Security in SDR & cognitive radio

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Cryptography, Authentication and Digital Signatures
ACM 511 Introduction to Computer Networks. Computer Networks.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Ch 13 Trustworthiness Myungchul Kim
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Information System and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Information Security.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Cryptographic Hash Function
Security Shmuel Wimer prepared and instructed by
CNET334 - Network Security
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Web Information Systems Engineering (WISE)
Cryptography and Network Security Chapter 1
Introduction to Cryptography
An Overview of Security Issues in Sensor Network
Mohammad Alauthman Computer Security Mohammad Alauthman
Cryptography and Network Security
A Model For Network Security
Cryptography and Network Security Chapter 1
Security in Wide Area Networks
Presentation transcript:

Security in SDR & cognitive radio Ali Shamsizadeh Summer 2009

Introduction Background on Network Security Security Concerns in Mobile Systems Security in SDR Secure Software Download in SDR Security in Cognitive Radio Security Threats in Cognitive Radio Networks

Background on Network Security Authentication: “Who are you?” Authorization: “Should you be doing that?” Confidentiality: “If someone gets the packets, can they recover the information?” Integrity: “Is what I get really what I should get?”

Background on Network Security Hostile environment A third party might want to disturb communication Attacks might be against confidentiality integrity originality Or the service (denial of service)

Background on Network Security Application security requirements • Eavesdropping protection (encryption) • Impersonation and integrity protection (authenticated and hashed messages) • Denial of service protection • Secure device configuration and user identification • Security for an unreliable channel

Security Concerns in Mobile Systems User identification Secure storage A secure software execution environment tamper-resistant system Secure network access Secure data communications Content security

Security Concerns in Mobile Systems Attack scenarios (third radio) Transmit noise at a frequency that might be in use Spread noise at available frequencies by jumping Listen for transmission and transmit noise at that frequency (may include jumping) Replay, modify, inject messages

Security in SDR the functions of software-defined radio (SDR) can be changed by changing its software. Therefore, many security problems that have never been seen in the conventional fixed wireless terminals will arise.

Security in SDR Requirements Protected download Policy-driven behavior An SDR device SHALL enforce a device-specific SDR security policy that governs the behavior of the device at all times. Policy freshness The SDR device SHALL ensure that its device-specific SDR security policy incorporates the SDR security policies of its stakeholders within the scope of their authority. Device attestation An SDR device SHALL provide trusted configuration information to its communications service providers on request. Protected download An SDR device SHALL provide confidentiality and integrity services for download of SDR-related software and configuration data.

Security in SDR Policy-compliant installation and instantiation An SDR device SHALL only install and instantiate SDR-related software and policy that have been appropriately certified to be compliant with the device’s SDR security policy. Run-time control An SDR device SHALL at run-time prevent transmissions that violate its SDR security policy. Resource integrity An SDR device SHALL detect the unauthorized modification of its SDR-related resources and use that information to prevent additional unauthorized behavior. Access control SDR devices SHALL control access to each SDR-related resource on the device.

Security in SDR Audit Process separation Implementation assurance An SDR device SHALL detect, log and notify specified processes of security related events. Process separation An SDR device SHALL have mechanisms to prevent SDR applications from compromising the security of non-SDR-related applications and data. Implementation assurance Information assurance mechanisms SHALL be based on industry standards and validated technology. Supportive operations Operational practices supporting information assurance mechanisms SHALL be consistent with and supportive of the SDR security policy.

Secure Software Download in SDR Download Model in SDR

Secure Software Download in SDR Verification of integrity Must be a method of ensuring that the software downloaded is intact and has not been modified Authentication It has obtained government approval Furthermore In the event that some illegally modified software is created, there should be some mechanism to prevent the spread of that illegal software. For the introduction of a software downloadable SDR system, the software should be protected against theft by people or companies who would like to know the details of the software employed by a rival company

Secure Software Download in SDR Secret key encryption Public key encryption A technique for cryptographic hashing A technique for cryptographic signature

Security in Cognitive Radio Characteristics of cognitive radio

Security in Cognitive Radio Security threats in CR Artificial intelligence behavior threats Policy threats Learning threats Parameters threats

Security in Cognitive Radio Security threats in CR Dynamic spectrum access threats Spectrum sensing threats Spectrum management threats Spectrum mobility threats

Security Threats in Cognitive Radio Networks Characteristics of cognitive radio network

Security Threats in Cognitive Radio Networks threats to a cognitive radio network sensory input statistics can be altered faulty sensory input statistics can lead to belief manipulation manipulated individual statistics and beliefs may be distributed through a cognitive radio network behavior algorithms based on manipulated statistics and beliefs can result in suboptimal performance or maliciousbehavior

Security Threats in Cognitive Radio Networks To mitigate the effectiveness of previous attacks, cognitive radios should: always assume sensory input statistics are “noisy” and subject to manipulation; be programmed with some amount of “common sense” to attempt to validate learned beliefs; compare and validate learned beliefs with other devices on the network; expire learned beliefs to prevent long-term effects of attackers attempt to perform learning in known-good environments

FUTURE RESEARCH Understanding Identity Earning and Using Trust Trust in Networking and Routing

Thanks For Your Attention