Presentation is loading. Please wait.

Presentation is loading. Please wait.

Swathi Chandrashekar - Loukas Lazos

Similar presentations


Presentation on theme: "Swathi Chandrashekar - Loukas Lazos"— Presentation transcript:

1 A Primary User Authentication System for Mobile Cognitive Radio Networks
Swathi Chandrashekar - Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona COGART 2010

2 Co-existence of a CRN with PRNs
(1) (3) 9 PU1 8 free channels (6,7,8,9,10) PU2 (5) 6,7 SU (2) (4) PU5 PU3 PU4 PRN channels: 1-10

3 Spectrum Sensing Process
Secondary users sense the medium for PU activity Energy-based detection Cyclostationary feature extraction Cooperative–diversity based detection PU SU PU signal is NOT AUTHENTICATED I am a PU adversary SU 5/24/2010

4 Problem Statement Authentication of the PU signal at the SUs Classic point-to-point authentication problem, but, Additional complexities Authentication has to be performed frequently (FCC mandates a 2 sec sensing period) No modification of the legacy system No interaction between PU and SU 5/24/2010

5 Detection of PUE Attacks – State of the Art
Step 1 [Liu et al., 2010] (1) signature based on amplitude h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

6 Detection of PUE Attacks – State of the Art
Step 2 (1) RF training h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

7 Detection of PUE Attacks – State of the Art
Step 3 (1) Link signature h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

8 Pros and Cons Pros Works well for static CRNs (training is performed sparingly) Does not require helpers to be awake at all times Helpers are placed at physically secure locations (PU premises) Cons Retraining needed with small position changes – not efficient for mobile CRNs Helpers must be as powerful as the PUs – not practical for TV stations (KW range) Helpers placed at the PU premises – Legacy network operators must consent

9 Our Contribution – Proposed System Architecture
(1,3) Helpers placed in the area of interest – need not cover the same area as the PUs Helpers authenticate PU signals based on link signatures Helpers provide spectrum info to SUs SUs authenticate helper info based on crypto methods (2,10) (4,5,6,7,8,9) PU1 PU2 h3 link signature (6,7,8) (2,6,7,8,10) SU1 h1 (6,7,8) link signature h2 SU2 (4,5,9) (2,6,7,8,10) h4 PU3

10 PU – Helper Authentication
Exploit the uniqueness of the multipath components RF characteristics between two points serve as a “signature” Helper is trained to the PU signal (initialization)

11 Helper - SU Authentication
mi || sig(mi) hi mi : Vi || Li || SNi Vi : spectrum occupancy vector Li : the helper location SNi : a sequence number SU SU obtains occupancy vectors from all the neighbor helpers Helpers are synchronized to the same sequence number value Decision about the final channel occupancy is based on Spectrum Allocation Algorithm (AND rule on the occupancy vectors)

12 Security Analysis – Resistance to a PUE Attack
Link Signature h PU Link Signature fails Emulate PU This attack is not possible as long as the PU is physically secure (not within a few wavelengths from the PU)

13 Security Analysis - Helper Impersonation Attack
mi || sig(mi) mj || sig(mj) Adversary cannot impersonate a helper without the proper cryptographic credentials

14 Security Analysis – Replay Attack
mi || sig(mi) mi || sig(mi) mi : Vi || Li || SNi A fresh SN is needed as long as one benign helper is heard at the SU Replays of messages with stale SNs are detected

15 Security Analysis – Wormhole Attack
PU Region B Region A |Li – Lj|< 2r h4 h5 h10 V* h6 Wormhole link SU h1 n9 h3 h8 h2 h7 PU PU

16 Work in Progress Analytically evaluate the security level against replays Take into account misdetection and false alarm events, node distribution, comm. range, etc. Evaluate the communication overhead under various mobility models Identify possible tradeoffs between security and resource overhead Consider different strategies for alleviating costs; periodic and on-demand information update, computation-efficient crypto


Download ppt "Swathi Chandrashekar - Loukas Lazos"

Similar presentations


Ads by Google