2017
DOI: 10.1109/tccn.2017.2702163
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures

Abstract: In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks (CRN s) that protect secondary users' (SU s) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DB s) and SU s' queries. This enables us to create a compact representation of DB that could be queried by SU s without having to share their location … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…In this way, they hide the actual locations of users with the support of a fast location query. In cognitive radio networks, geo-location database-driven methods are proposed to identify vacant frequency bands for the secondary users without harm the primary users [52] [53]. In these methods, the secondary users are equipped with GPS devices to query the geo-location database.…”
Section: Privacy Preservationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, they hide the actual locations of users with the support of a fast location query. In cognitive radio networks, geo-location database-driven methods are proposed to identify vacant frequency bands for the secondary users without harm the primary users [52] [53]. In these methods, the secondary users are equipped with GPS devices to query the geo-location database.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…net. [52] [53] Location anonymization CQ, CA LBSs [17] Location anonymization CQ, CA Biometrics [27] [26] Biometrics info. anonymization CQ, CA MSNs [56] Interested topics anonymization CQ, CA Record linkage [55] Entry anonymization CQ, CA CDRs [57] Record anonymization CQ, CA Smart grid [63] Representing CRL list CQ, SS BF is a popular choice in designing privacy-friendly solutions.…”
Section: Scenariosmentioning
confidence: 99%
“…PIR technology can protect the privacy of SUs' locations well, but it also causes high communication and computational overheads. Grissa et al [21] proposed a cuckoo filter-based protocol: the DB uses a cuckoo filter to compress the spectrum information and send it to the query server. The SUs then obtain the available channels through the query server.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we evaluate the performance of our proposed protocol, by showing its computation and communication costs, and compare them with the protocols proposed by Grissa et al [21] and Gao et al [20]. All experiments have been conducted on a 64-bit computer with an Intel Core i7 CPU of 2.5 GHz and 16G memory.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Furthermore, it has been shown in a recent study led by Sprint and Technicolor [25] that anonymization based techniques are not efficient in providing location privacy guarantees, and may even leak some location information. Grissa et al [21], [54] propose an information theoretic approach which could be considered as a variant of the trivial PIR solution. They achieve this by using setmembership probabilistic data structures/filters to compress the content of the database and send it to SU which then needs to try several combinations of channels and transmission parameters to check their existence in the data structure.…”
Section: Related Workmentioning
confidence: 99%