Communications of the ACM
On the minimum node degree and connectivity of a wireless multihop network
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
SIAM Journal on Computing
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
(M+1)st-Price Auction Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Impact of interference on multi-hop wireless network performance
Proceedings of the 9th annual international conference on Mobile computing and networking
Combinatorial Auctions: A Survey
INFORMS Journal on Computing
The number of neighbors needed for connectivity of wireless networks
Wireless Networks
Combinatorial Auctions
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Evolutionary Basis for Preference Behavior in Decision Making under Risk
CIMCA '06 Proceedings of the International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce
Encryption schemes from bilinear maps
Encryption schemes from bilinear maps
eBay in the Sky: strategy-proof wireless spectrum auctions
Proceedings of the 14th ACM international conference on Mobile computing and networking
Revenue generation for truthful spectrum auction in dynamic spectrum access
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Stackelberg game for utility-based cooperative cognitiveradio networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
An economic framework for dynamic spectrum access and service pricing
IEEE/ACM Transactions on Networking (TON)
Batch verification of validity of bids in homomorphic e-auction
Computer Communications
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
FC'02 Proceedings of the 6th international conference on Financial cryptography
Fair profit allocation in the spectrum auction using the Shapley value
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Breaking bidder collusion in large-scale spectrum auctions
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
New sealed-bid electronic auction with fairness, security and efficiency
Journal of Computer Science and Technology
The capacity of wireless networks
IEEE Transactions on Information Theory
Price dynamics in competitive agile spectrum access markets
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem
IEEE Journal on Selected Areas in Communications
Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper, we propose a secure combinatorial spectrum auction (SCSA) by utilizing homomorphic encryption to prevent the back-room dealing. The idea in SCSA is to incorporate cryptographic techniques into the spectrum auction to address the frauds and bid-rigging. It computes and reveals the results of spectrum auction while the actual bidding values of bidders are kept confidential. SCSA also provides a corresponding procedure in implementing the combinatorial spectrum auction under the interference constraints. We show that compared with existing secure spectrum auction designs against the untrustworthy auctioneer, SCSA is much more efficient in both communication and computational complexity; and compared with other spectrum auction designs with security consideration, SCSA can effectively thwart the back-room dealings due to the untrustworthy auctioneer without too much performance degradation.