2019
DOI: 10.1155/2019/9126376
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification

Abstract: The database-driven cognitive radio networks (CRNs) are regarded as a promising approach to utilizing limited spectrum resources in large-scale Internet of Things (IoT). However, database-driven CRNs face some security and privacy threats. Firstly, secondary users (SUs) should send identity and location information to the database (DB) to obtain a list of available channels, such that the curious DB might easily misuse and threaten the privacy of SUs. Secondly, malicious SUs might send fake location informatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…The database-driven cognitive radio networks are viewed as an approach to using limited spectrum resources in largescale IoT. Zhu et al [34] propose a lightweight privacypreserving location verification protocol for cognitive radio networks in which users don't need to provide their real identity and location information to the database and therefore, preventing the database from misusing the information.…”
Section: ) Cognitive Radio Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…The database-driven cognitive radio networks are viewed as an approach to using limited spectrum resources in largescale IoT. Zhu et al [34] propose a lightweight privacypreserving location verification protocol for cognitive radio networks in which users don't need to provide their real identity and location information to the database and therefore, preventing the database from misusing the information.…”
Section: ) Cognitive Radio Networkmentioning
confidence: 99%
“…(1) one global pseudonym per node based on global location information, connectivity information, device information; or (2) link-dependent pseudonyms in regard to each neighbor node based on a hash of linkdependent information (relative distance or relate clock drift with regard to a neighbour node). • Transaction Pseudonyms: This type of pseudonyms was leveraged the most by the surveyed papers [14], [19], [20], [29], [33], [34] for all identified application domains except for E-health. Both [29] & [20] use transaction pseudonyms for privacy-preserving authentication and authorisation of IoT devices.…”
Section: ) Classification Across Contextsmentioning
confidence: 99%
See 2 more Smart Citations
“…• TP: The TP has strong computing power and sufficient storage and is authorized by the FCC [24]. In our system, the TP is responsible for generating system parameters and registering SUs.…”
Section: Preliminaries a System Modelmentioning
confidence: 99%