Location privacy preserving protocols in database-enabled cognitive radio networks
Title | Location privacy preserving protocols in database-enabled cognitive radio networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Petrov, D., Znati, T. |
Conference Name | 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) |
Date Published | jun |
ISBN Number | 978-1-5090-4372-9 |
Keywords | Cognitive radio, Cognitive Radio Security, Communication system security, crowd sourced location privacy preserving scheme, data privacy, database enabled cognitive radio networks, database enabled wireless networks, Databases, geolocation database, location privacy preserving protocols, master device enabled location privacy preserving scheme, mobile devices, privacy, Protocols, pubcrawl, Resiliency, Schedules, secondary users, spectral availability, spectrum availability, spectrum utilization, SU, SU location privacy, telecommunication security, telecommunication traffic, traffic redirection, Wireless communication, wireless services, wireless spectrum, wireless users |
Abstract | The exponential growth in the number of mobile devices, combined with the rapid demand for wireless services, has steadily stressed the wireless spectrum, calling for new techniques to improve spectrum utilization. A geo-location database has been proposed as a viable solution for wireless users to determine spectrum availability in cognitive radio networks. The protocol used by secondary users (SU) to request spectral availability for a specific location, time and duration, may reveal confidential information about these users. In this paper, we focus on SUs' location privacy in database-enabled wireless networks and propose a framework to address this threat. The basic tenet of the framework is obfuscation, whereby channel requests for valid locations are interwoven with requests for fake locations. Traffic redirection is also used to deliberately confuse potential query monitors from inferring users' location information. Within this framework, we propose two privacy-preserving schemes. The Master Device Enabled Location Privacy Preserving scheme utilizes trusted master devices to prevent leaking information of SUs' locations to attackers. The Crowd Sourced Location Privacy Preserving scheme builds a guided tour of randomly selected volunteers to deliver users channel availability queries and ensure location privacy. Security analysis and computational and communication overhead of these schemes are discussed. |
URL | https://ieeexplore.ieee.org/document/7986277 |
DOI | 10.1109/IWCMC.2017.7986277 |
Citation Key | petrov_location_2017 |
- Resiliency
- wireless users
- wireless spectrum
- wireless services
- Wireless communication
- traffic redirection
- telecommunication traffic
- telecommunication security
- SU location privacy
- SU
- spectrum utilization
- spectrum availability
- spectral availability
- secondary users
- Schedules
- cognitive radio
- pubcrawl
- Protocols
- privacy
- mobile devices
- master device enabled location privacy preserving scheme
- location privacy preserving protocols
- geolocation database
- Databases
- database enabled wireless networks
- database enabled cognitive radio networks
- data privacy
- crowd sourced location privacy preserving scheme
- Communication system security
- Cognitive Radio Security