Research Article
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
Table 5
Comparison of existing privacy-preserving and location verification protocols in CRNs.
| Protocol | Technique | Privacy protection | Location verification | Collusion resistant |
| Gao et al. [20] | PIR | | | |
| Troja et al. [12] | PIR | | | |
| Grissa et al. [21] | Cuckoo Filter | | | |
| Petrov et al. [13] | k-anonymity | | | |
| Xin et al. [16] | PIR and APs-based | | | |
| Li et al. [4] | Cryptography and APs-based | ā | | |
| Our protocol | Cryptography and distributed | | | |
|
|