Policy-based Privacy-Preserving Scheme for Primary Users in Database-driven Cognitive Radio Networks

被引:0
|
作者
Liu, Jianqing [1 ]
Zhang, Chi [2 ]
Ding, Haichuan [1 ]
Yue, Hao [3 ]
Fang, Yuguang [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Sci & Technol China, Chinese Acad Sci, Key Lab Electromagnet Space Informat, Hefei 230027, Peoples R China
[3] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
基金
美国国家科学基金会;
关键词
ATTRIBUTE-BASED ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cognitive radio networks (CRNs), spectrum database has been well recognized as an effective means to dynamically sharing licensed spectrum among primary users (PUs) and secondary users (SUs). In spectrum database, the protected incumbents (a.k.a. PUs) and the CRs (a.k.a. SUs) are required to register in database their operational specifications such as transmitting power, antenna height, time of operation and etc. so as to provide an up-to-date radio map for public queries and avoid possible interference. However, it poses potentially serious privacy problems especially when governmental and military systems participate in spectrum sharing through spectrum database. Most recent research works in database-driven CRNs, however, only focused on protecting user's location privacy but merely studied preserving PUs' operational specifications. In this paper, we propose a secure and privacy-preserving scheme using hidden policy-assisted attribute-based encryption technique to protect sensitive PUs' operational privacy without affecting database's accessibility and spectrum utilization efficiency. The security and performance analysis demonstrates that our scheme is secure and computationally efficient. Additionally, our policy-assisted scheme is practical and promising because of its consistency with FCC/NTIA's rule in spectrum regulation in database-driven CRNs.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Distributed Resource Map: A Database-driven Network Support Architecture for Cognitive Radio Ad hoc Networks
    Khan, Shah Nawaz
    Kalil, Mohamed A.
    Mitschele-Thiel, Andreas
    [J]. IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 188 - 194
  • [42] Primary Privacy Preserving With Joint Wireless Power and Information Transfer for Cognitive Radio Networks
    Wang, Dawei
    Zhou, Fuhui
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (02) : 683 - 693
  • [43] An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
    Pang, Shanchen
    Sun, Huanhuan
    Wang, Min
    Wang, Shuyu
    Qiao, Sibo
    Xiong, Neal N.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [44] PAPG: Private Aggregation Scheme based on Privacy-preserving Gene in Wireless Sensor Networks
    Zeng, Weini
    Chen, Peng
    Chen, Hairong
    He, Shiming
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4442 - 4466
  • [45] A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
    Wang, Liang
    Zheng, Dong
    Guo, Rui
    Hu, ChenCheng
    Jing, ChunMing
    [J]. International Journal of Network Security, 2020, 22 (06) : 981 - 990
  • [46] PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks
    Yu, Wenbin
    Chen, Cailian
    Yang, Bo
    Guan, Xinping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 715 - 724
  • [47] RPPM: A Reputation-Based and Privacy-Preserving Platoon Management Scheme in Vehicular Networks
    Li, Runchuan
    Liu, Zhiquan
    Ma, Yong
    Xia, Yunni
    Cheng, Yudan
    Wan, Lin
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 6147 - 6160
  • [48] A Privacy-Preserving Friend Matching Scheme Based on Attribute Encryption in Mobile Social Networks
    Yu, Li
    Nan, Xingxing
    Niu, Shufen
    [J]. ELECTRONICS, 2024, 13 (11)
  • [49] Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
    Alkanjr, Basmh
    Mahgoub, Imad
    [J]. SENSORS, 2023, 23 (06)
  • [50] Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks
    Zhang, Kai
    Huang, Haiping
    Wang, Yunqi
    Wang, Ruchuan
    [J]. INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2017, 2017, 202 : 119 - 129