Skip to main content

Case Study I: Link Signature Assisted PUE Attack Detection

  • Chapter
  • First Online:
Adversary Detection For Cognitive Radio Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 320 Accesses

Abstract

This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme. As discussed in the previous chapter, one of the main hurdles making the design of a PUE attack detection scheme nontrivial is the FCC’s requirement that no change should be made to the PU. Due to this requirement, most of the existing detection methods are designed solely for the SU side. Nonetheless, if one can deploy a nearby helper node that holds similar behavioral and physical properties as the PU and allow it to cooperate with the SU, the PUE detection performance may be further improved without disobeying the FCC’s requirement. To convey this idea, in this chapter, some background on link signature will be introduced first, followed by an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. Then, the overall link signature based PUE attack detection algorithm is illustrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Although the helper node can authenticate the PU signal and directly notify SUs, the link signature based scheme can work even when the helper node is sleeping [1].

References

  1. Y. Liu, P. Ning, and H. Dai. Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE Symposium on Security and Privacy, pages 286–301. IEEE, 2010.

    Google Scholar 

  2. P. Kyritsi, D. C. Cox, R. A. Valenzuela, and P. W. Wolniansky. Correlation analysis based on MIMO channel measurements in an indoor environment. IEEE Journal on Selected areas in communications, 21 (5): 713–720, 2003.

    Article  Google Scholar 

  3. M. Edman, A. Kiayias, and B. Yener. On passive inference attacks against physical-layer key extraction? In European Workshop on System Security, page 8. ACM, 2011.

    Google Scholar 

  4. X. He, H. Dai, W. Shen, P. Ning, and R. Dutta. Toward proper guard zones for link signature. IEEE Transactions on Wireless Communications, 15 (3): 2104–2117, 2016.

    Article  Google Scholar 

  5. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In ACM conference on Computer and communications security, pages 401–410. ACM, 2007.

    Google Scholar 

  6. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In ACM international conference on Mobile computing and networking, pages 128–139. ACM, 2008.

    Google Scholar 

  7. C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam. Information-theoretically secret key generation for fading wireless channels. IEEE Transactions on Information Forensics and Security, 5 (2): 240–254, 2010.

    Article  Google Scholar 

  8. K. Ren, H. Su, and Q. Wang. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications, 18 (4), 2011.

    Google Scholar 

  9. N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In ACM international conference on Mobile computing and networking, pages 111–122. ACM, 2007.

    Google Scholar 

  10. S. Fang, Y. Liu, W. Shen, and H. Zhu. Where are you from?: Confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th annual international conference on Mobile computing and networking, pages 225–236. ACM, 2014.

    Google Scholar 

  11. A. Perrig, R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signing of multicast streams over lossy channels. In Security and Privacy, IEEE Symposium on, pages 56–73. IEEE, 2000.

    Google Scholar 

  12. D. Song, D. Zuckerman, and J. D. Tygar. Expander graphs for digital stream authentication and robust overlay networks. In Security and Privacy, IEEE Symposium on, pages 258–270. IEEE, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, X., Dai, H. (2018). Case Study I: Link Signature Assisted PUE Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75868-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75867-1

  • Online ISBN: 978-3-319-75868-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics