Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification

The database-driven cognitive radio networks (CRNs) are regarded as a promising approach to utilizing limited spectrum resources in large-scale Internet of Things (IoT). However, database-driven CRNs face some security and privacy threats. Firstly, secondary users (SUs) should send identity and loca...

Full description

Bibliographic Details
Main Authors: Rui Zhu, Li Xu, Yali Zeng, Xun Yi
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2019/9126376
id doaj-26c097cde5b445978a3a546aba4c59db
record_format Article
spelling doaj-26c097cde5b445978a3a546aba4c59db2020-11-25T01:17:09ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/91263769126376Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location VerificationRui Zhu0Li Xu1Yali Zeng2Xun Yi3Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, ChinaFujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, ChinaFujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, ChinaThe School of Science, RMIT University, AustraliaThe database-driven cognitive radio networks (CRNs) are regarded as a promising approach to utilizing limited spectrum resources in large-scale Internet of Things (IoT). However, database-driven CRNs face some security and privacy threats. Firstly, secondary users (SUs) should send identity and location information to the database (DB) to obtain a list of available channels, such that the curious DB might easily misuse and threaten the privacy of SUs. Secondly, malicious SUs might send fake location information to the DB in order to occupy channels with better quantity in advance and so gain benefits. This might also cause serious interference to primary users (PUs). In this paper, we propose a lightweight privacy-preserving location verification protocol to protect the identity and location privacy of each SU and to verify the location of SUs. In the proposed protocol, the SU does not need to provide location information to request an available channel from the DB. Therefore, the DB cannot get the location information of any SU. In the proposed protocol, the base station (BS) selects some SUs as witnesses to generate location proofs for each other in a distributed fashion. This new witness selection mechanism makes the proposed protocol reliable when a malicious SU generates fake location information to cheat the BS and also prevents SU-Witness collusion attacks. The results also show that the proposed protocol can provide strong privacy preservation for SUs and can effectively verify the location of the SUs. The security analysis shows that the proposed protocol can resist various types of attacks. Moreover, compared with previous protocols, the proposed protocol is lightweight because it relies on symmetric cryptography and it is unaffected by the area covered by the DB.http://dx.doi.org/10.1155/2019/9126376
collection DOAJ
language English
format Article
sources DOAJ
author Rui Zhu
Li Xu
Yali Zeng
Xun Yi
spellingShingle Rui Zhu
Li Xu
Yali Zeng
Xun Yi
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
Security and Communication Networks
author_facet Rui Zhu
Li Xu
Yali Zeng
Xun Yi
author_sort Rui Zhu
title Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
title_short Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
title_full Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
title_fullStr Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
title_full_unstemmed Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
title_sort lightweight privacy preservation for securing large-scale database-driven cognitive radio networks with location verification
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2019-01-01
description The database-driven cognitive radio networks (CRNs) are regarded as a promising approach to utilizing limited spectrum resources in large-scale Internet of Things (IoT). However, database-driven CRNs face some security and privacy threats. Firstly, secondary users (SUs) should send identity and location information to the database (DB) to obtain a list of available channels, such that the curious DB might easily misuse and threaten the privacy of SUs. Secondly, malicious SUs might send fake location information to the DB in order to occupy channels with better quantity in advance and so gain benefits. This might also cause serious interference to primary users (PUs). In this paper, we propose a lightweight privacy-preserving location verification protocol to protect the identity and location privacy of each SU and to verify the location of SUs. In the proposed protocol, the SU does not need to provide location information to request an available channel from the DB. Therefore, the DB cannot get the location information of any SU. In the proposed protocol, the base station (BS) selects some SUs as witnesses to generate location proofs for each other in a distributed fashion. This new witness selection mechanism makes the proposed protocol reliable when a malicious SU generates fake location information to cheat the BS and also prevents SU-Witness collusion attacks. The results also show that the proposed protocol can provide strong privacy preservation for SUs and can effectively verify the location of the SUs. The security analysis shows that the proposed protocol can resist various types of attacks. Moreover, compared with previous protocols, the proposed protocol is lightweight because it relies on symmetric cryptography and it is unaffected by the area covered by the DB.
url http://dx.doi.org/10.1155/2019/9126376
work_keys_str_mv AT ruizhu lightweightprivacypreservationforsecuringlargescaledatabasedrivencognitiveradionetworkswithlocationverification
AT lixu lightweightprivacypreservationforsecuringlargescaledatabasedrivencognitiveradionetworkswithlocationverification
AT yalizeng lightweightprivacypreservationforsecuringlargescaledatabasedrivencognitiveradionetworkswithlocationverification
AT xunyi lightweightprivacypreservationforsecuringlargescaledatabasedrivencognitiveradionetworkswithlocationverification
_version_ 1725147851318624256