SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Dynamic spectrum access is the key to solving worldwide spectrum shortage. The open wireless medium subjects DSA systems to unauthorized spectrum use by illegitimate users. This paper presents SpecGuard, the first crowdsourced spectrum misuse detection framework for DSA systems. In SpecGuard, a transmitter is required to embed a spectrum permit into its physical-layer signals, which can be decoded and verified by ubiquitous mobile users. We propose three novel schemes for embedding and detecting a spectrum permit at the physical layer. Detailed theoretical analyses, MATLAB simulations, and USRP experiments confirm that our schemes can achieve correct, low-intrusive, and fast spectrum misuse detection.

[1]  Wenliang Du,et al.  Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.

[2]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[3]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[4]  Ami Wiesel,et al.  SNR estimation in time-varying fading channels , 2006, IEEE Transactions on Communications.

[5]  Rui Zhang,et al.  SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users , 2015, CCS.

[6]  Ming Li,et al.  Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  Umberto Mengali,et al.  A comparison of pilot-aided channel estimation methods for OFDM systems , 2001, IEEE Trans. Signal Process..

[8]  Ben Y. Zhao,et al.  Toward Practical Spectrum Permits , 2017, IEEE Transactions on Cognitive Communications and Networking.

[9]  G. Denker,et al.  A Policy Engine for Spectrum Sharing , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[10]  Kaigui Bian,et al.  Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.

[11]  Kang G. Shin,et al.  Detection of Small-Scale Primary Users in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[12]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[13]  Carl A. Gunter,et al.  Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[14]  Dirk Grunwald,et al.  Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.

[15]  Chunming Qiao,et al.  Crowdsourcing Access Network Spectrum Allocation Using Smartphones , 2014, HotNets.

[16]  Rui Zhang,et al.  Secure crowdsourced radio environment map construction , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).

[17]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  Shuai Li,et al.  Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Tao Li,et al.  DPSense: Differentially Private Crowdsourced Spectrum Sensing , 2016, CCS.

[20]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[21]  Konstantina Papagiannaki,et al.  Towards an Energy-Star WLAN Infrastructure , 2007 .

[22]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[23]  Kaigui Bian,et al.  PHY-layer authentication by introducing controlled inter symbol interference , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[24]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[25]  Chi Zhang,et al.  Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[26]  Paramvir Bahl,et al.  Towards an Architecture for Efficient Spectrum Slicing , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.

[27]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[28]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[30]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[31]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[32]  Zhenfu Cao,et al.  Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.

[33]  Xiaocong Jin,et al.  Privacy-preserving crowdsourced spectrum sensing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[34]  Lei Yang,et al.  Enforcing dynamic spectrum access with spectrum permits , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.