期刊文献+

认知无线电网络中基于SpaceTwist的位置隐私保护方案 被引量:5

Location Privacy-preserving Scheme Based on SpaceTwist in Cognitive Radio Network
下载PDF
导出
摘要 针对数据库驱动的认知无线电网络(Cognitive Radio Network,CRN)中存在的位置隐私泄露问题,文章提出一种基于SpaceTwist的隐私保护方案。该方案借助查询服务器,以锚点为中心向数据库展开增量近邻查询,以获得锚点周围的主用户可用信道。数据库将查询结果返回给查询服务器,查询服务器根据最大传输功率公式判断次用户周围的可用信道,并根据次用户允许发送的功率进行信道分配,使次用户接入服务质量最好的信道。安全分析表明,文章方案中次用户无需与数据库共享位置,从而很好地保护了次用户的位置隐私。性能分析表明,与现有其他方案相比,文章方案在通信开销和次用户的计算开销方面具有明显优势。 Aiming at the problem of location privacy leakage in database-driven cognitive radio network(CRN), this paper proposes a privacy-preserving scheme based on SpaceTwist.With the help of query server, the scheme expands incremental nearest neighbor query to database centered on anchor to obtain the available channels for primary users around anchor.The database returns the query results to the query server. The query server judges the available channels around the secondary user according to the formula of maximum transmission power,and allocates the channels according to the power allowed by the secondary user, so that the secondary user can access the channel with the best service quality. Security analysis shows that the secondary user does not need to share location with the database in this scheme, which well protects the location privacy of secondary user. Performance analysis shows that compared with other existing schemes, the proposed scheme has obvious advantages in communication overhead and computing overhead of secondary user.
作者 许力 朱瑞 曾雅丽 XU Li;ZHU Rui;ZENG Yali(College of Mathematics and Informatics, Fujian Normal University, Fuzhou Fujian 350007, China;Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou Fujian 350007, China)
出处 《信息网络安全》 CSCD 北大核心 2019年第2期18-27,共10页 Netinfo Security
基金 国家自然科学基金面上资助项目[61771140] 国家自然科学基金海峡联合基金重点资助项目[U1405255] 福州市科技重大项目[榕科(2017)325号]
关键词 认知无线电网络 位置隐私 SpaceTwist 锚点 cognitive radio network location privacy SpaceTwist anchor
  • 相关文献

参考文献3

二级参考文献31

  • 1GRUTESER M, GRUNVqALD D. Anonymous usage of loca- tion-based services through spatial and temporal cloaking[A]. Pro- ceedings of the 1st International Conference on Mobile Systems, Ap- plications and Services[C]. 2003.31-42. 被引量:1
  • 2NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[A].Proc IEEE INFOCOM[C]. 2014.754-762. 被引量:1
  • 3GHINITA G. Privacy for location-based services[J]. Synthesis Lee- tures on Information Security, Privacy, & Trust, 2013, 4(1): 1-85. 被引量:1
  • 4BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. 2008. 237-246. 被引量:1
  • 5DONDI R, MAURI G, ZOPPIS I. The l-diversity problem: tractability and approximability[J]. Theoretical Computer Science, 2013, 511: 159-171. 被引量:1
  • 6KIDO H, YANAGISAWA Y, SATOH T. An anonymous communica- tion technique using dummies for location-based services[A]. Perva- sive Services, ICPS'05, Proceedings International Conference[C]. 2005.88-97. 被引量:1
  • 7NIU B, ZHANG Z, LI X, et al. Privacy-area aware dummy generation algorithms for location-based services[A].Commtmications (ICC), 2014 IEEE International Conference[C]. 2014. 957-962. 被引量:1
  • 8HONG J I, LANDAY J A. An architecture for privacy-sensitive ubiquitous computing[A].Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services[C]. 2004. 177-189. 被引量:1
  • 9YIU M L, JENSEN C S, HUANG X, et al. Spacetwist: managing the txade-offs among location privacy, query performance, and query ac- curacy in mobile services[A].Data Engineering, ICDE 2008, IEEE 24th International Conference[C]. 2008. 366-375. 被引量:1
  • 10HUO Z, MENG X, HU H, et al. You can walk alone: trajectory pri- vacy-preserving through significant stays protection[A]. Database Sys- tems for Advanced Applications[C]. Springer Berlin Heidelberg, 2012. 351-366. 被引量:1

共引文献26

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部