Policy-based Privacy-Preserving Scheme for Primary Users in Database-driven Cognitive Radio Networks

被引:0
|
作者
Liu, Jianqing [1 ]
Zhang, Chi [2 ]
Ding, Haichuan [1 ]
Yue, Hao [3 ]
Fang, Yuguang [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Sci & Technol China, Chinese Acad Sci, Key Lab Electromagnet Space Informat, Hefei 230027, Peoples R China
[3] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
基金
美国国家科学基金会;
关键词
ATTRIBUTE-BASED ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cognitive radio networks (CRNs), spectrum database has been well recognized as an effective means to dynamically sharing licensed spectrum among primary users (PUs) and secondary users (SUs). In spectrum database, the protected incumbents (a.k.a. PUs) and the CRs (a.k.a. SUs) are required to register in database their operational specifications such as transmitting power, antenna height, time of operation and etc. so as to provide an up-to-date radio map for public queries and avoid possible interference. However, it poses potentially serious privacy problems especially when governmental and military systems participate in spectrum sharing through spectrum database. Most recent research works in database-driven CRNs, however, only focused on protecting user's location privacy but merely studied preserving PUs' operational specifications. In this paper, we propose a secure and privacy-preserving scheme using hidden policy-assisted attribute-based encryption technique to protect sensitive PUs' operational privacy without affecting database's accessibility and spectrum utilization efficiency. The security and performance analysis demonstrates that our scheme is secure and computationally efficient. Additionally, our policy-assisted scheme is practical and promising because of its consistency with FCC/NTIA's rule in spectrum regulation in database-driven CRNs.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] An efficient privacy-preserving protocol for database-driven cognitive radio networks
    Zeng, Yali
    Xu, Li
    Yang, Xu
    Yi, Xun
    [J]. AD HOC NETWORKS, 2019, 90
  • [2] Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks
    Li, Yi
    Zhou, Lu
    Zhu, Haojin
    Sun, Limin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 345 - 355
  • [3] Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks
    Zhang, Zhikun
    Zhang, Heng
    He, Shibo
    Cheng, Peng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 236 - 247
  • [4] A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks
    Salami, Zeinab
    Ahmadian-Attari, Mahmoud
    Jannati, Hoda
    Aref, Mohammad Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (04) : 3687 - 3711
  • [5] A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks
    Zeinab Salami
    Mahmoud Ahmadian-Attari
    Hoda Jannati
    Mohammad Reza Aref
    [J]. Wireless Personal Communications, 2017, 95 : 3687 - 3711
  • [6] A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks
    Zeng, Yali
    Li, Xu
    Yang, Xu
    Xu, Qikui
    Wang, Dongcheng
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 634 - 648
  • [7] Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks
    Li, Yi
    Zhou, Lu
    Zhu, Haojin
    Sun, Limin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (04): : 563 - 571
  • [8] Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks
    He, Xiaofan
    Jin, Richeng
    Dai, Huaiyu
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) : 21 - 24
  • [9] Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network
    Salami, Zeinab
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    Jannati, Hoda
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (02): : 215 - 227
  • [10] Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
    Gao, Zhaoyu
    Zhu, Haojin
    Liu, Yao
    Li, Muyuan
    Cao, Zhenfu
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2751 - 2759