Skip to main content

Physical Layer Cryptography and Cognitive Networks

  • Chapter
  • First Online:
Trustworthy Internet

Abstract

Recently the huge development of different and heterogeneous wireless communication systems raises the problem of growing spectrum scarcity. Cognitive radio tends to solve this problem by dynamically utilizing the spectrum. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to conventional wireless network. These weaknesses are introduced by the nature itself of cognitive radio, and they may cause serious impact to the network quality of service. However, to the authors’ knowledge, there are no specific secure protocols for cognitive radio networks. This paper will discuss the vulnerabilities inherent to cognitive radio systems, identify novel types of abuse, classify attacks, and analyze their impact. Security solutions to mitigate such threats will be proposed and discussed. In particular, physical payer security will be taken into account. A new modulation technique, able to encrypt the radio signal without any a priori common secret between the two nodes, was previously proposed by the authors (Mucchi et al. Wireless Personal Communications (WPC) International Journal 51:67–80, 2008; Mucchi et al. Wireless Personal Commun. J. 2010). The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. This contribution improves the previous works by proposing the noise loop modulation as physical layer security technique for cognitive radio networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Staple, G., Werbach, K.: The end of spectrum scarcity. IEEE Spectr. 41(3), 48–52 (2004)

    Article  Google Scholar 

  2. Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Selected Areas in Commun. 23(2), 201–220 (2005)

    Article  Google Scholar 

  3. Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohantly, S.: Next generation/dynamic spectrum access/cognitive radio wireless network: a survey. Comput. Networks 50, 2127–2159 (2006)

    Article  MATH  Google Scholar 

  4. Burbank, J.L.: Security in cognitive radio networks: the required evolution in approaches to wireless network security. In: 3rd International Conference on CrownCom 2008, pp. 1–7, 15–17 May 2008

    Google Scholar 

  5. Akyildiz, I.F., Lee, W., Vuran, M.C., Mohanty, S.: A survey on spectrum management in cognitive radio networks. IEEE Commun. Mag. 46, 40–80 (2008)

    Article  Google Scholar 

  6. Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: Secure cooperative sensing techniques for cognitive radio systems. In: IEEE International Conference on Communications. ICC ’08 (2008)

    Google Scholar 

  7. Mitola III, J., MaGuire Jr., GQ.: Cognitive radio: making software radios more personal. IEEE Personal Commun. 6(4), 13–18 (1999)

    Article  Google Scholar 

  8. IEEE 802 Tutorial: Cognitive Radio, Scott Seidel, Raytheon, Presented at the IEEE 802 Plenary, 18 July 2005

    Google Scholar 

  9. Mucchi, L., Ronga, L.S., Cipriani, L.: A new modulation for intrinsically secure radio channel in wireless systems, published in the special issue “Information Security and Data Protection in Future Generation Communication and Networking” of the Wireless Personal Communications (WPC) International Journal, by Springer; published online in 2008, printed in vol. 51, pp. 67–80, Number 1/October, 2009. doi:10.1007/s11277-008-9609-8

  10. Mucchi, L., Ronga, L.S., Del Re, E.: A novel approach for physical layer cryptography in wireless networks. Wireless Personal Commun. J. Springer (2010), to be published. doi:10.1007/s11277-010-9950-6

  11. Chen, R., Park, J., Hou, Y., Reed, J.H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46, 50–55 (2008)

    Article  Google Scholar 

  12. Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 29, 656–715 (1949)

    MathSciNet  Google Scholar 

  13. Bennett, C.H., Brassard, G.: In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)

    Google Scholar 

  14. Hero III, A.O.: Secure space–time communication. IEEE Trans. Inform. Theory 49(12), 3235–3249 (2003)

    Article  MathSciNet  Google Scholar 

  15. Maurer, U.: Secret key agreement by public discussion from common information. IEEE Trans. Inform. Theory 39(3), 733–742 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  16. Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)

    MathSciNet  Google Scholar 

  17. Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 24(3), 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  18. Sharbaf, M.S.: Quantum cryptography: a new generation of information technology security system, information technology: new generations. In: 2009. Sixth International Conference on ITNG ’09, pp. 1644–1648, 27–29 April 2009

    Google Scholar 

  19. Wilson, R., Tse, D., Scholtz, R.A.: Channel identification: secret sharing using reciprocity in ultrawideband channels. IEEE Trans. Inform. Forencis Security 2(3), 364–375 (2007)

    Article  Google Scholar 

  20. Hyungjin, K., Villasenor, J.D.: Secure MIMO communications in a system with equal numbers of transmit and receive antennas. Commun. Lett. IEEE 12(5), 386–388 (2008)

    Google Scholar 

  21. Li, X., Ratazzi, EP.: MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks. In: IEEE Military Communications Conference (MILCOM’2005), Atlantic City, NJ, 17–20 October 2005

    Google Scholar 

  22. Mohammadi, M.S.: MIMO minimum leakage. Physically secure wireless data transmission. In: International Conference on Application of Information and Communication Technologies, 2009. AICT 2009, pp. 1–5, 14–16 October 2009

    Google Scholar 

  23. Pollock, D.S.G.: A Handbook of Time-Series Analysis, Signal Processing and Dynamics. Academic Press, New York, ISBN 0-12-560990-6 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lorenzo Mucchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Italia Srl

About this chapter

Cite this chapter

Mucchi, L., Ronga, L.S., Del Re, E. (2011). Physical Layer Cryptography and Cognitive Networks. In: Salgarelli, L., Bianchi, G., Blefari-Melazzi, N. (eds) Trustworthy Internet. Springer, Milano. https://doi.org/10.1007/978-88-470-1818-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-88-470-1818-1_6

  • Published:

  • Publisher Name: Springer, Milano

  • Print ISBN: 978-88-470-1817-4

  • Online ISBN: 978-88-470-1818-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics