Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








8,669 Hits in 5.1 sec

Security and privacy of collaborative spectrum sensing in cognitive radio networks

Zhaoyu Gao, Haojin Zhu, Shuai Li, Suguo Du, Xu Li
2012 IEEE wireless communications  
To thwart these attacks, we propose a novel privacy preserving framework in collaborative spectrum sensing to prevent location privacy leaking.  ...  In this article, we firstly identify the potential security threats towards the collaborative spectrum sensing in CRNs.  ...  To thwart these attacks and preserve location privacy, we propose a novel privacy preserving framework for collaborative spectrum sensing.  ... 
doi:10.1109/mwc.2012.6393525 fatcat:p26havo5sjcklmbnxpc3rhylei

Location privacy preservation in collaborative spectrum sensing

Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen
2012 2012 Proceedings IEEE INFOCOM  
We propose a Privacy Preserving collaborative Spectrum Sensing (PPSS) scheme, which includes two primitive protocols: Privacy Preserving Sensing Report Aggregation protocol (PPSRA) and Distributed Dummy  ...  can provide differential location privacy for secondary users by introducing a novel sensing data randomization technique.  ...  Based on the proposed privacy model, we introduce a novel Privacy Preserving collaborative Spectrum Sensing (PPSS) scheme to achieve sensing report aggregation without location privacy leaking.  ... 
doi:10.1109/infcom.2012.6195818 dblp:conf/infocom/LiZGGXS12 fatcat:g7l6g2cl2jguxl7xk6qcbqowda

Localization and Privacy Preservation in Cognitive Radio Networks

Xu Zhang, Ying Xia, Hongrui Mao, Haeyoung Bae
2014 2014 8th International Conference on Future Generation Communication and Networking  
The objective is to provide a comprehensive analysis and guide of existing efforts around localization and location privacy preservation in cognitive radio network.  ...  In this paper, we present a survey of representative methods dealing with user localization and location privacy preservation issues and propose a taxonomy that summarizes the state-of-the-art.  ...  It has been adopted in many privacy preservation applications such as data mining [26] , collaborative sensing [27] and collaborative spectrum sensing [28] .  ... 
doi:10.1109/fgcn.2014.19 fatcat:jmwm7gts45g3zjvhhleqxvt2gq

Location Positioning and Privacy Preservation Methods in Location-based Service

Xu Zhang, Hae Young Bae
2015 International Journal of Security and Its Applications  
In this paper, we present a survey of existing methods dealing with outdoor and indoor localization techniques and location privacy protection techniques.  ...  However, revealing personal private locations to potentially un-trusted LBS server and others may raise serious privacy concerns if these locations are not protected adequately.  ...  Acknowledgement This work was financially supported by the Natural Science Foundation of China This paper is a revised and expanded version of a paper entitled "Privacy-preserving Localization in Cognitive  ... 
doi:10.14257/ijsia.2015.9.4.06 fatcat:gvfsplrbcfhvzm345zb4im2dbm

LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks [article]

Mohamed Grissa, Attila Yavuz, Bechir Hamdaoui
2018 arXiv   pre-print
In this paper, we develop a new Location Privacy for Optimal Sensing (LPOS) scheme that preserves the location privacy of SUs while achieving optimal sensing performance through voting-based sensing.  ...  One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing.  ...  To cope with these attacks, the authors propose PPSS, a Privacy Preserving collaborative Spectrum Sensing protocol, that uses secret sharing and the Privacy Preserving Aggregation (PPA) process to hide  ... 
arXiv:1806.03572v1 fatcat:77sh4u7gtrcwjomqwp7od55qgq

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.  ...  The opportunistic and dynamic spectrum access features of CR provide the functionality to its unlicensed users to utilize the underutilized spectrum at the time of need because CR nodes can sense vacant  ...  Li worked over preserving location privacy during collaborative spectrum sensing of CRN via differential privacy. 2014 • [12] W.  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Table of Contents

2021 IEEE Internet of Things Magazine  
Kishor Narang ACCEPTED FROM OPEN CALL DATA AGGREGATION AND PRIVACY PRESERVING USING COMPUTATIONAL INTELLIGENCE Umair Khadam, Muhammad Munwar Iqbal, Sohail Jabbar, and Syed Aziz Shah DISTRIBUTED SPECTRUM  ...  COLLABORATIVE MOBILE CROWDSOURCING Li Yang and Abdallah Shami TOWARD BLOCKCHAIN FOR EDGE-OF-THINGS: A NEW PARADIGM, OPPORTUNITIES, AND FUTURE DIRECTIONS 10 20 16 26 34 40 46 4 Sensing  ... 
doi:10.1109/miot.2021.9492941 fatcat:co2ozw7a5ngufkl6p3ncorrhu4

Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks

R. Neelaveni, B. Sridevi, J. Sivasankari
2022 Computer systems science and engineering  
ACO is used to form clusters of SUs in the co-operative spectrum sensing technique.  ...  In this privacy-preserving model, overall accuracy is 97.4%, and it is 9% higher than the conventional models without Privacy-Preserving Architecture (PPA).  ...  Experimentations are done for the same attacks for the proposed privacy-preserving and non-privacy-preserving models.  ... 
doi:10.32604/csse.2022.021433 fatcat:oq7vk47fmjhe7agxn7pqh4uk34

Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration

Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu
2019 ˜The œinternational Arab journal of information technology  
negotiating a desired privacy budget in a collaborative manner for privacy-preserving.  ...  Considering the untrusted server, differential privacy and local differential privacy has been used for privacy-preserving in data aggregation.  ...  Differential privacy also had applied to collaborative search log [10] and crowdsourced spectrum sensing [11] to prevent an untrusted third party from learning user's privacy information.  ... 
doi:10.34028/iajit/17/4/3 fatcat:sdwl7gy2fvetxgogy7szmaet3y

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks
English

Sneha Thankachan, M Jebakumari
2014 International Journal of Computer Trends and Technology  
When the spectrum is not used by the licensed primary user, the obtainable channels are allocated for the unlicensed secondary users (SUs).  ...  To avoid these types of attacks, a new privacy preserving framework is proposed in collaborative spectrum sensing to prevent location privacy leaking.  ...  Haojin Zhu et.al proposed a method to find the probable security threats towards the collaborative spectrum sensing in cognitive radio networks [2] and to locate several privacy ISSN: 2231-2803 http:  ... 
doi:10.14445/22312803/ijctt-v8p129 fatcat:fgntp7tuizgknp7zg3fudxcwli

Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities [article]

Juan Marcelo Parra-Ullauri, Xunzheng Zhang, Anderson Bravalheri, Yulei Wu, Reza Nejabati, Dimitra Simeonidou
2024 arXiv   pre-print
Federated Analytics (FA) emerges as a promising distributed computing paradigm, enabling collaborative data value generation while preserving privacy and reducing communication overhead.  ...  It explores complementary approaches to enhance privacy and security in 6G networks alongside FA and discusses the challenges and prerequisites for successful FA implementation.  ...  For multidomains, FA enables collaborative data analysis and insights generation while preserving data privacy.  ... 
arXiv:2401.03878v1 fatcat:a64p6bydmje6zlswiuyncgxjfq

Location Privacy in Cognitive Radio Networks: A Survey

Mohamed Grissa, Bechir Hamdaoui, Attila A. Yavuza
2017 IEEE Communications Surveys and Tutorials  
Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues.  ...  Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity  ...  The authors would like to thank the editor and the reviewers for their valuable feedback that has improved this survey paper greatly.  ... 
doi:10.1109/comst.2017.2693965 fatcat:4jkyw7tyxrcdzbbm5uocxawsie

IEEE Access Special Section Editorial: Communication and Fog/Edge Computing Toward Intelligent Connected Vehicles (ICVS)

Lei Shu, Junhui Zhao, Yi Gong, Changqing Luo, Tim Gordon
2021 IEEE Access  
This Special Section in IEEE Access focuses on innovative technologies and solutions enabled communication and edge computing toward ICVs.  ...  ., autonomous driving, safety early warning, natural language processing, etc.) for assisting both the drivers and passengers in vehicular environments.  ...  In the article ''Traffic chain: A blockchain-based secure and privacy-preserving traffic map,'' by Wang et al., a secure and privacy-preserving decentralized traffic information collection system on the  ... 
doi:10.1109/access.2021.3071260 doaj:3c15b73f232c41a199e81c178ee3a34d fatcat:c5xvpfeh3zf5fgyzkpzmdkw3jy

Simulation Of Trust-Based Mechanism For Enhancing User Confidence In Mobile Crowdsensing Systems

Dorothy Mwongeli Kalui, Dezheng Zhang, Geoffrey Muchiri Muketha, Jared Onsomu
2020 IEEE Access  
The level of MCS security is enhanced to protect the privacy of participants, so that participants can be assured that the MCS system they are working with during sensing moment is trustworthy.  ...  For more information, see http://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020  ...  USER RECRUITMENT IN MCS The malicious attackers aim to destroy the functionality of cooperative spectrum sensing so that the system cannot trust the aggregated sensing results.  ... 
doi:10.1109/access.2020.2968797 fatcat:kegfiusr2bcudifqh2vze4bbd4

Federated Learning for 6G: Paradigms, Taxonomy, Recent Advances and Insights [article]

Maryam Ben Driss, Essaid Sabir, Halima Elbiaze, Walid Saad
2023 arXiv   pre-print
By allowing mobile handsets and devices to collaboratively learn a global model without explicit sharing of training data, FL exhibits high privacy and efficient spectrum utilization.  ...  While there are a lot of survey papers exploring FL paradigms and usability in 6G privacy, none of them has clearly addressed how FL can be used to improve the protocol stack and wireless operations.  ...  Finally, a privacy-preserving local model-sharing mechanism was developed to protect UAVs with high aggregation accuracy.  ... 
arXiv:2312.04688v1 fatcat:uwut2mfcrzdbdh5z5emhjg2iqa
« Previous Showing results 1 — 15 out of 8,669 results