Location Privacy in Cognitive Radio Networks: A Survey

Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity problem. Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. Knowing that their whereabouts may be exposed can discourage users from joining and participating in the CRNs, thereby potentially hindering the adoption and deployment of this technology in future generation networks. The location information leakage issue in the CRN context has recently started to gain attention from the research community due to its importance, and several research efforts have been made to tackle it. However, to the best of our knowledge, none of these works have tried to identify the vulnerabilities that are behind this issue or discuss the approaches that could be deployed to prevent it. In this paper, we try to fill this gap by providing a comprehensive survey that investigates the various location privacy risks and threats that may arise from the different components of this CRN technology, and explores the different privacy attacks and countermeasure solutions that have been proposed in the literature to cope with this location privacy issue. We also discuss some open research problems, related to this issue, that need to be overcome by the research community to take advantage of the benefits of this key CRN technology without having to sacrifice the users’ privacy.

[1]  Sudharman K. Jayaweera,et al.  A Survey on Machine-Learning Techniques in Cognitive Radios , 2013, IEEE Communications Surveys & Tutorials.

[2]  Ying-Chang Liang,et al.  Joint power control and beamforming for cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.

[3]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[4]  Jacques Palicot,et al.  Cyclostatilonarilty-Based Test for Detection of Vacant Frequency Bands , 2006, 2006 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[5]  Jun Zhao,et al.  Distributed coordination in dynamic spectrum allocation networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[6]  Bechir Hamdaoui,et al.  Achieving optimal elastic traffic rewards in dynamic multichannel access , 2011, 2011 International Conference on High Performance Computing & Simulation.

[7]  Brent Waters,et al.  Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[8]  Dingde Jiang,et al.  An effective dynamic spectrum access algorithm for multi-hop cognitive wireless networks , 2015, Comput. Networks.

[9]  Qingqi Pei,et al.  Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks , 2016 .

[10]  Paramvir Bahl,et al.  SenseLess: A database-driven white spaces network , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[11]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[12]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[13]  Syed Ali Jafar,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Throughput Potential of Cognitive Radio: A Theoretical Perspective , 2007, IEEE Communications Magazine.

[14]  Özgür B. Akan,et al.  Cognitive radio sensor networks , 2009, IEEE Network.

[15]  Ian F. Akyildiz,et al.  Spectrum management in cognitive radio ad hoc networks , 2009, IEEE Network.

[16]  Divyakant Agrawal,et al.  Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.

[17]  Benny Pinkas,et al.  Oblivious RAM Revisited , 2010, CRYPTO.

[18]  Athanasios V. Vasilakos,et al.  TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[19]  Ali Farhadi,et al.  Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks , 2011, NDSS.

[20]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[21]  A. Agrawala,et al.  WSN16-5: Distributed Formation of Overlapping Multi-hop Clusters in Wireless Sensor Networks , 2006, IEEE Globecom 2006.

[22]  Elaine Shi,et al.  Towards Practical Oblivious RAM , 2011, NDSS.

[23]  Mohsen Guizani,et al.  Adaptive service function for system reward maximization under elastic traffic model , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[24]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[25]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[26]  Erik D. Demaine,et al.  Anchor-Free Distributed Localization in Sensor Networks , 2003 .

[27]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[28]  Spiridon Bakiras,et al.  Efficient Location Privacy for Moving Clients in Database-Driven Dynamic Spectrum Access , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[29]  Konstantinos Psounis,et al.  Can the privacy of primary networks in shared spectrum be protected? , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[30]  Bechir Hamdaoui,et al.  Enabling opportunistic and dynamic spectrum access through learning techniques , 2011, Wirel. Commun. Mob. Comput..

[31]  Amir Ghasemi,et al.  Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.

[32]  Xinbing Wang,et al.  Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[33]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[34]  Bin Fan,et al.  Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.

[35]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[36]  Stefan Mangold,et al.  Managing location privacy in cellular networks with femtocell deployments , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.

