Conference PaperPDF Available

Proof of Equation: A Novel Consensus Algorithm for Dynamic Spectrum Access

Authors:

Abstract

The future communication technology is moving from 5G to 6G with the innovation of new technologies. Blockchain (BC) is such kind of immersive technology which gives a huge impact on the betterment of communication technology. To fulfill the need for secure and efficient communication, BC-based spectrum-sharing solutions can be used in dynamic spectrum access(DSA) systems. With the invention of cognitive radio networks, dynamic spectrum access(DSA) became a popular topic for the scientific community. As the system is open to malicious attacks, licensed spectrum owners need to be identified and verified. Spectrum misuse(spectrum violations) can be happened due to rapid growth in spectrum sharing depending on intermediate illegitimate users. However, existing BC-based DSA solutions are more expensive,non-optimized, and lack of spectrum misuse detection. This paper proposes a novel consensus algorithm for spectrum misuse detection. The core of the proposed "Proof of Equation" consensus algorithm is a consensus score calculation based on a numerical equation with three main parameters rather than using cryptographic calculations. Therefore the proposed consensus is energy efficient by comparing the existing PoW consensus mechanism. Finally, to analyze the performance of the proposed consensus mechanism was simulated using python scripts.
Proof of Equation: A Novel Consensus
Algorithm for Dynamic Spectrum Access
Thiwanka Silva
Dept. of Electrical and Information Eng.
Faculty of Engineering
University of Ruhuna, Sri Lanka
eg173063@engug.ruh.ac.lk
Madhushika Bamunuge
Dept. of Electrical and Information Eng.
Faculty of Engineering
University of Ruhuna, Sri Lanka
eg173255@engug.ruh.ac.lk
Dilusha Dissanayake
Dept. of Electrical and Information Eng.
Faculty of Engineering
University of Ruhuna, Sri Lanka
eg173209@engug.ruh.ac.lk
Chatura Seneviratne
Dept. of Electrical and Information Eng.
Faculty of Engineering
University of Ruhuna, Sri Lanka
chatura@eie.ruh.ac.lk
Tharindu Gamage
Dept. of Electrical and Information Eng.
Faculty of Engineering
University of Ruhuna, Sri Lanka
tharindu@eie.ruh.ac.lk
Madhusanka Liyanage
School of Computer Science
University College of Dublin
Ireland
madhusanka.liyanage@oulu.fi
Abstract—The future communication technology is mov-
ing from 5G to 6G with the innovation of new technologies.
Blockchain (BC) is such kind of immersive technology which
gives a huge impact on the betterment of communication
technology. To fulfill the need for secure and efficient
communication, BC-based spectrum-sharing solutions can
be used in dynamic spectrum access(DSA) systems. With
the invention of cognitive radio networks, dynamic spec-
trum access(DSA) became a popular topic for the scientific
community. As the system is open to malicious attacks,
licensed spectrum owners need to be identified and veri-
fied. Spectrum misuse(spectrum violations) can be happened
due to rapid growth in spectrum sharing depending on
intermediate illegitimate users. However, existing BC-based
DSA solutions are more expensive,non-optimized, and lack
of spectrum misuse detection. This paper proposes a novel
consensus algorithm for spectrum misuse detection. The core
of the proposed ”Proof of Equation” consensus algorithm is
a consensus score calculation based on a numerical equation
with three main parameters rather than using cryptographic
calculations. Therefore the proposed consensus is energy
efficient by comparing the existing PoW consensus mech-
anism. Finally, to analyze the performance of the proposed
consensus mechanism was simulated using python scripts.
Index Terms—Blockchain, Smart Contracts, Spectrum Man-
agement, Spectrum Sharing, Dynamic Spectrum Access, Mis-
use Detection, 5G, 6G, Mobile Networks, Machine Learning
I. INTRODUCTION
In recent years, the spectral resource demand in-
creased drastically, at the same time with the develop-
ment of wireless technologies and user demand growth.
Currently, spectrum regulation authorities are practically
unable to address user demand for all its users. How-
ever, spectrum sharing is introduced to address these
issues. In this method, the spectrum can be shared based
on time, location, and space, and it can be achieved
through licensing arrangements. Even though the 4G
era has long supported spectrum sharing, a number of
difficult problems still prevent the effective application
of spectrum-sharing algorithms. Industry and academic
researchers have started to conceptualize the next gener-
ation of wireless communication systems (6G) in order
to solve these upcoming issues in 5G and 4G. When
designing future communication systems, it is always
important to have proper spectrum sharing to elimi-
nate the use of trusted third-party coordination, prevent
unauthorized access (spectrum misuse) and alteration
of radio frequency sharing records in databases and
establish strong security measures against attacks. These
requirements can be achieved by carefully integrating
BC technology with next-generation wireless communi-
cation systems.
The BC technology has shown strong evidence for im-
proving efficiency and security issues in many applica-
tion areas. [1]. The interest in BC increases due to its key
attributes such as security, anonymity, and data integrity.
Without any third-party organization, BC controls trans-
actions [2]. BC consists of consecutive blocks which are
chained together, creating a linked list. The consensus
algorithm is considered a core component of the BC
system. For the generation of the new blocks, the con-
sensus algorithm acts as a verification and measurable
mechanism to ensure the agreement states of specific
data among the distributed nodes of the BC network [3].
Proof of work(POW) and Proof of Stake(POS) are mainly
used as two consensus algorithms in BC networks. A
smart contract (SC) is a decentralized application that
executes business logic in response to events in the
BC platform. In Ethereum SCs solidity programming
language is used [4].
As mentioned, spectrum misuse is a crucial issue that
should be addressed when developing future wireless
communication systems. Current DSA systems are un-
able to monitor spectrum exploitation in real-time and
mitigate security risks. This could be seen as a critical
problem. Although the literature shows the number
of BC-enabling DSA techniques, they were unable to
address the above issues. Consensus algorithms can
be considered as key enabling features to address the
issues of the existing BC-enabled DSA solutions. When
developing consensus algorithms, it is important to pay
close attention to the communication network’s latency
and the computational costs for the network’s secondary
users with limited battery life. The current BC-based
DSA techniques use universal, all-purpose consensus
algorithms like PoW or PoS. These consensus algorithms
consume excessive computational costs and considerable
time during the mining process. Therefore, novel con-
sensus mechanisms must be designed and developed
to overcome the limitations of the existing consensus
algorithms used in DSA.
To address the mentioned research gap, this paper pro-
poses an RF sensing-enabled BC-based novel consensus
algorithm for DSA named ’Proof of Equation (PoE)’. PoE
is using a numerical equation with main three param-
eters such as sensor capability, hash proportion(stake),
and similarity score to calculate the consensus score
rather than using cryptographic calculations. Therefore
the PoE is energy efficient by comparing the existing
PoW consensus mechanism. Further, A prototype of the
PoE is implemented using Python scripts-based simula-
tion to evaluate the performance related to the scalabil-
ity, block production time, and transaction throughput.
GNU radio software has been used for sensor capability
implementation.
II. OUTLINE
The remainder of this paper can be outlined as fol-
lows. Section III discusses the current state of the art
of BC based DSA and consensus algorithms. Section
IV describes the operation of the proposed consensus
architecture. The performance evaluation is given on
Section V, and finally, conclusions are drawn in section
VI.
III. RELATED WORKS
In [4], a BC-based digital token-based approach was
introduced to track and validate the use of licensed
frequency bands in DSA. This work has used ERC721
standard (non-fungible token standard) and developed
a proof of concept (POC) solution using Ethereum BC.
When a particular frequency band (FB) is leased, the
spectral token is transferred (Ownership transfer) from
PU to SU using SC which is a special form of an SC-
named token contract. This spectral token needs to be
automatically returned to the PU after the termination
of the lease period agreed before. If multiple SUs at the
same time request the same FB, PU can select the best
bidder based on price and the lease time.
A novel direction for BC-based mobile network in-
frastructure is discussed in [5]. The key feature of the
proposed structure is the tokenization of spectrum and
network infrastructure that allows trading them with
multiple mobile network operators(MNOs) over BC. The
proposed tokenized model for spectrum, service pricing,
and infrastructure can be listed as follows,
1) The radio resource token(RRT)
2) The Infrastructure Resource token(IRT)
3) The National Cryptocurrency(NC)
In this framework, it uses five key ledgers for net-
work management with the use of above mentioned
digital currencies. Each ledger carries out a specific
task assigned to it. Generally, mobile networks have
thousands of transactions per second depending on
the user demand. Therefore the performance of all the
above ledgers completely depends on transaction speed.
