Spectrum sharing is a rearrangement of a rights regime among stakeholders. This rearrangement creates new real and perceived risks for these stakeholders (licensees and entrants). A reliable enforcement regime that ensures rights is a way to make these rights meaningful and to mitigate these risks. As spectrum is shared more intensively, it will become necessary (1) to treat enforcement comprehensively to improve the confidence of all stakeholders, and (2) automate enforcement procedures to the extent possible so that the outcomes of the enforcement process can occur in near real-time and at scale.
Much of the research and practice to date has (1) focused on interference protection of the incumbent and (2) focused on preventative (ex-ante) approaches. Several researchers have shown that the social cost (i.e., the opportunity cost of spectrum use) can be quite high and is not internalized appropriately by the decision makers. Further, static ex-ante approaches (such as exclusion or protection zones) are not easily adaptable to policy changes. Database-driven ex-ante enforcement (e.g. TV White Spaces database and the Spectrum Access System, or SAS) can be more responsive to changes but require constant connectivity with radios and may not be geographically fine-grained. We propose to develop efficient policy-based reasoning engines to reduce the social cost of ex-ante enforcement.
We also propose to advance techniques to automate the enforcement of events after they occur (ex-post enforcement). In general, this involves detection, forensic analysis and adjudication.
We will examine the different institutional strategies for ex-post enforcement (third party, self-enforcement, cooperative mutual enforcement) with the goal of understanding under what circumstances each approach would apply to spectrum sharing. To automate the detection of events, we propose an efficient technique that uses mobile agents that have different roles in identifying, verifying and localizing a potentially enforceable event. The next steps in the adjudication process is identifying the transmitters and ensuring that they comply with the necessary standards. To this end, we propose a secure and privacy-preserving identification technique (blind transmitter authentication) and a remote attestation technique.