JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (11): 51-55.doi: 10.6040/j.issn.1671-9352.0.2018.430

•   • Previous Articles     Next Articles

Wireless single spectrum secure auction algorithm

Zhao-xia WU1(),Jia-qi WANG2,*()   

  1. 1. School of Applied Mathematics, Xinjiang University of Finance and Economics, Urumqi 830012, Xinjiang, China
    2. School of Computer Science and Engineering, Northeastern University, Shenyang 110819, Liaoning, China
  • Received:2018-07-24 Online:2018-11-01 Published:2018-11-14
  • Contact: Jia-qi WANG E-mail:wuzhaoxia828@163.com;849598571@qq.com
  • Supported by:
    新疆自然科学基金资助项目(2014211A001)

Abstract:

Because of the efficiency and impartiality of the electronic auction itself, auction mechanisms which is based on wireless spectrum allocation come into being and meet the growing demand for wireless communication services. However, the secure spectrum auction algorithm is an important guarantee to ensure the operation safely of the wireless spectrum auction mechanism. According to analyze the algorithm characteristics of wireless spectrum allocation and the security requirements it ensures, a secure auction algorithm based on wireless single spectrum allocation is proposed. The algorithm combines the auction characteristics of the wireless spectrum allocation with the cryptographic mechanism to ensure the security of the information during the auction process, correctly select the auction winners, and calculate the spectrum auction price that the winner needs to pay. The analysis proves that it has higher security.

Key words: electronic auction, spectrum auction algorithm, cryptography technology, security

CLC Number: 

  • TP309

Fig.1

Wireless single spectrum allocation security auction framework"

Table 1

Non-conflict groups public information"

组编号 所在组的投标人编号 对应的投标值
1 g11, g12, …, g1|g1| bg11, bg12, …, bg1|g1|
2 g21, g22, …, g2|g2| bg21, bg22, …, bg2|g2|
l gl1, gl2, …, gl|gl| bgl1, bgl2, …, bgl|gl|

Table 2

Non-conflict groups public information"

