Cognitive radios for dynamic spectrum access: from concept to reality
IEEE Wireless Communications
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Security and Communication Networks
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: Vulnerabilities in cognitive radio networks: A survey
Computer Communications
Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Secure Distributed Routing Algorithm with Optimizing Energy Consumption for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
To address the increasing demand for wireless bandwidth, cognitive radio networks (CRNs) have been proposed to increase the efficiency of channel utilization; they enable the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis. A secondary user in a CRN should constantly monitor for the presence of a primary user's signal to avoid interfering with the primary user. However, to gain unfair share of radio channels, an attacker (e.g., a selfish secondary user) may mimic a primary user's signal to evict other secondary users. Therefore, a secure primary user detection method that can distinguish a primary user's signal from an attacker's signal is needed. A unique challenge in addressing this problem is that Federal Communications Commission (FCC) prohibits any modification to primary users. Consequently, existing cryptographic techniques cannot be used directly. In this paper, we develop a novel approach for authenticating primary users' signals in CRNs, which conforms to FCC's requirement. Our approach integrates cryptographic signatures and wireless link signatures (derived from physical radio channel characteristics) to enable primary user detection in the presence of attackers. Essential to our approach is a {\em helper node} placed physically close to a primary user. The helper node serves as a "bridge" to enable a secondary user to verify cryptographic signatures carried by the helper node's signals and then obtain the helper node's authentic link signatures to verify the primary user's signals. A key contribution in our paper is a novel physical layer authentication technique that enables the helper node to authenticate signals from its associated primary user. Unlike previous techniques for link signatures, our approach explores the geographical proximity of the helper node to the primary user, and thus does not require any training process.