Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

To address the increasing demand for wireless bandwidth, cognitive radio networks (CRNs) have been proposed to increase the efficiency of channel utilization; they enable the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis. A secondary user in a CRN should constantly monitor for the presence of a primary user's signal to avoid interfering with the primary user. However, to gain unfair share of radio channels, an attacker (e.g., a selfish secondary user) may mimic a primary user's signal to evict other secondary users. Therefore, a secure primary user detection method that can distinguish a primary user's signal from an attacker's signal is needed. A unique challenge in addressing this problem is that Federal Communications Commission (FCC) prohibits any modification to primary users. Consequently, existing cryptographic techniques cannot be used directly. In this paper, we develop a novel approach for authenticating primary users' signals in CRNs, which conforms to FCC's requirement. Our approach integrates cryptographic signatures and wireless link signatures (derived from physical radio channel characteristics) to enable primary user detection in the presence of attackers. Essential to our approach is a {\em helper node} placed physically close to a primary user. The helper node serves as a "bridge" to enable a secondary user to verify cryptographic signatures carried by the helper node's signals and then obtain the helper node's authentic link signatures to verify the primary user's signals. A key contribution in our paper is a novel physical layer authentication technique that enables the helper node to authenticate signals from its associated primary user. Unlike previous techniques for link signatures, our approach explores the geographical proximity of the helper node to the primary user, and thus does not require any training process.

[1]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[2]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[4]  Zhou Xianwei,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .

[5]  Ying-Chang Liang,et al.  Adaptive Scheduling of Spectrum Sensing Periods in Cognitive Radio Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[6]  Stephen J. Shellhammer,et al.  Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs , 2006, TAPAS '06.

[7]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[8]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[9]  Sai Shankar Nandagopalan,et al.  IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..

[10]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[11]  Shu Wang,et al.  Correlation-based spectrum sensing in cognitive radio , 2009, CoRoNet '09.

[12]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[13]  Sneha Kumar Kasera,et al.  Advancing wireless link signatures for location distinction , 2008, MobiCom '08.

[14]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[15]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .

[16]  Kiran Challapali,et al.  Cognitive PHY and MAC layers for dynamic spectrum access and sharing of TV bands , 2006, TAPAS '06.

[17]  Kang G. Shin,et al.  In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.

[18]  K. Ramchandran,et al.  Detecting primary receivers for cognitive radio applications , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[19]  Zhongding Lei,et al.  DVB Detector for Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.

[20]  C. Cordeiro,et al.  Spectrum agile radios: utilization and sensing architectures , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[21]  M. V. Clark,et al.  A new path-gain/delay-spread propagation model for digital cellular channels , 1997 .

[22]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Dawn Xiaodong Song,et al.  Expander graphs for digital stream authentication and robust overlay networks , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[24]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  André B. J. Kokkeler,et al.  Cyclostationary Feature Detection on a tiled-SoC , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[26]  Shaoqian Li,et al.  Weighted-Clustering Cooperative Spectrum Sensing in Cognitive Radio Context , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[27]  Wang Wenbo,et al.  Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio , 2009, 2009 WRI International Conference on Communications and Mobile Computing.