Cognitive Radio Oriented Wireless Networks. 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedings

Research Article

SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems

Download
100 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-05490-8_8,
        author={Douglas Zabransky and He Li and Chang Lu and Yaling Yang},
        title={SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems},
        proceedings={Cognitive Radio Oriented Wireless Networks. 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18--20, 2018, Proceedings},
        proceedings_a={CROWNCOM},
        year={2019},
        month={1},
        keywords={Dynamic Spectrum Access Inference attack Location privacy},
        doi={10.1007/978-3-030-05490-8_8}
    }
    
  • Douglas Zabransky
    He Li
    Chang Lu
    Yaling Yang
    Year: 2019
    SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems
    CROWNCOM
    Springer
    DOI: 10.1007/978-3-030-05490-8_8
Douglas Zabransky1,*, He Li1,*, Chang Lu1,*, Yaling Yang1,*
  • 1: Virginia Polytechnic Institute and State University
*Contact email: dmz5e@vt.edu, heli@vt.edu, changl7@vt.edu, yyang8@vt.edu

Abstract

Dynamic Spectrum Access (DSA) is a promising solution to alleviate spectrum crowding. However, geolocation database-driven spectrum access system (SAS) presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or SU inference attack. In this paper, we propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS). This is the first framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. Evaluation results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters.