Cryptographic link signatures for spectrum usage authentication in cognitive radio

Xi Tan, Kapil Borle, Wenliang Du, Biao Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Abstract

It was shown that most of the radio frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have been proposed. The idea is to allow secondary users to use a spectrum if the primary user (i.e., the legitimate owner of the spectrum) is not using it. To achieve this, secondary users should constantly monitor the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy monitoring is not easy. A malicious secondary user who wants to gain an unfair use of a spectrum can emulate the primary user, and can thus trick the other secondary users into believing that the primary user is using the spectrum when it is not. This attack is called the Primary User Emulation (PUE) attack. To prevent this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method that allows primary users to add a cryptographic link signature to its signal so the spectrum usage by primary users can be authenticated. This signature is added to the signal in a transparent way, such that the receivers (who do not care about the signature) still function as usual, while the cognitive radio receivers can retrieve the signature from the signal. We describe two schemes to add a signature, one using modulation, and the other using coding. We have analyzed the performance of both schemes.

Original languageEnglish (US)
Title of host publicationWiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security
Pages79-90
Number of pages12
DOIs
StatePublished - Aug 25 2011
Event4th ACM Conference on Wireless Network Security, WiSec'11 - Hamburg, Germany
Duration: Jun 15 2011Jun 17 2011

Publication series

NameWiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security

Other

Other4th ACM Conference on Wireless Network Security, WiSec'11
CountryGermany
CityHamburg
Period6/15/116/17/11

Keywords

  • Cognitive radio networks
  • Physical-layer authentication
  • Primary user emulation attack

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Cryptographic link signatures for spectrum usage authentication in cognitive radio'. Together they form a unique fingerprint.

  • Cite this

    Tan, X., Borle, K., Du, W., & Chen, B. (2011). Cryptographic link signatures for spectrum usage authentication in cognitive radio. In WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security (pp. 79-90). (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security). https://doi.org/10.1145/1998412.1998428