Cryptographic link signatures for spectrum usage authentication in cognitive radio

It was shown that most of the radio frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have been proposed. The idea is to allow secondary users to use a spectrum if the primary user (i.e., the legitimate owner of the spectrum) is not using it. To achieve this, secondary users should constantly monitor the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy monitoring is not easy. A malicious secondary user who wants to gain an unfair use of a spectrum can emulate the primary user, and can thus trick the other secondary users into believing that the primary user is using the spectrum when it is not. This attack is called the Primary User Emulation (PUE) attack. To prevent this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method that allows primary users to add a cryptographic link signature to its signal so the spectrum usage by primary users can be authenticated. This signature is added to the signal in a transparent way, such that the receivers (who do not care about the signature) still function as usual, while the cognitive radio receivers can retrieve the signature from the signal. We describe two schemes to add a signature, one using modulation, and the other using coding. We have analyzed the performance of both schemes.

[1]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[2]  Simon Haykin,et al.  Digital Communications , 2017 .

[3]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[4]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[5]  Adrian Perrig,et al.  Secure broadcast communication in wired and wireless networks , 2002 .

[6]  G. Staple,et al.  The end of spectrum scarcity [spectrum allocation and utilization] , 2004, IEEE Spectrum.

[7]  John E. Kleider,et al.  Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  Xianbin Wang,et al.  Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.

[9]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[11]  Stephen J. Shellhammer,et al.  Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs , 2006, TAPAS '06.

[12]  Zhongding Lei,et al.  DVB Detector for Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.

[13]  Peter Steenkiste,et al.  Proceedings of the 14th ACM international conference on Mobile computing and networking , 2008, MobiCom 2008.

[14]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[15]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[16]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Kang G. Shin,et al.  In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.

[18]  Wang Wenbo,et al.  Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[19]  Shu Wang,et al.  Correlation-based spectrum sensing in cognitive radio , 2009, CoRoNet '09.

[20]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[21]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[22]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.