The critical factor affecting blockchain performance is
the underlying consensus mechanism. Therefore suit-
able consensus algorithms have to be selected for the
mobile networks by comparing their features. After a
comparison of different consensus algorithms, Proof-of-
Formulation(PoF) is identified as the capable algorithm
for the consensus process for mobile network manage-
ment. Although PoF seems to be a capable algorithm it
is not suitable specifically for DSA. In [6], authors have
proposed a scalable, secure novel consensus algorithm
namely, Delegated Proof of Reputation(DPoR) which is
a modified version of Delegated Proof of Stake. For the
miner selection process, a reputation voting mechanism
is used in DPoR rather than a stake voting mechanism as
in DPoS. In DPoR, a reputation score is calculated for the
reputation voting mechanism. Every node must register
its account with an official address in this reputation
voting mechanism. The reputation concept in DPoR con-
sists of a combination of three factors which is defined
in 1. P, U, and R are for stake power, resource usage,
and the transaction-based reputation rating respectively.
w1+w2+w3also equals to 1.
Rep =w1P+w2U+w3R(1)
Stake power is calculated based on the account’s staked
tokens. In the DPoS consensus, the stake amount is con-
verted to the vote weight. But DPoR consensus process
uses SCs, unlike DPoS. If an account has an amount to
be used for voting, it will be moved 10% to a staking
SC every day and then converted to stake power in
DPoR. Then, an account’s CPU, RAM, and bandwidth
are considered resource usage. Transaction activity(R)
is the most significant factor in this innovation. Some
accounts can have many in/out transactions. That type
of account is much appreciated in this transaction ac-
tivity calculation process. In [7], a novel customized
consensus mechanism called proof of sense is proposed
to detect spectrum fraud in wireless networks. Unlike
other conventional algorithms like PoS and PoW, this
mechanism follows an energy-efficient way to collect
spectrum sensing data to detect spectrum violation. In
this mechanism sensing nodes(miners) have to partic-
ipate in a cryptographic key recovery phase which is
initiated by the spectrum regulator. The spectrum sen-
sor that captures this random cryptographic key first
becomes the next block creator and can forge the next
block.
The works proposed in [4] and [5] employed generic
consensus algorithms for the proposed DSA solutions.
As work done in [4] used PoW consensus mechanism
its DSA solution is less energy efficient and expen-
sive. Furthermore, the above solutions lack application-
specific consensus in their implementation and it lacks
spectrum misuse detection capability. In work [6] it
introduced a reputation-based algorithm but it is also
generic and couldn’t be used in DSA-based applications
to gain application-specific performance. The proof of
sense consensus mechanism is customized for spectrum
misuse detection in DSA. This mechanism addressed
what was missed in the above two BC systems. The main
thing missing in this algorithm was the evaluation of
spectrum data quality.
IV. OPERATION OF THE PROP OS ED CO NS EN SU S
ALGORITHM - PROOF OF EQUATION (POE)
The main objective of this study is to propose a
customized novel consensus algorithm for spectrum mis-
use detection. Figure 1 presents the overall consensus
architecture of the proposed novel consensus algorithm.
It is named as ”Proof of Equation(PoE)”, which is
scalable and secure with an acceptable decentralization.
It is developed by referring to the proof of stake con-
sensus algorithm(PoS), where stake can be defined as
the number of holdings of a wallet. The core of the
proposed PoE consensus algorithm is consensus score
calculation based on a numerical equation with main
three parameters such as sensor capability, hash pro-
portion (stake), and similarity score, rather than using
cryptographic calculations. Therefore this algorithm is
cost-effective and energy-efficient as no hash power is
consumed. Due to that reason, miners are not needed.
The numerical equation of consensus score(V) can be
defined as follows.
V=aC +bH +cS (2)
C, H and S parameters can be defined by,
C - Sensor capability.
H - Hash proportion/stake.
S - Similarity score.
Vmax = 1 and Vmin = 0
A. Obtaining Parameters
Sensor Capability(C) : A known text-embedded signal
is transmitted by the regional operator. Then, Sensors
should detect that text-embedded transmitted signal and
extract the text. At the receiver end, detection probability
is calculated. For that process, a simple algorithm is
used. By employing SC at the receiver side, the transmit-
ted text by the regulator can be obtained for comparison
with the received text. The receiver should not be able
to modify the transmitted text. By calling the SC, each
of the sensors gets the operator-transmitted raw text
value and it compares with the sensor’s received text
value. The detection probability value is calculated based
on the difference between the transmitted and received
texts(based on errors in the received text). Finally, the cal-
culated detection probability value should be assigned
to the equation in 2 as the sensor capability value (C).
