POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive Radio Network

Zhaoyu Gao*, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The Database-driven Cognitive Radio Network is regarded as a promising way for a better utilization of radio channels without introducing the interference to the primary user. However, it is also facing a series of security threats. In this study, we identify a new kind of location privacy related attack which could geo-locate a secondary user from the spectrum he used. We propose a Spectrum Utilization based Location Inference Algorithm, which is based on the intersection of the possible location sets revealed by each channel access or channel transition event under the presence of the primary user. We implement our algorithm on the data extracted from Google Earth Coverage Maps released by FCC. Our experiement results show that, 80% SUs could be located to 10 cells based on 25 or less channels.

Original languageEnglish
Title of host publicationCCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Pages1025-1027
Number of pages3
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 ACM Conference on Computer and Communications Security, CCS 2012 - Raleigh, NC, United States
Duration: 16 Oct 201218 Oct 2012

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference2012 ACM Conference on Computer and Communications Security, CCS 2012
Country/TerritoryUnited States
CityRaleigh, NC
Period16/10/1218/10/12

Keywords

  • DB-driven cognitive radio network
  • Location privacy
  • Spectrum utilization

Fingerprint

Dive into the research topics of 'POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive Radio Network'. Together they form a unique fingerprint.

Cite this