Data-Driven Optimization Based Primary Users' Operational Privacy Preservation

Jingyi Wang, Sai Mounika Errapotu, Yanmin Gong, Lijun Qian, Riku Jantti, Miao Pan, Zhu Han

Research output: Contribution to journalArticleScientificpeer-review


Recently opened spectrum within 3550-3700 MHz provides more accessing opportunities to secondary users (SUs), while it also raises concerns on the operational privacy of primary users (PUs), especially for military and government. In this paper, we propose to study the tradeoff between PUs' temporal privacy and SUs' network performance using the data-driven approach. To preserve PUs' temporal operational privacy, we develop an obfuscation strategy for PUs, which allows PUs to intentionally add dummy signals to change the distribution of temporal spectrum availability, and confuse the adversary. While generating the dummy signals for privacy, the PUs have to consider the utility of SUs and try their best to satisfy SUs' uncertain traffic demands. Based on the historical data, we employ a data-driven risk-averse model to characterize the uncertainty of SUs' demands. With joint consideration of frequency reuse in the cognitive radio network, PUs' privacy, and uncertain SUs' demands, we employ a conflict graph to characterize the interference relationship between SUs, and formulate the data-driven risk-averse stochastic optimization problem. We provide corresponding solutions and through numerical simulation, we show that the proposed scheme is effective in preserving PUs' temporal operational privacy while offering good enough spectrum resources to satisfy SUs' traffic demands.
Original languageEnglish
Pages (from-to)357-367
Number of pages11
JournalIEEE Transactions on Cognitive Communications and Networking
Issue number2
Publication statusPublished - 1 Jun 2018
MoE publication typeA1 Journal article-refereed


  • PUs' temporal operational privacy
  • SUs' traffic demands
  • data-driven modeling and optimization
  • obfuscation strategy
  • Telecommunications


Dive into the research topics of 'Data-Driven Optimization Based Primary Users' Operational Privacy Preservation'. Together they form a unique fingerprint.

Cite this