Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Ex-post Enforcement in Cooperative Spectrum Sharing: A case study of the 1695 - 1710 MHz band

Malki, Amer and Weiss, Martin B.H. (2015) Ex-post Enforcement in Cooperative Spectrum Sharing: A case study of the 1695 - 1710 MHz band. In: Telecommunications Policy Research Conference, 25 September 2015 - 27 September 2015, Arlington, VA.

Available under License : See the attached license file.

Download (1MB)
[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)


Cooperative Spectrum sharing can be thought of as a reorganization of rights between stakeholders [2]. The principal stakeholders are the Primary User (PU), who holds the spectrum license, and the Secondary User(s) who uses the spectrum temporarily. Any rights management system requires a set of strategies and technologies to enforce the rights [3]; the timing of the enforcement action (ex-ante and ex-post) also plays a significant role [4]. The cooperative spectrum sharing approaches that have been proposed by the NTIA emphasize ex-ante actions, which are designed to prevent a PU’s signal from harmful interference that could occur by the SU [1, 5]. A comprehensive enforcement framework would include protecting the rights of the SU in addition to having an ex post component that can efficiently and effectively adjudicate claims of interference. Determining the role of ex-post enforcement in a spectrum sharing scheme is of significant importance since cooperative spectrum sharing will without doubt result in interference events. To evaluate the role of the ex-post enforcement approach, a hypothetical scenario of using the recommended protection zones and the involved entities will be used to analyze the current enforcement timing measures and to evaluate the usage of ex-post-only enforcement measures. The hypothetical scenario concerns about the behaviors of the SUs, if SU-mobile devices transmitting near PU-base station or transmitting with high power signal within the protection zone. This behavior will cause harmful interference to the PU signal and data received by the PU will be lost. To guarantee SU behavior the suggested ex-ante and ex-post enforcement measures will be explained and analyzed. Then, ex-post-only enforcement measures will be applied to this scenario and analyzed. The purpose of analyzing the ex-post-only enforcement measures is to evaluate how these measures might work, and what the limits are on their effectiveness.


Social Networking:
Share |


Item Type: Conference or Workshop Item (Paper)
Status: Published
CreatorsEmailPitt UsernameORCID
Malki, AmerASM110@pitt.eduASM110
Weiss, Martin B.H.mbw@pitt.eduMBW0000-0001-6785-0913
Date: 26 September 2015
Date Type: Publication
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Event Title: Telecommunications Policy Research Conference
Event Dates: 25 September 2015 - 27 September 2015
Event Type: Conference
Institution: University of Pittsburgh
Schools and Programs: School of Information Sciences > Telecommunications
Refereed: Yes
Date Deposited: 15 Jun 2016 16:40
Last Modified: 30 Oct 2018 13:59


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item