You are on page 1of 19

ITC571

Emerging Technologies and Innovation


Assessment-2
Project Proposal and Plan

Technology Cognitive radio network


Technique Privacy-preserving technique
Domain Wireless power
Project Area Security and privacy in emerging wireless technologies

TOPIC: Privacy-preserving based cognitive radio network

Student Name:
Student Id:
Contents
List of figures...................................................................................................................................2

List of tables....................................................................................................................................2

Introduction......................................................................................................................................3

Rationale..........................................................................................................................................3

Problem domain...........................................................................................................................3

Purpose and Justification.............................................................................................................3

Background information..............................................................................................................4

Research Questions..........................................................................................................................4

Cognitive radio network...............................................................................................................4

Privacy-preserving technique.......................................................................................................4

Wireless power.............................................................................................................................5

Conceptual Framework....................................................................................................................5

Problem........................................................................................................................................5

Significance of Research..............................................................................................................6

Purpose.........................................................................................................................................6

Materials and Methodology.............................................................................................................6

Analysis of sources of information..............................................................................................6

Research method..........................................................................................................................6

Data collection.............................................................................................................................7

Assumptions.................................................................................................................................7

Results..........................................................................................................................................8

Project Plan......................................................................................................................................8

Deliverables.................................................................................................................................8

Work Breakdown structure..........................................................................................................9

1
Risk Analysis...............................................................................................................................9

Duration.....................................................................................................................................10

Gantt chart..................................................................................................................................11

References......................................................................................................................................12

Appendix........................................................................................................................................14

Attribute table............................................................................................................................14

List of papers..............................................................................................................................17

List of figures
Figure 1: System design model for the proposed secure transmission scheme...............................7
Figure 2: Transmission rate of the secondary network....................................................................8
Figure 3: WBS.................................................................................................................................9
Figure 4: Gantt chart......................................................................................................................11

List of tables
Table 1: Risk analysis......................................................................................................................9
Table 2: Duration...........................................................................................................................10
Table 3: Comparison table.............................................................................................................14
Table 4: Paper description.............................................................................................................17

2
Introduction
Every organization wants that their data or information become secure for the primary network,
and for this, a cognitive privacy-preserving system is a design used for transferring the power
and data in cognitive radio networks. Due to the excess number of devices in the IOT crowd, the
licensed spectrum leads to a shortage of it. This concept motivates us to implement the concept
of cognitive radio that allows the inferior users to access the under-utilized licensed spectrum for
controlling the primary network interference. The two most important spectrum sharing
approaches are overlay and underlay schemes that are used in cognitive radio networks. In the
overlay process, the secondary network or users access the detected vacant spectrum. The
underlay process is used by the secondary network for transmitting simultaneously with the
primary network transmission. Both these approaches are used to enhance the efficiency of the
licensed spectrum. The performance efficiency of the overlay process is depending upon the
detecting errors and can be limited by this, whereas for the underlying process, it can be limited
by interference threshold, which is undetermined.

Rationale
Problem domain
The major issue that is found after analyzing the research is the issue of time slot allocation for
the primary tower that is mainly used for the asymptotic scenario. Time and power allocation are
also becoming the problem for maximizing the transmission rate of the secondary network. The
primary network also contains the optimization problem that has to be solved after implementing
the cognitive radio networks. If the security of the primary network transmission is not fulfilled,
a spectrum facility is used for the broadcasting of subordinates; this functionality also helps us to
enhance the transmission rate of the secondary network. For securing the primary network
transmission, low power is available, due to which additional power is used for secondary
communication (Lai et al., 2020).

Purpose and Justification


The purpose of the study is to design a primary privacy-preserving scheme with power transfer
and joint information for cognitive radio networks. This proposed scheme is used to secure the
primary information by using the secondary network, and for this, the secondary network needed

3
some licensed spectrum in the form of reward (Bhattacharya et al., 2020). For securing the
primary privacy information, we first analyzed the security performance and reliability of the
primary information and then allocated the time slot and transmit power so that the transmission
rate of the secondary network was increased under the requirements of the primary network.

Background information
Security of the networks is the primary objective of any organization. Privacy and security are
essential for the primary network so that it can easily maintain the secondary quality of the QoS
need. These all strategy plan preserve the security or cooperative strategy due to which all the
information and power are shifts towards the cognitive radio networks. The secondary network
supports the primary network for the transmission of data or information.

Research Questions
Cognitive radio network
1. How to transfer the information with the help of cognitive radio networks?
It is in the form of wireless communication in which the data is transferred in the form of a
Transceiver. In it, the transceiver is used for detecting the communication channels that are in
use or not. The primary transmitter and receiver are set for communicating in the form of signals.
2. What is the information exchange process in cognitive radio networks?
The information exchange process in the cognitive radio networks is done by using the
secondary network with the primary network. The secondary transmitter is used with the primary
transmitter in exchanging information to the primary receiver (Wang et al., 2020).
3. What are primary and secondary systems, and what are the transmission rates?
These are the users in the cognitive radio networks in which their roles are assigned on a priority
basis. Primary users are those who are important for the system and are responsible for setting up
for the secondary users. Secondary users are those who can only make changes on their own
accounts (Chen et al., 2020).

Privacy-preserving technique
1. What is a cooperative primary privacy-preserving scheme, and how this helps in
privacy and security?

4
The cooperative primary privacy-preserving scheme uses PT, PR, St and SR for preserving the
security and privacy of the transmitter. This scheme uses primary and secondary users to
enhance the security of the primary transmitter.
2. What is resource allocation, and how is this utilized?
Resource allocation is the process of managing and assigning assets in a method that can easily
support the company's goals and objectives. The resource allocation includes hardware allocation
and software allocation. The resource allocation can be utilized by various processes like using
of symmetric approach, using technology and resource management software.
3. How cooperative primary privacy-preserving scheme helps in transmission?
Cooperative primary privacy-preserving schemes use wireless transmission methodology for
transmitting the data or information. Primary and secondary transmitters are used for
transmitting the data or information. The cognitive radio network technique is used for
transmitting the data or information.

Wireless power
1. How can be security and privacy emerges in wireless technology?
The wireless technology uses the WPA method that is an IEEE 802.11 standard used for
deploying security in the wireless technology. The standard 802.11X standard is used in the
wireless network for employing security in wireless technology (Chen et al., 2020).
2. What do you mean by cooperative jamming? What is the secure rate at which the
data packets transmit?
Cooperative jamming is defined as the physical layer that is used to broadcast artificial noise for
blocking the eavesdropping of messages. Secure transmission of data is used for transmitting
secure data such as proprietary or confidential data over a secure platform. Encryption
techniques are used for transmitting the data (Shuai et al., 2020).

Conceptual Framework
Problem
Time and slot allocation for the primary preserve information is one of the biggest issues for the
networks. The data transmission rate of the secondary network for the primary network is also
due to which high power is required for transmitting the data. Due to low power, the jamming
problem occurs that leads to the time increase for the secondary information and for the security

5
of primary transmissions. The secure transmissions from the primary network become reduce as
compare to other systems. Due to difficulty in the time slot and power allocation, the rate of
secondary transmission becomes reduced.

Significance of Research
The importance of this research is to make the proper utilization of preserving techniques by
using the cognitive radio networks. The transmission reliability and secrecy performance are
used for the primary network for allocating the time slot to the secondary transmission rate,
which is the highest need for the main security. For enhancing the transmission rate and security
of the primary network, two approaches of the cognitive network are used, i.e., underlay and
overlay. Both methods are used to enhance the primary performance of the network (Zeng et al.,
2020).

Purpose
Utilization of preserving technique by using the cognitive radio network is the purpose of this
research. For transmitting the privacy of the primary network, the important element is the power
transmitters. The transmission reliability and secrecy performance are the main network element
for transmitting the power of the primary network and also for the time slot.

