Wireless Guard for Trustworthy Spectrum Management
Mukaram Shahid, Sarath Babu, Hongwei Zhang, Daji Qiao, Yong Guan,
Joshua Ofori Boateng, Taimoor Ul Islam, Guoying Zu, Ahmed Kamal, Mai Zheng
Department of Electrical and Computer Engineering, Iowa State University
Ames, Iowa, USA
{mukaram,sarath4,hongwei,daji,guan,jboateng,tislam,gyzu,kamal,mai}@iastate.edu
such a diverse set of requirements. Moreover, the wireless channel
characteristics and spatial distribution densities of households and
enterprises in rural environments are very different from those
of suburban or urban environments [9, 14]. Therefore, ARA [14]
wireless living lab focuses on rural settings and is being deployed
in Central Iowa, USA. The living lab is expected to cover ∼250
square miles area across Iowa State University, the City of Ames,
and surrounding agriculture farms and rural communities, with 12
Base-Station (BS) sites and more than 100 mobile and stationary
User Equipment (UE) sites deployed.
The ARA wireless living lab consists of Radio Access Networks
(RAN) employing technologies ranging from NI (National Instruments) SDR (Software Defined Radios), Skylark commercial massive
MIMO (mMIMO) platforms, to Ericsson mMIMO and millimeter
wave (mmWave) Stand-Alone solutions. In addition, ARA employs
Microwave, mmWave, and Free Space Optical (FSO) links for backhaul connectivity [14]. The devices that employ such technologies
operate at different frequencies, for instance, with the radio access
networks operating from 460–776 MHz in TV Whitespace (TVWS),
3.4–3.6 GHz in mid-Band, to the 26–28 GHz 5G FR2 band, and with
the long-distance, high-capacity wireless mesh backhaul using
11 GHz point-to-point Micro-Wave links, 71–76 GHz and 80–86GHz
mmWave links, and 194 THz FSO links. With the use of diverse
wireless technologies and frequency bands, ARA is envisioned to
provide an innovative research platform for various measurement
and network design studies.
With the use of diverse wireless devices, it is important to ensure
isolation between users in terms of the spectrum usage, i.e., the
experiments of one user should not create any harmful interference
to other ARA user experiments nor to the users of existing service
providers or networks of Department of Defense (DoD) and other
incumbents. In scenarios where devices and applications become
spectrum and bandwidth-hungry, we need to monitor the spectrum
and enforce spectrum policies to protect incumbents from harmful
interference beside utilizing this scarce natural resource in optimal ways [10, 13, 15]. Therefore, we design a mechanism called
Wireless Guard (WG) to continuously monitor the spectrum used
by the experimenters and enforce the spectrum policies so that no
user causes any intentional or unintentional interference to other
users. The WG also monitors the transmission power users are
operating at, to ensure compliance with the regulations of Federal
Communications Commission (FCC). To enable other spectrum
management functions, the WG also provides an open API for collecting information about the RF spectrum usage at the individual
ARA sites.
The rest of the paper is organized as follows. Section 2 presents
the related work, and Section 3 describes the WG system design
including its hardware and software architectures. In Section 4,
ABSTRACT
ARA is a first-of-its-kind wireless living lab for advanced wireless
in rural regions. In ARA, users can reserve programmable wireless
resources, for instance, Software Defined Radios (SDRs), and wireless spectrum to perform a wide range of of experiments. Given
ARA-enabled open access to programmable wireless resources ,
it is important to enforce proper usage of the available spectrum,
thereby ensuring no user (benign or malicious) creates any harmful
interference to other experimenters or any incumbent. Therefore,
we develop Wireless Guard (WG), a mechanism for wireless spectrum usage monitoring. For WG, we use two approaches for enforcing the spectrum policy: (i) reactive approach and (ii) proactive
approach. In this paper, we present the hardware and software
architectures of the ARA WG along with the end-to-end pipeline
for managing experiments in case of deviation from the spectrum
usage policy. Initial evaluations show the effectiveness of WG in
enforcing spectrum usage policies in ARA.
CCS CONCEPTS
• Network Experimentation; • 5G Networks; • Dynamic Spectrum Sharing;
KEYWORDS
ARA, Wireless Guard, Spectrum Use Policy Enforcement, Spectrum
Sensing
1
INTRODUCTION
Rural broadband is essential to societal progress in developed, developing, and least-developed countries worldwide. In the USA
alone, around 46 million people live in rural areas that are deprived
of sufficient Internet/broadband access [5, 7]. To unleash the entrepreneurial potential of the rural communities and to improve
the prosperity of the people, it is essential to provide broadband
Internet access and making them connected to the rest of the world.
