Int J Performability Eng ›› 2020, Vol. 16 ›› Issue (12): 1985-1996.doi: 10.23940/ijpe.20.12.p15.19851996

• Orginal Article • Previous Articles    

Database-Assisted Dynamic Spectrum Allocation Method with Spectrum Security

Yong Chena, Yu Zhanga, b, *, Guojie Hub, Panfeng Hea   

  1. aThe Sixty-third Research Institute, National University of Defense Technology, Nanjing, 210007, China;
    bCollege of Communication Engineering, Army Engineering University of PLA, Nanjing, 210007, China
  • Submitted on ; Revised on ; Accepted on
  • Contact: * Corresponding author. E-mail address: zhyu63@163.com
  • About author:
    Yong Chen is a Professor at the Sixty-Third Research Institute, National University of Defense Technology. His research interests include wireless communications, spectrum management, and communication anti-jamming.
    Yu Zhang is an Associate Researcher at the Sixty-third Research Institute, National University of Defense Technology. His research interests include electromagnetic spectrum management, cognitive radio, and physical layer security.
    Guojie Hu is a Ph.D candidate in Communications and Information Systems at the Institute of Communications Engineering, Army Engineering University of PLA. His current research interests include energy harvesting, physical layer security, proactive eavesdropping, UAV and network coding.
    Panfeng He is an Engineer at the Sixty-Third Research Institute, National University of Defense Technology. His research interests include wireless communications, spectrum management.

Abstract: Database-assisted dynamic spectrum allocation, a dynamic spectrum allocation that is closest to practical application, is regarded as the core key technology of next-generation radio networks. However, it is easy for malicious users to obtain spectrum information and spectrum access opportunities from the spectrum database due to its openness and shareability. The database-assisted dynamic spectrum allocation will deal with more serious security problems. We discuss a practical and promising dynamic spectrum allocation scenario where some malicious users eavesdrop on legitimate users' transmission to access and imitate them. We propose a database-assisted dynamic spectrum allocation method with spectrum security. In the proposed method, legitimate users are required to transmit their spectrum identity information when transmitting communication signals. The spectrum database must consider the transmission of spectrum identity information when it dynamically allocates spectrum to these legitimate users. We establish the optimization model and its solution of the database-assisted dynamic spectrum allocation with spectrum security when the spectrum watermark of these legitimate users is embedded and extracted by the spread spectrum technology. The alternate optimization and differential convex (D.C.) programming optimization method is used to solve the proposed optimization problem based on the suboptimal equivalent that the channel allocation coefficients with values of is replaced by these continuous values of . The simulation results show that the proposed method can converge quickly and obtain approximate optimal performance with spectrum security.

Key words: dynamic spectrum allocation, database-assisted, spectrum security, spectrum watermark