A Study On Privacy-Preserving Location Proof For Securing Large-Scale Database - Driven Cognitive Radio Networks
A Study On Privacy-Preserving Location Proof For Securing Large-Scale Database - Driven Cognitive Radio Networks
org (ISSN-2349-5162)
A STUDY ON PRIVACY-PRESERVING
LOCATION PROOF FOR SECURING LARGE-
SCALE DATABASE –DRIVEN COGNITIVE
RADIO NETWORKS
C.Theebendra1, Dr.T.Ramaprabha2
Research Scholar, PG & Research Department of Computer Science and Applications 1
Vivekanandha College of Arts and Sciences for women (Autonomous), Namakkal, Tamilnadu, India
Professor, PG & Research Department of Computer Science and Applications2
Vivekanandha College of Arts and Sciences for women (Autonomous), Namakkal, Tamilnadu, India
[email protected], [email protected]
Abstract—The latest FCC ruling has enforced database-driven cognitive radio networks (CRNs), in which all secondary
users (SUs) can query a database to obtain Spectrum Availability Information (SAI). Database-driven CRNs are
regarded as a promising approach for dynamic and highly efficient spectrum management paradigm for large-scale
Internet of the Things (IoTs). However, as a typical location-based service (LBS), before providing services to the user,
there is no verification of the queried location, which is very vulnerable to Location Spoofing Attack. A malicious user
can report a fake location to the database and access the channels that may not be available for its location. This will
introduce serious interference to the PUs. In this study, we identify a new kind of attack coined as location cheating
attack, which allows an attacker to spoof other users to another location and make them query the database with wrong
location, or allows a malicious user to forge location arbitrarily and query the database for services. To thwart this
attack, we propose a novel infrastructure-based approach that relies on the existing Wi-Fi or Cellular network Access
Points (or AP) to provide privacy-preserving location proof. With the proposed solution, the database can verify the
locations without knowing the user’s accurate location. We perform comprehensive experiments to evaluate the
performance of the proposed approach. Experimental results show that our approach, besides providing location proofs
effectively, can significantly improve the user’s location privacy.
I. INTRODUCTION
The rapid advancement of the emerging wireless technology and the ubiquitous computing applications has significantly
increased the demand for the communication media resource, wireless spectrum. According to the conventional static spectrum
allocation paradigm, most of the spectrum resources have been assigned to the existing primary users (e.g. such as Military
communications and broadcast TV). To address the ever increasing demand for spectrum resources and allow more and more
Internet-of-things applications, cognitive radio networks (CRNs) have been proposed to improve the efficiency of spectrum
utilization. In CRNs, primary users (PUs) are licensed users who have exclusive privilege to access the licensed channels that
have been pre-assigned whenever they need. Secondary users (SUs) are unlicensed users who are only allowed to
opportunistically access the channels when
the channels are not occupied by the PU.
Database-driven CRNs are regarded as a promising ap- proach to allow the dynamic spectrum sharing in many large- scale
IoT applications. In database-driven CRNs, all SUs can query a database to obtain Spectrum Availability Information (SAI).
Instead of spectrum sensing, SUs are required to submit a request containing its current location information to the database.
Until now, FCC has designed several entities as TV band database administrator. Though database-driven CRNs are considered
as a promising approach to improve the efficiency of spectrum utilization, they face serious security challenges. Most of the
existing research focus on the location privacy issue. But as a variant of location-based service (LBS), we focus on another
security challenge that the user may cheat about its location when querying the database for services. Since there is no location
verification for database-driven CRNs, the user can report a fake location information to the database and access the channels
that are not available for its location, which can cause serious interference to the PUs. For instance, the United States has
announced the spectrum sharing between federal government including military and non-government systems in 3.5GHz band,
which is used by the U.S. Department of Defense (DoD) for critical radar systems. Therefore, location spoofing attack will lead
to the unauthorized spectrum access of SUs and thus introduce serious interferences to the PUs, which are not acceptable for
CRNs. Therefore, location verification in database-driven CRNs is highly desirable.
On the other hand, privacy issue is another important issue in CRNs. As pointed out by the existing researches, the attacker
can geo-localize the SUs by tracking the users’ spectrum query or spectrum utilization history. The existing researches pointed
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 175
© 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162)
out that, in an anonym zed trace data set, four spatiotemporal points are sufficient to uniquely identify the individuals and little
outside or social network information is needed to re-identify a targeted individual or even discover real identities of users.
Further, loss of location privacy can expose users to unwanted advertisement and location-based spam’s, cause social reputation
or economic damage, and make them victims of blackmail or even physical violence.