Applications such as plant phenotyping, smart agriculture, rural
education, and augmented/virtual reality-based applications require wireless communications with different throughput and latency requirements. There exists no single architecture which meets
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from permissions@acm.org.
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
© 2022 Association for Computing Machinery.
ACM ISBN 978-1-4503-9527-4/22/10. . . $15.00
https://doi.org/10.1145/3556564.3558241
32
Mukaram Shahid, Sarath Babu, Hongwei Zhang, Daji Qiao, Yong Guan,
Joshua Ofori Boateng, Taimoor Ul Islam, Guoying Zu, Ahmed Kamal, Mai Zheng
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
we discuss the spectrum enforcement and interference mitigation
techniques used in WG. The evaluation results are provided in
Section 5. Finally, we make concluding remarks in Section 6.
2
uses multiple RF sensors to monitor and localize multiple transmitters with different environmental uncertainties such as unknown
SNR, number of transmitters, the transmission power, and channel
conditions.
In view of the aforementioned challenges of user identification
and spectrum policy enforcement in ARA, we design and develop
a novel spectrum policy enforcement and interference mitigation
technique that utilizes multi-fold mechanisms to detect and localize
the misbehaving users and stop their operations. More importantly,
Wireless Guard is a real-world implementation in the ARA platform
to provide trustworthy spectrum management. Apart from protecting the incumbents from harmful interference caused by ARA Users,
WG also provides the means to monitor the near real-time spectrum
utilization at all ARA Base-Station sites.
RELATED WORK
One primary objective of spectrum policy enforcement systems in
a resource-shared environment is to ensure that the resources are
efficiently utilized. Radio frequency spectrum is considered to be
a scarce resource that needs efficient and mutual planning among
different entities under the roof of a central regulatory body. Significant efforts have been made among research communities and
industry in developing spectrum allocation and policy enforcement
solutions. In [8], Park et al. discussed the security and spectrum
enforcement techniques, and how ex-ante and ex-post techniques
are required for spectrum sharing models when multiple stakeholders share the same resource. On the other hand, an interference
detection and mitigation technique was proposed in [2] where the
Primary User (PU) employed forced-silence to identify the set of
cognitive radios that cause interference to the PU.
Weiss et al. [12] provided the use-case of spectrum enforcement
techniques with a case-study of Dynamic Spectrum Sharing (DSS)
between LTE users and the incumbents in the 1696–1710 MHz band.
Further, they discussed the systems and opportunity costs for different ex-ante, ex-post, and protection zone schema that can be utilized
to enforce the spectrum policy. Similarly, Galott et al. [4] shared
the policy enforcement strategy based on misbehavior detection,
penalty function, and resource allocation.
The detection of malicious user behavior forms the primary
essence of the spectrum enforcement policy. Spectrum sensing can
be used to detect potential policy violations. In wireless testbeds
such as ARA, there exists a need to efficiently monitor the spectrum in a timely fashion, mitigate the impact of malicious users, and
stop their operations at the earliest so that no incumbent faces any
harmful interference caused by the testbed users. In this context,
Terry et al. [11] described spectrum sensing and source separation
techniques where the prototype employs a bi-directional coupler
in the RF chain right before the antenna. A source separation algorithm separates the signal source, i.e., the signal from the Power
Amplifier (PA), and the RF signal from the antenna. One of the challenges in such an implementation is the complexity and accuracy
of source separation algorithms so that the exact operations of the
SDR users are identified correctly and the number of false alarms
is minimized.
In [3], Dutta et al. devised a crowd-source spectrum sensing and
enforcement technique where multiple mobile nodes are utilized
as eye witnesses of policy breach for spectrum usage in dynamic
spectrum access. A data fusion algorithm was proposed to leverage
the outcome from different nodes to reduce the error probability.
Kumar et al. [6] proposed transmitter identification mechanisms
based on waveform authentication where the enforcement entity
blindly identifies the misbehaving users based on the authentication
signals. The framework uses crowd-sourcing blind authentication
techniques for transmitter authentication under low SNR conditions as well as in scenarios where multiple transmitters operate
in the same frequency band. In [16], Zubow et al. discussed the
development of a deep-learning based module DeepTxFinder that
3
SYSTEM DESIGN
In the overall ARA architecture, the radio access network, i.e.,
AraRAN [14], plays a very significant role. AraRAN comprises
NI SDRs and COTS (commercial off-the-shelf) radios deployed at
each base-station site with an operational frequency in the 3.4–
3.6 GHz band. One of the main goals of building the ARA platform
is to give experimenters this access to run their experiments and
test 5G algorithms in a real-world rural environment.
