Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing

被引:11
作者
Mao, Yunlong [1 ,2 ]
Chen, Tingting [3 ]
Zhang, Yuan [1 ,2 ]
Wang, Tiancong [4 ,5 ]
Zhong, Sheng [1 ,2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ, Dept Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Calif State Polytech Univ Pomona, Dept Comp Sci, Pomona, CA 91768 USA
[4] Nanjing Univ, Nanjing 210023, Jiangsu, Peoples R China
[5] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Location privacy; privacy preserving; collaborative sensing; cognitive radio; LOCATION PRIVACY; NETWORKS; REPUTATION; ATTACKS; SYSTEM;
D O I
10.1109/TIFS.2017.2668219
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Collaborative spectrum sensing has become increasingly popular in cognitive radio networks to enable unlicensed secondary users to coexist with the licensed primary users and share spectrum without interference. Despite its promise in performance enhancement, collaborative sensing is still facing a lot of security challenges. The problem of revealing secondary users' location information through sensing reports has been reported recently. Unlike any existing work, in this paper we not only address the location privacy issue in the collaborative sensing to be against semi-honest adversaries, but also take malicious adversaries into consideration. We propose efficient schemes to protect secondary users' reports from being revealed in the aggregation process at the fusion center. We rigorously prove that our privacy-preserving collaborative sensing schemes are secure against attacks from both the fusion center and secondary users. We also evaluate our schemes extensively and verify its efficiency and feasibility.
引用
收藏
页码:1483 / 1493
页数:11
相关论文
共 29 条
[1]  
Abdelraheem M, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), P237, DOI 10.1109/ICCNC.2015.7069347
[2]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[3]  
Al-Ali A, 2014, IEEE INT CONF SENS, P28, DOI 10.1109/SECONW.2014.6979701
[4]  
[Anonymous], 2005, P 14 IST MOB WIR COM
[5]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[6]   Robust Spectrum Sensing With Crowd Sensors [J].
Ding, Guoru ;
Wang, Jinlong ;
Wu, Qihui ;
Zhang, Linyuan ;
Zou, Yulong ;
Yao, Yu-Dong ;
Chen, Yingying .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (09) :3129-3143
[7]   Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks [J].
Duan, Lingjie ;
Min, Alexander W. ;
Huang, Jianwei ;
Shin, Kang G. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (09) :1658-1665
[8]  
FCC, SPECTR INV TABL
[9]  
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717
[10]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194