Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks

As participants of intelligent networks, secondary users should first act as sensors to detect wireless environment to get available spectrum. However, to get more accurate sensing data and access idle spectrum with higher probability in cognitive radio networks, secondary users have to share positions with other entities such as fusion centers, which may raise serious privacy concerns if these positions are not protected adequately. In this paper, to make full use of idle spectrum with low probability of location leakage, we propose a Location Privacy-Preserving Channel Allocation (LP-p CA) scheme. The scheme can conceal identities of secondary users and cut off the relationship between secondary users' location and register data in database (DB) while using random sequence and self-coexistence mechanism of agents. Simulations show that the proposed scheme can satisfy users' personal location privacy concerns and maximize spectrum utility synchronously.

[1]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[2]  Yao Liu,et al.  Agent-based Channel Selection scheme against location inference attack in cognitive radio networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[3]  Michel Gamache,et al.  A graph coloring model for a feasibility problem in monthly crew scheduling with preferential bidding , 2007, Comput. Oper. Res..

[4]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[5]  Erik G. Larsson,et al.  Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.

[6]  Qian Zhang,et al.  Location Privacy Preservation in Collaborative Spectrum Sensing , 2014 .

[7]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[8]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[9]  M. Derakhtian,et al.  Total throughput maximisation in a cognitive radio network , 2013, IET Commun..

[10]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[11]  F. Richard Yu,et al.  Energy-efficient spectrum sharing and power allocation in cognitive radio femtocell networks , 2012, 2012 Proceedings IEEE INFOCOM.

[12]  Dimitrios Makrakis,et al.  Protecting Location Privacy with Clustering Anonymization in vehicular networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[13]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  Qun Li,et al.  Preserving secondary users' privacy in cognitive radio networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[15]  Dengfeng Li,et al.  The location privacy protection research in location-based service , 2010, 2010 18th International Conference on Geoinformatics.

[16]  Amir R. Forouzan,et al.  Computationally efficient adaptive algorithm for resource allocation in orthogonal frequency-division multiple-access-based cognitive radio networks , 2015, IET Commun..