHz). Later, in 2014, the FCC released First Report and put into action several initiatives with the aim to expand
Order [38] with the goal of increasing the utility of 5 GHz wireless broadband use, increase sharing, and ultimately
band by modifying certain U-NII rules and testing procedures meet the 500 MHz goal specified in the 2010 Presidential
that ensure that U-NII devices do not cause harmful inter- Memorandum [10]. The NTIA’s fifth interim progress
ference to the IUs (Dedicated Short Range Communications report released in 2015 states, “Between October 2010 and
(DSRC) systems) of these bands. Currently, the FCC is in the September 2014, NTIA and the FCC formally recommended
114 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

or otherwise identified for study for potential reallocation technical and operational requirements for TVWS devices,
up to 589 MHz” [46]. This total includes 335 MHz in which broadly follows the U.S. requirements in terms of equip-
federal or shared bands and between 152 − 254 MHz in non- ment types and technical characteristics [52]. Currently, IC is
federal bands. An additional 960 MHz is slated for potential in the process of defining rules for certifying the database and
future study for repurposing. All together, the NTIA and the the TVWS devices.
FCC have made available or are investigating for potential 5) Singapore: Singapore’s IDA, in November 2014,
re-purposing between 1, 447 and 1, 549 MHz of bandwidth approved the rules enabling access to TVWS based on a
under 6 GHz. license-exempt basis provided that devices comply with the
technical requirements specified by the IDA, contact a licensed
B. Spectrum Initiatives Outside the U.S. database to obtain channel availability, and are registered with
1) European Commission: In November of 2012, the the IDA following a comprehensive validation process [22].
European Commission solicited opinions on spectrum shar- The device types and requirements are broadly in line with the
ing issues concerning LSA which is the key concept that has U.S. model, although Singapore allows for variable effective
been studied for realizing spectrum sharing in various bands isotropic radiated power (EIRP) levels.
in Europe [47]. LSA ensures guarantees in terms of spec- 6) China: China is actively studying how much spectrum
trum access and interference protection to the incumbent(s) as in which bands will be needed to support 5G in its domes-
well to the LSA licensees, and hence provides a predictable tic market. In 2013, a promotional group called IMT-2020
quality of service to both parties [48]. Spectrum sharing via (5G) was established to define relevant standards and require-
LSA can be realized across frequency, time, and geographical ments and to facilitate the development of 5G systems in
dimensions. China. Its primary goal is to start the commercialization of
2) United Kingdom: As part of the 2015 World 5G networks in China by 2020. So far, IMT-2020 has identi-
Radio Conference (WRC-15) preparatory process, the fied 450 − 470 MHz, 698 − 806 MHz and 3400 − 3600 MHz
European Conference of Postal and Telecommunications bands as candidate bands for 5G development [23]. Several
Administrations (CEPT) analyzed possible sharing of Wi- other bands in the range 6 − 100 GHz are also being consid-
Fi with incumbent users in 5350 − 5470, 5725 − 5850 and ered for further studies on channel measurements, modeling
5850 − 5925 MHz bands in order to develop a European and coexistence.
Common Position—i.e., defining a common set of rules for 7) New Zealand: Starting in November 2014, Radio
governing access to the 5 GHz band. In addition, Ofcom Spectrum Management—the government entity in charge of
recently issued a call for inputs, which sought views on the spectrum in New Zealand—initiated a temporary arrangement
bands that are to be discussed under WRC-15 agenda item 1.1 for access to TVWS in New Zealand, which allows interested
and sought views on the suitability of these bands for use by parties to obtain licenses for operation of TVWS devices at
mobile or wireless broadband including the 5 GHz bands for channels that will be specified in the license [53]. This TVWS
Wi-Fi [49]. Furthermore, in February of 2015, Ofcom finalized access plan does not employ the database-driven spectrum
its decision to allow SUs to access the unused parts of radio sharing approach, but devices are required to be complaint
spectrum in the 470−790 MHz band through dynamic sharing with relevant regulatory standards which are similar to the
controlled by a spectrum database [50]. Under this plan, the ones adopted by the FCC.
spectrum that is not utilized by Digital Terrestrial Television 8) Field Trials of LSA in Europe: In April of 2013, the
(DTT) (including local TV) and PMSE services is shared with first field trial of shared use of the 2.3 GHz band with a live
TVWS devices on a license-exempt basis. LTE network was successfully demonstrated in Finland [54]
3) France: In France, The Agence Nationale des by taking into consideration the inputs from all stakehold-
Fréquences (ANFR) is considering sharing the 2.3 GHz, ers including regulators, incumbents, mobile operators and
5.8 GHz, 17.7 − 19.7 GHz bands [51]. Incumbents of the equipment-supplying industries. Later, in May of 2015, Nokia
2.3 GHz bands are telemetry and other defense applications, performed another field trial using LTE network and LSA con-
and the expected secondary users are mobile/cellular ser- troller, and rebutted the potentials of LSA in realizing effective
vice providers. ANFR is considering opening up this band in spectrum sharing [55]. Altogether, it is expected that the
the regime of the LSA framework, which affords guaranteed 2.3−2.4 GHz band will be one of the first bands to be opened
access to spectrum and protection against harmful interfer- up for LSA-based sharing in Europe. However, implementing
ence to both the incumbents as well as the LSA licensees. LSA in this band will entail some challenges as the band is
In the 5.8 GHz band, a geolocation-based approach is being currently used for various incumbent applications, including
considered to support the coexistence between the road government services as well as program making and special
tolling application and Intelligent Transportation Systems. The events (PMSE) services, in different European countries.
17.7 − 19.7 GHz band is being considered for spectrum shar- A timeline of spectrum initiatives, both inside and outside
ing between fixed service microwave services (as IUs) and the U.S., is shown in Figure 3.
uncoordinated fixed satellite services (as SUs).
4) Canada: In 2012, Industry Canada (IC)—the govern-
ment entity in charge of spectrum management in Canada— IV. P ROTECTING I NCUMBENTS
released its policy decision to enable access to TVWS [20]. To ensure the viability of spectrum sharing, certain key
In Feb. 2015, IC published a specification describing the requirements must be met. One of those requirements is
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 115

Fig. 3. Timeline of spectrum initiatives.

managing radio interference. For wireless communications multi-tiered access models) from interference generated by
to work, receivers need to be able to disentangle their lower-tier users. In general, mechanisms for incumbent pro-
desired signals from background noise which may come from tection can be classified into two categories: i) ex ante (a.k.a.
either unintentional (e.g., radiating power lines) or intentional preventive) mechanisms, ii) ex post (a.k.a. punitive) mecha-
transmitters operating either in the same (in-band) or other nisms [56], [57]. Ex ante mechanisms are designed to reduce
(out-of-band) frequencies. Historically, the basis for exclusive the probability of occurrence of harmful interference events,
assignments was to ensure that the radio users of the spectrum while ex post mechanisms are designed to identify and/or adju-
would be protected from harmful interference from transmis- dicate malicious or selfish behavior after harmful interference
sions from unaffiliated intentional transmitters. The operator events have occurred. Ex ante and ex post approaches work in
with exclusive access could be expected to manage in-band tandem (but not in isolation), and thus the choice of an ex ante
interference from its affiliated users, but needed protection approach affects how ex post enforcement is carried out [57].2
from unaffiliated users transmitting in the spectrum as well In the following sub-sections, we discuss various technical
as from out-of-band interference from users in other bands. and regulatory approaches that have been employed to manage
If the goal is to expand access to spectrum, then an impor- the collective interference environment, and will discuss ways
tant challenge is to ensure adequate protection both for IUs, the in which enforcement mechanisms may change to enable more
legacy rights holders and users of the spectrum, and the SUs, dynamic sharing models. To simplify the exposition, we will
or new spectrum users who will be accessing the spectrum. presume that IUs have a right to interference protection from
Multiple schemes are feasible for managing multiple tiers of SUs, whose right to access the spectrum is contingent on their
users. For example, public safety access may have the right compliance to the IU interference protection requirement.
to preempt other traffic, whether the public safety users are
IUs or SUs in a particular band, and whether the other users
A. Ex Ante (Preventive) Approaches
are commercial or government users, etc. More typically, it is
often assumed that the IUs have primary usage and interfer- Ex ante approaches are mechanisms used to prevent interfer-
ence protection rights by virtue of their legacy incumbency. ence events to the IUs. Examples include the use of exclusion
They may have to tolerate interference from other co-primary zones (EZs), policy based radios [58], secure radio middle-
IUs. The new users, or SUs, have secondary usage and inter- ware [59], tamper-resistance techniques [60], radio integrity
ference protection rights. The SUs may access and use the assessment techniques [61] and hardware-based compliance
spectrum so long as they do not interfere with the IUs, but modules [62]. Among these measures, exclusion zones (a.k.a.
may be protected from still lower-tier users and may need to protection zones) is the primary ex ante spectrum enforce-
tolerate interference from same-tier SUs. ment scheme used by the regulators to protect IUs from
In any case, the sharing framework that provides differing
levels of interference protection to different classes of spec- 2 The characterization of ex post/ex ante mechanisms as preventive/punitive

trum users needs to be enforced so that the rules are respected is an over-simplification to facilitate discussion. For example, today’s ex post
enforcement is tomorrow’s ex ante enforcement; and “carrot” incentives may
by all spectrum users. In general, mechanisms for interfer- be viewed as negative penalties (e.g., credits for a history of non-interfering
ence protection protect incumbents (or higher-tier users in operations).
116 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

SU-generated interference [63]. The legacy notion of an exclu-


sion zone (EZ) is a static spatial separation region defined
around an IU, where co-channel (and possibly also adjacent-
channel) transmissions by SUs are not allowed. An EZ needs
to achieve two, seemingly opposing, objectives: (i) protect IUs
from interference caused by SUs; and (ii) enable efficient uti-
lization of spectrum by the SUs. However, the legacy notion
of EZs is inept at achieving those objectives, primarily due to
the fact that it is overly conservative and static [57], [63], [64].
The notion of a static EZ implies that it has to protect incum-
bents from the union of likely interference scenarios, resulting
Fig. 4. MIPZ framework.
in a worst-case and very conservative solution.
1) Legacy Notion of Incumbent Protection Zones: In order
to protect incumbents (i.e., TV broadcast stations) operating EZs can significantly reduce the economic benefits of spectrum
in the TV bands, the U.S. FCC employs F-curves that define sharing, and may seriously hinder its adoption due to the lack
a protected service contour around an incumbent. An F-curve, of interest from potential SU wireless industry stakeholders.
F(x, y), ensures a probabilistic guarantee that, inside the TV 2) New Models for Incumbent Protection: To fully reap
coverage region, the received TV signal is above a given the benefits of spectrum sharing, there is a need to employ
threshold x% of the time in y% of the locations [13], [65]. incumbent protection approaches that strike an optimal balance
Then, an appropriate safety margin is added to the protected between two key objectives—viz., reliably protect IUs from
service contour, often in the form of a minimum separation dis- interference and maximize spectrum access opportunities for
tance from the edge of the protected service contour, to derive SUs. Achieving such a balance is not feasible with the legacy
appropriate EZs for both co-channel and adjacent-channel SU notion of EZs, and a more agile approach is needed. One
operations. such approach is the use of multi-tiered dynamic incumbent
In the AWS-3 band, the NTIA recently prescribed protection zones (MIPZ) proposed by Bhattarai et al. [63].
Coordination Zones (CZs) for sharing these bands with wire- MIPZ is a novel framework for systematically designing an
less broadband systems (WBSs) [36]. A CZ is not an EZ where EZ that can adjust its boundaries by dynamically adapting to
SUs are prohibited, but it is the area inside which a WBS may changes in the interference environment. MIPZ is designed
operate provided that it meets the requirements for coordina- for database-driven spectrum sharing (e.g., SAS), and it pro-
tion with federal incumbents [66]. Specifically, NTIA’s rules tects IUs by providing a probabilistic guarantee of interference
require each AWS-3 licensee, prior to its first operations in protection. Specifically, MIPZ consists of three zones—(i) No
its AWS-3 licensed area, to reach a coordination arrangement Access Zone (NAZ) where SU operation is strictly prohib-
with each Federal agency [67]. After a successful coordination ited, (ii) Limited Access Zone (LAZ) where only a “limited”
arrangement, the AWS-3 licensee will be notified with oper- number of SUs are allowed to operate, and (iii) Unlimited
ating conditions that specify the terms in which the licensee Access Zone (UAZ) where SUs have unencumbered access to
may begin operations, or denial of request. Even if an AWS- the spectrum. Figure 4 shows a simplified (considering circu-
3 licensee is allowed to operate inside a CZ, it must tolerate lar EZs), as well as a practical (considering irregular EZs),
possible interference from the IUs. For further details on coor- model of the MIPZ framework. For technical details pertain-
dination procedures in the AWS-3 band, readers are referred ing to the computation of NAZ-LAZ (inner) and LAZ-UAZ
to [36]. (outer) boundaries, readers are referred to [63].
The legacy protection zones, as they are defined today, On one hand, stringent technical requirements and risks
often result in an overly conservative approach for incum- of interference to the IUs (especially passive IUs) have
bent protection that unnecessarily limits the SUs’ spectrum made spectrum sharing approaches that rely solely on sens-
access opportunities. A good example of this can be seen in ing less popular recently [71]. On the other hand, exper-
the U.S. TV bands. To account for possible deep fades, the imental results from recent studies have shown that shar-
IEEE 802.22 working group specifications require detectors to ing approaches that rely solely on databases alone may
have a sensitivity of −116 dBm which corresponds to a safety offer inaccurate and stale information of spectrum avail-
margin of roughly 20 dB (equivalent to an increased radius of ability [72]–[74]. State-of-the-art research has shown that
an EZ up to 110 km) [68], [69]. However, in most situations, incorporating real-time sensing data with a database-driven
the probability of such deep fades is very low, and hence the approach is more effective in maximizing spectrum access
specifications unnecessarily constrain spectrum access oppor- opportunities for SUs than using either a sensing or a database
tunities for the SUs. Another example can be seen in the approach in isolation [63], [71], [72], [75], [76]. Hence,
proposed use of EZs to protect incumbents in the 3.5 GHz researchers proposed a concept called Radio Environment
band. In [70], the NTIA proposed the use of EZs that cor- Map (REM) [73], [77]–[79], which incorporates a statisti-
doned off vast areas inland of the east and west coast of the cal fusion of multiple sources of incumbent characteristics
U.S. to protect the navy’s ship-borne radar systems. Some have and offers improved spectrum access opportunities for SUs.
estimated that nearly 60% of the U.S. population reside inside A recent study is the work of Gao et al. [6] who proposed
these EZs [57]. The deployment of such overly conservative a multi-tiered spectrum sharing framework, similar to MIPZ,
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 117

that incorporates sensing results into a database-driven sharing radio transmissions to accommodate the passive measurements
approach and refines the EZ boundary to take advantage of the whenever and wherever needed.
fallow spectrum that is not captured by database-driven shar- Another scenario in which time-sharing can be employed
ing alone. Authors of [6] also studied strategies to incentivize is the coexistence of EESS systems and active secondary sys-
spectrum sensing that can be incorporated in their proposed tems. To protect low-orbit EESS systems, SAS can employ
framework. a no access zone (i.e., a region where no SUs are allowed to
3) Protecting Passive Incumbents: In the preceding para- transmit) that moves in synchronization with the satellite foot-
graphs, we focused on protecting incumbents that actively emit print’s movement, similar in concept to a dynamic exclusion
RF energy. In this section, however, we focus on a very dif- zone. In essence, spectrum access is being coordinated through
ferent scenario that involves spectrum sharing between passive the SAS, and the IUs and the SUs are time-sharing the spec-
sensing systems (as IUs) and active communication systems trum. This notion of time-sharing is possible because most
(as SUs). In this scenario, the IUs are receiver-only passive passive sensing applications require access to particular seg-
systems, such as systems for earth exploration satellite service ments of the spectrum for relatively short durations only, and
(EESS), radio astronomy (RA), or remote sensing. Such pas- these durations can be pre-scheduled based on the information
sive systems strive to observe extremely faint signals that are about the satellite’s spectrum usage, orbital path, velocity, and
emitted by distant non-coordinating transmitters. The signal- the location and size of its instantaneous footprint on the earth.
to-noise ratio (SNR) of the signal that needs to be detected can
be as low as -60 dB [80]. This constraint forces the passive
systems to use very sensitive receiver-antenna systems which,
B. Ex Post (Punitive) Approaches
in turn, make them highly vulnerable to interference, much
more so than active communication systems [81]. In general, ex post enforcement approaches involve one or
There are other issues that make spectrum sharing between more of the following four enforcement steps:
active and passive systems different from sharing between 1) Monitoring/Logging Interference Events: This step
active systems. For example, geographic separation does not involves collecting information about users’ activities that can
apply to many EESS whose footprint covers a large area on later be used in adjudication procedures, if deemed neces-
the Earth’s surface; frequency separation may not be appli- sary. In essence, logging the details of interference events is
cable to RA systems because radio astronomers are often equivalent to collecting forensic evidence, which cannot be
interested in a large swath of the radio spectrum as different repudiated by the suspected interferer, during the adjudication
physical processes produce electromagnetic radiation at dif- process.
ferent frequencies; and time sharing may not be feasible for 2) Identifying Non-Complaint Transmitters: This step
passive systems that require continuous sensing. Therefore, involves the reliable identification and, if possible, authentica-
spectrum sharing between passive and active systems requires tion of the interference source. In the literature, identification
an understanding of the operational and functional nature of mechanisms at the upper layers of the protocol stack have
each passive system and identification of the most suitable been used to authenticate or uniquely identify transmitters.
dimension (in time, frequency, or space), which should be used However, these approaches are of limited value in ex post
to carry out spectrum sharing with active users. enforcement, because the enforcement entity (e.g., FCC) may
One existing approach for protecting terrestrial passive sys- not know the upper layers of the protocol stack used by the
tems is to locate them in an area that is far away from high interference source, and, as a consequence, is unable to decode
population density areas and is devoid of industrial develop- the upper layer signaling needed to identify the interferer. For
ment (e.g., RA telescope at Green Bank, WV, USA). The this reason, authentication or identification at the PHY-layer
majority of interference that is detected in such remote sites is the most appealing approach for ex post enforcement.
is due to extra-terrestrial sources, interference propagation PHY-layer authentication is an active area of research,
through the ionosphere, or tropospheric scatter from remote and several schemes have been proposed, which can be
transmitters [82]. To mitigate such interference, unilateral broadly categorized into two classes: intrinsic and extrin-
techniques such as excision, cancellation and anti-coincidence sic approaches. The former utilizes the transmitter-unique
are often employed [83]. However, the efficacy of the legacy “intrinsic” characteristics of the waveform as unique sig-
unilateral approaches is inherently limited by the lack of natures to authenticate/identify transmitters. They include
coordination with the active sources of interference. More RF fingerprinting, and electromagnetic signature identifica-
importantly, such unilateral approaches are not conducive to tion [84]–[87]. Extrinsic schemes enable a transmitter to
efficient utilization of the spectrum. “extrinsically” embed an authentication signal (e.g., digital sig-
To enable efficient sharing between incumbent passive sys- nature) in the message signal and enable a receiver to extract it.
tems and secondary active systems, a bilateral approach that Such schemes include PHY-layer watermarking [88]–[91] and
considers coordination between the two parties is needed, transmitter authentication [92]–[98]. On one hand, the intrin-
and this coordination can be handled by a spectrum man- sic approaches require the blind receiver to have only a little
agement entity such as a SAS. Cooperative interference mit- knowledge about the transmission parameters to authenticate
igation techniques coordinate the timing and regional use of the transmitter, but they are limited by their low robustness
the radio spectrum in a more dynamic manner. Active sys- against noise and security attacks [99]. On the other hand, the
tems can cooperate by briefly interrupting or synchronizing extrinsic approaches can be made highly robust against noise
118 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

