Abstract
This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme. As discussed in the previous chapter, one of the main hurdles making the design of a PUE attack detection scheme nontrivial is the FCC’s requirement that no change should be made to the PU. Due to this requirement, most of the existing detection methods are designed solely for the SU side. Nonetheless, if one can deploy a nearby helper node that holds similar behavioral and physical properties as the PU and allow it to cooperate with the SU, the PUE detection performance may be further improved without disobeying the FCC’s requirement. To convey this idea, in this chapter, some background on link signature will be introduced first, followed by an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. Then, the overall link signature based PUE attack detection algorithm is illustrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Although the helper node can authenticate the PU signal and directly notify SUs, the link signature based scheme can work even when the helper node is sleeping [1].
References
Y. Liu, P. Ning, and H. Dai. Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE Symposium on Security and Privacy, pages 286–301. IEEE, 2010.
P. Kyritsi, D. C. Cox, R. A. Valenzuela, and P. W. Wolniansky. Correlation analysis based on MIMO channel measurements in an indoor environment. IEEE Journal on Selected areas in communications, 21 (5): 713–720, 2003.
M. Edman, A. Kiayias, and B. Yener. On passive inference attacks against physical-layer key extraction? In European Workshop on System Security, page 8. ACM, 2011.
X. He, H. Dai, W. Shen, P. Ning, and R. Dutta. Toward proper guard zones for link signature. IEEE Transactions on Wireless Communications, 15 (3): 2104–2117, 2016.
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In ACM conference on Computer and communications security, pages 401–410. ACM, 2007.
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In ACM international conference on Mobile computing and networking, pages 128–139. ACM, 2008.
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam. Information-theoretically secret key generation for fading wireless channels. IEEE Transactions on Information Forensics and Security, 5 (2): 240–254, 2010.
K. Ren, H. Su, and Q. Wang. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications, 18 (4), 2011.
N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In ACM international conference on Mobile computing and networking, pages 111–122. ACM, 2007.
S. Fang, Y. Liu, W. Shen, and H. Zhu. Where are you from?: Confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th annual international conference on Mobile computing and networking, pages 225–236. ACM, 2014.
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signing of multicast streams over lossy channels. In Security and Privacy, IEEE Symposium on, pages 56–73. IEEE, 2000.
D. Song, D. Zuckerman, and J. D. Tygar. Expander graphs for digital stream authentication and robust overlay networks. In Security and Privacy, IEEE Symposium on, pages 258–270. IEEE, 2002.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
He, X., Dai, H. (2018). Case Study I: Link Signature Assisted PUE Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-75868-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75867-1
Online ISBN: 978-3-319-75868-8
eBook Packages: EngineeringEngineering (R0)