Secure and Optimized Unauthorized Secondary User Detection in Dynamic Spectrum Access

被引:0
|
作者
Zhang, Xiaonan [1 ]
Jia, Qi [1 ]
Guo, Linke [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
来源
2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2017年
基金
美国国家科学基金会;
关键词
Dynamic Spectrum Access; Unauthorized SU Detection; Security; Accuracy; Efficiency; HIERARCHICAL MODULATION; CODES; ERROR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to authorized SU but also disable the DSA system due to the lack of stability and incentives. In this paper, we propose a secure and optimized unauthorized SU detection scheme. By optimizing permit modulation and embedding based on the current channel condition, we shorten the unauthorized SU's detection period and further improve the accuracy with low-complexity implementation. The proposed scheme ensures the security of DSA system and will further unleash its great potential. Extensive experimental results using both MATLAB and Universal Software Radio Peripheral (USRP) demonstrate the effectiveness, efficiency, and accuracy of our proposed scheme.
引用
收藏
页码:254 / 262
页数:9
相关论文
共 50 条
  • [21] Robust Detection of Unauthorized Wireless Access Points
    Yan, Bo
    Chen, Guanling
    Wang, Jie
    Yin, Hongda
    MOBILE NETWORKS & APPLICATIONS, 2009, 14 (04): : 508 - 522
  • [22] Robust Detection of Unauthorized Wireless Access Points
    Bo Yan
    Guanling Chen
    Jie Wang
    Hongda Yin
    Mobile Networks and Applications, 2009, 14 : 508 - 522
  • [23] Representation of User Satisfaction and Fairness Evaluation for User-centric Dynamic Spectrum Access
    Ha Nguyen Tran
    Hasegawa, Mikio
    Murata, Yoshitoshi
    Harada, Hiroshi
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 838 - 842
  • [24] Preventing unauthorized access to user accounts in a telemedicine consultation system
    V. V. Perminov
    V. E. Antciperov
    D. S. Nikitov
    S. A. Nikitov
    Journal of Communications Technology and Electronics, 2009, 54 : 1319 - 1321
  • [25] Background Detection of Primary User Activity in Opportunistic Spectrum Access
    Alcaraz, Juan J.
    Lopez-Martinez, Mario
    Vales-Alonso, Javier
    Garcia-Haro, Joan
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 1422 - 1427
  • [26] DETECTION OF DYNAMIC PRIMARY USER WITH COOPERATIVE SPECTRUM SENSING
    Senadji, Bouchra
    Chang, Kevin
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [27] Preventing unauthorized access to user accounts in a telemedicine consultation system
    Perminov, V. V.
    Antciperov, V. E.
    Nikitov, D. S.
    Nikitov, S. A.
    JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS, 2009, 54 (11) : 1319 - 1321
  • [28] User Authentication to Access Secure Data
    Navratil, Pavel
    Slavicek, Karel
    Dostal, Otto
    CESNET CONFERENCE 2006: FIRST CESNET CONFERENCE ON ADVANCED COMMUNICATIONS AND GRIDS, 2006, : 127 - 132
  • [29] Performance Evaluation of Secondary Users in Dynamic Spectrum Access System
    Huang Qing
    Xu Shaoyi
    Jin Xiaojun
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 710 - 714
  • [30] Dynamic Cooperative Secondary Access in Hierarchical Spectrum Sharing Networks
    Wang, Liping
    Fodor, Viktoria
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (11) : 6068 - 6080