The complete process for obtaining the sensor capability
value is portrayed in Figure 2.
Hash Proportion/Stake(H) Sensed data should be
uploaded to the IPFS database from time to time by
every sensor. Each sensor will receive a hash for each
data uploaded. Hash is a fixed-sized string that can be
used uniquely to identify data. The hash proportion is
calculated by the number of hash values collected by
each sensor over the number of hashes it can collect for
24 hours. Once the sensor becomes the winning node,
it can upload all pending hash values to the BC.
H=No. of hashes generated
No. of hashes It can generate in one day (3)
Similarity Score(S) Every sensor in the network receives
other sensors’ data set hashes using BC transactions.
Then, access the other sensor’s spectrum data in the
IPFS database using hash values. The similarity score
is calculated by computing the correlation coefficient
between each data set received from other sensors and
datasets of its own.
B. Parameter Combination
According to the equation 1 there are three coefficient
values a,b, and c for sensor capability, similarity score,
and Hash Proportion respectively. Sensor Capability -
Coefficient a: The coefficient a was defined using the
traffic intensity of the day. When the traffic intensity
is high, spectrum sensors in the network need a
higher capability to collect more accurate data by
spectrum sensing. When the traffic intensity is low,
this requirement can be slightly relaxed. Therefore, the
coefficient of sensor capability ”a” should have a higher
priority when the traffic intensity is high. This can be
achieved by normalizing the network traffic to the range
between 0 and 1 and getting that value for coefficient
”a”. This coefficient value needs to be applied to all
sensors in the selected area. Hash Proportion/Stake
- Coefficient b: When the number of sensors in the
area is higher, repetition of the same data sets can be
expected. This will work the other way around when
the network’s number of sensor nodes is low. Therefore,
when sensors in the network are low, Stake should
have higher priority to get the total capacity of the
sensors. Therefore stake coefficient “b” can be defined as,
b=1
Number of sensors in the system (4)
Fig. 1. Workflow of the Proposed PoE Consensus Architecture
Fig. 2. Proposed Method for The Detection Probability Calculation
The coefficient of hash proportion will be more promi-
nent when there are fewer sensors and lower when
sensors in the area are higher.
Similarity Score - Coefficient c: The similarity score
helps to eliminate malicious users in the system because
the correlation coefficient between malicious data sets
and honest sensors has a significant difference. Data
similarity coefficient “c” is crucial for all the sensors
regardless of the location and traffic density. Therefore
malicious users would not be able to have a considerable
similarity score for malicious data sets, which results in a
low consensus score for malicious users. Coefficient ”c”
sets to one to give the highest priority.
V. SIMULATION
The Proof of Equation algorithm was implemented
using the Python3 programming language. As this is a
simulation, only back-end development was carried out
using REST APIs with the Flask framework. This BC was
Fig. 3. High-level View of the Simulation
simulated by using multiple nodes which run on a local
computer.
Blockchain nodes are connected using socket commu-
nication. Every node has a wallet which used to create
transactions within the network. This digital wallet has
a public key and a private key. It is used to add digital
signatures to transactions and blocks. For the simulation,
transactions were posted to the network by executing
a python script with transactions included. Figure 3
portraits the high-level view of the simulation.
All the simulations were carried out on a laptop that
has a core i7-1165G7 CPU and 8GB RAM. Nodes in
the network were simulated by running the python
script in multiple command terminals. When a defined
number of transactions are completed in the network, the
consensus score for each transaction was calculated by
using 3 parameters. Then block creator is selected after
the consensus score calculation, and it creates the block
and adds it to the BC. When reaching the consensus in
the network, the winner’s node’s screen output as “I am
the forger,” and other nodes output as “I am not the
forger”.
This section presents the performance evaluation of
the PoE consensus algorithm. We have evaluated the
Scalability, block production time, and throughput of our
proposed PoE algorithm.
