Lightweight privacy preservation for secondary users in cognitive radio networks

Abstract Cognitive radio is emerging as a technology to alleviate spectrum shortage and to improve spectrum utilization. In database-driven cognitive radio networks (CRNs), secondary users (SUs) must provide their locations to the database to enable channel allocation, which results in severe privacy violation. As SUs are usually energy-constrained or fast-moving, how to provide efficient channel allocation solutions for SUs while guaranteeing security and privacy becomes a main challenge in database-driven CRNs. In this paper, we propose a lightweight privacy-preserving scheme to protect the privacy of SUs and to allocate channels efficiently with the aid of base stations (BSs). In order to save the energy of SUs and to reduce the delay of channel allocation, only lightweight operations are required to achieve authentication and privacy preservation of SUs. For further improving the efficiency of channel allocation, the database periodically predicts and pre-allocates channels to BSs for the purpose of allocating channels to SUs locally. We perform the security verification using the automated protocol verifier tool Proverif to show that our scheme resists various attacks. Performance analysis reveals that our scheme significantly reduces computation and communication cost of SUs and incurs the shortest delay in channel allocation.

[1]  Zhu Han,et al.  Coalitional Graph Games for Popular Content Distribution in Cognitive Radio VANETs , 2013, IEEE Transactions on Vehicular Technology.

[2]  Bo Gao,et al.  $P^{2}$ -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System , 2017, IEEE Journal on Selected Areas in Communications.

[3]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[4]  Bo Gao,et al.  Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems , 2017, ICDCS.

[5]  Lei Zhu,et al.  Protocol to Access White-Space (PAWS) Databases , 2015, RFC.

[6]  Xuemin Shen,et al.  An SMDP-Based Resource Allocation in Vehicular Cloud Computing Systems , 2015, IEEE Transactions on Industrial Electronics.

[7]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[8]  Rong Jin,et al.  Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.

[9]  Xiong Li,et al.  An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks , 2016, Secur. Commun. Networks.

[10]  Xun Yi,et al.  An efficient privacy-preserving protocol for database-driven cognitive radio networks , 2019, Ad Hoc Networks.

[11]  Farookh Khadeer Hussain,et al.  Digital signature-based authentication framework in cognitive radio networks , 2012, MoMM '12.

[12]  Yasir Saleem,et al.  Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..

[13]  Zhiwei Wang,et al.  A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..

[14]  Maode Ma,et al.  An enhanced authentication protocol for WRANs in TV white space , 2015, Secur. Commun. Networks.

[15]  Adam Wolisz,et al.  Primary user behavior in cellular networks and implications for dynamic spectrum access , 2009, IEEE Communications Magazine.

[16]  Peng Cheng,et al.  Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[17]  Bin Fan,et al.  Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.

[18]  Mohamed Grissa,et al.  When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[19]  Ling Liu,et al.  From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.

[20]  Spiridon Bakiras,et al.  Optimizing privacy-preserving DSA for mobile clients , 2017, Ad Hoc Networks.

[21]  Qingqi Pei,et al.  Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks , 2016 .

[22]  Yuguang Fang,et al.  Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[23]  Li Xu,et al.  Privacy-preserving aggregation for cooperative spectrum sensing , 2019, J. Netw. Comput. Appl..

[24]  Youngju Cho,et al.  A practical group blind signature scheme for privacy protection in smart grid , 2020, J. Parallel Distributed Comput..

[25]  Mohammad S. Obaidat,et al.  Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[26]  Bo Gao,et al.  Incentivizing spectrum sensing in database-driven dynamic spectrum sharing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[27]  Kang G. Shin,et al.  Location Privacy Protection for Smartphone Users , 2014, CCS.

[28]  Mubashir Husain Rehmani,et al.  Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.

[29]  Ming Li,et al.  Privacy-Preserving Spectrum Query with Location Proofs in Database-Driven CRNs , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[30]  Jing Wang,et al.  Cognitive radio in 5G: a perspective on energy-spectral efficiency trade-off , 2014, IEEE Communications Magazine.

[31]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[32]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[33]  Jie Wu,et al.  Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds , 2016, IEEE Transactions on Parallel and Distributed Systems.

[34]  Mohamed Grissa,et al.  Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures , 2017, IEEE Transactions on Cognitive Communications and Networking.

[35]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[36]  Xu Li,et al.  A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks , 2018, ACISP.

[37]  Anjali Agarwal,et al.  A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks , 2017, IEEE Access.

[38]  Javad Akbari Torkestani,et al.  Mobility prediction in mobile wireless networks , 2012, J. Netw. Comput. Appl..

[39]  Xiong Li,et al.  An elliptic curve cryptography based lightweight authentication scheme for smart grid communication , 2018, Future Gener. Comput. Syst..

[40]  P. L. Montgomery Modular multiplication without trial division , 1985 .

[41]  Luigi Paura,et al.  Channel availability for mobile cognitive radio networks , 2015, J. Netw. Comput. Appl..