Design and validation of computer protocols
Design and validation of computer protocols
KSSL: experiments in wireless internet security
KSSL: experiments in wireless internet security
IEEE Spectrum
Mode switching and software download for software defined radio: the SDR Forum approach
IEEE Communications Magazine
Towards a fraud-prevention framework for software defined radio mobile devices
EURASIP Journal on Wireless Communications and Networking
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
An architecture for secure software defined radio
Proceedings of the Conference on Design, Automation and Test in Europe
Secure reconfiguration of software-defined radio
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.00 |
Radio configuration (R-CFG) files for software defined radio (SDR) devices can be downloaded over the air, allowing these devices to support multi-mode functionality using a single transceiver. SDR device manufacturers are likely to provide the R-CFGs, which may contain proprietary information. In such cases, it is necessary to secure the server/SDR device connection during the R-CFG download. Therefore, a protocol to securely connect manufacturer's server and SDR devices, called LSSL, is proposed. The LSSL is a lightweight protocol based on the SSL protocol, but it takes up less bandwidth, thus, it is more suitable for SDR handheld devices operating under low-capabilities, low-bandwidth and error-prone wireless links. However, securing the R-CFG download connection does not guarantee that a valid R-CFG, that is, an R-CFG that has been approved by the regulatory agency, has been downloaded. In order to install only valid R-CFGs, a secure download protocol is presented. The secure protocol includes, besides the LSSL, steps of mutual authentication, public/private key mechanisms for data encryption and decryption, and fingerprint calculations to check data integrity. Finally, the secure protocol is analyzed and shown to be deadlock and livelock-free, and to properly terminate. Experiments using Java 2 Micro Edition (J2ME) are performed to compare the LSSL and the SSL, and to demonstrate the feasibility of the secure protocol.