Given the above use-case, the ARA experimenters have access to
the SDRs using the SDR-Host computer so that users can run a kind
of application within the spectrum that ARA is allowed to operate
in. To ensure the ARA platform’s smooth operations, we need to
ensure that no ARA user is causing any harmful interference. Nevertheless, achieving this goal is challenging since manipulating the
SDRs’ transmission behavior is much easier compared to the legacy
COTS radios. To enforce the spectrum use policy and monitor user
behavior, ARA needs a mechanism to monitor the selected frequencies on all the SDRs. Unlike conventional spectrum monitoring
where the objective is to identify spectrum availability at certain
locations, here we need a one-to-one mapping between each user
experiment and the frequencies and the SDR it is operating at to
enforce the spectrum policies. This objective cannot be achieved
by simply sensing the RF environment. Instead, it requires a more
sophisticated mechanism that can monitor each RF chain without
causing any hurdles to the normal transmission operations of the
users.
Given the above scenario that requires a spectrum policy enforcement infrastructure for the ARA platform, we have devised a
spectrum sensing and policy enforcement module named Wireless
Guard (WG). Wireless guard has four different modes of operations as follows that provide multiple folds of security for spectrum
enforcement:
•
•
•
•
Proactive Approach
Reactive Approach based on COTS RF Sensor
Reactive Approach based on B205 mini-i Monitor SDR
Over the Air Spectrum Sensing and Monitoring
Based on the mode of access, i.e., bare metal or container, of
the specific computer to which SDRs are attached to, the wireless
guard ensures that no experiment uses an illegitimate frequency
band or transmission power level which is harmful to other user
experiments or incumbents. The proactive approach of WG is a
33
Wireless Guard for Trustworthy Spectrum Management
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
software-based solution to monitor the configuration parameters
of the radios to ensure the users select the valid set of parameters.
On the other hand, the reactive approach uses spectrum sensing to
monitor the frequencies being transmitted from a specific SDR so
that the spectrum policy can be enforced and necessary steps can
be taken to prevent users from creating interference. Based on the
method of implementation, the pros and cons of the proactive and
reactive approaches are summarized in Table 1.
Experiment Profile
Mgmt
Computer
P
3.1
Container
Instance 1
Keysight
RF Sensor
(N6841A)
WG Subdemon
Container
li
Instance
2
Text
Container
Instance N
AraVisor
UHD Driver (Hardware Driver)
Reactive
Yes
Yes
Yes
High
Yes
SDR-1
SDR-2
SDR-3
RF
Frontend
RF
Frontend
RF
Frontend
Figure 2: Software Architecture of Wireless Guard at BS Site
ARA Resource Reservation
The software architecture of ARA platform is designed in a way that
users can reserve containers or bare metal computers deployed at
the ARA sites. The block diagram representing the overall resource
reservation through the ARA controller is shown in Figure 1.
their operations. The overall software architecture of the Wireless
Guard module at BS site is shown in Figure 2.
As soon as an experiment profile is created on the ARA Portal,
the controller pushes the experiment profile to the Wireless Guard
Daemon running on the management computer of that specific site.
Once the profile is received, the WG daemon saves that information
in the local MariaDB database tables (i.e., experimenter_profile,
resource_reservation, and resource_type).
Once the profile has been registered at the WG daemon, it starts
communicating and taking feedback from the WG sub-daemon
running at the SDR-Host Computer. The WG sub-daemon is a
module that helps enable the proactive approach and monitors the
user frequency by intercepting the frequency commands selected
by the user. More details about the proactive approach will be
presented in Section 4.1. The WG daemon also takes the input from
the spectrum monitoring hardware, and it saves the feedback from
the WG sub-daemon and RF spectrum sensing hardware to a userbehavior table. After collecting the data, the WG Daemon compares
the observed user behavior and what has been specified in the
experiment profiles to identify the users who are misbehaving, and,
based on the overall behavior score, a feedback is sent to the ARA
Controller to stop the operations of the misbehaving users.
Figure 1: Resource Reservation in ARA
As shown in the figure, users can access the ARA controller
(more specifically, its web portal) and create an experiment profile
that will be associated with a specific project and experimenter ID.
The user can then move forward to reserve the ARA resources (e.g.,
computers, SDRs, and spectrum) through the ARA controller portal
and specify the reservation of the specific resources. The resources
that users need to identify include the node location, resource type,
reserved frequency, reserved bandwidth, and reserved maximum
transmission power (i.e., EIRP). The ARA controller receives this
information and schedules the experiment for the specific location
according to a scheduled time frame.
3.2
AraCont
Controller
Action by the
Controller
P/I
TC
Container support
Bare-metal support
Dedicated hardware required
Computational overhead
Use in dynamic spectrum sharing
REST API
Feedback about Health Status of
Spectrum Usage
Host
Computer
Table 1: Pros and Cons for Different Policy Enforcement
Approaches
Proactive
Yes
No
No
Low
No
WG
Demon
3.3
Hardware Architecture for BS Node
The hardware for the spectrum monitoring on each base-station
node is being integrated with the RF Front-end. As shown in Figure 3, the Downlink and Uplink channels of the N320 BS SDR ports
are coupled using a 10 dB coupler. For the prototyping of Wireless
Guard, the directional couplers have been procured from Keysight
with the model number 87300 B. The coupler has the directivity
of 10 dB with an insertion loss less than 1.9 dB. The Directional
Coupler (DC) is being used to divide the transmitted signal from
the SDR into a proportion of 90:10, where 90% of the power is being
Software Architecture for Wireless Guard
The wireless guard module has been designed as a distributed
application running at the Management Computer of each Base
Station (BS) and User Equipment (UE) site. All these management
computers are connected, and the ARA controller uses an extensive
fiber network and wireless backhaul/access network to orchestrate
34
Mukaram Shahid, Sarath Babu, Hongwei Zhang, Daji Qiao, Yong Guan,
Joshua Ofori Boateng, Taimoor Ul Islam, Guoying Zu, Ahmed Kamal, Mai Zheng
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
The output of the RF Switching Matrix is being fed to the Keysight
RF Sensor (N6841A) for spectrum monitoring purposes. In Figure 4,
the overall attenuation in the main RF chain due to the coupled
signal is close to 1 dB at the frequency of 3.5 GHz. In addition, the
copy of signal received at the RF sensor is around 11 dB lower than
the main transmission line. Such a very low attenuation introduced
by the couplers does not disrupt the RF operations of our users.
The RF sensor can operate at a frequency range of 20 MHz to 6 GHz
and can be configured to monitor the higher spectrum bands using
an up-down converter. The sensor has multiple trigger methods,
including frequency, amplitude, time, and spectral shape-based triggers. The sensor can be configured to various resolution bandwidths
starting from 5 Hz to up to 1.67 MHz. Further, the RF sensor can
monitor the spectrum from 20 Mhz to 6 GHz, with the minimum
display average noise level at -140 dBm at 10 Hz of the resolution
bandwidth.
The omnidirectional antenna (N6850) is a wide band antenna
with an isotropic gain of 0 dBi and is being used to monitor the
overall spectrum used at a given time slot. The operational frequency of the antenna varies from 20 MHz to 6 GHz and can be
used to monitor the signals as well as geolocate the transmitter
operating at a particular frequency. The RF Sensor is further configured with different Keysight Software modules named the Surveyor
4D that allows us to capture the signals based on the alarms that
can be set based on the signal under consideration and are predefined in the software. The software module helps to save all the
signal parameters and signal logs in an SQL-based database that
the WG daemon can use to take continuous feedback and monitor
multiple RF Chains one at a time.
Figure 3: Wireless Guard Hardware Architecture for BS Node
Signal Strengh (dBm)
transmitted to the Tower Mounted Boosters or TMBs, which amplifies the signal to get it transmitted over the air. The remaining 10
percent SDR power is coupled to the Keysight RF Switching Matrix.
A 10 dB DC was chosen because of the easy off-the-shelf availability and reliable signal sampling for spectrum sensing and signal
decoding, and to ensure that the RF operations are not disturbed.
Using the network analyzer, we observe that the introduction of
DC causes an attenuation of 1.45 dB at 3.5 GHz in the main RF
chain. The RF design of ARA is in such a way that even with the
DC-induced power loss in the RF chain, the maximum feasible transmission signal power at the panel antennas remains higher than
the maximum transmission power allowed by the FCC regulations.
Therefore, the introduction of DC does not reduce the coverage
area of ARA RANs. As seen in the Figure 4, the introduction of DC
in the transmission does not cause any distortion in the transmitted
signal, however, results in an attenuation of 1 dB in the overall
transmitted signal.
Hardware Architecture for UE Node
Like the base-station node, the UE also has the Wireless Guard spectrum monitoring hardware for accomplishing the reactive approach.
The hardware architecture for the UE nodes is slightly different
from the BS nodes, and it is shown in Figure 5.
With DC
−40
−60
−80
3.65
Signal Strengh (dBm)
3.4
3.7
Frequency (GHz)
Without DC
−40
−60
Figure 5: Wireless Guard Hardware Architecture for UE Node
A 10 dB direction coupler is used to monitor the user signals
and spectrum compliance. The coupled port is fed into the Ettus
Research B205mini-i SDR for spectrum monitoring purposes. The
B205mini-i is responsible for the IQ sample collection and spectrum
stitching over the complete span at which we want to monitor
the signals. The next sections will share details about the software
architecture for spectrum monitoring and stitching.
