Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing

被引:34
作者
Grissa, Mohamed [1 ]
Yavuz, Attila A. [1 ]
Hamdaoui, Bechir [1 ]
机构
[1] Oregon State Univ, Elect Engn & Comp Sci Dept, Corvallis, OR 97331 USA
基金
美国国家科学基金会;
关键词
Location privacy; secure cooperative spectrum sensing; order preserving encryption; cognitive radio networks; DATABASE;
D O I
10.1109/TIFS.2016.2622000
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered with privacy preserving capabilities so as to provide SUs with incentives for participating in the sensing task. In this paper, we propose privacy preserving protocols that make use of various cryptographic mechanisms to preserve the location privacy of SUs while performing reliable and efficient spectrum sensing. We also present cost-performance tradeoffs. The first consists on using an additional architectural entity at the benefit of incurring lower computation overhead by relying only on symmetric cryptography. The second consists on using an additional secure comparison protocol at the benefit of incurring lesser architectural cost by not requiring extra entities. Our schemes can also adapt to the case of a malicious fusion center as we discuss in this paper. We also show that not only are our proposed schemes secure and more efficient than existing alternatives, but also achieve fault tolerance and are robust against sporadic network topological changes.
引用
收藏
页码:418 / 431
页数:14
相关论文
共 46 条
  • [1] Adem N., 2016, WIRELESS COMMUNICATI
  • [2] Cooperative spectrum sensing in cognitive radio networks: A survey
    Akyildiz, Ian F.
    Lo, Brandon F.
    Balakrishnan, Ravikumar
    [J]. PHYSICAL COMMUNICATION, 2011, 4 (01) : 40 - 62
  • [3] [Anonymous], FUTURE NETWORK MOBIL
  • [4] [Anonymous], COGNITIVE RADIO ORIE
  • [5] [Anonymous], 2001, 1402 FIPS PUB NAT I
  • [6] [Anonymous], 2014, 80222A2014 IEEE
  • [7] [Anonymous], 1997, Handbook of Applied Cryptography
  • [8] TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
    Bajaj, Sumeet
    Sion, Radu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) : 752 - 765
  • [9] Blake I., 1999, Elliptic Curves in Cryptography, V265
  • [10] Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13