A. Scalability of PoE
Scalability in a BC network indicates the ability of a
consensus protocol to handle the increasing number of
BC nodes. In theory, PoW which is used in bitcoin has
the scalability feature to a greater extent. It can hold as
many users in the network. We started the simulation
with a network size of 4 participants, then we adjust
the network size from 4 to 10 with step 2. Furthermore,
we set the block size fixed to 500. We quantify the
average time to produce a block and results are shown
in Figure 4. We can observe that when we increase the
network size from 4 to 10 average block production time
increases slightly by millisecond. We can expect that our
protocol can provide higher scalability by observing this
bar chart.
246 8 10 12
0
50
100
150
No. of Nodes
Average Block Production Time(ms)
Fig. 4. Average Block Production Time Variation with Different Net-
work Sizes
B. Block Production Time
Next, we vary the number of transactions in a block
from 100 to 500 to measure the average time it takes
to produce a block with different network sizes. In our
simulation, we measured the block production time with
different network sizes ranging from 4 to 10. Figure
5 reveals a continual growth of block production time
with the number of transactions in a block(block size).
This is because as the block size increases block creator
needs to process more transactions. Here, Processing
tasks include Merkle tree calculation, winner IPFS hash
selection, and packaging transactions in the transaction
pool to the block. After completing the above processes,
a block will be created. Therefore, block production
time will continue to grow when block size increases.
Furthermore, we can observe that when the number of
nodes in the network increases block production time
will be increased slightly than the previous level of
nodes for the same block size. This is because when the
network size increases node with the highest consensus
score have to be found by iteration.
We have simulated the PoW and PoS consensus mech-
anisms to compare the block production time with the
PoE consensus algorithm with 100 transactions. The dif-
ficulty in PoW is set to five zeros. The results are shown
in Table I. We can observe that the PoW consensus
mechanism consumed a higher time than the other two
algorithms. Therefore it is clear that PoW is inefficient
and energy-consuming. But PoS and PoE consume very
little time to forge a block compared to PoW. Table I
reveals that PoE is around four times faster than PoS. The
reason for this is PoE has a linear equation to select the
next forger. Therefore we can conclude that the proposed
PoE is fast and efficient compared to popular algorithms
like PoS and PoW.
TABLE I
COMPARISON OF BLOCK PRODUCTION TI ME OF DIFFE REN T
CONSEN SUS MECHANISMS
Consensus Algorithm Block Production Time (s)
PoW 277.38784
PoS 0.06123
Proof of Sense [7] 9.06
PoE (Proposed) 0.03085
C. Transaction Throughput
Transaction throughput of a BC network is the num-
ber of transactions that can be processed in a unit of
time. Our proposed PoE algorithm is computationally
efficient as it uses a consensus score rather than solving a
cryptographic puzzle. In this simulation, we have incre-
mented the block size from 100 to 500 and the network
size from 4 to 10 using steps of two. Figure 6 reveals
how throughput varies in the simulated network. We
can observe that transaction throughput increases when
blocking size increases. When considering the variation
of transaction throughput with different network sizes
we can conclude that if the network size is smaller
throughput is high. This is because smaller networks
have a lower delay as it uses less bandwidth.
D. Feature Comparison
Table II summarizes a feature comparison between ex-
isting blockchain-based and non-blockchain-based spec-
trum sharing systems with the proposed system. (Here,
LLow, MMedium, HHigh, -Not Relevan-
t/Not Available )
100 200 300 400 500
30
45
60
75
90
105
120
135
150
Block Size
Average Block Production Time(ms)
4 Nodes
6 Nodes
8 Nodes
10 Nodes
Fig. 5. Variation of Block Production Time with Different Block Sizes
100 200 300 400 500
1,000
2,000
3,000
4,000
5,000
6,000
Block Size
Throughput
4 Nodes
6 Nodes
8 Nodes
10 Nodes
Fig. 6. Variation of Throughput with Different Block Sizes
VI. CONCLUSION
This paper introduces a novel consensus algorithm
namely, Proof of Equation(PoE) for DSA. The proposed
algorithm is based on the consensus score rather than a
cryptographic calculation. Therefore the proposed con-
sensus is energy efficient when compared with the exist-
ing PoW consensus mechanism. In PoE, the sensor with
the highest consensus score will forge the next block
in the BC. The performance of the PoE was evaluated
by considering the block production time and through-
put while increasing block size. The scalability of the
proposed consensus was also evaluated with different
network sizes. PoE was also compared with the existing
algorithms PoW and PoS related to the block production
time. The results verify that the PoE consensus algorithm
can outperform the PoW, PoS and proof of sense in terms
of block production time and throughput. Therefore, the
PoE consensus is fast and efficient for DSA and can ad-
dress the issues in existing consensus mechanisms. Addi-
tionally, the proposed mechanism is capable of collecting
TABLE II
FEATURES COMPARISON WITH KE Y REL ATED WO RKS
Features [8] [9] [10] [4] [11] [5] [12] [7] Ours
Blockchain
based
✓✓✓✓✓✓
Spectrum
Sensing
Spectrum
Fraud
Detection
Off-Chain
Storage
- - ✗✗✗
Tailored
Consensus
- -
Data Vali-
dation
-------
Computa-
tional Cost
M L H H H H L L L
spectrum data to detect spectrum misuse. Developing
the DSA system with the proposed consensus algorithm
using hardware like Software Defined Radios(SDRs) and
raspberry pi computers is left as the future research area.
REFERENCES
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
Decentralized Business Review, p. 21260, 2008.
[2] J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, “Where
is current research on blockchain technology?—a systematic re-
view,” PloS one, vol. 11, no. 10, p. e0163477, 2016.
[3] J. Ye, X. Kang, Y.-C. Liang, and S. Sun, “A trust-centric privacy-
preserving blockchain for dynamic spectrum management in iot
networks,” IEEE Internet of Things Journal, 2022.
[4] T. Ariyarathna, P. Harankahadeniya, S. Isthikar, N. Pathirana,
H. D. Bandara, and A. Madanayake, “Dynamic spectrum access
via smart contracts on blockchain,” in 2019 IEEE Wireless Com-
munications and Networking Conference (WCNC). IEEE, 2019, pp.
1–6.
[5] T. Maksymyuk, J. Gazda, M. Volosin, G. Bugar, D. Horvath,
M. Klymash, and M. Dohler, “Blockchain-empowered framework
for decentralized network management in 6g,” IEEE Communica-
tions Magazine, vol. 58, no. 9, pp. 86–92, 2020.
[6] T. Do, T. Nguyen, and H. Pham, “Delegated proof of reputation:
A novel blockchain consensus,” in Proceedings of the 2019 Interna-
tional Electronics Communication Conference, 2019, pp. 90–98.
[7] P. Fernando, K. Dadallage, T. Gamage, C. Seneviratne,
A. Madanayake, and M. Liyanage, “Proof of sense: A novel
consensus mechanism for spectrum misuse detection,” IEEE
Transactions on Industrial Informatics, vol. 18, no. 12, pp. 9206–
9216, 2022.
[8] B. Cho, K. Koufos, R. J¨
antti, and S.-L. Kim, “Co-primary spectrum
sharing for inter-operator device-to-device communication,” IEEE
Journal on Selected Areas in Communications, vol. 35, no. 1, pp. 91–
105, 2017.
[9] Y. Teng, Y. Wang, and K. Horneman, “Co-primary spectrum
sharing for denser networks in local area,” in 2014 9th Interna-
tional Conference on Cognitive Radio Oriented Wireless Networks and
Communications (CROWNCOM), 2014, pp. 120–124.
[10] M. B. H. Weiss, K. Werbach, D. C. Sicker, and C. E. C. Bastidas,
“On the application of blockchains to spectrum management,”
IEEE Transactions on Cognitive Communications and Networking,
vol. 5, no. 2, pp. 193–205, 2019.
[11] K. Kotobi and S. G. Bilen, “Secure blockchains for dynamic
spectrum access: A decentralized database in moving cognitive
radio networks enhances security and user access,” IEEE Vehicular
Technology Magazine, vol. 13, no. 1, pp. 32–39, 2018.
[12] Y. Liang, C. Lu, Y. Zhao, and C. Sun, “Interference-based consen-
sus and transaction validation mechanisms for blockchain-based
spectrum management,” IEEE Access, vol. 9, pp. 90 757–90 766,
2021.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Optimal use of scarce radio spectrum is essential in the proliferation of beyond 5G networks, and promising blockchain technology offers various benefits for the spectrum management. However, existing blockchain-based solutions are expensive, nonoptimized, and lack spectrum fraud detection. This article proposes a novel consensus mechanism for a blockchain-based dynamic spectrum access (DSA) system. The proposed “ Proof-of-Sense ” consensus mechanism operates based on spectrum sensing procedures rather than cryptographic calculations. It is specially designed to address fraudulent/unauthorized access to the spectrum by analyzing the sensed spectrum data. The core of the consensus mechanism is a cryptographic key sharing mechanism inspired by Shamir’s secret sharing scheme. Moreover, the proposed DSA system can enable different microservices, such as automated spectrum auctions, payment and penalty handling, and spectrum fraud detection. A proof of concept based on experimental approaches coupled with Matlab simulations is presented to analyze the performance of the proposed consensus mechanism.
