LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks

Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing. Despite its effectiveness in enabling CRN access, cooperative sensing suffers from location privacy threats, merely because the sensing reports that need to be exchanged among the SUs to perform the sensing task are highly correlated to the SUs' locations. In this paper, we develop a new Location Privacy for Optimal Sensing (LPOS) scheme that preserves the location privacy of SUs while achieving optimal sensing performance through voting-based sensing. In addition, LPOS is the only alternative among existing CRN location privacy preserving schemes (to the best of our knowledge) that ensures high privacy, achieves fault tolerance, and is robust against the highly dynamic and wireless nature of CRNs.

[1]  Ranjan K. Mallik,et al.  Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.

[2]  Ali Farhadi,et al.  Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks , 2011, NDSS.

[3]  Nathan Chenette,et al.  Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.

[4]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Bechir Hamdaoui,et al.  Delay performance modeling and analysis in clustered cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.

[7]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[8]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[9]  Bechir Hamdaoui Adaptive spectrum assessment for opportunistic access in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.

[10]  Florian Kerschbaum,et al.  Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.

[11]  Wen-Guey Tzeng,et al.  An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.

[12]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[13]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[14]  Essaid Sabir,et al.  Data traffic‐based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation , 2015, Int. J. Commun. Syst..

[15]  Yong Wang,et al.  The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks , 2006, 2006 IEEE International Conference on Communications.

[16]  Shuai Li,et al.  Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[17]  Shamik Sengupta,et al.  Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..

[18]  Qian Zhang,et al.  Location Privacy Preservation in Cognitive Radio Networks , 2014, SpringerBriefs in Computer Science.

[19]  Mohsen Guizani,et al.  Opportunistic Bandwidth Sharing Through Reinforcement Learning , 2010, IEEE Transactions on Vehicular Technology.

[20]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[21]  Rongxing Lu,et al.  PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications , 2015, Peer Peer Netw. Appl..

[22]  Bechir Hamdaoui,et al.  Efficient Objective Functions for Coordinated Learning in Large-Scale Distributed OSA Systems , 2013, IEEE Transactions on Mobile Computing.

[23]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[24]  Essaid Sabir,et al.  Green opportunistic access for cognitive radio networks: A minority game approach , 2014, 2014 IEEE International Conference on Communications (ICC).

[25]  Tao Jiang,et al.  Maximum channel throughput via cooperative spectrum sensing in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.