Skip to main content

SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems

  • Conference paper
  • First Online:
  • 397 Accesses

Abstract

Dynamic Spectrum Access (DSA) is a promising solution to alleviate spectrum crowding. However, geolocation database-driven spectrum access system (SAS) presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or SU inference attack. In this paper, we propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS). This is the first framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. Evaluation results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006). https://doi.org/10.1145/1127345.1127346

    Article  MATH  Google Scholar 

  2. Bahrak, B., Bhattarai, S., Ullah, A., Park, J.M.J., Reed, J., Gurney, D.: Protecting the primary users’ operational privacy in spectrum sharing. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), pp. 236–247, April 2014. https://doi.org/10.1109/DySPAN.2014.6817800

  3. Dou, Y., et al.: Preserving incumbent users’ privacy in server-driven dynamic spectrum access systems. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 729–730, June 2016. https://doi.org/10.1109/ICDCS.2016.40

  4. Park, J.M., Reed, J.H., Beex, A.A., Clancy, T.C., Kumar, V., Bahrak, B.: Security and enforcement in spectrum sharing. Proc. IEEE 102(3), 270–281 (2014). https://doi.org/10.1109/JPROC.2014.2301972

    Article  Google Scholar 

  5. Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 2011, pp. 247–262. IEEE Computer Society, Washington, DC (2011). https://doi.org/10.1109/SP.2011.18

  6. Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7640–7645, June 2015. https://doi.org/10.1109/ICC.2015.7249548

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Douglas Zabransky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zabransky, D., Li, H., Lu, C., Yang, Y. (2019). SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems. In: Moerman, I., Marquez-Barja, J., Shahid, A., Liu, W., Giannoulis, S., Jiao, X. (eds) Cognitive Radio Oriented Wireless Networks. CROWNCOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 261. Springer, Cham. https://doi.org/10.1007/978-3-030-05490-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05490-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05489-2

  • Online ISBN: 978-3-030-05490-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics