Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks

In cognitive radio networks (CRNs), spectrum database has been well recognized as an effective means to dynamically sharing licensed spectrum among primary users (PUs) and secondary users (SUs). In spectrum database, the protected incumbents (a.k.a. PUs) and the CRs (a.k.a. SUs) are required to register in database their operational specifications such as transmitting power, antenna height, time of operation and etc. so as to provide an up-to-date radio map for public queries and avoid possible interference. However, it poses potentially serious privacy problems especially when governmental and military systems participate in spectrum sharing through spectrum database. Most recent research works in database-driven CRNs, however, only focused on protecting user's location privacy but merely studied preserving PUs' operational specifications. In this paper, we propose a secure and privacy-preserving scheme using hidden policy-assisted attribute-based encryption technique to protect sensitive PUs' operational privacy without affecting database's accessibility and spectrum utilization efficiency. The security and performance analysis demonstrates that our scheme is secure and computationally efficient. Additionally, our policy-assisted scheme is practical and promising because of its consistency with FCC/NTIA's rule in spectrum regulation in database-driven CRNs.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Behnam Bahrak,et al.  Security and Enforcement in Spectrum Sharing , 2014, Proceedings of the IEEE.

[3]  Behnam Bahrak,et al.  Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[4]  Jiming Chen,et al.  Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach , 2015, IEEE Transactions on Parallel and Distributed Systems.

[5]  Yang Cui,et al.  Protocol to Access White Space Database:Security Considerations , 2012 .

[6]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[7]  Peng Cheng,et al.  Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[8]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[9]  Jeffrey Boksiner,et al.  Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[10]  Stefan Katzenbeisser,et al.  Hiding the Policy in Cryptographic Access Control , 2011, STM.