skip to main content
10.1145/2811587.2811594acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks

Authors Info & Claims
Published:02 November 2015Publication History

ABSTRACT

Collaborative sensing has become increasingly popular in cognitive radio networks to enable unlicensed secondary users to coexist with the licensed primary users and share spectrum without interference. Despite its promise in performance enhancement, collaborative sensing is still facing a lot of security challenges. The problem of revealing secondary users' location information through sensing reports has been reported recently. Unlike any existing work, in this paper we not only address the location privacy issues in the collaborative sensing process against semi-honest adversaries, but also take the malicious adversaries into consideration. We propose efficient schemes to protect secondary users' report from being revealed in the report aggregation process at the fusion center. We rigorously prove that our privacy-preserving collaborative sensing schemes are secure against the fusion center and the secondary users in semi-honest model. We also evaluate our scheme extensively and verify its efficiency.

References

  1. M. Abdelraheem, M. El-Nainay, and S. Midkiff. Spectrum occupancy analysis of cooperative relaying technique for cognitive radio networks. In Computing, Networking and Communications (ICNC), 2015 International Conference on, pages 237--241, Feb 2015.Google ScholarGoogle ScholarCross RefCross Ref
  2. I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty. Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Comput. Netw., 50(13):2127--2159, Sept. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Al-Ali and K. Chowdhury. Simulating dynamic spectrum access using ns-3 for wireless networks in smart environments. In Sensing, Communication, and Networking Workshops (SECON Workshops), 2014 Eleventh Annual IEEE International Conference on, pages 28--33, June 2014.Google ScholarGoogle Scholar
  4. A. S. Amos Fiat. How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology -- CRYPTO '86, Lecture Notes in Computer Science, 263:186--194, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Arshad. Malicious users detection in collaborative spectrum sensing using statistical tests. In Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on, pages 109--113, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. D. Cabric, S. M. Mishra, D. Willkomm, R. Brodersen, and A. Wolisz. A cognitive radio approach for usage of virtual unlicensed spectrum. In In Proc. of 14th IST Mobile Wireless Communications Summit 2005, 2005.Google ScholarGoogle Scholar
  7. R. Chen and J.-M. Park. Ensuring trustworthy spectrum sensing in cognitive radio networks. In Networking Technologies for Software Defined Radio Networks, 2006. SDR '06.1st IEEE Workshop on, pages 110--119, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Chen, J.-M. Park, and J. Reed. Defense against primary user emulation attacks in cognitive radio networks. Selected Areas in Communications, IEEE Journal on, 26(1):25--37, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Duan, A. Min, J. Huang, and K. Shin. Attack prevention for collaborative spectrum sensing in cognitive radio networks. Selected Areas in Communications, IEEE Journal on, 30(9):1658--1665, 2012.Google ScholarGoogle Scholar
  10. FCC. Spectrum inventory table. http://www.fcc.gov/oet/info/database/spectrum/. website.Google ScholarGoogle Scholar
  11. Z. Gao, H. Zhu, S. Li, S. Du, and X. Li. Security and privacy of collaborative spectrum sensing in cognitive radio networks. Wireless Communications, IEEE, 19(6):106--112, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  12. Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao. Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 1025--1027. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Z. Gao, H. Zhu, Y. Liu, M. Li, and C. Zhenfu. Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In INFOCOM, 2013 Proceedings IEEE, pages 2751--2759, April 2013.Google ScholarGoogle ScholarCross RefCross Ref
  14. O. Goldreich. The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, STOC '87, pages 218--229, New York, NY, USA, 1987. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen. Location privacy preservation in collaborative spectrum sensing. In INFOCOM, 2012 Proceedings IEEE, pages 729--737, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Min, K. Shin, and X. Hu. Secure cooperative sensing in ieee 802.22 wrans using shadow fading correlation. Mobile Computing, IEEE Transactions on, 10(10):1434--1447, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Mishra, A. Sahai, and R. Brodersen. Cooperative sensing among cognitive radios. In Communications, 2006. ICC '06. IEEE International Conference on, volume 4, pages 1658--1663, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  19. H. Rifa-Pous and J. Rifa. Spectrum sharing models in cognitive radio networks. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pages 503--510, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Teguig, B. Scheers, and V. Le Nir. Data fusion schemes for cooperative spectrum sensing in cognitive radio networks. pages 1--7, Oct 2012.Google ScholarGoogle Scholar
  21. N. Tran, D. Tran, L. B. Le, Z. Han, and C. S. Hong. Load balancing and pricing for spectrum access control in cognitive radio networks. In Global Communications Conference (GLOBECOM), 2014 IEEE, pages 1035--1040, Dec 2014.Google ScholarGoogle ScholarCross RefCross Ref
  22. A. S. Uriel Feige, Amos Fiat. Zero-knowledge proofs of identity. Journal of Cryptology, 1:77--94, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Wang and Y. Yang. Location privacy protection from rss localization system using antenna pattern synthesis. In INFOCOM, 2011 Proceedings IEEE, pages 2408--2416, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  24. W. Wang, H. Li, Y. Sun, and Z. Han. Attack-proof collaborative spectrum sensing in cognitive radio networks. In Information Sciences and Systems, 2009. CISS 2009. 43rd Annual Conference on, pages 130--134, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  25. W. Wang, H. Li, Y. Sun, and Z. Han. Catchit: Detect malicious nodes in collaborative spectrum sensing. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, pages 1--6, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. X. Xing, T. Jing, H. Li, Y. Huo, X. Cheng, and T. Znati. Optimal spectrum sensing interval in cognitive radio networks. IEEE Transactions on Parallel and Distributed Systems, 25(9):2408--2417, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Zhong. Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties. PhD thesis, Yale University, 11 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MSWiM '15: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
        November 2015
        358 pages
        ISBN:9781450337625
        DOI:10.1145/2811587

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        MSWiM '15 Paper Acceptance Rate34of142submissions,24%Overall Acceptance Rate398of1,577submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader