A secure double spectrum auction scheme

Jiaqi Wang , Ning Lu , Ziyang Gong , Wenbo Shi , Chang Choi

›› 2024, Vol. 10 ›› Issue (5) : 1415 -1427.

PDF
›› 2024, Vol. 10 ›› Issue (5) :1415 -1427. DOI: 10.1016/j.dcan.2022.12.007
Research article
research-article

A secure double spectrum auction scheme

Author information +
History +
PDF

Abstract

With the arrival of the 5G era, wireless communication technologies and services are rapidly exhausting the limited spectrum resources. Spectrum auctions came into being, which can effectively utilize spectrum resources. Because of the complexity of the electronic spectrum auction network environment, the security of spectrum auction can not be guaranteed. Most scholars focus on researching the security of the single-sided auctions, while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers. Researchers begin to design the secure double spectrum auction mechanisms, in which two semi-honest agents are introduced to finish the spectrum auction rules. But these two agents may collude with each other or be bribed by buyers and sellers, which may create security risks, therefore, a secure double spectrum auction is proposed in this paper. Unlike traditional secure double spectrum auctions, the spectrum auction server with Software Guard Extensions (SGX) component is used in this paper, which is an Ethereum blockchain platform that performs spectrum auctions. A secure double spectrum protocol is also designed, using SGX technology and cryptographic tools such as Paillier cryptosystem, stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions. In addition, the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification, and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions. Finally, security analysis and performance evaluation of our protocol are discussed.

Keywords

Secure double spectrum auction / SGX technology / Privacy information / Ethereum platform / Verification

Cite this article

Download citation ▾
Jiaqi Wang, Ning Lu, Ziyang Gong, Wenbo Shi, Chang Choi. A secure double spectrum auction scheme. , 2024, 10(5): 1415-1427 DOI:10.1016/j.dcan.2022.12.007

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

T. Ahmed, S. Rahman, S. Ferdousi, M. Tornatore, A. Mitra, B. Chand Chatterjee, B. Mukherjee, Dynamic routing, spectrum, and modulation-format allocation in mixed-grid optical networks, IEEE/OSA.J. Opt. Commun. Netw. 12 (5) (2020) 79-88.

[2]

A. Tolegenova, A. Zhanys, S. Nurkasymova, L. Soboleva, Overview of 4g, 5g radio spectrum spectrum in the world and Kazakhstan, IOP Conf. Ser. Mater. Sci. Eng. 934 (2020) 012055.

[3]

A. Kos, V. Milutinović, A. Umek, Challenges in wireless communication for connected sensors and wearable devices used in sport biofeedback applications, Future Generat. Comput. Syst. 2018, 92(MAR.): 582-592.

[4]

Y. Li, H. Ma, L. Wang, S. Mao, G. Wang, Optimized content caching and user association for edge computing in densely deployed heterogeneous networks, IEEE.Trans. Mobile.Comput.PP (99) (2020), 1-1.

[5]

S. Xin, M.R. Ogiela, C. Chang, C. Esposito, K. Lim, Editorial: special issue on ”internet of things and edge computing in the new 5g era, Digit. Commun.Network 7 (2) (2021) 167-169.

[6]

S. Xia, Z. Yao, Y. Li, S. Mao, Online distributed offloading and computing resource management with energy harvesting for heterogeneous mec-enabled iot, IEEE Trans. Wireless Commun. 20 (10) (2021) 6743-6757.

[7]

H. Shajaiah, A. Abdelhadi, C. Clancy, An optimal strategy for determining true bidding values in secure spectrum auctions, IEEE Syst. J. 13 (2) (2019) 1190-1201.

[8]

F. Hu, B. Chen, K. Zhu,Full spectrum sharing in cognitive radio networks toward 5g: a survey, IEEE Access 6 (2018) 15754-15776.

[9]

X. Zhou, S. Gandhi, S. Suri, H. Zheng, Ebay in the sky: strategy-proof wireless spectrum auctions, Proc of Acm Mobicom (2008) 2-13.

[10]

Y. Li, C. Liao, Y. Wang, C. Wang, Energy-efficient optimal relay selection in cooperative cellular networks based on double auction, IEEE Trans. Wireless Commun. 14 (8) (2015) 4093-4104.

[11]

Q. Huang, Y. Tao, F. Wu, Spring: a strategy-proof and privacy preserving spectrum auction mechanism, in: 2013 Proceedings IEEE INFOCOM, IEEE, 2013, pp. 827-835. IEEE.

[12]

F. Wu, Q. Huang, Y. Tao, G. Chen, Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks, IEEE/ACM Trans. Netw. 23 (4) (2015) 1271-1285.

[13]

H. Huang, X.-Y. Li, Y.-e. Sun, H. Xu, L. Huang, Pps: privacy-preserving strategyproof social-efficient spectrum auction mechanisms, IEEE Trans. Parallel Distr. Syst. 26 (5) (2014) 1393-1404.

[14]

K. Zhu, D. Niyato, P. Wang, Z. Han, Dynamic spectrum leasing and service selection in spectrum secondary market of cognitive radio networks, IEEE Trans. Wireless Commun. 11 (3) (2012) 1136-1145.

[15]

L. Lu, W. Jiang, L. Bai, C. Chen, J. He, H. Xiang, W. Luo, Spectrum redistribution for cognitive radios using discriminatory spectrum double auction, Wireless Commun. Mobile Comput. 13 (8) (2013) 774-789.

[16]

C. Yi, J. Cai, G. Zhang, Online spectrum auction in cognitive radio networks with uncertain activities of primary users, in: 2015 IEEE International Conference on Communications, ICC, 2015, pp. 7576-7581.

[17]

L. Chen, L. Huang, Z. Sun, H. Xu, H. Guo, Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers, IET Commun. 9 (17) (2015) 2085-2094.

[18]

Q. Wang, J. Huang, Y. Chen, X. Tian, Q. Zhang, Privacy-preserving and truthful double auction for heterogeneous spectrum, IEEE/ACM Trans. Netw. 27 (2) (2019) 848-861.

[19]

Z. Chen, X. Wei, H. Zhong, J. Cui, Y. Xu, S. Zhang, Secure, efficient and practical double spectrum auction, in: 2017 IEEE/ACM 25th International Symposium on Quality of Service, IWQoS, 2017, pp. 1-6.

[20]

L. Li, L. Huang, A. Liu, W. Yang, Y. Shen, B. Leng, Secure double spectrum auctions, in: 2015 IEEE 23rd International Symposium on Quality of Service, IWQoS, 2015, pp. 81-82.

[21]

Z. Chen, X. Wei, H. Zhong, J. Cui, Y. Xu, S. Zhang, Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter, 2018 arXiv: 1810.07880.

[22]

J. Wang, N. Lu, Q. Cheng, L. Zhou, W. Shi, A secure spectrum auction scheme without the trusted party based on the smart contract, Digit. Commun.Network 7 (2) (2021) 223-234.

[23]

Z. Xia, H. Zheng,Trust: a general framework for truthful double spectrum auctions, in: INFOCOM 2009, IEEE, 2009, pp. 999-1007.

[24]

E. Yao, L. Lu, J. Wei, An Efficient Truthful Double Spectrum Auction Design for Dynamic Spectrum Access, IEEE, 2011, pp. 181-185.

[25]

S.G. Wang, X. Ping, X.H. Xu, S.J. Tang, L. Xin, Toda: truthful online double auction for spectrum allocation in wireless networks, in: New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, 2010, pp. 1-10.

[26]

Z. Chen, L. Huang, L. Li, W. Yang, H. Miao, M. Tian, F. Wang, Ps-trust: provably secure solution for truthful double spectrum auctions, IEEE (2013) 1249-1257.

[27]

Q. Wang, J. Huang, Y. Chen, C. Wang, F. Xiao, X. Luo, prost: privacy-preserving and truthful online double auction for spectrum allocation, IEEE Trans. Inf. Forensics Secur. 14 (2) (2019) 374-386.

[28]

Z. Chen, H. Huang, Y.-e. Sun, L. Huang, True-mcsa: a framework for truthful double multi-channel spectrum auctions, IEEE Trans. Wireless Commun. 12 (8) (2013) 3838-3850.

[29]

R.L. Rivest, A. Shamir, Y. Tauman,How to Leak a Secret: Theory and Applications of Ring Signatures, Springer Berlin Heidelberg, 2006. DOI, https://doi.org/10.1007/11685654_7.

