Skip to main content

A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10946))

Included in the following conference series:

  • 1983 Accesses

Abstract

Cognitive radio technique is regarded as a promising way for allowing secondary users (SUs) to access available channels without introducing the interference to the primary users (PUs). However, database-driven cognitive radio networks (CRNs) are facing a series of security and privacy threats, especially the privacy breaches of SUs. To address this issue, this paper proposes a practical privacy-preserving protocol for database-driven CRNs that allows SUs to get the available channels in their vicinity efficiently while protecting their privacy. Our protocol takes advantage of modular square root technique to verify the identity of a SU and enables a legitimate SU to obtain the available channel without leaking its privacy. By prefetching channels, our protocol reduces the latency of obtaining available channels for SUs. Besides, the proposed protocol provides strong privacy preservation that the database cannot trace any SUs and get nothing about location or identity information of SUs, even the database colludes with all base stations. The results of security analysis and performance evaluation indicate the feasibility and practicality of the proposed privacy-preserving protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)

    Article  Google Scholar 

  2. Sharma, S.K., Bogale, T.E., Chatzinotas, S., Ottersten, B.E., Le, L.B., Wang, X.: Cognitive radio techniques under practical imperfections: a survey. IEEE Commun. Surv. Tutor. 17(4), 1858–1884 (2015)

    Article  Google Scholar 

  3. Li, J., Zhao, H., Wei, J., Ma, D., Zhou, L.: Sender-jump receiver-wait: a simple blind rendezvous algorithm for distributed cognitive radio networks. IEEE Trans. Mob. Comput. 17(1), 183–196 (2018)

    Article  Google Scholar 

  4. Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. In: ACM Conference on Computer and Communications Security, CCS 2012, 16–18 October 2012, Raleigh, NC, USA, pp. 1025–1027 (2012)

    Google Scholar 

  5. Al-Ali, A.K., Sun, Y., Di Felice, M., Paavola, J., Chowdhury, K.R.: Accessing spectrum databases using interference alignment in vehicular cognitive radio networks. IEEE Trans. Veh. Technol. 64(1), 263–272 (2015)

    Article  Google Scholar 

  6. Federal communications commission, third memorandum opinion and order http://hraunfoss.fcc.gov/edocs~public/attachmatch/fcc-12-36a1.pdf

  7. Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: attacks and countermeasures. In: Proceedings of the IEEE INFOCOM 2013, 14–19 April 2013, Turin, Italy, pp. 2751–2759 (2013)

    Google Scholar 

  8. Wicker, S.B.: The loss of location privacy in the cellular age. Commun. ACM 55(8), 60–68 (2012)

    Article  Google Scholar 

  9. Troja, E., Bakiras, S.: Optimizing privacy-preserving DSA for mobile clients. Ad Hoc Netw. 59, 71–85 (2017)

    Article  Google Scholar 

  10. Xin, J., Li, M., Luo, C., Li, P.: Privacy-preserving spectrum query with location proofs in database-driven CRNs. In: 2016 IEEE Global Communications Conference, GLOBECOM 2016, 4–8 December 2016, Washington, DC, USA, pp. 1–6 (2016)

    Google Scholar 

  11. Grissa, M., Yavuz, A.A., Hamdaoui, B.: Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures. IEEE Trans. Cogn. Commun. Netw. 3(2), 255–266 (2017)

    Article  Google Scholar 

  12. Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications, ICC 2015, 8–12 June 2015, London, United Kingdom, pp. 7640–7645 (2015)

    Google Scholar 

  13. Li, H., Pei, Q., Zhang, W.: Location privacy-preserving channel allocation scheme in cognitive radio networks. Int. J. Distrib. Sens. Netw. 12(7), 3794582–3794582 (2016)

    Article  Google Scholar 

  14. Sun, H., Jafar, S.A.: The capacity of private information retrieval. IEEE Trans. Inf. Theory 63(7), 4075–4088 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  15. Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  16. Yi, X., Siew, C.K., Tan, C.H.: A secure and efficient conference scheme for mobile communications. IEEE Trans. Veh. Technol. 52(4), 784–793 (2003)

    Article  Google Scholar 

  17. Zhu, Z., Cao, G.: APPLAUS: a privacy-preserving location proof updating system for location-based services. In: Proceedings of the IEEE INFOCOM 2011, 10–15 April 2011, Shanghai, China, pp. 1889–1897 (2011)

    Google Scholar 

  18. Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519–521 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  19. Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the National Natural Science Foundation of China (Grant No. 61771140, No. 61572010 and No. U1405255), Natural Science Foundation of Fujian Province (Grant No. 2013J01222 and No. 2016J01287), Fujian Normal University Innovative Research Team (Grant No. IRTL1207), Fujian Province Department of Education Project (Grant No. JAT160123), Fuzhou Science and Technology Bureau Project (Grant No. 2015-G-59), Fujian Province University industry Cooperation of Major Science and Technology Project (Grant No. 2017H6005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zeng, Y., Li, X., Yang, X., Xu, Q., Wang, D. (2018). A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. In: Susilo, W., Yang, G. (eds) Information Security and Privacy. ACISP 2018. Lecture Notes in Computer Science(), vol 10946. Springer, Cham. https://doi.org/10.1007/978-3-319-93638-3_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93638-3_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93637-6

  • Online ISBN: 978-3-319-93638-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics