Cognitive Radio Network Security

34
7/21/2019 Cognitive Radio Network Security http://slidepdf.com/reader/full/cognitive-radio-network-security 1/34

description

Cognitive Radio Network Security A taxonomy of CR security threatsPrimary user emulation attacksByzantine failures in distributed spectrum sensingSecurity vulnerabilities in IEEE 802.22

Transcript of Cognitive Radio Network Security

Page 1: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 1/34

Page 2: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 2/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"# 2

/u)line

A )'0onomy o1 %+ securi)y )&re')s

2rim'ry user emul')ion '))'cks

By3'n)ine 1'ilures in is)ribu)e sec)rum sensing

ecuri)y vulner'bili)ies in 4EEE 5!.

Page 3: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 3/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"# 3

4n)rouc)ion

uccess1ul eloymen) o1 %+ ne)-orks 'n )&e re'li3')ion o1)&eir bene1i)s -ill een on )&e l'cemen) o1 essen)i'lsecuri)y mec&'nisms

Emergence o1 )&e oor)unis)ic sec)rum s&'ring (/#'r'igm 'n cogni)ive r'io )ec&nology r'ises ne- securi)yimlic')ions )&') &'ve no) been s)uie reviously

+ese'rc&ers &'ve only recen)ly s)'r)e )o e0'mine )&e securi)yissues seci1ic )o %+ evices 'n ne)-orks

Page 4: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 4/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

ome +ecen) 2ublic')ions on %+ecuri)y

4

• +. %&en, 6. 2'rk, 7 6. +ee, “De1ense 'g'ins) rim'ry useremul')ion '))'cks in cogni)ive r'io ne)-orks,” IEEE Journal onSelected Areas in Communications, vol. 8, no. $, 6'n. !!5.

• +. %&en, 6. 2'rk, T. Hou, 7 6. +ee, “To-'r secure is)ribu)e

sec)rum sensing in cogni)ive r'io ne)-orks,” IEEE Comm.Magaine, vol. 98, no. 9, !!5.

• . :i'o, 6. 2'rk, 'n Y. Ye, “T'mer +esis)'nce 1or o1)-'reDe1ine +'io o1)-'re,” IEEE Computer So!tware and

 Applications Con!erence, 6uly !!".

• ;. Bi'n 'n 6. 2'rk, “ecuri)y <ulner'bili)ies in 4EEE 5!.,”

"ourt# International $ireless Internet Con!erence, Nov. !!5.

Page 5: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 5/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

ome +ecen) 2ublic')ions on %+ecuri)y

• T. %l'ncy, N. =oergen, “ecuri)y in %ogni)ive +'io Ne)-orks>T&re')s 'n Mi)ig')ion,” Int%l Con!erence on Cognitive Radio&riented $ireless Networks and Communications, M'y !!5.

•  T.B. Bro-n 'n A. e)&i, “2o)en)i'l cogni)ive r'io eni'l?o1?service vulner'bili)ies 'n ro)ec)ion coun)erme'sures> 'mul)i?imension'l 'n'lysis 'n 'ssessmen),” Journal o! Mo'ileNetworks and Applications, vol. $@, no. *, /c). !!5.

•  A. Br'-erm'n e) 'l., “To-'rs ' 1r'u?reven)ion 1r'me-ork1or so1)-'re e1ine r'io mobile evices,” E(RASIP Journal on$ireless Comm. and Networking, vol. !!*, no. @, !!*.

•  .B. Mic&'el e) 'l., “A 1r'me-ork 1or secure o-nlo' 1orso1)-'re?e1ine r'io,” IEEE Comm. Magaine, 6uly !!.

•  2. l'nig'n e) 'l., “Dyn'mic olicy en1orcemen) 1or so1)-'ree1ine r'io,” )*t# Annual Simulation S+mposium, !!*.

