Qianyi Huang, Yixin Tao, and Fan Wu

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 17 Auction-based.
Advertisements

Truthful Spectrum Auction Design for Secondary Networks Yuefei Zhu ∗, Baochun Li ∗ and Zongpeng Li † ∗ Electrical and Computer Engineering, University.
Fostering Wireless Spectrum Sharing via Subsidization Allerton 2013 Murat Yuksel Computer Science and Engineering Department, University of Nevada, Reno.
Incentivize Crowd Labeling under Budget Constraint
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Federal Communications Commission NSMA Spectrum Management Conference May 20, 2008 Market Based Forces and the Radio Spectrum By Mark Bykowsky, Kenneth.
A Prior-Free Revenue Maximizing Auction for Secondary Spectrum Access Ajay Gopinathan and Zongpeng Li IEEE INFOCOM 2011, Shanghai, China.
Location Privacy Preservation in Collaborative Spectrum Sensing Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Shanghai Jiao Tong University Kai Xing.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Privacy Preserving Auctions and Mechanism Design Moni Naor Benny Pinkas Reuben Sumner Presented by: Raffi Margaliot.
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
Auctions and dynamic pricing. When is the auction mechanism useful? We do not know the true value of the good or service on offer We do not know the true.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Strategic Demand Reduction in homogenous multiunit auctions (where bidders may be interested in more than one unit)
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Combinatorial Auctions By: Shai Roitman
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
TRUST: A General Framework for Truthful Double Spectrum Auctions Xia Zhou Heather Zheng (University of California, Santa Barbara) Presenter: Emil Huang.
MAP: Multi-Auctioneer Progressive Auction in Dynamic Spectrum Access Lin Gao, Youyun Xu, Xinbing Wang Shanghai Jiaotong University.
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson.
Strategyproof Auctions For Balancing Social Welfare and Fairness in Secondary Spectrum Markets Ajay Gopinathan, Zongpeng Li University of Calgary Chuan.
TRUST:A General Framework for Truthful Double Spectrum Auctions Xia Zhou and Heather Zheng Department of Computer Science, University of California, Santa.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
CPGomes – AEM 03 1 Electronic Markets Combinatorial Auctions Notes by Prof. Carla Gomes.
Ruihao Zhu and Kang G. Shin
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
Shanghai Jiao Tong University Institute of Wireless Comm. Tech. (IWCT) 无线技术沙龙 Wireless Club 创 新 无 线 精 彩 无 限 Enabling Splendid Wireless A Theoretical Framework.
Second Price Auctions A Case Study of Secure Distributed Computing Bart De Decker Gregory Neven Frank Piessens Erik Van Hoeymissen.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring — Yuan Xue, Pan Zhou, Tao Jiang, Shiwen Mao and Xiaolei Huang.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Personal Communication Services & WiFi
Satisfaction Games in Graphical Multi-resource Allocation
Privacy-Preserving SAS
False-name Bids “The effect of false-name bids in combinatorial
Cognitive Radio Networks
Comp/Math 553: Algorithmic Game Theory Lecture 08
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Antonis Papadimitriou, Arjun Narayan, Andreas Haeberlen
Introduction to Load Balancing:
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Comp/Math 553: Algorithmic Game Theory Lecture 09
New Cache Designs for Thwarting Cache-based Side Channel Attacks
Suman Bhunia and Shamik Sengupta
Sindhusha Doddapaneni
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Cloud Computing By P.Mahesh
Manoj Kumar, Stuart I. Feldman Presented by Bhaskaran Raman
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Efficient CRT-Based RSA Cryptosystems
Xinbing Wang*, Qian Zhang**
Economics and Computation Week #13 Revenue of single Item auctions
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Introduction to Cryptography
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Oblivious Transfer.
Weichao Mao, Zhenzhe Zheng, Fan Wu
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Towards Predictable Datacenter Networks
CPS Bayesian games and their use in auctions
Presentation transcript:

SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism Qianyi Huang, Yixin Tao, and Fan Wu Department of Computer Science and Engineering Shanghai Jiao Tong University, China

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

Spectrum Need Forecast ‐ Table of Results

Secondary Spectrum Market Government: static long term licenses Radio spectrum is not fully utilized New wireless applications have to crowd into limited unlicensed bands Need for Dynamic Spectrum Redistribution/ Auction

Traditional Spectrum Auctions Auctioneer Channels Bidders Spectrum auction mechanisms stimulate the bidders to truthfully reveal their valuations of spectrum/channels. True valuations are sensitive information Corrupt auctioneer

Motivation Existing spectrum auction mechanisms fail to protect bidders’ privacy. Existing privacy preserving auction mechanisms cannot be directly applied to spectrum auctions. Channel 1 Channel 2

Generic Strategy-Proof Spectrum Auction Four bidders are competing for one channel B 𝑏 𝐴 =2, 𝑏 𝐵 =3, 𝑏 𝐶 =1, 𝑏 𝐷 =4 C A D 𝑔 1 ={A, C}, 𝑔 2 ={B, D} 𝜎 1 = 𝑔 1 × min 𝑏 𝐴 , 𝑏 𝐶 =2×1=2 𝜎 2 = 𝑔 2 × min 𝑏 𝐵 , 𝑏 𝐷 =2×3=6 𝜎 2 > 𝜎 1 , hence 𝑔 2 is the winning group. Both 𝐵 and 𝐷 are charged with 𝜎 1 𝑔 2 = 2 2 =1.

