2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567084
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 101 publications
(66 citation statements)
references
References 9 publications
0
66
0
Order By: Relevance
“…In CRNs, the number of SUs is always assumed to be much more larger than available channels, and this assumption relies on the increasing service of wireless communication demand. Compared to the scheme proposed in [13], the LP-p CA scheme proposed in this paper has the following advantages. Firstly, random sequence matching ensures that the legitimate SUs can successfully pass authentication process without identity privacy leakage; thus, SUs can access available channels with temporary tags.…”
Section: Privacy Leakage With Different Parametersmentioning
confidence: 99%
“…In CRNs, the number of SUs is always assumed to be much more larger than available channels, and this assumption relies on the increasing service of wireless communication demand. Compared to the scheme proposed in [13], the LP-p CA scheme proposed in this paper has the following advantages. Firstly, random sequence matching ensures that the legitimate SUs can successfully pass authentication process without identity privacy leakage; thus, SUs can access available channels with temporary tags.…”
Section: Privacy Leakage With Different Parametersmentioning
confidence: 99%
“…Regardless, once the fog client brings into play computing resources from various fog nodes in an extent, its region can come down to a little region, since its region must be in the intersection purpose of the different fog nodes coverage's or ranges. By bringing into play procedure of [Gao et al, 2013] we can preserve the region security in such circumstances.…”
Section: Confidentiality or Privacymentioning
confidence: 99%
“…Although the research on maritime scenario is still in the early stage, the counterparts on land-based network could provide a solid foundation for our work [14][15][16][17][18][19][20][21][22]. In [23], the authors studied the broadcast scheduling issue with minimum latency and redundancy analysis for cognitive radio networks, which could significantly improve the existing performance of latency and redundancy for CRNs.…”
Section: Related Workmentioning
confidence: 99%