Digital communications
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
IEEE Spectrum
Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs
TAPAS '06 Proceedings of the first international workshop on Technology and policy for accessing spectrum
In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 01
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Correlation-based spectrum sensing in cognitive radio
Proceedings of the 2009 ACM workshop on Cognitive radio networks
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Analysis and design of secure watermark-based authentication systems
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
International Journal of Ad Hoc and Ubiquitous Computing
Secure Distributed Routing Algorithm with Optimizing Energy Consumption for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
It was shown that most of the radio frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have been proposed. The idea is to allow secondary users to use a spectrum if the primary user (i.e., the legitimate owner of the spectrum) is not using it. To achieve this, secondary users should constantly monitor the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy monitoring is not easy. A malicious secondary user who wants to gain an unfair use of a spectrum can emulate the primary user, and can thus trick the other secondary users into believing that the primary user is using the spectrum when it is not. This attack is called the Primary User Emulation (PUE) attack. To prevent this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method that allows primary users to add a cryptographic link signature to its signal so the spectrum usage by primary users can be authenticated. This signature is added to the signal in a transparent way, such that the receivers (who do not care about the signature) still function as usual, while the cognitive radio receivers can retrieve the signature from the signal. We describe two schemes to add a signature, one using modulation, and the other using coding. We have analyzed the performance of both schemes.