and security threats, but they require the blind receiver to have should be to encourage and, if possible, incentivize SUs to
complete knowledge about the transmission parameters. self-regulate and obey access rules, and not to mete out
In some ex post enforcement scenarios, the enforcement heavy-handed punishments to misbehaving users.
entity may not have knowledge of the PHY-layer parameters In the U.S., the responsibility of interference resolution
used by the rogue or mal-functioning transmitters. In such and spectrum enforcement is centralized in the Enforcement
situations, conventional PHY-layer authentication schemes Bureau of the FCC. In carrying out its enforcement activi-
(e.g., [88], [89], and [92]–[95]) cannot be used, because ties, the Enforcement Bureau has several punitive measures
in those schemes, the verifier needs to know all of the at its disposal, including imposing monetary forfeitures, issu-
PHY-layer parameters to correctly authenticate the transmit- ing cease and desist orders, and revoking operating authority
ter. Kumar et al. [100] recently addressed this important (e.g., a station license). Traditionally, the Enforcement Bureau
issue by proposing a scheme that realizes blind transmitter has relied on a number of enforcement tools, one of which
authentication (BTA). The authors coin the term BTA to refer is call signs and related identifiers. Call signs or call letters
to the problem of authenticating a transmitter by extracting have been used since the early days of wireless communica-
its unique, identifiable information from the received signal tions to uniquely identify transmitting stations. By listening
with little or no knowledge of the PHY-layer transmission to and deciphering the call letters or related identifiers of an
parameters. interfering fixed (but not mobile) transmitter, a regulator can
Note that most of the aforementioned schemes can be read- identify and, if the geographic coordinates associated with the
ily circumvented if tamper-resistance or integrity protection transmitter are known, locate the transmitter. Another legacy
mechanisms are not employed to thwart hackers from remov- enforcement tool is station licenses. To operate a station, an
ing or incapacitating the authentication mechanism used by operator has to first file an application for a station license to
the transmitter. There are a number of prior studies that have the FCC. The station license authorizes the licensee to oper-
attempted to address this issue [60], [101]. ate the station for a pre-determined period of time after which
Furthermore, PHY level identification may pose a threat to the license needs to be renewed. The threat of license revo-
privacy or security if access and use of the information is cation often acts as a strong incentive for operators to obey
not appropriately secured and in compliance with higher-layer the FCC’s rules. Another traditional tool worth mentioning is
(network or application layer) policies and protocols. Practical operator licenses. Traditionally, the FCC has required those
implementation of such techniques will need to consider such who operate and maintain transmitter stations to be licensed.
cross-layer design issues. (These issues are addressed further Unfortunately, most, if not all, of the traditional enforcement
in Section VI.) tools mentioned above have little value in spectrum sharing
3) Localizing Non-Complaint Transmitters: Once the mali- scenarios [108]. For instance, the utility of traditional call signs
cious or mal-functioning transmitter has been identified, the for enforcement activities has dwindled away to almost noth-
next step is to localize it. In database-driven spectrum shar- ing due to the widespread movement from analog transmitters
ing, SUs need to register with the database. Hence, it would to digital transmitters and from aural to data communica-
be straightforward for the database to know a rogue trans- tions. Station licenses cannot be used as an enforcement tool
mitter’s approximate location, assuming that the transmitter because most SUs (who opportunistically access fallow spec-
identification step has been successfully completed. The chal- trum) are unlicensed users in the envisioned SAS ecosystem.
lenge is to find out the precise geo-location of the rogue Further, operator licensing has been largely phased out in most
transmitter because it is unlikely that the rogue transmitter services. This is due to the fact that, in modern systems, proce-
would provide any cooperation for its location estimation. dures for accessing channels are controlled by computer logic,
Thus, the localization in cognitive radio networks has to be and minimal or no expertise on the part of the operator is
achieved via a non-interactive technique, e.g., by using local- required to ensure efficient operation and control interference.
izing techniques such as direction of arrival estimation, or by The limitations of legacy approaches for enforcing access
implementing sensors/receivers to measure the received signal rules in spectrum sharing scenarios necessitate the develop-
strength (RSS) [102]–[105]. The RSS is an indicator of the ment of a new set of enforcement tools. Interference resolution
link distance between a transmitter and a receiver. Hence, the and enforcement is one of the fundamental requirements that
information about the distances measured between the rogue must be met to enable government-commercial spectrum shar-
transmitter and a set of receivers through RSS measurements ing. The willingness of government agencies to share spectrum
can be merged at the regulator to localize the rogue transmitter. on a more expanded and dynamic basis depends on their
4) Adjudication and Resolution: In the final step of ex post confidence that the applicable regulations and rules regarding
enforcement, the non-compliant transmitter is adjudicated and interference will be effective and enforced in an appropriate
penalized. Malicious users can be penalized by either restrict- time frame [108]. Also, the value of shared government spec-
ing their access to the spectrum for a certain duration of trum to commercial entities depends on their confidence that
time or by imposing economic penalties. The severity of the the regulators have applicable rules and tools in place to effec-
punishment should be proportional to the severity of the non- tively control the number of interference incidents and have
compliant act and the estimated cost of the harm [106], [107]. the ability to resolve incidents promptly.
However, the implications of imperfect enforcement must also To enhance the efficiency of enforcement, it is important to
be taken into account when designing an ex post enforcement consider the design of ex ante and ex post frameworks con-
methodology. The primary goal of adjudication/penalization currently to ensure they are mutually re-enforcing so as to
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 119

maximize the likelihood of compliant behavior and minimize of 802.19.1-compliant systems (e.g., via registration), obtain-
the total costs imposed of ensuring such compliance. Creative ing/updating coexistence information (e.g., from databases),
approaches should be considered. For example, it may be fea- and using intelligent decision making algorithms to facilitate
sible to have negative penalties as part of an ex post regime. harmonious coexistence (e.g., decide which actions should be
Under these, radios which establish a record of good perfor- taken by networks to solve coexistence problems).
mance might be granted additional permissions or expanded
access to spectrum resources as way to incentivize compliance
with access and radio operation rules. Alternatively, crowd- B. 5 GHz Band: Coexistence Between Wi-Fi and LTE-U
sourcing and other techniques for distributing the costs and Recently, the 5 GHz bands have attracted significant interest
responsibilities for enforcement may augment and ease the for launching new wireless applications and services because
enforcement burden falling on traditional regulatory institu- of their favorable propagation characteristics and the rela-
tions such as the FCC. How to integrate such novel techniques tive abundance of spectrum therein (580 MHz in the U.S.,
into existing rules and institutional management frameworks 455 − 605 MHz in Europe, 325 MHz in China [117]).
poses an open research challenge. There are proposals from multiple industry stakeholders
such as Qualcomm and others to extend the deployment
of LTE-Advanced (LTE-A) to the 5 GHz U-NII bands by
V. C OEXISTENCE B ETWEEN H ETEROGENEOUS exploiting a number of available technologies, such as carrier
W IRELESS T ECHNOLOGIES aggregation (CA) and supplemental downlink (SDL) [118],
In the previous section, we focused on the general prob- [119]. This so-called pre-standard LTE-U approach is appli-
lem of interference protection as represented by the various cable to regions that do not have a Listen Before Talk (LBT)
mechanisms used to enforce coexistence between IUs and requirement on accessing the U-NII bands (e.g., U.S., China,
SUs. In this section, we discuss an equally important prob- and South Korea). For instance, CA/SDL can be used in LTE
lem, viz., techniques for assuring harmonious sharing between FDD mode to augment the data-carrying capacity of the down-
heterogeneous wireless access technologies. Compared to IU- link from the LTE eNodeB to the LTE user equipment (UE),
SU coexistence, SU-SU coexistence has attracted much less thus creating a fat downlink pipe. Control and management
attention from the regulators as well as the research com- functions, as well as time-critical communications, are likely
munity. This may be partially due to the experience in the to continue to take place over the licensed (“anchor”) channel.
ISM bands, where diverse technologies, such as Wi-Fi and In other regions of the world (e.g., Europe, Japan), regulators
Bluetooth, coexist harmoniously, in most situations, without require devices that wish to access the U-NII bands to execute
a common coexistence mechanism. However, the coexistence the LBT procedure at the milliseconds scale. Ongoing 3GPP
situation in the TV bands and other shared-access bands (e.g., standardization efforts that aim to make LTE compatible with
3.5 and 5 GHz bands) is more complex and challenging the LBT procedure are referred to as LAA. The introduction of
due to a number of reasons, including the use of devices LTE-U (or LAA) in the 5 GHz bands will require current and
with higher transmission power, disparity of PHY/MAC strate- future Wi-Fi technologies operating in these bands to share
gies employed by the secondary systems, and the competition spectrum with LTE-U (or LAA) devices.
among the commercial service providers that aim to augment Coexistence in the 5 GHz bands has been studied in several
their existing network capacity with additional capacity tapped previous works, which focused on different aspects, includ-
from those bands. ing channel interference, spectrum sharing, and scheduling.
Part of the challenge is that technologies like Wi-Fi rely
on distributed access control mechanisms whereas technolo-
A. TV Band: Coexistence Among SUs gies like LTE take advantage of operator-centralized control,
In order to address the coexistence issues among TVWS which proponents of distributed access models argue may give
devices, industry stakeholders have undertaken active steps LTE-like technologies an unfair advantage in accessing the
towards standardizing several TVWS technologies, includ- shared spectrum. An investigation of the performance of co-
ing ECMA-392 [109], IEEE 802.19.1 [110], 802.22 [111], existing LTE and WLAN on the license-exempt band [120]
802.11af [112], and 802.15.4m [113]. In addition, the DySPAN shows that WLAN technologies hold their transmissions when
Standards Committee formed a new 1900.7 task group (TG) to channel interference is detected, while LTE reduces its trans-
create another standard for TVWS [114]. To address the prob- mission speed in order to increase the transmission robustness.
lem of secondary network coexistence in TVWS, the 802.19.1 Authors of [121] propose to apply the Request-to-Send/Clear-
TG was formed [110], [115]. The purpose of the 802.19.1 to-Send (RTS/CTS) protocol to LTE eNodeBs, so that the
standard is to enable the family of 802 wireless standards to WLAN networks do not always yield to LTE transmissions.
most effectively use TVWS by providing standard coexistence A large number of related works study spectrum sharing.
methods among dissimilar or independently operated TVWS Xing et al. [122] propose an adaptive spectrum sharing
networks and dissimilar TVWS devices [116]. This standard technique in which LTE should adjust its subframe config-
addresses coexistence issues among IEEE 802 networks and uration periodically to adapt to the traffic load of WLAN
devices and will also be useful for non-IEEE 802 networks system. Authors of [123] propose spectrum sharing using a
and TVWS devices. It acts as an interface between coexist- spectrum consumption model. This mechanism considers spec-
ing networks, providing functionality related to identification trum management policies, including existing users convey
120 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

