Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cooperative spectrum sensing location privacy protection method based on blockchain

A collaborative spectrum sensing and privacy protection technology, applied in the field of blockchain-based collaborative spectrum sensing location privacy protection, can solve problems such as tampering attacks, interference with the normal operation of cognitive wireless networks, and incorrect fusion results of fusion centers.

Active Publication Date: 2021-07-06
FUJIAN NORMAL UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The adversary (including the semi-trusted fusion center) can infer the location of the secondary user from the secondary user's perception report, and use data mining and other technologies to further speculate on other private information of the secondary user, such as personal preferences, living habits, religion, etc. Faith, etc., causing serious privacy leakage problems
In addition, during the transmission of the perception report, the perception report may also be subjected to replay attacks and tampering attacks, both of which will eventually lead to incorrect fusion results obtained by the fusion center and interfere with the normal operation of the cognitive wireless network.
[0004] The existing location privacy protection methods mainly use cryptography technology, but the calculation and communication overheads it brings are relatively large, and the practicability is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative spectrum sensing location privacy protection method based on blockchain
  • Cooperative spectrum sensing location privacy protection method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0041] Further, as a preferred embodiment, step 1 specifically includes the following steps:

[0042] Step 1-1, according to the definition of the elliptic curve group, the key management center randomly selects a large prime number p, q, and determines the finite field F p and F p An elliptic curve E(F p ), then select E(F p ) on a P with order q as the base point, and generate a cyclic addition group G, and finally announce the system parameters {p,q,F p ,E(F P ),P,G};

[0043] Step 1-2, the fusion center randomly selects the private key Calculate the public key PK FC =sk FC ·P. where the public key PK FC As the identity ID and transaction address of the fusion center in the blockchain, and made public in the system, the private key sk FC keep secret;

[0044] Steps 1-3, secondary user SU i random private key Calculate the public key PK i ∈sk i ·P. where the public key PK i as secondary user SU i The identity ID and transaction address in the blockchain a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cooperative spectrum sensing location privacy protection method based on a blockchain, which utilizes the anonymity of the blockchain to enable a secondary user to anonymously upload a sensing report to the blockchain, avoids the relevance between the sensing report and the secondary user, prevents a fusion center from associating the sensing report with the secondary user during decryption, and protects the security of the sensing report in the fusion process. The secondary user encrypts and signs the sensing report by using the elliptic curve cryptography technology, so that the sensing report is prevented from being stolen and tampered in the transmission process, and the confidentiality and integrity of the sensing report in the transmission process are ensured. According to the method, the sensing report is prevented from being replayed in the transmission process by using the timestamp, and the timeliness of the sensing report in the transmission process is ensured. According to the method, the automatic verification characteristic of a smart contract is utilized, and the smart contract, instead of the fusion center, automatically verifies the digital signature of the sensing report, so that the calculation overhead of the fusion center is reduced.

Description

technical field [0001] The present invention relates to the field of cognitive wireless network security, in particular to a block chain-based collaborative spectrum sensing location privacy protection method. Background technique [0002] Cooperative spectrum sensing is an effective method to solve the scarcity of spectrum resources in cognitive wireless networks. It allows unlicensed users (secondary users) to perceive the idle spectrum of licensed users (primary users), and use spectrum resources together without interfering with licensed users, thereby improving the utilization of spectrum resources and alleviating the problem of spectrum resource shortage . Cooperative spectrum sensing is generally divided into two scenarios: centralized and distributed. In a centralized scenario, there is a central control node - the fusion center and multiple secondary users. The fusion center is responsible for issuing spectrum sensing tasks and fusion analysis sensing reports. S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/08
CPCH04L63/0428H04L67/06H04L9/0861H04L9/3247H04L9/3066H04L63/0407H04L9/50
Inventor 许力赖慧彬周赵斌叶阿勇林丽美
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products