2017
DOI: 10.1109/comst.2017.2693965
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Cognitive Radio Networks: A Survey

Abstract: Cognitive radio networks (CRN s) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity problem. Despite the great benefits that CRN s offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. Knowing that their whereabouts may be exposed can discourage users from joining and participating in the CRN s, thereby potentially hin… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(25 citation statements)
references
References 249 publications
(430 reference statements)
0
24
0
Order By: Relevance
“…Moreover, the work of this survey paper is also related to the survey papers on various aspects of CRNs, such as spectrum sensing [25]- [30], spectrum decision [31]- [35], resource allocation [36]- [41], security and privacy [42]- [48], MAC protocols [49], [50], routing [51], network coding [52], various applications [53]- [56], to just mention a few. A list of the related survey papers is provided in Table I for further references.…”
Section: B Comparison With Related Survey Articlesmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the work of this survey paper is also related to the survey papers on various aspects of CRNs, such as spectrum sensing [25]- [30], spectrum decision [31]- [35], resource allocation [36]- [41], security and privacy [42]- [48], MAC protocols [49], [50], routing [51], network coding [52], various applications [53]- [56], to just mention a few. A list of the related survey papers is provided in Table I for further references.…”
Section: B Comparison With Related Survey Articlesmentioning
confidence: 99%
“…2015 [47] A survery of the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer. 2017 [48] A survey that investigates the various location privacy risks and threats that may arise from the different components of this CRN technology, and explores the different privacy attacks and countermeasure solutions.…”
Section: Spectrum Sensingmentioning
confidence: 99%
“…Despite its importance, the location privacy issue in CRN s only recently gained interest from the research community [12]. Some works focused on addressing this issue in the context of collaborative spectrum sensing [13]- [17] while others focused on addressing it in the context of dynamic spectrum auction [18].…”
Section: Related Workmentioning
confidence: 99%
“…However, many of these PETs are designed for applications that do not fit in the context of CRN s. For instance, oblivious random access memory (ORAM) [29] aims to enable a user to outsource its encrypted data to a database and to offer him/her the possibility to access this data while hiding the access patterns from the database [12]. Searchable symmetric encryption [30] is another PET that is largely deployed to privately outsource one's data to another party while maintaining the ability to selectively search over it [12]. These PETs are designed for protecting queries and searches over data that is outsourced to a database, which is completely different from the CRN scenario where the queried data belong to the database itself.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of Cognitive Radio Networks (CRNs), Grissa and al. [42] provide a comprehensive survey that investigates the various location privacy risks and threats as well, as countermeasures that have been proposed in the literature to cope with these location privacy issues. Lastly, Cottrill [43] uses a multidisciplinary approach to discuss location privacy and to ensure that the protection of private information is directly addressed from each of the relevant standpoints of law, policy, and technology.…”
Section: Introductionmentioning
confidence: 99%