restrictions to new users, spectrum trading [124], service- mmWave bands has been proposed for 5G cellular systems.
level agreement [125], etc. Some works study the spectrum In general, mmWave communication systems cause less inter-
sharing in unlicensed band using game theory [126], [127]. ference to neighboring cells operating in the same frequency
Yun and Qiu [128] propose a new algorithm to decode two bands compared to communication at lower frequencies [130].
interfering cross technology Orthogonal Frequency Division The noise-limited behavior inherent in mmWave communica-
Modulation (OFDM) signals without alignment in time or fre- tion systems may allow them to share the spectrum without
quency. Although their algorithm allows LTE and Wi-Fi to any prior coordination. However, the requirement of highly
transmit simultaneously, the proposed estimation and decoding directional and adaptive transmissions, directional isolation
technology must be applied to each receiver device. between links, and significant possibilities of outage have
Enabling a fair coexistence between LTE-U and Wi-Fi is strong implications on multiple access, channel structure, syn-
challenging due to the disparity between their MAC protocols chronization, and receiver design [131]. In this regard, several
and the “greedy” nature of LTE-U. LTE-U adopts a schedule- industry stakeholders and regulatory bodies, including IMT-
based access approach, whereas Wi-Fi uses contention-based 2020 in China, OfCom in the U.K. and FCC in the U.S.,
random access. Although LTE-U employs a number of coex- have been actively seeking comments and proposals regarding
istence techniques (e.g., carrier-sensing adaptive transmis- coexistence mechanisms for bands above 6 GHz [23], [45].
sion (CSAT)), it still exhibits an inherently more aggressive
approach in accessing the spectrum compared to Wi-Fi. VI. S ECURITY AND P RIVACY I SSUES
Fairness is critically important in this case as the two coexist-
In the preceding two sections we discussed the important
ing technologies have the same spectrum access priority.
challenge of managing interference. Many of the mechanisms
discussed relied on the collection, analysis, and sharing of
C. 5 GHz Band: Coexistence Between Wi-Fi and DSRC information about the radio environment and spectrum usage
Wi-Fi stakeholders in the U.S. have been lobbying the gov- in order to ensure efficient collective use of the spectrum.
ernment for access to more spectrum in the 5 GHz bands Much of this information has the potential to pose a threat to
in order to deploy their next-generation technologies, such as the confidentiality and privacy of spectrum users. For example,
802.11ac and 802.11ax. In response to the rapidly accelerat- unauthorized access to the location, technical capabilities, or
ing adoption of Wi-Fi, particularly the burgeoning 802.11ac usage behavior of SUs or IUs could pose a significant threat
standard, the FCC issued an NPRM in 2013 [15] that recom- to users strategic interests and privacy. In this section, we turn
mends adding 195 MHz of additional spectrum by opening up to another important challenge: the need to protect the privacy
the ITS band (5.850 − 5.925 GHz), where DSRC users are the and confidentiality of information collected as a byproduct of
IUs, to unlicensed devices. Inclusion of the ITS band permits spectrum management.
one additional 80 MHz and one additional 160 MHz channel For example, the use of spectrum databases offers a prag-
for 802.11ac or 802.11ax. However, the realization of this sce- matic approach for enabling spectrum sharing between govern-
nario requires a careful design of the coexistence framework. ment (IU) and commercial users (SUs), but at the same time, it
The coexistence of ITS applications with Wi-Fi may severely incurs a number of security and privacy concerns by uninten-
degrade the performance of the former, especially safety appli- tionally facilitating the collection and aggregation of sensitive
cations that are very sensitive to communication latency [129]. information by adversial SUs [132]. Examples include threats
Moreover, when the ITS band was first allocated in 1999, the to the operational security (OPSEC) of the incumbents (e.g.,
FCC’s original intention was for this band to support DSRC Naval radar systems), privacy of the SUs (e.g., by poten-
for ITS exclusively, and hence the ITS protocol stack or the tially enabling location-tracking of individuals), and attacks
relevant applications designed thereafter were not designed to targeting the SAS infrastructure.
coexist with unlicensed devices.
The coexistence of DSRC and Wi-Fi raises a totally differ- A. OPSEC Threats to the Incumbents and Countermeasures
ent set of challenges than the ones discussed in Section V-B.
Although using geolocation databases is a practical and
In this case, DSRC is the incumbent user, and Wi-Fi is the
cost-effective approach for enabling spectrum sharing, it poses
secondary user with lower priority. Incumbent protection is
a potentially serious OPSEC problem. SUs (queriers), through
a major challenge because the incumbent users are highly
seemingly innocuous queries to the database, can infer oper-
mobile vehicular nodes that utilize spectrum in a dynamic
ational attributes (e.g., location, type, times-of-operation,
manner in spatial and temporal dimensions. The difficulty of
antenna attributes, receiver sensitivity, etc.) of the incumbents,
the problem is exacerbated by the fact that 802.11ac/802.11ax
and thus compromise their OPSEC [132]. Figure 5 illustrates
has a distinct advantage over DSRC in accessing the spectrum
this threat, which is referred to as an inference attack. A mali-
due to its shorter interframe space (IFS) values, which could
cious user can infer the sensitive data of incumbents even
have a very negative impact on the communication latency of
if the database does not directly reveal such information.
DSRC safety applications.
When incumbents are federal government systems, includ-
ing mission-critical military systems and public-safety entities,
D. Coexistence in Spectrum Bands Above 6 GHz such as in the U.S. 3.5 GHz band, this breach of incumbents’
Due to the scarcity of spectrum at frequencies below 6 OPSEC is a critical issue. Although potentially less serious,
GHz, the use of higher frequencies such as those in the OPSEC concerns may arise among commercial users who may
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 121

each other. Homomorphic encryption-based private informa-


tion retrieval [137] is another approach for accessing data
privately from an untrustworthy/semi-trusted database. Other
techniques that have been studied in the context of LBS
to preserve the users’ location privacy include sending a
space- or time-obfuscated version of the users’ actual loca-
tions [138], [139], hiding some of the users’ locations by using
mix zones [140], sending fake queries, indistinguishable from
real queries, issued from fake locations to the database [141],
and applying k-anonymity [142] to location privacy.

C. Security Threats to the SAS and Remedies


In addition to aforementioned threats to the security and pri-
vacy of the IUs and the SUs, there are other security concerns
Fig. 5. Indirect information access via inference channel. associated with database-driven spectrum sharing. One such
concern is the threats against the infrastructure that govern
spectrum access and sharing (i.e., SAS or SAS-like infrastruc-
be concerned about access to strategically sensitive informa- ture). Similar to the Internet’s DNS (Domain Name System),
tion by competitors or threats to the privacy of their customers it is expected that several physical SASs will be networked
from unauthorized access to database information. together to form a region-wide infrastructure. Therefore, some
The problem of incumbents’ OPSEC cannot be ade- of the security threats against DNS servers may be appli-
quately addressed by tightly controlling access to the database cable to the SAS as well. A malicious user may modify
because: i) all SUs need to access the database to realize its own device to masquerade as another certified device.
spectrum sharing, and ii) identifying malicious SUs is chal- An attacker can spoof a spectrum database and can mod-
lenging, especially when they are inside-attackers (i.e., legit- ify/jam the query sent by another device or modify/jam the
imate/authorized users performing illegitimate/unauthorized database-response that was intended for some other legitimate
actions). A more viable approach may be to “obfuscate” the device. Adversaries can maliciously alter the contents of the
information revealed by the database in an intelligent manner SAS (a.k.a. SAS poisoning). Malicious groups may redirect a
such that a certain level of OPSEC is assured while support- legitimate SAS’s traffic to another bogus server (a.k.a. SAS
ing efficient use of the spectrum [56]. Several obfuscation pharming). Similarly, denail-of-service to the legitimate SUs
schemes, such as perturbation, transfiguration, k-anonymity can be caused by bombarding a large number of bogus queries
and k-clustering, are proposed in [132]. Differential pri- to the SAS [56].
vacy [133] is another emerging privacy-preserving paradigm Most of the aforementioned security threats may
that provides a semantic privacy model with strong protection be addressed by implementing a two-way encrypted
guarantees: it captures the amount of disclosure that occurs authentication between the SAS and the SU (querier).
due to the publication of sensitive data in addition to mandat- Authentication thwarts masquerade and database spoofing
ing how the published data should look. A generalization of attacks. Cryptography-based integrity protection mechanisms
differential privacy, called “geo-indistinguishability”, has been (e.g., message authentication codes) prevent adversaries from
studied in [134] and [135] for protecting the location privacy modifying spectrum queries/responses without being detected,
of users in the context of location based services. and the same applies to the unauthorized modification of the
SAS contents. In terms of countering threats to the availability
B. Privacy Threats to the SUs and Countermeasures of SAS, maintaining redundancy in the SAS’s contents is
one straightforward technique. The efficacy of this technique
Another issue in database-driven spectrum sharing is the
has been demonstrated in several attack incidents of the past,
privacy of SUs. Since SUs need to send their operational
including the distributed-denial-of-service (DDoS) attack
attributes (e.g., identity, location, antenna parameters, etc.)
that was launched against DNS root servers in October of
to the database for obtaining the spectrum availability infor-
2007 [143].
mation in their region, their privacy may be threatened by
an untrustworthy/semi-trustworthy database. An example of
such a database is a compromised SAS that is managed VII. O PEN P ROBLEMS AND R ESEARCH C HALLENGES
by a commercial entity, which provides accurate spectrum While radio and networking technical capabilities have
availability information but may misuse the querier’s informa- improved substantially and while promising reform initiatives
tion for its own benefit. An untrustworthy or a compromised are underway enabling progress toward realization of the DSA
database can directly infer a SU’s information including its vision articulated earlier, much remains to be done. New radio
spectrum usage habits, device type, times of operation, mobil- capabilities breed new demands for access to spectrum, and
ity, etc. [136]. One way to counter this threat is to use a the continuing process of technical, market, and policy inno-
two-way authentication protocol between the SAS and the vations is continuously creating new SUs seeking access to
SU—it enables both the SAS and the SU to authenticate spectrum. There are a number of open challenges in both the
122 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

TABLE I
O PEN P ROBLEMS AND R ESEARCH C HALLENGES IN DYNAMIC S PECTRUM S HARING

technological and policy domains. Some of these are discussed advance our ability to quantify spectrum efficiency, harmful
in the following subsections and summarized in Table I. interference, spectrum value and fair access to the spectrum.
To increase the resolution of spectrum availability and uti-
lization, there is a need to augment the spectrum database
A. Spectrum Efficiency and Access content with real-time sensing results [75]. Advanced spec-
One of the key challenges in dynamic spectrum sharing is trum sensing techniques are needed to quickly and accurately
the effective management of spectrum resources. It requires identify transmission opportunities over a very wide spectrum
advancements in allocation and assignment mechanisms that pool that may host a large number of different wireless ser-
not only facilitate spectrum sharing, but also support mea- vices. However, designing a framework that enables the mar-
surement and dynamic assessment of the costs and benefits riage of database-driven and sensing-driven spectrum sharing
of sharing. It is a multidisciplinary challenge that requires approaches remains an open problem. Furthermore, sharing
a joint engagement of technical, economic and policy per- between users with different access-priorities confront novel
spectives [144]. Further research is needed to develop and challenges that demand study of new access paradigms and
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 123

