Case Study I: Link Signature Assisted PUE Attack Detection

This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme. As discussed in the previous chapter, one of the main hurdles making the design of a PUE attack detection scheme nontrivial is the FCC’s requirement that no change should be made to the PU. Due to this requirement, most of the existing detection methods are designed solely for the SU side. Nonetheless, if one can deploy a nearby helper node that holds similar behavioral and physical properties as the PU and allow it to cooperate with the SU, the PUE detection performance may be further improved without disobeying the FCC’s requirement. To convey this idea, in this chapter, some background on link signature will be introduced first, followed by an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. Then, the overall link signature based PUE attack detection algorithm is illustrated.

[1]  Peng Ning,et al.  Toward Proper Guard Zones for Link Signature , 2016, IEEE Transactions on Wireless Communications.

[2]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[4]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[5]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[6]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[7]  Donald C. Cox,et al.  Correlation analysis based on MIMO channel measurements in an indoor environment , 2003, IEEE J. Sel. Areas Commun..

[8]  Dawn Xiaodong Song,et al.  Expander graphs for digital stream authentication and robust overlay networks , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[9]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[10]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[12]  Yao Liu,et al.  Where are you from?: confusing location distinction using virtual multipath camouflage , 2014, MobiCom.