5

Page 6: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 6/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

A T'0onomy o1 %+ ecuri)y T&re')s

6

C R n e t w o r k  

s e c u r i t y t h r e a t s

R a d i o s o f t w a r e

s e c u r i t y t h r e a t s

S p e c t r u m a c c e s s -

r e l a t e d s e c u r i t y t h r e a t s

T h r e a t s t o i n c u m b e n t

c o e x i s t e n c e m e c h a n i s m s

T h r e a t s t o s e l f -

c o e x i s t e n c e m e c h a n i s m s

• S e c u r i t y t h r e a t s t o t h e

s o f t w a r e d o w n l o a d p r o c e s s

• S p e c t r a l “ h o n e y p o t s ”

• S e n s o r y m a n i p u l a t i o n :

- P r i m a r y u s e r e m u l a t i o n

- e o s p a t i a l m a n i p u l a t i o n

- C h a ! p o i n t a t t a c k  

- S p a m p o i n t b i a s a t t a c k

• " b s t r u c t s y n c h r o n i # a t i o n o f $ P s

• T x f a l s e % s p u r i o u s i n t e r - c e l l

b e a c o n s & c o n t r o l m e s s a ' e s (

• ) x p l o i t % o b s t r u c t i n t e r - c e l l

s p e c t r u m s h a r i n ' p r o c e s s e s

• * n a u t h o r i # e d p o l i c y c h a n ' e s

• T a m p e r i n ' w % C R r e a s o n e r s

& e + ' + , S y s t e m S t r a t e ' y R e a s o n e r

P o l i c y R e a s o n e r (

• S o f t w a r e . P t h e f t

• S o f t w a r e t a m p e r i n '

• . n / e c t i o n o f f a l s e % f o r ' e d

p o l i c i e s

• . n / e c t i o n o f f a l s e % f o r ' e d

S 0 u p d a t e s

• . n / e c t i o n o f m a l i c i o u s S 0

& 1 i r u s e s (

Page 7: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 7/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

T&e 4mor)'nce o1 Dis)inguis&ing2rim'ry Csers 1rom econ'ry Csers

ec)rum us'ge scen'rio 1or ' secon'ry user 2erioic'lly se'rc& 1or sec)rum “-&i)e s'ces” (i.e.,

1'llo- b'ns# )o )r'nsmi)receive ')'

W&en ' rim'ry user is e)ec)e in i)s sec)rum b'n

4mmei')ely v'c')e )&') b'n 'n s-i)c& )o ' v'c'n)one “ver)ic'l sec)rum s&'ring” 

W&en 'no)&er secon'ry user is e)ec)e in i)ssec)rum b'n W&en )&ere 're no be))er sec)rum oor)uni)ies, i)

m'y c&oose )o s&'re )&e b'n -i)& )&e e)ec)esecon'ry user “&ori3on)'l sec)rum s&'ring” 

%+ MA% ro)ocol gu'r'n)ees 1'ir resource 'lloc')ion'mong secon'ry users

7

Page 8: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 8/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

2rim'ry Cser Emul')ion A))'cks

8

Page 9: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 9/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

E0is)ing Tec&niue ($#> Csing EnergyDe)ec)ion )o %onuc) ec)rum ensing

Trus) moel An energy e)ec)or me'sures + energy or )&e +

)o e)ermine -&e)&er ' given c&'nnel is ile or no)

econ'ry users c'n recogni3e e'c& o)&erFs sign'ls

'n s&'re ' common ro)ocol, 'n )&ere1ore 're 'ble)o ien)i1y e'c& o)&er

41 'n unien)i1ie user is e)ec)e, i) is consiere 'rim'ry user

9

Page 10: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 10/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

E0is)ing Tec&niue ($#> Csing EnergyDe)ec)ion )o %onuc) ec)rum ensing

2roblem> 41 ' m'licious secon'ry user)r'nsmi)s ' sign'l )&') is no) recogni3e byo)&er secon'ry users, i) -ill be ien)i1ie 's 'rim'ry user by )&e o)&er secon'ry users

4n)er1erence )o rim'ry users 2reven)s o)&er secon'ry users 1rom 'ccessing )&')

b'n

10

Page 11: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 11/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

E0is)ing Tec&niue (#> M')c&e il)er 'n%yclos)')ion'ry e')ure De)ec)ion

Trus) moel M')c&e 1il)er 'n cyclos)')ion'ry 1e')ure e)ec)ors

're 'ble )o recogni3e )&e is)inguis&ingc&'r'c)eris)ics o1 rim'ry user sign'ls

econ'ry users c'n ien)i1y e'c& o)&erFs sign'ls 2roblem> 41 ' m'licious secon'ry user

)r'nsmi)s sign'ls )&') emul')e )&ec&'r'c)eris)ics o1 rim'ry user sign'ls, i) -ill beien)i1ie 's ' rim'ry user by )&e o)&er

secon'ry users 4n)er1erence )o rim'ry users

2reven)s o)&er secon'ry users 1rom 'ccessing )&')b'n

11

Page 12: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 12/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

E0is)ing Tec&niue (@#> Guie) 2erio1or ec)rum ensing

Trus) moel De1ine ' “uie) erio” )&') 'll secon'ry users s)o

)r'nsmission. 4) is eic')e 1or sec)rum sensing.

Any user e)ec)e in )&e uie) erio (using energy

e)ec)or, m')c&e 1il)er or cyclos)')ion'ry 1e')uree)ec)or# is ' rim'ry user

2roblem> 41 ' m'licious secon'ry user )r'nsmi)ssign'ls in )&e uie) erio, i) -ill be ien)i1ie 's' rim'ry user by )&e o)&er secon'ry users 4n)er1erence )o rim'ry users

2reven)s o)&er secon'ry users 1rom 'ccessing )&')b'n

12

Page 13: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 13/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

T&e Disru)ive E11ec)s o1 2rim'ry CserEmul')ion A))'cks

13

Malicious PUE attacksSelfish PUE attacks

Page 14: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 14/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

Tr'nsmi))er <eri1ic')ion 1or ec)rumensing

Tr'nsmi))er veri1ic')ion 1or sec)rum sensing iscomose o1 )&ree rocesses>

<eri1ic')ion o1 sign'l c&'r'c)eris)ics

Me'suremen) o1 receive sign'l energy level

oc'li3')ion o1 )&e sign'l source

14

Page 15: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 15/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

A lo-c&'r) o1 )r'nsmi))er veri1ic')ion

15

Page 16: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 16/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

%&'llenges in 2T oc'li3')ion

2rim'ry sign'l )r'nsmi))er (2T# loc'li3')ion is morec&'llenging )&'n )&e s)'n'r loc'li3')ion roblem ue )o )-ore'sons

No moi1ic')ion s&oul be m'e )o rim'ry users )o'ccommo')e )&e DA o1 license sec)rum. T&is

reuiremen) e0clues )&e ossibili)y o1 using ' loc'li3')ionro)ocol )&') involves )&e in)er'c)ion be)-een ' rim'ryuser 'n )&e loc'li3')ion evice(s#.

    2T loc'li3')ion roblem is ' non?in)er'c)iveloc'li3')ion roblem

W&en ' receiver is loc'li3e, one oes no) nee )o consier)&e e0is)ence o1 o)&er receivers. Ho-ever, )&e e0is)ence o1mul)ile )r'nsmi))ers m'y ' i11icul)y )o )r'nsmi))erloc'li3')ion

16

Page 17: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 17/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

A solu)ion )o 2T oc'li3')ion

M'gni)ue o1 'n + v'lue )yic'lly ecre'ses 's )&e is)'ncebe)-een )&e sign'l )r'nsmi))er 'n )&e receiver incre'ses

41 one is 'ble )o collec) ' su11icien) number o1 +me'suremen)s 1rom ' grou o1 receivers sre' )&roug&ou) 'l'rge ne)-ork, )&e loc')ion -i)& )&e e'k + v'lue is likely )o

be )&e loc')ion o1 ' )r'nsmi))er.

Av'n)'ge o1 )&is )ec&niue is )-o1ol,

/bvi')es moi1ic')ion o1 rim'ry users 'n

uor)s loc'li3ing mul)ile )r'nsmi))ers )&') )r'nsmi)sign'ls simul)'neously

17

Page 18: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 18/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

By3'n)ine 1'ilures in is)ribu)esec)rum sensing

%'use o1 By3'n)ine 1'ilures in is)ribu)e sec)rumsensing (D#

M'l1unc)ioning sensing )ermin'ls

ec)rum sensing ')' 1'lsi1ic')ion (D# '))'cks

A m'licious secon'ry user in)en)ion'lly sens 1'lsi1ie loc'lsec)rum sensing reor)s )o )&e ')' collec)or in 'n '))em) )oc'use )&e ')' collec)or )o m'ke incorrec) sec)rum sensingecisions

18

Page 19: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 19/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

D A))'cks

19

Page 20: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 20/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

