skip to main content
10.1145/2810103.2813717acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users

Published: 12 October 2015 Publication History

Abstract

Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band when it is not used by the licensed primary user. The open nature of the wireless medium means that any secondary user can freely use any given spectrum band. Secondary-user authentication is thus essential to ensure the proper operations of DSA systems. We propose SafeDSA, a novel PHY-based scheme for authenticating secondary users in DSA systems. In SafeDSA, the secondary user embeds his spectrum-use authorization into the cyclic prefix of each physical-layer symbol, which can be detected and authenticated by a verifier. In contrast to previous work, SafeDSA achieves robust and efficient authentication of secondary users with negligible impact on normal data transmissions. We validate the efficacy and efficiency of SafeDSA through detailed MATLAB simulations and USRP experiments. Our results show that SafeDSA can detect fake secondary users with a maximum false-positive rate of 0.091 and a negligible false-negative rate based on USRP experiments.

References

[1]
"Cisco Visual Networking Index: Global mobile data traffic forecast update 2014--2019 white paper," http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11--520862.html, {Online}.
[2]
L. Yang, Z. Zhang, B. Zhao, C. Kruegel, and H. Zheng, "Enforcing dynamic spectrum access with spectrum permits," in ACM MobiHoc'12, Hilton Head Island, SC, June 2012.
[3]
V. Kumar, J. M. Park, T. C. Clancy, and B. Kaigui, "PHY-layer authentication by introducing controlled inter symbol interference," in CNS'13, Washington,D.C., Oct. 2013.
[4]
V. Kumar, J. Park, and K. Bian, "Blind transmitter authentication for spectrum security and enforcement," in ACM CCS'14, Scottsdale, AZ, Nov. 2014.
[5]
X. Jin, J. Sun, R. Zhang, Y. Zhang, and C. Zhang, "SpecGuard: Spectrum misuse detection in dynamic spectrum access systems,"in INFOCOM'15, HongKong, China, Apr. 2015.
[6]
A. Goldsmith, "Wireless communications," pp. 172--197, 2005.
[7]
V. Brik, V. Shrivastava, A. Mishra, and S. Banerjee, "Towards an architecture for efficient spectrum slicing," in HotMobile'07, Tucson, AZ, Feb. 2007.
[8]
W. Xu, P. Kamat, and W. Trappe, "TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes," in IEEE Workshop on SDR Networks, Reston, VA, Sept. 2006.
[9]
G. Denker, E. Elenius, R. Senanayake, M. Stehr, and D. Wilkins, "A policy engine for spectrum sharing," in DySPAN'07, Dublin, Ireland, Apr. 2007.
[10]
S. Liu, L. Greenstein, Y. Chen, and W. Trappe, "ALDO: An anomaly detection framework for dynamic spectrum access networks," in INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
[11]
K. S. Lee, H. Wang, and H. Weatherspoon, "PHY covert channels: Can you see the idles?," in NSDI'14, Berkeley, CA, Apr. 2014.
[12]
X. Wang, and D. S. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in CCS'03, Washington, DC, Oct. 2003.
[13]
S. V. Radhakrishnan, A. S. Uluagac, and R. Beyah, "Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards," in GLOBECOM'13, Altanta, GA, Dec. 2013.
[14]
R. Chen, J. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in INFOCOM'08, Apr. 2008.
[15]
Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, "Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks," in INFOCOM'12, Orlando, FL, Mar. 2012.%, pp. 900--908.
[16]
R. Zhang, J. Zhang, Y. Zhang, and C. Zhang, "Secure crowdsourcing-based cooperative spectrum sensing," in INFOCOM'13, Turin, Italy, Apr. 2013.
[17]
S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, "Location privacy preservation in collaborative spectrum sensing," INFOCOM'12, Orlando, FL, Mar. 2012.
[18]
Z. Gao, H. Zhu, S. Li, and S. Du, "Security and privacy of collaborative spectrum sensing in cognitive radio networks," Wireless Communications, IEEE Transactions on, vol. 19, no. 6, pp. 106--112, Dec. 2012.
[19]
Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: attacks and countermeasures," INFOCOM'13, Turin, Italy, Apr. 2013.
[20]
R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE JSAC, vol.26, no.1, pp. 25--37, Jan. 2008.
[21]
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in S&P'10, Oakland, CA, May 2010.
[22]
X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in WiSec'11, Hamburg, Germany, June 2011.
[23]
J. Sun, D. Qu, T. Jiang, G. Zhong, and J. Guo, "Low overhead cyclostationary signatures based on hopping subcarrier in OFDM-based dynamic spectrum access networks," VTC Fall'11, San Francisco, CA, Sept. 2011.
[24]
I. Akyildiz, B. Lo, and R. Balakrishnan, "Cooperative spectrum sensing in cognitive radio networks: A survey," Physical Communication, vol. 4, no. 1, pp. 40--62, Mar. 2011.
[25]
"Orthogonal frequency-division multiplexing," http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing, {Online}.
[26]
D. Tse, and P. Viswanath, "Fundamentals of wireless communications," 2005.
[27]
L. Deneire, B. Gyselinckx, and M. Engels, "Training sequence versus cyclic prefix-a new look on single carrier communication," in Communication Letters, IEEE, vol. 5, no. 7, pp. 292--294, July 2001.
[28]
"Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications," June 2003.
[29]
J. van de Beek, M. Sandell, and P. O. Börjesson, "ML estimation of time and frequency offset in OFDM systems,"Signal Processing, IEEE Transactions on, vol. 45, no. 7, pp. 1800--1805, Jul. 1997.
[30]
J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. Börjesson, "On channel estimation in OFDM systems," Vehicular Technology Conference, 1995 IEEE 45th, vol. 2, pp. 815--819, Jul. 1995.
[31]
M. Sherman, A. N. Mody, R. Martinez, and C. Rodriguez, "IEEE standards supporting cogitive radioand networks, dynamic spectrum access, and coexistence," IEEE Communications Magazine, vol. 46,no. 7, pp. 72--79, Jul. 2008.
[32]
"SHA-1," http://en.wikipedia.org/wiki/SHA-1, {Online}.
[33]
T. Dierks and E. Rescorla, "The transport layer security (TLS) protocol," RFC 4346, Apr. 2006.
[34]
R. van Nee, and R. Prasad, "OFDM for wireless multimedia communications," Artech House, Boston, pp. 46, 2000.
[35]
T.M. Schmidl, and D.C. Cox, "Robust frequency and timing synchronization for OFDM," Communications, IEEE Transactions on, vol. 45, no. 12, pp. 1613--1621, Dec. 1997.
[36]
C. Sinem, E. Mustafa, P. Anuj, and B. Ahmad, "Channel estimation techniques based on pilot arrangement in OFDM systems," Broadcasting, IEEE Transactions on, vol. 48, no. 3, pp. 223--229, Sept. 2002
[37]
J. H. Manton, "Optimal training sequences and pilot tones for OFDM systems," IEEE Communication Letters, vol. 5, no. 4, pp. 151--153, Apr. 2001
[38]
M. Morelli and U. Mengali, "A comparison of pilot-aided channel estimation methods for ofdm systems," Signal Processing, IEEE Transactions on, vol. 49, no. 12, pp. 3065--3073, Dec. 2001.
[39]
W. D. Warner, and C. Leung, "OFDM/FM frame synchronization for mobile radio data communication," Vehicular Technology, IEEE Transactions on, vol. 42, no. 3, pp. 302--313, Aug. 1993.
[40]
"Design considerations," http://www.cisco.com/c/en/us/td/docs/wireless/technology/mesh/7--3/design/guide/Mesh/Mesh_chapter_011.pdf, {Online}.
[41]
H. Minn, M. Zeng, and V. K. Bhargava, "On timing offset estimation for OFDM systems," Communication Letters, IEEE, vol. 4, no. 7, pp. 242--244, July 2000.