In this study, we study the problem of location proof in Database driven CRNs without leaking the users’ accurate lo- cation
information. A straightforward solution against location spoofing attack is to enforce the users to provide location proof while
querying for services. A location proof is a piece of electronic data that certifies someone’s presence at a certain location for
some duration.
As Wi-Fi APs become increasingly prevalent, using Wi-Fi AP for location proof will be fairly effective, especially in urban
areas. Different from the previous researches, we propose a novel hybrid infrastructure-based approach that relies on the existing
Wi-Fi AP networks or the cellular networks to provide secure and privacy-preserving location proof. In the case of presence of
Wi-Fi APs, the users can prove their locations under the help of Wi-Fi APs. However, in the case of unavailable Wi-Fi APs
nearby, the users can turn to the cellular tower to request location proof, since the latter can provide a much larger coverage. To
protect their location, we adopt the private proximity testing technology to allow the users to query the database for service
without leaking their accurate location. Further, we discuss how to achieve the tradeoff of the user privacy and localization
accuracy via various system settings.
The contributions of this paper are summarized as below:
• We identify a new kind of attack coined as location cheating attack in database-driven CRNs, which allows an attacker to
mislead a user with a fake location and make them query the database with fake locations, or allows malicious user to claim
a location arbitrarily and query the database for service.
• We propose a novel infrastructure-based approach that re- lies on the existing Wi-Fi AP network or cellular network to
provide guarantees for location cheating prevention and location privacy for the users. The users can choose the location
privacy level as he needs, and, enable the user to prove his location without leaking his accurate location. We also discuss
how to find the user’s optimal choice to maximize the location privacy while ensuring the service quality.
We perform the comprehensive experiments to evaluate the performance of the proposed approach. Our experi- mental
results show that our approach, besides providing location proofs effectively, can significantly improve the user’s location
privacy and also demonstrate the effec- tiveness of the optimal strategy.
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 176
© 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162)
Fig. 1. Illustration of active location cheating. Location Faker generates location B and makes the device believe it is
really in location B.
According to FCC ruling, the system allows an SU to load SAI for multiple locations around, i.e., in the vicinity of its current
location and use such information to obtain one or multiple available channels within that area]. If the location is a little far
away from his current location and also on its moving route, malicious SU can obviously launch an active location cheating
attack to occupy the channels with better quality in advance and gain more benefits. For example, he obtains the SAI for location
B while actually is located at location A (see Fig.1). Then, he chooses a channel with better quality and sends a notification
message to the database, thus making the database believe that he is accessing this channel while he is actually not. If the
attacker chooses several channels, this introduces Denial of service (DoS) to other SUs in location B, and also causes loss of
the quality of service.
1) Passive Location Cheating Attack: The attacker is another
malicious attacker that is located in the same cell with the victim who is launching a query towards the database for SAI. Th e
attacker’s goal is to mislead the victim that he is located in a wrong location and obtain the wrong SAI, which will introduce the
interference to the PU.
As pointed out in [12], an attacker can use GPS spoofing device (like a GPS signal simulator) to generate and broadcast fake
GPS signals synchronized with the real GPS signals to the target receiver. Then, the fake GPS signals gradually overpower
the real GPS signals and replace it. Finally, the target receive locks on the fake GPS signals. After replacing the real GPS, the
attacker can fool the target receivers to an
′
arbitrary location. If all victims receive the fake signals from the same attacker, they are all spoofed to the same location L as
shown in Fig.2. Thus, a malicious SU can launch such
an attack to spoof SUs that are located in the same cell and make them query the database for services by reporting the spoofed
location.
Then, the attacker can occupy the available channel with better quality for location L as his exclusive channel to achieve
′
better transmission throughput. The SUs who query the database for services with spoofed location L may also cause
interference to the primary users, since they access the channels that may not be available for location L.
Fig. 2. Illustration of passive location cheating. All victims in location L that query the database for services are spoofed
to location L’.
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 177
© 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162)
proof server, and certificate authority (CA). Figure 3 depicts the overview of the system we consider.
A. The Users
We assume that some users are going to obtain the Spectrum Availability Information (SAI) from the database when they are
moving. According to the latest ITEF paws-protocol, a user is allowed to query the database for the SAI by submitting a region
that contains his location [1]. To protect the location privacy, we assume that the location submitted to the database by the users
specifies a region. These users are equipped with GPS, Wi-Fi, and Cellular-enabled devices, and are capable of connecting to
the Internet through WiFi or Cellular networks . We also assume a unit-disc model for Wi-Fi APs and cellular towers, that
means a user can communicate with a Wi-Fi AP or a cellular tower only if the distance between them is lower than a given
radius R, which is equal for all users, Wi-Fi APs and cellular towers. Before querying the database for services, the user should
obtain the location proof from a Wi-Fi AP or a cellular tower firstly.
