Azza Ben Mosbah, Timothy A. Hall, M. Souryal, H. Afifi
{"title":"频谱共享中对在位者频率的推理攻击分析模型","authors":"Azza Ben Mosbah, Timothy A. Hall, M. Souryal, H. Afifi","doi":"10.1109/DySPAN.2017.7920770","DOIUrl":null,"url":null,"abstract":"In spectrum sharing, incumbents with sensitive parameters require full protection of their operations. The incumbent's protection includes the protection of its privacy (e.g., operational frequency) against inference attacks carried out by malicious authorized secondary users. In this paper, we develop an analytical model to analyze the vulnerability of the incumbent's frequency to inference attacks and validate it by simulation. Specifically, we study random and ordered channel assignment schemes and compare results for both schemes.","PeriodicalId":221877,"journal":{"name":"2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An analytical model for inference attacks on the incumbent's frequency in spectrum sharing\",\"authors\":\"Azza Ben Mosbah, Timothy A. Hall, M. Souryal, H. Afifi\",\"doi\":\"10.1109/DySPAN.2017.7920770\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In spectrum sharing, incumbents with sensitive parameters require full protection of their operations. The incumbent's protection includes the protection of its privacy (e.g., operational frequency) against inference attacks carried out by malicious authorized secondary users. In this paper, we develop an analytical model to analyze the vulnerability of the incumbent's frequency to inference attacks and validate it by simulation. Specifically, we study random and ordered channel assignment schemes and compare results for both schemes.\",\"PeriodicalId\":221877,\"journal\":{\"name\":\"2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DySPAN.2017.7920770\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DySPAN.2017.7920770","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An analytical model for inference attacks on the incumbent's frequency in spectrum sharing
In spectrum sharing, incumbents with sensitive parameters require full protection of their operations. The incumbent's protection includes the protection of its privacy (e.g., operational frequency) against inference attacks carried out by malicious authorized secondary users. In this paper, we develop an analytical model to analyze the vulnerability of the incumbent's frequency to inference attacks and validate it by simulation. Specifically, we study random and ordered channel assignment schemes and compare results for both schemes.