Password authentication with insecure communication
Communications of the ACM
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Wireless Communications
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Towards an Architecture for Efficient Spectrum Slicing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Secure Location Verification with Hidden and Mobile Base Stations
IEEE Transactions on Mobile Computing
eBay in the Sky: strategy-proof wireless spectrum auctions
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Assessment of urban-scale wireless networks with a small number of measurements
Proceedings of the 14th ACM international conference on Mobile computing and networking
Sora: high performance software radio using general purpose multi-core processors
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Predictable 802.11 packet delivery from wireless channel measurements
Proceedings of the ACM SIGCOMM 2010 conference
Supporting demanding wireless applications with frequency-agile radios
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Side channel: bits over interference
Proceedings of the sixteenth annual international conference on Mobile computing and networking
IEEE Transactions on Information Forensics and Security
Reliable communication over channels with insertions, deletions, and substitutions
IEEE Transactions on Information Theory
Cyclostationary Signatures in Practical Cognitive Radio Applications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an on-demand basis for a given geographic location, time duration and frequency range. However, a major obstacle to adoption remains. There are no effective solutions to protect licensed users from spectrum misuse, where users transmit without properly licensing spectrum, and in doing so, interfere and disrupt legitimate flows to whom the spectrum is assigned. Given the flexibility of today's cognitive radios, an application can easily transmit on frequencies outside of its allocated range, either accidentally due to misconfiguration, or intentionally to avoid spectrum licensing costs. In this paper, we propose a system to secure dynamic spectrum transmissions, where authorized users embed secure spectrum permits into data transmissions, thus enabling patrolling trusted devices to detect devices transmitting without authorization. We focus our attention on the development of spectrum permits, and describe Gelato, a spectrum misuse detection system that minimizes both hardware costs and performance overhead on legitimate data transmissions.