Moeling o1 D 's ' 'r'llel 1usionne)-ork

We c'n moel )&e D roblem 's ' 'r'llel 1usionne)-ork

20

Page 21: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 21/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

D')' 1usion 'lgori)&ms 1or D

Decision 1usion

B'yesi'n e)ec)ion

Neym'n?2e'rson )es)

Weig&)e seuen)i'l rob'bili)y r')io )es) (W2+T#

21

Page 22: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 22/34

Page 23: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 23/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

/er')ing Environmen) o1 5!. Ne)-orks

 

23

TV transmitters

WRANBase Station

Wirelessmicrophones

Wirelessmicrophones

WRANBase Station

: CPE (Consumer Premise Equipment)

: WRAN Base Station

Typical ~33km

Max. 100km

Incumbent services:• TV broacast services• Part !" evices (#ire$ess microp%ones)

Page 24: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 24/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

2HY?'yer uor) 1or %oe0is)ence

T-o?s)'ge sec)rum sensing in uie) erios (G2s#

's) sensing s)'ge> ' uick 'n simle e)ec)ion )ec&niue,e.g., energy e)ec)ion.

ine sensing s)'ge> me'suremen)s 1rom 1's) sensing

e)ermine )&e nee 'n ur')ion o1 1ine sensing s)'ge. ync&roni3')ion o1 overl'ing BsF G2s

24

BS1

BS2

Time

BS3

Fast sensing 802.22 TransmissionFine sensing

Cannel !etection Time

Fast sensing Fine sensing

Cannel !etection Time

Fast sensing Fine sensing

Cannel !etection Time

Fast sensing Fine sensing

Cannel !etection Time

Fast sensing Fine sensing

Cannel !etection Time

Fast sensing Fine sensing

Cannel !etection Time

Fast sensing Fine sensing

Page 25: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 25/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

%ogni)ive MA% (%MA%# 'yer($#

T-o )yes con)rol mess'ges

M'n'gemen) mess'ges> in)r'?cell m'n'gemen)

Be'cons> in)er?cell coorin')ion

4n)er?cell sync&roni3')ion

r'me o11se) is con)'ine in be'con 'ylo' T&e receiver B er1orms 1r'me sliing )o sync&roni3e -i)&

)&e )r'nsmi))er B.

25

Page 26: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 26/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

%ogni)ive MA% (%MA%# 'yer(# 4n)er?B yn'mic resource s&'ring

Neee -&en Go o1 'mi))e service -orklo' c'nno) bes')is1ie

5!. rescribes non?e0clusive 7 e0clusive sec)rum s&'ring

/n?em'n sec)rum con)en)ion (/D%# ro)ocol elec) ' )'rge) c&'nnel )o con)en

E'c& B selec)s ' %&'nnel %on)en)ion Number (%%N# 1romI!,$ J.

B -i)& ' gre')er %%N -ins )&e 'ir?-ise con)en)ionroceure.

B -ins )&e c&'nnel i1 i) -ins 'll 'ir?-ise con)en)ionroceures -i)& 'll co?c&'nnel Bs.

4n)er?cell be'cons use )o c'rry ou) /D%

26

Page 27: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 27/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

%ogni)ive MA% (%MA%# 'yer(@#

2ro)ec)ion o1 2'r) K9 evices (-ireless micro&ones#

%l'ss A solu)ion

A se'r')e be'con evice eloye

Tr'nsmi) s&or) -ireless micro&one be'cons (WMB#

Cse WMBs )o no)i1y colloc')e 5!. cells 'bou) oer')iono1 2'r) K9 evices

%l'ss B solu)ion

A seci'l )ye o1 %2E is eloye

%l'ss B %2Es e)ec) 2'r) K9

evice oer')ions 'n no)i1yo)&er 5!. sys)ems

27

WRAN

Base Station

WirelessMIC

Class B CPE

Page 28: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 28/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

/vervie- o1 5!.Fs ecuri)y ubl'yer

5!. securi)y subl'yer rovies con1ien)i'li)y, 'u)&en)ic')ion 'nin)egri)y services 1or in)r'?cell m'n'gemen) mess'ges