To protect the user’s privacy, the users will register to the Certification Authority (CA) with some randomly generated
pseudonyms and they can use such pseudonyms to protect their privacy while gaining location proof. A pseudonym contains a
public/private key pair (Kpri , Kpub), generated with a public- key encryption scheme. The public key Kpub serves as the pseudonym
of the user, while the private key Kpri enables the user to digitally sign the message. We assume that users do not give their
pseudonyms to other users, and the pseudonyms also should not be easily spoofed and cloned. While registering, we also assume
that the CA can generate some other public/private key pairs (P Kpri, P Kpub), in which P Kpub is given to the user and P Kpri is
kept by the CA.
Fig. 3. Overview of the system. First, the user obtains location proof from the nearby WiFi AP or cellular tower, then
submits it to the location proof server. Second, CA verifies whether the location proof is legitimate. Only if the
verification is pass, then SAI provider database provides the SAI to the user.
B. Database
To prevent users from cheating about their location, we need to add the location verification functionality in the database’s
side, thus in our system we make a little change to the database and divide it into three parts: Location Proof Server,
Certification Authority (CA) and SAI Provider Database.
1) Location Proof Server: Location proof Server directly communicate with the users who submit their location proofs. The
goal of the Location proof Server is to collect location proofs. As the identities of the location proofs are stored as pseudonyms,
even though the Location proof Server is compromised by the attacker, it is impossible for the attacker to know the real identity
of the location proof.
2) CA: As commonly assumed in many networks, we con- sider an online CA run by a trusted party. CA is the only party who
knows the mapping between real identity and pseudonym. CA also knows the secret key P Kpri corresponding to the user, since
the location proof is encrypted with P Kpub, thus it can use P Kpri to verify the location proof. We assume the CA is trusted and
does not collude with the WiFi AP network.
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 178
© 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162)
3) SAI Provider Database: The SAI Provider Database is more similar to the traditional database described in the previous
database-driven CRNs system. After the verification of location proof is pass, the Location Proof Server will submit the region
in spectrum request to the SAI Provider Database. Then, the SAI Provider Database will calculate the SAI for the region and
send it back to the user.
B. System Initialization
Global setup: The location of a user can be defined with different granularities. The user may want to define their location in
appropriate granularity under different situations. For example, the user may be willing to use fine-grained location information
in urban area while using coarse-gained location information in countryside. As show in Figure 4(a), the system adopts a grid
reference [9] to represent locations, where grid indices represent areas covered by grid cells. All users, all Wi-Fi APs, all cellular
towers and the SAI provider Database share a list of coordinate-axis aligned grid system denoted by Γ(l)(l = 0, 1, 2, ) of different
levels. For each level l, the grid cell size, i.e. width and height, is fixed and equal. The grid cell size at level 0 is equal to 250m,
and the size at level l − 1 is always lower than that at level l. Every grid cell c ∈ Γ(l) is identifiable by an index id(c) ∈ N and is
fully contained by several grid cells c ∈ Γ(l − 1).
·· ·
Fig. 4. Grid reference system. We assume the grid cell with side length of 250 meters for level 0, the unit-disc communication
model with a radius of 25 meters for WiFi APs and of 2 kilometers for cellular towers.
Here, Puser denotes the user’s pseudonym; n denotes the beacon’s sequence number or preamble’s random number; l
denotes the granularity of level. t denotes the request time. R user is a set of cell ids that denote the region that the user
queries for. Clocuser encrypted with the public key P Kpub contains the user’s location information.
V. CONCLUSION
The proposed system identify a new kind of attack coined as location cheating attack in database-driven CRNs, in which
users can cheat their locations to gain more advantages, and this can cause interference to PUs. To thwart this attack, we propose
a novel infrastructure-based approach that relies on the existing Wi-Fi AP network or cellular network to provide secure and
privacy location proof. On the one hand, we use a grid reference system with different granularities to represent locations,
on the other hand, we adopt the private proximity testing technology to further improve the user’s location privacy. We conduct
the program to find the optimal strategy to maximum the user’s location privacy. Simulations well demonstrate the effectiveness
and efficiency of the pro- posed approach. Experiments by using the SAI of Atlanta in white space database release on TV
Fool show the tradeoff between location privacy and service quality and demonstrate the effectiveness of the optimal strategy.
Our future work includes other security issues in database-driven CRNs.
REFERENCES
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 179
© 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162)
JETIRAQ06036 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 180