Article
Full-text available
The convergence of dynamic spectrum access (DSA) and blockchain has been regarded as the new paradigm of spectrum management. Because of the inherent properties of blockchain, such as decentralization and tamper-resistance, the deployment of blockchain in future networks has advantages to address problems exposed in traditional centralized spectrum management systems, such as high security risk and low allocation efficiency. In this article, we first compare blockchain-based spectrum management with the traditional centralized approach and then present a reference architecture for blockchain-based spectrum management. In particular, we propose an interference-based consensus mechanism, which can be employed to improve transaction efficiency and reduce system overhead while promoting spectrum sharing. The proposed consensus mechanism is based on the comparison of aggregated interference experienced by each node, such that the node that suffers the most aggregated interference will obtain the accounting right as a compensation. Furthermore, to avoid harmful interference caused by spectrum traders, an interference-based transaction validation mechanism is designed to validate the spectrum transactions stored in the blocks. Different from existing transaction validation mechanisms in which every transaction needs to be validated by all nodes, a “transaction validation area” is determined for each spectrum transaction, and only the nodes located in the validation area need to validate the transaction. The simulation results show that the system fairness and nodes’ signal-to-interference-and-noise power ratio (SINR) can be improved by adopting the proposed mechanisms while reducing the system overhead.
Conference Paper
Full-text available
Consensus mechanism is the heart of any blockchain network. Many projects have proposed alternative protocols to improve restricted scalability of Proof of Work originated since Bitcoin. As an improvement of Delegated Proof of Stake, in this paper, we introduce a novel consensus, namely, Delegated Proof of Reputation, which is scalable, secure with an acceptable decentralization. Our innovative idea is replacing pure coin-staking by a reputation ranking system essentially based on ranking theories (PageRank, NCDawareRank and HodgeRank).
Article
Full-text available
The business potential of device-to-device (D2D) communication including public safety and vehicular communications will be realized only if direct communication between devices subscribed to different mobile operators (OPs) is supported. One possible way to implement inter-operator D2D communication may use the licensed spectrum of the OPs, i.e., OPs agree to share spectrum in a co-primary manner, and inter-operator D2D communication is allocated over spectral resources contributed from both parties. In this paper, we consider a spectrum sharing scenario where a number of OPs construct a spectrum pool dedicated to support inter-operator D2D communication. OPs negotiate in the form of a non-cooperative game about how much spectrum each OP contributes to the spectrum pool. OPs submit proposals to each other in parallel until a consensus is reached. When every OP has a concave utility function on the box-constrained region, we identify the conditions guaranteeing the existence of a unique equilibrium point. We show that the iterative algorithm based on the OP's best response might not converge to the equilibrium point due to myopically overreacting to the response of the other OPs, while the Jacobi-play strategy update algorithm can converge with an appropriate selection of update parameter. Using the Jacobi-play update algorithm, we illustrate that asymmetric OPs contribute an unequal amount of resources to the spectrum pool; However all participating OPs may experience significant performance gains compared to the scheme without spectrum sharing.
Article
Full-text available
Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. In this research, we have conducted a systematic mapping study with the goal of collecting all relevant research on Blockchain technology. Our objective is to understand the current research topics, challenges and future directions regarding Blockchain technology from the technical perspective. We have extracted 41 primary papers from scientific databases. The results show that focus in over 80% of the papers is on Bitcoin system and less than 20% deals with other Blockchain applications including e.g. smart contracts and licensing. The majority of research is focusing on revealing and improving limitations of Blockchain from privacy and security perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other Blockchain scalability related challenges including throughput and latency have been left unstudied. On the basis of this study, recommendations on future research directions are provided for researchers.
