Thwarting Location Inference Attacks in Database-Driven Spectrum Sharing

被引:13
作者
Bhattarai, Sudeep [1 ]
Vaka, Pradeep Reddy [2 ]
Park, Jung-Min [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] Qualcomm Inc, Syst Integrat, San Diego, CA 92121 USA
基金
美国国家科学基金会;
关键词
Dynamic spectrum access; database-driven spectrum sharing; location privacy; inference attack; operational security; 3.5 GHz band; CBRS band; PRIVACY; SECURITY;
D O I
10.1109/TCCN.2017.2785770
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The use of geolocation databases (GDBs) for enabling spectrum sharing has been mandated by the Federal Communications Commission in the U.S. TV band and the 3.5 GHz band, and it is very likely to be adopted for spectrum sharing in other bands as well. Although using GDBs is a practical approach for enabling spectrum sharing, it raises a potentially serious operational security problem, especially when some of the primary users (PUs) are federal government entities, including military users. In this paper, we show that malicious queries can readily infer the locations of PUs by making multiple queries to the database even if the database's responses to queries do not directly reveal such information. To address this issue, we propose a perturbation-based optimal obfuscation strategy that can be implemented by the GDB to preserve the location privacy of PUs. The proposed obfuscation strategy is optimal in the sense that it maximizes PUs' location privacy while ensuring that the expected degradation in the secondary users' utility due to obfuscated responses does not exceed a threshold. Using results from extensive simulations, we demonstrate the efficacy of the proposed scheme in countering location inference attacks, including the inference strategy described in the paper.
引用
收藏
页码:314 / 327
页数:14
相关论文
共 29 条
[1]  
Andres M. E., 2013, P ACM SIGSAC C COMP, P901
[2]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[3]  
[Anonymous], WINNF15P0062
[4]  
[Anonymous], WINNFTS0071
[5]  
[Anonymous], THESIS
[6]  
[Anonymous], PROC ACM MOBIHOC
[7]  
[Anonymous], 2008, 08260 FCC
[8]  
Bahrak B, 2014, IEEE INT SYMP DYNAM, P236, DOI 10.1109/DySPAN.2014.6817800
[9]   Optimal Geo-Indistinguishable Mechanisms for Location Privacy [J].
Bordenabe, Nicolas E. ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :251-262
[10]  
Chow R., 2009, P 8 ACM WORKSH PRIV, P105, DOI DOI 10.1145/1655188.1655204