Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation

被引:20
|
作者
Borle, Kapil M. [1 ]
Chen, Biao [1 ]
Du, Wenliang [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
关键词
Cognitive radio; physical layer; security; authentication; primary user emulation attack; USRP; GNU Radio;
D O I
10.1109/TIFS.2015.2452893
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.
引用
收藏
页码:2225 / 2235
页数:11
相关论文
共 50 条
  • [1] Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio
    Tan, Xi
    Borle, Kapil
    Du, Wenliang
    Chen, Biao
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 79 - 90
  • [2] An implementation of spectrum usage rights for liberalization of the radio spectrum
    Butler, Joe A.
    Webb, William T.
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2006, 8 (02) : 163 - 168
  • [3] Agile radio implementation of OFDM physical layer for dynamic spectrum access research
    Guffey, Jordan D.
    Wyglinski, Alexander M.
    Minden, Gary J.
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 4051 - +
  • [4] The Implementation of Spectrum Sensing and Spectrum Allocation on Cognitive Radio
    Rungsawang, Pitcha
    Khawne, Amnach
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 817 - 821
  • [5] Anomaly spectrum usage detection in multihop cognitive radio networks: A cross-layer approach
    Qian, Lijun
    Li, Xiangfang
    Wei, Shuangqing
    [J]. Journal of Communications, 2013, 8 (04): : 259 - 266
  • [6] Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks
    Yan, Shengnan
    Wang, Xiaoding
    Xu, Li
    [J]. IET COMMUNICATIONS, 2020, 14 (18) : 3128 - 3134
  • [7] Spectrum Usage Forecasting Model for Cognitive Radio Networks
    Yang, Wei
    Jing, Xiaojun
    Huang, Hai
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1489 - 1503
  • [8] Analysis and Implementation of Reliable Spectrum Sensing in OFDM Based Cognitive Radio
    Vijayakumar, P.
    George, Jeswin
    Malarvizhi, S.
    Sriram, A.
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 565 - 572
  • [9] Informed spectrum usage in cognitive radio networks: Interference cartography
    Alaya-Feki, Afef Ben Hadj
    Ben Jemaa, Sana
    Sayrac, Berna
    Houze, Paul
    Moulines, Eric
    [J]. 2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2688 - +
  • [10] Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks
    Lee, Changwoo
    Lee, Wonjun
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 320 - 327