Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation

Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.

[1]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[2]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[4]  aw Kula Fundamentals of Communication Systems , 2022 .

[5]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[6]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[7]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[8]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[9]  Wang Wenbo,et al.  Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[10]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[11]  Wenliang Du,et al.  Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.

[12]  Zhongding Lei,et al.  DVB Detector for Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.

[13]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[14]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[15]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[16]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[17]  Kang G. Shin,et al.  In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.

[18]  Xianbin Wang,et al.  Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.

[19]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[20]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.