Access the full text.
Sign up today, get DeepDyve free for 14 days.
Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, J. Hubaux, I. Aad (2014)
Privacy-Preserving Optimal Meeting Location Determination on Mobile DevicesIEEE Transactions on Information Forensics and Security, 9
Liang Xiao, Qiben Yan, W. Lou, Guiquan Chen, Y. Hou (2013)
Proximity-Based Security Techniques for Mobile Users in Wireless NetworksIEEE Transactions on Information Forensics and Security, 8
(2008)
Privacy-preserving data mining, models and algorithms, ch.2: A general survey of privacy-preserving data mining models and algorithms
B Gedik, L Liu (2008)
Protecting location privacy with personalized k-anonymity: Architecture and algorithmsCommunications of the ACM, 7
L. Sweeney (2002)
k-Anonymity: A Model for Protecting PrivacyInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
T Zhu, P Xiong, G Li, W Zhou (2014)
Correlation differential privacy: Hiding information in non-IID data setCommunications of the ACM, 10
Vincent Chen, S. Das, Lei Zhu, John Malyar, P. McCann (2015)
Protocol to Access White-Space (PAWS) DatabasesRFC, 7545
Pascal Paillier (1999)
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
(2006)
Differential privacy. InInternational conference on automata, languages and programming
P. Skvortsov, Frank Dürr, K. Rothermel (2011)
Position sharing for location privacy in non-trusted systems2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)
B. Gedik, Ling Liu (2008)
Protecting Location Privacy with Personalized k-Anonymity: Architecture and AlgorithmsIEEE Transactions on Mobile Computing, 7
R Rivest, A Shamir, L Adleman (1978)
A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 21
Technical and operational requirement for the possible operation of cognitive radio system in the white space of the frequency band 470-790 MHz
(2007)
Iran, and is a member of Information Systems and Security Lab (ISSL) at Sharif University of Technology. Her research interests include network security
Third order and memorandum opinion and order, in the matter of unlicensed operation in the TV broadcast bands, additional spectrum for unlicensed devices below 900 MHz and in the 3 GHz band
Tianqing Zhu, P. Xiong, Gang Li, Wanlei Zhou (2015)
Correlated Differential Privacy: Hiding Information in Non-IID Data SetIEEE Transactions on Information Forensics and Security, 10
B. Bloom (1970)
Space/time trade-offs in hash coding with allowable errorsCommun. ACM, 13
Jonathan Adelstein (2010)
Statement of commissioner Jonathan S. Adelstein, Re: Unlicensed operation in the TV broadcast bands; second report and order and memorandum opinion and order, ET Docket no. 04-186
(2015)
Efficient location prtivacy for moving clients in database-driven dynamic spectrum access
Xinxin Zhao, Lingjun Li, G. Xue (2014)
RemindU: A secure and efficient location based reminder system2014 IEEE International Conference on Communications (ICC)
Stephen Johnson, Michael O'Dell, Lori Grob, Eric Allman (1992)
USENIX Association
Zhaoyu Gao, Haojin Zhu, Shuai Li, Suguo Du, Xu Li (2012)
Security and privacy of collaborative spectrum sensing in cognitive radio networksIEEE Wireless Communications, 19
B. Bahrak, Sudeep Bhattarai, A. Ullah, J. Park, Jeffrey Reed, David Gurney (2014)
Protecting the primary users' operational privacy in spectrum sharing2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)
Petition for reconsideration of proposed FCC white space rules
Zhaoyu Gao, Haojin Zhu, Yao Liu, M. Li, Z. Cao (2013)
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures2013 Proceedings IEEE INFOCOM
(1977)
He received the Ph.D. degree in Digital Communication Systems from University of Manchester in 1997
Ge Zhong, I. Goldberg, U. Hengartner (2007)
Louis, Lester and Pierre: Three Protocols for Location Privacy
Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov (2014)
Preserving secondary users' privacy in cognitive radio networksIEEE INFOCOM 2014 - IEEE Conference on Computer Communications
(2014)
Her main research interests include security in wireless communication systems specially in RFID and sensor network systems, localization algorithms and location privacy
L Xiao, Q Yan, W Lou, G Chen, YT Hou (2013)
Proximity-based security techniques for mobile users in wireless networksCommunications of the ACM, 8
A. Mancuso, B. Patil, Mancuso
Internet Engineering Task Force (ietf) Protocol to Access White-space (paws) Databases: Use Cases and Requirements
White Space Database Administrators Guide
A. Solanas, A. Martínez-Ballesté (2007)
Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism
Sheng Liu, Haojin Zhu, Rong Du, Cailian Chen, X. Guan (2013)
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network2013 IEEE 33rd International Conference on Distributed Computing Systems
R. Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, J. Hubaux (2014)
Hiding in the Mobile Crowd: LocationPrivacy through CollaborationIEEE Transactions on Dependable and Secure Computing, 11
Jaydip Sen (2014)
Theory And Practice Of Cryptography And Network Security Protocols And Technologies
Haidê Cristina, Dutra Souza, Laís Vitória, S. Souza, L. Pereira, L. Bernardino (2018)
ProtectionEncyclopedia of the UN Sustainable Development Goals
The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing $$(\hbox {L-PDS}^2)$$ ( L-PDS 2 ) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two specific algorithms as implementations of $$\hbox {L-PDS}^2$$ L-PDS 2 protocol. Our analytical results for the privacy protection capability of $$\hbox {L-PDS}^2$$ L-PDS 2 protocol prove that it provides location privacy preservation with very high probability for users of both networks. Moreover, the simulation results show that the proposed algorithms are efficient in terms of run time.
Wireless Personal Communications – Springer Journals
Published: Feb 13, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.