Swathi Chandrashekar - Loukas Lazos

Slides:



Advertisements
Similar presentations
Multimedia and Mobile Communication Laboratory. Outline Multimedia and Mobile Communication Laboratory.
Advertisements

Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Natraj Jaganmohan (njaganm) Sandeep A Rao (sarao)
A discussion on channel sensing techniques By James Xu Supervised by Dr. Fakhrul Alam.
Multistage Spectrum Sensing for Cognitive Radios UCLA CORES.
1 Cognitive Radio Networks Zhu Jieming Group Presentaion Aug. 29, 2011.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Location Privacy Preservation in Collaborative Spectrum Sensing Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Shanghai Jiao Tong University Kai Xing.
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Spectrum Awareness in Cognitive Radio Systems based on Spectrum Sensing Miguel López-Benítez Department of Electrical Engineering and Electronics University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Performance Analysis of Energy Detector in Relay Based Cognitive Radio Networks Saman Atapattu Chintha Tellambura Hai Jiang.
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
SSC Page 1 Frequency Agile Spectrum Access Technologies Presentation to FCC Workshop on Cognitive Radios May 19, 2003 Mark McHenry Shared Spectrum Company.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
Spectrum Sensing in Emergency Cognitive Radio Ad Hoc Networks (CRAHNs) : A Multi-Layer Approach Sasirekha GVK,,Supervisor: Prof. Jyotsna Bapat, IIIT Bangalore.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Computer Architecture Lecture 30 Fasih ur Rehman.
1 Performance Analysis of Coexisting Secondary Users in Heterogeneous Cognitive Radio Network Xiaohua Li Dept. of Electrical & Computer Engineering State.
Performance of Energy Detection: A Complementary AUC Approach
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
Mingyuan Yan, Shouling Ji, and Zhipeng Cai Presented by: Mingyuan Yan.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Tarun Bansal, Bo Chen and Prasun Sinha
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
1 Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)5/15/2012 Advanced Radio Frequency Mapping (RadioMap) Dr. John Chapin.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Cognitive Radio: Next Generation Communication System
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Spectrum Sensing In Cognitive Radio Networks
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
Hiding Contextual Information in WSNs Alejandro Proaño and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
Cognitive Radio Networks
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
Channel Sensing for Cognitive Radio
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Efficient Positioning Method using Beacon Frames
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Intrusion Tolerance for NEST
Information Technology - Information Networks
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Cognitive Radio Based 5G Wireless Networks
David Starobinski Boston University 11/03/2016
A Framework of Belief Propagation for Cognitive Radio Security
Design Tool for Spectrum Sensing of Cognitive Radio
Attack-Resistant Location Estimation in Sensor Networks
Presented by Mohamad Haidar, Ph.D. May 13, 2009 Moncton, NB, Canada
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Spectrum Sharing in Cognitive Radio Networks
An Improved Novel Key Management Protocol for RFID Systems
Protocols.
Suman Bhunia, Shamik Sengupta, Felisa Vazquez-Abad
Security in SDR & cognitive radio
Protocols.
Presentation transcript:

A Primary User Authentication System for Mobile Cognitive Radio Networks Swathi Chandrashekar - Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona COGART 2010

Co-existence of a CRN with PRNs (1) (3) 9 PU1 8 free channels (6,7,8,9,10) PU2 (5) 6,7 SU (2) (4) PU5 PU3 PU4 PRN channels: 1-10

Spectrum Sensing Process Secondary users sense the medium for PU activity Energy-based detection Cyclostationary feature extraction Cooperative–diversity based detection PU SU PU signal is NOT AUTHENTICATED I am a PU adversary SU 5/24/2010

Problem Statement Authentication of the PU signal at the SUs Classic point-to-point authentication problem, but, Additional complexities Authentication has to be performed frequently (FCC mandates a 2 sec sensing period) No modification of the legacy system No interaction between PU and SU 5/24/2010

Detection of PUE Attacks – State of the Art Step 1 [Liu et al., 2010] (1) signature based on amplitude h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

Detection of PUE Attacks – State of the Art Step 2 (1) RF training h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

Detection of PUE Attacks – State of the Art Step 3 (1) Link signature h1 (3) PU1 h2 PU2 (5) SU (2) h5 (4) PU5 h3 h4 PU3 PU4 Helper node

Pros and Cons Pros Works well for static CRNs (training is performed sparingly) Does not require helpers to be awake at all times Helpers are placed at physically secure locations (PU premises) Cons Retraining needed with small position changes – not efficient for mobile CRNs Helpers must be as powerful as the PUs – not practical for TV stations (KW range) Helpers placed at the PU premises – Legacy network operators must consent

Our Contribution – Proposed System Architecture (1,3) Helpers placed in the area of interest – need not cover the same area as the PUs Helpers authenticate PU signals based on link signatures Helpers provide spectrum info to SUs SUs authenticate helper info based on crypto methods (2,10) (4,5,6,7,8,9) PU1 PU2 h3 link signature (6,7,8) (2,6,7,8,10) SU1 h1 (6,7,8) link signature h2 SU2 (4,5,9) (2,6,7,8,10) h4 PU3

PU – Helper Authentication Exploit the uniqueness of the multipath components RF characteristics between two points serve as a “signature” Helper is trained to the PU signal (initialization)

Helper - SU Authentication mi || sig(mi) hi mi : Vi || Li || SNi Vi : spectrum occupancy vector Li : the helper location SNi : a sequence number SU SU obtains occupancy vectors from all the neighbor helpers Helpers are synchronized to the same sequence number value Decision about the final channel occupancy is based on Spectrum Allocation Algorithm (AND rule on the occupancy vectors)

Security Analysis – Resistance to a PUE Attack Link Signature h PU Link Signature fails Emulate PU This attack is not possible as long as the PU is physically secure (not within a few wavelengths from the PU)

Security Analysis - Helper Impersonation Attack mi || sig(mi) mj || sig(mj) Adversary cannot impersonate a helper without the proper cryptographic credentials

Security Analysis – Replay Attack mi || sig(mi) mi || sig(mi) mi : Vi || Li || SNi A fresh SN is needed as long as one benign helper is heard at the SU Replays of messages with stale SNs are detected

Security Analysis – Wormhole Attack PU Region B Region A |Li – Lj|< 2r h4 h5 h10 V* h6 Wormhole link SU h1 n9 h3 h8 h2 h7 PU PU

Work in Progress Analytically evaluate the security level against replays Take into account misdetection and false alarm events, node distribution, comm. range, etc. Evaluate the communication overhead under various mobility models Identify possible tradeoffs between security and resource overhead Consider different strategies for alleviating costs; periodic and on-demand information update, computation-efficient crypto