protocols, dynamic and flexible incumbent protection zones, applications is another challenging problem that needs to be
and adaptive models for spectrum allocation and assignment. addressed.
We summarize open research challenges related to spectrum New advances in the areas of radio hardware, software,
efficiency and access in Category 1 and 2 of Table I. signal processing, protocols and access theory need to be
developed such that they will work in concert, flexibly
B. Coexistence and Interference Management and over time to support wireless technologies of diverse
needs. Fundamental limits in these areas also need to be
Facilitating harmonious coexistence among heterogeneous
explored. There is also a need to design hardware that pro-
wireless technologies is another challenge in dynamic spec-
vide improved geolocation capabilities for indoor applications,
trum sharing (see Category 3 of Table I). First and foremost,
direction-finding and interference-nulling capabilities. For sus-
specific metrics need to be established for assessing how well
tainability, research should focus on designing low power
devices are coexisting together. There is also a need to develop
energy-harvesting devices.
modulation schemes that adapt in concert with other sys-
Besides hardware, there is a need to develop simulation
tem components to enable interference mitigation/avoidance.
tools and software for evaluating the efficiency and scalabil-
Realistic propagation models, including inferential models
ity of newly proposed architectures. Frequency-, space-, and
(models that allow the prediction of signal loss at one fre-
time-cognizant protocols need to be developed for improving
quency from measurements at other), for frequencies that are
the spectral efficiency. Standards need to be defined for tech-
being considered for new applications enable regulators and
nologies such as carrier aggregation, database-access-protocol
policy makers to foresee the merits of coexistence in both
and radio propagation measurement for different bands. These
technological and non-technological aspects.
issues are outlined in Category 5 and 6 of Table I.
Future spectrum sharing scenarios require coexistence
among secondary users of the spectrum (e.g., LTE-U and
Wi-Fi in the 5 GHz band). Facilitating SU-SU coexistence D. Security and Enforcement
requires the development of techniques that have not been
The successful deployment of new spectrum access tech-
studied before. For example, even with TV white space sys-
nologies, such as cognitive radios, and the realization of their
tems using database approaches, the issue of how multiple
benefits will partly depend on the placement of essential secu-
white space networks might co-exist and coordinate with each
rity mechanisms in sufficiently robust form to resist misuse of
other is yet to be explored [110]. The databases inform the
the technologies. The emergence of new spectrum access tech-
radios which TV channels are available—they say nothing
nologies and spectrum utilization paradigms raise new security
about other data networks that might be trying to use the
challenges that have not been studied previously. Vulnerability
available TV channels.
studies of flexible spectrum access systems and development
Moreover, spectrum coordination or cooperation between
of countermeasures is central to realizing effective spectrum
disparate networks, such as a government network as an IU
sharing.
and a commercial mobile network as a SU, as required in U.S.
There is a need to study obfuscation techniques that meet the
3.5 GHz band, is just in the beginning phase. Sharing between
OPSEC requirements of incumbent users, especially military
government and commercial entities will require innovations
users, while enabling efficient spectrum utilization. Studies
in technology as well as in business, administrative, and mar-
must also focus on thwarting threats against the infrastruc-
ket institutions and practices. Special-purpose wireless systems
ture that govern spectrum access and sharing. Furthermore,
may be difficult to accommodate within bold new spectrum-
regulators and policy makers need to understand what data
use models because of fundamental limitations on frequency
from spectrum usage can be collected and analyzed to assess
agility due to basic operational requirements, extreme sensi-
spectrum utilization without infringing on the users’ privacy.
tivity to interference, or potentially drastic consequences due
Note that more reliable and effective enforcement regimes
to failure of a radio frequency link. Innovative solutions for
often result in greater infringement of the user’s privacy rights.
accommodating such systems are needed. These systems may
Multidisciplinary research efforts are needed to study this
include medical devices, surveillance, remote sensing, and
issue, and to explore the technical and sociological solution
passive systems such as radio telescopes. Furthermore, coex-
approaches for balancing the two, seemingly opposing, goals
istence with legacy systems is an additional challenge because
of enforcement and privacy.
of backward and forward inter-operability and compatibility.
Frequency agile radios combined with compliance and
enforcement requirements necessitate research in the follow-
C. Hardware, Software, Protocols and Standards ing areas: (i) automating the detection and identification of
Improving spectral efficiency and radio configurability for interference sources; (ii) creating mechanisms for rapidly
hardware and software-defined radios is crucial for enabling enforcing policy changes on radio devices; (iii) evaluating the
the commercialization of appropriate spectrum sharing cus- sociology of privacy, enforcement mechanisms, and potential
tomer and network equipment. This requires advancements in penalties; and (iv) evaluating the economic trade-offs in ex-
smart radio architectures that support high dynamic range for ante and ex-post mechanisms. As wireless systems become
wideband operation. New technologies and applications above more advanced, certifying new wireless devices (especially
6 GHz are a promising emerging area. Designing power effi- those which are based on software defined radio) for compli-
cient radios that support high bandwidth and multi-antenna ance becomes non-trivial because of the radio’s reconfigurable
124 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

and frequency-agile nature [145]–[147]. Beyond certification, institutional frameworks within which those technical systems
monitoring will be needed to ensure that deployed systems are operate and evolve. The technologies, business models, mar-
in compliance, and when they are not, enforcement procedures kets, and regulatory frameworks need to co-evolve. Category 8
will be needed to remedy the problems. Some of the open of Table I outlines some of the policy, regulatory and economic
problems and research challenges related to spectrum enforce- challenges in dynamic spectrum sharing.
ment, compliance and security are enumerated in Category 4
of Table I. VIII. C ONCLUSION
This paper has provided a comprehensive review of impor-
E. Experimentation, Testing and Standardization tant trends, regulatory reform initiatives, and research chal-
To ensure that the new technologies will not cause harm to lenges that are part of the ongoing systematic efforts to
legacy systems, are robust and secure, and are efficient users bring about fundamental changes to how we manage and uti-
of the spectrum, testing of new technology through large-scale lize radio spectrum. Most of the legacy spectrum regimes
experimentation is essential. Such testing will also prove help- employed throughout the world are overly static and inflexible,
ful in raising stakeholder trust that the new sharing approaches making it difficult, if not impossible, to utilize spectrum to its
will work as promised. This requires new tests, measurement full potential in an efficient manner. Dedicated exclusive-use
solutions, standards and regulatory validation. Measurements assignments, premised on archaic notions of radio technology,
and metrics to establish existing and future levels of spectrum reduced incentives to use spectrum efficiently and contributed
occupancy and efficiency will also be required. Development to problems of artificial scarcity, thereby impeding growth
of advanced and adaptable test beds using advances in hard- and innovation in wireless services and technologies. The
ware, software and policy; proof-of-concept demonstrations; future needs to embrace more dynamic models of spectrum
and standardization of current/future test beds are imperative sharing, or Dynamic Spectrum Access (DSA), in which spec-
to assess the performance of new technologies. Open prob- trum may be shared along multiple technical dimensions
lems related to experimentation, testing and standardization (e.g., frequency, time, space, and direction) and across multi-
are listed in Category 7 of Table I. ple usage contexts (e.g., commercial/government, legacy/new,
licensed/unlicensed, or multiple classes of spectrum rights
F. Regulatory and Policy Challenges holders). Realizing this DSA vision requires the co-evolution
of technical, regulatory, and business models for managing
Beyond technical issues, there are also policy-domain chal-
how spectrum usage rights are administered and enforced.
lenges in dynamic spectrum sharing. Future sharing systems
Rendering traditional mechanisms such as static exclusion
may employ dynamic spectrum markets in which primary
zones more dynamic [63], incorporating database technolo-
licensees can sell spectrum access to SUs on a temporary basis.
gies, and augmenting those with sensing capabilities represent
There exists a need for interdisciplinary research in the areas
distinct but complementary steps on the path to dynamic
of market- and non-market-based mechanisms for spectrum
spectrum sharing.
access and usage to efficiently organize the sharing of scarce
spectrum resources. For spectrum markets to work efficiently,
there has to be sufficiently liquid supply and demand of spec- R EFERENCES
trum resources to make it worthwhile incurring the transaction [1] Report to the President: Realizing the Full Potential of Government-
costs associated with administering and making use of the mar- Held Spectrum to Spur Economic Growth, President’s Council Advisors
Sci. Technol., Washington, DC, USA, Jul. 2012.
kets. Thus, it is also important to consider how to enhance the [2] Cisco, “Cisco visual networking index: Global mobile data
value of spectrum to SUs. For instance, sharing might only be traffic forecast update, 2015–2020 White Paper,” Feb. 2016.
of a little value if an IU needs arbitrary access to the spectrum [Online]. Available: http://www.cisco.com/c/en/us/solutions/collateral/
service-provider/visual-networking-index-vni/mobile-white-paper-c11-
because this prevents SUs from predicting the availability of 520862.html
spectrum. [3] R. Murty, R. Chandra, T. Moscibroda, and P. Bahl, “SenseLess:
Market barriers (e.g., transaction costs, lack of incentives, A database-driven white spaces network,” IEEE Trans. Mobile
Comput., vol. 11, no. 2, pp. 189–203, Feb. 2012.
strategic concerns) and limited availability of information (e.g., [4] D. Gurney, G. Buchwald, L. Ecklund, S. L. Kuffner, and
unavailability of federal-IUs’ operational parameters) all pose J. Grosspietsch, “Geo-location database techniques for incumbent pro-
policy challenges for realizing the potential of spectrum shar- tection in the TV white space,” in Proc. IEEE Symp. Dyn. Spectr.
Access Netw. (DySPAN), Chicago, IL, USA, Oct. 2008, pp. 1–9.
ing. Other challenges include authorization constraints (e.g., [5] B. Gao, J.-M. Park, and Y. Yang, “Supporting mobile users in
regulatory and policy requirements); and lack of incentives database-driven opportunistic spectrum access,” in Proc. 15th ACM Int.
for incumbents to share (e.g., incumbents may see future spec- Symp. Mobile Ad Hoc Netw. Comput., Philadelphia, PA, USA, 2014,
pp. 215–224.
trum sharing only as a threat to their own use) [51]. Also, there [6] B. Gao et al., “Incentivizing spectrum sensing in database-driven
are issues related to health and environmental ramifications of dynamic spectrum sharing,” in Proc. IEEE Int. Conf. Comput. Commun.
emerging technologies. Interdisciplinary collaboration among (INFOCOM), San Francisco, CA, USA, Apr. 2016, pp. 1–9.
[7] Report of the Spectrum Efficiency Working Group, FCC, Washington,
researchers of diverse backgrounds is crucial in addressing DC, USA, ET Docket 02-135, Nov. 2002.
these challenges. [8] Spectrum Framework Review: A Consultation on Ofcom’s Views as
Finally, the design of radio systems is inherently cross- to How Radio Spectrum Should be Managed, OfCom, London, U.K.,
Nov. 2004.
disciplinary since the technologies are only a part of the [9] Connecting America: The National Broadband Plan, FCC, Washington,
larger system which includes the stakeholders, markets, and DC, USA, Mar. 2010.
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 125

