Research Article

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification

Figure 2

Computation cost and communication cost of our protocol.

(a) Computation cost
(b) Communication cost