Secure and privacy-preserving location proof in database-driven cognitive radio networks

3Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The latest FCC ruling has enforced database-driven cognitive radio networks (CRNs), in which all secondary users (SUs) can query a database to obtain spectrum available information (SAI). Database-driven CRNs is regarded as a promising approach for dynamic and highly efficient spectrum management paradigm. However, as a typical location-based service (LBS), there is no verification of the queried location, which is very vulnerable to Location Spoofing Attack. This will introduce serious interference to the PUs. In this study, we identify a new kind of attack coined as location cheating attack. To thwart this attack, we propose a novel infrastructure-based approach to provide privacy-preserving location proof. With the proposed solution, the database can verify the locations without knowing the user’s accurate location. Experimental results show that our approach, besides providing location proofs effectively, can significantly improve the user’s location privacy.

Cite

CITATION STYLE

APA

Li, Y., Zhou, L., Zhu, H., & Sun, L. (2015). Secure and privacy-preserving location proof in database-driven cognitive radio networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9204, pp. 345–355). Springer Verlag. https://doi.org/10.1007/978-3-319-21837-3_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free