Materials and Methodology


Analysis of sources of information
The information is collected from research papers or journal papers. We analyzed 30 research
papers for the same topic that is of Q1 quality, out of which we select ten papers for the data
collection. The collected data helps us to achieve the research objective or purpose. Q1 quality
paper is selected for collecting the data about the selected topic.

Research method
The proposed method is the beamforming method that is used for enhancing or improving the
performance of primary & secondary networks. The only disadvantage with this method is that it
is not an optimal method, but it is an intuitive one. For calculating the secrecy of the networks,
the approximation method is used. The proposed method also contains division operations,
exponential operations and multiplication operations. Due to these operations, the proposed
method has low computational complexity (Wang et al., 2021). Because of the passive

6
eavesdropper in the proposed method, we cannot obtain the immediate CSI of the wiretap
channel (Zhou et al., 2020). For analyzing the secrecy performance, we use the CDI that is linked
with the distance between the wiretapper and users.

Figure 1: System design model for the proposed secure transmission scheme

The proposed system for preserving the security of the primary network is shown in figure 1.
The secondary transmitter, secondary receiver and SJ for the secondary network. The primary
network includes the primary transmitter & primary receiver. The proposed system is suitable for
those in which the primary users are the cellular networks, and the secondary users are the IOT
users. The problem that is occurring in the research is that the primary privacy data are
threatened by the eavesdropper. For analyzing the result, we assume that the primary transmitter
does not have a direct link between the primary receive and eavesdropper. The assumption that is
made is valid in the case of a small cell in which the primary transmitter and secondary
transmitter are located in a small cell while the primary receiver and eavesdropper are situated at
another cell (Zhang et al., 2020).

Data collection
The data is collected from different research papers and articles that are of Q1 quality, out of
which we select only those papers that are related to our topic or technology. The data collection
is in the form of content that is collected by analyzing various research papers on a given topic.
The research papers help us to collect more data or information associated with a given topic.
The research paper that is selected is from the CSU library because it provides only Q1 quality
papers.

Assumptions
The assumptions that are made for creating the primary privacy-preserving scheme are:

7
 For developing the scheme, we assume that the primary transmitter has no connection
with the eavesdropper and primary receiver.
 The assumption is valid for small cells in which the primary transmitter and secondary
transmitter are situated in one small and the primary receiver or eavesdropper are situated
in the other small cell.
 We assume for the evaluation of inter-cell interference effect, and for this, we assume to
use the average cell interference despite using continuous cell interference.
 We also assume the N0 value that represents the noise that is received during the data
collection process.

Results
The primary information privacy is secured with the secondary network for which a licensed
spectrum will need.

Figure 2: Transmission rate of the secondary network

Figure 2 explains the graph of secondary transmission rate versus efficiency of energy
conversion. The power of the secondary system for the transmission of primary transmission is
increase with the increment of energy conversion efficiency. The proposed system helps the user
to analyze the information reliability or scalability performance. Time slot allocation
performance can also be analyzed by using the system which is proposed for the research
problem. The proposed system also enhances the transmission rate of the secondary network (Lai
et al., 2020).

8
Project Plan
Deliverables
The deliverables for this project are in the form of a draft, weekly report, synopsis, presentation
and final report.

Work Breakdown structure

ITC571 Topic
Review

Investigation
Project Process
Data collection & Development Testing
Initiation Ending
Identification

selection of
Requirement Identification select Select testing
methodology Final result
gathering gaps technology tools
and technology

selection of Gathering of identify Analyze


select tools Synopsis
project state research paper components project

select research selection of select


Test project
paper research paper techniques

Designing of
scheme

Development
of scheme

Figure 3: WBS

Risk Analysis
Table 1: Risk analysis

S. Risk Likelihood Impact Effect


No.
1 Accuracy of the Medium Medium Affect the result of the system

9
proposed solution
2 Risks of users data High High User data sometimes leak, due to
security which their trust in the organization
becomes a hamper.
3 The efficiency of the Low Medium The result of the system becomes
proposed system or affected.
scheme

Duration
Table 2: Duration

Week Time name


Week 1 Project Initiation
Selection of methodology and technology
Selection of project state
Select research paper
Week 2,3 Data collection
Requirement gathering
Gathering of research paper
Selection of research paper
Week 4,5,6 Investigation & Identification
Identification gaps
Identify components
Week 7,8 Development
Select technology
Select tools
Select techniques
Designing of scheme
Week 9 Testing
Select testing tools
Analyze project
Test project
Week Process Ending
10
10,11
Final Result
Synopsis

Gantt chart

Figure 4: Gantt chart

11
References
Bhattacharya, M., Roy, S., Mistry, K., Shum, H., & Chattopadhyay, S. (2020). A Privacy-
Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network
Applications. IEEE Access, 8, 221330-221351.
https://doi.org/10.1109/access.2020.3043621
Chen, R., Li, Z., Shi, J., Yang, L., & Hu, J. (2020). Achieving Covert Communication in Overlay
Cognitive Radio Networks. IEEE Transactions On Vehicular Technology, 69(12), 15113-
15126. https://doi.org/10.1109/tvt.2020.3034928
Lai, H., Xu, L., & Zeng, Y. (2020). An Efficient Location Privacy-Preserving Authentication
Scheme for Cooperative Spectrum Sensing. IEEE Access, 8, 163472-163482.
https://doi.org/10.1109/access.2020.3021583
Shuai, M., Liu, B., Yu, N., Xiong, L., & Wang, C. (2020). Efficient and privacy-preserving
authentication scheme for wireless body area networks. Journal Of Information Security
And Applications, 52, 102499. https://doi.org/10.1016/j.jisa.2020.102499
Wang, D., Zhou, F., & Leung, V. (2020). Primary Privacy Preserving With Joint Wireless Power
and Information Transfer for Cognitive Radio Networks. IEEE Transactions On
Cognitive Communications And Networking, 6(2), 683-693.
https://doi.org/10.1109/tccn.2019.2952885
Wang, J., Zhang, X., Zhang, Q., Li, M., Guo, Y., Feng, Z., & Pan, M. (2021). Data-Driven
Spectrum Trading with Secondary Users’ Differential Privacy Preservation. IEEE
Transactions On Dependable And Secure Computing, 18(1), 438-447.
https://doi.org/10.1109/tdsc.2019.2892447
Zeng, Y., Xu, L., Yang, X., Yi, X., & Khalil, I. (2020). Lightweight privacy preservation for
secondary users in cognitive radio networks. Journal Of Network And Computer
Applications, 162, 102652. https://doi.org/10.1016/j.jnca.2020.102652
Zhang, Y., Pan, J., Qi, L., & He, Q. (2021). Privacy-preserving quality prediction for edge-based
IoT services. Future Generation Computer Systems, 114, 336-348.
https://doi.org/10.1016/j.future.2020.08.014
Zhang, Z., Zhang, H., He, S., & Cheng, P. (2020). Bilateral Privacy-Preserving Utility
Maximization Protocol in Database-Driven Cognitive Radio Networks. IEEE

12
Transactions On Dependable And Secure Computing, 17(2), 236-247.
https://doi.org/10.1109/tdsc.2017.2781248
Zhou, J., Cao, Z., Qin, Z., Dong, X., & Ren, K. (2020). LPPA: Lightweight Privacy-Preserving
Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-
Based Services in VANETs. IEEE Transactions On Information Forensics And Security,
15, 420-434. https://doi.org/10.1109/tifs.2019.2923156