Cited By

View all
  • (2022)Signal Emulation Attack and Defense for Smart Home IoTIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3169705(1-1)Online publication date: 2022
  • (2020)AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT EnvironmentsProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384726(20-32)Online publication date: 5-Oct-2020
  • (2019)Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum SharingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2019.29090285:3(625-636)Online publication date: Sep-2019
  • Show More Cited By

Index Terms

  1. SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
        October 2015
        1750 pages
        ISBN:9781450338325
        DOI:10.1145/2810103
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 12 October 2015

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. OFDM
        2. cyclic prefix
        3. dynamic spectrum access
        4. secondary user authentication

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS'15
        Sponsor:

        Acceptance Rates

        CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)11
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 15 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Signal Emulation Attack and Defense for Smart Home IoTIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3169705(1-1)Online publication date: 2022
        • (2020)AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT EnvironmentsProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384726(20-32)Online publication date: 5-Oct-2020
        • (2019)Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum SharingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2019.29090285:3(625-636)Online publication date: Sep-2019
        • (2018)Privacy-Preserving Crowdsourced Spectrum SensingIEEE/ACM Transactions on Networking10.1109/TNET.2018.282327226:3(1236-1249)Online publication date: 1-Jun-2018
        • (2018)CREAM: Unauthorized Secondary User Detection in Fading Environments2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2018.00064(406-414)Online publication date: Oct-2018
        • (2018)Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)10.1109/DySPAN.2018.8610498(1-10)Online publication date: Oct-2018
        • (2018)ROSTER: Radio Context Attestation in Cognitive Radio Network2018 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2018.8433187(1-9)Online publication date: May-2018
        • (2017)Toward Practical Spectrum PermitsIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2017.26561273:1(112-122)Online publication date: Mar-2017
        • (2017)$P^{2}$ -SASIEEE Journal on Selected Areas in Communications10.1109/JSAC.2016.263305935:1(173-187)Online publication date: 1-Jan-2017
        • (2017)Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.322(2486-2493)Online publication date: Jun-2017
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media