期刊文献+

数据库驱动认知无线电的位置隐私保护与验证 被引量:1

Research on location privacy protection and verification of database-driven cognitive radio
下载PDF
导出
摘要 针对数据库驱动认知无线电网络存在位置隐私泄露和GPS欺骗问题,设计了一种具有位置验证机制的基于双布谷鸟过滤器的位置隐私保护方案。该方案首先通过基站提供位置验证解决GPS欺骗问题,然后采用双布谷鸟过滤器解决位置隐私泄露问题,同时避免了由误警概率导致的接入被主用户占用频谱的风险。仿真结果表明该方案虽然在数据库端和认知用户端的开销比布谷鸟过滤器方案稍有增加,但比隐私保护的信息查询和频道使用方案在网格数为10 000时数据库端开销减少了18倍,并且无位置隐私泄露。 In order to solve the problems of location privacy disclosure and GPS spoofing in database-driven cognitive radio network,this paper designed a location privacy protection scheme,which based on double cuckoo filter and provided location verification mechanism.The scheme firstly solved the GPS spoofing problem by providing location verification through the base station,and then used the double cuckoo filter to solve the problem of location privacy leakage.At the same time,the scheme avoided the risk caused by the false positive rates,which would lead the users to access the channels that were occupied by primary users.The simulation results show that the overhead of the database and the cognitive client is slightly higher than that of the cuckoo filter,but the cost of the database is reduced by 18 times when the grid number is 10 000 compared to the private spectrum availability information retrieval and channel utilization scheme,and there is no location privacy disclosure.
作者 杨明极 赵威 何志强 Yang Mingji;Zhao Wei;He Zhiqiang(School of Measurement-Control Technology&Communication Engineering,Harbin University of Science&Technology,Harbin 150080,China;No.703 Research Institute of China Shipbuilding Industry Corporation,Harbin 150078,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第5期1562-1565,共4页 Application Research of Computers
关键词 数据库驱动认知无线电 位置隐私 全球定位系统欺骗 位置验证 database-driven cognitive radio location privacy GPS spoofing location verification
  • 相关文献

参考文献3

二级参考文献22

  • 1LETAIEF K B, ZHANG Wei. Cooperative communications for cogni- tive radio networks [ J ]. Proceedings of the IEEE, 2009,97 ( 5 ) : 878- 893.
  • 2SADEK A K, LIU K J R, EPHREMIDES A. Cognitive multiple access via cooperation : protocol design and performance analysis [ J ]. IEEE Trans on Information Theory,2007,53 ( 10 ) :3677- 3696.
  • 3MA Jun, ZHAO Guo-dong, LI Ye. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks [ J]. IEEE Trans on Wireless Communications,2008,7( 11 ) :4502-4507.
  • 4XIAO Jin-jun, CUI Shu-guang, LUO Zhi-quan, et al. Linear coherent decentralized estimation[ J ]. IEEE Trans on Signal Process,2008, 56 (2) :757-770.
  • 5PEH E, LIANG Y C. Optimization for cooperative sensing in cognitive radio networks [ C ]//Proc of fEEE Wireless Communications and Net- working Conference. [ S. l. ] :IEEE,2007 : 27-32.
  • 6ZOU Ming-rui ,ZHAO Cheng-shi, SHEN Bin, et al. Comparison of DF and AF based cooperative spectrum sensing in cognitive radio [ C ]// Proc of the 14th Asia-Pacific Conference on Communications. 2008 : 1 - 4.
  • 7LANEMAN J N,TSE D,.WORNELL G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior [ J ]. IEEE Trans on information Theory,2004,50 ( 12 ) : 3062- 3080.
  • 8GANESAN G, LI Y. Cooperative spectrum sensing in cognitive radio, part I : two user networks [ J ].IEEE Trans on Wireless Communi- cations, 2007,6 ( 6 ) : 2204 - 2213.
  • 9GANESAN G, LI Y. Cooperative spectrum sensing in cognitive radio, part II :multinser networks[ J]. IEEE Trans on Wireless Communi- cations, 2007,6 ( 6 ) : 2214 - 2222.
  • 10TELATAR E. Capacity of multi-antenna Gaussian channels[ J ]. Euro- pean Trans on Telecommunications,1999,10(6) :585-595.

共引文献6

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部