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

Order Preserving Encryption OPES encrypts numeric data while preserving the order. It enables any comparison operation to be directly applied on the encrypted data. 𝛽= 𝛽 1 , 𝛽 2 ,…, 𝛽 𝑧 , 𝛽 1 < 𝛽 2 <…< 𝛽 𝑧 OPES 𝛾= 𝛾 1 , 𝛾 2 ,…, 𝛾 𝑧 , 𝛾 1 < 𝛾 2 <…< 𝛾 𝑧

Receiver only learns 𝒔 𝒄 Oblivious Transfer 𝑠 1 , 𝑠 2 , …, 𝑠 𝑧 c∈{1,2,…, z} Sender has z secrets Receiver has choice c Sender doesn’t know c Receiver only learns 𝒔 𝒄

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

SPRING End-to-end Asymmetric Encryption Oblivious Transfer

Design Details - Step 1: Initialization SPRING defines a set of possible bid values as The agent applies 𝑶𝑷𝑬𝑺 on 𝜷 to get The agent initializes the parameters of oblivious transfer. 𝛽= 𝛽 1 , 𝛽 2 ,…, 𝛽 𝑧 , 𝛽 1 < 𝛽 2 <…< 𝛽 𝑧 . 𝛾= 𝛾 1 , 𝛾 2 ,…, 𝛾 𝑧 , 𝛾 1 < 𝛾 2 <…< 𝛾 𝑧 .

Design Details - Step 2: Bidding 1-out-of –z OT Bidder 𝒊 encrypts 𝒃 𝒊 : 𝒆 𝒊 =𝑬𝒏𝒄𝒓𝒚𝒑𝒕 𝒃 𝒊 , 𝑲𝒆𝒚 𝒑𝒖𝒃 . Bidder 𝒊 sends 𝒆 𝒊 to the agent. Each bidder 𝒊 chooses a bid 𝒃 𝒊 = 𝜷 𝒙 ∈𝜷. Bidder 𝒊 receives 𝒃 𝒊 =𝑶𝑷𝑬𝑺 𝜷 𝒙 = 𝜸 𝒙 . The agent collects bids, groups bidders in a bid-independent way, publishes the grouping results and encrypted bids.

Design Details - Step 3: Opening The auctioneer decrypts the bids. The auctioneer locates the lowest bid 𝒃 𝒎𝒊𝒏 in each group. The auctioneer resorts to the agent to fetch the original value 𝒃 𝒎𝒊𝒏 of 𝒃 𝒎𝒊𝒏 . The auctioneer calculates group bids. The auctioneer determines the winners and their charges.

Message Flow in SPRING

Analysis Theorem 1. SPRING is a strategy-proof spectrum auction mechanism. We require that each bidder group must contain at least k bidders. Then we have Theorem 2. SPRING guarantees k-anonymity.

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

Virtual Group 𝑔 𝑙 1 𝑔 𝑙 2 𝑔 𝑙 𝑗 = 𝑖 𝑖∈ 𝑔 𝑙 ⋀ 𝑑 𝑖 ≥𝑗 𝑔 𝑙 𝑗 = 𝑖 𝑖∈ 𝑔 𝑙 ⋀ 𝑑 𝑖 ≥𝑗 𝑔 𝑙 3 𝑔 𝑙 2 𝑔 𝑙 1 𝜎 𝑙 𝑗 = 𝑔 𝑙 𝑗 ∙min⁡{ 𝑏 𝑖 |𝑖∈ 𝑔 𝑙 }

Extension Details – Step 2: Bidding The tuple submitted by bidder 𝒊 to the agent contains 𝒅 𝒊 . The agent separates bidders into non-conflicting groups, and publishes the grouping results, demands and encrypted bids.

Extension Details – Step 3: Opening The auctioneer decrypts the encrypted bids. The auctioneer cooperates with the agent to calculate the group bids. The auctioneer determines the winners and charges winners with their critical values.

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

Evaluation Setup Efficiency Overhead We implement SPRING using JavaSE-1.7 with packages java.security and javax.crypto, use RSA to do encryption/decryption and digital signature/verification. Efficiency Channel Utilization Satisfaction ratio Overhead Computation overhead Communication overhead

The computation overhead of each bidder is rather low. The running environment is Intel(R) Core(TM) i7 2.67GHz and Windows 7. The computation overhead of each bidder is rather low.

Communication Overhead The communication overhead grows linearly with the number of bidders.

Outline Motivation Preliminary SPRING SPRING with Multi-Channel Bids Evaluation Conclusion

Conclusion SPRING is the first strategy-proof and privacy preserving auction mechanism for spectrum redistribution. SPRING guarantees k-anonymous privacy protection both in single channel and multi-channel auctions. We have implemented SPRING and extensively evaluated its performance.

Thank You!