{"id":"https://openalex.org/W2500528884","doi":"https://doi.org/10.1109/jiot.2015.2481926","title":"Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio\u00a0Networks","display_name":"Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio\u00a0Networks","publication_year":2015,"publication_date":"2015-09-24","ids":{"openalex":"https://openalex.org/W2500528884","doi":"https://doi.org/10.1109/jiot.2015.2481926","mag":"2500528884"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2015.2481926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2015.2481926","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100421812","display_name":"Yi Li","orcid":"https://orcid.org/0000-0003-4562-8208"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Li","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101883746","display_name":"Lu Zhou","orcid":"https://orcid.org/0000-0002-5201-5074"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Zhou","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101069637","display_name":"Limin Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100421812"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":7.7659,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.97362658,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"3","issue":"4","first_page":"563","last_page":"571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.87989741563797},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.6468539834022522},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6172778606414795},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5259033441543579},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.4947754740715027},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48619407415390015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4749341607093811},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.23594754934310913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87989741563797},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.6468539834022522},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6172778606414795},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5259033441543579},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.4947754740715027},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48619407415390015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4749341607093811},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.23594754934310913},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2015.2481926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2015.2481926","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1186662909","display_name":null,"funder_award_id":"U1401253","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1991829541","display_name":null,"funder_award_id":"61411146001","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2092838156","display_name":null,"funder_award_id":"U1405251","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5498330643","display_name":null,"funder_award_id":"61272444","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7186445811","display_name":null,"funder_award_id":"61472418","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1511643295","https://openalex.org/W1519021761","https://openalex.org/W1908508804","https://openalex.org/W1965364415","https://openalex.org/W1987758794","https://openalex.org/W1995990665","https://openalex.org/W2034247275","https://openalex.org/W2061271184","https://openalex.org/W2088318379","https://openalex.org/W2092820878","https://openalex.org/W2098697029","https://openalex.org/W2108836391","https://openalex.org/W2118239572","https://openalex.org/W2120911939","https://openalex.org/W2146322883","https://openalex.org/W2149826777","https://openalex.org/W2167930752","https://openalex.org/W2288632536","https://openalex.org/W2302899493","https://openalex.org/W2394957549","https://openalex.org/W6647218697","https://openalex.org/W6712353128","https://openalex.org/W7024580046"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W2123299109","https://openalex.org/W3128793638","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W4391805690","https://openalex.org/W2607818178","https://openalex.org/W3153057489"],"abstract_inverted_index":{"The":[0],"latest":[1],"Federal":[2],"Communications":[3],"Commission":[4],"(FCC)":[5],"ruling":[6],"has":[7],"enforced":[8],"database-driven":[9],"cognitive":[10],"radio":[11],"networks":[12],"(CRNs),":[13],"in":[14],"which":[15,73,129],"all":[16],"secondary":[17],"users":[18,112,136],"(SUs)":[19],"can":[20,84,198,231],"query":[21,143,159],"a":[22,35,54,86,119,151,170],"database":[23,91,145,161,197],"to":[24,62,77,89,109,133,137,154,187,212],"obtain":[25],"spectrum":[26,43],"availability":[27],"information":[28],"(SAI).":[29],"Database-driven":[30],"CRNs":[31],"are":[32],"regarded":[33],"as":[34,53,125],"promising":[36],"approach":[37,173],"for":[38,46,101,162],"dynamic":[39],"and":[40,92,140,158],"highly":[41],"efficient":[42],"management":[44],"paradigm":[45],"large-scale":[47],"Internet":[48],"of":[49,69,122,216],"Things":[50],"(IoT).":[51],"However,":[52],"typical":[55],"location-based":[56],"service":[57],"(LBS),":[58],"before":[59],"providing":[60,227],"services":[61],"the":[63,70,90,94,110,144,160,177,193,196,200,204,214,217,234],"user,":[64],"there":[65],"is":[66,74],"no":[67],"verification":[68],"queried":[71],"location,":[72,148],"very":[75],"vulnerable":[76],"location":[78,88,126,139,156,190,228,236],"spoofing":[79],"attack.":[80],"A":[81],"malicious":[82,152],"user":[83,153],"report":[85],"fake":[87],"access":[93,183],"channels":[95],"that":[96,174,223],"may":[97],"not":[98],"be":[99],"available":[100],"its":[102],"location.":[103,207],"This":[104],"will":[105],"introduce":[106],"serious":[107],"interference":[108],"primary":[111],"(PUs).":[113],"In":[114],"this":[115,166],"study,":[116],"we":[117,168],"identify":[118],"new":[120],"kind":[121],"attack":[123],"coined":[124],"cheating":[127],"attack,":[128,167],"allows":[130,150],"an":[131],"attacker":[132],"spoof":[134],"other":[135],"another":[138],"make":[141],"them":[142],"with":[146],"wrong":[147],"or":[149,180],"forge":[155],"arbitrarily":[157],"services.":[163],"To":[164],"thwart":[165],"propose":[169],"novel":[171],"infrastructure-based":[172],"relies":[175],"on":[176],"existing":[178],"WiFi":[179],"cellular":[181],"network":[182],"points":[184],"(or":[185],"AP)":[186],"provide":[188],"privacy-preserving":[189],"proof.":[191],"With":[192],"proposed":[194,218],"solution,":[195],"verify":[199],"locations":[201],"without":[202],"knowing":[203],"user's":[205,235],"accurate":[206],"We":[208],"perform":[209],"comprehensive":[210],"experiments":[211],"evaluate":[213],"performance":[215],"approach.":[219],"Experimental":[220],"results":[221],"show":[222],"our":[224],"approach,":[225],"besides":[226],"proofs":[229],"effectively,":[230],"significantly":[232],"improve":[233],"privacy.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
