Research Article
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
Figure 2
Computation cost and communication cost of our protocol.
(a) Computation cost
(b) Communication cost