[37]  Mauro Conti,et al.  Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[38]  Georgios B. Giannakis,et al.  A Wavelet Approach to Wideband Spectrum Sensing for Cognitive Radios , 2006, 2006 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[39]  Michele Zorzi,et al.  A Neural Network Based Cognitive Controller for Dynamic Channel Selection , 2009, 2009 IEEE International Conference on Communications.

[40]  Guihai Chen,et al.  A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets , 2016, IEEE/ACM Transactions on Networking.

[41]  Jung Hee Cheon,et al.  Fully Homomophic Encryption over the Integers Revisited , 2015, EUROCRYPT.

[42]  Marko Höyhtyä,et al.  Spectrum Occupancy Measurements: A Survey and Use of Interference Maps , 2016, IEEE Communications Surveys & Tutorials.

[43]  Florian Kerschbaum,et al.  Searchable Encryption with Secure and Efficient Updates , 2014, CCS.

[44]  Mohsen Guizani,et al.  Optimal power allocation for smart-grid powered point-to-point cognitive radio system , 2014, 2014 IEEE Computers, Communications and IT Applications Conference.

[45]  Long Bao Le,et al.  Channel Assignment With Access Contention Resolution for Cognitive Radio Networks , 2012, IEEE Transactions on Vehicular Technology.

[46]  Rui Zhang,et al.  SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing , 2015, IEEE Transactions on Wireless Communications.

[47]  Chi Zhang,et al.  Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[48]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.

[49]  Rong Peng,et al.  Angle of Arrival Localization for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[50]  Mohsen Guizani,et al.  Power allocation analysis for dynamic power utility in cognitive radio systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[51]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[52]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[53]  Yasir Saleem,et al.  Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..

[54]  Kok-Lim Alvin Yau,et al.  A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[55]  Adam Wolisz,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Frequency Hopping Communities for Efficient IEEE 802.22 Operation , 2007, IEEE Communications Magazine.

[56]  Martin Reisslein,et al.  White space , 2016 .

[57]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[58]  Peng Cheng,et al.  Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[59]  Qian Zhang,et al.  Privacy-Preserving Collaborative Spectrum Sensing With Multiple Service Providers , 2015, IEEE Transactions on Wireless Communications.

[60]  Tuna Tugcu,et al.  Radio environment map as enabler for practical cognitive radio networks , 2013, IEEE Communications Magazine.

[61]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[62]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[63]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[64]  Ben Y. Zhao,et al.  Utilization and fairness in spectrum assignment for opportunistic spectrum access , 2006, Mob. Networks Appl..

[65]  Adrian Perrig,et al.  Using Clustering Information for Sensor Network Localization , 2005, DCOSS.

[66]  Xiaocong Jin,et al.  Privacy-preserving crowdsourced spectrum sensing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[67]  Björn E. Ottersten,et al.  Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.

[68]  Bechir Hamdaoui,et al.  Distributed resource and service management for large-scale dynamic spectrum access systems through coordinated learning , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[69]  Athanasios V. Vasilakos,et al.  Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[70]  Bechir Hamdaoui Adaptive spectrum assessment for opportunistic access in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.

[71]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[72]  Marco Di Felice,et al.  SEARCH: A routing protocol for mobile cognitive radio ad-Hoc networks , 2009, 2009 IEEE Sarnoff Symposium.

[73]  Ioannis Lambadaris,et al.  Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[74]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[75]  Mohsen Guizani,et al.  Large-scale cognitive cellular systems: resource management overview , 2015, IEEE Communications Magazine.

[76]  Hae-Young Bae,et al.  Location Positioning and Privacy Preservation Methods in Location-based Service , 2015 .

[77]  Hugo Krawczyk,et al.  Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.

[78]  Martin Reisslein,et al.  Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols , 2016, IEEE Communications Surveys & Tutorials.

[79]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[80]  Christos Faloutsos,et al.  On packing R-trees , 1993, CIKM '93.

[81]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[82]  Mohsen Guizani,et al.  Implementation and Analysis of Reward Functions Under Different Traffic Models for Distributed DSA Systems , 2015, IEEE Transactions on Wireless Communications.

