Visible to the public Location privacy preserving protocols in database-enabled cognitive radio networks

TitleLocation privacy preserving protocols in database-enabled cognitive radio networks
Publication TypeConference Paper
Year of Publication2017
AuthorsPetrov, D., Znati, T.
Conference Name2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
Date Publishedjun
ISBN Number978-1-5090-4372-9
KeywordsCognitive radio, Cognitive Radio Security, Communication system security, crowd sourced location privacy preserving scheme, data privacy, database enabled cognitive radio networks, database enabled wireless networks, Databases, geolocation database, location privacy preserving protocols, master device enabled location privacy preserving scheme, mobile devices, privacy, Protocols, pubcrawl, Resiliency, Schedules, secondary users, spectral availability, spectrum availability, spectrum utilization, SU, SU location privacy, telecommunication security, telecommunication traffic, traffic redirection, Wireless communication, wireless services, wireless spectrum, wireless users
Abstract

The exponential growth in the number of mobile devices, combined with the rapid demand for wireless services, has steadily stressed the wireless spectrum, calling for new techniques to improve spectrum utilization. A geo-location database has been proposed as a viable solution for wireless users to determine spectrum availability in cognitive radio networks. The protocol used by secondary users (SU) to request spectral availability for a specific location, time and duration, may reveal confidential information about these users. In this paper, we focus on SUs' location privacy in database-enabled wireless networks and propose a framework to address this threat. The basic tenet of the framework is obfuscation, whereby channel requests for valid locations are interwoven with requests for fake locations. Traffic redirection is also used to deliberately confuse potential query monitors from inferring users' location information. Within this framework, we propose two privacy-preserving schemes. The Master Device Enabled Location Privacy Preserving scheme utilizes trusted master devices to prevent leaking information of SUs' locations to attackers. The Crowd Sourced Location Privacy Preserving scheme builds a guided tour of randomly selected volunteers to deliver users channel availability queries and ensure location privacy. Security analysis and computational and communication overhead of these schemes are discussed.

URLhttps://ieeexplore.ieee.org/document/7986277
DOI10.1109/IWCMC.2017.7986277
Citation Keypetrov_location_2017