组编号 所在组的投标人编号 对应的双重加密投标值
1 g11, g12, …, g1|g1| E′(bg11), E′(bg12), …, E′(bg1|g1|)
2 g21, g22, …, g2|g2| E′(bg21), E′(bg22), …, E′(bg2|g2|)
l gl1, gl2, …, gl|gl| E′(bgl1), E′(bgl2), …, E′(bgl|gl|)
1 VALENTA V, MARŠÁLEK R, BAUDOIN G, et al. Survey on spectrum utilization in Europe: measurements, analyses and observations[C]//Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), 2010 Proceedings of the Fifth International Conference on. New York: IEEE, 2010: 1-5.
2 CRAMTON P . Spectrum auction design[J]. Review of Industrial Organization, 2013, 42 (2): 161- 190.
3 WANG Xiaoyan, JI Yusheng, ZHOU Hao, et al. A privacy preserving truthful spectrum auction scheme using homomorphic encryption[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6.
4 ZHOU Minping, NIU Chaoyue, ZHENG Zhenzhe, et al. An efficient, privacy-preserving, and verifiable online auction mechanism for Ad exchanges[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6.
5 WANG Qinhui , YE Baoliu , XU Tianyin , et al. Approximately truthful mechanisms for radio spectrum allocation[J]. IEEE Transactions on Vehicular Technology, 2015, 64 (6): 2615- 2626.
doi: 10.1109/TVT.2014.2345418
6 ZHU Ruihao, LI Zhijing, WU Fan, et al. Differentially private spectrum auction with approximate revenue maximization[C]//Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing. New York: ACM, 2014: 185-194.
7 CHEN Zhili, HUANG Liusheng, LI Lu, et al. PS-TRUST: provably secure solution for truthful double spectrum auctions[C]//INFOCOM, 2014 Proceedings IEEE. New York: IEEE, 2014: 1249-1257.
8 LI Ming, LI Pan, GUO Linke, et al. PPER: privacy-preserving economic-robust spectrum auction in wireless networks[C]//Computer Communications (INFOCOM), 2015 IEEE Conference on. New York: IEEE, 2015: 909-917.
9 HUANG He , LI Xiangyang , SUN Yue , et al. PPS: privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26 (5): 1393- 1404.
doi: 10.1109/TPDS.2014.2315200
[1] CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59.
[2] LIU Li-zhao, YU Jia-ping, LIU Jian, LI Jun-yi, HAN Shao-bing, XU Hua-rong, LIN Huai-chuan, ZHU Shun-zhi. Secure storage addressing algorithm for large data based on quantum radiation field [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 65-74.
[3] RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76.
[4] MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18.
[5] TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45.
[6] ZHU Dan, XIE Xiao-yao, XU Yang, XIA Meng-ting. Evaluation method for network security level based on cloud model and Bayesian feedback [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 53-62.
[7] LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88.
[8] DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110.
[9] YANG Shu-mian, WANG Lian-hai, ZHANG Shu-hui, XU Shu-jiang, LIU Guang-qi. A real-time monitoring and forensics method under the IaaS model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 84-91.
[10] WU Di, WANG Li-na, YU Rong-wei, ZHANG Xin, XU Lai. Multidimensional data visualization in cloud platform security monitoring [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 56-63.
[11] KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23.
[12] ZHU Zhi-qiang, MA Ke-xin, SUN Lei. A zero-knowledge proof based remote desktop authentication protocol [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 47-52.
[13] SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105.
[14] TANG Qian, YANG Fei, HUANG Qi, LIN Guo-yuan. Security transfer model of access control information based on TCB subsets [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 98-106.
[15] WU Huan, ZHAN Jing, ZHAO Yong, TAO Zheng, YANG Jing. An efficient multilevel interconnection network security mechanism based on virtualization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 98-103.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] YANG Jun. Characterization and structural control of metalbased nanomaterials[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 1 -22 .
[2] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[3] LUO Si-te, LU Li-qian, CUI Ruo-fei, ZHOU Wei-wei, LI Zeng-yong*. Monte-Carlo simulation of photons transmission at alcohol wavelength in  skin tissue and design of fiber optic probe[J]. J4, 2013, 48(1): 46 -50 .
[4] YANG Lun, XU Zheng-gang, WANG Hui*, CHEN Qi-mei, CHEN Wei, HU Yan-xia, SHI Yuan, ZHU Hong-lei, ZENG Yong-qing*. Silence of PID1 gene expression using RNA interference in C2C12 cell line[J]. J4, 2013, 48(1): 36 -42 .
[5] MAO Ai-qin1,2, YANG Ming-jun2, 3, YU Hai-yun2, ZHANG Pin1, PAN Ren-ming1*. Study on thermal decomposition mechanism of  pentafluoroethane fire extinguishing agent[J]. J4, 2013, 48(1): 51 -55 .
[6] LI Yong-ming1, DING Li-wang2. The r-th moment consistency of estimators for a semi-parametric regression model for positively associated errors[J]. J4, 2013, 48(1): 83 -88 .
[7] ZHAO Tong-xin1, LIU Lin-de1*, ZHANG Li1, PAN Cheng-chen2, JIA Xing-jun1. Pollinators and pollen polymorphism of  Wisteria sinensis (Sims) Sweet[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 1 -5 .
[8] TANG Xiao-hong1, HU Wen-xiao2*, WEI Yan-feng2, JIANG Xi-long2, ZHANG Jing-ying2, SHAO Xue-dong3. Screening and biological characteristics studies of wide wine-making yeasts[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 12 -17 .
[9] WANG Bi-yu, CAO Xiao-hong*. The perturbation for the Browder’s theorem of operator matrix#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 90 -95 .
[10] GUO Lan-lan1,2, GENG Jie1, SHI Shuo1,3, YUAN Fei1, LEI Li1, DU Guang-sheng1*. Computing research of the water hammer pressure in the process of #br# the variable speed closure of valve based on UDF method[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 27 -30 .