A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks

Cognitive radio technique is regarded as a promising way for allowing secondary users (SUs) to access available channels without introducing the interference to the primary users (PUs). However, database-driven cognitive radio networks (CRNs) are facing a series of security and privacy threats, especially the privacy breaches of SUs. To address this issue, this paper proposes a practical privacy-preserving protocol for database-driven CRNs that allows SUs to get the available channels in their vicinity efficiently while protecting their privacy. Our protocol takes advantage of modular square root technique to verify the identity of a SU and enables a legitimate SU to obtain the available channel without leaking its privacy. By prefetching channels, our protocol reduces the latency of obtaining available channels for SUs. Besides, the proposed protocol provides strong privacy preservation that the database cannot trace any SUs and get nothing about location or identity information of SUs, even the database colludes with all base stations. The results of security analysis and performance evaluation indicate the feasibility and practicality of the proposed privacy-preserving protocol.

[1]  P. L. Montgomery Modular multiplication without trial division , 1985 .

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Zhenfu Cao,et al.  Location privacy leaking from spectrum utilization information in database-driven cognitive radio network , 2012, CCS '12.

[4]  Spiridon Bakiras,et al.  Optimizing privacy-preserving DSA for mobile clients , 2017, Ad Hoc Networks.

[5]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[6]  Elisa Bertino,et al.  Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.

[7]  Qingqi Pei,et al.  Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks , 2016 .

[8]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[9]  Chee Kheong Siew,et al.  A secure and efficient conference scheme for mobile communications , 2003, IEEE Trans. Veh. Technol..

[10]  Hua Sun,et al.  The Capacity of Private Information Retrieval , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[11]  Mohamed Grissa,et al.  Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures , 2017, IEEE Transactions on Cognitive Communications and Networking.

[12]  Ming Li,et al.  Privacy-Preserving Spectrum Query with Location Proofs in Database-Driven CRNs , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[13]  Stephen B. Wicker,et al.  The loss of location privacy in the cellular age , 2012, CACM.

[14]  Yi Li,et al.  Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).

[15]  Symeon Chatzinotas,et al.  Cognitive Radio Techniques Under Practical Imperfections: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[16]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[17]  Li Zhou,et al.  Sender-Jump Receiver-Wait: A Simple Blind Rendezvous Algorithm for Distributed Cognitive Radio Networks , 2018, IEEE Transactions on Mobile Computing.

[18]  Yifan Sun,et al.  Accessing Spectrum Databases Using Interference Alignment in Vehicular Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.