[10] Unleashing the Wireless Broadband Revolution, White House, [35] J. M. Chapin and W. H. Lehr, “Cognitive radios for dynamic spec-
Washington, DC, USA, Jun. 2010. trum access—The path to market success for dynamic spectrum
[11] Expanding America’s Leadership in Wireless Innovation, White House, access technology,” IEEE Commun. Mag., vol. 45, no. 5, pp. 96–103,
Washington, DC, USA, Jun. 2013. May 2007.
[12] FCC. Auction 97: Advanced Wireless Services (AWS-3). Accessed [36] Coordination Procedures in the 1695-1710 MHz and 1755-1780 MHz
on Nov. 9, 2015. [Online]. Available: http://wireless.fcc.gov/ bands, FCC and NTIA, Washington, DC, USA, GN Docket no. 13-185,
auctions/default.htm?job=releases_year&y=2015&m=6 Jul. 2014.
[13] Second Memorandum Opinion and Order (FCC 08-260), FCC, [37] Notice of Proposed Rulemaking, FCC, Washington, DC, USA, ET
Washington, DC, USA, Sep. 2010. Docket no. 13-49, Feb. 2013.
[14] Report and Order and Second Further Notice of Proposed Rulemaking, [38] First Report and Order, FCC, Washington, DC, USA,
FCC, Washington, DC, USA, GN Docket no. 12-354, Apr. 2015. ET Docket no. 13-49, Apr. 2014.
[15] Revision of Part 15 of the Commission’s Rules to Permit Unlicensed [39] J. Lansford, J. Kenney, P. Ecclesine, T. Yucek, and
National Information Infrastructure (U-NII) Devices in the 5 GHz Band P. Spaanderman, “Final report of DSRC coexistence tiger
(NPRM 13-22), OfCom, London, U.K., Feb. 2013. team,” Tech. Rep. IEEE 802.11-15/0347r0, Mar. 2015. [Online].
[16] Geolocation for Cognitive Access: A Discussion on Using Geolocation Available: https://mentor.ieee.org/802.11/dcn/15/11-15-0347-00-0reg-
to Enable License-Exempt Access to the Interleaved Spectrum, OfCom, final-report-of-dsrc-coexistence-tiger-team-clean.pdf
London, U.K., Jul. 2009. [40] Office of Engineering and Technology and Wireless
[17] Implementing Geolocation: Summary of Consultation Responses and Telecommmunications Bureau Seek Information on Current Trends
Next Steps, OfCom, London, U.K., Sep. 2011. in LTE-U and LAA Technology, FCC, Washington, DC, USA,
[18] Spectrum Management Strategy: Ofcom’s Strategic Direction and Docket no. 15-105, May 2015.
Priorities for Managing Spectrum Over the Next 10 Years, OfCom, [41] Fierce WirelessTech. Verizon, Qualcomm Lobby for LTE-U, Wi-Fi
London, U.K., Apr. 2014. Coexistence Scheme. Accessed on Nov. 29, 2015. [Online]. Available:
[19] Consultation on a Policy and Technical Framework for the Use of http://www.fiercewireless.com/tech/story/verizon-qualcomm-lobby-lte-
Non-broadcasting Applications in the Television Broadcasting Bands u-wi-fi-coexistence-scheme/2015-07-20
Below 698 MHz, SMSE-012-11, Industry Canada, Aug. 2011. [Online]. [42] Report and Order, FCC, Washington, DC, USA,
Available: https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf10058.html ET Docket no. 07-113, Aug. 2013.
[20] Framework for the Use of Certain Non-Broadcasting Applications [43] Report and Order, FCC, Washington, DC, USA, WT
in the Television Broadcasting Bands Below 698 MHz, SMSE- Docket no. 02-146, Oct. 2003.
012-12, Industry Canada, Oct. 2012. [Online]. Available: [44] Memorandum Opinion and Order, FCC, Washington, DC, USA, WT
https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf10494.html Docket no. 02-146, Mar. 2005.
[21] Trial of White Space Technology Accessing VHF and UHF Bands [45] Notice of Proposed Rulemaking, FCC, Washington, DC, USA, GN
in Singapore, Infocomm Develop. Authority Singapore, Singapore, Docket no. 14-177, Oct. 2015.
Jul. 2010. [46] L. E. Strickling, “Fifth interim progress report on the ten-year plan
[22] Regulatory Framework for TV White Space Operations in He and timetable,” Nat. Telecommun. Inf. Admin., U.S. Dept. Commer.,
VHF/UHF Bands, Infocomm Develop. Authority Singapore, Singapore, Washington, DC, USA, Apr. 2015.
Jun. 2014.
[47] Request for Opinion on Licensed Shared Access (LSA), ECC, Brussels,
[23] T. Wang et al., “5G spectrum: Is China ready?” IEEE Commun. Mag., Belgium, Nov. 2012.
vol. 53, no. 7, pp. 58–65, Jul. 2015.
[48] Licensed Shared Access (LSA), ECC, Brussels, Belgium, Feb. 2014.
[24] Decision No 243/2012/EU of the European Parliament and of the
[49] Ofcom Consultation on the U.K. Preparations for the World Radio
Council of 14 March 2012 Establishing a Multiannual Radio Spectrum
Communication Conference 2015 (WRC-15), OfCom, London, U.K.,
Policy Programme, Eur. Parliament Council, Brussels, Belgium,
Jun. 2014.
Mar. 2012.
[25] RSPG Opinion on Licensed Shared Access, Radio Spectr. Policy Group, [50] Implementing TV White Spaces, OfCom, London, U.K., Feb. 2015.
Brussels, Belgium, RSPG13-538, Nov. 2013. [51] A Framework for Spectrum Sharing, OfCom, London, U.K., Jul. 2015.
[26] 2013/195/EU: Commission Implementing Decision of 23 April 2013 [52] White Space Devices (WSDs) (RSS-222), Industry Canada,
Defining the Practical Arrangements, Uniform Formats and a Feb. 2015. [Online]. Available: http://www.ic.gc.ca/eic/site/
Methodology in Relation to the Radio Spectrum Inventory Established smt-gst.nsf/eng/sf10930.html
by Decision No 243/2012/EU of the European Parliament and [53] “Television white space devices certification and licensing rules,”
of the Council Establishing a Multiannual Radio Spectrum Policy Radio Spectr. Manag., Wellington, New Zealand, Nov. 2014. [Online].
Programme, Eur. Commission, Brussels, Belgium, Apr. 2013. Available: http://www.rsm.govt.nz/projects-auctions/completed/
[27] ECC, “Technical and operational requirements for the possi- television-white-space-licensing-rules/television-white-space-licensing-
ble operation of cognitive radio systems in the ‘White Spaces’ rules-consultation/television-white-space-devices-certification-and-
of the frequency band 470-790 MHz.” [Online]. Available: licensing-rules.pdf
http://www.erodocdb.dk/docs/doc98/official/pdf/ECCRep159.pdf [54] M. Palola et al., “Live field trial of licensed shared access (LSA) con-
[28] P. A. Tenhula, “Regulatory framework(s) for facilitating new spec- cept using LTE network in 2.3 GHz band,” in Proc. IEEE Symp. Dyn.
trum sharing schemes,” in Proc. Int. Symp. Adv. Radio Technol., Paris, Spectr. Access Netw. (DySPAN), McLean, VA, USA, 2014, pp. 38–47.
France, Jul. 2012, pp. 142–145. [55] S. Yrjölä, “Licensed shared access (LSA) field trial using LTE net-
[29] Definitions of Software Defined Radio (SDR) and Cognitive Radio work and self organized network LSA controller,” in Proc. Wireless
Systems (CRS), Int. Telecommun. Union (ITU), Geneva, Switzerland, Innov. Forum Eur. Conf. Commun. Technol. Softw. Defined Radio
Sep. 2009. (WinnComm-Europe), Oct. 2015, pp. 16–25.
[30] B. Wang and K. J. R. Liu, “Advances in cognitive radio networks: [56] J.-M. Park et al., “Security and enforcement in spectrum sharing,” Proc.
A survey,” IEEE J. Sel. Topics Signal Process., vol. 5, no. 1, pp. 5–23, IEEE, vol. 102, no. 3, pp. 270–281, Mar. 2014.
Feb. 2011. [57] M. Altamimi and M. B. H. Weiss, “Enforcement and network
[31] E. Hossain, D. Niyato, and D. I. Kim, “Evolution and future trends of capacity in spectrum sharing: Quantifying the benefits of differ-
research in cognitive radio: A contemporary survey,” Wireless Commun. ent enforcement scenarios,” in Proc. 41st Res. Conf. Commun. Inf.
Mobile Comput., vol. 15, pp. 1530–1564, Aug. 2015. Internet Policy, Arlington, TX, USA, Mar. 2014. [Online]. Available:
[32] OECD, “New approaches to spectrum management,” in OECD Digital http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418359
Economy Papers. Paris, France: OECD, May 2014. [58] B. Bahrak, A. Deshpande, and J.-M. Park, “Spectrum access policy
[33] M. Matinmikko et al., “Overview and comparison of recent spectrum reasoning for policy-based cognitive radios,” Comput. Netw., vol. 56,
sharing approaches in regulation and research: From opportunistic unli- no. 11, pp. 2649–2663, 2012.
censed access towards licensed shared access,” in Proc. IEEE Int. Symp. [59] C. Li, A. Raghunathan, and N. K. Jha, “An architecture for secure
Dyn. Spectr. Access Netw. (DYSPAN), McLean, VA, USA, Apr. 2014, software defined radio,” in Proc. Design Autom. Test Europe Conf.
pp. 92–102. Exhibit. (DATE), Nice, France, Apr. 2009, pp. 448–453.
[34] Deliverable D5.1: Intermediate Description of the Spectrum Needs [60] S. Xiao, J.-M. Park, and Y. Ye, “Tamper resistance for software defined
and Usage Principles, document ICT-317669-METIS/D5.1, METIS, radio software,” in Proc. 33rd Annu. IEEE Int. Comput. Softw. Appl.
Aug. 2014. Conf. (COMPSAC), vol. 1. Seattle, WA, USA, Jul. 2009, pp. 383–391.
126 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

