作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2022, Vol. 48 ›› Issue (2): 164-172. doi: 10.19678/j.issn.1000-3428.0060205

• 网络空间安全 • 上一篇    下一篇

基于数据库驱动认知无线电网络的位置隐私保护方案

徐鑫, 温蜜   

  1. 上海电力大学 计算机科学与技术学院, 上海 201306
  • 收稿日期:2020-12-07 修回日期:2021-01-16 发布日期:2021-02-23
  • 作者简介:徐鑫(1996-),男,硕士研究生,主研方向为隐私保护;温蜜,教授、博士。
  • 基金资助:
    国家自然科学基金(61872230,U1936213,61802249);上海市科委地方能力建设项目(20020500600);上海市2019年度“科技创新行动计划”高新技术领域项目(19511103700)。

Location Privacy Protection Scheme Based on Database-Driven Cognitive Radio Network

XU Xin, WEN Mi   

  1. School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 201306, China
  • Received:2020-12-07 Revised:2021-01-16 Published:2021-02-23

摘要: 动态频谱共享能够解决由于互联无线设备快速增长导致的频谱资源短缺问题,但用户需要向数据库提交位置信息来查询频谱的可用性,造成用户的隐私泄露,而多数位置信息保护方案较少同时考虑对主要用户(PU)和二级用户(SU)的位置隐私保护。提出一种基于盲签名和秘密共享的数据库驱动认知无线电网络隐私保护方案。通过对PU和SU的双重隐私保护,使用盲签名和匿名来确保匿名验证用户身份,同时运用秘密共享避免泄露用户信息。仿真结果表明,与PeDSS和LP-Goldberg等方案相比,该方案具有较好的评估性能和更高的安全性,能够更好地应用于移动环境中。

关键词: 盲签名, 位置隐私保护, 认知无线电网络, 用户协作, 秘密共享

Abstract: The growing number of wireless devices can result in a shortage of spectrum resources.Dynamic spectrum sharing provides a solution to the problem, but requires users to submit their location to the database to query the availability of spectrum, which will inevitably cause the privacy of users to leak.At the same time, most of the existing location information protection schemes rarely consider the protection of both Primary Users(PU) and Secondary Users(SU) at the same time.To address the problem, a privacy protection scheme using database-driven Cognitive Radio Network(CRN) is proposed based on blind signatures and secret sharing.The scheme provides dual privacy protection for both PU and SU, using blind signatures and anonymity to ensure anonymous verification of user identity, while using secret sharing to avoid leaking user information.The simulation results show that compared with PeDSS, LP-Goldberg and other existing schemes, this scheme exhibits higher performance and security, and can be more widely applied to mobile environments.

Key words: blind signature, location privacy protection, Cognitive Radio Network(CRN), user collaboration, secret sharing

中图分类号: