期刊文献+

数据库驱动认知无线电网络位置隐私的攻击与保护 被引量:2

Attack and defense of location privacy in database-driven cognitive radio networks
下载PDF
导出
摘要 针对数据库驱动认知无线电网络(cognitive radio networks)存在的位置隐私泄露风险,提出两种攻击方法:覆盖交集攻击和频道切换攻击,可根据二级用户(secondary user,SU)频道使用情况,在不直接获取查询信息中的位置信息的前提下,间接推断SU位置。为应对上述攻击,提出查询信息盲化机制来实现隐私保护的频谱查询,同时对频道选择方案进行优化使得SU能够最大程度地保护自身位置隐私。根据真实数据进行的攻击实验提高了对SU的定位精度,基于模拟数据的隐私保护方案验证实验证明了本文提出的保护方案的有效性和效率。 The threats of location privacy leaking in database-driven CRNs are investigated.Two attacks:coverage complement at-tack and channel switch attack are proposed to infer SU’s locations according to their usage of channels without directly learning the query messages.To address the above issues,a novel privacy preserving spectrum querying scheme is devised exploiting the blinding approach.Further,optimization on channel selection is applied to ensure the privacy of SU’s location.In the attack ex-periments with real data,it is shown that the position of SU could be located with high precision.The defense experiments with simulation data verify the effectiveness and efficiency of the proposed privacy preserving schemes.
出处 《中国科技论文》 CAS 北大核心 2014年第7期754-757,共4页 China Sciencepaper
基金 高等学校博士学科点专项科研基金资助项目(20100073120065)
关键词 认知无线电网络 数据库驱动 位置隐私 隐私保护 频谱可用性 cognitive radio network database driven location privacy privacy preserving spectrum availability
  • 相关文献

参考文献11

  • 1Federal Communications Commission. Third memoran-dum opinion and rder [DB/OL]. [2013-12-15]. ht- tp://hraunfoss, fcc. gov/edocs, public/attachmatch/ FCC-12-36A1. pdf.
  • 2Federal Communications Commission. Chairman gena- chowski announces approval of first television white spaces database and device [DB/OL]. [2013-11-22]. http://www, fcc. gov/encyclopedia/white-space-data- base-administration.
  • 3Office of Engineering and Technology Announces the Approval of Google. Inc. ~s TV bands database system for operation [DB/OL]. [2013-12-26]. http://www. fcc. gov/eneyclopedia/white-space-database-administra- tion.
  • 4Murty R, Chandra R, Moscibroda T, et al. Senseless: A database-driven white spaces network [J]. IEEE Transactions oll Mobile Computing, 2011, 11 (2): 189-203.
  • 5Xu Toby, Cai Ying. Feeling-based location privacy pro- tection for location-based services [C]//16th ACM Conference on Computer and Communications Security. New York, USA, 2009: 348-357.
  • 6Vu Khuong, Zheng Rong, Gao Jie. Efficient algorithms for k-anonymous location privacy in participatory sens- ing [C]//31st Annual Joint Conference of the IEEE Computer and Communications. Miama, USA, 2012: 2399-2407.
  • 7Freudiger J, Manshaei M H, Hubaux J P, et al. On non-cooperative location privacy: A game-theoretic a- nalysis[C]//16th ACM Conference on Computer and Communications Security. Chicago, USA, 2009 : 324-337.
  • 8Li Shuai, Zhu Haojin, Gao Zhaoyu, et al. Location pri- vacy preservation in collaborative spectrum sensing [ C ]//IEEE INFOCOM. Orlando, USA, 2012: 729-737.
  • 9Trostle J, Parrish A. Information Security: Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups [M]//Berlin.- Springer Berlin Heidelberg, 2011: 114-128.
  • 10Min Rui, Qu Daiming, Cao Yang, et al. Interference a- voidance based on multi-step-ahead prediction for cogni- tive radio [C]//11th IEEE Singapore International Con- ference on Conununication Systems. Guangzhou, Chi- na, 2008: 227-231.

同被引文献28

  • 1Han Jiawei,Kamber Micheline,范明,孟小峰,等译.数据挖掘概念与技术[M].北京:机械工业出版社,2007:424-479.
  • 2SUGUNA N, THANUSHKODI K G. An independent rough set approach hybrid with artificial bee colony al- gorithm for dimensionality reduction[J]. AmericanJournal of Applied Sciences, 2011, 8(3): 261-266.
  • 3WEN Jiahui, ZHONG Mingyang, WANG Zhiying. Ac- tivity recognition with weighted frequent patterns min- ing in smart environments [J]. Expert Systems with Applications, 2015, 42(17): 6423 -6432.
  • 4ZHANG Zheng, TANG Ping, DUAN Rubing. Dynamic time warping under pointwise shape context, Informa- tion Sciences[J]. 2015, 4(315) : 88-101.
  • 5ALTINEL B, GANIZ M C, DIRI B. A corpus-based semantic kernel for text classification by using meaning values of terms [J]. Engineering Applications of Artifi- cial Intelligence, 2015, 43: 54-66.
  • 6CAMPAGNI R, MERLINI D, SPRUGNOLI R, et al. Data mining models for student careers[J]. Expert Svstems with ADDlications, 2015, 42(13): 5508-5521.
  • 7石夫乾,孙守迁,徐江.基于粗糙集的感性知识关联规则挖掘研究[J].计算机集成制造系统,2008,14(2):407-411. 被引量:11
  • 8张寒云,段鹏,丁钦华.基于关联规则的课程拓扑排序研究[J].云南民族大学学报(自然科学版),2009,18(2):177-179. 被引量:5
  • 9贺超波,陈启买.基于粗糙集的关联规则挖掘方法[J].计算机应用,2010,30(1):25-28. 被引量:7
  • 10李忠哗,王凤利,何丕廉.关联规则挖掘在课程相关分析中的应用[J].河北农业大学学报,2010,33(3):116-119. 被引量:11

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部