−80
3.65
3.7
Frequency (GHz)
Figure 4: Wide-band Spectrum Detection using NI SDR
35
Wireless Guard for Trustworthy Spectrum Management
4
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
the spectrum. The feasibility of realizing proactive approach using
FPGA can be considered as a future work.
SPECTRUM ENFORCEMENT TECHNIQUES
In what follows, we propose different spectrum enforcement techniques for the wireless guard (WG) to ensure that users do not
create interference (malicious or unintentional) between each other
or with users of any incumbent service provider.
4.1
4.2
Based on the different application requirements, the users might
need to access the platform under different types of leases (e.g., baremetal or containerized applications) to perform the experiments.
Unlike a containerized application, in the case of bare-metal access,
the WG daemon do not have any access to the WG agents residing
in the SDR-Host computer, so to enforce the spectrum policy in
the case of Bare-Metal access, a reactive approach is proposed so
that we ensure that spectrum is utilized most efficiently without
causing interference to other users or primary users of a certain
band.
As shown in Figure 3, the RF chains of base-station SDRs are
connected to the switching matrix that enables the RF sensor to
monitor multiple RF chains, one at a time. The switching matrix
is customized depending on the needs of each site and the matrix
incorporates directional couplers, RF switches, and a 10 dBm limiter
to protect SDRs and RF sensor from any RF surge from multiple
sources, lightening, DC transients, and electro-static discharge.
Figure 7 shows the switching matrix module built for one of the
ARA sites.
Proactive Approach
The proactive approach employed in WG is a software-based monitoring scheme for spectrum usage to track the user behavior. At
each BS location, three NI N320 SDRs are made available for ARA
users for their experiments where each SDR covers 120 degrees
azimuth of a single sector. The USRP devices are managed by Universal Hardware Driver (UHD), a software component written in
C and C++. Besides carrying the baseband data packets from user
applications to the SDR’s FPGA for transmitting them over the air,
UHD manages the hardware parameters of SDR as per the user
requirements.
Container 1
WG
Daemon
set_freq,set_bw,
channel info,
container_id
TCP/IP Socket
5G Software
Stack
WG
Sub_Daemon
.....
Reactive Approach Using COTS RF Sensor
Container n
...
UHD for USRP
Ubuntu/ Operating
System
SDR Host Comp
USRP Device
Figure 6: Architecture for Proactive Approach
Once the experiment profile is created and scheduled for execution, the information is sent to the WG daemon running at the
management computer residing at the resource site. In proactive
approach, we leverage UHD to monitor the parameters that are sent
by the users to configure on the USRP’s FPGA. The WG sub-daemon
receives a feedback when a user tries to set a new operational parameter. The configuration parameters along with the container
identifier are sent to the WG daemon of the management computer.
The WG daemon saves the operational parameters provided by
the user in the user behavior table of the database. Further, the
WG daemon compares the received hardware parameters with the
experiment profile. The experiment continues in cases where the
users are well-behaving and the parameters provided by the users
are consistent with the corresponding experiment profile. In case of
a mismatch between the user behavior and the experiment profile
(e.g., user setting a transmission frequency outside the reserved
bandwidth), the WG daemon reports the event to the controller, and
the controller stops the experiment; in this case, the USRP device
gets detached from the experiment, thereby preventing potential
interference to other users. Since the USRP devices can only be
configured using UHD, the proactive approach can be generalized
for the use by other testbeds that are using the USRP devices as
well as law enforcing agencies to ensure the appropriate usage of
Figure 7: RF Switching Matrix
The output of the switching matrix is passed to one of the ports
of the RF sensor. Using the Keysight APIs and custom scripts, we
select one of the RF chains at random and monitor the signals
transmitted by the user. The sweep time for the RF sensor as well
as the time to record the data in the database are in the order of a
few milliseconds based on the Resolution Bandwidth (RBW) and
frequency span we monitor. Once the RF chain has been selected,
the RF sensor sweeps through the signals of the corresponding RF
chain, and the operational parameters of the users operating on
that RF chain, e.g., the Center Frequency, Occupied BW, Modulation
Schemes, are stored in the database from where the WG daemon
accesses these operational parameters to make a comparison with
the reserved spectrum resources. The selection of the RF chain is
done randomly with the help of the Keysight RF Switching Matrix.
4.3
Reactive Approach Using B205mini-i SDR
The high cost and bulkiness of RF sensors are two challenges in
realizing the reactive approach at the user equipment (UE) side.