Article
Blockchain is a promising technology for future dynamic spectrum access (DSA) management due to its decentralization, immutability, and traceability. However, many challenges need to be addressed to integrate the blockchain to DSA, such as the trustworthiness of participating nodes’ spectrum sensing results, privacy protection of sensing nodes’ identities, and affordable lightweight consensus algorithms for IoT devices. In this paper, we propose a trust-centric privacy-preserving blockchain for dynamic spectrum access in IoT networks. To be specific, we propose a trust evaluation mechanism to evaluate the trustworthiness of sensing nodes and design a Proof-of-Trust (PoT) consensus mechanism to build a scalable blockchain with high transaction-per-second (TPS). Moreover, a privacy protection scheme is proposed to protect sensors’ real-time geolocation information when they upload sensing data to the blockchain. Two smart contracts are designed to make the whole procedure (spectrum sensing, spectrum auction, and spectrum allocation) run automatically. Simulation results demonstrate the expected computation cost of the PoT consensus algorithm for reliable nodes is low, and the cooperative sensing performance is improved with the help of trust evaluation mechanism. =-1 In addition, incentivization and security are also analyzed, which show that our system can not only encourage nodes’ participation, but also resist many kinds of attacks which are frequently arise in trust management mechanism and blockchain based IoT systems.
Article
Mobile network evolution beyond 5G requires a complete rethink of spectrum management. To fulfill unprecedented performance expectations, future 6G networks require fine-grained spectrum sharing in terms of volume, time, and usage area. In this article, we study a novel direction for blockchain integration into the mobile network infrastructure. In particular, we discuss the potential benefits and challenges of the proposed architecture in terms of spectrum and infrastructure sharing. The key implementation aspects of blockchain for 6G, such as a tokenization model for spectrum and infrastructure, the distributed ledger structure, and feasible consensus algorithms, are studied in detail. Finally, we implement three types of smart contracts for service provisioning with semi-persistent, dynamic, and intelligent spectrum trading and analyze the number of transactions for each type. The simulation results show that the average throughput in the case of intelligent spectrum trading is 7 percent higher than that of the semi-persistent trading and 4 percent lower than that of the dynamic trading. From the economic perspective of operators, intelligent trading provides 19 percent more profit than semi-persistent trading and 8 percent less profit than intelligent trading. Intelligent trading also has much lower overhead in the blockchain than dynamic trading, while being very close to the lowest overhead of semi-persistent trading.
Article
Spectrum sharing mechanisms have evolved to meet different needs related to increasing spectrum use efficiency. At first, decentralized and opportunistic cognitive radios (and cognitive radio networks) were the primary focus of research for these mechanisms. This gradually transitioned towards the development of cooperative sharing methods based on databases, typified by TV White Spaces databases. Spectrum sharing is now the basis for the dynamic and fine-grained spectrum rights regime for the Citizen’s Band Radio Service (CBRS) as well as for License Shared Access (LSA). The emergence of the cryptocurrency Bitcoin has stimulated interest in applying its underlying technology, blockchain, to other applications as well, such as securities trading and supply chain management. This paper explores the application of blockchain to radio spectrum management. While blockchains could underlie radio spectrum management more broadly, we will focus on dynamic spectrum sharing applications. Like the cooperative approaches currently in use, blockchain is a database technology. However, a blockchain is a decentralized database in which the owner of the data maintains control. We consider the benefits and limitations of blockchain solutions in general, and then examine their potential application to four major categories of spectrum sharing.
Article
In this article, we propose a blockchain verification protocol as a method for enabling and securing spectrum sharing in moving cognitive radio (CR) networks. The spectrum-sharing mechanism is used as a medium-access protocol for accessing wireless bandwidth among competing CRs. We introduce a virtual currency, called Specoins, for payment to access the spectrum. An auction mechanism based on a first-come-first-served queue is used, with the price for the spectrum advertised by each primary user in a decentralized fashion. The blockchain protocol facilitates the transactions between primary and secondary users and is used to validate and save each user’s virtual wallet. Also important for mobile networks, the blockchain serves as a distributed database that is visible by all participating parties, and any node can volunteer to update the blockchain. The volunteer nodes are called miners, and they are awarded with Specoins. We propose diverse methods to exchange the Specoins to make leasing possible even by CRs that are not miners. We show the improvement of the proposed algorithm compared with the conventional Aloha medium-access protocol in terms of spectrum usage. This difference is investigated using small-scale fading variation in the wireless channel to compare the performance of our secure method with the conventional medium access used in vehicular communications. The secure blockchain verification protocol is not only secure but also outperforms the conventional system in moderate cases of small-scale fading. In the case of severe small-scale fading, the blockchain protocol will outperform the conventional system if multipath diversity is not used.