2019
DOI: 10.1109/tccn.2019.2922300
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy in Cognitive Radios With Multi-Server Private Information Retrieval

Abstract: Spectrum database-based cognitive radio networks (CRN s) have become the de facto approach for enabling unlicensed secondary users (SU s) to identify spectrum vacancies in channels owned by licensed primary users (PU s). Despite its merits, the use of spectrum databases incurs privacy concerns for both SU s and PU s. Single-server private information retrieval (PIR) has been used as the main tool to address this problem. However, such techniques incur extremely large communication and computation overheads whi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…Information Retrieval (PIR) [25] was used to achieve full privacy protection. The key idea of the PIR technique depends on mathematical principle.…”
Section: Related Workmentioning
confidence: 99%
“…Information Retrieval (PIR) [25] was used to achieve full privacy protection. The key idea of the PIR technique depends on mathematical principle.…”
Section: Related Workmentioning
confidence: 99%
“…A multi-server private information retrieval-based scheme has been proposed to preserve the location privacy of the stationary and mobile incumbents and CBSDs in [73,74]. Private information retrieval allows the retrieval of the required information from a database, preserving the identity of the retrieving user from the database owner.…”
Section: Cryptography-based Schemesmentioning
confidence: 99%
“…Instead of storing encrypted offers, receiving encrypted requests from the users, and matching the encrypted requests with the encrypted offers, it is more efficient to store the data in the system without encryption, and allow the user to use a PIR technique to privately retrieve the required offers. The PIR techniques have been used in different applications, such as location-based services [35] and eHealth systems [36]. In location-based services, the PIR is used to enable a user to privately query a server to retrieve location information about his/her point of interests (e.g., locations of entertainment centers, shopping malls, restaurants, etc.).…”
Section: B Private Information Retrieval (Pir)mentioning
confidence: 99%
“…Badr et al: Smart Parking System with Privacy-preservation and Reputation using Blockchain C [1] C [2] C [3] C [4] C [5] C [6] C [7] C [8] C [9] C [10] C [11] C [12] C [13] C [14] C [15] C [16] C [17] C [18] C [19] C [20] C [21] C [22] C [23] C [24] C [25] C [26] C [27] C [28] C [29] C [30] C [31] C [32] C [33] C [34] C [35]…”
Section: B System Initializationmentioning
confidence: 99%