A framework for secure download for software-defined radio

This article proposes a framework for establishing secure download for software-defined radio (SDR) that follows the current recommendations of SDR-related organizations, and can be employed in a variety of SDR architectures. The main goals of the security system are verification of the declared identity of the source that produces the software to be downloaded, control and verification of integrity of the downloaded data, disabling of the ability to run unauthorized software on the software-defined terminal, and secrecy of the transmitted data to prevent problems such as loss of intellectual property contained in the software. The system includes the following parties: manufacturers of the terminal hardware and software; government authorities relevant for SDR and users of SDR terminals. The underlying ideas for system development include employment of four different cryptographic techniques and tamper-resistant hardware. The cryptographic techniques employed are a secret key encryption technique, a public key encryption technique, a technique for cryptographic hashing, and a technique for digital signature. An important feature of the system is that it provides the possibility to exchange cryptographic components in an automatic manner. The proposed system is flexible, highly secure to protect both users and manufacturers, and provides a framework for the secure commercial implementation of SDR.

[1]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[2]  Shuji Kubota,et al.  Research and developments of software-defined radio technologies in Japan , 2001, IEEE Commun. Mag..

[3]  Joseph Mitola,et al.  The software radio architecture , 1995, IEEE Commun. Mag..

[4]  Kazuhiro Uehara,et al.  Flexible security systems and a new structure for electronic commerce on software radio , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).

[5]  Mark Cummings,et al.  Mode switching and software download for software defined radio: the SDR Forum approach , 1999, IEEE Commun. Mag..

[6]  Ryuji Kohno,et al.  On wireless communications privacy and security evaluation of encryption techniques , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[7]  Jovan Dj. Golic,et al.  A method for convergence analysis of iterative probabilistic decoding , 2000, IEEE Trans. Inf. Theory.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[10]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[11]  N. Greco,et al.  Reconfigurable terminals: an overview of architectural solutions , 2001 .

[12]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.

[13]  Hideki Imai,et al.  A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack , 2000, FSE.

[14]  Hugo Krawczyk,et al.  The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.

[15]  Hideki Imai,et al.  Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..