[83]  Martin Vossiek,et al.  Wireless local positioning - concepts, solutions, applications , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[84]  Jorge Guajardo,et al.  Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware , 2015, SAC.

[85]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[86]  Moshe T. Masonta,et al.  Spectrum Decision in Cognitive Radio Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[87]  Mohsen Guizani,et al.  Resources allocation for large-scale dynamic spectrum access system using particle filtering , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[88]  G. Ganesan,et al.  Cooperative spectrum sensing in cognitive radio networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[89]  He Chen,et al.  Spectrum handoff scheme based on recommended channel sensing sequence , 2013, China Communications.

[90]  Chung-Ju Chang,et al.  Modeling and Analysis for Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.

[91]  Vipin Kumar,et al.  Conflict Graph Based Channel Allocation in Cognitive Radio Networks , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW).

[92]  Wei Cheng,et al.  Spectrum prediction in cognitive radio networks , 2013, IEEE Wireless Communications.

[93]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[94]  Victor C. M. Leung,et al.  A Coalition Formation Game for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks with Multiple Channels , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[95]  H. Vincent Poor,et al.  Collaborative Cyclostationary Spectrum Sensing for Cognitive Radio Systems , 2009, IEEE Transactions on Signal Processing.

[96]  Martin Haenggi,et al.  Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[97]  Sharifah Kamilah Syed Yusof,et al.  Proactive integrated handoff management in cognitive radio mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..

[98]  Symeon Chatzinotas,et al.  Application of Compressive Sensing in Cognitive Radio Communications: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[99]  Cristina Comaniciu,et al.  A Game Theoretic Approach to Interference Management in Cognitive Networks , 2007 .

[100]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[101]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[102]  Yi-Ming Chen,et al.  Safe Distance Based Location Privacy in Vehicular Networks , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[103]  Anant Sahai,et al.  Some Fundamental Limits on Cognitive Radio , 2004 .

[104]  Ying Zhang,et al.  Localization from mere connectivity , 2003, MobiHoc '03.

[105]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.

[106]  Ben Y. Zhao,et al.  Towards commoditized real-time spectrum monitoring , 2014, HotWireless@MobiCom.

[107]  Brian D. O. Anderson,et al.  Path loss exponent estimation for wireless sensor network localization , 2007, Comput. Networks.

[108]  Haythem Bany Salameh,et al.  Throughput-oriented channel assignment for opportunistic spectrum access networks , 2011, Math. Comput. Model..

[109]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[110]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .

[111]  Rong Du,et al.  Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[112]  Ossama Younis,et al.  MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees , 2009, IEEE Transactions on Mobile Computing.

[113]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[114]  Xuemin Shen,et al.  HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.

[115]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .

[116]  Ian F. Akyildiz,et al.  Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks , 2012, IEEE Transactions on Mobile Computing.

[117]  Dong In Kim,et al.  Joint rate and power allocation for cognitive radios in dynamic spectrum access environment , 2008, IEEE Transactions on Wireless Communications.

[118]  A. Wolisz,et al.  Reliable link maintenance in cognitive radio systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[119]  Lei Tang,et al.  Privacy-preserving secure relative localization in vehicular networks , 2008, Secur. Commun. Networks.

[120]  R. Michael Buehrer,et al.  Handbook of Position Location: Theory, Practice and Advances , 2011 .

[121]  Lei Yang,et al.  Privacy-Preserving Database Assisted Spectrum Access: A Socially-Aware Distributed Learning Approach , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[122]  Ilyong Chung,et al.  Spectrum mobility in cognitive radio networks , 2012, IEEE Communications Magazine.

[123]  Moe Z. Win,et al.  Cooperative Localization in Wireless Networks , 2009, Proceedings of the IEEE.

[124]  Ekram Hossain,et al.  Cellular OFDMA Cognitive Radio Networks: Generalized Spectral Footprint Minimization , 2015, IEEE Transactions on Vehicular Technology.