Therefore, we use NI B205mini-i SDRs for spectrum monitoring
at UEs. The real-time bandwidth for B205-mini is 56 MHz and the
36
Mukaram Shahid, Sarath Babu, Hongwei Zhang, Daji Qiao, Yong Guan,
Joshua Ofori Boateng, Taimoor Ul Islam, Guoying Zu, Ahmed Kamal, Mai Zheng
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
operational frequency ranges from 70 MHz to 6 GHz. To realize spectrum monitoring using B205mini-i, we use energy-based spectrum
detection algorithms that take the FFT (Fast Fourier Transform) of
the input signal, calculate the energy, and compare the energy with
a set of thresholds to determine the user’s operations at a particular
frequency and bandwidth. The system model for the energy-based
spectrum sensing can be represented in Eqn. (1), where 𝑤 (𝑛) and
𝑥 (𝑛) represent the noise and user signal, respectively. The user’s
presence is determined by comparing the energy with the predefined threshold. 𝐻 0 indicates the case where the SDR is idle, and 𝐻 1
indicates the case where the user is using the SDR and transmitting
at a certain frequency and bandwidth.
(
𝐻 0 : 𝑦 (𝑛) = 𝑤 (𝑛)
𝐻 1 : 𝑦 (𝑛) = 𝑠 (𝑛) + 𝑤 (𝑛)
Algorithm 1: Wide-band Spectrum Monitoring Using NI
SDR
Input: Start_Freq, Stop_Freq, Resolution Bandwidth (RBW),
Intermediate Frequency Bandwidth (IFBW), RF
Chain, Scan Interval
Output: Occupied Spectrum Bands (OSB)
1 𝑂𝑆𝐵 ← ∅;
2 𝐹𝐶 ← 𝑆𝑡𝑎𝑟𝑡_𝐹𝑟𝑒𝑞;
3 while current time % Scan Interval == 0 do
4
while 𝐹𝐶 + 𝐼 𝐹 𝐵𝑊
≤ 𝑆𝑡𝑜𝑝_𝐹𝑟𝑒𝑞 do
2
5
Capture IQ Samples;
6
forall Subband j of bandwidth RBW in
𝐼 𝐹 𝐵𝑊 ] do
[𝐹𝐶 − 𝐼 𝐹 𝐵𝑊
2 , 𝐹𝐶 +
2
7
Multiply the IQ samples with a windowing
function to filter the IQ samples through
subband j;
8
Take 𝑁 -point FFT of the filtered signal, and
calculate its Energy 𝐸;
9
if 𝐸 ≥ signal detection threshold 𝜏 then
10
Repeat steps 5, 7, and 8 and take three more
measurements to remove uncertainties in
the signal detection;
11
end
if Signal presence in subband j is confirmed then
12
13
𝑂𝑆𝐵 ← 𝑂𝑆𝐵 ∪ {𝑠𝑢𝑏𝑏𝑎𝑛𝑑 𝑗 };
14
end
15
end
16
𝐹𝐶 ← 𝐹𝐶 + 𝐼 𝐹 𝐵𝑊
17
end
18
Report the Occupied Spectrum Bands (OSB) back to WG
Daemon running in management computer;
19 end
(1)
We use a spectrum stitching technique with the B205mini-i SDR
to monitor a large spectrum span since the instantaneous bandwidth of 56 MHz is insufficient to monitor the complete span of
the spectrum under consideration. The procedure for spectrum
stitching and energy-based detection is described in Algorithm 1
and runs on top of the UHD. The Multi-USRP API provided by UHD
is used for executing different functionalities ranging from setting
up the center frequency, bandwidth, the RF chain of the SDR, the
gain of SDR, and the configurations to set the sampling rate. As
shown in Figure 5, B205mini-i captures the IQ samples at a center
frequency. The IQ samples are stored in a buffer and we collect 𝑛 IQ
samples at a particular center frequency. The recorded IQ samples
in the time-domain are first passed through the Blackman Harris
window to reduce the spectral leakage. For a better interpretation
of the recorded data, the resolution bandwidth of the filter is set
to 15 KHz since the sub-carrier spacing in LTE signals remains the
same. Once the signal is passed through the window, we use 1024points FFT to find the spectral density and compare the energy with
a certain threshold. Once the signal is found in a frequency frame,
we take three more measurements of the same frame to increase
the confidence level and then report the frequency and bandwidth
value to the wireless guard daemon for further analysis of the user
behavior.
5
EXPERIMENTAL EVALUATION
We have implemented the Wireless Guard in an ARA sandbox
environment as shown in Figure 8. The ARA sandbox includes a BS
SDR (NI N320) and a UE (NI B210), in addition to the associated SDR
host computers and ARA Controller. The BS and UE host computers
execute the srsRAN software stack to establish the link between
the BS and UE. For the evaluation purpose, the BS SDR was hosted
on a Dell PowerEdge T340 with Intel(R) Xeon(R) CPU@3.40 GHz,
with 12 cores, 64 GHz Memory and 1 TB of Hard Drive. For the
UE host computer and the management computer, we selected the
Intel NUC 10 BXNUC10I7FNHN1 with Core-i7 processor and up to
4.7 GHz clock speed.
To test the performance of Algorithm 1, the Downlink port of the
BS USRP device is connected to the Directional Coupler with the
coupling ratio of 10 dB, and the output of the coupler is connected
to the antenna for the data signal transmissions. The coupling port
Figure 8: ARA Sandbox Evaluation Network
37
Wireless Guard for Trustworthy Spectrum Management
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
of the WG Monitoring SDR is connected to the AraMgmt computer
and talks to the WG daemon sitting inside the AraMgmt computer.
