Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

Software Defined Radio (SDR) and Cognitive Radio (CR) are promising technologies, which can be used to alleviate the spectrum shortage problem or the barriers to communication interoperability in various application domains. The successful deployment of SDR and CR technologies will depend on the design and implementation of essential security mechanisms to ensure the robustness of networks and terminals against security attacks. SDR and CR may introduce entirely new classes of security threats and challenges including download of malicious software, licensed user emulation and selfish misbehaviors. An attacker could disrupt the basic functions of a CR network, cause harmful interference to licensed users or deny communication to other CR nodes. The research activity in this area has started only recently and many challenges are still to be resolved. This paper presents a survey of security aspects in SDR and CR. We identify the requirements for the deployment of SDR and CR, the main security threats and challenges and the related protection techniques. This paper provides an overview of the SDR and CR certification process and how it is related to the security aspects. Finally, this paper summarizes the most critical challenges in the context of the future evolution of SDR/CR technologies.

[1]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[2]  Yuan Zhang,et al.  Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[3]  A.R. Hammons,et al.  A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[4]  Antonio Martin,et al.  SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS , 2004 .

[5]  Jim Alves-Foss,et al.  The MILS architecture for high-assurance embedded systems , 2006, Int. J. Embed. Syst..

[6]  T. Ulversoy,et al.  Software Defined Radio: Challenges and Opportunities , 2010, IEEE Communications Surveys & Tutorials.

[7]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[8]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[9]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[10]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[11]  Symeonidis Dimitrios,et al.  Certification of SDRS in New Public and Governmental Security Systems , 2008 .

[12]  Didem Gözüpek,et al.  A novel handover protocol to prevent hidden node problem in satellite assisted cognitive radio networks , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[13]  Kiseon Kim,et al.  On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[14]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[15]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[16]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[17]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[18]  Maria-Gabriella Di Benedetto,et al.  A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.

[19]  Dzmitry Kliazovich,et al.  Cooperative Shared Spectrum Sensing for Dynamic Cognitive Radio Networks , 2009, 2009 IEEE International Conference on Communications.

[20]  H. Vincent Poor,et al.  Software Radio , 1999, IEEE Personal Communications.

[21]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[22]  Fabrizio Granelli,et al.  Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities , 2010, IEEE Communications Magazine.

[23]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[24]  K. P. Subbalakshmi,et al.  Towards Secure Spectrum Decision , 2009, 2009 IEEE International Conference on Communications.

[25]  Haiming Wang,et al.  Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[26]  John A. Copeland,et al.  An anti-cloning framework for software defined radio mobile devices , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[27]  Jim Hoffmeyer,et al.  Radio software download for commercial wireless reconfigurable devices , 2004, IEEE Communications Magazine.

[28]  D. Borth,et al.  Considerations for Successful Cognitive Radio Systems in US TV White Space , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[29]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[30]  Roy H. Campbell,et al.  Threat analysis of GNU software radio , 2005 .

[31]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[32]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[33]  Niraj K. Jha,et al.  An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[34]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[35]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[36]  Jim Alves-Foss,et al.  A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[37]  Jeffrey H. Reed,et al.  Understanding the software communications architecture , 2009, IEEE Communications Magazine.

[38]  Yuping Zhao,et al.  A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.

[39]  Guosen Yue,et al.  Anti-jamming coding techniques with application to cognitive radio , 2009, IEEE Transactions on Wireless Communications.

[40]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[41]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[42]  A. Sahai,et al.  Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[43]  T.X. Brown,et al.  Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[44]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[45]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[46]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[47]  Wenjing Lou,et al.  Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.

[48]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[49]  Neeli Rashmi Prasad,et al.  Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[50]  Kazuhiro Uehara,et al.  Proposal and evaluation of security schemes for software-defined radio , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[51]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[52]  Ryuji Kohno,et al.  Secure download system based on software defined radio composed of FPGAs , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[53]  Richard C. Reinhart,et al.  Open Architecture Standard for NASA's Software-Defined Space Telecommunications Radio Systems , 2007, Proceedings of the IEEE.

[54]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[55]  Douglas M. Blough,et al.  Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.

[56]  E.O. Nuallain A Proposed Propagation-Based Methodology with Which to Address the Hidden Node Problem and Security/Reliability Issues in Cognitive Radio , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[57]  Masahiro Kuroda,et al.  A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[58]  Filip Perich,et al.  Policy-based spectrum access control for dynamic spectrum access network radios , 2009, J. Web Semant..

[59]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..

[60]  Jie Peng,et al.  The Research of Cross-Layer Architecture Design and Security for Cognitive Radio Network , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[61]  D.C. Sicker,et al.  Difficulties in providing certification and assurance for software defined radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[62]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[63]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[64]  Lei Zhang,et al.  Cooperative Spectrum Sensing with Double Threshold Detection Based on Reputation in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[65]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[66]  Xiaohua Li,et al.  Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[67]  Shiwen Mao,et al.  Overhead Analysis for Radio Environment Mapenabled Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[68]  Oriol Sallent,et al.  ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards , 2010, IEEE Communications Magazine.

[69]  Caidan Zhao,et al.  A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[70]  Li-Fung Chang,et al.  Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.

[71]  Shu Wang,et al.  Secure cooperative spectrum sensing for Cognitive Radio networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[72]  Ryuji Kohno,et al.  A framework for secure download for software-defined radio , 2002 .

[73]  Gianmarco Baldini,et al.  European Standardization and SDR Certification , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[74]  Awais Khawar,et al.  Security threats to signal classifiers using self-organizing maps , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[75]  Guosen Yue,et al.  Design of Anti-Jamming Coding for Cognitive Radio , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[76]  S. Arkoulis,et al.  Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[77]  Jun-ichi Takada,et al.  ACU and RSM Based Radio Spectrum Management for Realization of Flexible Software Defined Radio World , 2003 .

[78]  Daniel W. Bliss Optimal SISO and MIMO Spectral Efficiency to Minimize Hidden-Node Network Interference , 2010, IEEE Communications Letters.

[79]  Rahim Tafazolli,et al.  A Comparison Between the Centralized and Distributed Approaches for Spectrum Management , 2011, IEEE Communications Surveys & Tutorials.

[80]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[81]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[82]  Ben Y. Zhao,et al.  Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.