[61] C. R. A. González and J. H. Reed, “Power fingerprinting in SDR [85] B. Danev and S. Capkun, “Transient-based identification of wireless
integrity assessment for security and regulatory compliance,” Analog sensor nodes,” in Proc. Int. Conf. Inf. Process. Sensor Netw. (IPSN),
Integr. Circuits Signal Process., vol. 69, nos. 2–3, pp. 307–327, San Francisco, CA, USA, Apr. 2009, pp. 25–36.
Dec. 2011. [86] W. Hou, X. Wang, and J.-Y. Chouinard, “Physical layer authentication
[62] X. Li, J. Chen, and F. Ng, “Secure transmission power of cogni- in OFDM systems based on hypothesis testing of CFO estimates,” in
tive radios for dynamic spectrum access applications,” in Proc. 42nd Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, Jun. 2012,
Annu. Conf. Inf. Sci. Syst. (CISS), Princeton, NJ, USA, Mar. 2008, pp. 3559–3563.
pp. 213–218. [87] O. Ureten and N. Serinken, “Wireless security through RF finger-
[63] S. Bhattarai et al., “Defining incumbent protection zones on the fly: printing,” Can. J. Elect. Comput. Eng., vol. 32, no. 1, pp. 27–33,
Dynamic boundaries for spectrum sharing,” in Proc. IEEE Symp. Dyn. 2007.
Spectr. Access Netw. (DySPAN), Stockholm, Sweden, Sep./Oct. 2015, [88] I. J. Cox, M. L. Miller, and A. L. McKellips, “Watermarking as
pp. 251–262. communications with side information,” Proc. IEEE, vol. 87, no. 7,
[64] A. Ullah et al., “Multi-tier exclusion zones for dynamic spectrum pp. 1127–1141, Jul. 1999.
sharing,” in Proc. IEEE Int. Conf. Commun. (ICC), London, U.K., [89] C. Fei, D. Kundur, and R. H. Kwong, “Analysis and design of secure
Jun. 2015, pp. 7659–7664. watermark-based authentication systems,” IEEE Trans. Inf. Forensics
[65] R. A. O’Connor, “Understanding television’s grade A and grade B Security, vol. 1, no. 1, pp. 43–55, Mar. 2006.
service contours,” IEEE Trans. Broadcast., vol. 47, no. 3, pp. 309–314, [90] N. Goergen, T. C. Clancy, and T. R. Newman, “Physical layer authenti-
Sep. 2001. cation watermarks through synthetic channel emulation,” in Proc. IEEE
[66] Propagation Data Required for the Evaluation of Coordination Symp. New Frontiers Dyn. Spectr., Singapore, Apr. 2010, pp. 1–7.
Distances in the Frequency Range 0.85-60 GHz, Rec. ITU-R P.620-3, [91] J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette, “Radio fre-
FCC, Washington, DC, USA, Jul. 2014. quency watermarking for OFDM wireless networks,” in Proc. IEEE
[67] NTIA. Portal Opens for AWS-3 Spectrum Sharing Int. Conf. Acoust. Speech Signal Process. (ICASSP), vol. 5. Montreal,
Coordination. Accessed on Nov. 30, 2015. [Online]. QC, Canada, May 2004, pp. V-397–V-400.
Available: https://www.ntia.doc.gov/blog/2015/portal-opens-aws-3- [92] V. Kumar, J.-M. Park, T. C. Clancy, and K. Bian, “PHY-layer authen-
spectrum-sharing-coordination tication by introducing controlled inter symbol interference,” in Proc.
[68] S. J. Shellhammer, S. N. Shankar, R. Tandra, and J. Tomcik, IEEE CNS, 2013, pp. 10–18.
“Performance of power detector sensors of DTV signals in IEEE 802.22 [93] Y. Liu, P. Ning, and H. Dai, “Authenticating primary users’ signals
WRANs,” in Proc. ACM Workshop Technol. Policy Access. Spectr., in cognitive radio networks via integrated cryptographic and wireless
Boston, MA, USA, 2006, Art. no. 4. link signatures,” in Proc. IEEE Symp. Security Privacy, Oakland, CA,
[69] R. Tandra, S. M. Mishra, and A. Sahai, “What is a spectrum hole USA, May 2010, pp. 286–301.
and what does it take to recognize one?” Proc. IEEE, vol. 97, no. 5, [94] R. Miller and W. Trappe, “Short paper: ACE: Authenticating the chan-
pp. 824–848, May 2009. nel estimation process in wireless communication systems,” in Proc.
[70] An Assessment of the Near-Term Viability of Accommodating ACM WiSec, Hamburg, Germany, 2011, pp. 91–96.
Wireless Broadband Systems in the 1675-1710 MHz, 1755-1780
[95] X. Tan, K. Borle, W. Du, and B. Chen, “Cryptographic link signatures
MHz, 3500-3650 MHz, and 4200-4220 MHz, 4380-4400 MHz Bands,
for spectrum usage authentication in cognitive radio,” in Proc. ACM
Nat. Telecommun. Inf. Admin., Washington, DC, USA, Oct. 2010.
WiSec, Hamburg, Germany, Jun. 2011, pp. 79–90.
[71] Spectrum Sharing: The Promise and the Reality, RYSAVY Res.,
[96] X. Wang, Y. Wu, and B. Caron, “Transmitter identification using
Washington, DC, USA, Jul. 2012.
embedded pseudo random sequences,” IEEE Trans. Broadcast., vol. 50,
[72] J. C. Ribeiro et al., “Testbed for combination of local sensing with
no. 3, pp. 244–252, Sep. 2004.
geolocation database in real environments,” IEEE Wireless Commun.,
[97] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Using
vol. 19, no. 4, pp. 59–66, Aug. 2012.
the physical layer for wireless authentication in time-variant chan-
[73] T. Zhang and S. Banerjee, “Inaccurate spectrum databases? Public tran-
nels,” IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571–2579,
sit to its rescue!” in Proc. ACM HotNets, College Park, MD, USA,
Jul. 2008.
Nov. 2013, Art. no. 6.
[74] A. Chakraborty and S. R. Das, “Measurement-augmented spectrum [98] P. L. Yu, J. S. Baras, and B. M. Sadler, “Physical-layer authentication,”
databases for white space spectrum,” in Proc. ACM CoNEXT, Sydney, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38–51, Mar. 2008.
NSW, Australia, Dec. 2014, pp. 67–74. [99] B. Danev, H. Luecken, S. Čapkun, and K. El Defrawy, “Attacks on
[75] R. Dionísio, J. Ribeiro, P. Marques, and J. Rodriguez, “Combination physical-layer identification,” in Proc. ACM WiSec, Hoboken, NJ, USA,
of a geolocation database access with infrastructure sensing in TV 2010, pp. 89–98.
bands,” EURASIP J. Wireless Commun. Netw., vol. 2014, no. 1, pp. 1– [100] V. Kumar, J.-M. Park, and K. Bian, “Blind transmitter authentica-
14, Dec. 2014. tion for spectrum security and enforcement,” in Proc. 21st ACM Conf.
[76] N. Wang, Y. Gao, and B. Evans, “Database-augmented spectrum Comput. Commun. Security (CCS), Scottsdale, AZ, USA, Oct. 2014,
sensing algorithm for cognitive radio,” in Proc. IEEE Int. Conf. pp. 787–798.
Commun. (ICC), London, U.K., Jun. 2015, pp. 7468–7473. [101] IEEE Standard for Policy Language Requirements and System
[77] Y. Zhao, B. Le, and J. H. Reed, “Network support—The radio Architectures for Dynamic Spectrum Access Systems, IEEE Standard
environment map,” in Cognitive Radio Technology. Amsterdam, 1900.5-2011, pp. 1–51, Jan. 2012.
The Netherlands: Elsevier, 2006. [102] R. Chen, J.-M. Park, and J. H. Reed, “Defense against primary user
[78] H. B. Yilmaz, T. Tugcu, F. Alagöz, and S. Bayhan, “Radio environment emulation attacks in cognitive radio networks,” IEEE J. Sel. Areas
map as enabler for practical cognitive radio networks,” IEEE Commun. Commun., vol. 26, no. 1, pp. 25–37, Jan. 2008.
Mag., vol. 51, no. 12, pp. 162–169, Dec. 2013. [103] S. Liu, Y. Chen, W. Trappe, and L. J. Greenstein, “Non-interactive
[79] Y. Zhao et al., “Applying radio environment maps to cognitive wireless localization of cognitive radios based on dynamic signal strength map-
regional area networks,” in Proc. 2nd IEEE Int. Symp. New Frontiers ping,” in Proc. 6th Int. Conf. Wireless On-Demand Netw. Syst. Services,
Dyn. Spectr. Access Netw. (DySPAN), Apr. 2007, pp. 115–118. Snowbird, UT, USA, 2009, pp. 85–92.
[80] V. Pankonin and R. Price, “Radio astronomy and spectrum manage- [104] T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher,
ment: The impact of WARC-79,” IEEE Trans. Commun., vol. 29, no. 8, “Range-free localization schemes for large scale sensor net-
pp. 1228–1237, Aug. 1981. works,” in Proc. ACM MobiCom, San Diego, CA, USA, 2003,
[81] T. E. Gergely, “Spectrum access for the passive services: The past and pp. 81–95.
the future,” Proc. IEEE, vol. 102, no. 3, pp. 393–398, Mar. 2014. [105] A. Dutta and M. Chiang, “‘See something, say something’ crowd-
[82] J. M. Ford and K. D. Buch, “RFI mitigation techniques in radio sourced enforcement of spectrum policies,” IEEE Trans. Wireless
astronomy,” in Proc. IEEE Int. Geosci. Remote Sens. Symp. (IGARSS), Commun., vol. 15, no. 1, pp. 67–80, Jan. 2016.
Quebec City, QC, Canada, Jul. 2014, pp. 231–234. [106] K. A. Woyach, A. Sahai, G. Atia, and V. Saligrama, “Crime and
[83] “Techniques for mitigation of radio frequency interference in radio punishment for cognitive radios,” in Proc. 46th Annu. Allerton
astronomy,” Int. Telecommun. Union, Geneva, Switzerland, Tech. Rep. Conf. Commun. Control Comput., Champaign, IL, USA, Sep. 2008,
ITU-R RA.2126, 2007. pp. 236–243.
[84] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless device iden- [107] M. B. H. Weiss, W. Lehr, M. Altamimi, and L. Cui, “Enforcement in
tification with radiometric signatures,” in Proc. 14th ACM Int. Conf. dynamic spectrum access systems,” in Proc. Conf. TRPC, Arlington,
Mobile Comput. Netw. (MobiCom), San Francisco, CA, USA, 2008, VA, USA, Mar. 2012. [Online]. Available: http://papers.ssrn.com/sol3/
pp. 116–127. papers.cfm?abstract_id=2032242
BHATTARAI et al.: OVERVIEW OF DYNAMIC SPECTRUM SHARING 127