[125]  Jeffrey H. Reed,et al.  Network Support: The Radio Environment Map , 2009 .

[126]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[127]  Mohsen Guizani,et al.  Distributed Learning-Based Cross-Layer Technique for Energy-Efficient Multicarrier Dynamic Spectrum Access With Adaptive Power Allocation , 2016, IEEE Transactions on Wireless Communications.

[128]  Ying-Chang Liang,et al.  Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[129]  Wahidah Hashim,et al.  Clustering algorithms for Cognitive Radio networks: A survey , 2014, J. Netw. Comput. Appl..

[130]  Zhu Han,et al.  Joint Pricing and Load Balancing for Cognitive Spectrum Access: Non-Cooperation Versus Cooperation , 2015, IEEE Journal on Selected Areas in Communications.

[131]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[132]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[133]  Naima Kaabouch,et al.  A survey on compressive sensing techniques for cognitive radio networks , 2016, Phys. Commun..

[134]  Yaling Yang,et al.  Location spoofing attack and its countermeasures in database-driven cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[135]  Andris Ambainis,et al.  On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .

[136]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[137]  Li-Chun Wang,et al.  Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[138]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[139]  Amy C. Malady,et al.  Clustering methods for distributed spectrum sensing in cognitive radio systems , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[140]  Lei Ding,et al.  Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[141]  Mohsen Guizani,et al.  Distributed Fair Spectrum Assignment for Large-Scale Wireless DSA Networks , 2015, CrownCom.

[142]  Sheng Zhong,et al.  Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks , 2015, MSWiM.

[143]  Mohsen Guizani,et al.  Maximizing Secondary-User Satisfaction in Large-Scale DSA Systems Through Distributed Team Cooperation , 2012, IEEE Transactions on Wireless Communications.

[144]  Alhussein A. Abouzeid,et al.  Auction-based spectrum sharing in cognitive radio networks with heterogeneous channels , 2013, 2013 Information Theory and Applications Workshop (ITA).

[145]  B. Scheers,et al.  Data fusion schemes for cooperative spectrum sensing in cognitive radio networks , 2012, 2012 Military Communications and Information Systems Conference (MCC).

[146]  Erik D. Demaine,et al.  Poster abstract: anchor-free distributed localization in sensor networks , 2003, SenSys '03.

[147]  Andy Parrish,et al.  Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups , 2010, ISC.

[148]  Balasubramaniam Natarajan,et al.  Modeling and Forecasting Secondary User Activity in Cognitive Radio Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[149]  Saswati Sarkar,et al.  Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks , 2010, IEEE/ACM Transactions on Networking.

[150]  Andrea Giorgetti,et al.  Cognitive Radio Techniques: Spectrum Sensing, Interference Mitigation, and Localization , 2012 .

[151]  N. Hoven,et al.  Power scaling for cognitive radio , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.

[152]  Yunfei Chen,et al.  A Survey of Measurement-Based Spectrum Occupancy Modeling for Cognitive Radios , 2016, IEEE Communications Surveys & Tutorials.

[153]  Mubashir Husain Rehmani,et al.  A Survey of Channel Bonding for Wireless Networks and Guidelines of Channel Bonding for Futuristic Cognitive Radio Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.

[154]  Sudharman K. Jayaweera,et al.  Optimal Channel and Power Allocation for Secondary Users in Cooperative Cognitive Radio Networks - (Invited Paper) , 2010, MOBILIGHT.

[155]  Spiridon Bakiras,et al.  Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access , 2015, Int. J. Netw. Secur..

[156]  Ying-Chang Liang,et al.  Maximizing Spectrum Utilization of Cognitive Radio Networks Using Channel Allocation and Power Control , 2006, IEEE Vehicular Technology Conference.

[157]  Carl A. Gunter,et al.  Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[158]  Mohamed Grissa,et al.  Cuckoo filter-based location-privacy preservation in database-driven cognitive radio networks , 2015, 2015 World Symposium on Computer Networks and Information Security (WSCNIS).

