A practical privacy preserving protocol in database-driven cognitive radio networks

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cognitive radio technique is regarded as a promising way for allowing secondary users (SUs) to access available channels without introducing the interference to the primary users (PUs). However, database-driven cognitive radio networks (CRNs) are facing a series of security and privacy threats, especially the privacy breaches of SUs. To address this issue, this paper proposes a practical privacy-preserving protocol for database-driven CRNs that allows SUs to get the available channels in their vicinity efficiently while protecting their privacy. Our protocol takes advantage of modular square root technique to verify the identity of a SU and enables a legitimate SU to obtain the available channel without leaking its privacy. By prefetching channels, our protocol reduces the latency of obtaining available channels for SUs. Besides, the proposed protocol provides strong privacy preservation that the database cannot trace any SUs and get nothing about location or identity information of SUs, even the database colludes with all base stations. The results of security analysis and performance evaluation indicate the feasibility and practicality of the proposed privacy-preserving protocol.

Cite

CITATION STYLE

APA

Zeng, Y., Li, X., Yang, X., Xu, Q., & Wang, D. (2018). A practical privacy preserving protocol in database-driven cognitive radio networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10946 LNCS, pp. 634–648). Springer Verlag. https://doi.org/10.1007/978-3-319-93638-3_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free