Skip to main content
Log in

Designing differentially private spectrum auction mechanisms

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution, which aim to maximize the spectrum utilization and social welfare, we propose DIARY in this paper, which not only achieves approximate revenue maximization, but also guarantees bid privacy via differential privacy. Furthermore, we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Spectrum bridge. http://www.spectrumbridge.com

  2. Chen, Y., Chong, S., Kash, I. A., Moran, T., & Vadhan, S. (2013). Truthful mechanisms for agents that value privacy. In Proceedings of the 14th ACM conference on electronic commerce, EC.

  3. Chen, Z., Huang, L., & Chen, L. (2015). Itsec: An information-theoretically secure framework for truthful spectrum auctions. In INFOCOM.

  4. Cox, D. C., & Reudink, D. O. (1971). Dynamic channel assignment in high capacity mobile communication system. Bell System Technical Journal, 50(6), 1833–1857.

    Article  Google Scholar 

  5. Cramton, P. (2002). Spectrum auctions.

  6. Dwork, C. (2006). Differential privacy. In Automata, languages and programming.

  7. Dwork, C. (2008). Differential privacy: A survey of results. In Theory and applications of models of computation.

  8. Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Theory of cryptography.

  9. Federal Communications Commission (FCC): http://www.fcc.gov/.

  10. Gandhi, S., Buragohain, C., Cao, L., Zheng, H., & Suri, S. (2007). A general framework for wireless spectrum auctions. In: New frontiers in dynamic spectrum access networks, DySPAN

  11. Gopinathan, A., & Li, Z. (2011). A prior-free revenue maximizing auction for secondary spectrum access. In INFOCOM.

  12. He, K., & Mu, X. (2014). Differentially private and incentive compatible recommendation system for the adoption of network goods. In Proceedings of the 15th ACM conference on economics and computation, EC.

  13. Hua, J., Gao, Y., & Zhong, S. (2015). Differentially private publication of general time-serial trajectory data. In INFOCOM.

  14. Huang, Q., Tao, Y., & Wu, F. (2013). Spring: A strategy-proof and privacy preserving spectrum auction mechanism. In INFOCOM.

  15. Huang, Z., & Kannan, S. (2012). The exponential mechanism for social welfare: Private, truthful, and nearly optimal. In Foundations of computer science, FOCS.

  16. Jia, J., Zhang, Q., Zhang, Q., & Liu, M. (2009). Revenue generation for truthful spectrum auction in dynamic spectrum access. In Mobile ad hoc networking and computing, MobiHoc.

  17. Li, H., Wu, C., & Li, Z. (2015). Socially-optimal online spectrum auctions for secondary wireless communication. In INFOCOM.

  18. Li, M., Li, P., Guo, L., & Huang, X. (2015). Pper: Privacy-preserving economic-robust spectrum auction in wireless networks. In INFOCOM.

  19. Li, W., Cheng, X., Bie, R., & Zhao, F. (2014). An extensible and flexible truthful auction framework for heterogeneous spectrum markets. In Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing.

  20. McHenry, M. A., Tenhula, P. A., McCloskey, D., Roberson, D. A., & Hood, C. S. (2006). Chicago spectrum occupancy measurements and analysis and a long-term studies proposal. In Proceedings of the first international workshop on technology and policy for accessing spectrum.

  21. McSherry, F., & Talwar, K. (2007). Mechanism design via differential privacy. In Foundations of computer science, FOCS.

  22. Nissim, K., Orlandi, C., & Smorodinsky, R. (2012). Privacy-aware mechanism design. In Electronic commerce, EC.

  23. Nissim, K., Smorodinsky, R., & Tennenholtz, M. (2012). Approximately optimal mechanism design via differential privacy. In Proceedings of the 3rd innovations in theoretical computer science conference.

  24. Peng, D., Yang, S., Wu, F., Chen, G., & Luo, T. (2015). Resisting three-dimensional manipulations in distributed wireless spectrum auctions. In INFOCOM.

  25. West, D. B. (1996). Introduction to graph theory (2nd ed.). New Jersey: Prentice Hall.

    MATH  Google Scholar 

  26. Wu, F., & Vaidya, N. (2011). Small: A strategy-proof mechanism for radio spectrum allocation. In INFOCOM.

  27. Xiao, D. (2011). Is privacy compatible with truthfulness? IACR Cryptology ePrint Archive, 2011, 5.

    Google Scholar 

  28. Yang, D., Fang, X., & Xue, G. (2012). Truthful auction for cooperative communications with revenue maximization. In International conference on communications, ICC.

  29. Yue, W. (1991). Analytical methods to calculate the performance of a cellular mobile radio communication system with hybrid channel assignment. IEEE Transactions on Vehicular Technology, 40(2), 453–460.

    Article  Google Scholar 

  30. Zheng, Z., Wu, F., Tang, S., & Chen, G. (2014). Unknown combinatorial auction mechanisms for heterogeneous spectrum redistribution. In Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing.

  31. Zhou, X., Gandhi, S., Suri, S., & Zheng, H. (2008). ebay in the sky: Strategy-proof wireless spectrum auctions. In ACM/IEEE international conference on mobile computing and networking, MOBICOM.

  32. Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y., & Zheng, H. (2013). Practical conflict graphs for dynamic spectrum distribution. In Measurement and modeling of computer systems, SIGMETRICS.

  33. Zhou, X., & Zheng, H. (2009). Trust: A general framework for truthful double spectrum auctions. In INFOCOM.

  34. Zhou, Y., & Lukose, R. (2007). Vindictive bidding in keyword auctions. In Electronic commerce, EC.

  35. Zhu, R., Li, Z., Wu, F., Shin, K., & Chen, G. (2014). Differentially private spectrum auction with approximate revenue maximization. In Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing.

  36. Zhu, R., & Shin, K. G. (2015). Differentially private and strategy-proof spectrum auction with approximate revenue maximization. In INFOCOM.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Wu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, C., Wei, Z., Wu, F. et al. Designing differentially private spectrum auction mechanisms. Wireless Netw 22, 105–117 (2016). https://doi.org/10.1007/s11276-015-0955-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-0955-7

Keywords

Navigation