Research Article
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
Table 1
Notations in the protocol.
| Notation | Description |
| | Concatenation symbol |
| | Identity of entity U |
| | The pseudo-ID of entity U |
| | The number of BSs |
| | The number of SUs |
| | The public key of entity U |
| | The secret key of entity U |
| | Encryption of message m using key of entity U |
| | Message authentication code of message m using key of entity U |
| | The reputation value of entity U |
| | The location of entity U |
| | The time stamp |
| | A channel list |
| | An available channel |
| | The session key between entity and |
| | A random number |
| | A secure hash function |
|
|