Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

Kapil M. Borle, Biao Chen, Wenliang Du

Research output: Contribution to journalArticle

13 Citations (Scopus)

Abstract

Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.

Original languageEnglish (US)
Article number7150393
Pages (from-to)2225-2235
Number of pages11
JournalIEEE Transactions on Information Forensics and Security
Volume10
Issue number10
DOIs
StatePublished - Oct 1 2015

Fingerprint

Cognitive radio
Authentication
Hash functions
Software radio
Degradation

Keywords

  • authentication
  • cognitive radio
  • GNU Radio
  • physical layer
  • primary user emulation attack
  • security
  • USRP

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Physical layer spectrum usage authentication in cognitive radio : Analysis and implementation. / Borle, Kapil M.; Chen, Biao; Du, Wenliang.

In: IEEE Transactions on Information Forensics and Security, Vol. 10, No. 10, 7150393, 01.10.2015, p. 2225-2235.

Research output: Contribution to journalArticle

@article{0f07d54f79cf425ea60f4e2b58ed72af,
title = "Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation",
abstract = "Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.",
keywords = "authentication, cognitive radio, GNU Radio, physical layer, primary user emulation attack, security, USRP",
author = "Borle, {Kapil M.} and Biao Chen and Wenliang Du",
year = "2015",
month = "10",
day = "1",
doi = "10.1109/TIFS.2015.2452893",
language = "English (US)",
volume = "10",
pages = "2225--2235",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "10",

}

TY - JOUR

T1 - Physical layer spectrum usage authentication in cognitive radio

T2 - Analysis and implementation

AU - Borle, Kapil M.

AU - Chen, Biao

AU - Du, Wenliang

PY - 2015/10/1

Y1 - 2015/10/1

N2 - Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.

AB - Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.

KW - authentication

KW - cognitive radio

KW - GNU Radio

KW - physical layer

KW - primary user emulation attack

KW - security

KW - USRP

UR - http://www.scopus.com/inward/record.url?scp=84940705959&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84940705959&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2015.2452893

DO - 10.1109/TIFS.2015.2452893

M3 - Article

AN - SCOPUS:84940705959

VL - 10

SP - 2225

EP - 2235

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 10

M1 - 7150393

ER -