[159]  Jiang Xie,et al.  ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel , 2012, IEEE Transactions on Mobile Computing.

[160]  Yan Zhang,et al.  Economic Approaches for Cognitive Radio Networks: A Survey , 2011, Wirel. Pers. Commun..

[161]  Shiwen Mao,et al.  Overhead Analysis for Radio Environment Mapenabled Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[162]  Carl A. Gunter,et al.  Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.

[163]  Fabrizio Granelli,et al.  Optimizing the K-out-of-N rule for cooperative spectrum sensing in cognitive radio networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[164]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[165]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[166]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[167]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[168]  Jie Gao,et al.  Connectivity-Based Localization of Large Scale Sensor Networks with Complex Shape , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[169]  Yi Li,et al.  Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).

[170]  Bechir Hamdaoui,et al.  Traffic and Interference Aware Scheduling for Multiradio Multichannel Wireless Mesh Networks , 2011, IEEE Transactions on Vehicular Technology.

[171]  Álvaro Araujo,et al.  Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.

[172]  Jiming Chen,et al.  Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks , 2012, IEEE Wireless Communications.

[173]  Jeffrey H. Reed,et al.  Chapter 11 – Network Support: The Radio Environment Map , 2006 .

[174]  Lili Yang,et al.  A Historical-Information-Based Algorithm in Dynamic Spectrum Allocation , 2009, 2009 International Conference on Communication Software and Networks.

[175]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.

[176]  Craig Gentry,et al.  Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.

[177]  Deborah Estrin,et al.  Localization in sensor networks , 2004 .

[178]  Timothy J. O'Shea,et al.  Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.

[179]  Mohsen Guizani,et al.  Radio and Medium Access Contention Aware Routing for Lifetime Maximization in Multichannel Sensor Networks , 2012, IEEE Transactions on Wireless Communications.

[180]  Mohamed Grissa,et al.  An efficient technique for protecting location privacy of cooperative spectrum sensing users , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[181]  Sherali Zeadally,et al.  Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey , 2013, IEEE Communications Surveys & Tutorials.

[182]  Özgür B. Akan,et al.  Spectrum-aware and cognitive sensor networks for smart grid applications , 2012, IEEE Communications Magazine.

[183]  Jianfeng Wang,et al.  Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.

[184]  Mohsen Guizani,et al.  Distributed dynamic spectrum access with adaptive power allocation: Energy efficiency and cross-layer awareness , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[185]  Paramvir Bahl,et al.  White space networking with wi-fi like connectivity , 2009, SIGCOMM '09.

[186]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[187]  Bechir Hamdaoui,et al.  Aligning Spectrum-User Objectives for Maximum Inelastic-Traffic Reward , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[188]  Cristina Comaniciu,et al.  Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[189]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2009, MSWiM '09.

[190]  John G. Proakis Intersymbol Interference in Digital Communication Systems , 2003 .

[191]  Frederik Vercauteren,et al.  Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.

[192]  Dusit Niyato,et al.  Spectrum trading in cognitive radio networks: A market-equilibrium-based approach , 2008, IEEE Wirel. Commun..

[193]  David E. Culler,et al.  A practical evaluation of radio signal strength for ranging-based localization , 2007, MOCO.

[194]  Ossama Younis,et al.  Distance- and Traffic-Aware Channel Assignment in Cognitive Radio Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[195]  Cyrus Shahabi,et al.  Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services , 2009, Privacy in Location-Based Applications.

[196]  Prathima Agrawal,et al.  Synchronized MAC Protocol For Multi-Hop Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.

[197]  Ekram Hossain,et al.  Resource allocation for spectrum underlay in cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.

[198]  Bechir Hamdaoui,et al.  Efficient Objective Functions for Coordinated Learning in Large-Scale Distributed OSA Systems , 2013, IEEE Transactions on Mobile Computing.

[199]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[200]  Hong Jiang,et al.  Modeling of Learning Inference and Decision-Making Engine in Cognitive Radio , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[201]  Erik G. Larsson,et al.  Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.