[30]

T. Bergan, O. Anderson, J. Devietti, L. Ceze, D. Grossman, J. Criswell, N. Dautenhahn, N.V. Saberhagen, V. Ciancaglini, M. Balduzzi,Cryptonote v 2.0 (2013).

[31]

F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, U. R. Savagaonkar, Innovative instructions and software model for isolated execution. ACM10 (1)(2013).

[32]

I. Anati, S. Gueron, S.P. Johnson, V.R. Scarlata, Innovative Technology for Cpu Based Attestation and Sealing, 2013.

[33]

G. Oliva, A.E. Hassan, Z. Jiang, An exploratory study of smart contracts in the ethereum blockchain platform, Empir. Software Eng. 25 (2020) 1864-1904.

[34]

P. Taylor, T. Dargahi, A. Dehghantanha, R. Parizi, K.K.R. Choo, A systematic literature review of blockchain cyber security, Digit. Commun.Network 6 (2) (2020) 147-156.

[35]

M. Kondo, G. Oliva, Z. Jiang, A.E. Hassan, O. Mizuno, Code cloning in smart contracts: a case study on verified contracts from the ethereum blockchain platform, Empir. Software Eng. 25 (2020) 4617-4675.

[36]

G. Gürsoy, C.M. Brannon, M. Gerstein, Using ethereum blockchain to store and query pharmacogenomics data via smart contracts, BMC Med. Genom. 13 (1) (2020).

[37]

L. Peng, W. Feng, Z. Yan, Y. Li, X. Zhou, S. Shimizu, Privacy preservation in permissionless blockchain: a survey, Digit. Commun.Network 7 (3) (2021) 295-307.

[38]

F. McKeen, I. Alexandrovich, I. Anati, D. Caspi, S. Johnson, R. Leslie-Hurd, C. Rozas, Intel® Software Guard Extensions (Intel® Sgx) Support for Dynamic Memory Management inside an Enclave, 2016.

[39]

M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, J. Del Cuvillo, Using innovative instructions to create trustworthy software solutions, in: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP ’13, Association for Computing Machinery, New York, NY, USA, 2013, pp. 1-8.

[40]

P. Paillier,Public-key cryptosystems based on composite degree residuosity classes, in:Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, 1999, pp. 223-238. Prague, Czech Republic, May 2-6, 1999, Proceeding.

[41]

I. Damgård, M. Jurik, A generalisation, a simplification and some applications of paillier's probabilistic public-key system,in:Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography, PKC ’01, Springer-Verlag, Berlin, Heidelberg, 2001, pp. 119-136.

[42]

J. Lind, O. Naor, I. Eyal, F. Kelbert, P. Pietzuch, E.G. Sirer, Teechain: A Secure Payment Network with Asynchronous Blockchain Access, 2019 arXiv:1707.05454.

[43]

C. Priebe, K. Vaswani, M. Costa, Enclavedb: a secure database using sgx, in: 2018 IEEE Symposium on Security and Privacy, SP, 2018, pp. 264-278.

[44]

R. Cramer, I. Damgård, B. Schoenmakers, Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Springer, Berlin, Heidelberg, 1994, pp. 174-187.

[45]

Intel,Intel® software guard extensions sdk for linux* os. https://www.intel.cn/content/www/cn/zh/developer/tools/software-guard-extensions/overview.html.

[46]

M. Schwarz, S. Weiser, D. Gruss, C. Maurice, S. Mangard, Malware Guard Extension: Using Sgx to Conceal Cache Attacks, Springer, Cham, 2020, p. 20.

[47]

A. Moghimi, G. Irazoqui, T. Eisenbarth, Cachezoom: How Sgx Amplifies the Power of Cache Attacks, Springer, Cham, 2017, https://doi.org/10.1007/978-3-319-66787-4_4.

[48]

F. Brasser, U. Müller, A. Dmitrienko, K. Kostiainen, S. Capkun, A.-R. Sadeghi, Software grand exposure: sgx cache attacks are practical,in:Proceedings of the 11th USENIX Conference on Offensive Technologies, USENIX Association, USA, 2017, p. 11.

AI Summary AI Mindmap
PDF

76

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/