1,804 research outputs found

    Dynamic Spectrum Sharing in the Age of Millimeter Wave Spectrum Access

    Full text link
    Next-generation wireless networks are facing spectrum shortage challenges, mainly due to, among other factors, the projected massive numbers of IoT connections and the emerging bandwidth-hungry applications that such networks ought to serve. Spectrum is scarce and expensive, and therefore, it is of crucial importance to devise dynamic and flexible spectrum access policies and techniques that yield optimal usage of such a precious resource. A new trend recently being adopted as a key solution to this spectrum scarcity challenge is to exploit higher frequency bands, namely mmWave bands, that were considered impractical few years ago, but are now becoming feasible due to recent advances in electronics. Though, fortunately, spectrum regulatory bodies have responded by allowing the use of new bands in the mmWave frequencies, much work still needs to be done to benefit from such new spectra. In this paper, we discuss some key spectrum management challenges that pertain to dynamic spectrum access at the mmWave frequencies, which need to be overcome in order to promote dynamic spectrum sharing at these mmWave bands. We also propose new techniques that enable efficient dynamic spectrum sharing at the mmWave bands by addressing some of the discussed challenges, and highlight open research challenges that still need to be addressed to fully unleash the potential of dynamic spectrum sharing at mmWave bands

    When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

    Full text link
    We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications Commission (FCC), all certified spectrum databases synchronize their records. Hence, the same copy of spectrum database is available through multiple (distinct) providers. We harness the synergy between multi-server private information retrieval (PIR) and database- driven CRN architecture to offer an optimal level of privacy with high efficiency by exploiting this observation. We demonstrated, analytically and experimentally with deployments on actual cloud systems that, our adaptations of multi-server PIR outperform that of the (currently) fastest single-server PIR by a magnitude of times with information theoretic security, collusion resiliency, and fault-tolerance features. Our analysis indicates that multi-server PIR is an ideal cryptographic tool to provide location privacy in database-driven CRNs, in which the requirement of replicated databases is a natural part of the system architecture, and therefore SUs can enjoy all advantages of multi-server PIR without any additional architectural and deployment costs.Comment: 10 pages, double colum

    Extreme Value Theory and Value at Risk : Application to Oil Market

    Get PDF
    Recent increases in energy prices, especially oil prices, have become a principal concern for consumers, corporations, and governments. Most analysts believe that oil price fluctuations have considerable consequences on economic activity. Oil markets have become relatively free, resulting in a high degree of oil-price volatility and generating radical changes to world energy and oil industries. As a result oil markets are naturally vulnerable to significant negative volatility. An example of such a case is the oil embargo crisis of 1973. In this newly created climate, protection against market risk has become a necessity. Value at Risk (VaR) measures risk exposure at a given probability level and is very important for risk management. Appealing aspects of Extreme Value Theory (EVT) have made convincing arguments for its use in managing energy price risks. In this paper, we apply both unconditional and conditional EVT models to forecast Value at Risk. These models are compared to the performances of other well-known modelling techniques, such as GARCH, historical simulation and Filtered Historical Simulation. Both conditional EVT and Filtered Historical Simulation procedures offer a major improvement over the parametric methods. Furthermore, GARCH(1, 1)-t model may provide equally good results, as well as the combining of the two procedures.Extreme Value Theory, Value at Risk, oil price volatility, GARCH, Historical Simulation, Filtered Historical Simulation.
    corecore