TY - GEN
T1 - A primary user authentication system for mobile cognitive radio networks
AU - Chandrashekar, Swathi
AU - Lazos, Loukas
PY - 2010
Y1 - 2010
N2 - Cognitive radio networks (CRNs) exploit the idle portion of the licensed spectrum to establish network communications. Essential to the co-existence of this technology with legacy systems, is the reliable sensing of spectrum opportunities. However, existing spectrum sensing techniques are vulnerable to adversaries that mimic the characteristics of Primary User (PU) transmissions in order to reduce the bandwidth availability for the CRN. In this paper, we address the problem of authenticating the PU signal in order to mitigate PU emulation attacks. We propose a PU authentication system based on the deployment of "helper" nodes, fixed within the geographical area of the CRN. Our system relies on a combination of physical-layer signatures (link signatures) and cryptographic mechanisms to reliably sense PU activity and relay information to the CRN. Compared to prior work, our system can accommodate mobile secondary users and can be implemented with relatively low-power helpers.
AB - Cognitive radio networks (CRNs) exploit the idle portion of the licensed spectrum to establish network communications. Essential to the co-existence of this technology with legacy systems, is the reliable sensing of spectrum opportunities. However, existing spectrum sensing techniques are vulnerable to adversaries that mimic the characteristics of Primary User (PU) transmissions in order to reduce the bandwidth availability for the CRN. In this paper, we address the problem of authenticating the PU signal in order to mitigate PU emulation attacks. We propose a PU authentication system based on the deployment of "helper" nodes, fixed within the geographical area of the CRN. Our system relies on a combination of physical-layer signatures (link signatures) and cryptographic mechanisms to reliably sense PU activity and relay information to the CRN. Compared to prior work, our system can accommodate mobile secondary users and can be implemented with relatively low-power helpers.
UR - http://www.scopus.com/inward/record.url?scp=79952025062&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952025062&partnerID=8YFLogxK
U2 - 10.1109/ISABEL.2010.5702859
DO - 10.1109/ISABEL.2010.5702859
M3 - Conference contribution
AN - SCOPUS:79952025062
SN - 9781424481323
T3 - 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2010
BT - 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2010
T2 - 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2010
Y2 - 7 November 2010 through 10 November 2010
ER -