[108] “Introduction to interference resolution, enforcement, and radio [129] N. Gupta, A. Prakash, and R. Tripathi, “Medium access control
noise,” Spectr./Receiver Perform. Working Group, Federal Commun. protocols for safety applications in vehicular ad-hoc network: A clas-
Commission, Washington, DC, USA, Tech. Rep., Jun. 2014. sification and comprehensive survey,” Veh. Commun., vol. 2, no. 4,
[Online]. Available: https://transition.fcc.gov/bureaus/oet/tac/tacdocs/ pp. 223–237, 2015.
meeting61014/InterferenceResolution-Enforcement-Radio-Noise- [130] Y. Niu, Y. Li, D. Jin, L. Su, and A. V. Vasilakos, “A survey of mil-
White-Paper.pdf limeter wave communications (mmWave) for 5G: Opportunities and
[109] MAC and PHY for Operation in TV White Space, ECMA Standard challenges,” Wireless Netw., vol. 21, no. 8, pp. 2657–2676, 2015.
ECMA-392, Dec. 2009. [131] S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter-wave cellular
[110] T. Baykas et al., “Developing a standard for TV white space coexis- wireless networks: Potentials and challenges,” Proc. IEEE, vol. 102,
tence: Technical challenges and solution approaches,” IEEE Wireless no. 3, pp. 366–385, Mar. 2014.
Commun., vol. 19, no. 1, pp. 10–22, Feb. 2012. [132] B. Bahrak et al., “Protecting the primary users’ operational privacy
in spectrum sharing,” in Proc. IEEE Int. Symp. Dyn. Spectr. Access
[111] IEEE Standard for Information Technology—Local and Metropolitan
Netw. (DYSPAN), McLean, VA, USA, Apr. 2014, pp. 236–247.
Area Networks—Specific Requirements—Part 22: Cognitive Wireless
[133] C. Dwork, “Differential privacy,” in Proc. Int. Conf. Autom. Lang.
RAN Medium Access Control (MAC) and Physical Layer (PHY)
Program., Venice, Italy, 2006, pp. 1–12.
Specifications: Policies and Procedures for Operation in the TV Bands,
[134] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and
IEEE Standard 802.22-2011, pp. 1–680, Jul. 2011.
C. Palamidessi, “Geo-indistinguishability: Differential privacy for
[112] IEEE 802.11 Homepage. Accessed on Dec. 1, 2015. [Online]. location-based systems,” in Proc. ACM SIGSAC Conf. Comput.
Available: http://www.ieee802.org/11/ Commun. Security (CCS), Berlin, Germany, 2013, pp. 901–914.
[113] Project Authorization Request for IEEE Standard for Local and [135] N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Optimal
Metropolitan Area Networks Part 15.4: Low Rate Wireless Personal geo-indistinguishable mechanisms for location privacy,” in Proc. ACM
Area Networks (LR-WPANs) Amendment: TV White Space Between SIGSAC Conf. Comput. Commun. Security (CCS), Scottsdale, AZ,
54 MHz and 862 MHz Physical Layer, IEEE Standard 802.15.4m, USA, 2014, pp. 251–262.
Jul. 2011. [136] Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, “Location privacy
[114] “Project authorization request for P1900.7 radio interface for in database-driven cognitive radio networks: Attacks and coun-
white space dynamic spectrum access radio systems support- termeasures,” in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013,
ing fixed and mobile operation,” Jun. 2011. [Online]. Available: pp. 2751–2759.
http://www2.ic.uff.br/∼ejulio/doutorado/artigos/06155872.pdf [137] Z. Chen, J. Wang, Z. Zhang, and X. Song, “A fully homomorphic
[115] T. Baykas et al., “Developing a standard for TV white space coex- encryption scheme with better key size,” China Commun., vol. 11,
istence: Technical challenges and solution approaches,” White Paper, no. 9, pp. 82–92, Sep. 2014.
IEEE 802.19.1 Task Group, 2011. [138] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and
[116] (Jul. 2010). Workshop on TV White Space Coexistence: IEEE J.-Y. Le Boudec, “Protecting location privacy: Optimal strategy against
802.19.1 Overview. Accessed on Dec. 1, 2015. [Online]. Available: localization attacks,” in Proc. ACM Conf. Comput. Commun. Security,
http://ieee802.org/19/pub/Workshop/2_Baykas-NICT.pdf Raleigh, NC, USA, 2012, pp. 617–627.
[117] M. Paolini and S. Fili, “LTE unlicensed and Wi-Fi: Moving beyond [139] M. Gruteser and D. Grunwald, “Anonymous usage of location-based
coexistence,” Senza Fili, Sammamish, WA, USA, Tech. Rep., 2015. services through spatial and temporal cloaking,” in Proc. 1st Int. Conf.
Mobile Syst. Appl. Services (MobiSys), San Francisco, CA, USA, 2003,
[118] Qualcomm Research, “LTE in unlicensed spectrum: Harmonious
pp. 31–42.
coexistence with Wi-Fi,” Qualcomm Technol., Inc., San
[140] J. Freudiger, R. Shokri, and J.-P. Hubaux, “On the optimal placement of
Diego, CA, USA, Tech. Rep., Jun. 2014. [Online]. Available:
mix zones,” in Privacy Enhancing Technologies, vol. 5672. Heidelberg,
https://www.qualcomm.com/media/documents/files/lte-unlicensed-
Germany: Springer, 2009, pp. 216–234.
coexistence-whitepaper.pdf
[141] R. Chow and P. Golle, “Faking contextual data for fun, profit, and
[119] “The prospect of LTE and Wi-Fi sharing unlicensed spec- privacy,” in Proc. 8th ACM Workshop Privacy Electron. Soc. (WPES),
trum: Good fences make good neighbors,” Signals Res. Group, Chicago, IL, USA, 2009, pp. 105–108.
Oakland, CA, USA, Tech. Rep., Feb. 2015. [Online]. Available: [142] B. Gedik and L. Liu, “Protecting location privacy with personalized k-
https://www.qualcomm.com/media/documents/files/the-prospect-of-lte- anonymity: Architecture and algorithms,” IEEE Trans. Mobile Comput.,
and-wi-fi-sharing-unlicensed-spectrum-srg-white-paper.pdf vol. 7, no. 1, pp. 1–18, Jan. 2008.
[120] T. Nihtilä et al., “System performance of LTE and IEEE 802.11 coex- [143] FactSheet: Root Server Attack on 6 February 2007, ICANN,
isting on a shared frequency band,” in Proc. IEEE Wireless Commun. Marina del Rey, CA, USA, Feb. 2007.
Netw. Conf. (WCNC), Shanghai, China, Apr. 2013, pp. 1038–1043. [144] Enhancing Access to the Radio Spectrum, NSF, Arlington, VA,
[121] R. Ratasuk et al., “License-exempt LTE deployment in heterogeneous USA, Aug. 2010. [Online]. Available: http://www.nsf.gov/mps/ast/
network,” in Proc. Int. Symp. Wireless Commun. Syst. (ISWCS), Paris, ears_workshop_final_report_ce_final_corr.pdf
France, Aug. 2012, pp. 246–250. [145] G. Baldini et al., “Security aspects in software defined radio and cog-
[122] M. Xing, Y. Peng, T. Xia, H. Long, and K. Zheng, “Adaptive spec- nitive radio networks: A survey and a way ahead,” IEEE Commun.
trum sharing of LTE co-existing with WLAN in unlicensed frequency Surveys Tuts., vol. 14, no. 2, pp. 355–379, 2nd Quart. 2012.
bands,” in Proc. IEEE 81st Veh. Technol. Conf. (VTC Spring), Glasgow, [146] D. Symeonidis and G. Baldini, “European standardization and SDR cer-
U.K., May 2015, pp. 1–5. tification,” in Proc. 6th Adv. Int. Conf. Telecommun. (AICT), Barcelona,
[123] J. A. Stine and C. E. C. Bastidas, “Enabling spectrum sharing via Spain, May 2010, pp. 136–141.
spectrum consumption models,” IEEE J. Sel. Areas Commun., vol. 33, [147] J. Giacomoni and D. C. Sicker, “Difficulties in providing certification
no. 4, pp. 725–735, Apr. 2015. and assurance for software defined radios,” in Proc. 1st IEEE Int. Symp.
[124] C. Caicedo and J. Stine, “Spectrum markets and sharing via New Frontiers Dyn. Spectr. Access Netw. (DySPAN), Baltimore, MD,
spectrum consumption models,” in Proc. 41st Res. Conf. TPRC, USA, Nov. 2005, pp. 526–538.
Mar. 2013. [Online]. Available: http://papers.ssrn.com/sol3/
papers.cfm?abstract_id=2242281
[125] J. A. Stine and C. E. C. Bastidas, “Service level agreements with
Sudeep Bhattarai received the bachelor’s degree
spectrum consumption models,” in Proc. IEEE Int. Symp. Dyn. Spectr.
in electronics and communication engineering from
Access Netw. (DYSPAN), McLean, VA, USA, Apr. 2014, pp. 206–214.
Tribhuvan University, Nepal, and the master’s degree
[126] R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed in electrical engineering from Tennessee State
bands,” IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517–528, University, USA, in 2011 and 2013, respectively.
Apr. 2007. He is currently pursuing the Ph.D. degree in elec-
[127] J. E. Suris, L. A. DaSilva, Z. Han, and A. MacKenzie, “Cooperative trical and computer engineering with Virginia Tech,
game theory for distributed spectrum sharing,” in Proc. IEEE Int. Conf. USA. His current research interests include dynamic
Commun. (ICC), Glasgow, U.K., Jun. 2007, pp. 5282–5287. spectrum sharing/access, cognitive radio networks,
[128] S. Yun and L. Qiu, “Supporting WiFi and LTE co-existence,” in adaptive beamforming, and security issues in wire-
Proc. IEEE Conf. Comput. Commun. (INFOCOM), Apr./May 2015, less communications. He was a recipient of the Best
pp. 810–818. Paper Award in the IEEE DySPAN 2014.
128 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 2, NO. 2, JUNE 2016

Jung-Min (Jerry) Park received the Ph.D. degree Kaigui Bian received the B.S. degree in com-
in electrical and computer engineering from Purdue puter science from Peking University in 2001, and
University, West Lafayette, IN, USA, in 2003. He the Ph.D. degree in computer engineering from
is currently a Professor with the Department of Virginia Tech in 2011. He is currently an Associate
Electrical and Computer Engineering, Virginia Tech Professor with the Institute of Network Computing
and the Site Director with the National Science and Information Systems, School of EECS, Peking
Foundation (NSF) Industry-University Cooperative University. His research interests include cognitive
Research Center called Broadband Wireless Access radio networks, mobile computing, network security,
and Applications Center. He is also an Executive and privacy.
Committee Member of the National Spectrum
Consortium. His research interests include cognitive
radio networks, dynamic spectrum sharing, networking, wireless security and
privacy, and applied cryptography. Current or recent research sponsors include
the NSF, the National Institutes of Health, the Defense Advanced Research
Projects Agency, the Army Research Office, the Office of Naval Research,
and several industry sponsors. He was a recipient of the 2014 Virginia
Tech College of Engineering Faculty Fellow Award, the 2008 NSF Faculty
Early Career Development (CAREER) Award, the 2008 Hoeber Excellence
in Research Award, and the 1998 AT&T Leadership Award. He is currently
serving on the editorial boards of the IEEE T RANSACTIONS ON W IRELESS
C OMMUNICATIONS and the IEEE/KICS Journal of Communications and
Networks.

William Lehr received the B.A., B.S., and M.S.E.,


degrees from the University of Pennsylvania, the
Bo Gao received the bachelor’s degree in electrical M.B.A. degree in finance from the Wharton School,
engineering from Beijing Jiaotong University, China, and the Ph.D. degree in economics from Stanford.
in 2006, the master’s degree in electrical engineer- He is an Economist and Research Associate with
ing from Shanghai Jiaotong University, China, in the Computer Science and Artificial Intelligence
2009, and the Ph.D. degree in computer engineer- Laboratory, Massachusetts Institute of Technology,
ing from Virginia Tech, Blacksburg, VA, USA, in where he is a part of the Advanced Network
2014. He is currently an Assistant Professor with Architectures Group. His research focuses on the
the Institute of Computing Technology, Chinese economic and policy implications of broadband
Academy of Sciences. His research interests include Internet access, next generation Internet architecture,
next-generation wireless communications and net- and radio spectrum management reform. In addition to his academic work,
working, dynamic spectrum sharing, and mobile he provides business strategy and litigation consulting services to public and
computing. private sector clients in the U.S. and abroad.

Das könnte Ihnen auch gefallen