Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks

The latest FCC ruling has enforced database-driven cognitive radio networks (CRNs), in which all secondary users (SUs) can query a database to obtain spectrum available information (SAI). Database-driven CRNs is regarded as a promising approach for dynamic and highly efficient spectrum management paradigm. However, as a typical location-based service (LBS), there is no verification of the queried location, which is very vulnerable to Location Spoofing Attack. This will introduce serious interference to the PUs. In this study, we identify a new kind of attack coined as location cheating attack. To thwart this attack, we propose a novel infrastructure-based approach to provide privacy-preserving location proof. With the proposed solution, the database can verify the locations without knowing the user’s accurate location. Experimental results show that our approach, besides providing location proofs effectively, can significantly improve the user’s location privacy.

[1]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[2]  Man Lung Yiu,et al.  Private and Flexible Proximity Detection in Mobile Social Networks , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[3]  Lei Zhu,et al.  Protocol to Access White-Space (PAWS) Databases , 2015, RFC.

[4]  Haojin Zhu,et al.  All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.

[5]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[6]  Yaling Yang,et al.  Location spoofing attack and its countermeasures in database-driven cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[7]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Jean-Pierre Hubaux,et al.  Secure and private proofs for location-based activity summaries in urban areas , 2014, UbiComp.

[9]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[10]  Yao Zheng,et al.  SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags , 2012, ESORICS.

[11]  Xue Liu,et al.  Location Cheating: A Security Challenge to Location-Based Social Network Services , 2011, 2011 31st International Conference on Distributed Computing Systems.

[12]  Yi Li,et al.  Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).