Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture

Dynamic spectrum access is considered to be an emerging technology for enhancing RF spectrum efficiency where secondary unlicensed users access primacy licensed RF bands in an opportunistic manner for wireless communications. In dynamic spectrum access, RF spectrum geolocation database-driven approach has relieved the wireless devices from uncertainties caused by spectrum sensing at low signal levels. However, because of the openness in dynamic spectrum access environment, malicious users could mislead the overall communication resulting in no wireless services to legitimate secondary users. For instance, when secondary user queries the RF spectrum database, it sends a query along with its geolocation which could be intercepted and hijacked by the malicious users and block the secondary users from using available RF spectrum. To address this problem, we have developed a lightweight security technique where hash of a geolocation of the secondary user is used as a part of an encryption key to provide security in the Real-time Opportunistic Spectrum Access in Cloud-assisted Cognitive Radio Networks (ROAR) architecture. The proposed location-based lightweight security scheme leverages the secondary user's location (latitude, longitude and altitude) information to encrypt the data being transmitted to protect the system from possible malicious attacks. This approach has two stages: first, share the unique hash value generated using location information (i.e., longitude, latitude and altitude) secretly with the help of a pre-shared string with the ROAR's geolocation spectrum server. Second, the secondary users use their hash values obtained by using location information to encrypt the message being transmitted to their corresponding receivers. A key feature of this approach is that if a third party (malicious user) tries to send data to the geolocation spectrum database for querying the RF spectrum database, malicious actions will be detected and malicious users would not get the service for dynamic spectrum access. We evaluate the proposed approach using Monte Carlo simulations and experiments using software defined radios in ROAR architecture.

[1]  Hiroshi Harada,et al.  A Software Defined Cognitive Radio System: Cognitive Wireless Cloud , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[2]  Gongjun Yan,et al.  Signal processing techniques for spectrum sensing in cognitive radio systems: Challenges and perspectives , 2009, 2009 First Asian Himalayas International Conference on Internet.

[3]  Peng-Hua Wang,et al.  Cooperative Spectrum Sensing and Locationing: A Sparse Bayesian Learning Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[4]  Christian Brecher,et al.  Industrial Internet of Things and Cyber Manufacturing Systems , 2017 .

[5]  Danda B. Rawat ROAR: An architecture for Real-Time Opportunistic Spectrum Access in Cloud-assisted Cognitive Radio Networks , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[6]  Danda B. Rawat,et al.  Cyber-Physical Systems: From Theory to Practice , 2015 .

[7]  Mohamed El-Refaey,et al.  Cloud-assisted spectrum management system with trading engine , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[8]  Sachin Shetty,et al.  Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.

[9]  Shie-Yuan Wang,et al.  Optimizing the cloud platform performance for supporting large-scale cognitive radio networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[11]  Danda B. Rawat,et al.  nROAR: Near Real-Time Opportunistic Spectrum Access and Management in Cloud-Based Database-Driven Cognitive Radio Networks , 2017, IEEE Transactions on Network and Service Management.

[12]  Linda Doyle,et al.  Iris: an architecture for cognitive radio networking testbeds , 2010, IEEE Communications Magazine.

[13]  Sachin Shetty,et al.  Geolocation-aware resource management in cloud computing-based cognitive radio networks , 2014, Int. J. Cloud Comput..

[14]  Sachin Shetty,et al.  A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[15]  Danda B. Rawat,et al.  Securing Real-Time Opportunistic Spectrum Access in Cognitive Networks against Malicious Secondary Users , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[16]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[17]  Jonathan Rodriguez,et al.  Testbed for combination of local sensing with geolocation database in real environments , 2012, IEEE Wireless Communications.

[18]  Hsi-Lu Chao,et al.  A cloud model and concept prototype for cognitive radio networks , 2012, IEEE Wireless Communications.