[202]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[203]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[204]  Won-Yeol Lee,et al.  A Spectrum Decision Framework for Cognitive Radio Networks , 2011, IEEE Transactions on Mobile Computing.

[205]  Qin Xin,et al.  Joint QoS-aware admission control, channel assignment, and power allocation for cognitive radio cellular networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[206]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[207]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[208]  Zhu Han,et al.  Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks , 2009, IEEE INFOCOM 2009.

[209]  Hyundong Shin,et al.  Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.

[210]  Jie Gao,et al.  Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement Method , 2009, IEEE INFOCOM 2009.

[211]  Azzedine Boukerche,et al.  Localization systems for wireless sensor networks , 2007, IEEE Wireless Communications.

[212]  Alex X. Liu,et al.  SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[213]  Shuai Li,et al.  Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[214]  Mohamed Grissa,et al.  Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing , 2017, IEEE Transactions on Information Forensics and Security.

[215]  Qiang Ni,et al.  Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..

[216]  Hui Zang,et al.  Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.

[217]  Qihui Wu,et al.  Decentralized sensor selection for cooperative spectrum sensing based on unsupervised learning , 2012, 2012 IEEE International Conference on Communications (ICC).

[218]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[219]  Mohsen Guizani,et al.  Dynamic power pricing using distributed resource allocation for large-scale DSA systems , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[220]  Gaurav S. Sukhatme,et al.  Robomote: enabling mobility in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[221]  M. H. Rehmani,et al.  White space : De fi nitional perspectives and their role in exploiting spectrum opportunities , 2016 .

[222]  Mohamed Grissa,et al.  LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[223]  Shamik Sengupta,et al.  Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..

[224]  Jonathan Katz,et al.  Limits of Computational Differential Privacy in the Client/Server Setting , 2011, TCC.

[225]  Ying Zhang,et al.  Localization from connectivity in sensor networks , 2004, IEEE Transactions on Parallel and Distributed Systems.

[226]  Jan M. Rabaey,et al.  Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.

[227]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[228]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[229]  Jiandong Li,et al.  Optimal Power Control for Cognitive Radio Networks Under Coupled Interference Constraints: A Cooperative Game-Theoretic Perspective , 2010, IEEE Transactions on Vehicular Technology.

[230]  Nitesh Saxena,et al.  On the limitations of query obfuscation techniques for location privacy , 2011, UbiComp '11.

[231]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[232]  Husheng Li,et al.  Multi-agent Q-learning of channel selection in multi-user cognitive radio systems: A two by two case , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[233]  Suman Nath,et al.  Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.

[234]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[235]  Behnam Bahrak,et al.  Security of Spectrum Learning in Cognitive Radios , 2013, ArXiv.

[236]  Fumiyuki Adachi,et al.  Modeling and Analysis for Reactive-Decision Spectrum Handoff in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[237]  Maria-Gabriella Di Benedetto,et al.  A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.

[238]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[239]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[240]  Silvio Micali,et al.  Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.

[241]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[242]  Andreas Heinemann,et al.  Survey on Location Privacy in Pervasive Computing , 2005 .

[243]  Zhu Han,et al.  Optimal Pricing for Duopoly in Cognitive Radio Networks: Cooperate or not Cooperate? , 2014, IEEE Transactions on Wireless Communications.

[244]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.

[245]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[246]  Arun Prakash,et al.  Spectrum handoff in cognitive radio networks: A classification and comprehensive survey , 2016, J. Netw. Comput. Appl..

[247]  Elaine Shi,et al.  Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..

[248]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[249]  Behnam Bahrak,et al.  Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[250]  Bechir Hamdaoui,et al.  Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \osa Networks , 2012, IEEE Transactions on Network and Service Management.

[251]  Biing-Hwang Juang,et al.  Signal Processing in Cognitive Radio , 2009, Proceedings of the IEEE.

[252]  Lijun Qian,et al.  Power Control for Cognitive Radio Ad Hoc Networks , 2007, 2007 15th IEEE Workshop on Local & Metropolitan Area Networks.