Towards secure spectrum decision

  • Authors:
  • G. Jakimoski;K. P. Subbalakshmi

  • Affiliations:
  • Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ;Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistically. The two main constraints in the design of DSA networks is to make sure that this opportunistic access is done without any disruption of service to the primary users and without any modifications to the primaries themselves. Most architectures and protocols for DSA networks in the literature assume that all parties are honest and that there are no attackers. Recently (IEEE ICC, CogNet 2008) we demonstrated the failure of this approach by showing that an attacker can manipulate messages to convince the parties involved in the protocol to make incorrect spectrum decisions. In this paper, we consider spectrum decision protocols in clustered infrastructure-based dynamic spectrum access networks where the spectrum decision in each cluster is coordinated by some central authority. We propose an efficient and provably secure protocol that can be used to protect the spectrum decision process against a malicious adversary.