Skip to main content

Future Research Directions

  • Chapter
  • First Online:
Location Privacy Preservation in Cognitive Radio Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 694 Accesses

Abstract

Information sharing and transmission is an essential part of SUs in CRNs. Collaborative spectrum sensing requires the sharing of sensing reports between SUs and the FC. In database-driven CRNs, the location information and channel availability information are required to be transmitted between the database and registered SUs. Location privacy preservation is a promising approach to incentivize SUs to participate in the CRNs. The general form of privacy preservation is to transform the original sensitive data including sensing reports and location query into some anonymous from that are still useful and have limited impacts on the performance. Location privacy in CRNs is highly related to location privacy studied in participatory sensing and privacy preserving data publishing. However, due to the distinct features of CRNs, privacy preservation in CRNs has its own unique challenges. For example, the performance degradation caused by inaccurate location data in participatory sensing is allowable, while in collaborative spectrum sensing, the performance degradation means interference to PUs which is a very serious issue and is not allowed. Besides, the data formats, network protocols, aggregation rules are quit different in CRNs and other scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Götz, S. Nath, and J. Gehrke. MaskIt: Privately releasing user context streams for personalized mobile applications. In Proc. ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 289–300, 2012.

    Google Scholar 

  2. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. ACM International Conference on Mobile Systems, Applications and Services (MobiSys), pages 31–42, 2003.

    Google Scholar 

  3. E. Kim, S. Helal, and D. Cook. Human activity recognition and pattern discovery. IEEE Perv. Comput., 9(1):48–53, 2010.

    Google Scholar 

  4. A. Mannini and A.M. Sabatini. Accelerometry-based classification of human activities using Markov modeling. Intell. Neuroscience, 2011(4):1–10, 2011.

    Google Scholar 

  5. R. Paulet, M.G. Koasar, X. Yi, and E. Bertino. Privacy-preserving and content-protecting location based queries. In Proc. IEEE International Conference on Data Engineering (ICDE), pages 44–53, 2012.

    Google Scholar 

  6. E. Toch, J. Cranshaw, P.H. Drielsma, J.Y. Tsai, P.G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proc. ACM International Conference on Ubiquitous Computing (Ubicomp), pages 129–138, 2010.

    Google Scholar 

  7. Y. Wang, D. Xu, X. He, C. Zhang, F. Li, and B. Xu. L2P2: Location-aware location privacy protection for location-based services. In Proc. IEEE International Conference on Computer Communications (INFOCOM), pages 1996–2004, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Wang, W., Zhang, Q. (2014). Future Research Directions. In: Location Privacy Preservation in Cognitive Radio Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01943-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01943-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01942-0

  • Online ISBN: 978-3-319-01943-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics