TY - GEN
T1 - Location privacy preserving protocols in database-enabled cognitive radio networks
AU - Petrov, Daniel
AU - Znati, Taieb
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/19
Y1 - 2017/7/19
N2 - The exponential growth in the number of mobile devices, combined with the rapid demand for wireless services, has steadily stressed the wireless spectrum, calling for new techniques to improve spectrum utilization. A geo-location database has been proposed as a viable solution for wireless users to determine spectrum availability in cognitive radio networks. The protocol used by secondary users (SU) to request spectral availability for a specific location, time and duration, may reveal confidential information about these users. In this paper, we focus on SUs' location privacy in database-enabled wireless networks and propose a framework to address this threat. The basic tenet of the framework is obfuscation, whereby channel requests for valid locations are interwoven with requests for fake locations. Traffic redirection is also used to deliberately confuse potential query monitors from inferring users' location information. Within this framework, we propose two privacy-preserving schemes. The Master Device Enabled Location Privacy Preserving scheme utilizes trusted master devices to prevent leaking information of SUs' locations to attackers. The Crowd Sourced Location Privacy Preserving scheme builds a guided tour of randomly selected volunteers to deliver users channel availability queries and ensure location privacy. Security analysis and computational and communication overhead of these schemes are discussed.
AB - The exponential growth in the number of mobile devices, combined with the rapid demand for wireless services, has steadily stressed the wireless spectrum, calling for new techniques to improve spectrum utilization. A geo-location database has been proposed as a viable solution for wireless users to determine spectrum availability in cognitive radio networks. The protocol used by secondary users (SU) to request spectral availability for a specific location, time and duration, may reveal confidential information about these users. In this paper, we focus on SUs' location privacy in database-enabled wireless networks and propose a framework to address this threat. The basic tenet of the framework is obfuscation, whereby channel requests for valid locations are interwoven with requests for fake locations. Traffic redirection is also used to deliberately confuse potential query monitors from inferring users' location information. Within this framework, we propose two privacy-preserving schemes. The Master Device Enabled Location Privacy Preserving scheme utilizes trusted master devices to prevent leaking information of SUs' locations to attackers. The Crowd Sourced Location Privacy Preserving scheme builds a guided tour of randomly selected volunteers to deliver users channel availability queries and ensure location privacy. Security analysis and computational and communication overhead of these schemes are discussed.
UR - http://www.scopus.com/inward/record.url?scp=85027879160&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85027879160&partnerID=8YFLogxK
U2 - 10.1109/IWCMC.2017.7986277
DO - 10.1109/IWCMC.2017.7986277
M3 - Conference contribution
AN - SCOPUS:85027879160
T3 - 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017
SP - 147
EP - 152
BT - 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 13th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2017
Y2 - 26 June 2017 through 30 June 2017
ER -