The spectrum sensing results from Algorithm 1 are shown in
Figure 9. The user in our experiment operates at a center frequency
of 3.68 GHz with an operational BW of 10 MHz. The monitoring
frequency span under consideration is of 150 MHz from 3.6 GHz to
3.75 GHz. .
Signal Strengh (dBm)
−50
−60
−70
−80
−90
−100
3.6
3.65
3.7
Frequency (GHz)
frequency span, we can observe an increase in delay of 1 s. The
overall computational overhead/CPU usage was computed by considering different number of FFT points for the same monitoring
span. As shown in Figure 10, the computational overhead increases
as we increase the FFT points.
3.75
Figure 9: Wide-band Spectrum Detection using NI SDR
For the overall performance analysis of the Wireless Guard prototype, we create multiple tests that mimic the real use-case in the
ARA platform. We have created a set of experiment profiles and
tried to generate the scenario where the user initially started the
operations and was being honest, i.e., was operating at the reserved
frequency. Afterward, the user tries to misbehave and starts an
out-of-band emission. The mean time delay to stop the operations
of a misbehaving user using the proctive and reactive approaches
is shown in Table 2.
Figure 10: Span vs. End-to-End Processing Time
Table 2: Average Detection and Response Delay
Mean Delay
Proactive Approach
0.97 s
Reactive Approach
5.89 s
The values in the table represent the time delay to detect the RF
activity as the overall time required by the controller in stopping
the container of the misbehaving user when it tries to start the RF
operations in frequencies outside its reservation. The reason for
relatively higher time delays in the case of the reactive approach is
the computational complexity that comes with the FFT. Also, based
on Algorithm 1, once the energy is detected, we take three more
measurements to increase the confidence levels for reporting the
accurate BW and 𝐹𝐶 (Center Frequency).
Besides the time delays, the proactive approach performs better in terms of the accuracy of the RF operation detections. Since
the parameters are retrieved directly from the software stack, the
proactive approach provides very accurate results in case of low
SNR values which is a concern in all conventional cognitive radios.
The overall system performance of the reactive approach depends on several factors and we test the overall system performance
using different parameters. As seen in Figure 8, we monitor the
time delay required to take the FFT and compare with the threshold
during a single cycle. As seen in the above Figure 10, the computational overhead increases linearly as we increase the frequency
span that needs to be measured. For every 100 MHz increase in the
Figure 11: No. of FFT Points vs. CPU Usage
The CPU usage for the initial scan of the whole span was relatively very high, i.e., up to 108% (i.e., 1.08 cores of the system). In
the initial scan, the hardware gets configured and, once the SDR
has been configured with the firmware, the subsequent processes
include read/write from/to the SDR and FFT for the captured signals.
Further, as shown in Figure 10, the CPU usage also increases as we
increase the number of FFT points. Since the optimal results can be
obtained using 1024 FFT points, i.e., the error to monitor the correct
bandwidth is very low as compared to FFT with lower number
of points, we keep the value for WG to reduce the computational
overhead.
6
CONCLUDING REMARKS
We have designed and implemented the Wireless Guard (WG) for
spectrum monitoring and enforcement in the ARA wireless living lab [14]. The proactive approach is a software-based approach
38
Mukaram Shahid, Sarath Babu, Hongwei Zhang, Daji Qiao, Yong Guan,
Joshua Ofori Boateng, Taimoor Ul Islam, Guoying Zu, Ahmed Kamal, Mai Zheng
WiNTECH ’22, October 17, 2022, Sydney, NSW, Australia
which keeps monitoring the frequencies selected by the users in the
software stack. For multi-layer security, WG also uses the reactive
approach where the spectrum use from each RF chain is monitored
using COTS RF Sensors at the base station sites and B205mini-i
SDRs at the user equipment sites. We have evaluated the effectiveness of the WG design and implementation in the ARA sandbox
environment, and we will evaluate WG in at-scale field deployment
once the first phase of ARA [1] is completed in fall 2022. This study
of wireless guard has focused on spectrum enforcement to make
sure that no user or incumbent suffers from unexpected interference
from ARA experiments. However, the WG software and hardware
architectures can be used for studies such as dynamic spectrum
sharing between terrestrial and aerial networks. In addition, the
over-the-air data collected from the RF sensors can be used to train
machine-learning models for wireless network design and to get a
better understating of RF environment in rural settings.