13
Appendix
Attribute table
Table 3: Comparison table

ITEM NAME PAPER ATTRIBUTES


NUMBER
Research 1 Security and privacy in emerging wireless technologies
domain 2 Secondary encryption for privacy preservation
3 Primary privacy preservation
4 Efficient Privacy-Preserving Protocol
5 Lightweight privacy preservation
6 Privacy-preserving authentication scheme
7 Integral sliding control for uncertain system
8 Bilateral privacy-preserving for utility maximization
protocol
9 Privacy-preserving aggregation
10 Privacy-preserving quality prediction
Technology 1 Cognitive radio network
2 Cognitive radio technology
3 Blockchain technology
4 Cognitive radio technology
5 Cognitive radio technology
6 Cognitive radio network technology
7 RISM technology
8 Cognitive radio network technology
9 Cognitive radio technology
10 Edge computing, Blockchain technology
Technique 1 Privacy-preserving technique
2 Wireless technique, full-duplex technique
3 Frequency energy harvesting technique
4 Private information retrieval technique.
14
5 private information retrieval technique, cuckoo filter
technique
6 Cooperative spectrum sensing
7 LMI technique
8 Privacy-preserving technique, privacy-enhancing technique
9 spectrum sensing technique, a cryptographic technique
10 Edge computing
Keywords 1 Information and power transfer, security, resource
allocation
2 Cognitive radio networks, primary information security
3 Information and power transfer, security, resource
allocation
4 Cognitive radio networks, Privacy-preserving
5 Cognitive radio networks, Lightweight, Privacy
preservation
6 cooperative spectrum sensing, location privacy-preserving,
7 integral sliding mode, robust control, LMI
8 cognitive radio networks, Location privacy, bilateral
privacy preservation
9 Cooperative spectrum sensing, Elliptic curve cryptography,
Cognitive radio networks
10 Differential privacy, Edge computing
System 1 Cooperative secure transmission scheme
diagram 2 the proposed cooperative secure communication scheme
3 proposed cooperative secure transmission scheme
4 Database drove CRN
5 RFID enabled system
6 System model for cooperative sensing
7 Outlet concentration curve

15
8 Database access protocol
9 Cooperative spectrum sensing design
10 DEQP2 model
Proposed 1 Cooperative primary privacy Preserving scheme
Scheme 2 destination aided secure transmission scheme
3 decentralized flexible channel cooperation scheme, the
proposed cooperative secure transmission scheme
4 Authentication scheme, information retrieval scheme
5 lightweight privacy-preserving scheme
6 centralized cooperative spectrum sensing
7 Closed-loop system
8 Database drove based cognitive radio
9 Cognitive radio network
10 DEQP2 model
Result 1 The transmission rate of the secondary network shows the
performance improvement of the proposed scheme
2 proposed secondary encrypted secure transmissions
3 primary privacy-preserving scheme with empirical
parameters
4 communication cost and achieves much better performance
5 increases network throughput and reduces packet delay in
VANETs
6 Improve or enhance the performance of spectrum accuracy
and utilization.
7 For stabilizing the controlling power of the uncertain
system
8 Helps to reduce interference between the primary user and
secondary user.
9 Improves spectrum estimation accuracy
10 Measurable privacy preservation is easily done without

16
reducing accuracy.
Method 1 pseudonym method
2 generation function method
3 the traditional high-layer encryption method
4 Approximation method
5 database-driven method
6 pseudonym method and energy detection method
7 Lyapunov-Krasovskii functional method
8 Spectrum sensing method, quantitative method, cloaking
method and database querying method
9 Brute-force search, Tree-based method
10 QoS prediction method, machine learning methods

List of papers
Table 4: Paper description

Paper Paper Name


No
1 An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative
Spectrum Sensing.
2 A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social
Network Applications.
3 Primary Privacy Preserving With Joint Wireless Power and Information Transfer for
Cognitive Radio Networks.
4 Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy
Preservation
5 Lightweight privacy preservation for secondary users in cognitive radio networks.
6 LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key
Secure Outsourced Computation for Location-Based Services in VANETs
7 Efficient and privacy-preserving authentication scheme for wireless body area
networks
8 Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven

17
Cognitive Radio Networks.
9 Achieving Covert Communication in Overlay Cognitive Radio Networks
10 Privacy-preserving quality prediction for edge-based IoT services.

18

You might also like