2;M (2riv'cy ;ey M'n'gemen)# ro)ocol

Enc'sul')ion ro)ocol

4) 1'ils )o ro)ec) in)er?cell be'cons use in coe0is)ence mec&'nisms

28

%MA% mec&'nismsro)ec)e by

5!.Fs securi)ysubl'yer

Page 29: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 29/34

Page 30: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 30/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

ecuri)y <ulner'bili)ies in 4n)er?%ell%oe0is)ence Mec&'nisms

4n)er?cell be'cons 're no) ro)ec)e by 5!.Fssecuri)y subl'yerL

Be'con 'lsi1ic')ion (B# '))'ck

T-o )yes o1 B '))'cks

T0 o1 1'lse1orge in)er?cell be'cons )o isru) sec)rum con)en)ion rocesses

 Ne)-ork )&roug&u) ro

in)er1ere -i)& in)er?cell sync&roni3')ion Cnermine )&e 'ccur'cy o1 sec)rum sensing

@!

Page 31: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 31/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

Disru)ing 4n)er?cell ec)rum %on)en)ion

/bec)ive o1 B '))'cks

Disru) sel1?coe0is)ence mec&'nisms (sec)rum con)en)ion rocesses#

A))'ck me)&o

orge in)er?cell be'cons -i)& 'rbi)r'rily l'rge %%N v'lue(e.g., selec) %%N 1rom I$   , $ J, -&ere  O $#

T0 be'cons )&') con)'in l'rge %%N )o neig&boring Bs 4m'c) o1 B '))'cks

egi)im')e vic)im Bs lose )&e )'rge) c&'nnels.

Dro in ne)-ork )&roug&u)

31

, O $

imul')ion l'you) 'n resul)s

Page 32: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 32/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

4n)er1ering -i)& 4n)er?cell ync&roni3')ion

/bec)ive o1 B '))'ck

Cnermine e11ic'cy o1 incumben) coe0is)ence mec&'nism (sec)rumsensing#

A))'ck me)&o

orge in)er?cell be'cons -i)& surious r'me /11se)

4m'c) o1 B '))'ck <ic)im B er1orms 1r'me sliing 'ccoring )o )&e surious r'me /11se),

-&ic& c'uses 'sync&rony o1 G2s.

Async&rony c'uses sel1?in)er1erence )&') egr'es 'ccur'cy o1 sec)rumsensing uring G2s.

4m'c) on mise)ec)ion rob'bili)y (1or energy e)ec)or#

An incumben) sign'l is e)ec)e i1 -  r  (es)im')e +0 sign'l o-er, -  , isgre')er )&'n )&res&ol r  #.

Cner B '))'cks, sel1?in)er1erence in G2s c'uses )&e )&res&ol )o incre'se)o ' l'rger v'lue, r ..

Miss e)ec)ion rob'bili)y incre'ses by

32

*

*Pr( ) ( )r 

Y r 

r Y r f x dx< < = ∫ 

Page 33: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 33/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#

%oun)erme'sures

To )&-'r) )&e 1orgery o1 in)er?cell be'cons, 'n in)er?cell keym'n'gemen) sc&eme is neee

C)ili3e )&e b'ck&'ul in1r's)ruc)ure )&') connec)s mul)ile cells

Emloy ' is)ribu)e key m'n'gemen) sc&eme

@@

5!. b'ck&'ulin1r's)ruc)ure

Page 34: Cognitive Radio Network Security

7/21/2019 Cognitive Radio Network Security

http://slidepdf.com/reader/full/cognitive-radio-network-security 34/34

 “Cognitive Radio Communications and Networks: Principles and Practice” By A M Wyglinski M Nekovee Y T Hou (Elsevier December !!"# 34

%&')er $* umm'ry

Emergence o1 )&e oor)unis)ic sec)rum s&'ring (/#'r'igm 'n cogni)ive r'io )ec&nology r'ises ne-securi)y imlic')ions )&') &'ve no) been s)uiereviously

/ne coun)erme'sure 1or rim'ry user emul')ion '))'cks is)r'nsmi))er veri1ic')ionP i) is comose o1 @ rocesses>

<eri1ic')ion o1 sign'l c&'r'c)eris)ics

Me'suremen) o1 receive sign'l energy level

oc'li3')ion o1 )&e sign'l source

We c'n moel )&e is)ribu)e sec)rum sensing roblem's ' 'r'llel 1usion ne)-ork )o e'l -i)& By3'n)ine 1'ilures

4EEE 5!. is vulner'ble )o '))'cks bec'use i)s in)er?cellbe'cons 're no) ro)ec)e