Abstract
Cognitive radio technique is regarded as a promising way for allowing secondary users (SUs) to access available channels without introducing the interference to the primary users (PUs). However, database-driven cognitive radio networks (CRNs) are facing a series of security and privacy threats, especially the privacy breaches of SUs. To address this issue, this paper proposes a practical privacy-preserving protocol for database-driven CRNs that allows SUs to get the available channels in their vicinity efficiently while protecting their privacy. Our protocol takes advantage of modular square root technique to verify the identity of a SU and enables a legitimate SU to obtain the available channel without leaking its privacy. By prefetching channels, our protocol reduces the latency of obtaining available channels for SUs. Besides, the proposed protocol provides strong privacy preservation that the database cannot trace any SUs and get nothing about location or identity information of SUs, even the database colludes with all base stations. The results of security analysis and performance evaluation indicate the feasibility and practicality of the proposed privacy-preserving protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)
Sharma, S.K., Bogale, T.E., Chatzinotas, S., Ottersten, B.E., Le, L.B., Wang, X.: Cognitive radio techniques under practical imperfections: a survey. IEEE Commun. Surv. Tutor. 17(4), 1858–1884 (2015)
Li, J., Zhao, H., Wei, J., Ma, D., Zhou, L.: Sender-jump receiver-wait: a simple blind rendezvous algorithm for distributed cognitive radio networks. IEEE Trans. Mob. Comput. 17(1), 183–196 (2018)
Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. In: ACM Conference on Computer and Communications Security, CCS 2012, 16–18 October 2012, Raleigh, NC, USA, pp. 1025–1027 (2012)
Al-Ali, A.K., Sun, Y., Di Felice, M., Paavola, J., Chowdhury, K.R.: Accessing spectrum databases using interference alignment in vehicular cognitive radio networks. IEEE Trans. Veh. Technol. 64(1), 263–272 (2015)
Federal communications commission, third memorandum opinion and order http://hraunfoss.fcc.gov/edocs~public/attachmatch/fcc-12-36a1.pdf
Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: attacks and countermeasures. In: Proceedings of the IEEE INFOCOM 2013, 14–19 April 2013, Turin, Italy, pp. 2751–2759 (2013)
Wicker, S.B.: The loss of location privacy in the cellular age. Commun. ACM 55(8), 60–68 (2012)
Troja, E., Bakiras, S.: Optimizing privacy-preserving DSA for mobile clients. Ad Hoc Netw. 59, 71–85 (2017)
Xin, J., Li, M., Luo, C., Li, P.: Privacy-preserving spectrum query with location proofs in database-driven CRNs. In: 2016 IEEE Global Communications Conference, GLOBECOM 2016, 4–8 December 2016, Washington, DC, USA, pp. 1–6 (2016)
Grissa, M., Yavuz, A.A., Hamdaoui, B.: Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures. IEEE Trans. Cogn. Commun. Netw. 3(2), 255–266 (2017)
Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications, ICC 2015, 8–12 June 2015, London, United Kingdom, pp. 7640–7645 (2015)
Li, H., Pei, Q., Zhang, W.: Location privacy-preserving channel allocation scheme in cognitive radio networks. Int. J. Distrib. Sens. Netw. 12(7), 3794582–3794582 (2016)
Sun, H., Jafar, S.A.: The capacity of private information retrieval. IEEE Trans. Inf. Theory 63(7), 4075–4088 (2017)
Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Yi, X., Siew, C.K., Tan, C.H.: A secure and efficient conference scheme for mobile communications. IEEE Trans. Veh. Technol. 52(4), 784–793 (2003)
Zhu, Z., Cao, G.: APPLAUS: a privacy-preserving location proof updating system for location-based services. In: Proceedings of the IEEE INFOCOM 2011, 10–15 April 2011, Shanghai, China, pp. 1889–1897 (2011)
Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519–521 (1985)
Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)
Acknowledgment
The authors would like to thank the National Natural Science Foundation of China (Grant No. 61771140, No. 61572010 and No. U1405255), Natural Science Foundation of Fujian Province (Grant No. 2013J01222 and No. 2016J01287), Fujian Normal University Innovative Research Team (Grant No. IRTL1207), Fujian Province Department of Education Project (Grant No. JAT160123), Fuzhou Science and Technology Bureau Project (Grant No. 2015-G-59), Fujian Province University industry Cooperation of Major Science and Technology Project (Grant No. 2017H6005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Zeng, Y., Li, X., Yang, X., Xu, Q., Wang, D. (2018). A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. In: Susilo, W., Yang, G. (eds) Information Security and Privacy. ACISP 2018. Lecture Notes in Computer Science(), vol 10946. Springer, Cham. https://doi.org/10.1007/978-3-319-93638-3_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-93638-3_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93637-6
Online ISBN: 978-3-319-93638-3
eBook Packages: Computer ScienceComputer Science (R0)