Abstract
Recently the huge development of different and heterogeneous wireless communication systems raises the problem of growing spectrum scarcity. Cognitive radio tends to solve this problem by dynamically utilizing the spectrum. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to conventional wireless network. These weaknesses are introduced by the nature itself of cognitive radio, and they may cause serious impact to the network quality of service. However, to the authors’ knowledge, there are no specific secure protocols for cognitive radio networks. This paper will discuss the vulnerabilities inherent to cognitive radio systems, identify novel types of abuse, classify attacks, and analyze their impact. Security solutions to mitigate such threats will be proposed and discussed. In particular, physical payer security will be taken into account. A new modulation technique, able to encrypt the radio signal without any a priori common secret between the two nodes, was previously proposed by the authors (Mucchi et al. 2009, WPC 51, 67–80; Mucchi et al. 2010, WPC 53, 329–347). The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. This contribution improves the previous works by proposing the noise loop modulation as physical layer security technique for cognitive radio networks.
Similar content being viewed by others
References
Staple G., Werbach K. (2004) The end of spectrum scarcity. IEEE Spectrum 41(3): 48–52
Haykin S. (2005) Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23(2): 201–220
Akyildiz I. F., Lee W. -Y., Vuran M. C., Mohantly S. (2006) Next generation/dynamic spectrum access/cognitivw radio wireless network: A survey. Elsevier Computer Networks 50: 2127–2159
Burbank, J. L. (2008). Security in cognitive radio networks: The required evolution in approaches to wireless network security. In 3rd international conference on CrownCom pp. 1–7, 15–17 May
Akyildiz I. F., Lee W., Vuran M. C., Mohanty S. (2008) A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine 46: 40–80
Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2008). Secure cooperative sensing techniques for cognitive radio systems. IEEE International Conference on Communications, ICC’08.
Mitola J. III, MaGuire G. Q. Jr. (1999) Cognitive radio: Making software radios more personal. IEEE Personal Communications 6(4): 13–18
IEEE 802 Tutorial: Cognitive Radio. Scott Seidel, Raytheon, Presented at the IEEE 802 Plenary, 18 July 2005.
Mucchi, L., Ronga, L. S., & Cipriani, L. (2009). A new modulation for intrinsically secure radio channel in wireless systems. Wireless Personal Communications, 51(1), 67–80; doi:10.1007/s11277-008-9609-8
Mucchi, L., Ronga, L. S., & Del Re, E. (2010). A novel approach for physical layer cryptography in wireless networks. Wireless Personal Communications, 53(3), 329–347, doi:10.1007/s11277-010-9950-6 (to be published).
Chen R., Park J., Hou Y., Reed J. H. (2008) Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine 46: 50–55
Shannon C. (1949) Communication theory of secrecy systems. Bell System Technical Journal 29: 656–715
Bennett, C. H., & Brassard, G. (1984). In IEEE international conference on computers, systems and signal processing (pp. 175–179). Bangalore, India.
Hero A. O. III (2003) Secure space-time communication. IEEE Transactions on Information Theory 49(12): 3235–3249
Maurer U. (1993) Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39(3): 733–742
Wyner A. D. (1975) The wire-tap channel. Bell System Technical Journal 54(8): 1355–1387
Csiszar I., Korner J. (1978) Broadcast channels with confidential messages. IEEE Transactions on Information Theory 24(3): 339–348
Sharbaf, M. S. (2009). Quantum cryptography: A new generation of information technology security system, information technology: New generations, 2009. In Sixth international conference on ITNG ’09. 27–29 April 2009 (pp. 1644–1648).
Wilson, R., Tse, D.,& Scholtz, R.A. (2007). Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Transactions on Information Forensics and Security 2(3).
Hyungjin K., Villasenor J. D. (2008) Secure MIMO communications in a system with equal numbers of transmit and receive antennas. Communications Letters IEEE 12(5): 386–388
Li, X., & Ratazzi, E. P. (2005). MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks. In IEEE Military communications conference (MILCOM’2005). Atlantic City, NJ, Oct. 17–20.
Mohammadi, M. S. (2009). MIMO minimum leakage—Physically secure wireless data transmission. In International conference on Application of information and communication technologies, 2009. AICT 2009 Oct. 14–16 (pp. 1–5).
Pollock, D. S. G. (1999). A handbook of time-series analysis, signal processing and dynamics. Academic Press, ISBN 0-12-560990-6.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mucchi, L., Ronga, L.S. & Del Re, E. Physical Layer Cryptography and Cognitive Networks. Wireless Pers Commun 58, 95–109 (2011). https://doi.org/10.1007/s11277-011-0290-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-011-0290-y