Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures

06/09/2018
by   Mohamed Grissa, et al.
0

In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks that protect secondary users' (SUs) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SUs' queries. This enables us to create a compact representation of DB that could be queried by SUs without having to share their location with DB, thus guaranteeing their location privacy. Our proposed schemes offer different cost-performance characteristics. Our first scheme relies on a simple yet powerful two-party protocol that achieves unconditional security with a plausible communication overhead by making DB send a compacted version of its content to SU which needs only to query this data structure to learn spectrum availability. Our second scheme achieves significantly lower communication and computation overhead for SUs, but requires an additional architectural entity which receives the compacted version of the database and fetches the spectrum availability information in lieu of SUs to alleviate the overhead on the latter. We show that our schemes are secure, and also demonstrate that they offer significant advantages over existing alternatives for various performance and/or security metrics.

READ FULL TEXT
research
06/04/2018

Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing

Cooperative spectrum sensing, despite its effectiveness in enabling dyna...
research
07/15/2018

An Efficient Technique for Protecting Location Privacy of Cooperative Spectrum Sensing Users

Cooperative spectrum sensing, despite its effectiveness in enabling dyna...
research
06/10/2018

LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks

Cognitive Radio Networks (CRNs) enable opportunistic access to the licen...
research
09/17/2020

Password similarity using probabilistic data structures

Passwords should be easy to remember, yet expiration policies mandate th...
research
11/10/2022

A rate-compatible solution to the set reconciliation problem

We consider a set reconciliation setting in which two parties hold simil...
research
07/06/2019

TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band

As part of its ongoing efforts to meet the increased spectrum demand, th...
research
03/26/2018

SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases

Genomic data are becoming increasingly valuable as we develop methods to...

Please sign up or login with your details

Forgot password? Click here to reset