[15] Qing Zhao and Ananthram Swami. 2007. A Survey of Dynamic Spectrum Access: Signal Processing and Networking Perspectives. In 2007 IEEE International
Conference on Acoustics, Speech and Signal Processing - ICASSP ’07, Vol. 4. IV–
1349–IV–1352.
[16] Anatolij Zubow, Suzan Bayhan, Piotr Gawłowicz, and Falko Dressler. 2020. DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced
Spectrum Sensing. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). 1–8.
ACKNOWLEDGMENTS
We thank Miguel Llanes for his help with the use of Keysight equipment in ARA. This work is supported in part by the NSF awards
2130889 and 1827211, NIFA award 2021-67021-33775, and PAWR
Industry Consortium.
REFERENCES
[1] 2022. Phased ARA Deployment. https://arawireless.org/deployment/.
[2] George Atia, Anant Sahai, and Venkatesh Saligrama. 2008. Spectrum Enforcement
and Liability Assignment in Cognitive Radio Systems. In 2008 3rd IEEE Symposium
on New Frontiers in Dynamic Spectrum Access Networks. 1–12.
[3] Aveek Dutta and Mung Chiang. 2016. “See Something, Say Something” Crowdsourced Enforcement of Spectrum Policies. IEEE Transactions on Wireless Communications 15, 1 (2016), 67–80.
[4] Carlo Galiotto, George K. Papageorgiou, Konstantinos Voulgaris, M. Majid Butt,
Nicola Marchetti, and Constantinos B. Papadias. 2018. Unlocking the Deployment
of Spectrum Sharing With a Policy Enforcement Framework. IEEE Access 6 (2018),
11793–11803.
[5] Abhay Karandikar. 2019. Frugal 5G: Towards Affordable Rural Wireless Broadband. In 2019 URSI Asia-Pacific Radio Science Conference (AP-RASC). 1–1.
[6] Vireshwar Kumar, He Li, Jung-Min Jerry Park, and Kaigui Bian. 2018. Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel
Transmitters. In 2018 IEEE International Symposium on Dynamic Spectrum Access
Networks (DySPAN). 1–10.
[7] Claire Najjuuko, Georginah K. Ayebare, Ronald Lukanga, Edwin Mugume, and
Dorothy Okello. 2021. A Survey of 5G for Rural Broadband Connectivity. In 2021
IST-Africa Conference (IST-Africa). 1–10.
[8] Jung-Min Park, Jeffrey H. Reed, A. A. Beex, T. Charles Clancy, Vireshwar Kumar,
and Behnam Bahrak. 2014. Security and Enforcement in Spectrum Sharing. Proc.
IEEE 102, 3 (2014), 270–281.
[9] Matthias Sander-Frigau, Tianyi Zhang, Chen-Ye Lim, Hongwei Zhang, Ahmed E.
Kamal, Arun K. Somani, Stefan Hey, and Patrick Schnable. 2021. A Measurement
Study of TVWS Wireless Channels in Crop Farms. In IEEE MASS.
[10] Roya H. Tehrani, Seiamak Vahid, Dionysia Triantafyllopoulou, Haeyoung Lee,
and Klaus Moessner. 2016. Licensed Spectrum Sharing Schemes for Mobile
Operators: A Survey and Outlook. IEEE Communications Surveys Tutorials 18, 4
(2016), 2591–2623.
[11] Boston C Terry, Alex Orange, Neal Patwari, Sneha Kasera, and Jacobus Van
Der Merwe. 2020. Spectrum monitoring and source separation in POWDER.
In Proceedings of the 14th International Workshop on Wireless Network Testbeds,
Experimental evaluation & Characterization. 25–32.
[12] Martin B H Weiss, Mohammed Altamimi, and Mark McHenry. 2013. Enforcement and spectrum sharing: A case study of the 1695–1710 MHz band. In 8th
International Conference on Cognitive Radio Oriented Wireless Networks. 7–12.
[13] Jincan Xin, Sen Xu, Hua Zhang, and Shangkun Xiong. 2021. Efficient Dynamic
Spectrum Sharing for LTE-NR Networks. In 2021 2nd International Conference on
Electronics, Communications and Information Technology (CECIT). 538–543.
[14] Hongwei Zhang, Yong Guan, Ahmed Kamal, Daji Qiao, Mai Zheng, Anish Arora,
Ozdal Boyraz, Brian Cox, Thomas Daniels, Matthew Darr, et al. 2022. ARA: A
Wireless Living Lab Vision for Smart and Connected Rural Communities. In ACM
WiNTECH.
39