Research Article

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification

Table 5

Comparison of existing privacy-preserving and location verification protocols in CRNs.

Protocol Technique Privacy protection Location verification Collusion resistant

Gao et al. [20] PIR

Troja et al. [12] PIR

Grissa et al. [21] Cuckoo Filter

Petrov et al. [13] k-anonymity

Xin et al. [16] PIR and APs-based

Li et al. [4]Cryptography and APs-basedā€‰

Our protocol Cryptography and distributed